Re: [tsvwg] ECN encapsulation drafts - update and next step

"Black, David" <David.Black@dell.com> Mon, 18 July 2022 21:27 UTC

Return-Path: <David.Black@dell.com>
X-Original-To: tsvwg@ietfa.amsl.com
Delivered-To: tsvwg@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id D5A55C147930 for <tsvwg@ietfa.amsl.com>; Mon, 18 Jul 2022 14:27:42 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -2.686
X-Spam-Level:
X-Spam-Status: No, score=-2.686 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, DKIMWL_WL_HIGH=-0.582, DKIM_SIGNED=0.1, DKIM_VALID=-0.1, DKIM_VALID_AU=-0.1, DKIM_VALID_EF=-0.1, RCVD_IN_DNSWL_BLOCKED=0.001, RCVD_IN_MSPIKE_H2=-0.001, RCVD_IN_ZEN_BLOCKED_OPENDNS=0.001, SPF_HELO_NONE=0.001, SPF_NONE=0.001, T_SCC_BODY_TEXT_LINE=-0.01, URIBL_BLOCKED=0.001, URIBL_DBL_BLOCKED_OPENDNS=0.001, URIBL_ZEN_BLOCKED_OPENDNS=0.001] autolearn=ham autolearn_force=no
Authentication-Results: ietfa.amsl.com (amavisd-new); dkim=pass (2048-bit key) header.d=dell.com
Received: from mail.ietf.org ([50.223.129.194]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id De6iZRdybEpg for <tsvwg@ietfa.amsl.com>; Mon, 18 Jul 2022 14:27:39 -0700 (PDT)
Received: from mx0b-00154904.pphosted.com (mx0b-00154904.pphosted.com [148.163.137.20]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id 2AD0AC14F72E for <tsvwg@ietf.org>; Mon, 18 Jul 2022 14:27:39 -0700 (PDT)
Received: from pps.filterd (m0170398.ppops.net [127.0.0.1]) by mx0b-00154904.pphosted.com (8.17.1.5/8.17.1.5) with ESMTP id 26IGIRXO015132; Mon, 18 Jul 2022 17:27:36 -0400
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=dell.com; h=from : to : cc : subject : date : message-id : references : in-reply-to : content-type : content-transfer-encoding : mime-version; s=smtpout1; bh=nQ5yTOEf3a74vAO/AWnVzphavBwfT1vs8ohYdBq9c+Q=; b=yda7dXHPtHpZ7zmnByM6HJnsB+2aG2oJHyxLaS2ondy6Ve85usTm8saVN0Wx7iERD3cS MkN0PpGRVQ2MZ0b5LZKpuzVUneLqVfQ/2tly7pNuux4jH5oKlsXSZ8J8pqgootCHivys CB7qFAd2Xw6HkXv3Lk6nJrVkBd6NPJqS+r6mr/bto3X5mBeu6VPPKf1RbDzY3F2E3OiO Pr56Axqn5LyGgFMN0yZ5E3b5YnMSunVeF9HfUDx+0kfZvfbf3hW3RCqibafGchlu5dDU rXE/A+omGmOvIAZm1+vXnIwkWNlYqAEY2H3P2uOAqyWpjGe7t0Mmi/OLMm1QfeS9v8Au Vw==
Received: from mx0a-00154901.pphosted.com (mx0a-00154901.pphosted.com [67.231.149.39]) by mx0b-00154904.pphosted.com (PPS) with ESMTPS id 3hbrjaqg42-1 (version=TLSv1.2 cipher=ECDHE-RSA-AES256-GCM-SHA384 bits=256 verify=NOT); Mon, 18 Jul 2022 17:27:36 -0400
Received: from pps.filterd (m0134746.ppops.net [127.0.0.1]) by mx0a-00154901.pphosted.com (8.17.1.5/8.17.1.5) with ESMTP id 26ILPQ98039380; Mon, 18 Jul 2022 17:27:35 -0400
