Re: [tsvwg] OPS-DIR review of draft-ietf-tsvwg-sctp-prpolicies-05.txt

"Romascanu, Dan (Dan)" <dromasca@avaya.com> Thu, 11 December 2014 10:57 UTC

Return-Path: <dromasca@avaya.com>
X-Original-To: tsvwg@ietfa.amsl.com
Delivered-To: tsvwg@ietfa.amsl.com
Received: from localhost (ietfa.amsl.com [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 9041D1A878C; Thu, 11 Dec 2014 02:57:44 -0800 (PST)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -4.92
X-Spam-Level:
X-Spam-Status: No, score=-4.92 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, HTML_MESSAGE=0.001, HTTPS_HTTP_MISMATCH=1.989, RCVD_IN_DNSWL_HI=-5, T_RP_MATCHES_RCVD=-0.01] autolearn=ham
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id zws1wo8dSrF0; Thu, 11 Dec 2014 02:57:41 -0800 (PST)
Received: from p-us1-iereast-outbound.us1.avaya.com (p-us1-iereast-outbound.us1.avaya.com [135.11.29.13]) (using TLSv1 with cipher DHE-RSA-CAMELLIA256-SHA (256/256 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id B7BB31A8725; Thu, 11 Dec 2014 02:57:40 -0800 (PST)
X-IronPort-Anti-Spam-Filtered: true
X-IronPort-Anti-Spam-Result: AqQHABN4iVSHCzIm/2dsb2JhbABZgkMhIlJYBIMBsCIBAQEBAQEGkjyFbwIcfhYBAQEBAQF8hAwBAQEBAgESEQpMBQcEAgEIDQQEAQEBChYHAwICAh8RFAkIAgQBDQUIGod2AwkIAQy2H4pHkGsNhVwBAQEBAQEBAQEBAQEBAQEBAQEBAQEXhXyHQoFQARURFhcEBgEGA4JfLoETBYN2igmDPoF8gUAvAYJPMIItgiaFHDqCF4M3IoFbghFuAQEBgQABAR4ifgEBAQ
X-IronPort-AV: E=Sophos; i="5.07,557,1413259200"; d="scan'208,217"; a="98655045"
Received: from unknown (HELO p-us1-erheast-smtpauth.us1.avaya.com) ([135.11.50.38]) by p-us1-iereast-outbound.us1.avaya.com with ESMTP; 11 Dec 2014 05:57:38 -0500
X-OutboundMail_SMTP: 1
Received: from unknown (HELO AZ-FFEXHC04.global.avaya.com) ([135.64.58.14]) by p-us1-erheast-out.us1.avaya.com with ESMTP/TLS/AES128-SHA; 11 Dec 2014 05:57:37 -0500
Received: from AZ-FFEXMB04.global.avaya.com ([fe80::6db7:b0af:8480:c126]) by AZ-FFEXHC04.global.avaya.com ([135.64.58.14]) with mapi id 14.03.0174.001; Thu, 11 Dec 2014 11:57:36 +0100
From: "Romascanu, Dan (Dan)" <dromasca@avaya.com>
To: Spencer Dawkins at IETF <spencerdawkins.ietf@gmail.com>, Michael Tuexen <tuexen@fh-muenster.de>
Thread-Topic: OPS-DIR review of draft-ietf-tsvwg-sctp-prpolicies-05.txt
Thread-Index: AQHQFAQfYnsa0fyMxkuTKo1O1asdxJyIvJOggACBJgCAABV7gIAA5u3g
Date: Thu, 11 Dec 2014 10:57:35 +0000
Message-ID: <9904FB1B0159DA42B0B887B7FA8119CA5C92B8EF@AZ-FFEXMB04.global.avaya.com>
References: <9904FB1B0159DA42B0B887B7FA8119CA5C912939@AZ-FFEXMB04.global.avaya.com> <AA1F20D3-B5EA-43F6-84D8-999E359FDFF5@fh-muenster.de> <9904FB1B0159DA42B0B887B7FA8119CA5C92A523@AZ-FFEXMB04.global.avaya.com> <34E7FE23-64C6-4F9D-B10D-C946168C2766@fh-muenster.de> <CAKKJt-cdzypHk+sEYsVU8Bu7Oi3bwygCoa9ZPHnSv3BqhyZAsA@mail.gmail.com>
In-Reply-To: <CAKKJt-cdzypHk+sEYsVU8Bu7Oi3bwygCoa9ZPHnSv3BqhyZAsA@mail.gmail.com>
Accept-Language: en-US
Content-Language: en-US
X-MS-Has-Attach:
X-MS-TNEF-Correlator:
x-originating-ip: [135.64.58.46]
Content-Type: multipart/alternative; boundary="_000_9904FB1B0159DA42B0B887B7FA8119CA5C92B8EFAZFFEXMB04globa_"
MIME-Version: 1.0
Archived-At: http://mailarchive.ietf.org/arch/msg/tsvwg/qFBGOoG4t4paPfbevkxstMKiLjY
Cc: "ops-dir@ietf.org" <ops-dir@ietf.org>, "draft-ietf-tsvwg-sctp-prpolicies.all@tools.ietf.org" <draft-ietf-tsvwg-sctp-prpolicies.all@tools.ietf.org>, "tsvwg@ietf.org" <tsvwg@ietf.org>
Subject: Re: [tsvwg] OPS-DIR review of draft-ietf-tsvwg-sctp-prpolicies-05.txt
X-BeenThere: tsvwg@ietf.org
X-Mailman-Version: 2.1.15
Precedence: list
List-Id: Transport Area Working Group <tsvwg.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/tsvwg>, <mailto:tsvwg-request@ietf.org?subject=unsubscribe>
List-Archive: <http://www.ietf.org/mail-archive/web/tsvwg/>
List-Post: <mailto:tsvwg@ietf.org>
List-Help: <mailto:tsvwg-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/tsvwg>, <mailto:tsvwg-request@ietf.org?subject=subscribe>
X-List-Received-Date: Thu, 11 Dec 2014 10:57:44 -0000

