Re: [tsvwg] Reasons for WGLC/RFC asap

Ingemar Johansson S <ingemar.s.johansson@ericsson.com> Fri, 20 November 2020 08:23 UTC

Return-Path: <ingemar.s.johansson@ericsson.com>
X-Original-To: tsvwg@ietfa.amsl.com
Delivered-To: tsvwg@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 630703A1A4B for <tsvwg@ietfa.amsl.com>; Fri, 20 Nov 2020 00:23:13 -0800 (PST)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -2.102
X-Spam-Level:
X-Spam-Status: No, score=-2.102 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, DKIMWL_WL_HIGH=-0.001, DKIM_SIGNED=0.1, DKIM_VALID=-0.1, DKIM_VALID_AU=-0.1, DKIM_VALID_EF=-0.1, RCVD_IN_MSPIKE_H2=-0.001, SPF_PASS=-0.001, URIBL_BLOCKED=0.001] autolearn=ham autolearn_force=no
Authentication-Results: ietfa.amsl.com (amavisd-new); dkim=pass (1024-bit key) header.d=ericsson.com
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id F2WvG_SlcHEI for <tsvwg@ietfa.amsl.com>; Fri, 20 Nov 2020 00:23:11 -0800 (PST)
Received: from EUR02-VE1-obe.outbound.protection.outlook.com (mail-eopbgr20045.outbound.protection.outlook.com [40.107.2.45]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id D38313A1A40 for <tsvwg@ietf.org>; Fri, 20 Nov 2020 00:23:10 -0800 (PST)
ARC-Seal: i=1; a=rsa-sha256; s=arcselector9901; d=microsoft.com; cv=none; b=edUwCYJWYGakZkUsDqn5JCE12AdGStoPX50KwL0DyN1bBeJ0971TZFRSBF/E5gl4IMBxBRG+qcIkp5nKHtPDqIjdBmizKhOjOTlMFf/m+g4UnvfCWaqtIou0MwidT+Mt+2TdsJagpKzyrkvXu9e9M5B+CU9qkFIr0a3/lNYHSPycniyDFXIDZ1998pmmpqR+1nm+lwmq2SFVGL4kHD4yDf1VxW+yM1hNxHl0fUOY/isAwMToKa+5MeXgjbWbEB6kwoz+5uxl8TFystNzWJHeGawkPvR6DrJdzem/Ru5jLtzHSSz2ELeAo3l/alPidgSPRCvDTluD4SAwRiWloU0RJA==
ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=microsoft.com; s=arcselector9901; h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-SenderADCheck; bh=0lqvNE86if8MkdP8Xsyp8AqtLcm+Ucb/ucaVgsQczbw=; b=SRsr1gTh6N3xVFkDXobWmC6M0JWDRSQgruKiVTo5URBN05m4iv+J2n5PoqlbZK+tv6Wilx695tjg+pGTytBtWn/LjqLk5vrShuGHuli+PwDUFhuW+YDH0w7hlL8hhri3GrCo46cTotccFkVp34kC7uqM6/exmdq2miyUpyCjTV7DW62Vkv+3AiUmS01ifJDPjnWTQvYXV33OS/HizgX9aVTHEAeamcdp+grzPaX9HBmeRqiIcOTW+5+McnC4fj1/cAZ6FwgdPVw2YEvkDaNcTP3iDwCIXMsTQ2yVpJDl4k/0/KDnbflOmcddbNJyDqkL1tDSa5olxR/CrE3kLIJNcw==
ARC-Authentication-Results: i=1; mx.microsoft.com 1; spf=pass smtp.mailfrom=ericsson.com; dmarc=pass action=none header.from=ericsson.com; dkim=pass header.d=ericsson.com; arc=none
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=ericsson.com; s=selector1; h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-SenderADCheck; bh=0lqvNE86if8MkdP8Xsyp8AqtLcm+Ucb/ucaVgsQczbw=; b=V0D4bVo2hPkB9vT8Y/GHnDfZzDrVHms497iRJ8hmHPPQo/Jo9i1XFNOpSMLd+kOLv03grw5/sxdw5DHfVEtbg9uWzpMgHz6QSZ0uvKvyLNIgPOGZDx7b6aa6h6/h88jSeG+7I5UBzuEqquy9aIpoxbyciQrUrxpZLuzVTRZ8yPU=
Received: from HE1PR0701MB2876.eurprd07.prod.outlook.com (2603:10a6:3:56::8) by HE1PR07MB3274.eurprd07.prod.outlook.com (2603:10a6:7:2f::29) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id 15.20.3589.16; Fri, 20 Nov 2020 08:22:54 +0000
