Skip to main content

Requirements for Time-Based Loss Detection
draft-ietf-tcpm-rto-consider-17

Revision differences

Document history

Date Rev. By Action
2020-11-19
17 (System) RFC Editor state changed to AUTH48-DONE from AUTH48
2020-11-13
17 (System) RFC Editor state changed to AUTH48 from RFC-EDITOR
2020-08-21
17 (System) RFC Editor state changed to RFC-EDITOR from EDIT
2020-08-04
17 (System) IANA Action state changed to No IANA Actions from In Progress
2020-08-04
17 (System) RFC Editor state changed to EDIT
2020-08-04
17 (System) IESG state changed to RFC Ed Queue from Approved-announcement sent
2020-08-04
17 (System) Announcement was received by RFC Editor
2020-08-04
17 (System) IANA Action state changed to In Progress
2020-08-04
17 Cindy Morgan IESG state changed to Approved-announcement sent from Approved-announcement to be sent
2020-08-04
17 Cindy Morgan IESG has approved the document
2020-08-04
17 Cindy Morgan Closed "Approve" ballot
2020-08-04
17 Cindy Morgan Ballot approval text was generated
2020-08-04
17 Martin Duke IESG state changed to Approved-announcement to be sent from IESG Evaluation::AD Followup
2020-07-31
17 Benjamin Kaduk
[Ballot comment]
Thank you for the updates; they seem to address the core topics I raised and found
the appropriate places to do so (even …
[Ballot comment]
Thank you for the updates; they seem to address the core topics I raised and found
the appropriate places to do so (even when I did not) -- I may have to reference this
document when giving authors an example of the degree of interpretation available
to them when responding to IESG (or, really, any) comments.

Having said that, "a healthy amount of randomness" is perhaps not very clear guidance
in terms of how much is "healthy", but I recognize the goal of not being overly prescriptive,
and am reluctant to suggest additional changes.
2020-07-31
17 Benjamin Kaduk [Ballot Position Update] Position for Benjamin Kaduk has been changed to No Objection from Discuss
2020-07-27
17 (System) Sub state has been changed to AD Followup from Revised ID Needed
2020-07-27
17 (System) IANA Review state changed to Version Changed - Review Needed from IANA OK - No Actions Needed
2020-07-27
17 Mark Allman New version available: draft-ietf-tcpm-rto-consider-17.txt
2020-07-27
17 (System) New version approved
2020-07-27
17 (System) Request for posting confirmation emailed to previous authors: Mark Allman
2020-07-27
17 Mark Allman Uploaded new revision
2020-07-09
16 Cindy Morgan IESG state changed to IESG Evaluation::Revised I-D Needed from IESG Evaluation
2020-07-09
16 Magnus Westerlund [Ballot Position Update] New position, No Objection, has been recorded for Magnus Westerlund
2020-07-09
16 Éric Vyncke
[Ballot comment]
Thank you for the work put into this document.

Please address the minor points of the IoT directorate review by Wesley Eddy (in …
[Ballot comment]
Thank you for the work put into this document.

Please address the minor points of the IoT directorate review by Wesley Eddy (in cc):
https://mailarchive.ietf.org/arch/msg/iot-directorate/KGPrkW0KJeW__Bf8gWaOXk0d4FY

-éric
2020-07-09
16 Éric Vyncke Ballot comment text updated for Éric Vyncke
2020-07-09
16 Éric Vyncke [Ballot Position Update] New position, No Objection, has been recorded for Éric Vyncke
2020-07-08
16 Barry Leiba
[Ballot comment]
— Section 1 —

    Given that packet loss is routine in best effort networks, loss
    detection is a crucial …
[Ballot comment]
— Section 1 —

    Given that packet loss is routine in best effort networks, loss
    detection is a crucial activity for many protocols and applications
    and is generally undertaken for two major reasons:

The “given that” doesn’t seem the right introduction to the rest of the sentence.  Do you mean, maybe, “Even though”?  And “best-effort” should be hyphenated.

            and is overwhelming some portion of the network path.  Data
            senders can therefore use loss to trigger transmission rate
            reductions.

Or other congestion-avoidance mechanisms, no?  For example, real-time applications such as media streaming might reduce the load by changing the tradeoff between quality and data size/bandwidth usage.

    Many protocols and applications use their own time-based loss
    detection mechanisms (e.g., TCP [RFC6298], SCTP [RFC4960], SIP
    [RFC3261]).

Nit: this reads as if it’s saying that TCP, SCTP, and SIP are loss detection mechanisms.  The examples should be more closely attached to what they’re examples of (protocols and applications).  I suggest this:

NEW
    Many protocols and applications, such as TCP [RFC6298],
    SCTP [RFC4960], and SIP [RFC3261], use their own time-based
    loss detection mechanisms.
END

— Section 2 —

    requirements document---because we had no idea how to write such a
    document!

