Re: [ippm] [tsvwg] [iccrg] New Internet Draft: Congestion Signaling (CSIG)

Sebastian Moeller <moeller0@gmx.de> Mon, 19 February 2024 07:34 UTC

Return-Path: <moeller0@gmx.de>
X-Original-To: ippm@ietfa.amsl.com
Delivered-To: ippm@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 10A5BC14F5E6; Sun, 18 Feb 2024 23:34:18 -0800 (PST)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -2.553
X-Spam-Level:
X-Spam-Status: No, score=-2.553 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, DKIM_SIGNED=0.1, DKIM_VALID=-0.1, DKIM_VALID_AU=-0.1, DKIM_VALID_EF=-0.1, FREEMAIL_ENVFROM_END_DIGIT=0.25, FREEMAIL_FROM=0.001, RCVD_IN_DNSWL_LOW=-0.7, RCVD_IN_MSPIKE_H3=0.001, RCVD_IN_MSPIKE_WL=0.001, RCVD_IN_ZEN_BLOCKED_OPENDNS=0.001, SPF_HELO_NONE=0.001, SPF_PASS=-0.001, T_SCC_BODY_TEXT_LINE=-0.01, URIBL_BLOCKED=0.001, URIBL_DBL_BLOCKED_OPENDNS=0.001, URIBL_ZEN_BLOCKED_OPENDNS=0.001] autolearn=ham autolearn_force=no
Authentication-Results: ietfa.amsl.com (amavisd-new); dkim=pass (2048-bit key) header.d=gmx.de
Received: from mail.ietf.org ([50.223.129.194]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id qhuR0icLEjp3; Sun, 18 Feb 2024 23:34:13 -0800 (PST)
Received: from mout.gmx.net (mout.gmx.net [212.227.15.18]) (using TLSv1.3 with cipher TLS_AES_256_GCM_SHA384 (256/256 bits) key-exchange ECDHE (P-256) server-signature RSA-PSS (2048 bits) server-digest SHA256) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id 448E1C14F5E2; Sun, 18 Feb 2024 23:34:13 -0800 (PST)
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/simple; d=gmx.de; s=s31663417; t=1708328049; x=1708932849; i=moeller0@gmx.de; bh=2CIAgdAkRdZ6qqdx0z09caJbdsLPhfwBqb12nXJB/PM=; h=X-UI-Sender-Class:Subject:From:In-Reply-To:Date:Cc:References: To; b=ZXwaQS0bKPEcXtDmKDg2lEWPZAclhdKwZ4u9zRoRd3hL7iUdHHpMMjT9PQaCRRYD nLkLpVsKVdoE0vBrMf8eIEQsRyCHZQTTaEGWA5NZ4wA8ULbVsYKxxvbHN6jUy42Dm 7t86wkxCWpqGDwLjR1Rs7dy0O3QkpfjgF0IS2bFJXCVV7GMrnxOeV5HUrIs67FNMi xXxvNV6cfjOE83pqm4pmY6IN2reqKPSd3DX/n2CO/Af88RwIaqJApz1m6douU3ol7 dKbhXh6z9cK/lej0kstqkQj0qaunmu0j/xul9d1861HfmQuuGL8i+2DbhSBehEyVp 9SRcsiizvb15NrLNbg==
X-UI-Sender-Class: 724b4f7f-cbec-4199-ad4e-598c01a50d3a
Received: from smtpclient.apple ([134.76.241.253]) by mail.gmx.net (mrgmx004 [212.227.17.190]) with ESMTPSA (Nemesis) id 1MCsPy-1rknqq3z5E-008olK; Mon, 19 Feb 2024 08:34:09 +0100
Content-Type: text/plain; charset="utf-8"
Mime-Version: 1.0 (Mac OS X Mail 16.0 \(3774.400.31\))
From: Sebastian Moeller <moeller0@gmx.de>
In-Reply-To: <CAEsRLK9_bHrhyvFqCz3do=Ax3mKZor4EtqXY2chdfL7fzi1UMw@mail.gmail.com>
Date: Mon, 19 Feb 2024 08:33:39 +0100