Received: from HE1PR0701MB2876.eurprd07.prod.outlook.com ([fe80::50c8:a7da:1a:48a3]) by HE1PR0701MB2876.eurprd07.prod.outlook.com ([fe80::50c8:a7da:1a:48a3%11]) with mapi id 15.20.3611.014; Fri, 20 Nov 2020 08:22:54 +0000
From: Ingemar Johansson S <ingemar.s.johansson@ericsson.com>
To: Sebastian Moeller <moeller0@gmx.de>
CC: Lars Eggert <lars@eggert.org>, tsvwg IETF list <tsvwg@ietf.org>, Ingemar Johansson S <ingemar.s.johansson@ericsson.com>
Thread-Topic: [tsvwg] Reasons for WGLC/RFC asap
Thread-Index: Ada9kaHRGNO57vIZSgq7zPn1SuIYhAAQZ1iAABevuwAACIsIYAACHYWAAAPTeVAAAlcCAAAB1G0AACVeUAAAAGxdIA==
Date: Fri, 20 Nov 2020 08:22:54 +0000
Message-ID: <HE1PR0701MB2876C404248C33BD297191A4C2FF0@HE1PR0701MB2876.eurprd07.prod.outlook.com>
References: <AM8PR07MB747626CB7622CB89209018A8B9E10@AM8PR07MB7476.eurprd07.prod.outlook.com> <5dff4f73463c2a7e7cc8dc8255ae9825e78f4c11.camel@petri-meat.com> <4FF8800F-B618-4818-AF5E-1E997EA9FBF3@eggert.org> <HE1PR0701MB2876C4FDA655284D4E563042C2E00@HE1PR0701MB2876.eurprd07.prod.outlook.com> <3EAC47AC-5937-4DB2-8B3C-D8C8A4459FBA@eggert.org> <HE1PR0701MB28761E448ACA1DAE0B2DCF56C2E00@HE1PR0701MB2876.eurprd07.prod.outlook.com> <F73E8DBB-0887-462C-ACC6-FA9212E50DF7@eggert.org> <HE1PR0701MB2876C5AE506AFCCCD99C1F54C2E00@HE1PR0701MB2876.eurprd07.prod.outlook.com> <BDCF6C59-28FF-4923-99AA-9D10EC9C8AC3@gmx.de>
In-Reply-To: <BDCF6C59-28FF-4923-99AA-9D10EC9C8AC3@gmx.de>
Accept-Language: sv-SE, en-US
Content-Language: en-US
X-MS-Has-Attach: yes
X-MS-TNEF-Correlator:
authentication-results: gmx.de; dkim=none (message not signed) header.d=none;gmx.de; dmarc=none action=none header.from=ericsson.com;
x-originating-ip: [83.227.122.88]
x-ms-publictraffictype: Email
x-ms-office365-filtering-correlation-id: e405f316-deea-4c6f-0395-08d88d2d7acf
x-ms-traffictypediagnostic: HE1PR07MB3274:
x-ms-exchange-transport-forked: True
x-microsoft-antispam-prvs: <HE1PR07MB32741C66849F9F1741C08CF0C2FF0@HE1PR07MB3274.eurprd07.prod.outlook.com>
x-ms-oob-tlc-oobclassifiers: OLM:4714;
x-ms-exchange-senderadcheck: 1
x-microsoft-antispam: BCL:0;
x-microsoft-antispam-message-info: OSG4X/+vTQeyhrCdsK/SKwxsHvLpPga+L87uoNfeG7DNeksML0zr3vGNUO4DlgxJvhCbI2K7+GyXjmNO0MZlMuOVRNaSlf6p8OBG5xIotnYHqCapijrdXUeXHXGMMsZYFY4byPuiYF8WMHb8XxbpB3IWI7Nux3k/Jykml5XPAw73dlgtmBc7aFNpNQ5EOQYvPc1Hqn3la9Mz0BRe2ZrW1B2loWtHZbk+ohpjCjNrAuFmPQrgmOo76RFbNHq028x5y3XafMwMj2yhXD26x2tif8rKMatxmIImUu9qY/jCEevbf9XSta+YYAsk0GjcIkjzzV2ogKWRXpF1R9aqV3y5H4fMqSGs7EBVVcGoqA1CozD0mKPsbxIgV8wEomit/tGujz/Gvv3zk4tHM7H2Kj9qxQ==
x-forefront-antispam-report: CIP:255.255.255.255; CTRY:; LANG:en; SCL:1; SRV:; IPV:NLI; SFV:NSPM; H:HE1PR0701MB2876.eurprd07.prod.outlook.com; PTR:; CAT:NONE; SFS:(4636009)(396003)(366004)(376002)(346002)(39860400002)(136003)(26005)(186003)(53546011)(4001150100001)(6506007)(4326008)(66446008)(64756008)(54906003)(7696005)(66946007)(107886003)(316002)(83380400001)(99936003)(966005)(478600001)(66574015)(71200400001)(76116006)(33656002)(66616009)(66476007)(66556008)(2906002)(6916009)(86362001)(8936002)(8676002)(55016002)(5660300002)(30864003)(9686003)(52536014); DIR:OUT; SFP:1101;