You might note the comment at the bottom of this page:
  https://en.m.wikipedia.org/wiki/Talk:Exclamation_mark#Multiple_exclamation_marks!!!

— Section 4 —

        Often measuring the time required for delivery confirmation is
        is framed as assessing the "round-trip time (RTT)" of the
        network path as this is the minimum amount of time required to
        receive delivery confirmation and also often follows protocol
        behavior whereby acknowledgments are generated quickly after
        data arrives.

This is an awkward sentence with at least two errors in it (a missing comma and a duplicate word).  The awkwardness makes the antecedent to “this” in the following sentence unclear.  I suggest rewording this sentence, perhaps as two sentences.  I’ll also note that the antecedent to “this” two sentences down (“However, this is somewhat mis-leading”) is completely missing, so please have a fresh look at the whole paragraph.

        (a) If/when available, the RTO SHOULD be set based on multiple
            observations of the FT.

If/when *what* is available?  Do you mean, “Whenever possible”?

            Some protocols use non-data exchanges for various
            reasons---e.g., keepalives, heartbeats, control messages.

Again, the examples are detached from what they’re examples of, so it looks as if they are examples of reasons, rather than of non-data exchanges.  Please re-order the sentence.

— Section 5 —

    mechanisms for many years seemingly without large scale problems

Nit: hyphenate “large-scale”.  Also in the last sentence of the same paragraph.

    Further, a number of implementations use a steady-state minimum RTO
    that are less than the 1 second specified

Nit: make it “that is less” to match the singular subject.
2020-07-08
16 Barry Leiba [Ballot Position Update] New position, No Objection, has been recorded for Barry Leiba
2020-07-08
16 Cindy Morgan Changed consensus to Yes from Unknown
2020-07-08
16 Deborah Brungard [Ballot Position Update] New position, No Objection, has been recorded for Deborah Brungard
2020-07-08
16 Alissa Cooper
[Ballot comment]
I agree with Ben that the use of "we" and "our" is a little jarring and the document would be improved if those …
[Ballot comment]
I agree with Ben that the use of "we" and "our" is a little jarring and the document would be improved if those instances could be changed.
2020-07-08
16 Alissa Cooper [Ballot Position Update] New position, No Objection, has been recorded for Alissa Cooper
2020-07-08
16 Alvaro Retana [Ballot Position Update] New position, No Objection, has been recorded for Alvaro Retana
2020-07-07
16 Roman Danyliw
[Ballot comment]
** What’s “network safety” in the context of this document?  How do I know I have it?  IMO, precision is needed since there …
[Ballot comment]
** What’s “network safety” in the context of this document?  How do I know I have it?  IMO, precision is needed since there is normative language around assuring it; and it likely has a different connotation when used in the security operations setting.

** References supporting the following claims/observations would be helpful:

-- Section 1.  Per “… we leverage the conservative notion that loss is an implicit indication of congestion .. it has historically served us well.”

-- Section 1.  Per “At this point, our experience leads to a recognition that often specific tweaks that deviate from standardized time-based loss detectors do not materially impact network safety with respect to congestion control.”

** Section 3.  S.1 and S.2.  The text would benefit from a more precise definition of primary and last resort timers as these are scoping the document

** Section 6.  I might mention that one of the applications of loss measurements in the network is in DoS detection.
2020-07-07
16 Roman Danyliw [Ballot Position Update] New position, No Objection, has been recorded for Roman Danyliw
2020-07-06
16 Benjamin Kaduk
[Ballot discuss]
If we are providing BCP-level requirements for time-based loss detection
via absence of protocol-level acknowledgment, for new protocols, it
seems appropriate to mandate …
[Ballot discuss]
If we are providing BCP-level requirements for time-based loss detection
via absence of protocol-level acknowledgment, for new protocols, it
seems appropriate to mandate that the acknowledgment signal is reliable,
i.e., not spoofable by at least an off-path attacker, and ideally not
spoofable by an on-path attacker either.  I would love for this to be a
cryptographically protected mechanism, but expect that I can't get away
with mandating something that strong, and that something with "enough
bits of entropy" will suffice.  (I'd prefer "enough" to be 128 but could
perhaps be persuaded that a lower value is appropriate as a minimum
requirement.)

Point S.3 in Section 3 indicates that "[t]he requirements in this
document apply only to endpoint-to- endpoint unicast communication.
Reliable multicast (e.g., [RFC5740]) protocols are explicitly outside
the scope of this document."  This limitation of scope should be
reflected in the document's title, Abstract, and Introduction.

