Re: [tsvwg] OPS-DIR review of draft-ietf-tsvwg-sctp-prpolicies-05.txt
Michael Tuexen <tuexen@fh-muenster.de> Thu, 11 December 2014 14:38 UTC
Return-Path: <tuexen@fh-muenster.de>
X-Original-To: tsvwg@ietfa.amsl.com
Delivered-To: tsvwg@ietfa.amsl.com
Received: from localhost (ietfa.amsl.com [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 2C2281ACEE4; Thu, 11 Dec 2014 06:38:01 -0800 (PST)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -1.551
X-Spam-Level:
X-Spam-Status: No, score=-1.551 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, HELO_EQ_DE=0.35, SPF_HELO_PASS=-0.001] autolearn=no
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id zC7PqO8VMMSN; Thu, 11 Dec 2014 06:37:59 -0800 (PST)
Received: from rachael.franken.de (rachael.franken.de [IPv6:2001:638:a02:a001:21f:d0ff:fe8e:76d3]) (using TLSv1.2 with cipher AECDH-AES256-SHA (256/256 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id 09F9D1ACEE3; Thu, 11 Dec 2014 06:37:59 -0800 (PST)
Received: by rachael.franken.de (Postfix, from userid 33) id 92F601112CEC6; Thu, 11 Dec 2014 15:37:56 +0100 (CET)
To: gorry@erg.abdn.ac.uk
MIME-Version: 1.0
Content-Type: text/plain; charset="UTF-8"; format="flowed"
Content-Transfer-Encoding: 8bit
Date: Thu, 11 Dec 2014 15:37:56 +0100
From: Michael Tuexen <tuexen@fh-muenster.de>
In-Reply-To: <7d7fcc0039f4fe019b8981541c9bdcd2.squirrel@spey.erg.abdn.ac.uk>
References: <9904FB1B0159DA42B0B887B7FA8119CA5C912939@AZ-FFEXMB04.global.avaya.com> <AA1F20D3-B5EA-43F6-84D8-999E359FDFF5@fh-muenster.de> <9904FB1B0159DA42B0B887B7FA8119CA5C92A523@AZ-FFEXMB04.global.avaya.com> <34E7FE23-64C6-4F9D-B10D-C946168C2766@fh-muenster.de> <CAKKJt-cdzypHk+sEYsVU8Bu7Oi3bwygCoa9ZPHnSv3BqhyZAsA@mail.gmail.com> <9904FB1B0159DA42B0B887B7FA8119CA5C92B8EF@AZ-FFEXMB04.global.avaya.com> <7d7fcc0039f4fe019b8981541c9bdcd2.squirrel@spey.erg.abdn.ac.uk>
Message-ID: <f09872dccc889774748f29f69f5c7364@mail-n.franken.de>
X-Sender: tuexen@fh-muenster.de
User-Agent: Roundcube Webmail/0.9.2
Archived-At: http://mailarchive.ietf.org/arch/msg/tsvwg/Vhj2o3CWhDgDI9OqlHjQOS7lJMI
Cc: "Romascanu, Dan (Dan)" <dromasca@avaya.com>, ops-dir@ietf.org, draft-ietf-tsvwg-sctp-prpolicies.all@tools.ietf.org, tsvwg@ietf.org
Subject: Re: [tsvwg] OPS-DIR review of draft-ietf-tsvwg-sctp-prpolicies-05.txt
X-BeenThere: tsvwg@ietf.org
X-Mailman-Version: 2.1.15
Precedence: list
List-Id: Transport Area Working Group <tsvwg.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/tsvwg>, <mailto:tsvwg-request@ietf.org?subject=unsubscribe>
List-Archive: <http://www.ietf.org/mail-archive/web/tsvwg/>
List-Post: <mailto:tsvwg@ietf.org>
List-Help: <mailto:tsvwg-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/tsvwg>, <mailto:tsvwg-request@ietf.org?subject=subscribe>
X-List-Received-Date: Thu, 11 Dec 2014 14:38:01 -0000
On 2014-12-11 12:10, gorry@erg.abdn.ac.uk wrote: > So, it seems most of this is covered by clear statements that describe > this as a sender-side only change to the transport protocol of the > endpoint stack. ... and description and references to examples where > deployment is expected, etc - I suggest to expand the introduction? > > Michael can you run the changes by me as the document shepherd, so I > can > check that I see the logic and it doesn't potentially create new > issues? Hi Gorry, I'm sorry, I already submitted the version. Please have a look at https://tools.ietf.org/html/draft-ietf-tsvwg-sctp-prpolicies-06 and let me know if they changes are OK for you. If not I can incorporate your suggested changes. Best