Re: [Tsvwg] draft-floyd-tsvwg-cc-alt - Call for WG adoption
Sally Floyd <sallyfloyd@mac.com> Sat, 17 February 2007 23:27 UTC
Received: from [127.0.0.1] (helo=stiedprmman1.va.neustar.com) by megatron.ietf.org with esmtp (Exim 4.43) id 1HIYxO-0006H2-Op; Sat, 17 Feb 2007 18:27:06 -0500
Received: from [10.91.34.44] (helo=ietf-mx.ietf.org) by megatron.ietf.org with esmtp (Exim 4.43) id 1HIYxN-0006Gx-FQ for tsvwg@ietf.org; Sat, 17 Feb 2007 18:27:05 -0500
Received: from smtpout.mac.com ([17.250.248.176]) by ietf-mx.ietf.org with esmtp (Exim 4.43) id 1HIYxK-00055w-VU for tsvwg@ietf.org; Sat, 17 Feb 2007 18:27:05 -0500
Received: from mac.com (smtpin04-en2 [10.13.10.149]) by smtpout.mac.com (Xserve/8.12.11/smtpout06/MantshX 4.0) with ESMTP id l1HNQu2W013279; Sat, 17 Feb 2007 15:26:56 -0800 (PST)
Received: from [192.168.1.64] (adsl-70-231-251-107.dsl.snfc21.sbcglobal.net [70.231.251.107]) (authenticated bits=0) by mac.com (Xserve/smtpin04/MantshX 4.0) with ESMTP id l1HNQnOj006229; Sat, 17 Feb 2007 15:26:51 -0800 (PST)
In-Reply-To: <C1F13724.6928%gorry@erg.abdn.ac.uk>
References: <C1F13724.6928%gorry@erg.abdn.ac.uk>
Mime-Version: 1.0 (Apple Message framework v624)
Content-Type: text/plain; charset="US-ASCII"; format="flowed"
Message-Id: <1fa75fc67f559d8541c1bb33421593ed@mac.com>
Content-Transfer-Encoding: 7bit
From: Sally Floyd <sallyfloyd@mac.com>
Subject: Re: [Tsvwg] draft-floyd-tsvwg-cc-alt - Call for WG adoption
Date: Sat, 17 Feb 2007 15:26:49 -0800
To: Gorry Fairhurst <gorry@erg.abdn.ac.uk>
X-Mailer: Apple Mail (2.624)
X-Brightmail-Tracker: AAAAAA==
X-Brightmail-scanned: yes
X-Spam-Score: 0.0 (/)
X-Scan-Signature: 31b28e25e9d13a22020d8b7aedc9832c
Cc: Transport WG <tsvwg@ietf.org>, Mark Allman <mallman@icir.org>
X-BeenThere: tsvwg@ietf.org
X-Mailman-Version: 2.1.5
Precedence: list
List-Id: Transport Area Working Group <tsvwg.ietf.org>
List-Unsubscribe: <https://www1.ietf.org/mailman/listinfo/tsvwg>, <mailto:tsvwg-request@ietf.org?subject=unsubscribe>
List-Post: <mailto:tsvwg@ietf.org>
List-Help: <mailto:tsvwg-request@ietf.org?subject=help>
List-Subscribe: <https://www1.ietf.org/mailman/listinfo/tsvwg>, <mailto:tsvwg-request@ietf.org?subject=subscribe>
Errors-To: tsvwg-bounces@ietf.org
Gorry - > I think this is useful, and support its adoption as a working group > item > intended for BCP publication. As always, many thanks for the feedback! > It could be worth writing about is the different aspects of this > problem > space. These are different, and raise issues with different > communities. For > instance we have views: > > * traditionally flows need to be controlled, but applications have > spanned > multiple flows to "modify" the intended behaviour, for good and bad > reasons. > * some think that end-host traffic need need to be controlled (rather > than > transport flows) - need to accommodate multi-homed hosts, multi-user > systems > ... > * it's also possible to control traffic through edge routers, some are > more > concerned about mis-behaving "local" routers and end hosts to protect > the > service of other local users (e.g. ECN NONCE). I didn't add this, because it seemed to me that it belonged to a different document. > It could also be useful to outline background: > > * End-hosts need to implement congestion-control to behave as > responsible > systems in the Internet, routers can assist in this role. > * Some congestion-control algorithms introduce incentives for end > hosts to > cheat (not respond appropriately) to attempt to gain a larger share of > the > capacity along the Internet Path. > * Not all paths are equal (in terms of loss, capacity, delay, delay > variation, etc), and this can result in very different shares, even > though > intuitively this may seem unfair or be unexpected by a user. > * The security implications of congestion control algorithms also need > to be > considered, and methods found to mitigate the