I would also like to get an explicit confirmation that the various
(non-)requirements on the details of exponential backoff and reduced
weighting for old FT samples are as-intended (see COMMENT).
Specifically, are there limitations on the base of the exponent for the
exponential backoff, and is there a requirement to give more recent FT
samples more precedence than older FT samples when computing an RTO
estimate?
2020-07-06
16 Benjamin Kaduk
[Ballot comment]
As a general note, the style of this document is somewhat divergent from
what I understand to be "modern RFC style".  While there's …
[Ballot comment]
As a general note, the style of this document is somewhat divergent from
what I understand to be "modern RFC style".  While there's not a strict
requirement to adhere to such a common style, and I do not have specific
suggestions for changes, it did seem noteworthy.

Abstract

    of congestion along a network path).  While many mechanisms have
    been designed to detect loss, protocols ultimately can only count on
    the passage of time without delivery confirmation to declare a
    packet "lost".  Each implementation of a time-based loss detection

I'm not entirely convinced that the literal meaning of what these words
say is universally true for all protocols (specifically "can only count
on" and omitting a qualifier such as "many" or "most" protocols or
"reliably count on").  Consider, for example, the DTN bundle protocol,
which has some circumstances in which a given store-and-forward node
will flat-out not attempt to forward a protocol onward to its final
recipient, but can send back a status report to the sender noting the
confirmed lack of delivery.  I suggest adding some form of qualifier to
admit the possibility of such unusual situations.

Section 1

    missing.  However, despite our best intentions and most robust
    mechanisms we cannot place ultimate faith in receiving such
    acknowledgments, but can only truly depend on the passage of time.
    Therefore, our ultimate backstop to ensuring that we detect all loss
    is a timeout.  [...]

Despite the superficial similarity of tone, a strict reading of these
words does not seem to share the issue I raised about the Abstract.
(That said, this phrasing still seems a bit overblown and my personal
preference would be to tone it down some.)

Section 2

      - This document does not update or obsolete any existing RFC.
        These previous specifications---while generally consistent with
        the requirements in this document---reflect community consensus
        and this document does not change that consensus.

      - The requirements in this document are meant to provide for
        network safety and, as such, SHOULD be used by all time-based
        loss detection mechanisms.

I'm not sure that I understand how the combinations of these two
statements apply to existing specifications.  Is there some sense that
existing specs might leave some flexibility and when there is such
flexibility, implementations/deployments SHOULD use the flexibility to
match this document as closely as possible?  Or are existing deployments
and implementations of existing RFCs also grandfathered out?  If the
intent of the second bullet is to only apply to new protocols, please
say so explicitly.  (Section 4 seems to imply the "only new protocols"
case, but it's hard to be sure.)

      - The requirements in this document may not be appropriate in all
        cases and, therefore, inconsistent deviations and variants may
        be necessary (hence the "SHOULD" in the last bullet).  However,
        inconsistencies MUST be (a) explained and (b) gather consensus.

Similarly, is this statement only forward-looking?  Presumably the first
bullet ("does not update or obsolete any existing") trumps this one, but
it's good to be clear.

Additionally, I share the GenART reviewer's unease with this strong of a
requirement and have low confidence that the IETF will reliably adhere
to it in the future.

nit(?): "inconsistent deviations" may be redundant?

Section 3

    (S.1) The requirements in this document apply only to the primary or
          last resort time-based loss detection.

I'm not sure I understand what "primary or last resort [sic]" means.
Are there time-based loss-detection mechanisms that are neither primary
nor last resort?  (nit: hyphenate "last-resort" as a compound adjective,
and many other compound adjectives throughout.)
(May also affect S.2.)
I see S.2 links to [DCCM13,CCDJ20,IS20] as examples of non-primary
non-last-resort schemes, however, I think we should be more clear about
what we mean when we introduce the term and why we exclude certain
classes of time-based loss-detection mechanisms.

          detectors.  However, these mechanisms do not obviate the need
          for a "retransmission timeout" or "RTO" because---as we
          discuss in Section 1---only the passage of time can ultimately
          be relied upon to detect loss.  In cases such as these, the

[This text is more like the Abstract's, implying that the passage of
time is the only way to detect loss, universally]

Section 4

            In other words, the RTO should represent an empirically-
            derived reasonable amount of time that the sender should
            wait for delivery confirmation before deciding the given
            data is lost.  Network paths are inherently dynamic and
            therefore it is crucial to incorporate multiple FT samples
            in the RTO to take into account the delay variation across
            time.

