Re: [Ecn-in-quic] ECN ACK, bytes or packets

Ingemar Johansson S <ingemar.s.johansson@ericsson.com> Mon, 04 December 2017 08:23 UTC

Return-Path: <ingemar.s.johansson@ericsson.com>
X-Original-To: ecn-in-quic@ietfa.amsl.com
Delivered-To: ecn-in-quic@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 091101241F5 for <ecn-in-quic@ietfa.amsl.com>; Mon, 4 Dec 2017 00:23:30 -0800 (PST)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -2.231
X-Spam-Level:
X-Spam-Status: No, score=-2.231 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, DKIM_SIGNED=0.1, DKIM_VALID=-0.1, HTML_MESSAGE=0.001, HTTPS_HTTP_MISMATCH=1.989, RCVD_IN_DNSWL_MED=-2.3, RCVD_IN_MSPIKE_H3=-0.01, RCVD_IN_MSPIKE_WL=-0.01, SPF_PASS=-0.001] autolearn=ham autolearn_force=no
Authentication-Results: ietfa.amsl.com (amavisd-new); dkim=pass (1024-bit key) header.d=ericsson.onmicrosoft.com
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id fsEi8EDdKxXr for <ecn-in-quic@ietfa.amsl.com>; Mon, 4 Dec 2017 00:23:26 -0800 (PST)
Received: from sesbmg23.ericsson.net (sesbmg23.ericsson.net [193.180.251.37]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id E9BA2120046 for <ecn-in-quic@ietf.org>; Mon, 4 Dec 2017 00:23:25 -0800 (PST)
X-AuditID: c1b4fb25-7527a9c000000151-b0-5a2505fb9114
Received: from ESESSHC007.ericsson.se (Unknown_Domain [153.88.183.39]) by sesbmg23.ericsson.net (Symantec Mail Security) with SMTP id D4.88.00337.BF5052A5; Mon, 4 Dec 2017 09:23:23 +0100 (CET)
Received: from EUR02-AM5-obe.outbound.protection.outlook.com (153.88.183.145) by oa.msg.ericsson.com (153.88.183.39) with Microsoft SMTP Server (TLS) id 14.3.352.0; Mon, 4 Dec 2017 09:22:59 +0100
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=ericsson.onmicrosoft.com; s=selector1-ericsson-com; h=From:Date:Subject:Message-ID:Content-Type:MIME-Version; bh=oOXBzoAPwqhNmKpGeroQCPeY5PHrW64Sbw/e+EeG1yM=; b=CTxeE6i1a9KGCLHqR8tcC7zwkFw21S8bfZDjVlTR5wKNHwtyJmZRFaBuwN6cFf+PMHFJQcnR+SM+dVXNrkHSAZcKg7AXYVFE9yjF+WEAmgZXK+DYOlxmCALTE77mfl0SabMbcredenCaypFrq6PpqkQ/HOf3QMwCJouvZ/WZZvY=
Received: from DB4PR07MB348.eurprd07.prod.outlook.com (10.141.234.148) by DB4PR07MB348.eurprd07.prod.outlook.com (10.141.234.148) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA384_P256) id 15.20.282.3; Mon, 4 Dec 2017 08:22:57 +0000
Received: from DB4PR07MB348.eurprd07.prod.outlook.com ([fe80::e0fd:9f9f:e232:b301]) by DB4PR07MB348.eurprd07.prod.outlook.com ([fe80::e0fd:9f9f:e232:b301%16]) with mapi id 15.20.0282.010; Mon, 4 Dec 2017 08:22:57 +0000
From: Ingemar Johansson S <ingemar.s.johansson@ericsson.com>
To: "Lubashev, Igor" <ilubashe@akamai.com>, Spencer Dawkins at IETF <spencerdawkins.ietf@gmail.com>
CC: "lars@netapp.com" <lars@netapp.com>, "ecn-in-quic@ietf.org" <ecn-in-quic@ietf.org>
Thread-Topic: [Ecn-in-quic] ECN ACK, bytes or packets
Thread-Index: AdNqhd/7J2ff7yARQUuuWTyqQ+SPBAACIz+AAATkCOAAALfbBwAF7C8AAAMmAYAAgzBhUA==
Date: Mon, 04 Dec 2017 08:22:57 +0000
Message-ID: <DB4PR07MB348CAFAEAB1C2B2D37EC273C23C0@DB4PR07MB348.eurprd07.prod.outlook.com>
