Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

Do not reset pto_count on Initial ACKs #3551

Merged
merged 23 commits into from
Apr 19, 2020
Merged
Changes from all commits
Commits
Show all changes
23 commits
Select commit Hold shift + click to select a range
File filter

Filter by extension

Filter by extension

Conversations
Failed to load comments.
Loading
Jump to
Jump to file
Failed to load files.
Loading
Diff view
Diff view
17 changes: 14 additions & 3 deletions draft-ietf-quic-recovery.md
Original file line number Diff line number Diff line change
Expand Up @@ -500,8 +500,15 @@ packet on a PTO expiration before confirming that the server is able to decrypt
0-RTT packets, and prevents a server from sending a 1-RTT packet on a PTO
expiration before it has the keys to process an acknowledgement.

When a PTO timer expires, the PTO period MUST be set to twice its current
value. This exponential reduction in the sender's rate is important because
When a PTO timer expires, the PTO backoff MUST be increased, resulting in the
PTO period being set to twice its current value. The PTO period is set based
on the latest RTT information after receiving an acknowledgement. The PTO
backoff is reset upon receiving an acknowledgement unless it's a client unsure
if the the server has validated the client's address. Not resetting the backoff
during peer address validation ensures the client's anti-deadlock timer is not
set too aggressively when the server is slow in responding with handshake data.

This exponential reduction in the sender's rate is important because
consecutive PTOs might be caused by loss of packets or acknowledgements due to
severe congestion. Even when there are ack-eliciting packets in-flight in
multiple packet number spaces, the exponential increase in probe timeout
Expand Down Expand Up @@ -1147,7 +1154,10 @@ OnAckReceived(ack, pn_space):
OnPacketsLost(lost_packets)
OnPacketsAcked(newly_acked_packets)

pto_count = 0
// Reset pto_count unless the client is unsure if
// the server has validated the client's address.
if (PeerCompletedAddressValidation()):
pto_count = 0
SetLossDetectionTimer()
Copy link
Contributor

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

Should this also be done only when pto_count is set to 0? Why restart the timer here if the pto_count hasn't changed?

Copy link
Contributor Author

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

A new RTT measurement is available, so the alarm value should always be updated.



Expand Down Expand Up @@ -1527,6 +1537,7 @@ OnPacketNumberSpaceDiscarded(pn_space):
// Reset the loss detection and PTO timer
time_of_last_sent_ack_eliciting_packet[kPacketNumberSpace] = 0
loss_time[pn_space] = 0
pto_count = 0
SetLossDetectionTimer()
~~~

Expand Down