It feels weird to say that the delay will vary over time here but say
nothing about the corresponding need to discount very old FT samples.
Point (b) talks about adding new samples in, but not about removing or
discounting old samples.  That the TCP example does exhibit this
property does not excuse a lack of explicit mention as a property of
note.

        (d) An RTO mechanism MUST NOT use ambiguous FT samples.

            Assume two copies of some segment X are transmitted at times
            t0 and t1 and then at time t2 the sender receives
            confirmation that X in fact arrived.  In some cases, it is

"segment" feels like use of TCP-specific terminology without disclaimer
or generalization.

            There are cases where two copies of some data are
            transmitted in a way whereby the sender can tell which is
            being acknowledged by an incoming ACK.  E.g., TCP's
            timestamp option [RFC7323] allows for segments to be
            uniquely identified and hence avoid the ambiguity.  In such
            cases there is no ambiguity and the resulting samples can
            update the RTO.

Perhaps note that QUIC was designed from the start to avoid the
ambiguity about retransmitted segments?

    (3) Loss detected by the RTO mechanism MUST be taken as an
        indication of network congestion and the sending rate adapted
        using a standard mechanism (e.g., TCP collapses the congestion
        window to one segment [RFC5681]).
        [...]
        An exception to this rule is if an IETF standardized mechanism
        determines that a particular loss is due to a non-congestion
        event (e.g., packet corruption).  In such a case a congestion

If it's a MUST with an exception, doesn't that make it ... no longer a
MUST?

    (4) Each time the RTO is used to detect a loss, the value of the RTO
        MUST be exponentially backed off such that the next firing
        requires a longer interval.  [...]

Do we expect this to be exponential backoff by doubling, or is it
admissible to use an alternative base for the exponent?  (Is there a
minimum allowable value?  E.g., 1.000001 does not seem like it would
provide much protection for the network.)

        As with guideline (3), an exception to this rule exists if an
        IETF standardized mechanism determines that a particular loss is
        not due to congestion.

(Same as above.)

Section 5

    Also, note, that in addition to the experiments discussed in [AP99],

nit: s/note, that/note that,/

    Further, a number of implementations use a steady-state minimum RTO
    that are less than the 1 second specified in [RFC6298] (which is
    different from the initial RTO we specify in Section 4, Requirement
    1).  While the implication of these deviations from the standard may

Just to check: our requirement 1 is the same as RFC 6298, and the "less
than 1 second" is what's different.  Perhaps wording this akin to "and
as such is in violation of the RTO specified in Requirement 1 from
Section 4" would avoid the ambiguity about what is different from what.

    Finally, we note that while allowing implementations to be more
    aggressive could in fact increase the number of needless
    retransmissions the above requirements fail safe in that they insist

nit: I suggest a comma after "needless retransmissions"

Section 6

Noting that we incorporate the security considerations of RFC 6298 by
reference, and quoting from there:

  In addition, even if the attacker can cause the sender's RTO to reach
  too small a value, it appears the attacker cannot leverage this into
  much of an attack (compared to the other damage they can do if they
  can spoof packets belonging to the connection), since the sending TCP
  will still back off its timer in the face of an incorrectly
  transmitted packet's loss due to actual congestion.

Just to check my understanding: this "actual congestion" would need to
be between the sender and the attacker, right?  Since the attacker's
spoofed ACKs would cause the sender to not detect loss due to congestion
that occurs between the attacker and the intended recipient.

References

The way we cite [KP87] ("MUST use Karn's algorithm [KP87,RFC6298]")
implies that it should be categorized as normative.  Similarly for RFC
6298
itself.

    [RFC3124] Balakrishnan, H., S. Seshan, "The Congestion Manager", RFC
        2134
, June 2001.

Fix the typo, please -- RFC 2134 is the articles of incorporation of
ISOC.
2020-07-06
16 Benjamin Kaduk [Ballot Position Update] New position, Discuss, has been recorded for Benjamin Kaduk
2020-07-06
16 Robert Wilton
[Ballot comment]
Thank you for this document.  I have no significant comments, just a few nits:

1  Introduction

    This document provides guidelines for …
[Ballot comment]
Thank you for this document.  I have no significant comments, just a few nits:

1  Introduction

    This document provides guidelines for developing an understanding of
    one path property: loss
   
Recommend: "loss" -> "packet loss"

    (S.1) The requirements in this document apply only to the primary or
          last resort time-based loss detection.
         
    (S.2) The requirements for time-based loss detection mechanisms in
          this document are for the primary or "last resort" loss
          detection mechanism whether the mechanism is the sole loss
          repair strategy or works in concert with other mechanisms.

I found the wording for these two requirements to be repetitive, possibly could be reworded and combined.


     
4  Requirements     

    (1) As we note above, loss detection happens when a sender does not
        receive delivery confirmation within an some expected period of
        time.
       