x-ms-exchange-antispam-messagedata: 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
Content-Type: multipart/signed; protocol="application/x-pkcs7-signature"; micalg="SHA1"; boundary="----=_NextPart_000_00AB_01D6BF1E.B9293D20"
MIME-Version: 1.0
X-OriginatorOrg: ericsson.com
X-MS-Exchange-CrossTenant-AuthAs: Internal
X-MS-Exchange-CrossTenant-AuthSource: HE1PR0701MB2876.eurprd07.prod.outlook.com
X-MS-Exchange-CrossTenant-Network-Message-Id: e405f316-deea-4c6f-0395-08d88d2d7acf
X-MS-Exchange-CrossTenant-originalarrivaltime: 20 Nov 2020 08:22:54.5537 (UTC)
X-MS-Exchange-CrossTenant-fromentityheader: Hosted
X-MS-Exchange-CrossTenant-id: 92e84ceb-fbfd-47ab-be52-080c6b87953f
X-MS-Exchange-CrossTenant-mailboxtype: HOSTED
X-MS-Exchange-CrossTenant-userprincipalname: cw63o+aP4MUf/g5m63rkUjVV0J+BBt+sorIsH1ditApPxnGjCn11BEerr3qKQbgf3xE6vgMmCP0AdUyDfvYH4q9jQBBA3wHN+x2Af1PmYVcKp61T6Ydvv5EExtejkdVx
X-MS-Exchange-Transport-CrossTenantHeadersStamped: HE1PR07MB3274
Archived-At: <https://mailarchive.ietf.org/arch/msg/tsvwg/_KWKnd4u3pfSJ2kHqc90HFd-eGs>
Subject: Re: [tsvwg] Reasons for WGLC/RFC asap
X-BeenThere: tsvwg@ietf.org
X-Mailman-Version: 2.1.29
Precedence: list
List-Id: Transport Area Working Group <tsvwg.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/tsvwg>, <mailto:tsvwg-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/tsvwg/>
List-Post: <mailto:tsvwg@ietf.org>
List-Help: <mailto:tsvwg-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/tsvwg>, <mailto:tsvwg-request@ietf.org?subject=subscribe>
X-List-Received-Date: Fri, 20 Nov 2020 08:23:13 -0000

Hi

My take is that network equipment need to be upgraded for other reasons than
AQM functionality. And then we have the case that network gear becomes old
or breaks down (my home WiFi routers have been fragged by lightning twice).
No I don't have hard numbers but I don't see that lack of knowledge about
how for instance edge routers are equipped and how upgradeable they are,
should to be used as an argument against WGLC for the L4S drafts (that
target experimental status). 
This applies also to the VPN tunnels discussion in a separate thread.  
These potential issues can be a part on the L4S experiment and solutions can
be documented as a result of this, but it is not necessarily so that L4S
need to adapt to all possible issues. 

/Ingemar

> -----Original Message-----
> From: Sebastian Moeller <moeller0@gmx.de>
> Sent: den 20 november 2020 08:52
> To: Ingemar Johansson S <ingemar.s.johansson@ericsson.com>
> Cc: Lars Eggert <lars@eggert.org>; tsvwg IETF list <tsvwg@ietf.org>
> Subject: Re: [tsvwg] Reasons for WGLC/RFC asap
> 
> Hi Ingemar,
> 
> a correction below.
