Re: [iccrg] [CCWG] [tsvwg] New Internet Draft: Congestion Signaling (CSIG)

Christian Huitema <huitema@huitema.net> Tue, 20 February 2024 21:29 UTC

Return-Path: <huitema@huitema.net>
X-Original-To: iccrg@ietfa.amsl.com
Delivered-To: iccrg@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id DE169C14F689 for <iccrg@ietfa.amsl.com>; Tue, 20 Feb 2024 13:29:49 -0800 (PST)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -1.909
X-Spam-Level:
X-Spam-Status: No, score=-1.909 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, RCVD_IN_ZEN_BLOCKED_OPENDNS=0.001, SPF_HELO_NONE=0.001, SPF_PASS=-0.001, T_SCC_BODY_TEXT_LINE=-0.01] autolearn=unavailable autolearn_force=no
Received: from mail.ietf.org ([50.223.129.194]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id hATLBIzVtosr for <iccrg@ietfa.amsl.com>; Tue, 20 Feb 2024 13:29:49 -0800 (PST)
Received: from out12-27.antispamcloud.com (out12-27.antispamcloud.com [185.201.16.27]) (using TLSv1.3 with cipher TLS_AES_256_GCM_SHA384 (256/256 bits) key-exchange X25519 server-signature RSA-PSS (2048 bits) server-digest SHA256) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id 91A63C14F736 for <iccrg@irtf.org>; Tue, 20 Feb 2024 13:29:48 -0800 (PST)
Received: from xse264.mail2web.com ([66.113.197.10] helo=xse.mail2web.com) by mx198.antispamcloud.com with esmtp (Exim 4.92) (envelope-from <huitema@huitema.net>) id 1rcXgM-00FbRZ-CN for iccrg@irtf.org; Tue, 20 Feb 2024 22:29:45 +0100
Received: from xsmtp21.mail2web.com (unknown [10.100.68.60]) by xse.mail2web.com (Postfix) with ESMTPS id 4TfXc36gMQz5c5 for <iccrg@irtf.org>; Tue, 20 Feb 2024 13:29:39 -0800 (PST)
Received: from [10.5.2.18] (helo=xmail08.myhosting.com) by xsmtp21.mail2web.com with esmtps (TLS1.0:DHE_RSA_AES_256_CBC_SHA1:256) (Exim 4.92) (envelope-from <huitema@huitema.net>) id 1rcXgJ-00043y-Pq for iccrg@irtf.org; Tue, 20 Feb 2024 13:29:39 -0800
Received: (qmail 6764 invoked from network); 20 Feb 2024 21:29:39 -0000
Received: from unknown (HELO [192.168.1.101]) (Authenticated-user:_huitema@huitema.net@[172.56.201.10]) (envelope-sender <huitema@huitema.net>) by xmail08.myhosting.com (qmail-ldap-1.03) with ESMTPA for <moeller0=40gmx.de@dmarc.ietf.org>; 20 Feb 2024 21:29:39 -0000
Message-ID: <1a0c5375-0c5a-4c99-aff1-2367e1b77188@huitema.net>
Date: Tue, 20 Feb 2024 13:29:38 -0800
MIME-Version: 1.0
User-Agent: Mozilla Thunderbird
Content-Language: en-US
To: Sebastian Moeller <moeller0=40gmx.de@dmarc.ietf.org>, Tom Herbert <tom@herbertland.com>
Cc: ccwg@ietf.org, iccrg IRTF list <iccrg@irtf.org>
References: <CAF0+TDD+44TAHf7y05GzmCgbau66ey7AU2RaVroim_Tukf=7nQ@mail.gmail.com> <CALx6S35V8xyDBkN0m8kDEcNk0N734Fqq0Ne8ZJ284ZnSSUwV9w@mail.gmail.com> <CALx6S35XNyBe5=gh7JpaCKEkiXaEwPGHrDZe=E-EPkiF5mUCLA@mail.gmail.com> <CAB_+Fg5McYXt=M5MNkuxHrKrXQgZMS6PLRoVeUKiSUe5Qb7LjA@mail.gmail.com> <CALx6S35OHyhWjmkV2jiOqO-sB9Csugx0umB_yF_ann9rB8Tgbw@mail.gmail.com> <CAEsRLK9_bHrhyvFqCz3do=Ax3mKZor4EtqXY2chdfL7fzi1UMw@mail.gmail.com> <500388A6-50D3-4535-84CB-E6EF454960DD@gmx.de> <CALx6S37gOatLC_DZiM4M=e8qrzyE9y1D1i+UqOYXatd7Y6Nauw@mail.gmail.com> <918C1325-EC13-48CF-9B29-50EEB3A0FF1C@gmx.de> <CALx6S37zGrNMai+9khwG2_rpsiQuTd8bSiWbxZK-oiVEB0aimQ@mail.gmail.com> <A68A0319-7942-482D-A395-BB72901B2EA7@gmx.de> <CALx6S36AON6GkPLLcBVaq1uKxaRwgvc-txCkb9PCyX0DGs7ktw@mail.gmail.com> <4E3C7A28-C810-4420-A799-81ACC320A5D2@gmx.de> <9a0b8228-ed26-431c-92df-03a29d5f1a0d@huitema.net> <CALx6S35OJi0p8rSiHWyhGvmkZLKdrAKO3R=O=bgOjHaWQrWQ0Q@mail.gmail.com> <EE631A7E-2CAF-4CCC-8932-AED83B4611C0@gmx.de>