Nit: Delete "an" or "some"

        Often measuring the time required for delivery confirmation is
        is framed
       
Nit: "is is" -> "is"

Regards,
Rob
2020-07-06
16 Robert Wilton [Ballot Position Update] New position, No Objection, has been recorded for Robert Wilton
2020-07-04
16 Murray Kucherawy
[Ballot comment]
I note the shepherd and GenART review comments about the requirements language at the end of Section 2, and I don't find it …
[Ballot comment]
I note the shepherd and GenART review comments about the requirements language at the end of Section 2, and I don't find it to be problematic generally given this passed WGLC in multiple working groups (a wise move, by the way) and a proper IETF Last Call.

These triple hyphens throughout the document are supposed to be em dashes, I presume?
2020-07-04
16 Murray Kucherawy [Ballot Position Update] New position, No Objection, has been recorded for Murray Kucherawy
2020-07-03
16 Stewart Bryant Request for Telechat review by GENART Completed: Ready with Issues. Reviewer: Stewart Bryant. Sent review to list.
2020-06-30
16 Wesley Eddy Request for Telechat review by IOTDIR Completed: Ready. Reviewer: Wesley Eddy. Sent review to list.
2020-06-29
16 Samita Chakrabarti Request for Telechat review by IOTDIR is assigned to Wesley Eddy
2020-06-29
16 Samita Chakrabarti Request for Telechat review by IOTDIR is assigned to Wesley Eddy
2020-06-26
16 Eve Schooler Assignment of request for Telechat review by IOTDIR to Eve Schooler was rejected
2020-06-26
16 Jean Mahoney Request for Telechat review by GENART is assigned to Stewart Bryant
2020-06-26
16 Jean Mahoney Request for Telechat review by GENART is assigned to Stewart Bryant
2020-06-26
16 Samita Chakrabarti Request for Telechat review by IOTDIR is assigned to Eve Schooler
2020-06-26
16 Samita Chakrabarti Request for Telechat review by IOTDIR is assigned to Eve Schooler
2020-06-25
16 Erik Kline [Ballot Position Update] New position, No Objection, has been recorded for Erik Kline
2020-06-25
16 Éric Vyncke Requested Telechat review by IOTDIR
2020-06-25
16 Éric Vyncke Requested Telechat review by INTDIR
2020-06-23
16 (System) IANA Review state changed to IANA OK - No Actions Needed from Version Changed - Review Needed
2020-06-22
16 Yoshifumi Nishida
1. Summary

The document shepherd is Yoshifumi Nishida
The responsible Area Director is Martin Duke

This document provides high-level guidance to design the primary or …
1. Summary

The document shepherd is Yoshifumi Nishida
The responsible Area Director is Martin Duke

This document provides high-level guidance to design the primary or last resort time-based
loss detection schemes for general use on the Internet, which can be applied to not only TCP,
but also other transport protocols and applications that need their own loss detection mechanisms.
The WG requests to publish this draft as Best Current Practice document because it describes
generic principles to update existing loss detection algorithms or to develop new ones.

2. Review and Consensus

The draft was originally written for TCP and hence presented and adopted at TCPM WG.
As the discussions on the draft proceeded, the focus of the draft has been extended to other
transport and application protocols because the same principle can be applied to them.
Because of this updates, we have decided to run WGLC for this draft on both TSVWG and TCPM WG
while we still have used TCPM WG as the venue for the discussions.

The draft has been reviewed and discussed by various participants in the WG for long time.
Most of discussion points were the choice of exact wordings in order not to create any
contradictions to other documents.
In addition, we have assigned two experts to get specific feedback from the viewpoint of
non-TCP protocols such as QUIC. The WGLC on both WG ended successfully without any major issues.
I believe there is a strong consensus in both WGs for publication.

During ART reviews, there were some discussions on the scope and the applicability of the document.
The main point of discussions was how we can apply this document to the cases where we have
some knowledge about the network. The document has been updated several times in order to
address the points raised during the discussions, however, complete agreements have not been archived.
We decided to leave the final decision to IESG with regard to this.

3. Intellectual Property

Each author has confirmed that their direct, personal knowledge of any
IPR related to this document has already been disclosed.
None of the authors is aware of any IPR related to this document.

