Re: [tsvwg] I-D Action: draft-ietf-tsvwg-ecn-experimentation-04.txt
Spencer Dawkins at IETF <spencerdawkins.ietf@gmail.com> Wed, 30 August 2017 16:34 UTC
Return-Path: <spencerdawkins.ietf@gmail.com>
X-Original-To: tsvwg@ietfa.amsl.com
Delivered-To: tsvwg@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 0239D13202D for <tsvwg@ietfa.amsl.com>; Wed, 30 Aug 2017 09:34:39 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -2.699
X-Spam-Level:
X-Spam-Status: No, score=-2.699 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, DKIM_SIGNED=0.1, DKIM_VALID=-0.1, DKIM_VALID_AU=-0.1, FREEMAIL_FROM=0.001, HTML_MESSAGE=0.001, RCVD_IN_DNSWL_LOW=-0.7, SPF_PASS=-0.001] autolearn=ham autolearn_force=no
Authentication-Results: ietfa.amsl.com (amavisd-new); dkim=pass (2048-bit key) header.d=gmail.com
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id 5xHQJ9tw0fo2 for <tsvwg@ietfa.amsl.com>; Wed, 30 Aug 2017 09:34:35 -0700 (PDT)
Received: from mail-yw0-x229.google.com (mail-yw0-x229.google.com [IPv6:2607:f8b0:4002:c05::229]) (using TLSv1.2 with cipher ECDHE-RSA-AES128-GCM-SHA256 (128/128 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id 5724D1201F8 for <tsvwg@ietf.org>; Wed, 30 Aug 2017 09:34:35 -0700 (PDT)
Received: by mail-yw0-x229.google.com with SMTP id s187so33804720ywf.2 for <tsvwg@ietf.org>; Wed, 30 Aug 2017 09:34:35 -0700 (PDT)
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=gmail.com; s=20161025; h=mime-version:in-reply-to:references:from:date:message-id:subject:to :cc; bh=VEiU8vTCv8BG/r2hXalgFwwPO6eJueszVqENPFU+V8k=; b=e3kJlscwlCzP5sB8t7adR0txWEkjxTP95ibJK+zRPFlHMV1IRtKGPr1c/LX2vHS05w Ldcs5ElH6MfPf/SUcTGuzuJifsyXboPbehYsIpyiy6CPN6Z3pO0eEuCY+5st75DbCkEm YmLBdG0QOEEMdCBQ+arACEczcMSQv/P6xzRjGyum/iBvcQFpHFBS9An6HnLMju0BkkVE qR8n0xlXoiu40QdLXznop4Tyw5xVGzgmWjstsDxxGNq4PWzpNYplLicDhUtzaD61a4B2 97rJuSEjKemyQJ2x0NOdPBDlpDIP/6uONl51dMqjzYDD2AciKoswL0S4zpBOQsKE1ujp OYDw==
X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20161025; h=x-gm-message-state:mime-version:in-reply-to:references:from:date :message-id:subject:to:cc; bh=VEiU8vTCv8BG/r2hXalgFwwPO6eJueszVqENPFU+V8k=; b=uDOqmcTcxDQ8cL9Cy12Ra+w3alBZU1GSuBVB3hcH2v56BHozycrDkcDZYtn4gXKX3g OPayKfA/V1MKXS/4qILZ4WIWJg6EIh4lcm0HEzzONGizjFWRKYaOiTVXW0jTaHpJ7zx3 RGnYSE2Fq3662ZU+AmZUNiKBKQp4JAsRiA1kdsjU9NYJvA2SJKTZDem1EKVmutmer2Fj SgCHGpCUFIcEsY/CcoEh1cfWiupsFylD2+3N5CxVbc2IPGOiD4K4V3U+cqEzuuEZw4wx eqTftf0S1OiyqmZOXwDTEJP6D9MiyiDvinXcx07sboPlWp0wrQGZlDNIGBygJWgHXkUD rPNg==
X-Gm-Message-State: AHYfb5gbUi9Ow6BHT5Uk3PEkEiLixyruz0BBS3BvHNaJy3UZ5644zWtr pdDwePR5XJxV6CLogjH+SCYPfteqVg==
X-Received: by 10.129.158.140 with SMTP id v134mr1825117ywg.339.1504110874302; Wed, 30 Aug 2017 09:34:34 -0700 (PDT)
MIME-Version: 1.0
Received: by 10.37.2.148 with HTTP; Wed, 30 Aug 2017 09:34:33 -0700 (PDT)
In-Reply-To: <CE03DB3D7B45C245BCA0D243277949362FC2AB02@MX307CL04.corp.emc.com>
References: <150188933148.18701.4807220216565950086@ietfa.amsl.com> <CE03DB3D7B45C245BCA0D243277949362FBB63C1@MX307CL04.corp.emc.com> <CAKKJt-dERRFq-3-URPM_CjBrns1XH94-w1OHtx-sq8S2EHAkuw@mail.gmail.com> <CE03DB3D7B45C245BCA0D243277949362FC2A962@MX307CL04.corp.emc.com> <CAKKJt-fGMOZhyb6NLQkqMs26T+y3jB08j-he=+AYNb27G=aQzQ@mail.gmail.com> <CE03DB3D7B45C245BCA0D243277949362FC2AB02@MX307CL04.corp.emc.com>
From: Spencer Dawkins at IETF <spencerdawkins.ietf@gmail.com>
Date: Wed, 30 Aug 2017 11:34:33 -0500
Message-ID: <CAKKJt-f-W9Qi320zomMbummGvcDRpp_C9Aj=aMsfMJ7f-vQT2A@mail.gmail.com>
To: "Black, David" <David.Black@dell.com>