Cc: Tom Herbert <tom=40herbertland.com@dmarc.ietf.org>, Nandita Dukkipati <nanditad@google.com>, Abhiram Ravi <abhiramr=40google.com@dmarc.ietf.org>, IETF IPPM WG <ippm@ietf.org>, tsvwg <tsvwg@ietf.org>, ccwg@ietf.org, iccrg@irtf.org, Naoshad Mehta <naoshad@google.com>, Jai Kumar <jai.kumar@broadcom.com>
Content-Transfer-Encoding: quoted-printable
Message-Id: <500388A6-50D3-4535-84CB-E6EF454960DD@gmx.de>
References: <CAF0+TDD+44TAHf7y05GzmCgbau66ey7AU2RaVroim_Tukf=7nQ@mail.gmail.com> <CALx6S35V8xyDBkN0m8kDEcNk0N734Fqq0Ne8ZJ284ZnSSUwV9w@mail.gmail.com> <CALx6S35XNyBe5=gh7JpaCKEkiXaEwPGHrDZe=E-EPkiF5mUCLA@mail.gmail.com> <CAB_+Fg5McYXt=M5MNkuxHrKrXQgZMS6PLRoVeUKiSUe5Qb7LjA@mail.gmail.com> <CALx6S35OHyhWjmkV2jiOqO-sB9Csugx0umB_yF_ann9rB8Tgbw@mail.gmail.com> <CAEsRLK9_bHrhyvFqCz3do=Ax3mKZor4EtqXY2chdfL7fzi1UMw@mail.gmail.com>
To: Matt Mathis <mattmathis@measurementlab.net>
X-Mailer: Apple Mail (2.3774.400.31)
X-Provags-ID: V03:K1:cuPj1xKdu4wfw5y11/8JfKiOmGr57v9M2PlmiRFU8bNXNcrbjyb guM/brloRLjK9IX2ko/NVK8vWGZAyigsIarQ/jHT0o/0dOC7DQioiKhrq6SNsRdI2dMdvPV 2KGp3pgDPmrR40/GbEQZcQAhgzDmxWZY2CPtPXFJKDCSs/1j52v8r9A5V4otMVGrqAFG5JF FMDlr7mn1Y2Rmq8Y9mVCw==
UI-OutboundReport: notjunk:1;M01:P0:yLyzMTfM+tc=;J8Bybefo1z7L3ctIWEr2Vg9nCZu GU0it963QyLpK/D1w5oF5MMpGyqlcwm8Dr3oirdbtvoRWpLkPu1tnvRR/wcr/1sxxXsfWrdOV tVMmMt+YuRIt2xHHYK6TflxGKViP2e0POFDlrw5bnPLicZ7t/u5j3s9iSDdzRFNy1fZsFZX2o BIDc7wnWRL7CfkraClk5LgDE8OsUUYOfLmPwTbGbLBOBWjj16Af+TgumEiAbPzCjMBQ6bDyNi 4zCty45KZapU3RlOGkkeggxsy5z4Gp2jxLjy/gfLfekXJV+MMpZtIdGzeUwhKtX3V8czRFwT4 uyH5ZdXcLN+WfHn3vNuFYw9+zTSc4k9NIfomCIcT5C1lWE/DrDnvrSFw73u7w8TnQOTWCkt67 QrlihYfsM0q54jEM6OeBhTFfIdZ2A8L+q7m7rZIu61R/7QhHgm1yBDIrlpYUQXJVW17XCoYSU Qwacvcnw20o2YaXU3GYt3qSGJzaxxS6Gtgf/Io+3HX1d0t8FYnTpFq1kHbzX3sLLc/ACD30NK Jl5EkUN2ooOC0tevW4iIyVcK74bMCz0Z2Zl71S5A0MyCgI8nzH8kdCuOvy60VoreA/EVRibzi CLOM8HQOY2zFBEn76fQF65edxZgY98qfG9w5tlXBGWk8kxaZvFhMAMaw6cmhg9ZXo+mSM7I+v NVrIADJ6Wb8psQoJq73CTpa6y9yRuIiJMoLRDzH/2rt8ECvLdEDvIUZq6TbWiYX+EjcGLUNvt yeeTWqIMUTc9euwckpvFRZICWOjy67CaE0uDZH+U0Asp/mdTZRTy73m2hequ5U1FGj0N208N5 49vzgqT4lY9XutBrSgLmH23l2KLRoa9r4ID3RgkBBW6HQ=
Archived-At: <https://mailarchive.ietf.org/arch/msg/ippm/I_pxcyO8wGfQYvSSAfsa1sv3EfI>
X-Mailman-Approved-At: Mon, 19 Feb 2024 10:05:56 -0800
Subject: Re: [ippm] [tsvwg] [iccrg] New Internet Draft: Congestion Signaling (CSIG)
X-BeenThere: ippm@ietf.org
X-Mailman-Version: 2.1.39
Precedence: list
List-Id: IETF IP Performance Metrics Working Group <ippm.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/ippm>, <mailto:ippm-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/ippm/>
List-Post: <mailto:ippm@ietf.org>
List-Help: <mailto:ippm-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/ippm>, <mailto:ippm-request@ietf.org?subject=subscribe>
X-List-Received-Date: Mon, 19 Feb 2024 07:34:18 -0000