4. Other Points
2020-06-22
16 Amy Vezza Placed on agenda for telechat - 2020-07-09
2020-06-19
16 Martin Duke IESG state changed to IESG Evaluation from Waiting for AD Go-Ahead::AD Followup
2020-06-19
16 Martin Duke Ballot has been issued
2020-06-19
16 Martin Duke [Ballot Position Update] New position, Yes, has been recorded for Martin Duke
2020-06-19
16 Martin Duke Created "Approve" ballot
2020-06-19
16 Mark Allman New version available: draft-ietf-tcpm-rto-consider-16.txt
2020-06-19
16 (System) New version approved
2020-06-19
16 (System) Request for posting confirmation emailed to previous authors: Mark Allman
2020-06-19
16 Mark Allman Uploaded new revision
2020-06-08
15 (System) Sub state has been changed to AD Followup from Revised ID Needed
2020-06-08
15 (System) IANA Review state changed to Version Changed - Review Needed from IANA OK - No Actions Needed
2020-06-08
15 Mark Allman New version available: draft-ietf-tcpm-rto-consider-15.txt
2020-06-08
15 (System) New version approved
2020-06-08
15 (System) Request for posting confirmation emailed to previous authors: Mark Allman
2020-06-08
15 Mark Allman Uploaded new revision
2020-06-01
14 Martin Duke IESG state changed to Waiting for AD Go-Ahead::Revised I-D Needed from Waiting for Writeup
2020-06-01
14 Martin Duke Ballot writeup was changed
2020-06-01
14 Martin Duke Ballot writeup was changed
2020-06-01
14 Martin Duke Ballot writeup was changed
2020-06-01
14 (System) IESG state changed to Waiting for Writeup from In Last Call
2020-05-30
14 Stewart Bryant Request for Last Call review by GENART Completed: Not Ready. Reviewer: Stewart Bryant. Sent review to list.
2020-05-29
14 (System) IANA Review state changed to IANA OK - No Actions Needed from IANA - Review Needed
2020-05-29
14 Sabrina Tanamal
(Via drafts-lastcall@iana.org): IESG/Authors/WG Chairs:

The IANA Functions Operator has reviewed draft-ietf-tcpm-rto-consider-14, which is currently in Last Call, and has the following comments:

We …
(Via drafts-lastcall@iana.org): IESG/Authors/WG Chairs:

The IANA Functions Operator has reviewed draft-ietf-tcpm-rto-consider-14, which is currently in Last Call, and has the following comments:

We understand that this document doesn't require any registry actions.

While it's often helpful for a document's IANA Considerations section to remain in place upon publication even if there are no actions, if the authors strongly prefer to remove it, we do not object.

If this assessment is not accurate, please respond as soon as possible.

Thank you,

Sabrina Tanamal
Senior IANA Services Specialist
2020-05-25
14 Liang Xia Request for Last Call review by SECDIR Completed: Ready. Reviewer: Liang Xia. Sent review to list.
2020-05-21
14 Jean Mahoney Request for Last Call review by GENART is assigned to Stewart Bryant
2020-05-21
14 Jean Mahoney Request for Last Call review by GENART is assigned to Stewart Bryant
2020-05-21
14 Tero Kivinen Request for Last Call review by SECDIR is assigned to Liang Xia
2020-05-21
14 Tero Kivinen Request for Last Call review by SECDIR is assigned to Liang Xia
2020-05-19
14 Gunter Van de Velde Request for Last Call review by OPSDIR is assigned to Sarah Banks
2020-05-19
14 Gunter Van de Velde Request for Last Call review by OPSDIR is assigned to Sarah Banks
2020-05-18
14 Amy Vezza IANA Review state changed to IANA - Review Needed
2020-05-18
14 Amy Vezza
The following Last Call announcement was sent out (ends 2020-06-01):

From: The IESG
To: IETF-Announce
CC: nsd.ietf@gmail.com, Yoshifumi Nishida , tcpm-chairs@ietf.org, tcpm@ietf.org, …
The following Last Call announcement was sent out (ends 2020-06-01):

From: The IESG
To: IETF-Announce
CC: nsd.ietf@gmail.com, Yoshifumi Nishida , tcpm-chairs@ietf.org, tcpm@ietf.org, martin.h.duke@gmail.com, draft-ietf-tcpm-rto-consider@ietf.org
Reply-To: last-call@ietf.org
Sender:
Subject: Last Call:  (Requirements for Time-Based Loss Detection) to Best Current Practice


The IESG has received a request from the TCP Maintenance and Minor Extensions
WG (tcpm) to consider the following document: - 'Requirements for Time-Based
Loss Detection'
  as Best Current Practice

The IESG plans to make a decision in the next few weeks, and solicits final
comments on this action. Please send substantive comments to the
last-call@ietf.org mailing lists by 2020-06-01. Exceptionally, comments may
be sent to iesg@ietf.org instead. In either case, please retain the beginning
of the Subject line to allow automated sorting.