Ø  I'm good with Michael submitting an update addressing the comments as discussed in this thread.

Ø

Ø  Thanks,

Ø

Ø  Spencer

Me too. Can you please send me a note when this happens, so that I do not miss the update?

Thanks for considering my comments.

Regards,

Dan


From: Spencer Dawkins at IETF [mailto:spencerdawkins.ietf@gmail.com]
Sent: Thursday, December 11, 2014 12:10 AM
To: Michael Tuexen
Cc: Romascanu, Dan (Dan); ops-dir@ietf.org; tsvwg@ietf.org; draft-ietf-tsvwg-sctp-prpolicies.all@tools.ietf.org
Subject: Re: OPS-DIR review of draft-ietf-tsvwg-sctp-prpolicies-05.txt

From at least one AD :-)

On Wed, Dec 10, 2014 at 2:52 PM, Michael Tuexen <tuexen@fh-muenster.de<mailto:tuexen@fh-muenster.de>> wrote:
On 10 Dec 2014, at 13:23, Romascanu, Dan (Dan) <dromasca@avaya.com<mailto:dromasca@avaya.com>> wrote:

> Hi Michael,
>
> Thank you for addressing the issues raised in the OPS-DIR review.
>
> First, please see the disclaimer that I put in my review:
>
>>> Although this document defines an extension of an existing protocol, there
>> are no explicit considerations about operations and management. The OPS
>> and Transport ADs should decide whether this is an issue to be addressed
>> before the document is approved.
>
> The OPS-DIR reviews are written to help the OPS ADs with a reading of the I-Ds in review from the perspective of the operators using the and deploying the new protocols or extensions defined by the document. We - the reviewers - believe that the operational and manageability issues are important, but it's up to the ADs to decide whether they are important enough to require changes in the document, and what these changes should be.
Hi Dan,