Cc: "tsvwg@ietf.org" <tsvwg@ietf.org>
Content-Type: multipart/alternative; boundary="94eb2c0b78985d9d190557fb1a87"
Archived-At: <https://mailarchive.ietf.org/arch/msg/tsvwg/hQx0x3mn0dDo62Cl6F4f-ZCxWAI>
Subject: Re: [tsvwg] I-D Action: draft-ietf-tsvwg-ecn-experimentation-04.txt
X-BeenThere: tsvwg@ietf.org
X-Mailman-Version: 2.1.22
Precedence: list
List-Id: Transport Area Working Group <tsvwg.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/tsvwg>, <mailto:tsvwg-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/tsvwg/>
List-Post: <mailto:tsvwg@ietf.org>
List-Help: <mailto:tsvwg-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/tsvwg>, <mailto:tsvwg-request@ietf.org?subject=subscribe>
X-List-Received-Date: Wed, 30 Aug 2017 16:34:39 -0000
Hi, David, On Wed, Aug 30, 2017 at 11:09 AM, Black, David <David.Black@dell.com> wrote: > Ok, I’ll drop “Alexa” and upload the result. > Thanks! Spencer, who was visualizing someone thinking "Alexa Morris has a 'top 1M websites'? Who knew?" ;-) > Thanks, --David > > > > *From:* Spencer Dawkins at IETF [mailto:spencerdawkins.ietf@gmail.com] > *Sent:* Wednesday, August 30, 2017 11:57 AM > > *To:* Black, David <david.black@emc.com> > *Cc:* tsvwg@ietf.org > *Subject:* Re: [tsvwg] I-D Action: draft-ietf-tsvwg-ecn- > experimentation-04.txt > > > > Hi, David, > > > > Thanks, and welcome back :-) > > > > This mostly looks uber-reasonable, but I have one reply on Alexa below. > > > > On Wed, Aug 30, 2017 at 10:30 AM, Black, David <David.Black@dell.com> > wrote: > > Hi Spencer, > > > > Resurfacing from trying to take vacation in August – many thanks for this > detailed review. Comments inline. > > > > I have a -05 ready to go if these changes are ok with you. > > > > Thanks, --David > > > > *From:* Spencer Dawkins at IETF [mailto:spencerdawkins.ietf@gmail.com] > *Sent:* Monday, August 7, 2017 2:37 PM > *To:* Black, David <david.black@emc.com> > *Cc:* tsvwg@ietf.org > *Subject:* Re: [tsvwg] I-D Action: draft-ietf-tsvwg-ecn- > experimentation-04.txt > > > > Hi, David, > > > > On Fri, Aug 4, 2017 at 6:31 PM, Black, David <David.Black@dell.com> wrote: > > As discussed in Prague, this is a small update to request that IANA remove > the registration of the TCP header flag used by RFC 3540 (ECN Nonce). Any > reassignment of that flag will be handled by the TCPM WG. This update also > changes the name of one of the areas of ECN experimentation to be different > from the name of the experiment proposed in that area. > > Thanks, --David > > > > Hi, David, > > > > I really like this draft. Thanks to you and your ACK list for your efforts > - the result is very clear and complete. > > > > I have a few questions before I push the button on Last Call. They're > minor enough that I don't think we need to wait for Gorry to be present for > the discussion (of course, if people disagree, just let me know). > > > > I tried to offer text for most of them, but you might also answer them by > saying that TSVWG needs a much smarter responsible AD ;-) ... > > > > In this text, > > > > An Experimental RFC MUST be published for any protocol > > or mechanism that takes advantage of any of these enabling updates. > > > > I think I know what you're saying, but this formulation confuses me > because it's placing a commitment on what a future working group must do > (like, what if the draft describing the experimental protocol is incoherent > - can the working group Just Say No, or can the authors