Abstract


    Many protocols must detect packet loss for various reasons (e.g., to
    ensure reliability using retransmissions or to understand the level
    of congestion along a network path).  While many mechanisms have
    been designed to detect loss, protocols ultimately can only count on
    the passage of time without delivery confirmation to declare a
    packet "lost".  Each implementation of a time-based loss detection
    mechanism represents a balance between correctness and timeliness
    and therefore no implementation suits all situations.  This document
    provides high-level requirements for time-based loss detectors
    appropriate for general use in the Internet.  Within the
    requirements, implementations have latitude to define particulars
    that best address each situation.




The file can be obtained via
https://datatracker.ietf.org/doc/draft-ietf-tcpm-rto-consider/



No IPR declarations have been submitted directly on this I-D.




2020-05-18
14 Amy Vezza IESG state changed to In Last Call from Last Call Requested
2020-05-18
14 Amy Vezza Last call announcement was changed
2020-05-16
14 Martin Duke Last call was requested
2020-05-16
14 Martin Duke Last call announcement was generated
2020-05-16
14 Martin Duke Ballot approval text was generated
2020-05-16
14 Martin Duke Ballot writeup was generated
2020-05-16
14 Martin Duke IESG state changed to Last Call Requested from AD Evaluation
2020-05-13
14 Martin Duke IESG state changed to AD Evaluation from Publication Requested
2020-05-13
14 Yoshifumi Nishida
1. Summary

The document shepherd is Yoshifumi Nishida
The responsible Area Director is Martin Duke

This document provides high-level guidance to design the primary or …
1. Summary

The document shepherd is Yoshifumi Nishida
The responsible Area Director is Martin Duke

This document provides high-level guidance to design the primary or last resort time-based
loss detection schemes for general use on the Internet, which can be applied to not only TCP,
but also other transport protocols and applications that need their own loss detection mechanisms.
The WG requests to publish this draft as Best Current Practice document because it describes
generic principles to update existing loss detection algorithms or to develop new ones.

2. Review and Consensus

The draft was originally written for TCP and hence presented and adopted at TCPM WG.
As the discussions on the draft proceeded, the focus of the draft has been extended to other
transport and application protocols because the same principle can be applied to them.
Because of this updates, we have decided to run WGLC for this draft on both TSVWG and TCPM WG
while we still have used TCPM WG as the venue for the discussions.

The draft has been reviewed and discussed by various participants in the WG for long time.
Most of discussion points were the choice of exact wordings in order not to create any
contradictions to other documents.
In addition, we have assigned two experts to get specific feedback from the viewpoint of
non-TCP protocols such as QUIC. The WGLC on both WG ended successfully without any major issues.
I believe there is a strong consensus in both WGs for publication.

3. Intellectual Property

Each author has confirmed that their direct, personal knowledge of any
IPR related to this document has already been disclosed.
None of the authors is aware of any IPR related to this document.

4. Other Points
2020-05-13
14 Yoshifumi Nishida IETF WG state changed to Submitted to IESG for Publication from WG Consensus: Waiting for Write-Up
2020-05-13
14 Yoshifumi Nishida IESG state changed to Publication Requested from I-D Exists
2020-05-13
14 Yoshifumi Nishida IESG process started in state Publication Requested
2020-05-13
14 Mark Allman New version available: draft-ietf-tcpm-rto-consider-14.txt
2020-05-13
14 (System) New version approved
2020-05-13
14 (System) Request for posting confirmation emailed to previous authors: Mark Allman
2020-05-13
14 Mark Allman Uploaded new revision
2020-05-13
13 Yoshifumi Nishida
1. Summary

The document shepherd is Yoshifumi Nishida
The responsible Area Director is Martin Duke

This document provides high-level guidance to design the primary or …
1. Summary

The document shepherd is Yoshifumi Nishida
The responsible Area Director is Martin Duke

This document provides high-level guidance to design the primary or last resort time-based
loss detection schemes for general use on the Internet, which can be applied to not only TCP,
but also other transport protocols and applications that need their own loss detection mechanisms.
The WG requests to publish this draft as Best Current Practice document because it describes
generic principles to update existing loss detection algorithms or to develop new ones.

2. Review and Consensus

The draft was originally written for TCP and hence presented and adopted at TCPM WG.
As the discussions on the draft proceeded, the focus of the draft has been extended to other
transport and application protocols because the same principle can be applied to them.
Because of this updates, we have decided to run WGLC for this draft on both TSVWG and TCPM WG
while we still have used TCPM WG as the venue for the discussions.

The draft has been reviewed and discussed by various participants in the WG for long time.
Most of discussion points were the choice of exact wordings in order not to create any
contradictions to other documents.
In addition, we have assigned two experts to get specific feedback from the viewpoint of
non-TCP protocols such as QUIC. The WGLC on both WG ended successfully without any major issues.
I believe there is a strong consensus in both WGs for publication.