understood. But I want to understand your points and possibly address them...
>
> More in-line.
>
> Regards,
>
> Dan
>
>
>> -----Original Message-----
>> From: Michael Tuexen [mailto:tuexen@fh-muenster.de<mailto:tuexen@fh-muenster.de>]
>> Sent: Wednesday, December 10, 2014 1:02 AM
>> To: Romascanu, Dan (Dan)
>> Cc: ops-dir@ietf.org<mailto:ops-dir@ietf.org>; tsvwg@ietf.org<mailto:tsvwg@ietf.org>; draft-ietf-tsvwg-sctp-
>> prpolicies.all@tools.ietf.org<mailto:prpolicies.all@tools.ietf.org>
>> Subject: Re: OPS-DIR review of draft-ietf-tsvwg-sctp-prpolicies-05.txt
>>
>> On 26 Nov 2014, at 13:33, Romascanu, Dan (Dan) <dromasca@avaya.com<mailto:dromasca@avaya.com>>
>> wrote:
>>
>>> I have reviewed this document as part of the Operational directorate's
>> ongoing effort to review all IETF documents being processed by the IESG.
>> These comments  were written primarily for the benefit of the operational
>> area directors.  Document editors and WG chairs should treat these
>> comments just like any other last call comments.
>> Hi Dan,
>>
>> thank you very much for your review. Please see my questions and
>> comments in-line.
>>
>> Best regards
>> Michael
>>>
>>>
>>> Summary: Ready with issues
>>>
>>> Document Ready, but Operational and Management considerations
>> missing.
>>>
>>> As the Abstract says:
>>>
>>>   This document defines two additional policies for the Partial
>>>   Reliability Extension of the Stream Control Transmission Protocol
>>>   (PR-SCTP) allowing to limit the number of retransmissions or to
>>>   prioritize user messages for more efficient send buffer usage.
>>> Although this document defines an extension of an existing protocol, there
>> are no explicit considerations about operations and management. The OPS
>> and Transport ADs should decide whether this is an issue to be addressed
>> before the document is approved.
>>>
>>> Specifically, following the checklists in RFC 5707, Appendix A:
>>>
>>> -       Deployment is not discussed, although there is text that says that the
>> Limited Retransmissions Policy can be used with data channels in the
>> WebRTC protocol stack, and that the Priority Policy can be used in the IPFIX
>> protocol stack
>> The introduction says, that "The decision to abandon a user message is
>> sender side only". So for deploying the additional policies you need to
>> implement it at the sender side.
>
> This is not exactly what I meant by deployment. My understanding is that the policies defined in this document come to answer some specific needs of protocols like IPFIX and WebRTC. Am I correct? If I am, I would expect the policies to be deployed where these protocols run.
For IPFIX some of this is discussed in
https://tools.ietf.org/html/rfc7011#section-10.2<https://urldefense.proofpoint.com/v2/url?u=https-3A__tools.ietf.org_html_rfc7011-23section-2D10.2&d=AAMFaQ&c=BFpWQw8bsuKpl1SgiZH64Q&r=I4dzGxR31OcNXCJfQzvlsiLQfucBXRucPvdrphpBsFA&m=6cUQU7WzGxVzLIHAs0xxQPmF6uxX5BY1uBQciZGTCcc&s=LqjSQkjNGebAvCFgTSNxXQ_e427vOGThVYUIAPMJDgw&e=>
For RTCWeb is is discussed in
https://tools.ietf.org/html/draft-ietf-rtcweb-data-channel-12#section-6.1<https://urldefense.proofpoint.com/v2/url?u=https-3A__tools.ietf.org_html_draft-2Dietf-2Drtcweb-2Ddata-2Dchannel-2D12-23section-2D6.1&d=AAMFaQ&c=BFpWQw8bsuKpl1SgiZH64Q&r=I4dzGxR31OcNXCJfQzvlsiLQfucBXRucPvdrphpBsFA&m=6cUQU7WzGxVzLIHAs0xxQPmF6uxX5BY1uBQciZGTCcc&s=nVL3E_6PggjIKyLIIspGt7ZzjVOoGU0fIot986j6yTs&e=>
Please note that the policies defined here are of general use. So the description
how to use it will be in the documents describing the use cases.
>
>>> -       Installation and initial setup is not discussed
>> We normally don't discuss the installation of the OS (assuming that the SCTP
>> stack is part of the kernel, which is the case for Linux, FreeBSD and Solaris) or
>> how to install applications (assuming that the transport stack is part of the
>> application, which is the case for browsers like Firefox, Chrome and Opera).
>
> Thank you for the clarification. Maybe it would help writing just this - the installation of the new capabilities will be part of OS upgrades.
... if you use a stack provided by the kernel. If the stack is provided by
an application, you need to install the application.
So it comes down to: You need to install the software which contains the SCTP stack you are using.
For me, this is obvious. So I'm hesitating to add this. It would be a sentence which
you can copy to almost every SCTP (or TCP) specification.
>
>>> -       Migration Path does not seem to apply
>> Migrating from what? You can just use an implementation at the sender side
>> and you can operate with every receiver implemening RFC 3758.
>
> This is OK - that's what I had in mind when I said 'does not apply' - so no need to do anything.
>
>>> -       There is information about RFC 3758 being mandatory to implement in
>> order to implement these extensions
>>> -       The impact on the network operation is not discussed explicitly
>> In the security considerations section we say that the SCTP association using
>> this extension is not more aggressive than one not using the extension.
>
> OK.
>
>>> -       There are no explicit suggestions about verifying correct operations,
>> although one can understand that the socket options described in sections
>> 4.3, 4.4, 4.5 are useful to determine stream specific status, association
>> specific status, and to get and set the PR-SCTP support
>> Are you suggesting to specify test cases? At least this is not common right
>> now in transport area although it would make sense in my opinion...
>
> OK
>
>>> -       Interoperability does not seem to apply excepting the requirement to
>> implement RFC 3758
>> And that is all what is needed...
>
> OK
>
>>> -       There is no information about faults or threshold conditions to be
>> reported
>> Not sure what you are expecting here.
>
> Nothing - this is a point in the 5707 list which does not seem to apply.
>
>>> -       Configuration is not discussed, it may not apply, but it would be good
>> to state this
>> Well, configuration is described in detail in the socket API section. This is how
>> you configure the transport stack.
>
> OK
>
>>> -       There are no manageability considerations of any kind
>> Isn't the socket API what you use to manage the transport stack? Or are you
>> referring to MIB stuff?
>
> Whatever is used by operators to perform and verify installation, check behavior, and troubleshoot problems.
Ahh, OK. I don't think an operator would use the socket API for that.
If you want to test you transport stack you need to have tests and a test tool
for running these tests. Up to now, the IETF (at least the transport area)
hasn't specified tests. Personally, I would really love to do it and think
that it is very important. But I think this is a decision not limited to this particular
document, but to (transport) protocols in general. So I leave it up to the ADs...

I'd say the question of test cases has been raised to the attention of TSVWG (cc on this thread), and I'd be happy to consider that if they think working on that would be a good plan, but I don't think this document needs to wait for them to figure that out.

I'm good with Michael submitting an update addressing the comments as discussed in this thread.

Thanks,

Spencer