Re: [tsvwg] Reviewing draft-ietf-tsvwg-rfc6040update-shim

Bob Briscoe <ietf@bobbriscoe.net> Fri, 22 September 2023 23:07 UTC

Return-Path: <ietf@bobbriscoe.net>
X-Original-To: tsvwg@ietfa.amsl.com
Delivered-To: tsvwg@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 679ECC15153D for <tsvwg@ietfa.amsl.com>; Fri, 22 Sep 2023 16:07:55 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -2.195
X-Spam-Level:
X-Spam-Status: No, score=-2.195 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, DKIM_SIGNED=0.1, DKIM_VALID=-0.1, DKIM_VALID_AU=-0.1, DKIM_VALID_EF=-0.1, HTML_MESSAGE=0.001, NICE_REPLY_A=-0.091, RCVD_IN_DNSWL_BLOCKED=0.001, RCVD_IN_ZEN_BLOCKED_OPENDNS=0.001, SPF_HELO_NONE=0.001, SPF_PASS=-0.001, T_SCC_BODY_TEXT_LINE=-0.01, URIBL_BLOCKED=0.001, URIBL_DBL_BLOCKED_OPENDNS=0.001, URIBL_ZEN_BLOCKED_OPENDNS=0.001] autolearn=ham autolearn_force=no
Authentication-Results: ietfa.amsl.com (amavisd-new); dkim=pass (2048-bit key) header.d=bobbriscoe.net
Received: from mail.ietf.org ([50.223.129.194]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id UQA86WVgFE5f for <tsvwg@ietfa.amsl.com>; Fri, 22 Sep 2023 16:07:51 -0700 (PDT)
Received: from mail-ssdrsserver2.hostinginterface.eu (mail-ssdrsserver2.hostinginterface.eu [185.185.85.90]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id DFB36C151536 for <tsvwg@ietf.org>; Fri, 22 Sep 2023 16:07:48 -0700 (PDT)
DKIM-Signature: v=1; a=rsa-sha256; q=dns/txt; c=relaxed/relaxed; d=bobbriscoe.net; s=default; h=In-Reply-To:From:References:Cc:To:Subject: MIME-Version:Date:Message-ID:Content-Type:Sender:Reply-To: Content-Transfer-Encoding:Content-ID:Content-Description:Resent-Date: Resent-From:Resent-Sender:Resent-To:Resent-Cc:Resent-Message-ID:List-Id: List-Help:List-Unsubscribe:List-Subscribe:List-Post:List-Owner:List-Archive; bh=W9iS3EvU1NA9Za1JGPSSZqXOrPSg7iqlmTgTuwnHVnM=; b=Lmrwuqz342FJs3q1Zoa4+NFIln 7hhMJ9akdhH1k1j7vHeFsWc/mXfEk6qz+QlSeLyVEadATMcNSPVdpCA1ufVOEdWX1BOAyrJNsIhbR wGEsXfOzSwDaleOX90yTjwT+7yn9c0KsTUG9Nzr2ngRj91XM1DQcg4cU2JXpzV9s5EtKcTKJAPiSq Dnwg8kcwVue3vIVSxCUQ4fbFYc/DpvVKekAEu0kMwNa4NcdT8ZXk/3W9npVEbJCekyrRiQMbM1g9b drPYJUERVqYHNGX3M6dIY7b9iYisOinObKVwwag1NBzxPmaiXRtr37Ig8I6vRGBmtNxUxU3TJ2GZ7 1rJSZ6Xg==;