3. Intellectual Property

Each author has confirmed that their direct, personal knowledge of any
IPR related to this document has already been disclosed.
None of the authors is aware of any IPR related to this document.

4. Other Points
2020-05-08
13 Mark Allman New version available: draft-ietf-tcpm-rto-consider-13.txt
2020-05-08
13 (System) New version approved
2020-05-08
13 (System) Request for posting confirmation emailed to previous authors: Mark Allman
2020-05-08
13 Mark Allman Uploaded new revision
2020-05-04
12 Mark Allman New version available: draft-ietf-tcpm-rto-consider-12.txt
2020-05-04
12 (System) New version approved
2020-05-04
12 (System) Request for posting confirmation emailed to previous authors: Mark Allman
2020-05-04
12 Mark Allman Uploaded new revision
2020-04-30
11 Martin Duke Shepherding AD changed to Martin Duke
2020-04-30
11 Martin Duke IESG state changed to I-D Exists from Dead
2020-04-30
11 Mark Allman New version available: draft-ietf-tcpm-rto-consider-11.txt
2020-04-30
11 (System) New version approved
2020-04-30
11 (System) Request for posting confirmation emailed to previous authors: Mark Allman
2020-04-30
11 Mark Allman Uploaded new revision
2020-04-30
10 Yoshifumi Nishida IETF WG state changed to WG Consensus: Waiting for Write-Up from WG Document
2020-04-29
10 Michael Tüxen Notification list changed to Yoshifumi Nishida <nsd.ietf@gmail.com>
2020-04-29
10 Michael Tüxen Document shepherd changed to Yoshifumi Nishida
2020-02-04
10 Mark Allman New version available: draft-ietf-tcpm-rto-consider-10.txt
2020-02-04
10 (System) New version approved
2020-02-04
10 (System) Request for posting confirmation emailed to previous authors: Mark Allman
2020-02-04
10 Mark Allman Uploaded new revision
2019-12-02
09 Mark Allman New version available: draft-ietf-tcpm-rto-consider-09.txt
2019-12-02
09 (System) New version approved
2019-12-02
09 (System) Request for posting confirmation emailed to previous authors: Mark Allman
2019-12-02
09 Mark Allman Uploaded new revision
2019-08-26
08 (System) Document has expired
2019-02-22
08 Mark Allman New version available: draft-ietf-tcpm-rto-consider-08.txt
2019-02-22
08 (System) New version approved
2019-02-22
08 (System) Request for posting confirmation emailed to previous authors: Mark Allman
2019-02-22
08 Mark Allman Uploaded new revision
2019-02-06
07 Mark Allman New version available: draft-ietf-tcpm-rto-consider-07.txt
2019-02-06
07 (System) New version approved
2019-02-06
07 (System) Request for posting confirmation emailed to previous authors: Mark Allman
2019-02-06
07 Mark Allman Uploaded new revision
2018-10-19
06 Mark Allman New version available: draft-ietf-tcpm-rto-consider-06.txt
2018-10-19
06 (System) New version approved
2018-10-19
06 (System) Request for posting confirmation emailed to previous authors: Mark Allman
2018-10-19
06 Mark Allman Uploaded new revision
2017-09-11
05 (System) Document has expired
2017-03-10
05 Mark Allman New version available: draft-ietf-tcpm-rto-consider-05.txt
2017-03-10
05 (System) New version approved
2017-03-10
05 (System) Request for posting confirmation emailed to previous authors: Mark Allman
2017-03-10
05 Mark Allman Uploaded new revision
2016-12-17
04 (System) Document has expired
2016-12-17
04 (System) IESG state changed to Dead from AD is watching
2016-09-02
04 Michael Scharf This document now replaces draft-allman-tcpm-rto-consider instead of None
2016-06-15
04 Mark Allman New version available: draft-ietf-tcpm-rto-consider-04.txt
2016-04-26
03 Mirja Kühlewind Intended Status changed to Best Current Practice
2016-04-26
03 Mirja Kühlewind IESG process started in state AD is watching
2016-04-25
03 Mirja Kühlewind Shepherding AD changed to Mirja Kühlewind
2016-04-15
03 Mark Allman New version available: draft-ietf-tcpm-rto-consider-03.txt
2016-04-05
02 Mark Allman New version available: draft-ietf-tcpm-rto-consider-02.txt
2016-02-29
01 Mark Allman New version available: draft-ietf-tcpm-rto-consider-01.txt
2016-02-02
00 Mark Allman New version available: draft-ietf-tcpm-rto-consider-00.txt