Re: [Ecn-in-quic] ECN ACK, bytes or packets

"De Schepper, Koen (Nokia - BE/Antwerp)" <koen.de_schepper@nokia-bell-labs.com> Fri, 08 December 2017 12:23 UTC

Return-Path: <koen.de_schepper@nokia-bell-labs.com>
X-Original-To: ecn-in-quic@ietfa.amsl.com
Delivered-To: ecn-in-quic@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 67C0E1200C1 for <ecn-in-quic@ietfa.amsl.com>; Fri, 8 Dec 2017 04:23:25 -0800 (PST)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: 0.069
X-Spam-Level:
X-Spam-Status: No, score=0.069 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, DKIM_SIGNED=0.1, DKIM_VALID=-0.1, HTML_MESSAGE=0.001, HTTPS_HTTP_MISMATCH=1.989, RCVD_IN_DNSWL_NONE=-0.0001, RCVD_IN_MSPIKE_H3=-0.01, RCVD_IN_MSPIKE_WL=-0.01, SPF_PASS=-0.001] autolearn=ham autolearn_force=no
Authentication-Results: ietfa.amsl.com (amavisd-new); dkim=pass (1024-bit key) header.d=nokia.onmicrosoft.com
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id 3hWZbpSi1u9k for <ecn-in-quic@ietfa.amsl.com>; Fri, 8 Dec 2017 04:23:20 -0800 (PST)
Received: from EUR01-DB5-obe.outbound.protection.outlook.com (mail-db5eur01on0123.outbound.protection.outlook.com [104.47.2.123]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-SHA384 (256/256 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id C52BB120724 for <ecn-in-quic@ietf.org>; Fri, 8 Dec 2017 04:23:19 -0800 (PST)
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=nokia.onmicrosoft.com; s=selector2-nokia-onmicrosoft-com; h=From:Date:Subject:Message-ID:Content-Type:MIME-Version; bh=CYRWtskc5BSWJoIM4e8a1eU6NAvrxUMDjsXcloqoOuk=; b=M7x2U/cycRIRevClY3vPs5PJIZPXpEauyJcNxAah0+553UO+pMdyJT21pfb83gVaA3WO0R5ovgCaHDxwoonMmp+rLG0/gvmQldqQ2kQI1nlaTjKqittEhllbNlGKDICvikzZesUw6ulU5MJe3vRw+RctGZljx5+PXigXRngKfPo=
Received: from VI1PR0701MB2126.eurprd07.prod.outlook.com (10.169.137.7) by VI1PR0701MB2127.eurprd07.prod.outlook.com (10.169.137.8) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA384_P256) id 15.20.323.4; Fri, 8 Dec 2017 12:23:16 +0000
Received: from VI1PR0701MB2126.eurprd07.prod.outlook.com ([fe80::cdaf:a817:467e:f10]) by VI1PR0701MB2126.eurprd07.prod.outlook.com ([fe80::cdaf:a817:467e:f10%16]) with mapi id 15.20.0323.004; Fri, 8 Dec 2017 12:23:16 +0000
From: "De Schepper, Koen (Nokia - BE/Antwerp)" <koen.de_schepper@nokia-bell-labs.com>
To: Ingemar Johansson S <ingemar.s.johansson@ericsson.com>, "Lubashev, Igor" <ilubashe@akamai.com>, Spencer Dawkins at IETF <spencerdawkins.ietf@gmail.com>
CC: "lars@netapp.com" <lars@netapp.com>, "ecn-in-quic@ietf.org" <ecn-in-quic@ietf.org>
Thread-Topic: [Ecn-in-quic] ECN ACK, bytes or packets
Thread-Index: AdNqhd/7J2ff7yARQUuuWTyqQ+SPBAACIz+AAATkCOAAALfbBwAF7C8AAAMmAYAAgzBhUADOb8DQ
Date: Fri, 08 Dec 2017 12:23:16 +0000
Message-ID: <VI1PR0701MB2126B618A4866AE2464AA626B9300@VI1PR0701MB2126.eurprd07.prod.outlook.com>
References: <DB4PR07MB3483D43052B690A6B2ADC24C2390@DB4PR07MB348.eurprd07.prod.outlook.com> <E13FA54B-5411-471D-BB92-5D6B73A660DC@netapp.com> <DB4PR07MB348E532123C1AEC5C5ED4C4C2390@DB4PR07MB348.eurprd07.prod.outlook.com> <58d0757662f14d2298c4d4c71e32aebc@usma1ex-dag1mb5.msg.corp.akamai.com> <CAKKJt-eJ1Du8tMuVANFTczGUHdKyDpkhm0Z1MjPFb=BkYNZe1g@mail.gmail.com> <5d5535dc6c3b45c09a271d61558d0f05@usma1ex-dag1mb5.msg.corp.akamai.com> <DB4PR07MB348CAFAEAB1C2B2D37EC273C23C0@DB4PR07MB348.eurprd07.prod.outlook.com>
In-Reply-To: <DB4PR07MB348CAFAEAB1C2B2D37EC273C23C0@DB4PR07MB348.eurprd07.prod.outlook.com>
Accept-Language: nl-BE, en-US
Content-Language: en-US
X-MS-Has-Attach:
X-MS-TNEF-Correlator:
x-originating-ip: [135.245.212.12]
x-ms-publictraffictype: Email