References: <DB4PR07MB3483D43052B690A6B2ADC24C2390@DB4PR07MB348.eurprd07.prod.outlook.com> <E13FA54B-5411-471D-BB92-5D6B73A660DC@netapp.com> <DB4PR07MB348E532123C1AEC5C5ED4C4C2390@DB4PR07MB348.eurprd07.prod.outlook.com> <58d0757662f14d2298c4d4c71e32aebc@usma1ex-dag1mb5.msg.corp.akamai.com> <CAKKJt-eJ1Du8tMuVANFTczGUHdKyDpkhm0Z1MjPFb=BkYNZe1g@mail.gmail.com> <5d5535dc6c3b45c09a271d61558d0f05@usma1ex-dag1mb5.msg.corp.akamai.com>
In-Reply-To: <5d5535dc6c3b45c09a271d61558d0f05@usma1ex-dag1mb5.msg.corp.akamai.com>
Accept-Language: sv-SE, en-US
Content-Language: en-US
X-MS-Has-Attach:
X-MS-TNEF-Correlator:
authentication-results: spf=none (sender IP is ) smtp.mailfrom=ingemar.s.johansson@ericsson.com;
x-originating-ip: [192.176.1.92]
x-ms-publictraffictype: Email
x-microsoft-exchange-diagnostics: 1; DB4PR07MB348; 6:alFxvtG4oTSKkbPcsJaGgSdaZQxyE0VIz5DfKNqEWocrA1leOgtxdXX6y+5cn/Fox2vF6uLDtHzYousQ1CTeY0wDxfbxRJugpSylZBAmsWaXdyNUJC+zdV2s/pEAUtaP16zAOqrhz08WZeFXnMinXHSbfMKQIwxxH8WkHIC0lR0Vs37GASv5E1r1t8OeyvEkTJbU+ygvfxWTL5nG5toQvN3pG+oW2SzsJp5YCr2KUwLxSUrn/7IXa0dflTpxSKWjKEmoZCSJqJJrLXH2oa5Xxv7vfhfkkiqjp9aL4PrkWzvV2OVbemt2wHG4LpGM6ipfILppdPcsqDW8UXKxoJoVyWfPsNb6v6Bwz3rGN4/5pDA=; 5:ATQfYUfgIWd1b83ofuwPsk0Q+SElm50/o7huYjTHjcFx6EVlokC9bElp6ystj0t3gKT7IORuAv2yX5V9OH+nwh/9uti9QlPotCHwXIlrK7IlDp9vOR8wpPDgxo/iOH3KgrxlAqTkFJTYn4g22BQWJb+S68JwEgllQzl5EQcNpE8=; 24:g/R1npniW2fXk4WRfGRrE1oDB64ocW2ksElp71ziybDX3v+O9aAIvMJwBDsDUw3JFhyi1/OUtH+DWOjRaF25VKKkemN52CwQAMUUfp612VI=; 7:OSQ9pIINKU4x4MDNZ6HwOnzvlXEb0RBt/vcy70kbxQiSlhNy5VZsT26ANgYtewjATjehqQP6id44djgbfCVuwDJrQNBuOH27Qb5fI4juhxLZFl1efbGsj5WvibQIpTMqMqKCFhcwSJHDDKk+rjtYnym/XbFtMnzNMgdJyoPqFRjTBddFLMEEjoG46CL4NdBdpBuOdzakYhh9loN5A1I263emN/Qvf3BPlubatEE/xlDN6F38+Dc+lEsdvC8rHhIx
x-ms-exchange-antispam-srfa-diagnostics: SSOS;
x-ms-office365-filtering-correlation-id: 8062d7ea-1728-4e20-e470-08d53af03998
x-microsoft-antispam: UriScan:; BCL:0; PCL:0; RULEID:(5600026)(4604075)(4534020)(4602075)(4627115)(201703031133081)(201702281549075)(2017052603286); SRVR:DB4PR07MB348;
x-ms-traffictypediagnostic: DB4PR07MB348:
x-microsoft-antispam-prvs: <DB4PR07MB348EF98646EC6B418FF8794C23C0@DB4PR07MB348.eurprd07.prod.outlook.com>
x-exchange-antispam-report-test: UriScan:(37575265505322)(10436049006162)(120809045254105)(166708455590820)(131327999870524)(227612066756510)(21748063052155);
x-exchange-antispam-report-cfa-test: BCL:0; PCL:0; RULEID:(6040450)(2401047)(5005006)(8121501046)(3231022)(10201501046)(3002001)(93006095)(93001095)(6041248)(20161123562025)(20161123555025)(20161123558100)(20161123564025)(20161123560025)(201703131423075)(201702281528075)(201703061421075)(201703061406153)(6072148)(201708071742011); SRVR:DB4PR07MB348; BCL:0; PCL:0; RULEID:(100000803101)(100110400095); SRVR:DB4PR07MB348;
x-forefront-prvs: 051158ECBB