From: Christian Huitema <huitema@huitema.net>
Autocrypt: addr=huitema@huitema.net; keydata= xjMEXtavGxYJKwYBBAHaRw8BAQdA1ou9A5MHTP9N3jfsWzlDZ+jPnQkusmc7sfLmWVz1RmvN J0NocmlzdGlhbiBIdWl0ZW1hIDxodWl0ZW1hQGh1aXRlbWEubmV0PsKWBBMWCAA+FiEEw3G4 Nwi4QEpAAXUUELAmqKBYtJQFAl7WrxsCGwMFCQlmAYAFCwkIBwIGFQoJCAsCBBYCAwECHgEC F4AACgkQELAmqKBYtJQbMwD/ebj/qnSbthC/5kD5DxZ/Ip0CGJw5QBz/+fJp3R8iAlsBAMjK r2tmyWyJz0CUkVG24WaR5EAJDvgwDv8h22U6QVkAzjgEXtavGxIKKwYBBAGXVQEFAQEHQJoM 6MUAIqpoqdCIiACiEynZf7nlJg2Eu0pXIhbUGONdAwEIB8J+BBgWCAAmFiEEw3G4Nwi4QEpA AXUUELAmqKBYtJQFAl7WrxsCGwwFCQlmAYAACgkQELAmqKBYtJRm2wD7BzeK5gEXSmBcBf0j BYdSaJcXNzx4yPLbP4GnUMAyl2cBAJzcsR4RkwO4dCRqM9CHpVJCwHtbUDJaa55//E0kp+gH
In-Reply-To: <EE631A7E-2CAF-4CCC-8932-AED83B4611C0@gmx.de>
Content-Type: text/plain; charset="UTF-8"; format="flowed"
Content-Transfer-Encoding: 8bit
X-Originating-IP: 66.113.197.10
X-Spampanel-Domain: xsmtpout.mail2web.com
X-Spampanel-Username: 66.113.197.0/24
Authentication-Results: antispamcloud.com; auth=pass smtp.auth=66.113.197.0/24@xsmtpout.mail2web.com
X-Spampanel-Outgoing-Class: unsure
X-Spampanel-Outgoing-Evidence: Combined (0.15)
X-Recommended-Action: accept
X-Filter-ID: Pt3MvcO5N4iKaDQ5O6lkdGlMVN6RH8bjRMzItlySaT9WLQux0N3HQm8ltz8rnu+BPUtbdvnXkggZ 3YnVId/Y5jcf0yeVQAvfjHznO7+bT5w+l1HCI8x+wxEVYBevltPWfYzfQXcfqmra3dmoHS4yggWG V6PHdqG71vJRREHAwPZWuRWrkPihq53YqAd1ENNqBHtNXu1E6L4+KyOXc4QYanQOD0r6/AaHZiEt dTMtMlia0Lmg/jgHfCNZd+W+PXf6JmfN+YlJilxxGdGNGFIyDyue9TLOhN8AYRsvkjfngQAulkLr ZlEU8101IX7GfEqqzDkBvlIN1pUDU5DU5DggD98cjIN3reG9z0FKKQ5m2Qpw7sOVVcM1Xk+Tdz6g /UMvfWqyN3veeFIMJz/vumcqAwMU9kjfE7EFo+kP5riIEUmxU01QhuxnshSbl6nxbLZ35/xY0uvo WBEOfzq3RG28wI7w4vcwqZanLHsZM8r4s5ZjlHoGly8aneNxj+pRyx6DFxVLaXQjMXzVZeSmCuLu +pFVgpT1b21uZVckGp0ccOZtuBWXiK6eoWgQZnNLL6SbpUc7peFeo3eDQNYbhOKhzzgqmaDn5SlD Y9mmtv6e91aWBLor1oCWetcUjeG94V2Xwjb64m80GnYBqrGs4n61xaiAlYYaFqnct5lnX0MEblqZ AjRPlxCS9ELuxExp/qmFEnFzsC48bTEFY06/YbB87Ww8G0LoS8V3Mt1pta8qAcLtCB3G1CwpaI3Z 4ESkMWDVJEenxBoIht3V0nekAoxXAkSQgoN6AdkxLEuoXgOnRkuyuLfHqAnAj7rgKH7+eCmmteGP IZVjIIStJL5FGH43BVShcA6Xvva2QAVEjpqzANap+28aWyCRVT7YkY7LckVcBwH0mGt7Fx15DxTM gEkSur13qFZSq8Fx+9otn0aqja8VKPqpdskk5LxBR/9t1zMMkdu6/R2FM84kxYRFSvC1IDg1BRW7 hzp8w3iHcOwbVtsmWfnQGGis4EvbR3jXsI0ESXwhBU2hwt/J18C+HygJl/jEzm1SsR8v3aJbN/NZ fa8pHhHaz+HPa0HAgEx4sWDF
X-Report-Abuse-To: spam@quarantine14.antispamcloud.com
Archived-At: <https://mailarchive.ietf.org/arch/msg/iccrg/ahNSTW3ukDXajl3CLuVLhbfGh1M>
Subject: Re: [iccrg] [CCWG] [tsvwg] New Internet Draft: Congestion Signaling (CSIG)
X-BeenThere: iccrg@irtf.org
X-Mailman-Version: 2.1.39
Precedence: list
List-Id: "Discussions of Internet Congestion Control Research Group \(ICCRG\)" <iccrg.irtf.org>
List-Unsubscribe: <https://mailman.irtf.org/mailman/options/iccrg>, <mailto:iccrg-request@irtf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/iccrg/>
List-Post: <mailto:iccrg@irtf.org>
List-Help: <mailto:iccrg-request@irtf.org?subject=help>
List-Subscribe: <https://mailman.irtf.org/mailman/listinfo/iccrg>, <mailto:iccrg-request@irtf.org?subject=subscribe>
X-List-Received-Date: Tue, 20 Feb 2024 21:29:50 -0000