Hi Matt,

> On 17. Feb 2024, at 20:17, Matt Mathis <mattmathis@measurementlab.net> wrote:
> 
> I think the L2/L4 split is brilliant.   

[SM] Respectfully, the brilliance depends very much on the goal/gamer plan. Is this purely aimed at data center traffic this looks like a sweet solution that is 'organically' confined to the domain with appropriately capable L2 elements? Or is the end-game here an (overdue) improvement of end-to-end loads/congestion information? In the former case L2/L4 seems a decent solution, in the latter case less so (not that getting a common L3 solution would be guaranteed or easy).


> Putting the forward instrumentation as low as possible in the stack permits easy processing in HW w/o parsing any L3.   

[SM] Sweet, but that really means that this solution is unlikely to survive over a full internet path.

> Putting the replies in L4 only requires a handful of implementations to cover all possible paths,

[SM] Mmmh, that might be but partly because the L2 solution noticeably restricts the set of possible paths, no?

> and piggybacks on existing solutions to session layer issues, such as authentication and authorization.

[SM] What is the threat model here? I would guess an attacker that knows the full path might just as well probe the congestion level and an attacker that does not know the path might not be able to do much with the congestion information? (Any attacker that can modify the congestion information might as well drop the packet directly).

> 
> I would consider mentioning but then temporarily excluding alternet placements: either as a shim at the top of L2, sort of like VLAN tags, or within an L3 option.   Both of these have their own challenges, but might be extremely valuable in some environments.

[SM] Some environments, like the internet? I know that the I in IETF is not a strict limiter of scope, but still it would be nice if drafts would have a viable path of being implemented over the internet... That said, well possible that the current state does not merit use-over-the-internet yet and so maybe starting with an L2/L4 solution might be considered a safety back-stop?