Received: from 67.153.238.178.in-addr.arpa ([178.238.153.67]:51868 helo=[192.168.1.7]) by ssdrsserver2.hostinginterface.eu with esmtpsa (TLS1.2) tls TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256 (Exim 4.96) (envelope-from <ietf@bobbriscoe.net>) id 1qjpFb-0002yn-0u; Sat, 23 Sep 2023 00:07:46 +0100
Content-Type: multipart/alternative; boundary="------------jRj8q1d8D1GZ0XaQ9KQabeC1"
Message-ID: <2a675fdd-3f9c-4870-3cd1-12ed1996c491@bobbriscoe.net>
Date: Sat, 23 Sep 2023 00:07:45 +0100
MIME-Version: 1.0
User-Agent: Mozilla/5.0 (X11; Linux x86_64; rv:102.0) Gecko/20100101 Thunderbird/102.15.1
Content-Language: en-GB
To: Gorry Fairhurst <gorry@erg.abdn.ac.uk>
Cc: tsvwg@ietf.org
References: <df3be29f-3ae0-e730-b8d2-08cec2feace2@bobbriscoe.net> <B80F54B4-140C-403E-AF81-A40F4DA71E94@erg.abdn.ac.uk>
From: Bob Briscoe <ietf@bobbriscoe.net>
In-Reply-To: <B80F54B4-140C-403E-AF81-A40F4DA71E94@erg.abdn.ac.uk>
X-AntiAbuse: This header was added to track abuse, please include it with any abuse report
X-AntiAbuse: Primary Hostname - ssdrsserver2.hostinginterface.eu
X-AntiAbuse: Original Domain - ietf.org
X-AntiAbuse: Originator/Caller UID/GID - [47 12] / [47 12]
X-AntiAbuse: Sender Address Domain - bobbriscoe.net
X-Get-Message-Sender-Via: ssdrsserver2.hostinginterface.eu: authenticated_id: in@bobbriscoe.net
X-Authenticated-Sender: ssdrsserver2.hostinginterface.eu: in@bobbriscoe.net
X-Source:
X-Source-Args:
X-Source-Dir:
Archived-At: <https://mailarchive.ietf.org/arch/msg/tsvwg/UKiUbq5ibGdFWz4L5X9wrfCCNBU>
Subject: Re: [tsvwg] Reviewing draft-ietf-tsvwg-rfc6040update-shim
X-BeenThere: tsvwg@ietf.org
X-Mailman-Version: 2.1.39
Precedence: list
List-Id: Transport Area Working Group <tsvwg.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/tsvwg>, <mailto:tsvwg-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/tsvwg/>
List-Post: <mailto:tsvwg@ietf.org>
List-Help: <mailto:tsvwg-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/tsvwg>, <mailto:tsvwg-request@ietf.org?subject=subscribe>
X-List-Received-Date: Fri, 22 Sep 2023 23:07:55 -0000

