Re: [tcpm] draft-ietf-tcpm-accurate-ecn-20: Testing for Zeroing of the ACE Field

Neal Cardwell <ncardwell@google.com> Mon, 15 August 2022 15:54 UTC

Return-Path: <ncardwell@google.com>
X-Original-To: tcpm@ietfa.amsl.com
Delivered-To: tcpm@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id C0776C14F73A for <tcpm@ietfa.amsl.com>; Mon, 15 Aug 2022 08:54:03 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -17.606
X-Spam-Level:
X-Spam-Status: No, score=-17.606 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, DKIMWL_WL_MED=-0.001, DKIM_SIGNED=0.1, DKIM_VALID=-0.1, DKIM_VALID_AU=-0.1, DKIM_VALID_EF=-0.1, ENV_AND_HDR_SPF_MATCH=-0.5, HTML_MESSAGE=0.001, RCVD_IN_DNSWL_NONE=-0.0001, RCVD_IN_ZEN_BLOCKED_OPENDNS=0.001, SPF_HELO_NONE=0.001, SPF_PASS=-0.001, T_SCC_BODY_TEXT_LINE=-0.01, URIBL_BLOCKED=0.001, URIBL_DBL_BLOCKED_OPENDNS=0.001, URIBL_ZEN_BLOCKED_OPENDNS=0.001, USER_IN_DEF_DKIM_WL=-7.5, USER_IN_DEF_SPF_WL=-7.5] autolearn=unavailable autolearn_force=no
Authentication-Results: ietfa.amsl.com (amavisd-new); dkim=pass (2048-bit key) header.d=google.com
Received: from mail.ietf.org ([50.223.129.194]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id dGA-a9QSDvps for <tcpm@ietfa.amsl.com>; Mon, 15 Aug 2022 08:54:00 -0700 (PDT)
Received: from mail-qt1-x82e.google.com (mail-qt1-x82e.google.com [IPv6:2607:f8b0:4864:20::82e]) (using TLSv1.3 with cipher TLS_AES_128_GCM_SHA256 (128/128 bits) key-exchange X25519 server-signature RSA-PSS (2048 bits) server-digest SHA256) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id 055F0C1524BF for <tcpm@ietf.org>; Mon, 15 Aug 2022 08:53:59 -0700 (PDT)
Received: by mail-qt1-x82e.google.com with SMTP id h21so5758574qta.3 for <tcpm@ietf.org>; Mon, 15 Aug 2022 08:53:59 -0700 (PDT)
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=20210112; h=cc:to:subject:message-id:date:from:in-reply-to:references :mime-version:from:to:cc; bh=iDmvZm56Bjcho17iGQLay66vDWcIRxuOjSKgGaIwqxw=; b=ApmNfrc37guxqG0agb4lPIHQGkj2Q9GTHGKvAUP2HV4rk6Bmnq9mYMg4SpVc3Aec1D hhL9dA4fUfD9sPKHAznujlj9ha/cszjt1tkj9B9oS+E67TNYwneZnmQUGIMR2Avn7C2R v5jxjdAW9sq+qqM2srZHVCwYAFj+064Vu6w/YqTHI08V2IxOk5bkIhl3QjPMd8iinOkX aRAG51U+U1uPI89xBDVwnE7LIETzjn3rWVpkic8Z1PGd3niqO6m94HSTRc+wreHdoDnd sFx9a8SxpUaJ7VQAIke5rhXBQ/9X6+uakn5xsCXOwypeGi6tkNxLrGMueGRuI+Vx+0v4 3+ZQ==
X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20210112; h=cc:to:subject:message-id:date:from:in-reply-to:references :mime-version:x-gm-message-state:from:to:cc; bh=iDmvZm56Bjcho17iGQLay66vDWcIRxuOjSKgGaIwqxw=; b=1FMkke/QkxBIBMdN/eMKKwJZH1JBwkeOsn5MqxfEpYVuhRH+yZ9jbIrgSbkdsgZ6dq 6GqNJdQsTeE6piIrmitSp0rB2BKfKY0ugm8l+DMKUlZumvwIN3N/dvt5uJeH1b9ofsmY CmF5uQ3JgDc2OhYBY5tirCmcDPsphVxC1mPS3SyvM6giWdnlk3PSiwBEbGVGxW98TMq6 HRUCklx2+YlNsGhUxQOCivxpzwot8OB/p7VPFeL1pKH3OJBeTbB+INrie2twWEr7o7jc Q4tFFiMNb7vKF66j2uYKbuaS2/s7qM/yWjVdTXqDnlW5/lQya9ApQIS5m9afvVpEXyL8 Lgdg==
X-Gm-Message-State: ACgBeo0oP0GK/kCp3XekIjTdtg4KUfg8+jHwcVhvGGE7Zq3EWOWhEN4T S+/golYWreF7CPfSQ+bUJoXRFa5te4ZGwRWq83gthyizSjU=
X-Google-Smtp-Source: AA6agR4edZ/SFVfse9WIftvcqjr898lG5fXs6lrXFVwQejHD32pv0Fa2vJ4Wc2FWOmd3BfwhJI3Gu36rEwlX4fNMiy4=
X-Received: by 2002:a05:622a:1984:b0:342:ea3d:696e with SMTP id u4-20020a05622a198400b00342ea3d696emr14357639qtc.7.1660578838509; Mon, 15 Aug 2022 08:53:58 -0700 (PDT)
MIME-Version: 1.0
References: <CADVnQykDOLvU5y15tVihGWv-vUtE5O0Ly6MkWFOz55x_XOVi5Q@mail.gmail.com> <A80FE78D-5481-4A0A-AE34-1132785F30E5@ericsson.com>
In-Reply-To: <A80FE78D-5481-4A0A-AE34-1132785F30E5@ericsson.com>
From: Neal Cardwell <ncardwell@google.com>
Date: Mon, 15 Aug 2022 11:53:42 -0400
Message-ID: <CADVnQykh+Ge5OUb-PV6owC8nK03AsR_62m6eq3HzGvGufBAxMg@mail.gmail.com>
To: Mirja Kuehlewind <mirja.kuehlewind=40ericsson.com@dmarc.ietf.org>
Cc: "draft-ietf-tcpm-accurate-ecn@ietf.org" <draft-ietf-tcpm-accurate-ecn@ietf.org>, tcpm <tcpm@ietf.org>, Bob Briscoe <ietf@bobbriscoe.net>, "ietf@kuehlewind.net" <ietf@kuehlewind.net>, "Scheffenegger, Richard" <Richard.Scheffenegger@netapp.com>
Content-Type: multipart/alternative; boundary="000000000000caf94b05e649a3cf"
Archived-At: <https://mailarchive.ietf.org/arch/msg/tcpm/BHNoWelyClyzIzkmnTuzoh6O2cA>
Subject: Re: [tcpm] draft-ietf-tcpm-accurate-ecn-20: Testing for Zeroing of the ACE Field
X-BeenThere: tcpm@ietf.org
X-Mailman-Version: 2.1.39
Precedence: list
List-Id: TCP Maintenance and Minor Extensions Working Group <tcpm.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/tcpm>, <mailto:tcpm-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/tcpm/>
List-Post: <mailto:tcpm@ietf.org>
List-Help: <mailto:tcpm-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/tcpm>, <mailto:tcpm-request@ietf.org?subject=subscribe>
X-List-Received-Date: Mon, 15 Aug 2022 15:54:03 -0000