x-microsoft-exchange-diagnostics: 1; VI1PR0701MB2127; 6:dR0tmvsiUQjhnF9ZZjInSp8JmasQ2fdPR6Vf7WRgueMniQMvcWWGzoxABxqFBd3Rv+2B5VonFWEKazGJw+Yg2mia9oaHtgZ4SY7izhdT3noR/C1MFH1zM2m011b0O0y6PrmK2oNq6HfNOYnLElwPry1mCA/ykfZdxhhKRkqe/m8PWVqo8CxvepD8yBzVJjPdxNhCqq3CMkhsLrRRxMdPqN6iWTueOWNtH/RfnNbBh/0C4Kwijt506fe2kyNNjzHQHpq78TxAMssov1WXTLY3uOfuaHTFEEl6S2fx7Iu8Z41crTI4qa/OF8enKIF4B84VnabQoEZ23DBQRRvu2z09o5OBHrHoNOe9BTfKwjLJleU=; 5:wGdQO07bmRkTpp454CY8PrgoqfQQFnCoyH2dxzyStDcCns2c/98rDZ4wnzTFX/cRigT19pXJ2EzaIQKHCukty/+HfhrbBOYzHG7+neevKhheGym0JxiHbgfR6Fq+djMqhTMSFfdNuzOMsUBNqqlptVBejNtC1mT3Y5t+UJMkrFk=; 24:QQXYSrayz4Hg+Dvf82ATC3uyFzl6LpghQdjKpV5Yerr3eFLadnMYancemH+ECxEr6H02ysj8ioNYRI7H+M7GlFe6B4r7peJwblEelVVufPY=; 7:VN7KHFL2Igqi6LzC1qLoG6oVzHsmCEhOwzLh5Ko8YIhTb0xny+Gn5/S0fAsXtvskWidsHiD4hIfnWKOTyucaFoh3gdfWa1cami4sTcvTIxxa2PUck9EdIszcMWzcyw7fTJF/uOtDDE9TVOseSkMMZG0o5/hSKg/3r7YAxNFw0r5RwdZC5re62gc+ImL9/pFZfPrwxqXtqJRQmTL5pBW0X9KsHDRGbBjc//ubu0xn3c+WFg8BL/Ee9gxZmWELsKuV
x-ms-exchange-antispam-srfa-diagnostics: SSOS;
x-ms-office365-filtering-ht: Tenant
x-ms-office365-filtering-correlation-id: dcfe6870-587b-4e99-d09c-08d53e3675b4
x-microsoft-antispam: UriScan:; BCL:0; PCL:0; RULEID:(4534020)(4602075)(4627115)(201703031133081)(201702281549075)(48565401081)(5600026)(4604075)(2017052603307); SRVR:VI1PR0701MB2127;
x-ms-traffictypediagnostic: VI1PR0701MB2127:
authentication-results: spf=none (sender IP is ) smtp.mailfrom=koen.de_schepper@nokia-bell-labs.com;
x-microsoft-antispam-prvs: <VI1PR0701MB21276E49BADEED30D0FE87CAB9300@VI1PR0701MB2127.eurprd07.prod.outlook.com>
x-exchange-antispam-report-test: UriScan:(37575265505322)(10436049006162)(120809045254105)(166708455590820)(131327999870524)(21748063052155);
x-exchange-antispam-report-cfa-test: BCL:0; PCL:0; RULEID:(6040450)(2401047)(5005006)(8121501046)(3231022)(3002001)(93006095)(93001095)(10201501046)(6055026)(6041248)(20161123558100)(201703131423075)(201702281528075)(201703061421075)(201703061406153)(20161123564025)(20161123560025)(20161123555025)(20161123562025)(6072148)(201708071742011); SRVR:VI1PR0701MB2127; BCL:0; PCL:0; RULEID:(100000803101)(100110400095); SRVR:VI1PR0701MB2127;
x-forefront-prvs: 0515208626
x-forefront-antispam-report: SFV:NSPM; SFS:(10019020)(346002)(39860400002)(376002)(366004)(13464003)(199004)(189003)(24454002)(377424004)(54094003)(51914003)(8676002)(66066001)(229853002)(4001150100001)(230783001)(25786009)(81156014)(81166006)(236005)(99286004)(54896002)(74316002)(9686003)(55016002)(7736002)(6436002)(6306002)(7696005)(6506006)(53546010)(110136005)(54906003)(97736004)(606006)(8936002)(93886005)(86362001)(5250100002)(316002)(76176011)(2906002)(105586002)(3660700001)(3280700002)(33656002)(966005)(478600001)(102836003)(6116002)(790700001)(3846002)(14454004)(2950100002)(6246003)(4326008)(53936002)(68736007)(2900100001)(39060400002)(5660300001)(106356001)(90052001); DIR:OUT; SFP:1102; SCL:1; SRVR:VI1PR0701MB2127; H:VI1PR0701MB2126.eurprd07.prod.outlook.com; FPR:; SPF:None; PTR:InfoNoRecords; A:0; MX:1; LANG:en;
received-spf: None (protection.outlook.com: nokia-bell-labs.com does not designate permitted sender hosts)
spamdiagnosticoutput: 1:99
spamdiagnosticmetadata: NSPM
Content-Type: multipart/alternative; boundary="_000_VI1PR0701MB2126B618A4866AE2464AA626B9300VI1PR0701MB2126_"
MIME-Version: 1.0
X-OriginatorOrg: nokia-bell-labs.com
X-MS-Exchange-CrossTenant-Network-Message-Id: dcfe6870-587b-4e99-d09c-08d53e3675b4
X-MS-Exchange-CrossTenant-originalarrivaltime: 08 Dec 2017 12:23:16.5952 (UTC)
X-MS-Exchange-CrossTenant-fromentityheader: Hosted
X-MS-Exchange-CrossTenant-id: 5d471751-9675-428d-917b-70f44f9630b0
X-MS-Exchange-Transport-CrossTenantHeadersStamped: VI1PR0701MB2127
Archived-At: <https://mailarchive.ietf.org/arch/msg/ecn-in-quic/x279KLTQTPC7ET0h42fLW99ey0c>
X-Mailman-Approved-At: Fri, 08 Dec 2017 04:50:07 -0800
Subject: Re: [Ecn-in-quic] ECN ACK, bytes or packets
X-BeenThere: ecn-in-quic@ietf.org
X-Mailman-Version: 2.1.22
Precedence: list
List-Id: "ECN in the QUIC protocol discussion list." <ecn-in-quic.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/ecn-in-quic>, <mailto:ecn-in-quic-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/ecn-in-quic/>
List-Post: <mailto:ecn-in-quic@ietf.org>
List-Help: <mailto:ecn-in-quic-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/ecn-in-quic>, <mailto:ecn-in-quic-request@ietf.org?subject=subscribe>
X-List-Received-Date: Fri, 08 Dec 2017 12:23:25 -0000

