Re: [tcpm] A possible simplification for AccECN servers

Jonathan Morton <chromatix99@gmail.com> Mon, 25 November 2019 16:35 UTC

Return-Path: <chromatix99@gmail.com>
X-Original-To: tcpm@ietfa.amsl.com
Delivered-To: tcpm@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id C0FF912099D for <tcpm@ietfa.amsl.com>; Mon, 25 Nov 2019 08:35:12 -0800 (PST)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -1.749
X-Spam-Level:
X-Spam-Status: No, score=-1.749 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, DKIM_SIGNED=0.1, DKIM_VALID=-0.1, DKIM_VALID_AU=-0.1, FREEMAIL_ENVFROM_END_DIGIT=0.25, FREEMAIL_FROM=0.001, RCVD_IN_DNSWL_NONE=-0.0001, SPF_HELO_NONE=0.001, SPF_PASS=-0.001] autolearn=no autolearn_force=no
Authentication-Results: ietfa.amsl.com (amavisd-new); dkim=pass (2048-bit key) header.d=gmail.com
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id KiAat56mwxHo for <tcpm@ietfa.amsl.com>; Mon, 25 Nov 2019 08:35:11 -0800 (PST)
Received: from mail-lf1-x135.google.com (mail-lf1-x135.google.com [IPv6:2a00:1450:4864:20::135]) (using TLSv1.2 with cipher ECDHE-RSA-AES128-GCM-SHA256 (128/128 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id 4A77512099A for <tcpm@ietf.org>; Mon, 25 Nov 2019 08:35:11 -0800 (PST)
Received: by mail-lf1-x135.google.com with SMTP id f16so11561979lfm.3 for <tcpm@ietf.org>; Mon, 25 Nov 2019 08:35:11 -0800 (PST)
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=gmail.com; s=20161025; h=mime-version:subject:from:in-reply-to:date:cc :content-transfer-encoding:message-id:references:to; bh=pGn5lRbtz3aWRyJM/AID+4hPjN0rSj4HIRJZN96s0nc=; b=ElVbnUV7f/CDCPJmkFpXsbrnbifu+jjDyY9tKFxcdcfr0TxOEnv7cpm9mCnkfgQuEp ibiXnOXFC/LVcY8T4wFklw1ej3gpmIbQ73dzOXdyJ9HmAnOqzxbcYYC0vdp/na63SReI hxLPMzH+02v3+kvx/25r1G6nCmkQwAnccP4sHa7uHxR1tsz8U990H7nQsQf4iwZj5hlw NVIC0uCBFfoAapzP97I9hzd8wOhM2/RpRPDe6tjvhlfGSMEBLicYZvMoxqDpPhkTl+Lw CwIFk/yiFp79LM54Zy0CKSPmdlByWhwKOo7jPKz4W1ruhM8jf13WCqXeAP+fhdn2c3eT hthQ==
X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20161025; h=x-gm-message-state:mime-version:subject:from:in-reply-to:date:cc :content-transfer-encoding:message-id:references:to; bh=pGn5lRbtz3aWRyJM/AID+4hPjN0rSj4HIRJZN96s0nc=; b=lxvbDp5OL/2xPkVnM/8GzwWNwcu1xgYb65+tIcX7+WPxrh1ShQuPn/wUMV8Nkklfb8 T4p0m1UTAESyO9DDcb8niGoyXwG9P7YhBpIcaMqpDHkx0el63lYuPKzUbwGSd+X/Rlh1 E1vjkEO5+hhiAU3XWCgags/q5tlyXqebPxxS5gC5I4I1RtJWntEsEBjfpAF3OirDZuum a3lfGdhUGqfZjnPANKlN7O3REeRykoTm/JbjHM1MNZacs70ZW2BjZoGukOqATu3utHFp JzezZbX+kk50cLyMp462SqBR/jrst0ej5YSm+219u8QVpsS98HA0+8rCGfxpInlSuoUN yq1A==
X-Gm-Message-State: APjAAAVKdLmZBdgAGLJdSS3KoykFnGW70MegEscGKZ3cIoFmnh41s/Of hepESGBm+j9Tmb+q2c1p3ww=
X-Google-Smtp-Source: APXvYqyZl8nMqW6jHPi6po+0d+G2vLnGR9HY+GAjMBLa0/OdNKzBjULwhW7VjdjiL6r5+HbEWGG2jg==
X-Received: by 2002:ac2:5a43:: with SMTP id r3mr7112599lfn.150.1574699709258; Mon, 25 Nov 2019 08:35:09 -0800 (PST)
Received: from jonathartonsmbp.lan (83-245-229-102-nat-p.elisa-mobile.fi. [83.245.229.102]) by smtp.gmail.com with ESMTPSA id m26sm4422525lfc.90.2019.11.25.08.35.06 (version=TLS1_2 cipher=ECDHE-RSA-AES128-GCM-SHA256 bits=128/128); Mon, 25 Nov 2019 08:35:08 -0800 (PST)
Content-Type: text/plain; charset="utf-8"
Mime-Version: 1.0 (Mac OS X Mail 11.5 \(3445.9.1\))
From: Jonathan Morton <chromatix99@gmail.com>
In-Reply-To: <732C4247-BC55-4719-A399-711689CB379A@kuehlewind.net>
Date: Mon, 25 Nov 2019 18:35:03 +0200
Cc: Bob Briscoe <ietf@bobbriscoe.net>, tcpm IETF list <tcpm@ietf.org>, Richard Scheffenegger <rscheff@gmx.at>
Content-Transfer-Encoding: quoted-printable
Message-Id: <256E6F9D-607A-4A9D-9505-933FC4EC28FC@gmail.com>
References: <d35618ee-c0dc-44ee-9e22-50bdabbe026c@bobbriscoe.net> <732C4247-BC55-4719-A399-711689CB379A@kuehlewind.net>
To: Mirja Kuehlewind <ietf@kuehlewind.net>
X-Mailer: Apple Mail (2.3445.9.1)
Archived-At: <https://mailarchive.ietf.org/arch/msg/tcpm/2Io1nvFDYk8enP5QsmraEQQr20Q>
Subject: Re: [tcpm] A possible simplification for AccECN servers
X-BeenThere: tcpm@ietf.org
X-Mailman-Version: 2.1.29
Precedence: list
List-Id: TCP Maintenance and Minor Extensions Working Group <tcpm.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/tcpm>, <mailto:tcpm-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/tcpm/>
List-Post: <mailto:tcpm@ietf.org>
List-Help: <mailto:tcpm-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/tcpm>, <mailto:tcpm-request@ietf.org?subject=subscribe>
X-List-Received-Date: Mon, 25 Nov 2019 16:35:13 -0000