x-forefront-antispam-report: SFV:NSPM; SFS:(10009020)(366004)(376002)(346002)(39860400002)(51914003)(377424004)(24454002)(199003)(13464003)(189002)(54094003)(229853002)(5250100002)(68736007)(6116002)(2900100001)(93886005)(99286004)(189998001)(2950100002)(74316002)(66066001)(966005)(33656002)(316002)(2906002)(25786009)(9326002)(86362001)(5660300001)(478600001)(14454004)(8936002)(4326008)(76176011)(6506006)(53936002)(3660700001)(606006)(105586002)(6436002)(106356001)(39060400002)(8676002)(230783001)(7696005)(4001150100001)(6246003)(81166006)(81156014)(97736004)(19609705001)(54356011)(790700001)(101416001)(9686003)(3846002)(102836003)(110136005)(54906003)(6306002)(3280700002)(54896002)(53546010)(7736002)(236005)(55016002); DIR:OUT; SFP:1101; SCL:1; SRVR:DB4PR07MB348; H:DB4PR07MB348.eurprd07.prod.outlook.com; FPR:; SPF:None; PTR:InfoNoRecords; A:1; MX:1; LANG:en;
received-spf: None (protection.outlook.com: ericsson.com does not designate permitted sender hosts)
spamdiagnosticoutput: 1:99
spamdiagnosticmetadata: NSPM
Content-Type: multipart/alternative; boundary="_000_DB4PR07MB348CAFAEAB1C2B2D37EC273C23C0DB4PR07MB348eurprd_"
MIME-Version: 1.0
X-MS-Exchange-CrossTenant-Network-Message-Id: 8062d7ea-1728-4e20-e470-08d53af03998
X-MS-Exchange-CrossTenant-originalarrivaltime: 04 Dec 2017 08:22:57.4895 (UTC)
X-MS-Exchange-CrossTenant-fromentityheader: Hosted
X-MS-Exchange-CrossTenant-id: 92e84ceb-fbfd-47ab-be52-080c6b87953f
X-MS-Exchange-Transport-CrossTenantHeadersStamped: DB4PR07MB348
X-OriginatorOrg: ericsson.com
X-Brightmail-Tracker: H4sIAAAAAAAAA02SfUhTURjGOzt321WaXKfmiybWzFJBzTLaH6MU+0OLIhBMRlRTLyr51b1q zUBWKoofWfg9y638YAqWivkRomx9qCCVJqSSWtNMSUMkEbU03Vngf7/3uc/7POceDo2lvUIX Oj4pleWSVAkykS1VFdl5zHdT6Kk83jCkkN/LbRLL72sMWD7/s5CSN5T24CAqtOSNHod2ayfF oXV164LQypXfosuU0lYRwybEp7Oc/5kbtnF5LbdTnpkFd8qX3DUoe1yQj2xoYAKhtL5emI9s aSnzGsHye4OYDP0IqoYbLAPFFGH43DqGd1ekTJkAyibOE9dXBNXjo5YsEaOARtMa2mVHhoWB tRnLAmYiYfFtt2iXHXb6RovyMPGcgqx3E0LCEVA9X2NhijkCrVOllhwJo4SOrA1MyrowrBuN ljIbJhw02c8tJsS4wfTaFEXKnGFiVmf9OQbqej5gwk6wMLMlJP5oWBkvEhL9EPwZMYsIu8GI rgDtlgFjFENO7Zg1yA9ePlpChC+C5umqdaEWQe6WjLA3dOvWKMLxMNOwhUlQDYK52e+UdcDw t3jZmnQQzHOF6CHy1e45OeFkMOkHRFrLFdjDYNUspUX0ju4NL175E8thKC34JibsBTmPn4j3 6nokbkJOPMtHJcaeOOnHcvHRPJ+c5JfEprahnVdlbN/07EKfFoNNiKGRbL8kDXsqpUJVOq9O NCGgscxRErRvR5LEqNQZLJd8nUtLYHkTcqUpmbNkMEyilDKxqlT2JsumsNz/rwLaxkWDNF88 An1/iB3UbR2Xau7OpK+PXlXXbMydtvsVGDBckes+HNIcmHmlvKSX5TyS7Yb8+hsLzR8VUZNx xQtyZ07d8mS71pAPY32rYdM2mef89ZUKbZSpM0MKhk2f6ObxxmuqiAvt7l6dR3EF/8A1vG8z 1j5EdyvY4HJWPbdxQL8to/g4VYAP5njVP5agNh5RAwAA
Archived-At: <https://mailarchive.ietf.org/arch/msg/ecn-in-quic/7t_NI_WXh8W2dTdXD7ppipBDC38>
Subject: Re: [Ecn-in-quic] ECN ACK, bytes or packets
X-BeenThere: ecn-in-quic@ietf.org
X-Mailman-Version: 2.1.22
Precedence: list
List-Id: "ECN in the QUIC protocol discussion list." <ecn-in-quic.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/ecn-in-quic>, <mailto:ecn-in-quic-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/ecn-in-quic/>
List-Post: <mailto:ecn-in-quic@ietf.org>
List-Help: <mailto:ecn-in-quic-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/ecn-in-quic>, <mailto:ecn-in-quic-request@ietf.org?subject=subscribe>
X-List-Received-Date: Mon, 04 Dec 2017 08:23:30 -0000