Ingemar,
Sorry for the silence up to now. I have been looking at the quic draft in the mean time because I think the solution depends on this.
What I understood today is that ACKs for packets are send and partially resend for a moving range (with gaps) of packet sequence numbers. What we want to avoid is that the receiver has to play a game of Mastermind to reproduce the running counters... So I'm still not sure if we can use a delta counter that maps to the acked packets. I think an independent delta that is send once for the new delta can be sent, that needs to be acked, but I'm not sure if the retransmit scheme/scenarios is not going to be too complex. Also how to reproduce the not-ecn packets/bytes that maps to the other counters is also a potential painpoint.
Did anyone do some scenarios on these ideas already? Unless someone says I have a solution for all your worries I need to go through some detailed scenarios to convince myself.
Related to the packet / byte question, my intuition says keep them all the same. As we have a packet sequence number, we could also work with packet counters that map to this... for me getting very simply the probability is enough. I agree we should think further and having a generic flexible mechanisms is preferred, so packet counters are a good consensus. As the network should mark all packets with the same probability, counting marked packets should not be worse than counting bytes. I think it will also remove the ambiguity of whether only data bytes, or header bytes, or whatever need to be taken into account. If a sender needs to know how many data bytes were marked, he can reapply the calculated probability on whatever bytes he want to take into account (by a simple multiplication of bytes*p).
I also did some changes to the wiki description. I prefer the name capability "check", as "negotiation" sounds too complex for what it is. I think the structure could be to define a generic ecn-echo functionality in the receiver, which is the only receiver side functionality I think is needed. Then a first sender functionality which uses the receiver ecn-echo is the ecn capability check. I think we could also describe how an ecn based congestion control may make use of the generic ecn-echo to facilitate ecn experiments.
Regards,
Koen.