Regards
	Sebastian

> 
> On Sat, Feb 10, 2024 at 7:42 AM Tom Herbert <tom=40herbertland.com@dmarc.ietf.org> wrote:
> On Fri, Feb 9, 2024 at 10:53 PM Nandita Dukkipati <nanditad@google.com> wrote:
> >
> > Hi Tom,
> >
> > We updated the draft, correcting some nit errata, and to not let the draft expire. It's not discussed in any other mailing lists.
> 
> Thanks Nandita.
> 
> I still have fundamental concerns about the protocol layering in this
> draft, please see my previous comments on that. The draft defines a
> protocol for end-to-end network to host signaling and IMO, such a
> protocol belongs in the network layer but the draft puts the protocol
> in L2 and L4 and seems to avoid L3 without explanation. IOAM defines a
> very similar method of signaling and RFC9486 is a good model for
> network layer protocol that provides network to host signaling.
> 
> Tom
> 
> >
> > Nandita
> >
> > On Thu, Feb 8, 2024 at 3:53 PM Tom Herbert <tom@herbertland.com> wrote:
> >>
> >> Hi,
> >>
> >> I noticed there is now an -01 version of the draft posted on Feb. 2.
> >> Is this draft being discussed on some other list?
> >>
> >> Thanks,
> >> Tom
> >>
> >> On Sat, Sep 9, 2023 at 9:09 AM Tom Herbert <tom@herbertland.com> wrote:
> >> >
> >> > Hi, thanks for draft!
> >> >
> >> > The first thing that stands out to me is the carrier of the new packet headers. In the forward path it would be in L2 and in reflection it would be L4. As the draft describes, this would entail having to support the protocol in multiple L2 and multiple L4 protocols-- that's going to be a pretty big lift! Also, L2 is not really an end-to-end protocol (would legacy switches in the path also forward the header)l?).
> >> >
> >> > The signaling being described in the draft is network layer information, and hence IMO should be conveyed in network layer headers. That's is L3 which conveniently is the average of L2+L4 :-)
> >> >
> >> > IMO, the proper carrier of the signal data is Hop-by-Hop Options. This is end-to-end and allows modification of data in-flight. The typical concern with Hop-by-Hop Options is high drop rates on the Internet, however in this case the protocol is explicitly confined to a limited domain so I don't see that as a blocking issue for this use case.
> >> >
> >> > The information being carried seems very similar to that of IOAM (IOAM uses Hop-by-Hop Options and supports reflection). I suppose the differences are that this protocol is meant to be consumed by the transport Layer and the data is a condensed summary of path characteristics. IOAM seems pretty extensible, so maybe it could be adapted to carry the signals of this draft?
> >> >
> >> > A related proposal might be FAST draft-herbert-fast. Where the CSIG is network to host signaling, FAST is host to network signaling for the purposes of requesting network services. These might be complementary and options for both may be in the same packet. FAST also uses reflection, so we might be able to leverage some common implementation at a destination.
> >> >
> >> > Tom
> >> >
> >> > On Fri, Sep 8, 2023, 7:43 PM Abhiram Ravi <abhiramr=40google.com@dmarc.ietf.org> wrote:
> >> >>
> >> >> Hi IPPM folks,
> >> >>
> >> >> I am pleased to announce the publication of a new internet draft, Congestion Signaling (CSIG): https://datatracker.ietf.org/doc/draft-ravi-ippm-csig/
> >> >>
> >> >> CSIG is a new end-to-end packet header mechanism for in-band signaling that is simple, efficient, deployable, and grounded in concrete use cases of congestion control, traffic management, and network debuggability. We believe that CSIG is an important new protocol that builds on top of existing in-band network telemetry protocols.
> >> >>
> >> >> We encourage you to read the CSIG draft and provide your feedback and comments. We have also cc'd the TSVWG, CCWG, and ICCRG mailing lists, as we believe that this work may be of interest to their members as well.
> >> >>
> >> >> Thank you for your time and consideration.
> >> >>
> >> >> Sincerely,
> >> >> Abhiram Ravi
> >> >> On behalf of the CSIG authors
> 
> _______________________________________________
> iccrg mailing list
> iccrg@irtf.org
> https://mailman.irtf.org/mailman/listinfo/iccrg
> 
> 
> -- 
> Thanks,
> --MM--
> Evil is defined by mortals who think they know "The Truth" and use force to apply it to others.