Hi

The bytes (or packets) counter or a bitmap that indicates which packets are marked e.g. CE topic was discussed earlier
https://github.com/quicwg/base-drafts/issues/805 and I interpret that discussion to be in favor of a counter even though no agreement was reached.
We need to settle this matter in a near future. The alternatives are

  1.  Bitmap that indicates CE marked packets
  2.  Counter for CE marked packets, mostly 1 octet. Variable-length integer encoding.
  3.  Counter for CE marked bytes, mostly, 1 or 2 octets, sometimes 4 octets. Variable-length integer encoding.
The counters indicate the delta increase

Regarding the necessity to count ECT(0) and ECT(1) packets, my take here is that it is a good to have to be able to monitor for possible odd and forbidden re-markings that makes ECN unreliable as a congestion signal. The cost is (mostly) one octet for ECT(0) and one octet for ECT(1).
It is of course possible to implement a single report per connection per path, It would save two bytes ACK+ECN overhead but I wonder if it makes the specification more complex ?.

/Ingemar


From: Lubashev, Igor [mailto:ilubashe@akamai.com]
Sent: den 1 december 2017 18:24
To: Spencer Dawkins at IETF <spencerdawkins.ietf@gmail.com>
Cc: lars@netapp.com; Ingemar Johansson S <ingemar.s.johansson@ericsson.com>; ecn-in-quic@ietf.org
Subject: RE: [Ecn-in-quic] ECN ACK, bytes or packets

Thanks for the links to draft-ietf-tsvwg-ecn-experimentation, Spencer.

Reading the draft, I still see only the endpoints setting ECT(0|1) codepoints and ECN-supporting routers (network elements) potentially changing that ECT(0|1) to CE codepoint.

Would an endpoint need any more feedback than “your ECT(0) and/or ECT(1) are getting through unbleached” (on this path)?  If the sender marks all outgoing packets with ECT(0|1), there is no need to have a feedback on ECT(0|1) per packet (i.e.. bitmap).  It seems sufficient to only report: “first packet on this path had ECT(0|1)”.  Also, as a failsafe, I’d have a single report (sent once per connection per path): “Although the first packet on this path had ECT(0|1), I just received a packet ‘number #’ on this path with a non-ECT codepoint (i.e. this path is not reliable for ECN)”.