say "but you have > to request publication, because "An Experimental RFC MUST be published > ..."). > > *[David>] The working group can Just Say No, and that outcome would be a > “feature” – if the experimental protocol is problematic, then the > experiment shouldn’t be run at scale in the Internet, and the WG will have > done the right thing by saying so. * > > > > Is your point that any protocol or mechanism that takes advantage of these > enabling updates can't be Standards-Track? > > *[David>] No – a Standards-Track protocol RFC can simply update RFC 3168 > (and any other RFCs that it needs to) directly, and doesn’t need this > draft’s permission to do so, as the next sentence states …* > > > > In this text, > > > > There is no need to make changes for protocols and mechanisms that > > are documented in Standards Track RFCs, as any Standards Track RFC > > can update RFC 3168 without needing a standards process exception. > > > > we've been talking using this terminology for at least a year that I can > remember, but I'm not totally sure that an average IESG would even approve > an Experimental draft that updated a standards-track RFC. How badly do you > need to say this at all, since you're just confirming a well-understood > fact that I think we all agree on? > > *[David>] This has been brought up too many times in WG discussion of this > draft to leave out, IMHO.* > > > > In this text, > > > > A study of the ECN behaviour of the Alexa top 1M web > > servers using 2014 data [Trammell15] > > > > I'm wondering whether it's useful to say "Alexa top 1M web servers" in an > RFC that will probably last longer than Alexa lasts ... > > *[David>] I view this as a “show your work” item … this is the data that > was used at the time.* > > > > I'm sorry that my comment wasn't clear. What I was asking was if there was > any more description of Alexa (or for extra credit, a URL) so that a reader > in ten years can do more than google "Alexa top 1M web server" to figure > out what this is. > > > > So I'm wondering if you need to qualify "top 1M web servers" as "Alexa top > 1M web servers", because I'm thinking adding the adjective doesn't add as > much as it takes away. > > > > It may be that the answer is "not really", and that would be A Fine > Answer, but I wanted to make sure you understood what I was thinking, > because it apparently wasn't what I was typing :-) > > > > Either way, I'm ready for you to send the updated version and have me > initiate Last Call, and thanks for horsing this through. > > > > Spencer > > > > In this text, > > > > Significantly more aggressive sender responses to ECN > > are required to make effective use of such shallow queues; Datacenter > > ^^^^^^^^ > > TCP (DCTCP) [I-D.ietf-tcpm-dctcp] provides an example. > > > > I'm tangled up in passive tense ("who is required to do what?"). Is it > correct to say > > > > Significantly more aggressive sender responses to ECN > > are needed in order to make effective use of such shallow queues; > > Datacenter TCP (DCTCP) [I-D.ietf-tcpm-dctcp] provides an example. > > > > ? > > *[David>] Yes, change made.* > > > > I see that the draft uses both the terms "shallow queues" and "nearly > empty queues". Do these terms mean the same thing? If so, perhaps it's > worth either picking one term, or saying that they mean the same thing. > Right now, I'm trying to imagine what the difference might be, since both > phrases are used. > > *[David>] Good point, changed to consistently use “very shallow” > everywhere.