Re: [tsvwg] Éric Vyncke's No Objection on draft-ietf-tsvwg-ecn-l4s-id-28: (with COMMENT)

Bob Briscoe <ietf@bobbriscoe.net> Sat, 27 August 2022 14:45 UTC

Return-Path: <ietf@bobbriscoe.net>
X-Original-To: tsvwg@ietfa.amsl.com
Delivered-To: tsvwg@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id EBEE4C14F74B; Sat, 27 Aug 2022 07:45:18 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -7.106
X-Spam-Level:
X-Spam-Status: No, score=-7.106 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, DKIM_SIGNED=0.1, DKIM_VALID=-0.1, DKIM_VALID_AU=-0.1, DKIM_VALID_EF=-0.1, HTML_MESSAGE=0.001, NICE_REPLY_A=-0.001, RCVD_IN_DNSWL_HI=-5, RCVD_IN_ZEN_BLOCKED_OPENDNS=0.001, SPF_HELO_NONE=0.001, SPF_PASS=-0.001, T_SCC_BODY_TEXT_LINE=-0.01, URIBL_BLOCKED=0.001, URIBL_DBL_BLOCKED_OPENDNS=0.001, URIBL_ZEN_BLOCKED_OPENDNS=0.001] autolearn=ham autolearn_force=no
Authentication-Results: ietfa.amsl.com (amavisd-new); dkim=pass (2048-bit key) header.d=bobbriscoe.net
Received: from mail.ietf.org ([50.223.129.194]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id ZMrUyl1_W_Kg; Sat, 27 Aug 2022 07:45:15 -0700 (PDT)
Received: from mail-ssdrsserver2.hostinginterface.eu (mail-ssdrsserver2.hostinginterface.eu [185.185.85.90]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id 0864DC14F740; Sat, 27 Aug 2022 07:45:13 -0700 (PDT)
DKIM-Signature: v=1; a=rsa-sha256; q=dns/txt; c=relaxed/relaxed; d=bobbriscoe.net; s=default; h=In-Reply-To:From:References:Cc:To:Subject: MIME-Version:Date:Message-ID:Content-Type:Sender:Reply-To: Content-Transfer-Encoding:Content-ID:Content-Description:Resent-Date: Resent-From:Resent-Sender:Resent-To:Resent-Cc:Resent-Message-ID:List-Id: List-Help:List-Unsubscribe:List-Subscribe:List-Post:List-Owner:List-Archive; bh=6vKI1pypB3xyXwjKZnWCkfiqspQMV/Ly9cM+GobB9JM=; b=uwTpUxd2GqXMszDdsEXT68rVFz tFlmghNHugzBcwTmD6zZgjNMwMOJqjysWGiH11Gdal44u3n10OM5lGGK/SBTETT+XB0eDAnwVN+AB xV2APX6x5iEolq0NgkVTfgD5zqdEGCsssJHtYYKEO6D6J60FmvySGzMhr01VsV4qaXI/jI5IOdwM9 mLMY0B16LEiHyszJqLxqg4ug2ymRmfJFWdpknEwu6ZT2u6X/aRjlk8jF1avinZMD83UJ6H2fT6mlH f207fs+IaIrbiqz2RK+XSVoS3hmlz9YmVQ919g8bWpGx3HCrg2LDR9MgRXvRBGhVp27w3y5ASQqzU xkfrAUSA==;
Received: from 67.153.238.178.in-addr.arpa ([178.238.153.67]:40196 helo=[192.168.1.4]) by ssdrsserver2.hostinginterface.eu with esmtpsa (TLS1.2) tls TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256 (Exim 4.95) (envelope-from <ietf@bobbriscoe.net>) id 1oRx3l-0001fx-Rw; Sat, 27 Aug 2022 15:45:11 +0100
Content-Type: multipart/alternative; boundary="------------St0yW3UMAYTiJUusnMnO7L4x"
Message-ID: <13f7cc09-7e76-eb36-c607-714f1e74309a@bobbriscoe.net>
Date: Sat, 27 Aug 2022 15:45:09 +0100
MIME-Version: 1.0
User-Agent: Mozilla/5.0 (X11; Linux x86_64; rv:91.0) Gecko/20100101 Thunderbird/91.11.0
Content-Language: en-GB
To: Éric Vyncke <evyncke@cisco.com>, The IESG <iesg@ietf.org>
Cc: tsvwg@ietf.org, tsvwg-chairs@ietf.org, draft-ietf-tsvwg-ecn-l4s-id@ietf.org
References: <166143297824.39739.13115862733987449317@ietfa.amsl.com>
From: Bob Briscoe <ietf@bobbriscoe.net>
In-Reply-To: <166143297824.39739.13115862733987449317@ietfa.amsl.com>
X-AntiAbuse: This header was added to track abuse, please include it with any abuse report
X-AntiAbuse: Primary Hostname - ssdrsserver2.hostinginterface.eu
X-AntiAbuse: Original Domain - ietf.org
X-AntiAbuse: Originator/Caller UID/GID - [47 12] / [47 12]
X-AntiAbuse: Sender Address Domain - bobbriscoe.net
X-Get-Message-Sender-Via: ssdrsserver2.hostinginterface.eu: authenticated_id: in@bobbriscoe.net
X-Authenticated-Sender: ssdrsserver2.hostinginterface.eu: in@bobbriscoe.net
X-Source:
X-Source-Args:
X-Source-Dir:
Archived-At: <https://mailarchive.ietf.org/arch/msg/tsvwg/fRngAe4baykDhgwNSUGN1yc7mfg>
Subject: Re: [tsvwg] Éric Vyncke's No Objection on draft-ietf-tsvwg-ecn-l4s-id-28: (with COMMENT)
X-BeenThere: tsvwg@ietf.org
X-Mailman-Version: 2.1.39
Precedence: list
List-Id: Transport Area Working Group <tsvwg.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/tsvwg>, <mailto:tsvwg-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/tsvwg/>
List-Post: <mailto:tsvwg@ietf.org>
List-Help: <mailto:tsvwg-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/tsvwg>, <mailto:tsvwg-request@ietf.org?subject=subscribe>
X-List-Received-Date: Sat, 27 Aug 2022 14:45:19 -0000

