Re: [tsvwg] Process for re-assignment of NS TCP header flag to AccECN

Bob Briscoe <ietf@bobbriscoe.net> Tue, 04 July 2017 14:19 UTC

Return-Path: <ietf@bobbriscoe.net>
X-Original-To: tsvwg@ietfa.amsl.com
Delivered-To: tsvwg@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id E354E13146D; Tue, 4 Jul 2017 07:19:55 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -2
X-Spam-Level:
X-Spam-Status: No, score=-2 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, DKIM_SIGNED=0.1, DKIM_VALID=-0.1, DKIM_VALID_AU=-0.1, HTML_MESSAGE=0.001, RCVD_IN_DNSWL_NONE=-0.0001, SPF_PASS=-0.001] autolearn=ham autolearn_force=no
Authentication-Results: ietfa.amsl.com (amavisd-new); dkim=pass (2048-bit key) header.d=bobbriscoe.net
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id At8JtZ_EJoSg; Tue, 4 Jul 2017 07:19:52 -0700 (PDT)
Received: from server.dnsblock1.com (server.dnsblock1.com [85.13.236.178]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id 1EE1C1320BA; Tue, 4 Jul 2017 07:19:52 -0700 (PDT)
DKIM-Signature: v=1; a=rsa-sha256; q=dns/txt; c=relaxed/relaxed; d=bobbriscoe.net; s=default; h=Content-Type:In-Reply-To:MIME-Version:Date: Message-ID:From:References:Cc:To:Subject:Sender:Reply-To: Content-Transfer-Encoding:Content-ID:Content-Description:Resent-Date: Resent-From:Resent-Sender:Resent-To:Resent-Cc:Resent-Message-ID:List-Id: List-Help:List-Unsubscribe:List-Subscribe:List-Post:List-Owner:List-Archive; bh=TPVs9vjnMBcYrCaf1qK5KoZln1oXkobeHrVo71YvOWo=; b=I+/GrmBMtAxIpKEFaBh3Jopsg W7k0qaEszZmFjL5Wh5MbvB3uxPVKG2EEIeeNaiFEjH+WeqrQZhS51oEfJcN7XXam3e0yZMoGBnb8W ifZtJA7kwVLtZTQw/+Ng6fKkp8fARJpZbMQogKhFX6FIasOuiWIVimRMr78QYsrvkQT63uefF2F+2 8C9B81nhfVkGC4zM9eGn+wAmYvCL4kAOG4APay/xMbRM0xPHJVsbB5Gg2BM97coP0O3jloIqGlN7S eEprDPyJXqBi0TigRMQxvU9IbkRuWUGmPjt1C6uHcNw2HN6wqWdmC8NnNhckApkGMGO2xU1bBlwf5 X238CytQw==;
Received: from [31.185.128.124] (port=48288 helo=[192.168.0.13]) by server.dnsblock1.com with esmtpsa (TLSv1.2:ECDHE-RSA-AES128-GCM-SHA256:128) (Exim 4.89) (envelope-from <ietf@bobbriscoe.net>) id 1dSOgA-0002s3-5p; Tue, 04 Jul 2017 15:19:50 +0100
To: "Gorry (erg)" <gorry@erg.abdn.ac.uk>
Cc: tsvwg-chairs <tsvwg-chairs@ietf.org>, tcpm <tcpm@ietf.org>, tsvwg <tsvwg@ietf.org>, tsv-ads <tsv-ads@ietf.org>, tcpm-chairs <tcpm-chairs@ietf.org>
References: <CACL_3VG9NNPCSkReLA7jGLoRWpo09+YvVKMCzddEcdWKNtdgDw@mail.gmail.com> <6c0e7bc8-7e25-99b0-cf7d-7542871060ad@bobbriscoe.net> <CACL_3VGQFhOpjwAMO7Ajh-5=pA7wz6witU6ZmiKNsnm0MYQCSA@mail.gmail.com> <49200576-B166-4FE9-8B5D-36ECA5509364@erg.abdn.ac.uk>
From: Bob Briscoe <ietf@bobbriscoe.net>
Message-ID: <99989ba2-4dae-eb6e-90fe-cb4b19f20594@bobbriscoe.net>
Date: Tue, 04 Jul 2017 15:19:49 +0100
User-Agent: Mozilla/5.0 (X11; Linux x86_64; rv:52.0) Gecko/20100101 Thunderbird/52.1.1
MIME-Version: 1.0
In-Reply-To: <49200576-B166-4FE9-8B5D-36ECA5509364@erg.abdn.ac.uk>
Content-Type: multipart/alternative; boundary="------------E355D3219074123B7F81735D"
Content-Language: en-GB
X-AntiAbuse: This header was added to track abuse, please include it with any abuse report
X-AntiAbuse: Primary Hostname - server.dnsblock1.com
X-AntiAbuse: Original Domain - ietf.org
X-AntiAbuse: Originator/Caller UID/GID - [47 12] / [47 12]
X-AntiAbuse: Sender Address Domain - bobbriscoe.net
X-Get-Message-Sender-Via: server.dnsblock1.com: authenticated_id: in@bobbriscoe.net
X-Authenticated-Sender: server.dnsblock1.com: in@bobbriscoe.net
Archived-At: <https://mailarchive.ietf.org/arch/msg/tsvwg/rOdmk518-oJVTtA9iyvp2NMUkkk>
Subject: Re: [tsvwg] Process for re-assignment of NS TCP header flag to AccECN
X-BeenThere: tsvwg@ietf.org
X-Mailman-Version: 2.1.22
Precedence: list
List-Id: Transport Area Working Group <tsvwg.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/tsvwg>, <mailto:tsvwg-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/tsvwg/>
List-Post: <mailto:tsvwg@ietf.org>
List-Help: <mailto:tsvwg-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/tsvwg>, <mailto:tsvwg-request@ietf.org?subject=subscribe>
X-List-Received-Date: Tue, 04 Jul 2017 14:19:56 -0000