On Mon, Aug 15, 2022 at 9:54 AM Mirja Kuehlewind <mirja.kuehlewind=
40ericsson.com@dmarc.ietf.org> wrote:

> Hi Neal,
>
>
>
> I agree with you that we could probably revise the text slightly. I
> believe we didn’t really consider the case where we still get valid
> information in the option but not in the ACE field. So we also assume in
> section 3.2.3.2.5.  (Consistency between AccECN Feedback Fields) that the
> ACE field can be used as a consistency check for the option. However, for
> the case that your described below where you basically know that the ACE
> field is managed locally but the option seem to work, it would be sad to
> disable ECN completely.
>
>
>
> Maybe we can/should relax the text a bit by restating it this way:
>
>
>
> OLD
>
> If the value of this ACE field is zero (0b000), for the remainder of the
> half-connection the Data Sender ought to send non-ECN-capable packets and
> it is advised not to respond to any feedback of CE markings.
>
>
>
> NEW
>
> If the value of this ACE field is zero (0b000), for the remainder of the
> half-connection the Data Sender is advised not to respond to any CE feedback
> in the ACE field and ought to send non-ECN-capable packets if no other CE
> feedback is reliably provided in the AccECN option.
>

Thanks, Mirja. Your proposed "NEW" text sounds great to me.


