Hi! Thanks for the quick response. Below is a bit more editorial back-and-forth for small number of issues. All of the other discussion removed from the thread made sense for the future -06 that can go to IETF LC.
> -----Original Message----- > From: Paul Wouters <p...@nohats.ca> > Sent: Wednesday, March 20, 2024 12:26 AM > To: Roman Danyliw <r...@cert.org> > Cc: ipsec@ietf.org > Subject: Re: [IPsec] AD Review of draft-ietf-ipsecme-multi-sa-performance-05 > > Warning: External Sender - do not click links or open attachments unless you > recognize the sender and know the content is safe. > > > On Tue, 19 Mar 2024, Roman Danyliw wrote: > > > I performed an AD review of draft-ietf-ipsecme-multi-sa-performance-05. I > have a mostly editorial feedback below: > > [snip] > And answering that: > > Most IPsec implementations are currently limited to using one > hardware queue or a single CPU resource for a Child SA. Paralyzing > the packet encryption can be done, but there is a bottleneck of > different parts of the hardware locking or waiting to get their > sequence number assigned for the packet it is enrypting. The > result is that a machine with many such resources is limited to > only using one of these resources per Child SA. This severely > limits the throughput that can be attained. For example, at the > time of writing, an unencrypted link of 10Gbps or more is commonly > reduced to 2-5Gbps when IPsec is used to encrypt the link using > AES-GCM. By using the implementation specified in this document, > aggregate throughput increased from 5Gbps using 1 CPU to 40-60 > Gbps using 25-30 CPUs. Maybe s/Paralyzing the packet encryption/Running packet steam encryption in parallel/ Also. s/enrypting/encrypting/. Otherwise, LGTM. [snip] > > ** Section 4. Is this section normative? Why are RFC2119 key words used in > an example? > > Why do you say this is an example? It is the Implementation Considerations > section telling you to do or do not some things? ==[ snip ]== There are various considerations that an implementation can use to determine the best way to install multiple Child SAs. Below are examples of such strategies. ==[ snip ]== I inferred this text to be non-normative and only examples because the second sentence said these were "examples". Maybe just drop that second sentence to eliminate confusion? > > ** Section 6. > > Peers SHOULD be lenient with the maximum number of Child SAs they > > allow for a given TSi/TSr combination to account for corner cases. > > > > What does “lenient” mean here? > > "account for corner cases" as explained further done? > > Eg one should not use a hard max of 4 when one runs on a 4-CPU system. Consider if "flexible" is what you want here instead. Roman _______________________________________________ IPsec mailing list IPsec@ietf.org https://www.ietf.org/mailman/listinfo/ipsec