Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

Word-smithed version of Ted's resolution to #3842 from the mailing list #3945

Merged
merged 8 commits into from
Sep 1, 2020

Conversation

larseggert
Copy link
Member

@larseggert larseggert commented Jul 23, 2020

Closes #3842.

Copy link
Member

@martinthomson martinthomson left a comment

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

Discussion on-list continues, but if this is the direction we choose...

@ekr
Copy link
Collaborator

ekr commented Jul 23, 2020

This LGTM and would address my concern.

Copy link
Contributor

@janaiyengar janaiyengar left a comment

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

One nit, but I'm happy with this resolution.

draft-ietf-quic-transport.md Outdated Show resolved Hide resolved
larseggert and others added 2 commits July 24, 2020 09:04
Co-authored-by: ianswett <ianswett@users.noreply.github.com>
Co-authored-by: Jana Iyengar <jri.ietf@gmail.com>
@ianswett ianswett added -transport design An issue that affects the design of the protocol; resolution requires consensus. labels Jul 27, 2020
congestion controller and the RTT estimator are expected to adapt to the new
path. Generally, implementations are advised to be cautious when using previous
values on a new path.
unless the only change is the other endpoint's port number. Because
Copy link
Member Author

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

On the mailing list, I asked whether I should add "and the connection ID did not change" to the end of this sentence. Opinions?

Copy link
Contributor

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

I think not. Implementations that know they're likely to have a NAT rebinding (i.e. after quiescence) are advised to change the CID as well. That doesn't make it less a NAT rebinding.

Copy link
Member Author

@larseggert larseggert Aug 13, 2020

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

The point is that if the CID changed, it was an active migration attempt, which indicates that the peer at least attempted to switch paths. So in those cases resetting the state might make more sense.

Copy link
Contributor

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

Yeah, I agree that it's consistent with the idea that the peer likely changed its attachment point. I don't think this makes a difference in practice, but it seems consistent with our principles here.

It does make it a bit more work to check, but it's not that hard.

Copy link
Contributor

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

Correctly predicting a NAT rebind isn't an "attempt" to switch paths. It's using the same path, but making a guess about what might have happened.

If you're not going to reset the congestion controller when the port changes without the peer realizing it, and you're not going to reset the congestion controller if the peer guesses they're about to get rebound but doesn't, then I don't think it makes sense to reset it if they guess and are right.

Copy link
Contributor

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

We encourage changing the CID and port to "force" a NAT rebinding if you've been idle (Section 9.5) in order to reduce linkability. In the same breath, we note that this might reset congestion controller state, so be careful about changing port too often. A conservative implementation of that guidance might change CID but not port, letting NAT rebindings happen if they happen.

Copy link
Member Author

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

I don't see how the text in Section 9.5 conflicts with the proposed change?

Copy link
Contributor

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

Whether an endpoint passively experiences or deliberately forces a NAT rebind is indistinguishable at the server side. Changing CID tells you nothing more than that they wanted to reduce their linkability if they got rebound. A change in CID doesn't imply a path change; a change in endpoint address is the only reliable guide on that.

We're saying that you SHOULD reset unless there's a change that's broader than the port, because a port-only change is very likely to be the same path. A CID change is even less likely to indicate a path change. Therefore, it should not be a cause for resetting the congestion controller.

Copy link
Contributor

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

@MikeBishop: I see your point. The concern @larseggert was trying to address was that in some carrier-grade NATs, it is possible that what appears as a port change might actually be a path change on the private side of the CGNAT, but your point is that CID change cannot be assumed to be a good proxy for path change. At a minimum, we don't have experience with this yet, so we can't assume it.

I don't have a strong opinion one way or the other here. In practice, I completely expect people to treat port changes as same path. Given @MikeBishop's point about CID changes also not reflecting a path change, I would suggest leaving the PR as it is.

Copy link
Member Author

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

@MikeBishop is there something left to resolve here?

draft-ietf-quic-transport.md Outdated Show resolved Hide resolved
draft-ietf-quic-transport.md Outdated Show resolved Hide resolved
congestion controller and the RTT estimator are expected to adapt to the new
path. Generally, implementations are advised to be cautious when using previous
values on a new path.
unless the only change is the other endpoint's port number. Because
Copy link
Contributor

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

Yeah, I agree that it's consistent with the idea that the peer likely changed its attachment point. I don't think this makes a difference in practice, but it seems consistent with our principles here.

It does make it a bit more work to check, but it's not that hard.

Co-authored-by: Jana Iyengar <jri.ietf@gmail.com>
Co-authored-by: Jana Iyengar <jri.ietf@gmail.com>
@larseggert
Copy link
Member Author

I think this is good to go.

@janaiyengar janaiyengar merged commit 4c54fc3 into quicwg:master Sep 1, 2020
@larseggert larseggert deleted the 3842-list-resolution branch September 2, 2020 06:15
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
-transport design An issue that affects the design of the protocol; resolution requires consensus.
Projects
None yet
Development

Successfully merging this pull request may close these issues.

Do I need to reset congestion info when the port changes?