* > > > > You folks are the experts on this stuff, but I'm looking at this quoted > text from RFC 3168 > > > > RFC 3168 prohibits use of ECN for TCP control packets and > > retransmitted packets in a number of places: > > > > o "To ensure the reliable delivery of the congestion indication of > > the CE codepoint, an ECT codepoint MUST NOT be set in a packet > > unless the loss of that packet in the network would be detected by > > the end nodes and interpreted as an indication of congestion." > > (Section 5.2) > > > > o "A host MUST NOT set ECT on SYN or SYN-ACK packets." > > (Section 6.1.1) > > > > o "pure acknowledgement packets (e.g., packets that do not contain > > any accompanying data) MUST be sent with the not-ECT codepoint." > > (Section 6.1.4) > > > > o "This document specifies ECN-capable TCP implementations MUST NOT > > set either ECT codepoint (ECT(0) or ECT(1)) in the IP header for > > retransmitted data packets, and that the TCP data receiver SHOULD > > ignore the ECN field on arriving data packets that are outside of > > the receiver's current window." (Section 6.1.5) > > > > o "the TCP data sender MUST NOT set either an ECT codepoint or the > > CWR bit on window probe packets." (Section 6.1.6) > > > > and noticing that only the text in 6.1.5 explicitly mentions the TCP data > receiver ignoring the "MUST NOT set" ECN field. I took a quick spin through > RFC 3168 searching for "ignore", but didn't see something that explicitly > covered the other cases. > > > > Because these are "MUST NOT set" constraints, I could imagine implementers > who never anticipated that an ECN(0) or ECN(1) would be set, and don't look > at the field (probably good), but I can also imagine implementers > validating that ECN(0) and ECN(1) are not set (probably bad). Do people > have any concerns about encountering "ECT values MUST be cleared" > implementations during this experiment? > > > > I suppose if some implementation that does this is deployed and you folks > run the experiment, then we'll know :D ... > > *[David>] I would leave this to the drafts/RFCS that describe the > experiments, as I expect implementers of the experiments to look there, and > not at this process RFC (to be).* > > > > But I wonder if it's worth making that clear for receivers, since you're > updating RFC 3168 anyway? > > > > In this text, > > > > Random ECT values MUST NOT be used, as that may expose RTP to > > differences in network treatment of traffic marked with ECT(1) and > > ECT(0) and differences in associated endpoint congestion > > responses, > > > > is "Random ECT values" the right word? I could imagine this prohibiting > using ECT(0) and ECT(1) interchangeably, but if that's what's intended, I > could also imagine this prohibiting simply not explicitly setting the ECT > values at all, so missing your point. > > *[David>] Yes, “Random” is the right word, as the text quoted from RFC > 6679 uses the word “random” so that is the correct word to use here, and > further explanation can be found in RFC 6679.