regards Michael > > Gorry > >> Ø I'm good with Michael submitting an update addressing the comments >> as >> discussed in this thread. >> >> Ø >> >> Ø Thanks, >> >> Ø >> >> Ø Spencer >> >> Me too. Can you please send me a note when this happens, so that I do >> not >> miss the update? >> >> Thanks for considering my comments. >> >> Regards, >> >> Dan >> >> >> From: Spencer Dawkins at IETF [mailto:spencerdawkins.ietf@gmail.com] >> Sent: Thursday, December 11, 2014 12:10 AM >> To: Michael Tuexen >> Cc: Romascanu, Dan (Dan); ops-dir@ietf.org; tsvwg@ietf.org; >> draft-ietf-tsvwg-sctp-prpolicies.all@tools.ietf.org >> Subject: Re: OPS-DIR review of draft-ietf-tsvwg-sctp-prpolicies-05.txt >> >> From at least one AD :-) >> >> On Wed, Dec 10, 2014 at 2:52 PM, Michael Tuexen >> <tuexen@fh-muenster.de<mailto:tuexen@fh-muenster.de>> wrote: >> On 10 Dec 2014, at 13:23, Romascanu, Dan (Dan) >> <dromasca@avaya.com<mailto:dromasca@avaya.com>> wrote: >> >>> Hi Michael, >>> >>> Thank you for addressing the issues raised in the OPS-DIR review. >>> >>> First, please see the disclaimer that I put in my review: >>> >>>>> Although this document defines an extension of an existing >>>>> protocol, >>>>> there >>>> are no explicit considerations about operations and management. The >>>> OPS >>>> and Transport ADs should decide whether this is an issue to be >>>> addressed >>>> before the document is approved. >>> >>> The OPS-DIR reviews are written to help the OPS ADs with a reading of >>> the I-Ds in review from the perspective of the operators using the >>> and >>> deploying the new protocols or extensions defined by the document. We >>> - >>> the reviewers - believe that the operational and manageability issues >>> are important, but it's up to the ADs to decide whether they are >>> important enough to require changes in the document, and what these >>> changes should be. >> Hi Dan, >> >> understood. But I want to understand your points and possibly address >> them... >>> >>> More in-line. >>> >>> Regards, >>> >>> Dan >>> >>> >>>> -----Original Message----- >>>> From: Michael Tuexen >>>> [mailto:tuexen@fh-muenster.de<mailto:tuexen@fh-muenster.de>] >>>> Sent: Wednesday, December 10, 2014 1:02 AM >>>> To: Romascanu, Dan (Dan) >>>> Cc: ops-dir@ietf.org<mailto:ops-dir@ietf.org>; >>>> tsvwg@ietf.org<mailto:tsvwg@ietf.org>; draft-ietf-tsvwg-sctp- >>>> prpolicies.all@tools.ietf.org<mailto:prpolicies.all@tools.ietf.org> >>>> Subject: Re: OPS-DIR review of >>>> draft-ietf-tsvwg-sctp-prpolicies-05.txt >>>> >>>> On 26 Nov 2014, at 13:33, Romascanu, Dan (Dan) >>>> <dromasca@avaya.com<mailto:dromasca@avaya.com>> >>>> wrote: >>>> >>>>> I have reviewed this document as part of the Operational >>>>> directorate's >>>> ongoing effort to review all IETF documents being processed by the >>>> IESG. >>>> These comments were written primarily for the benefit of the >>>> operational >>>> area directors. Document editors and WG chairs should treat these >>>> comments just like any other last call comments. >>>> Hi Dan, >>>> >>>> thank you very much for your review. Please see my questions and >>>> comments in-line. >>>> >>>> Best regards >>>> Michael >>>>> >>>>> >>>>> Summary: Ready with issues >>>>> >>>>> Document Ready, but Operational and Management considerations >>>> missing. >>>>> >>>>> As the Abstract says: >>>>> >>>>> This document defines two additional policies for the Partial >>>>> Reliability Extension of the Stream Control Transmission Protocol >>>>> (PR-SCTP) allowing to limit the number of