> Of course that leaves the question open when the feedback in the option is
> reliable, but maybe we can just leave this to the implementation and
> further experimentation.
>

Agreed, it does leave that question open about when the AccECN option
feedback is reliable, but that's a more general question, and I agree your
text seems fine and it seems OK to leave the details up to the
implementation and further experimentation.

Thanks!

neal



>
>
> Mirja
>
>
>
>
>
>
>
> *From: *tcpm <tcpm-bounces@ietf.org> on behalf of Neal Cardwell
> <ncardwell=40google.com@dmarc.ietf.org>
> *Date: *Friday, 5. August 2022 at 03:23
> *To: *"draft-ietf-tcpm-accurate-ecn@ietf.org" <
> draft-ietf-tcpm-accurate-ecn@ietf.org>, tcpm <tcpm@ietf.org>, Bob Briscoe
> <ietf@bobbriscoe.net>, "ietf@kuehlewind.net" <ietf@kuehlewind.net>,
> "Scheffenegger, Richard" <Richard.Scheffenegger@netapp.com>
> *Subject: *[tcpm] draft-ietf-tcpm-accurate-ecn-20: Testing for Zeroing of
> the ACE Field
>
>
>
> Re:
>
>   https://www.ietf.org/archive/id/draft-ietf-tcpm-accurate-ecn-20.html
>
>
>
> 3.2.2.4. Testing for Zeroing of the ACE Field –
>
>
> https://www.ietf.org/archive/id/draft-ietf-tcpm-accurate-ecn-20.html#section-3.2.2.4
> – says:
>
> "If AccECN has been successfully negotiated, the Data Sender SHOULD check
> the value of the ACE counter in the first packet (with or without data)
> that arrives with SYN=0. If the value of this ACE field is zero (0b000),
> for the remainder of the half-connection the Data Sender ought to send
> non-ECN-capable packets and it is advised not to respond to any feedback of
> CE markings. Reason: the symptoms imply either potential mangling of the
> ECN fields in both the IP and TCP headers, or a broken remote TCP
> implementation. This advice is not stated normatively (in capitals),
> because the best strategy might depend on experience of the most likely
> types of mangling, which can only be known at the time of deployment."
>
>
>
> I would have imagined that the response where a data sender detects
> "Zeroing of the ACE Field" would be to simply fall back to using the AccECN
> options, rather than falling back to  sending non-ECN-capable packets, thus
> losing the benefits of L4S congestion control. Would that be feasible?
>
>
>
> AFAICT a data sender can do just fine with zeroed ACE fields, as long as
> the data receiver is sending valid AccECN options.
>
>
>
> I can imagine several different arguments for a response to "Zeroing of
> the ACE Field" that involves  simply falling back to using the AccECN
> options rather than disabling the sending of ECN-capable packets:
>
>
>
> (1) The part of Postel's robustness principle that says "be liberal in
> what you accept" would seem to argue that a data sender should be liberal
> in accepting a zeroed ACE field as long as the AccECN options are intact
> and seemingly valid.
>
>
>
> (2) For data senders that need to use TSO, but who have NICs where TSO
> necessarily corrupts the ACE field (due to RFC3168-style tweaking of the
> CWR bit that cannot be disabled), it would be advantageous to those data
> senders to be able to simply send zero ACE fields, rather than send ACE
> values that they know would be corrupted. AFAICT this could allow such
> senders to benefit from both TSO and L4S.
>
>
>
> (3) Similarly, if a middlebox somewhere zeroes out the ACE field, AFAICT
> this could allow such senders to benefit from L4S in this case as long as
> the incoming AccECN options are intact and seemingly valid.
>
>
>
> Thoughts?
>
>
>
> thanks,
>
> neal
>
>
>
>
>