* > > > > I'm looking at this text > > > > As a process memo that makes no changes to existing protocols, there > > are no protocol security considerations. > > > > and wondering if it's current with the rest of the document. Is "no > changes to existing protocols" still the right way to characterize this > draft? If you wanted to say > > > > As a process memo that only adds limitations to existing protocols, > there > > are no protocol security considerations. > > > > I'd be happy to believe you ... > > *[David>] I see the concern, and edited the text roughly as suggested, > plus moved a supporting sentence about security considerations for the > experiments up to join this sentence, so the new paragraph now reads:* > > > > As a process memo that only removes limitations on proposed experiments, > there are no protocol security considerations. Security considerations > for the > proposed experiments are discussed in the Internet-Drafts that propose > them. > > > > Thanks, > > > > Spencer > > > > > > -----Original Message----- > > From: tsvwg [mailto:tsvwg-bounces@ietf.org] On Behalf Of internet- > > drafts@ietf.org > > Sent: Friday, August 4, 2017 7:29 PM > > To: i-d-announce@ietf.org > > Cc: tsvwg@ietf.org > > Subject: [tsvwg] I-D Action: draft-ietf-tsvwg-ecn-experimentation-04.txt > > > > > > A New Internet-Draft is available from the on-line Internet-Drafts > directories. > > This draft is a work item of the Transport Area Working Group WG of the > > IETF. > > > > Title : Explicit Congestion Notification (ECN) > Experimentation > > Author : David Black > > Filename : draft-ietf-tsvwg-ecn-experimentation-04.txt > > Pages : 17 > > Date : 2017-08-04 > > > > Abstract: > > This memo updates RFC 3168, which specifies Explicit Congestion > > Notification (ECN) as a replacement for packet drops as indicators of > > network congestion. It relaxes restrictions in RFC 3168 that would > > otherwise hinder experimentation towards benefits beyond just removal > > of loss. This memo summarizes the anticipated areas of > > experimentation and updates RFC 3168 to enable experimentation in > > these areas. An Experimental RFC is required to take advantage of > > any of these enabling updates. In addition, this memo makes related > > updates to the ECN specifications for RTP in RFC 6679 and for DCCP in > > RFC 4341, RFC 4342 and RFC 5622. This memo also records the > > conclusion of the ECN Nonce experiment in RFC 3540, and provides the > > rationale for reclassification of RFC 3540 as Historic; this > > reclassification enables new experimental use of the ECT(1) > > codepoint. > > > > > > The IETF datatracker status page for this draft is: > > https://datatracker.ietf.org/doc/draft-ietf-tsvwg-ecn-experimentation/ > > > > There are also htmlized versions available at: > > https://tools.ietf.org/html/draft-ietf-tsvwg-ecn-experimentation-04 > > https://datatracker.ietf.org/doc/html/draft-ietf-tsvwg-ecn- > > experimentation-04 > > > > A diff from the previous version is available at: > > https://www.ietf.org/rfcdiff?url2=draft-ietf-tsvwg-ecn- > experimentation-04 > > > > > > Please note that it may take a couple of minutes from the time of > submission > > until the htmlized version and diff are available at tools.ietf.org. > > > > Internet-Drafts are also available by anonymous FTP at: > > ftp://ftp.ietf.org/internet-drafts/ > > > > >
- [tsvwg] I-D Action: draft-ietf-tsvwg-ecn-experime… internet-drafts
- Re: [tsvwg] I-D Action: draft-ietf-tsvwg-ecn-expe… Black, David
- Re: [tsvwg] I-D Action: draft-ietf-tsvwg-ecn-expe… Spencer Dawkins at IETF
- Re: [tsvwg] I-D Action: draft-ietf-tsvwg-ecn-expe… Black, David
- Re: [tsvwg] I-D Action: draft-ietf-tsvwg-ecn-expe… Spencer Dawkins at IETF
- Re: [tsvwg] I-D Action: draft-ietf-tsvwg-ecn-expe… Black, David
- Re: [tsvwg] I-D Action: draft-ietf-tsvwg-ecn-expe… Spencer Dawkins at IETF