Gorry,

A point I didn't make, but should have done: 2 of the experiments in 
ecn-experimentation depend on AccECN as a pre-requisite. So it's 
important not to risk delay to AccECN in an attempt not to delay 
ecn-experimentation.

Can you give any clue as to which solutions you do or don't favour? 
Mirja asked me to post this to the lists. I think she was hoping this 
would reveal all the pros and cons, so a decision could then be made 
quickly between the chairs/ADs/shepherds/catherds.


Bob

On 03/07/17 22:06, Gorry (erg) wrote:
> I think as document shepherd I have the input I need, but I need to 
> talk to my AD about how to handle the process  - and liaise with the 
> TCPM co-chairs regarding the TCPM WG draft. This isn't the first time 
> we have had to look at the implications of making another RFC 
> historic, and I think we can do the correct thing.
>
> Gorry
>
> On 3 Jul 2017, at 20:17, C. M. Heard <heard@pobox.com 
> <mailto:heard@pobox.com>> wrote:
>
>> Bob,
>>
>> I think that your option (f) is better than option (e) (what I 
>> suggested). As an aside, either one patches up an apparent process 
>> violation committed by RFC 3540, an experimental RFC that assigned 
>> bit 7 in contradiction to the policy in RFC 2780.
>>
>> Mike Heard
>>
>> On Mon, Jul 3, 2017 at 11:05 AM, Bob Briscoe <ietf@bobbriscoe.net 
>> <mailto:ietf@bobbriscoe.net>> wrote:
>>
>>     Mike,
>>
>>     Let's call this option:
>>     (e) ecn-experimentation alters the registry policy of bit 7 of
>>     the TCP header to "IETF Review".
>>
>>     Having a different policy for certain bits within a registry
>>     might send IANA into a spin, but I am sure they could write
>>     suitable text into the registry policy if they had to.
>>
>>     I quite like this one. Altho unorthodox, it's neat.
>>
>>
>>     Thank you.
>>
>>
>>     Bob
>>
>>     PS. Strictly RFC3168 used the CWR and ECE flags (bits 8 & 9) as a
>>     2-bit field during the 3-way hand-shake. While the ECN Nonce and
>>     AccECN use the three ECN flags (bits 7-9) as a 3-bit field during
>>     the 3WHS. AccECN uses the combinations that RFC3168 and the Nonce
>>     do not use. So to cover all bases:
>>
>>     Option (f): ecn-experimentation alters the registry policy for
>>     bits 7-9 to "IETF Review".
>>
>>
>>     On 03/07/17 18:14, C. M. Heard wrote:
>>>
>>>     Bob,
>>>
>>>     Couldn't the text in the IANA considerations of
>>>     ecn-experimentation (which needs to be updated in any case) both
>>>     change the NS flag to Reserved for ECN Experimentation and
>>>     change the allocation policy for that flag from Standards Action
>>>     to IETF Review, thereby updating RFC 2780? That would avoid the
>>>     churn needed to add motivating text for a 4th experiment to
>>>     ecn-experimentation and would allow AccECN to assign the NS bit
>>>     itself without a process exception.
>>>
>>>     Mike Heard
>>>
>>>     On Mon, 3 Jul 2017 10:28:25 +0100, Bob Briscoe wrote:
>>>
>>>         Michael*2, Yoshifumi, Gorry, David, Wes, Mirja, Spencer,
>>>         tcpm list, tsvwg list,
>>>
>>>         There has been some offlist discussion (among different
>>>         sub-groups) to narrow down the options here. It is time to
>>>         see opinions from the two affected WGs (tcpm and tsvwg) on
>>>         preferred process, esp. from the WG chairs and ADs.
>>>
>>>         *==Background to the Process Problem==**
>>>         *
>>>         In tsvwg the process is in motion to make the ECN nonce [RFC
>>>         3540] historic. So, in the most recent rev of
>>>         draft-ietf-tcpm-accurate-ecn-03 , we could finally include
>>>         IANA assignment of the NS flag
>>>         (see
>>>         https://tools.ietf.org/html/draft-ietf-tcpm-accurate-ecn-03#section-6
>>>         <https://tools.ietf.org/html/draft-ietf-tcpm-accurate-ecn-03#section-6> )
>>>
>>>         However, AccECN is EXPerimental, whereas the registry policy
>>>         for assigning TCP flags is "Standards Action"
>>>         https://www.iana.org/assignments/tcp-header-flags/tcp-header-flags.xhtml
>>>         <https://www.iana.org/assignments/tcp-header-flags/tcp-header-flags.xhtml>
>>>         which means "Values are assigned only for Standards Track
>>>         RFCs approved by the IESG" [RFC2434].
>>>
>>>         References:
>>>         Process for designating RFCs as historic:
>>>         https://www.ietf.org/iesg/statement/designating-rfcs-as-historic.html
>>>         <https://www.ietf.org/iesg/statement/designating-rfcs-as-historic.html>
>>>         Current draft text to make RFC 3540 historic:
>>>         https://tools.ietf.org/html/draft-ietf-tsvwg-ecn-experimentation-03#section-3
>>>         <https://tools.ietf.org/html/draft-ietf-tsvwg-ecn-experimentation-03#section-3>
>>>         My initial draft for the AD's status change note:
>>>         https://github.com/bbriscoe/ecn-experimentation/blob/master/status-change-ecn-nonce-rfc3540-to-historic-00.txt
>>>         <https://github.com/bbriscoe/ecn-experimentation/blob/master/status-change-ecn-nonce-rfc3540-to-historic-00.txt>
>>>
>>>         ecn-experimentation has just completed WGLC. It still has to
>>>         go through IETF LC (after Prague). it is deliberately PS in
>>>         order to be able to relax pre-existing constraints on ECN
>>>         experiments in standards track RFCs. However, if poss, we
>>>         want to avoid adding motivating text for a 4th experiment,
>>>         which could require another cycle of WGLC and delay until Nov.
>>>
>>>         RFC 3692 ("Assigning Experimental and Testing Numbers
>>>         Considered Useful") could also be relevant, although it
>>>         doesn't seem to help here, because it is primarily aimed at
>>>         larger codepoint spaces, not single bits.
>>>
>>>
>>>         *==Process Options==**
>>>         *
>>>         There need to be two parts to the process: 1) unassignment
>>>         and 2) reassignment. The first seems clear-cut. The second
>>>         is less obvious.
>>>
>>>         1) Unassigning the NS flag from RFC 3540
>>>         a) add text to IANA considerations section of
>>>         ecn-experientation making the NS flag reserved
>>>
>>>         2) Assigning the NS flag to accurate-ecn (and renaming it
>>>         the AE flag).
>>>         Process options:
>>>         a) ecn-experimentation assigns flag to itself as reserved
>>>         for experiments and says initially the AccECN experiment
>>>         will use it exclusively
>>>         b) ecn-experimentation assigns NS flag exclusively to AccECN
>>>         c) AccECN assigns NS flag to itself, with a process
>>>         exception proposed to the IESG to allow an EXP doc to assign
>>>         to a Standards Action registry
>>>         d) the NS flag is reassigned by "AD review comment" or "IETF
>>>         Last Call comment" (quoted from David's suggestions)
>>>         e) other?...
>>>
>>>         The difference between (a) and (b) is in the document that
>>>         ends up being referenced from the IANA registry:
>>>         a) ecn-experimentation
>>>         b) accurate-ecn
>>>
>>>         *==My own preferences==**
>>>         *
>>>         During discussions, I didn't prefer (c) cos I thought the
>>>         IESG might question why they are being asked to make a
>>>         process exception for an ECN experiment at the same time as
>>>         a draft is going through that avoids raising process
>>>         exceptions for ECN experiments.
>>>
>>>         Nonetheless, since then, Mirja has said...
>>>
>>>         On 02/07/17 23:40, Mirja Kühlewind wrote:
>>>>         I actually prefer option (c). I don’t think a process exception is a bad thing. If it’s the right thing to do, then that the reason why we have such exceptions. Also I think it’d be the right thing to change the registry policy… but that probably a longer story.
>>>         I agree that it is outdated that the registry requires a
>>>         standards action, because it has become normal tcpm practice
>>>         for any change to TCP to have to start on the experimental
>>>         track. So this would justify a process exception.
>>>
>>>         So, in summary, I don't mind (a), (b) or (c). I think (d) is
>>>         not sufficiently open and recorded for assignment of a flag
>>>         in the main TCP header.
>>>
>>>
>>>         Bob
>>>
>>
>>     -- 
>>     ________________________________________________________________
>>     Bob Briscoehttp://bobbriscoe.net/
>>
>>

-- 
________________________________________________________________
Bob Briscoe                               http://bobbriscoe.net/