Eric,

On 25/08/2022 14:09, Éric Vyncke via Datatracker wrote:
> Éric Vyncke has entered the following ballot position for
> draft-ietf-tsvwg-ecn-l4s-id-28: No Objection
>
> When responding, please keep the subject line intact and reply to all
> email addresses included in the To and CC lines. (Feel free to cut this
> introductory paragraph, however.)
>
>
> Please refer tohttps://www.ietf.org/about/groups/iesg/statements/handling-ballot-positions/  
> for more information about how to handle DISCUSS and COMMENT positions.
>
>
> The document, along with other ballot positions, can be found here:
> https://datatracker.ietf.org/doc/draft-ietf-tsvwg-ecn-l4s-id/
>
>
>
> ----------------------------------------------------------------------
> COMMENT:
> ----------------------------------------------------------------------
>
>
> # Éric Vyncke, INT AD, comments for draft-ietf-shmoo-hackathon-07
> CC @evyncke
>
> Thank you for the work put into this document. Like well-written by Paul
> Wouters in another review, I am not a TSV person...
>
> I also appreciate the experimental status with a description of the experiment
> itself.
>
> Please find below some non-blocking COMMENT points (but replies would be
> appreciated even if only for my own education).
>
> Special thanks to Wesley Eddy for the shepherd's detailed write-up including
> the WG consensus **and** the justification of the intended status.
>
> I hope that this review helps to improve the document,
>
> Regards,
>
> -éric
>
> ## COMMENTS
>
> ### Update RFC 3168
>
> No need to comment, but it was very smart for the authors of RFC 8511 to allow
> such experiments ;-)
>
> There is some duplicate text in sections 1.3 and 2 on this though...

[BB] I'm going to leave both, 'cos the half-sentence in §2 is a much 
briefer summary.
If I remove it, I have a feeling I'll be asked to explain how an EXP can 
define an alternative to a PS.

>
> ### Section 1
>
> A lot of the content of this section appears to be identical or similar to the
> architecture draft. Consider removing some text ?

[BB] This has been discussed in the WG with some pro and some con, and 
this was the result.
The idea is that each doc contains sufficient background to be 
stand-alone, while anyone who has read one can skip/scan the 
introductory material in the other.

> ### BCP 14
>
> Please use the right template for BCP14 in section 1.2.

[BB] I'm going to do this systematically to all three drafts when I go 
through the machine-generated genart review from Lars (which also points 
this out).

> ### Section 5.4.1.1 unresponsive
>
> Is `unresponsive traffic` a well-defined term ?

[BB] Yes, very much so - certainly in the transport area. It has 
replaced the older imprecise term "UDP traffic", given a huge number of 
apps and transports now use congestion control over UDP.
And, indeed, the TCP Reno standard [RFC5681] allows TCP to become 
unresponsive below it's minimum window of 2 segments per RTT.

>
> ### Section 5.4.1.1 ARP, DNS
>
> In the example for low-level traffic, ARP, DNS, I am unsure whether ARP is
> really routed through an IP network ;-) or are Ethernet switches also covered
> by this I-D? You may also qualify 'DNS' into 'DNS queries'.

[BB] The bottleneck buffer, and therefore best location for an AQM, can 
be below the IP layer.
Certainly Ethernet switches are one good example. Indeed, the AQM for 
DCTCP is nearly always implemented on "L3 switches".
Another example: the RAN in mobile.

Why only DNS queries? Why not responses too?

>
> ### Section 6.2
>
> ```
>     ... If a mix of L4S and Classic packets is sent into the same security
>     association (SA) of a virtual private network (VPN), and if the VPN
>     egress is employing the optional anti-replay feature, ...
> ```
>
> Suggest to used IPsec in tunnel mode as they are many kinds of VPNs.

[BB] This introductory sentence was deliberately generic, 'cos the next 
sentence says

    This known problem is common to both IPsec [RFC4301  <https://datatracker.ietf.org/doc/html/rfc4301>] and
    DTLS [RFC6347  <https://datatracker.ietf.org/doc/html/rfc6347>] VPNs, given they use similar anti-replay window
    mechanisms.


[BB] In summary, I've found there are no changes.
I hope I've explained and justified all that alright.

Thank you anyway.

Regards



Bob


>
> ## Notes
>
> This review is in the ["IETF Comments" Markdown format][ICMF], You can use the
> [`ietf-comments` tool][ICT] to automatically convert this review into
> individual GitHub issues.
>
> [ICMF]:https://github.com/mnot/ietf-comments/blob/main/format.md
> [ICT]:https://github.com/mnot/ietf-comments
>
>
>

-- 
________________________________________________________________
Bob Briscoehttp://bobbriscoe.net/