Received: from nam10-mw2-obe.outbound.protection.outlook.com (mail-mw2nam10lp2103.outbound.protection.outlook.com [104.47.55.103]) by mx0a-00154901.pphosted.com (PPS) with ESMTPS id 3hcs548km5-1 (version=TLSv1.2 cipher=ECDHE-RSA-AES256-GCM-SHA384 bits=256 verify=OK); Mon, 18 Jul 2022 17:27:34 -0400
ARC-Seal: i=1; a=rsa-sha256; s=arcselector9901; d=microsoft.com; cv=none; b=GqBRey6rvpYKKaEKeyBXbWCTtMbs7KSj70cR9b/ZEssr6qE02wDuk22a+1zsta8IgFafP75DjAZ0TNLcPH7lt5V7R2X36dac9eDvlmQbVj2S06Xn4Gp+knx1E0uiiVjAhdJrVoyo/aaF/ckL9BfrJb6XGTPO1l8+jYugjT86QbjjojhU+cOJtsAArnMWTPb6uTGkoDuCDNzpAFwiP/L0TwhE1d72kXk19dTdg7/fqNWMp1gfaMHz607CcLfCW7o01qxtNIMRMu8C6ndPuHfkvWMGoznKVCo5KrkOZiHzQ/zqMxN+gRje2usrIkicHHKbLl4oZyh8RCzxjXDYZJGQqA==
ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=microsoft.com; s=arcselector9901; h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-AntiSpam-MessageData-ChunkCount:X-MS-Exchange-AntiSpam-MessageData-0:X-MS-Exchange-AntiSpam-MessageData-1; bh=nQ5yTOEf3a74vAO/AWnVzphavBwfT1vs8ohYdBq9c+Q=; b=kkxTPpwnvJbYXyq0Auf28Nw1Oe1JK5vFZsJI5Q1L6EmDlRYIO7mlwCf6QoBP6PDtx2xUx2IzMD+WNjHagbufXHxQyBTPNi14+VKo3AfdYPUo4PuJjDuDmlsAWV2J98Sxw/G7HLVERxLUpLuRDyTb64i9Oyehhc8xuDO4ZvEa1UDVK39+KU/s9qw196dsgEkw78LqkJbImcWmFvQlGOHs3x+uaVs5kItjvabuCg4GmKbwoXM56XAwh4Rq3OrgCYu14mBPc33pFEgiL0ZNBgbGhRGSpR3bOyPIQ8SumusHsgIKrImqtaMpeGZzJSNS5eEOanweNP07cdvlTXARbW3e8A==
ARC-Authentication-Results: i=1; mx.microsoft.com 1; spf=pass smtp.mailfrom=dell.com; dmarc=pass action=none header.from=dell.com; dkim=pass header.d=dell.com; arc=none
Received: from MN2PR19MB4045.namprd19.prod.outlook.com (2603:10b6:208:1e4::9) by CY5PR19MB6410.namprd19.prod.outlook.com (2603:10b6:930:21::22) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id 15.20.5438.23; Mon, 18 Jul 2022 21:27:32 +0000
Received: from MN2PR19MB4045.namprd19.prod.outlook.com ([fe80::d909:8ecd:16d5:2e87]) by MN2PR19MB4045.namprd19.prod.outlook.com ([fe80::d909:8ecd:16d5:2e87%3]) with mapi id 15.20.5438.023; Mon, 18 Jul 2022 21:27:32 +0000
From: "Black, David" <David.Black@dell.com>
To: Sebastian Moeller <moeller0@gmx.de>
CC: "tsvwg@ietf.org" <tsvwg@ietf.org>, "Black, David" <David.Black@dell.com>
Thread-Topic: [tsvwg] ECN encapsulation drafts - update and next step
Thread-Index: AdiX3EoLScDQ9cfkRFyYf58BVwuxGgAQEcqAAB1tR2AAMRgXgABkzgGQ
Date: Mon, 18 Jul 2022 21:27:32 +0000
Message-ID: <MN2PR19MB404531E5EDBD18522548432E838C9@MN2PR19MB4045.namprd19.prod.outlook.com>