Trimming the CC list, because there is not much point discussing this 
outside of ICCRG and CCWG. And spamming is bad.

On 2/20/2024 12:34 PM, Sebastian Moeller wrote:
> Hi Tom,
> 
> 
>> On 20. Feb 2024, at 21:26, Tom Herbert <tom@herbertland.com> wrote:
>>
>> On Tue, Feb 20, 2024 at 12:09 PM Christian Huitema <huitema@huitema.net> wrote:
>>>
>>>
>>>
>>> On 2/20/2024 9:55 AM, Sebastian Moeller wrote:
>>>>> That's more of a statement of security and not feasibility. There's simply no security in the Internet, so we cannot trust or validate that anonymous intermediate nodes are going to write correct information. Any plain text in a packet on the Internet is subject to inspection and modification if the data isn't authenticated, and in the worst case this could be a DoS vector by writing bad information.
>>>> [SM3] Indeed, but e.g. for TCP you would need to know a lot about the most recent packet to be able to play games, no? So either you are on path and already can drop/duplicate packets at will or you are off path but still need a recent enough veridical packet to be able cause mischief, no? (I might be insufficiently creative in attack vectors)
>>>
>>> I am analysis congestion control information using the framework of
>>> "honest signals". In human communication, "honest signals" are those
>>> that cannot be easily faked by the communicator. For example, smiling is
>>> not really a honest signal, because it is easy to fake; blushing, on the
>>> other hand, is hard to fake.
>>>
>>> When it come to Internet wide congestion control, we have pretty much
>>> the same issue. Networks may want to fool the application for a variety
>>> of reasons, and may start faking congestion signals. Some of these
>>> signals are hard to fake. End to end data rate for example: slowing a
>>> specific stream of packets is hard to fake; measuring the end to end
>>> data rate is a pretty good indication of the state of the network. End
>>> to end RTT is also a rather honest signal: yes, routers could put some
>>> specific packets in a slow queue, but that requires resource.