Underlying assumptions for the above:
(a) nothing “out there” will change ECT(0) → ECT(1) or ECT(1) → ECT(0).
(b) Network elements either bleach both ECT(0) and ECT(1), or they do not bleach. If this assumption is incorrect, and we want to support endpoints that can decide to switch between ECT(0) and ECT(1) mid-connection, then a message “Reset ECN state for this path” would do the trick (the message would request the receiver to treat this packet as the first packet on the path).

If there is a need for anything more complex (and more chatty) regarding ECT(0|1), what could it be?


The bitmap in ACK_WITH_ECN frames that I had in mind was only for a feedback on packet groups with CE codepoints.


  *   Igor



From: Spencer Dawkins at IETF [mailto:spencerdawkins.ietf@gmail.com]
Sent: Friday, December 01, 2017 10:54 AM
To: Lubashev, Igor <ilubashe@akamai.com<mailto:ilubashe@akamai.com>>
Cc: lars@netapp.com<mailto:lars@netapp.com>; ingemar.s.johansson@ericsson.com<mailto:ingemar.s.johansson@ericsson.com>; ecn-in-quic@ietf.org<mailto:ecn-in-quic@ietf.org>
Subject: Re: [Ecn-in-quic] ECN ACK, bytes or packets

Hi, Igor,

On Fri, Dec 1, 2017 at 7:04 AM, Lubashev, Igor <ilubashe@akamai.com<mailto:ilubashe@akamai.com>> wrote:
I was thinking of doing my own cut at a draft, but I keep not finding a sufficiently large block of time for it. :-( So here are some thoughts I had.

1. We should neither report bytes nor packets for CE. Instead, we should have a frame ACK-WITH-CE which is just like ACK frame but also includes a bitmap to indicate which packet groups being ACKed had CE markers and which did not. That frame would only be used if any packets had CE makings.

Speaking as the AD for TSVWG - I sent https://datatracker.ietf.org/doc/draft-ietf-tsvwg-ecn-experimentation/<https://urldefense.proofpoint.com/v2/url?u=https-3A__datatracker.ietf.org_doc_draft-2Dietf-2Dtsvwg-2Decn-2Dexperimentation_&d=DwMFaQ&c=96ZbZZcaMF4w0F4jpN6LZg&r=Djn3bQ5uNJDPM_2skfL3rW1tzcIxyjUZdn_m55KPmlo&m=xg1zr0jOLWTjj-cSPLK_51Ha7SwkDwwx_qFhsVBRP70&s=SQGrmuSoLTXmMHbRi8L7-8M48zCS3eGPXaX4Qk-W-Ig&e=> to the RFC Editor three days ago, along with https://datatracker.ietf.org/doc/status-change-ecn-signaling-with-nonces-to-historic/<https://urldefense.proofpoint.com/v2/url?u=https-3A__datatracker.ietf.org_doc_status-2Dchange-2Decn-2Dsignaling-2Dwith-2Dnonces-2Dto-2Dhistoric_&d=DwMFaQ&c=96ZbZZcaMF4w0F4jpN6LZg&r=Djn3bQ5uNJDPM_2skfL3rW1tzcIxyjUZdn_m55KPmlo&m=xg1zr0jOLWTjj-cSPLK_51Ha7SwkDwwx_qFhsVBRP70&s=8mUV443N6WWYtpfO5wDDpQjmKrwatdoebuVlcC2puzs&e=>. These two actions mean that the original meaning of ECT(1) in RFC 3168 as "same as ECT(0)" has been deprecated. I'm betting that some QUIC folk have noticed that, and others may have not.

Asking as an individual - Ingemar was pretty careful in his note to distinguish between packet groups marked with ECT(0) and packet groups marked with ECT(1).  I'm reading "a bitmap" in your thought 1. and wondering if you meant "two bitmaps".

I'm not the one doing the work on ECN experiments (that's being handled by competent people), but my understanding is that we're likely to end up with standards-track interpretations of ECT(1) that aren't the same as the current interpretation of ECT(0), after an appropriate amount of experimenting, so I'd think it's better to track them separately in QUIC, from the beginning, if you're going to track them in QUIC.