From: Ecn-in-quic [mailto:ecn-in-quic-bounces@ietf.org] On Behalf Of Ingemar Johansson S
Sent: Monday, December 4, 2017 9:23 AM
To: Lubashev, Igor <ilubashe@akamai.com>; Spencer Dawkins at IETF <spencerdawkins.ietf@gmail.com>
Cc: lars@netapp.com; ecn-in-quic@ietf.org
Subject: Re: [Ecn-in-quic] ECN ACK, bytes or packets

Hi

The bytes (or packets) counter or a bitmap that indicates which packets are marked e.g. CE topic was discussed earlier
https://github.com/quicwg/base-drafts/issues/805 and I interpret that discussion to be in favor of a counter even though no agreement was reached.
We need to settle this matter in a near future. The alternatives are

  1.  Bitmap that indicates CE marked packets
  2.  Counter for CE marked packets, mostly 1 octet. Variable-length integer encoding.
  3.  Counter for CE marked bytes, mostly, 1 or 2 octets, sometimes 4 octets. Variable-length integer encoding.
The counters indicate the delta increase

Regarding the necessity to count ECT(0) and ECT(1) packets, my take here is that it is a good to have to be able to monitor for possible odd and forbidden re-markings that makes ECN unreliable as a congestion signal. The cost is (mostly) one octet for ECT(0) and one octet for ECT(1).
It is of course possible to implement a single report per connection per path, It would save two bytes ACK+ECN overhead but I wonder if it makes the specification more complex ?.

/Ingemar


From: Lubashev, Igor [mailto:ilubashe@akamai.com]
Sent: den 1 december 2017 18:24
To: Spencer Dawkins at IETF <spencerdawkins.ietf@gmail.com<mailto:spencerdawkins.ietf@gmail.com>>
Cc: lars@netapp.com<mailto:lars@netapp.com>; Ingemar Johansson S <ingemar.s.johansson@ericsson.com<mailto:ingemar.s.johansson@ericsson.com>>; ecn-in-quic@ietf.org<mailto:ecn-in-quic@ietf.org>
Subject: RE: [Ecn-in-quic] ECN ACK, bytes or packets

Thanks for the links to draft-ietf-tsvwg-ecn-experimentation, Spencer.

Reading the draft, I still see only the endpoints setting ECT(0|1) codepoints and ECN-supporting routers (network elements) potentially changing that ECT(0|1) to CE codepoint.

Would an endpoint need any more feedback than “your ECT(0) and/or ECT(1) are getting through unbleached” (on this path)?  If the sender marks all outgoing packets with ECT(0|1), there is no need to have a feedback on ECT(0|1) per packet (i.e.. bitmap).  It seems sufficient to only report: “first packet on this path had ECT(0|1)”.  Also, as a failsafe, I’d have a single report (sent once per connection per path): “Although the first packet on this path had ECT(0|1), I just received a packet ‘number #’ on this path with a non-ECT codepoint (i.e. this path is not reliable for ECN)”.