effects of third-party > attacks. > * This problem space is orthogonal to RSVP, DS, etc. I added some of this in pointers to other documents, e.g., RFC 2914, and the TMRG documents. ... > Specific comments follow: > > ---- > Page 3: > "The second class is algorithms > that, while promising, are not deemed safe enough for deployment > on > the Internet, but are being specified to facilitate investigations > via simulation and testbeds." > > - "Not deemed safe enough" > - This sounds like it could be right, but I'd prefer a clearer > distinction > between the "deemed safe" case, where there is not currently sufficient > understanding for IETF to gain consensus that this is safe. Thanks. Done. > ---- > Page 3: > > "describing environments where the protocol > is not recommended for deployment even though it may not be unsafe > for use" > > - The double negative makes this harder to read: "may not be unsafe" > does > this mean "not necessarily safe"? "not necessarily unsafe"? Done. > --- > Page 3: Section 3: > "As noted above, authors are expected to do a well-rounded > evaluations" > ^ > - Omit "s"? Done. > ---- > Page 3: Section 3: > " should not be used as a > check-list." > > - definitive checklist, i.e., it's fine to check these things, but you > may > need to do more. Yep, done. > ---- > Page 4: Point (3) > "An assessment of proposed algorithms in difficult environments > such as paths containing wireless links and paths with > reverse-path congestion." > > - This is not a sentence, perhaps replace the start by: "The proposed > algorithms should be assessed in..." > - I'd prefer to be concrete on the sort of path characteristics to > examine, > there is nothing fundamentally dangerous about using "radio" links:-) > - so I suspect readers should look at issues such as "corruption loss, > higher delay, variable delay, varying capacity, and the implications > of BoD" > - in short, the sort of things mentioned in RFC3819. All done. > ---- > Page 5: Point (7) > - In point (7) I found it harder to understand what was envisaged to be > assessed. I'd have preferred to have some clearer guidance on the sort > of > things to consider. > > * The effect of control packet loss /delay/ordering (in hosts, > routers). > * The effect of loss of state (e.g. due to a protocol restart at a > router, > or end host). > * Returning control information that does not reflect the actual end > host > state, from an end host or router participating in the protocol. > * The transmission of packets designed to trigger an incorrect > response by > an end host or router participating in the protocol. > > - IMHO, the effects could more usefully be split between on-path > (above) and > the other off-path attacks. > > * Transmission of packets by third parties (that do not have access to > the > network packets belonging to the flow) with the object of changing the > protocol state. > * Denial of service attacks against hosts/routers designed to consume > resources and reduce resources available for this and/or other > protocols. I didn't add all this, but I did add a discussion of RFC 4782 (Quick-Start), as an example. > ---- > Page 5: Point (9) > "is to be carried out." > > - I'm not a fan of the words "carried out" could "deployed" or > something > else be used? I left it, but added another sentence for clarity. > ---- > Section 5 > > - Not only should " Alternate congestion control schemes should be > mindful > of such pitfalls, as well." - they MUST of course examine potential > security > issues that may arise from their use:-) Yep. Added. > ---- > References > - I'm sure you've noted QS is now an RFC:-) > - An informative reference to SCTP and DCCP may be useful. Yep, done. Again, many many thanks. - Sally http://www.icir.org/floyd/
- [Tsvwg] draft-floyd-tsvwg-cc-alt - Call for WG ad… Gorry Fairhurst
- Re: [Tsvwg] draft-floyd-tsvwg-cc-alt - Call for W… Sally Floyd