Thanks,

Spencer, who is furiously trading hats while typing ....

2. For each new path, we emit a new frame bash to that path that confirms that ECN makings were present in the first packet from that path. That could be in the same packet as the "path probe". If suddenly we receive a packet with ECN bleached from a path that used to have ECN makings, we emit a frame to that effect.

It does not look like much of anything else is needed. The byte counts are not needed on the wire, since the endpoints know packet sizes they sent, so simply by knowing which packets had CE makings, they can compute bytes, if they desire. Also, the end points may wish to know when they can reply on ECN feedback and when not (ECN bits are reaching the other endpoint reliably or not). I doubt that we need to report that 37% of ECN packets are being bleached -- this is a highly unlikely situation and can be treated as a single bit "ECN is not reliable here" piece of information.

- Igor

-----Original Message-----
From: Ingemar Johansson S [ingemar.s.johansson@ericsson.com<mailto:ingemar.s.johansson@ericsson.com>]
Received: Friday, 01 Dec 2017, 7:46AM
To: Eggert, Lars [lars@netapp.com<mailto:lars@netapp.com>]
CC: ecn-in-quic@ietf.org<mailto:ecn-in-quic@ietf.org> [ecn-in-quic@ietf.org<mailto:ecn-in-quic@ietf.org>]
Subject: Re: [Ecn-in-quic] ECN ACK, bytes or packets
Hi
Yes, my intention was to highlight the use of variable-length integer encoding. Obviously it was not that clear 😊
/Ingemar

From: Eggert, Lars [mailto:lars@netapp.com<mailto:lars@netapp.com>]
Sent: den 1 december 2017 11:23
To: Ingemar Johansson S <ingemar.s.johansson@ericsson.com<mailto:ingemar.s.johansson@ericsson.com>>
Cc: ecn-in-quic@ietf.org<mailto:ecn-in-quic@ietf.org>
Subject: Re: [Ecn-in-quic] ECN ACK, bytes or packets

On 2017-12-1, at 11:02, Ingemar Johansson S <ingemar.s.johansson@ericsson.com<mailto:ingemar.s.johansson@ericsson.com>> wrote:
+ If the two tweaks above are possible then we would end up with something like
  + 1 byte for ECT(0), with the special 2 bit encoding we are then able to encode a delta of [0…63] ECT(0] marked packets
  + 1 byte for ECT(1), same encoding as above.
  + 2 or 4 bytes for CE, the most likely encoding that makes it possible to encode a delta of [0..16383] CE marked bytes or [0...2*30-1], the latter is more likely used with large MTU sizes and in some cases also when packets are densely marked (L4S)

We are going to varint encoding almost everywhere in QUIC; see https://quicwg.github.io/base-drafts/draft-ietf-quic-transport.html#rfc.section.8.1<https://urldefense.proofpoint.com/v2/url?u=https-3A__quicwg.github.io_base-2Ddrafts_draft-2Dietf-2Dquic-2Dtransport.html-23rfc.section.8.1&d=DwMGaQ&c=96ZbZZcaMF4w0F4jpN6LZg&r=Djn3bQ5uNJDPM_2skfL3rW1tzcIxyjUZdn_m55KPmlo&m=d15wMtMOmTxCnIazi4Jr0lWZR5Sz177mQ0wArW6A8nQ&s=aEFjIdCcgpaiWFkXrFryTqGXWCXKM5bvupRpY1ffvaU&e=>

Lars


_______________________________________________
Ecn-in-quic mailing list
Ecn-in-quic@ietf.org<mailto:Ecn-in-quic@ietf.org>
https://www.ietf.org/mailman/listinfo/ecn-in-quic<https://urldefense.proofpoint.com/v2/url?u=https-3A__www.ietf.org_mailman_listinfo_ecn-2Din-2Dquic&d=DwMFaQ&c=96ZbZZcaMF4w0F4jpN6LZg&r=Djn3bQ5uNJDPM_2skfL3rW1tzcIxyjUZdn_m55KPmlo&m=xg1zr0jOLWTjj-cSPLK_51Ha7SwkDwwx_qFhsVBRP70&s=X-ccQS2eWjWH-dTJk_qB0YzYsWfI5O8spUkfnJW7jOo&e=>