> 
> 
> > On Nov 19, 2020, at 15:24, Ingemar Johansson S
> <ingemar.s.johansson=40ericsson.com@dmarc.ietf.org> wrote:
> >
> > Hi
> >
> > Please see inline [IJ]
> >
> > /Ingemar
> >
> >> -----Original Message-----
> >> From: Lars Eggert <lars@eggert.org>
> >> Sent: den 19 november 2020 14:10
> >> To: Ingemar Johansson S <ingemar.s.johansson@ericsson.com>
> >> Cc: Steven Blake <slblake@petri-meat.com>; tsvwg IETF list
> > <tsvwg@ietf.org>
> >> Subject: Re: [tsvwg] Reasons for WGLC/RFC asap
> >>
> >> Hi,
> >>
> >> On 2020-11-19, at 14:36, Ingemar Johansson S
> >> <ingemar.s.johansson@ericsson.com> wrote:
> >>> The only way is see is that the L4S
> >>> drafts are moved to WGLC, then people will hopefully read the drafts
> >>> and come with requests for clarifications where needed. Until then
> >>> you can only expect more of the same long incomprehensible
> >>> discussion threads until March, when we will repeat the same process
> again.
> >>
> >> to clarify: I don't have opinions about the L4S drafts. I haven't
> >> read
> > them in a
> >> while, I agree that I should.
> >>
> >> One point I am trying to make is that since the set of documents we
> >> are discussing seems incomplete, in that it doesn't seem to contain a
> >> TCP
> > variant
> >> that intends to delivers benefits over L4S paths w/o regressions.
> >>
> >> My main point though is that there seem to be questions raised about
> >> the performance and behavior of L4S with various TCP variants. This
> >> is not an issue with the content of the L4S drafts. It's a remaining
> >> uncertainty
> > related to
> >> the experimental evaluation and analysis that the L4S mechanisms have
> >> seen so far. Going forward with a LC is not going to bring further
> >> clarity
> > here.
> >>
> >>> [IJ] The only pain point I see now is the RTT bias in cases where
> >>> long RTT Prague flows compete with short RTT ditto. This is being
> >>> addressed by the developers and it is not only an L4S problem.
> >>> Besides this, Prague will be presented at ICCRG tomorrow as I
understand
> it.
> >>
> >> That is one point. I think interactions with tunnels was another.
> > [IJ] My take is that this is something for L4S ops that I see as a
> > product of the L4S experiment. It is not something that needs to be
> > answered on its own as it is mainly the RFC3168 AQM issue in another
> > shape, we don't know how widely spread this problem is or to how large
> > extent this equipment can be updated, earlier discussions on fq-codel
> > implementations in home gateways was not conclusive I guess but it
> > appears that many of these have automatic upgrade features,
> 
> 	[SM] This is simply untrue, most home router will only see an update
if
> the user actively monitor's the provider's or manufacturer's website and
most
> manufacturer's will only create and distribute updates around the time a
> device is still marketed/sold. There is pretty little home gear out these
which
> gets automatic updates or only notifications of possible updates. I agree
that
> that would be a great situation to be in, but realistically the home
router
> update and security situation is only mildly above the update and security
> situation of IoT devices. Remember it is the "s" in IoT that stands for
> security/safety...
> 	So, if your stance is, automatic updates are robust, reliable and
wide-
> spread, please post some references supporting that hypothesis.
> 
> 
> 
> 
> > I guess the reason here is to be able to upgrade to combat security
> > threats but this is admittedly speculation.
> 
> 	[SM] For someone putting their operational safety in that basket I
> would have expected more robust and reliable numbers for how many
> devices might be amenable to automated updates. Like hard numbers
> supporting the hypothesis that automatic updates are wide spread enough to
> allow distribution of such functionality updates. Also think about who is
> supposed to make back-ports of the required Linux kernel changes to the
> often ancient kernel versions SoC-SDKs are based on? To be honest that
level
> of engineering by wishful thinking frightens me a bit.
> 
> 
> >
> >>
> >> I'm actually looking forward to the presentation on TCP Prague - is
> >> there
> > a
> >> draft?
> > [IJ] Not that I know of, code is found at
> > https://protect2.fireeye.com/v1/url?k=3f509ea0-60cba7e3-3f50de3b-
> 861fc
> > b972bfc-3fb038567b51ac5d&q=1&e=0ad66ee5-96b6-405d-84d7-
> e83c5a03bcba&u=
> > https%3A%2F%2Fgithub.com%2FL4STeam%2F
> 
> 	[SM] Is it just me that sees a problem in that the reference
protocol
> implementation just exists in a repository, without even an attempt of
writing
> an internet dratf describing that protocol? There are zero guarantees the
> tomorrows TCP Prague still is L4S compliant (today's is not, the rfc3168
> detection and fall back are disabled by default, see
> https://protect2.fireeye.com/v1/url?k=c7557841-98ce4102-c75538da-
> 861fcb972bfc-22e4ec3d607132d2&q=1&e=0ad66ee5-96b6-405d-84d7-
> e83c5a03bcba&u=https%3A%2F%2Fgithub.com%2FL4STeam%2Flinux%2Fcom
> mit%2Fb256daedc7672b2188f19e8b6f71ef5db7afc720).