Gorry,

Posted, and I added your name to the Acks for your helpful review.
Thank you.

Bob

On 22/09/2023 09:02, Gorry Fairhurst wrote:
> Bob,
>
> Many thanks for carefully working through this review list. I see you 
> have done the correct thing, and I agree with updating the text 
> relating to code points to avoid staying equivalence.
>
> I will add the list of paused INTAREA documents to our review request 
> for INT, and follow this up with an INT AD. I am sure they will 
> comment if they do see a particular direction that  is preferable for 
> how to cite these in our guidance.
>
> Please submit a revised ID.
>
> Gorry
>
>> On 21 Sep 2023, at 18:34, Bob Briscoe 
>> <ietf=40bobbriscoe.net@dmarc.ietf.org> wrote:
>>
>>  Gorry,
>>
>> Thank you for your review comments. I've amalgamated both your lists 
>> into one email below. I've adopted all the changes you propose 
>> verbatim except where noted with "[BB]".
>>
>> I would also like to propose to make the following change:
>> Sorry, for the last-minute proposal post-WGLC, but the world has 
>> change in the x years that have passed while waiting for the 
>> dependent reference to move forward. In particular, RFC8311 ended the 
>> equivalence of ECT(0) and ECT(1).
>>
>> Reasoning should be self-explanatory - TLDR; removes unnecessary 
>> uncertainty.
>>
>> BEFORE:
>>    *  If there is mix of ECT(0) and ECT(1) fragments, then the
>>       reassembled packet MUST be set toeither ECT(0) or ECT(1). In
>>       this case, reassembly SHOULD take into account that the RFC series
>>       has so far ensured that ECT(0) and ECT(1) can either be considered
>>       equivalent, or they can provide 2 levels of congestion severity,
>>       where the ranking of severity from highest to lowest is CE,
>>       ECT(1), ECT(0) [RFC6040].
>>
>> PROPOSED:
>>    *  If there is mix of ECT(0) and ECT(1) outer fragments, then the
>>       reassembled packet MUST be set to ECT(1).
>>
>> ***Reasoning: Originally [RFC3168] defined ECT(0) and ECT(1) as
>>       equivalent, but RFC 3168 has been updated by [RFC8311] to make
>>       ECT(1) available for congestion marking differences. ***The 
>> rule is
>>       independent of***the current use of ECT(1) for L4S [RFC9331]. The**
>>       rule is compatible with PCN [RFC6660], which uses ***2 levels of
>>       congestion severity, with the ranking of severity from highest to
>>       lowest being CE, ECT(1), ECT(0))*. **The decapsulation rules in
>>       [RFC6040] take a similar approach.*
>>
>> See [BB] below...
>>
>> On 15/09/2023 07:51, Gorry Fairhurst wrote:
>>> Bob,
>>>
>>> I have been reviewing draft-ietf-tsvwg-rfc6040update-shim, to 
>>> prepare a publication request as the new assigned document shepherd. 
>>> Thanks for the new revision updating the references to cite the 
>>> latest rev.
>>>
>>> I think this draft is nearly ready to proceed - but I have review 
>>> comments that I think needs a new revision.
>>>
>>> Best wishem
>>>
>>> Gorry Fairhurst
>>> (as Document Shepherd)
>>>
>>> ===
>>> 1. Since the ID on intarea tunnels remains an item of pending work, 
>>> it would be wiser to explain the term outer fragments before first 
>>> used - citing intarea tunnels as a reference. The cited document is 
>>> not the easiest to parse to find this definition
>>>
>>> "Section 5.3 of [RFC3168] specifies ECN requirements for reassembly of
>>> sets of outer fragments."
>>>
>>> I suggest something like:
>>>
>>> Section 5.3 of [RFC3168] specifies ECN requirements for reassembly of
>>> sets of outer fragments [I-D.ietf-intarea-tunnels] into packets. (In 
>>> outer fragmentation, an outer header in each fragment indicates the 
>>> fragmentation and the inner transit header occurs only in the first 
>>> fragment, with the following inner (transit) data broken across 
>>> multiple packets.)
>>> ===
>>> 2.
>>> In Section 6.1.1.1., can you define LCCE in the first sentence 
>>> before the quote so that the quote becomes readable?
>>> OLD:
>>> In particular, for an LCCE
>>> NEW:
>>> In particular, L2TP Control Connection Endpoint (LCCE)
>>> ===
>>> 3.
>>> Please could you add a VERY SHORT definition of X and E in the 
>>> caption of figure 1: Value Field for the LCCE Capability Attribute ...
>>> e.g.: (E is the ECN Capability flag, the value of X is reserved).
>>> ====
>>> 4. Please rephrase this:
>>> "It is believed that current implementations do not support"
>>> ... I'd suggest it does not say something about the belief - when 
>>> published by the IETF, the RFC-Ed will not hold these beliefs, 