retransmissions or to >>>>> prioritize user messages for more efficient send buffer usage. >>>>> Although this document defines an extension of an existing >>>>> protocol, >>>>> there >>>> are no explicit considerations about operations and management. The >>>> OPS >>>> and Transport ADs should decide whether this is an issue to be >>>> addressed >>>> before the document is approved. >>>>> >>>>> Specifically, following the checklists in RFC 5707, Appendix A: >>>>> >>>>> - Deployment is not discussed, although there is text that >>>>> says >>>>> that the >>>> Limited Retransmissions Policy can be used with data channels in the >>>> WebRTC protocol stack, and that the Priority Policy can be used in >>>> the >>>> IPFIX >>>> protocol stack >>>> The introduction says, that "The decision to abandon a user message >>>> is >>>> sender side only". So for deploying the additional policies you need >>>> to >>>> implement it at the sender side. >>> >>> This is not exactly what I meant by deployment. My understanding is >>> that >>> the policies defined in this document come to answer some specific >>> needs >>> of protocols like IPFIX and WebRTC. Am I correct? If I am, I would >>> expect the policies to be deployed where these protocols run. >> For IPFIX some of this is discussed in >> https://tools.ietf.org/html/rfc7011#section-10.2<https://urldefense.proofpoint.com/v2/url?u=https-3A__tools.ietf.org_html_rfc7011-23section-2D10.2&d=AAMFaQ&c=BFpWQw8bsuKpl1SgiZH64Q&r=I4dzGxR31OcNXCJfQzvlsiLQfucBXRucPvdrphpBsFA&m=6cUQU7WzGxVzLIHAs0xxQPmF6uxX5BY1uBQciZGTCcc&s=LqjSQkjNGebAvCFgTSNxXQ_e427vOGThVYUIAPMJDgw&e=> >> For RTCWeb is is discussed in >> https://tools.ietf.org/html/draft-ietf-rtcweb-data-channel-12#section-6.1<https://urldefense.proofpoint.com/v2/url?u=https-3A__tools.ietf.org_html_draft-2Dietf-2Drtcweb-2Ddata-2Dchannel-2D12-23section-2D6.1&d=AAMFaQ&c=BFpWQw8bsuKpl1SgiZH64Q&r=I4dzGxR31OcNXCJfQzvlsiLQfucBXRucPvdrphpBsFA&m=6cUQU7WzGxVzLIHAs0xxQPmF6uxX5BY1uBQciZGTCcc&s=nVL3E_6PggjIKyLIIspGt7ZzjVOoGU0fIot986j6yTs&e=> >> Please note that the policies defined here are of general use. So the >> description >> how to use it will be in the documents describing the use cases. >>> >>>>> - Installation and initial setup is not discussed >>>> We normally don't discuss the installation of the OS (assuming that >>>> the >>>> SCTP >>>> stack is part of the kernel, which is the case for Linux, FreeBSD >>>> and >>>> Solaris) or >>>> how to install applications (assuming that the transport stack is >>>> part >>>> of the >>>> application, which is the case for browsers like Firefox, Chrome and >>>> Opera). >>> >>> Thank you for the clarification. Maybe it would help writing just >>> this - >>> the installation of the new capabilities will be part of OS upgrades. >> ... if you use a stack provided by the kernel. If the stack is >> provided >> by >> an application, you need to install the application. >> So it comes down to: You need to install the software which contains >> the >> SCTP stack you are using. >> For me, this is obvious. So I'm hesitating to add this. It would be a >> sentence which >> you can copy to almost every SCTP (or TCP) specification. >>> >>>>> - Migration Path does not seem to apply >>>> Migrating from what? You can just use an implementation at the >>>> sender >>>> side >>>> and you can operate with every receiver implemening RFC 3758. >>> >>> This is OK - that's what I had in mind when I said 'does not apply' - >>> so >>> no need to do anything. >>> >>>>> - There is