Re: [sfc] The SFC WG has placed draft-eastlake-sfc-nsh-ecn-support in state "Candidate for WG Adoption"

Bob Briscoe <in@bobbriscoe.net> Tue, 22 January 2019 00:05 UTC

Return-Path: <in@bobbriscoe.net>
X-Original-To: sfc@ietfa.amsl.com
Delivered-To: sfc@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id E6639128D0C; Mon, 21 Jan 2019 16:05:52 -0800 (PST)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -1.7
X-Spam-Level:
X-Spam-Status: No, score=-1.7 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, DKIM_INVALID=0.1, DKIM_SIGNED=0.1, HTML_MESSAGE=0.001, RCVD_IN_DNSWL_NONE=-0.0001, SPF_PASS=-0.001] autolearn=no autolearn_force=no
Authentication-Results: ietfa.amsl.com (amavisd-new); dkim=fail (2048-bit key) reason="fail (body has been altered)" header.d=bobbriscoe.net
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id 2GBZ94IWHc4J; Mon, 21 Jan 2019 16:05:50 -0800 (PST)
Received: from server.dnsblock1.com (server.dnsblock1.com [85.13.236.178]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id DAFCA128CF3; Mon, 21 Jan 2019 16:05:49 -0800 (PST)
DKIM-Signature: v=1; a=rsa-sha256; q=dns/txt; c=relaxed/relaxed; d=bobbriscoe.net; s=default; h=Content-Type:In-Reply-To:MIME-Version:Date: Message-ID:References:Cc:To:From:Subject:Sender:Reply-To: Content-Transfer-Encoding:Content-ID:Content-Description:Resent-Date: Resent-From:Resent-Sender:Resent-To:Resent-Cc:Resent-Message-ID:List-Id: List-Help:List-Unsubscribe:List-Subscribe:List-Post:List-Owner:List-Archive; bh=GoFO0cJ/COn+AugqtaSwI8vii482OPyAKsCIgQph7mc=; b=cu7SI3t8f0XaKUnw1RMKGLJ0y hGkTO7dEVduEjuNhVgfYWsoUgJFs6fAucCGXlmMWd2FQ/bzs0bxBCMcZr32NdSyhIK9aCQtS9Gh/I shfJz51BMm21jWfHXSk5hI6QSUK9V0pGVJbvC1Q51FKE+kJZH0GGpeYwQoCRUNT8ZNtBEIhYwrAPc XoDP9SlrqpFpq9mDLM7XJiniotDd0kaCg6R6X77joQ3S0jrIE4S1JhTb0Y4jpzti1xFt6Eimu2BvR UKjZA/p5GMrwfsgfxOU5zmrgBMLpRwyAz02bhxOBKrXHcyCLy4u+qlnKutW8KPeKn+MKa/RmeUnJO d0t6Ak3EQ==;
Received: from 35.0.208.46.dyn.plus.net ([46.208.0.35]:45454 helo=[192.168.0.4]) by server.dnsblock1.com with esmtpsa (TLSv1.2:ECDHE-RSA-AES128-GCM-SHA256:128) (Exim 4.91) (envelope-from <in@bobbriscoe.net>) id 1gljZb-0006EM-1C; Tue, 22 Jan 2019 00:05:47 +0000
From: Bob Briscoe <in@bobbriscoe.net>
To: Tal Mizrahi <tal.mizrahi.phd@gmail.com>
Cc: Donald Eastlake <d3e3e3@gmail.com>, sfc-chairs@ietf.org, draft-eastlake-sfc-nsh-ecn-support@ietf.org, sfc@ietf.org
References: <154649225579.32607.12231566034033496144.idtracker@ietfa.amsl.com> <CABUE3XmrmTK9EJLGD=Zz1ANSAqja-avTuoAGgNoAcALqAVVOrA@mail.gmail.com> <CAF4+nEHFcEa18b0zJ+myqo=GmzdRB=iycH5vXAU=kK9A-FjPyA@mail.gmail.com> <4f7963fc-0157-8587-eeb5-48d63a3de7f8@bobbriscoe.net>
Message-ID: <db4d93f4-e628-d7f4-7486-1717aa4e8950@bobbriscoe.net>
Date: Tue, 22 Jan 2019 00:05:46 +0000
User-Agent: Mozilla/5.0 (X11; Linux x86_64; rv:60.0) Gecko/20100101 Thunderbird/60.2.1
MIME-Version: 1.0
In-Reply-To: <4f7963fc-0157-8587-eeb5-48d63a3de7f8@bobbriscoe.net>
Content-Type: multipart/alternative; boundary="------------4063BEA16E0E6373F6990724"
Content-Language: en-GB
X-AntiAbuse: This header was added to track abuse, please include it with any abuse report
X-AntiAbuse: Primary Hostname - server.dnsblock1.com
X-AntiAbuse: Original Domain - ietf.org
X-AntiAbuse: Originator/Caller UID/GID - [47 12] / [47 12]
X-AntiAbuse: Sender Address Domain - bobbriscoe.net
X-Get-Message-Sender-Via: server.dnsblock1.com: authenticated_id: in@bobbriscoe.net
X-Authenticated-Sender: server.dnsblock1.com: in@bobbriscoe.net
Archived-At: <https://mailarchive.ietf.org/arch/msg/sfc/yEMdFP07L6flhh7mvnAql82de5I>
Subject: Re: [sfc] The SFC WG has placed draft-eastlake-sfc-nsh-ecn-support in state "Candidate for WG Adoption"
X-BeenThere: sfc@ietf.org
X-Mailman-Version: 2.1.29
Precedence: list
List-Id: Network Service Chaining <sfc.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/sfc>, <mailto:sfc-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/sfc/>
List-Post: <mailto:sfc@ietf.org>
List-Help: <mailto:sfc-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/sfc>, <mailto:sfc-request@ietf.org?subject=subscribe>
X-List-Received-Date: Tue, 22 Jan 2019 00:05:53 -0000