Underlying assumptions for the above:
(a) nothing “out there” will change ECT(0) → ECT(1) or ECT(1) → ECT(0).
(b) Network elements either bleach both ECT(0) and ECT(1), or they do not bleach. If this assumption is incorrect, and we want to support endpoints that can decide to switch between ECT(0) and ECT(1) mid-connection, then a message “Reset ECN state for this path” would do the trick (the message would request the receiver to treat this packet as the first packet on the path).

If there is a need for anything more complex (and more chatty) regarding ECT(0|1), what could it be?


The bitmap in ACK_WITH_ECN frames that I had in mind was only for a feedback on packet groups with CE codepoints.


  *   Igor



From: Spencer Dawkins at IETF [mailto:spencerdawkins.ietf@gmail.com]
Sent: Friday, December 01, 2017 10:54 AM
To: Lubashev, Igor <ilubashe@akamai.com<mailto:ilubashe@akamai.com>>
Cc: lars@netapp.com<mailto:lars@netapp.com>; ingemar.s.johansson@ericsson.com<mailto:ingemar.s.johansson@ericsson.com>; ecn-in-quic@ietf.org<mailto:ecn-in-quic@ietf.org>
Subject: Re: [Ecn-in-quic] ECN ACK, bytes or packets

Hi, Igor,

On Fri, Dec 1, 2017 at 7:04 AM, Lubashev, Igor <ilubashe@akamai.com<mailto:ilubashe@akamai.com>> wrote:
I was thinking of doing my own cut at a draft, but I keep not finding a sufficiently large block of time for it. :-( So here are some thoughts I had.

1. We should neither report bytes nor packets for CE. Instead, we should have a frame ACK-WITH-CE which is just like ACK frame but also includes a bitmap to indicate which packet groups being ACKed had CE markers and which did not. That frame would only be used if any packets had CE makings.

Speaking as the AD for TSVWG - I sent https://datatracker.ietf.org/doc/draft-ietf-tsvwg-ecn-experimentation/<https://urldefense.proofpoint.com/v2/url?u=https-3A__datatracker.ietf.org_doc_draft-2Dietf-2Dtsvwg-2Decn-2Dexperimentation_&d=DwMFaQ&c=96ZbZZcaMF4w0F4jpN6LZg&r=Djn3bQ5uNJDPM_2skfL3rW1tzcIxyjUZdn_m55KPmlo&m=xg1zr0jOLWTjj-cSPLK_51Ha7SwkDwwx_qFhsVBRP70&s=SQGrmuSoLTXmMHbRi8L7-8M48zCS3eGPXaX4Qk-W-Ig&e=> to the RFC Editor three days ago, along with https://datatracker.ietf.org/doc/status-change-ecn-signaling-with-nonces-to-historic/<https://urldefense.proofpoint.com/v2/url?u=https-3A__datatracker.ietf.org_doc_status-2Dchange-2Decn-2Dsignaling-2Dwith-2Dnonces-2Dto-2Dhistoric_&d=DwMFaQ&c=96ZbZZcaMF4w0F4jpN6LZg&r=Djn3bQ5uNJDPM_2skfL3rW1tzcIxyjUZdn_m55KPmlo&m=xg1zr0jOLWTjj-cSPLK_51Ha7SwkDwwx_qFhsVBRP70&s=8mUV443N6WWYtpfO5wDDpQjmKrwatdoebuVlcC2puzs&e=>. These two actions mean that the original meaning of ECT(1) in RFC 3168 as "same as ECT(0)" has been deprecated. I'm betting that some QUIC folk have noticed that, and others may have not.

Asking as an individual - Ingemar was pretty careful in his note to distinguish between packet groups marked with ECT(0) and packet groups marked with ECT(1).  I'm reading "a bitmap" in your thought 1. and wondering if you meant "two bitmaps".

I'm not the one doing the work on ECN experiments (that's being handled by competent people), but my understanding is that we're likely to end up with standards-track interpretations of ECT(1) that aren't the same as the current interpretation of ECT(0), after an appropriate amount of experimenting, so I'd think it's better to track them separately in QUIC, from the beginning, if you're going to track them in QUIC.