information about RFC 3758 being mandatory to >>>>> implement in >>>> order to implement these extensions >>>>> - The impact on the network operation is not discussed >>>>> explicitly >>>> In the security considerations section we say that the SCTP >>>> association >>>> using >>>> this extension is not more aggressive than one not using the >>>> extension. >>> >>> OK. >>> >>>>> - There are no explicit suggestions about verifying correct >>>>> operations, >>>> although one can understand that the socket options described in >>>> sections >>>> 4.3, 4.4, 4.5 are useful to determine stream specific status, >>>> association >>>> specific status, and to get and set the PR-SCTP support >>>> Are you suggesting to specify test cases? At least this is not >>>> common >>>> right >>>> now in transport area although it would make sense in my opinion... >>> >>> OK >>> >>>>> - Interoperability does not seem to apply excepting the >>>>> requirement to >>>> implement RFC 3758 >>>> And that is all what is needed... >>> >>> OK >>> >>>>> - There is no information about faults or threshold >>>>> conditions >>>>> to be >>>> reported >>>> Not sure what you are expecting here. >>> >>> Nothing - this is a point in the 5707 list which does not seem to >>> apply. >>> >>>>> - Configuration is not discussed, it may not apply, but it >>>>> would >>>>> be good >>>> to state this >>>> Well, configuration is described in detail in the socket API >>>> section. >>>> This is how >>>> you configure the transport stack. >>> >>> OK >>> >>>>> - There are no manageability considerations of any kind >>>> Isn't the socket API what you use to manage the transport stack? Or >>>> are >>>> you >>>> referring to MIB stuff? >>> >>> Whatever is used by operators to perform and verify installation, >>> check >>> behavior, and troubleshoot problems. >> Ahh, OK. I don't think an operator would use the socket API for that. >> If you want to test you transport stack you need to have tests and a >> test >> tool >> for running these tests. Up to now, the IETF (at least the transport >> area) >> hasn't specified tests. Personally, I would really love to do it and >> think >> that it is very important. But I think this is a decision not limited >> to >> this particular >> document, but to (transport) protocols in general. So I leave it up to >> the >> ADs... >> >> I'd say the question of test cases has been raised to the attention of >> TSVWG (cc on this thread), and I'd be happy to consider that if they >> think >> working on that would be a good plan, but I don't think this document >> needs to wait for them to figure that out. >> >> I'm good with Michael submitting an update addressing the comments as >> discussed in this thread. >> >> Thanks, >> >> Spencer >> >>
- [tsvwg] OPS-DIR review of draft-ietf-tsvwg-sctp-p… Romascanu, Dan (Dan)
- Re: [tsvwg] OPS-DIR review of draft-ietf-tsvwg-sc… Michael Tuexen
- Re: [tsvwg] OPS-DIR review of draft-ietf-tsvwg-sc… Romascanu, Dan (Dan)
- Re: [tsvwg] OPS-DIR review of draft-ietf-tsvwg-sc… Spencer Dawkins at IETF
- Re: [tsvwg] OPS-DIR review of draft-ietf-tsvwg-sc… Black, David
- Re: [tsvwg] OPS-DIR review of draft-ietf-tsvwg-sc… Michael Tuexen
- Re: [tsvwg] OPS-DIR review of draft-ietf-tsvwg-sc… Spencer Dawkins at IETF
- Re: [tsvwg] OPS-DIR review of draft-ietf-tsvwg-sc… Romascanu, Dan (Dan)
- Re: [tsvwg] OPS-DIR review of draft-ietf-tsvwg-sc… gorry
- Re: [tsvwg] OPS-DIR review of draft-ietf-tsvwg-sc… Michael Tuexen
- Re: [tsvwg] OPS-DIR review of draft-ietf-tsvwg-sc… Michael Tuexen