>>> please choose another word.
>>> OLD:
>>> It is believed that
>>> NEW:
>>> At the time of publication, it is thought that
>>
>> [BB] I've used "Those implementations known to the authors at the 
>> time of writing"
>>
>>> ===
>>> 5.
>>> Section 9 ought to be removed at this stage in the process: "9. 
>>> Comments Solicited"
>>
>> [BB] I've tagged it with the XML attribute removeInRFC="true" for the 
>> RFC Editor
>> And I've moved it to after the refs, along with the Acks, which I now 
>> understand is preferred RFC style.
>>
>>> ====
>>> 6. Please consider citing RFC 6169 as an informativen ref alongside 
>>> the first citation of RFC 4380, as a note to indicate the IETFs 
>>> position on current development of Teredo.
>>
>> [BB] I'd rather not cite RFC6169 because there is nothing in it that 
>> is at all relevant to the present draft. Despite the title "Security 
>> Concerns with IP Tunneling", it only covers security concerns to do 
>> with routing and addressing, which has nothing to do with ECN 
>> propagation.
>>
>> See [BB] in your initial list below, with duplicates snipped
>> Continued...
>>
>>
>> On 13/09/2023 10:32, Gorry Fairhurst wrote:
>>> Bob,
>>> I have been reviewing draft-ietf-tsvwg-rfc6040update-shim, to 
>>> prepare a publication request as the new assigned document shepherd.
>>>
>>> I think this draft is nearly ready to proceed - but it now needs a 
>>> new revision to update the references, and to address some concerns.
>>>
>>>
>>> Best wishes,
>>>
>>> Gorry Fairhurst
>>> (In-Coming Document Shepherd)
>>>
>>> ===
>>> 1. Please update all references to cite the latest rev.
>>
>> [BB] As you saw, now done in draft 17 (between your two emails).
>>
>>> ===
>> [snip 2]
>>
>>> 3. The document provides a list that it states is confined to 
>>> standards track or widely deployed protocols. Some work appears to 
>>> have stalled/failed to progress. Please be careful not to imply a 
>>> projected status for this work-in-progress.
>>>
>>> "GUE (Generic UDP Encapsulation) [I-D.ietf-intarea-gue];" - This 
>>> list includes GUE as work-in-progress. I am unsure we can confirm 
>>> deployment or document status. Is it wiser to remove the ice, from 
>>> the list, and simply discuss this alongside Geneva in the text. I 
>>> understand anyway that no change is requested to this specification.
>>>
>>> ietf-nvo3-vxlan-gpe - Unsure if this ref is needed, and did not 
>>> appear active in the WG, and it seems no specific recommendation 
>>> included?
>>
>> [BB] I thought it best to leave these in so that intarea review could 
>> say whether it wants any removed.
>>
>>>
>>> ietf-sfc-nsh-ecn-support - appears active, current text appears OK, 
>>> please update rev.
>>>
>>> ===
>>> 4. The test says:
>>>    The requirements in Section 4 update RFC 6040, and hence
>>>    implicitly update the UDP usage guidelines in RFC 8085 to add the
>>>    important but previously unstated requirement that, if the UDP 
>>> tunnel
>>>    egress does not, or might not, support ECN propagation, a UDP tunnel
>>>    ingress has to clear the outer IP ECN field to 0b00, e.g. by
>>>    configuration.
>>> - I have thought, and I think I am OK with this choice of action, 
>>> but "implicitly update" is likely to attract attention from an IESG 
>>> review. Could we avoid "update" explicitly say something, for 
>>> example I suggest:
>>>
>>> NEW:
>>>    The requirements in Section 4 update RFC 6040, and hence
>>>    add to the UDP usage guidelines in RFC 8085 by addition of the
>>>    important, but previously unstated requirement that, if the UDP 
>>> tunnel
>>>    egress does not, or might not, support ECN propagation, a UDP tunnel
>>>    ingress has to clear the outer IP ECN field to 0b00, e.g. by
>>>    configuration.
>>> ===
>>
>> [BB] I had independently updated this section myself and posted draft 
>> 17 the day after your first email (even though I missed the list it 
>> contained). And I notice you had removed this item from the list you 
>> sent the next day, so I assume that implied agreement.
>>
>> [snip 5-9]
>>
>>> 9. Please confirm there is no known IPR relating to this ID, and 
>>> that you are content with the Editor's name being presented when 
>>> published.
>>> ====
>>
>> [BB] Confirmed. I know of no related IPR. And happy for my name being 
>> on it.
>>
>> [snip 10]
>>
>>
>> Bob
>>
>> -- 
>> ________________________________________________________________
>> Bob Briscoehttp://bobbriscoe.net/

-- 
________________________________________________________________
Bob Briscoehttp://bobbriscoe.net/