Thanks,

Spencer, who is furiously trading hats while typing ....

2. For each new path, we emit a new frame bash to that path that confirms that ECN makings were present in the first packet from that path. That could be in the same packet as the "path probe". If suddenly we receive a packet with ECN bleached from a path that used to have ECN makings, we emit a frame to that effect.

It does not look like much of anything else is needed. The byte counts are not needed on the wire, since the endpoints know packet sizes they sent, so simply by knowing which packets had CE makings, they can compute bytes, if they desire. Also, the end points may wish to know when they can reply on ECN feedback and when not (ECN bits are reaching the other endpoint reliably or not). I doubt that we need to report that 37% of ECN packets are being bleached -- this is a highly unlikely situation and can be treated as a single bit "ECN is not reliable here" piece of information.

- Igor

-----Original Message-----
From: Ingemar Johansson S [ingemar.s.johansson@ericsson.com<mailto:ingemar.s.johansson@ericsson.com>]
Received: Friday, 01 Dec 2017, 7:46AM
To: Eggert, Lars [lars@netapp.com<mailto:lars@netapp.com>]
CC: ecn-in-quic@ietf.org<mailto:ecn-in-quic@ietf.org> [ecn-in-quic@ietf.org<mailto:ecn-in-quic@ietf.org>]
Subject: Re: [Ecn-in-quic] ECN ACK, bytes or packets
Hi
Yes, my intention was to highlight the use of variable-length integer encoding. Obviously it was not that clear 😊
/Ingemar

From: Eggert, Lars [mailto:lars@netapp.com<mailto:lars@netapp.com>]
Sent: den 1 december 2017 11:23
To: Ingemar Johansson S <ingemar.s.johansson@ericsson.com<mailto:ingemar.s.johansson@ericsson.com>>
Cc: ecn-in-quic@ietf.org<mailto:ecn-in-quic@ietf.org>
Subject: Re: [Ecn-in-quic] ECN ACK, bytes or packets

On 2017-12-1, at 11:02, Ingemar Johansson S <ingemar.s.johansson@ericsson.com<mailto:ingemar.s.johansson@ericsson.com>> wrote:
+ If the two tweaks above are possible then we would end up with something like
  + 1 byte for ECT(0), with the special 2 bit encoding we are then able to encode a delta of [0…63] ECT(0] marked packets
  + 1 byte for ECT(1), same encoding as above.
  + 2 or 4 bytes for CE, the most likely encoding that makes it possible to encode a delta of [0..16383] CE marked bytes or [0...2*30-1], the latter is more likely used with large MTU sizes and in some cases also when packets are densely marked (L4S)

We are going to varint encoding almost everywhere in QUIC; see https://quicwg.github.io/base-drafts/draft-ietf-quic-transport.html#rfc.section.8.1<https://urldefense.proofpoint.com/v2/url?u=https-3A__quicwg.github.io_base-2Ddrafts_draft-2Dietf-2Dquic-2Dtransport.html-23rfc.section.8.1&d=DwMGaQ&c=96ZbZZcaMF4w0F4jpN6LZg&r=Djn3bQ5uNJDPM_2skfL3rW1tzcIxyjUZdn_m55KPmlo&m=d15wMtMOmTxCnIazi4Jr0lWZR5Sz177mQ0wArW6A8nQ&s=aEFjIdCcgpaiWFkXrFryTqGXWCXKM5bvupRpY1ffvaU&e=>

Lars


_______________________________________________
Ecn-in-quic mailing list
Ecn-in-quic@ietf.org<mailto:Ecn-in-quic@ietf.org>
https://www.ietf.org/mailman/listinfo/ecn-in-quic<https://urldefense.proofpoint.com/v2/url?u=https-3A__www.ietf.org_mailman_listinfo_ecn-2Din-2Dquic&d=DwMFaQ&c=96ZbZZcaMF4w0F4jpN6LZg&r=Djn3bQ5uNJDPM_2skfL3rW1tzcIxyjUZdn_m55KPmlo&m=xg1zr0jOLWTjj-cSPLK_51Ha7SwkDwwx_qFhsVBRP70&s=X-ccQS2eWjWH-dTJk_qB0YzYsWfI5O8spUkfnJW7jOo&e=>