To answer Sebastian's point about BBR: yes BBRv1 was only looking at 
data rate and delays, and that did not work well with some specific AQM 
that used packet loss to indicate when a flow was exceeding its target 
rate. As far as my test show, that's fixed in BBRv3, which does monitor 
packet losses.

>>> Packet losses almost belong in that category. They are not hard to fake,
>>> routers could play favorites and selectively drop packets with a certain
>>> profile. But dropping too many packets affects the "quality rating" of a
>>> provider, so there is some pressure to not fake it. That pressure is
>>> probably one of the reasons behind bufferbloat. The main problem with
>>> packet loss as a signal is that losses may have other causes than
>>> congestion.
>>>
>>> ECN is not really a honest signal. Setting a bit in a packet header does
>>> not require a lot of efforts, so routers could do that to play
>>> favorites. In fact, past bugs in some networks caused almost all packets
>>> to be marked as CE. Using ECN is very nice when you can trust it, but
>>> end nodes should probably do that cautiously, detecting for example a
>>> sudden raise in ECN marks rather than reacting to an average value.
>>>
>>> ECN is just one bit. There is always a temptation to do a better ECN
>>> with many more bits. For example, CE directs a sender to slow down. It
>>> would be nice to have a corresponding "All clear" signal telling the
>>> senders that they can speed up. L4S attempts to do that by modulating
>>> the CE bit, so that a low frequency kinda indicates "all clear", while a
>>> high frequency says "slow down", and give some indication of how much.
>>> Suddenly, one bit becomes several bits, just spread over many packets.
>>>
>>> The idea of adding more bits in packet headers is not exactly new -- see
>>> for example TCP QUIC Start by Sally Floyd et al., RFC 4782, January
>>> 2007. The problem is that the more bits you add, the more you exacerbate
>>> issues of trust, and also risks of bugs. "Many more bits" may work in a
>>> controlled environment, but I really do not see that working on the
>>> whole Internet.
>>
>> Hi Christian,
>>
>> Do you know what the state of ECN deployment over the Internet is?
> 
> [SM5] Nobody knows exactly, but quite a lot of Linux servers use the LInux defaults and will use ECN if the client negotiates it. In my qdisc statistics I routinely see not only drops, but also CE marks logged (from my AQM).... so believe it or not, ECN over the internet mostly works...

QUIC implementations test whether the ECN signals are passed end to end. 
They used to be blanched by many networks or hosters, but that has 
markedly improved over the last years.

>> It seems to me that if someone is sending to an arbitrary host over the
>> Internet they're already pretty much accepting "best effort" service:
> 
> [SM5] Not sure about the US, but that is all ISPs offer to end users over here... but ECN works well even over a best effort internet access link in my personal experience.
>   
>> long latencies and with potentially high variance, such that getting
>> fined grained congestion information from intermediate routers, even
>> if it's honest, probably doesn't add much to the information that we
>> can derive from packet loss or measuring RTT with no additional
>> mechanisms or implementation.
> 
> [SM5] How can you come to that conclusion without ever trying?

+1

I think our goal really ought to be, low latency by default. Hopefully, 
we see efforts to develop metrics like "transaction by second" that 
should push network providers to noy just optimize for max throughput.


>> The situation is very different in a limited domain which could
>> include large service provider networks.
> 
> [SM5] Indeed, papers discussion 'better congestion signalling' often come out of those environments. But IMHO not because these methods only help in those environments, but that this is where people are willing to spend the money to test and implement potential solutions.
> 
> Sebastian
> 
>> In that case more information
>> is good, it's easier to provide security so we can trust the
>> information, and we're not restricted to just one or two bits of
>> information to carry the information in a packet. This is also where I
>> see host-to-network signaling being useful-- this allows applications
>> to request QoS for their packets

I am less sanguine about "it is easier to provide security". If it were, 
we would have networks implementing BCP 38 by now, we have just waited 
for 26 year since RFC 2267.

Sebastian mentions that "since L4S is modulating the ECN bit to carry 
more information, the multi-bit ECN is already out there, so we should 
do it right". And yes, I can believe that 4 bits instead of 1 would 
provide better feedback. But on the other end, it took many years to get 
networks to not blanch the ECN bits, and modulating the bit kind of 
works right now. That might be more expedient.

-- Christian Huitema