Tal,

I've conferred with my co-authors, and I can confirm that there is no 
need for a separate L4S mode, as incorrectly described around Table 2 in 
draft-02. It was actually me who wrote the incorrect text and table in 
the first place - my co-authors are wholly innocent, cos I'm the one 
developing the L4S experiment (L4S = Low Latency Low Loss Scalable 
throughput)! So thanks for asking how the two approaches interoperate, 
which made me notice this.

The answer to your question is that L4S doesn't need any change to how 
congestion signals are propagated. L4S is purely a different AQM 
algorithm at network nodes and a different response algorithm at the 
source. As far as encap and decap are concerned, the tunnelling 
behaviours specified in RFC6040 and followed in the sfc-nsh-ecn draft 
inherently work for L4S just as well as for standard RFC3168 ECN. That's 
all the SFC WG needs to know.

However, if you want to know a little more about how L4S works, the 
source distinguishes its packets by setting them to ECT(1), which an L4S 
node classifies into a distinct L4S queue. Any network node that doesn't 
support L4S will just handle these packets as if ECT(0) and ECT(1) mean 
the same (as required by the original ECN spec [RFC3168]). And the 
source has to detect such behaviour and respond accordingly 
[draft-ietf-tsvwg-ecn-l4s-id].

We will be correcting the text as follows:

CURRENT:

    Then, if the resulting NSH ECN field is Not-ECT, the ingress SHOULD
    set it to ECT(0), in order to indicate that the NSH encapsulation is
    an ECN-Capable Transport.It MAY instead be set to ECT(1) if the NSH domain supports the experimental L4S capability [RFC8311  <https://tools.ietf.org/html/rfc8311>], [ecnL4S  <https://tools.ietf.org/html/draft-eastlake-sfc-nsh-ecn-support-02#ref-ecnL4S>].
...

             +-----------------+-------------------------------+
             | Incoming Header |Departing NSH and Outer Headers|
             | (also equal to  +---------------+---------------+
             | departing Inner |  Classic ECN  |    L4S ECN    |
             |     Header)     |     Mode      |     Mode      |
             +-----------------+---------------+---------------+
             |    Not-ECT      |   ECT(0)      |    ECT(1)     |
             |     ECT(0)      |   ECT(0)      |    ECT(0)     |
             |     ECT(1)      |   ECT(1)      |    ECT(1)     |
             |       CE        |     CE        |      CE       |
             +-----------------+---------------+---------------+

PROPOSED:

    Then, if the resulting NSH ECN field is Not-ECT, the ingress SHOULD
    set it to ECT(0).This indicates that, even though the end-to-end transport is not 
ECN-capable, the egress and ingress of the SFC domain are acting as an 
ECN-capable transport. This approach will inherently support all known 
variants of ECN, including the
    experimental L4S capability [RFC8311  <https://tools.ietf.org/html/rfc8311>], [ecnL4S  <https://tools.ietf.org/html/draft-eastlake-sfc-nsh-ecn-support-02#ref-ecnL4S>].
...

             +-----------------+---------------+
             | Incoming Header |Departing NSH  |
             | (also equal to  |& Outer Headers|
             | departing Inner |               |
             |     Header)     |               |
             +-----------------+---------------+
             |    Not-ECT      |   ECT(0)      |
             |     ECT(0)      |   ECT(0)      |
             |     ECT(1)      |   ECT(1)      |
             |       CE        |     CE        |
             +-----------------+---------------+



On 15/01/2019 22:53, Bob Briscoe wrote:
>>> - "It MAY instead be set to ECT(1) if the NSH domain supports the experimental L4S capability [RFC8311], [ecnL4S]."
>>>    This sentence is confusing from an implementer's perspective. Does the "MAY" here allow interoperability between the two approaches (RFC3168/ RFC8311)? Please clarify in the draft whether ECN-in-NSH-aware nodes are expected to be implemented as defined in [RFC3168] or as in [RFC8311], or a combination of both.
>> I agree we need to clarify that.
> Let me get back to you on this one. I have to admit that I can't 
> remember why we catered for L4S in the way written around table 2. 
> I've checked back, and I actually wrote this part myself, but it looks 
> wrong to me, which would be embarrassing. However, I need to check 
> with my co-authors to confirm that.
>
> Whatever, thanks for picking this up.
>
>
> Bob

-- 
________________________________________________________________
Bob Briscoe                               http://bobbriscoe.net/