> 
> 
> >>
> >>> Besides this there is discussion around all sorts of cases with
> >>> RFC3168 style AQMs, additional discussion before a WGLC will
> >>> definitely not make us more wise.
> >>
> >> Discussion won't, but experimentation would.
> > [IJ] Yes, but we need to get past the discussion on all possible
> > things that can happen. Recall from the discussion yesterday that
> > Stuart Cheshire and his team has not need evidence of ECN marking
> > AQMs. So I fear that we spend a lot of time discussing problems that are
> very rare.
> 
> 	[SM] Ingemar, I and other OpenWrt users have an rfc3168 AQM on
> my internet access link, that by default uses ECN for the downlink. I do
not
> have the view of the world as apple has, but I can guarantee the number is
> grater than zero. And as stated before people doing this today are exactly
the
> latency conscious users L4S should aim at winning over...
> 
> >
> >>
> >>> As regards to investment, already today there is investment in this,
> >>> examples that are disclosed in the open are Broadcom and Nokia. I
> >>> can imagine that there is some expectation that L4S will materialize
> >>> in RFCs
> >>
> >> Sorry I was unclear. You are right that there is investment by vendors.
> > But I
> >> think the key question if there will be an investment by operators,
> >> since
> > they
> >> need to eventually buy L4S kit and deploy it. And that investment
> >> will
> > only pay
> >> off if end systems actually have deployed a CC scheme that takes
> >> advantage
> > of
> >> L4S. So the ready availability of such a scheme is IMO a key
requirement.
> > [IJ] I would say that we already have CC algos that can be used.
> > Surely they do not meet all the requirements today but I don't see why
> > it will not be possible.
> 
> 	[SM] This tells more about your confidence in your vision than in
what
> might be achiebale in those CCs. IMHO ithe onus is on team L4S to
> demonstrate that possibility by demonstrating a CC that ticks all the
check
> marks (does not need to be perfect, but should show significantly better
> performance in some dimension, while doing at least no harm in others,
> currently TCP Prague fails on both accounts).
> 
> 
> > It is definitely the case that we will be discussing what typical RTTs
> > are like forever but that is not something that should delay the L4S
> > drafts I think.
> 
> 	[SM] Sorry, this is getting absurd, I point out both Bob completely
> missing how PIE works (and what it's target variable actually describes )
and an
> inconsistency between two of the L4S drafts only to be ridiculed here.
> Ingemar, publishing RFC with inconsistent terms and definition is not a
sign of
> a professional authoring process. Reviews are supposed to help finding
such
> issues, and the response of the authors should not be something like your
> offense above, but a simple "thanks for pointing out the inconsistency, we
are
> going to fix it, here is our proposed change". The ambiguity between the
> DualQ and the id drafts I pointed out are real, and "typical RTT" is not a
well
> known term of art that every IETF member or operator is going to
understand
> intuitively.
> 	Also, if my worst fear is correct, protocol and AQM "typical RTT"
> values need to be selected in lock-step to be effective, and such a
> requirement needs to be made explicit in an RFC. And if I am wrong that
the
> two uses of the term have different definitions that needs to be
> disambiguated in the internet drafts, no?
> 
> 
> >
> >>
> >>> [IJ] If this would only be a IETF matter, then you are right. We
> >>> however try to address this also in 3GPP standards to make the whole
> >>> thing work in products, and that is of course hard to do if L4S is
> >>> not
> > even an
> >> RFC.
> >>
> >> Is L4S currently a requirement for a future 3GPP release?
> > [IJ] L4S is not currently pushed for in 3GPP, there is however work on
> > the support for extended reality that requires low latency. L4S will
> > definitely fit there. I would expect that L4S support can be proposed ~
mid
> next year.
> 
> 	[SM] So you are willing to push an under-tested solution into 3GPP,
> but you insist upon that un-tested solution having IETF blessing? That
seems
> rather odd, I would have expected that the primary requirement should be
> "works robustly and reliably without (unacceptable) side-effects" and not
only
> "has RFC status". I have a hard time believing 3GPP works like that...
> 
> Best Regards
> 	Sebastian
> 
> 
> >
> >>
> >> Thanks,
> >> Lars