All of these were resolved in -06

Paul

Sent using a virtual keyboard on a phone

> On Mar 20, 2024, at 15:33, Roman Danyliw <r...@cert.org> wrote:
> 
> Hi!
> 
> Thanks for the quick response.  Below is a bit more editorial back-and-forth 
> for small number of issues.  All of the other discussion removed from the 
> thread made sense for the future -06 that can go to IETF LC.
> 
>> -----Original Message-----
>> From: Paul Wouters <p...@nohats.ca>
>> Sent: Wednesday, March 20, 2024 12:26 AM
>> To: Roman Danyliw <r...@cert.org>
>> Cc: ipsec@ietf.org
>> Subject: Re: [IPsec] AD Review of draft-ietf-ipsecme-multi-sa-performance-05
>> 
>> Warning: External Sender - do not click links or open attachments unless you
>> recognize the sender and know the content is safe.
>> 
>> 
>>> On Tue, 19 Mar 2024, Roman Danyliw wrote:
>>> 
>>> I performed an AD review of draft-ietf-ipsecme-multi-sa-performance-05.  I
>> have a mostly editorial feedback below:
>>> 
> 
> [snip]
> 
>> And answering that:
>> 
>>        Most IPsec implementations are currently limited to using one
>>        hardware queue or a single CPU resource for a Child SA. Paralyzing
>>        the packet encryption can be done, but there is a bottleneck of
>>        different parts of the hardware locking or waiting to get their
>>        sequence number assigned for the packet it is enrypting. The
>>        result is that a machine with many such resources is limited to
>>        only using one of these resources per Child SA. This severely
>>        limits the throughput that can be attained. For example, at the
>>        time of writing, an unencrypted link of 10Gbps or more is commonly
>>        reduced to 2-5Gbps when IPsec is used to encrypt the link using
>>        AES-GCM. By using the implementation specified in this document,
>>        aggregate throughput increased from 5Gbps using 1 CPU to 40-60
>>        Gbps using 25-30 CPUs.
> 
> Maybe s/Paralyzing the packet encryption/Running packet steam encryption in 
> parallel/
> 
> Also.  s/enrypting/encrypting/.
> 
> Otherwise, LGTM.
> 
> [snip]
> 
>>> ** Section 4.  Is this section normative?  Why are RFC2119 key words used in
>> an example?
>> 
>> Why do you say this is an example? It is the Implementation Considerations
>> section telling you to do or do not some things?
> 
> ==[ snip ]==
>   There are various considerations that an implementation can use to
>   determine the best way to install multiple Child SAs.  Below are
>   examples of such strategies.
> ==[ snip ]==
> 
> I inferred this text to be non-normative and only examples because the second 
> sentence said these were "examples".  Maybe just drop that second sentence to 
> eliminate confusion?
> 
>>> ** Section 6.
>>>  Peers SHOULD be lenient with the maximum number of Child SAs they
>>>  allow for a given TSi/TSr combination to account for corner cases.
>>> 
>>> What does “lenient” mean here?
>> 
>> "account for corner cases" as explained further done?
>> 
>> Eg one should not use a hard max of 4 when one runs on a 4-CPU system.
> 
> Consider if "flexible" is what you want here instead.
> 
> Roman
> _______________________________________________
> IPsec mailing list
> IPsec@ietf.org
> https://www.ietf.org/mailman/listinfo/ipsec

_______________________________________________
IPsec mailing list
IPsec@ietf.org
https://www.ietf.org/mailman/listinfo/ipsec

Reply via email to