> On 25 Nov, 2019, at 5:46 pm, Mirja Kuehlewind <ietf@kuehlewind.net> wrote:
> 
> I need to double-check what the exact context of the sentence Bob mentions below is in the accECN draft but probably this should not be a normative requirement in this draft at all. I’m actually further not sure what exactly is meant with “support” in that sentence, but the question if a server replies to a RFC3168 SYN with an RFC3168 SYN-ACK is solely a question for RFC3168 and not AccECN.

As far as I can tell, the requirement is not worded precisely as Bob put it, but is implied in Section 3.1.1:

   +--------+--------+------------+-------------+----------------------+
   | A      | B      |  SYN A->B  |   SYN/ACK   | Feedback Mode        |
   |        |        |            |     B->A    |                      |
   +--------+--------+------------+-------------+----------------------+
   |        |        | AE CWR ECE |  AE CWR ECE |                      |
<snip>
   | Nonce  | AccECN | 0   1   1  |  0   0   1  | classic ECN          |
   | ECN    | AccECN | 0   1   1  |  0   0   1  | classic ECN          |
   | No ECN | AccECN | 0   0   0  |  0   0   0  | Not ECN              |

[...]

   3.  The third block shows the cases where the TCP server (B) supports
       AccECN but the TCP client (A) supports some earlier variant of
       TCP feedback, indicated in its SYN.  Therefore, as soon as an
       AccECN-enabled TCP server (B) receives the SYN shown, it MUST set
       both its half connections into the feedback mode shown in the
       rightmost column.

Now considering Richard's and Neal's points:

> There is gear deployed already, which ONLY supports shallow ce marking - which breaks 3168 entirely. Behind such a switch, a server would be better off going only with non-ect (no ecn at all), or accecn. So that state transition should be allowed (and i think it is) by the accecn draft.

> (Non-ect is classified into a different Q on the one example i could name, so no q sharing w/ drop class cc)

> IMHO it is worth emphasizing that much of the traffic that travels
> over the public Internet is sent by servers that are situated in
> datacenter networks where the datacenter switches are CE-marking using
> shallow-threshold DCTCP-style ECN. So that "datacenter traffic" and
> "public Internet traffic" are, in some sense, overlapping categories,
> rather than disjoint categories.

I imagine that any individual flow going out to the general Internet would occupy only a small fraction of a datacentre switch's capacity on any given link, and so would be unlikely to trigger CE marking even with a basic shallow threshold marking policy.  If it did, that would suggest that the link is indeed at capacity, and a reduction of send rate is therefore justified to avoid subsequent packet loss from the tail of the queue.

It is also, strictly speaking, a violation of RFC-3168 to apply differing policies for CE marking on ECT packets versus dropping Not-ECT packets, in this case by using the ECN field as a traffic classifier.  That a performance problem then arises when RFC-3168 traffic passes through an RFC-ignorant AQM is perhaps unsurprising.  Again, this sort of thing is acceptable in a closed and carefully controlled environment, but what is described here is not.

Absent such special interests, I think the existing language (quoted above) is correct.

 - Jonathan Morton