References: <MN2PR19MB4045C15640F08BD00891968583889@MN2PR19MB4045.namprd19.prod.outlook.com> <1B55F840-4622-4C69-B1B3-02A0C509FFBF@gmx.de> <MN2PR19MB4045B9B1A154264C7401ECB8838B9@MN2PR19MB4045.namprd19.prod.outlook.com> <E3E3DCE1-317D-478A-89A4-006A50D5C356@gmx.de>
In-Reply-To: <E3E3DCE1-317D-478A-89A4-006A50D5C356@gmx.de>
Accept-Language: en-US
Content-Language: en-US
X-MS-Has-Attach:
X-MS-TNEF-Correlator:
msip_labels: MSIP_Label_dad3be33-4108-4738-9e07-d8656a181486_Enabled=true; MSIP_Label_dad3be33-4108-4738-9e07-d8656a181486_SetDate=2022-07-18T21:05:59Z; MSIP_Label_dad3be33-4108-4738-9e07-d8656a181486_Method=Privileged; MSIP_Label_dad3be33-4108-4738-9e07-d8656a181486_Name=Public No Visual Label; MSIP_Label_dad3be33-4108-4738-9e07-d8656a181486_SiteId=945c199a-83a2-4e80-9f8c-5a91be5752dd; MSIP_Label_dad3be33-4108-4738-9e07-d8656a181486_ActionId=f0f9ab09-8760-474f-a3ed-5e947533de02; MSIP_Label_dad3be33-4108-4738-9e07-d8656a181486_ContentBits=0
x-ms-publictraffictype: Email
x-ms-office365-filtering-correlation-id: 79de01ef-ba7d-4705-31d7-08da6904533b
x-ms-traffictypediagnostic: CY5PR19MB6410:EE_
x-exotenant: 2khUwGVqB6N9v58KS13ncyUmMJd8q4
x-ms-exchange-senderadcheck: 1
x-ms-exchange-antispam-relay: 0
x-microsoft-antispam: BCL:0;
x-microsoft-antispam-message-info: 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
x-forefront-antispam-report: CIP:255.255.255.255; CTRY:; LANG:en; SCL:1; SRV:; IPV:NLI; SFV:NSPM; H:MN2PR19MB4045.namprd19.prod.outlook.com; PTR:; CAT:NONE; SFS:(13230016)(4636009)(346002)(39860400002)(376002)(136003)(366004)(396003)(8936002)(5660300002)(30864003)(52536014)(2906002)(86362001)(15650500001)(33656002)(6916009)(76116006)(54906003)(40140700001)(4326008)(64756008)(66446008)(786003)(66476007)(66556008)(66946007)(55016003)(8676002)(316002)(53546011)(9686003)(7696005)(107886003)(6506007)(122000001)(82960400001)(478600001)(41300700001)(966005)(71200400001)(186003)(66574015)(26005)(38070700005)(38100700002)(83380400001); DIR:OUT; SFP:1101;
x-ms-exchange-antispam-messagedata-chunkcount: 1
x-ms-exchange-antispam-messagedata-0: gs2MqWOrHyip/enZEsbtn9RvQiM0fzd+1uelnTdXYaljbcrfb/rorqbpgRtW8FXcrfyB0NAAqwkIGL7AFLJA+dMWat24bkK7HfgkBiBkngWE/UIsR0hjw6p45GpLZtAwB2pU64EGWjet27fdU0APeV9ji+r00AoPHZRhbF27aQR0dibWkuR4UpfyXSvQFphx5SuJ41F6kv/BiNeruA0xmsyCocTNxhURzM7a1toC3PPxmvzIee/r28uG8hjzeiZ60j7q2uVYM7rUE6mbZkFoSGbZhn+Y60wL3wBH3/tfeunZNP4/bQoYGbWAO/RVVZ9QpqZ0BCwmAAGm+v8c0xSpspSD61tjfR4MVuHiTywy88GQkBHfCu1Owcuf6usG2kQEk1MnSx1oVoO6Er9CSbo7oA8UgbVkIUkLYcWJUxgKtTD6WqxTFY1Z32D1EjAYdwIyS8E0OpNqS5gtKWTdKeOlf5X8e439DQedbtlbmvpqItWPwGcb/YQPyYIqNqFwFqaN9RZIV85H4OQGjwqcDPP8o+nZ3PR2GI0y9XsWqCkFa4ztGrj7TN+nVPH8/o735deG2F2RcgQxU4FTtaY/IQeMEokPryjHMoxoUP9O3YiYRfahWEEW4Y6tc3GQvJEJA0YzXPBZD8Ox1h0I4Vk86+P09VrlhAT4t0HzgSS6gcRx7fr27o8Z9VNP32kuFYSyDMnT0zZgE5YIS9kyFRXgc+AqpLJb1FBvvNulvTtiOp4NtDIg5XljmkgBaCj1OqUoQOEgQkXrS96RRjt7XryUpInIkqUnuKtKIAsZb77Dz/fufTjUrd6EL0MVNAk1nLXwiaQGm/J8fK9VYYml9tLyLcsSzBSpB0AXYLG1PQ64CJNCOyWTPjuBI8+iYnysnlwcP+03YOgrvfHfOPCTFsbgJWtPILMwRlAO6DglgYRhaeZHoHbhI3jG8QLNQ74ZAujX8he7iutADOcxDN5jzqMgCq/RlEE/agecpZyNCiBec92NKu3JZgSPFAVW+RDi9ateKS/86nda8r2ZrEJW38Iin7kPke4mYI5+rKEUdkRM46BVgKoJYp6+iWsuf9/EB5VFv/FES0srHQkpTUJ7erlrKvnOpcn+k9d1PU3lm1VF7nYaj/+fJ3qriwRGqaqEgg5TKO45+A7RicQTSvyrA2hn7i/+tZZOtGXUMvM1n4bg3+dvoq7D3Y7hBs8aKs97ThuWkvxVTxyOUxfFObsyqFPw2EiURGmC1xeHZJcRaxi4Hwf6kbuT/cyUXCLT2yvxn3zTA4A2bJ8O1MWeIoRm6QQmLyoa40PBhIpcSerUbHGyAR0917I+dDoP0C0Rvu9KBs1f5Tg1Pb+I1cw+ja0+FgJb6+d+jzGcX16ywvTq76Ypo9QFUwDtGoCjRXg+jbB3wfA0NuCl6nMnbX8vP+jilAxqScjoCsdwVaRx17MCTZMzpEXHgpEYxLqFqlS5TGMOT3ChKMn7rmp4O7yhY19rZH4SZP4hr76/gNCk76jTHDzdGwBKEj0Rdm+ucDWbw33v/DYx5XiD/W4Z1ah+1GaDc+0R71m1vAJgWU/BgKKZHU5VUvf/Zg7RWVi0JyAA1LisPp7zVTYO
Content-Type: text/plain; charset="utf-8"
Content-Transfer-Encoding: base64
MIME-Version: 1.0
X-OriginatorOrg: Dell.com
X-MS-Exchange-CrossTenant-AuthAs: Internal
X-MS-Exchange-CrossTenant-AuthSource: MN2PR19MB4045.namprd19.prod.outlook.com
X-MS-Exchange-CrossTenant-Network-Message-Id: 79de01ef-ba7d-4705-31d7-08da6904533b
X-MS-Exchange-CrossTenant-originalarrivaltime: 18 Jul 2022 21:27:32.3208 (UTC)
X-MS-Exchange-CrossTenant-fromentityheader: Hosted
X-MS-Exchange-CrossTenant-id: 945c199a-83a2-4e80-9f8c-5a91be5752dd
X-MS-Exchange-CrossTenant-mailboxtype: HOSTED
X-MS-Exchange-CrossTenant-userprincipalname: 8Hchex5UrrCnzUh/SkIjCXw17pZz+3dblK0bw15JqCdl+3kOhvTinz8xogs/iWhV+C7NIYsdE6hBZxpogNbehw==
X-MS-Exchange-Transport-CrossTenantHeadersStamped: CY5PR19MB6410
X-Proofpoint-Virus-Version: vendor=baseguard engine=ICAP:2.0.205,Aquarius:18.0.883,Hydra:6.0.517,FMLib:17.11.122.1 definitions=2022-07-18_20,2022-07-18_01,2022-06-22_01
X-Proofpoint-Spam-Details: rule=outbound_notspam policy=outbound score=0 mlxlogscore=999 adultscore=0 suspectscore=0 lowpriorityscore=0 phishscore=0 impostorscore=0 clxscore=1015 bulkscore=0 malwarescore=0 priorityscore=1501 mlxscore=0 spamscore=0 classifier=spam adjust=0 reason=mlx scancount=1 engine=8.12.0-2206140000 definitions=main-2207180089
X-Proofpoint-GUID: GFjOQ-D_HHy7c2b9ocxJ1LH_GwAP5S-D
X-Proofpoint-ORIG-GUID: GFjOQ-D_HHy7c2b9ocxJ1LH_GwAP5S-D
X-Proofpoint-Spam-Details: rule=notspam policy=default score=0 mlxscore=0 phishscore=0 adultscore=0 suspectscore=0 spamscore=0 bulkscore=0 malwarescore=0 mlxlogscore=999 classifier=spam adjust=0 reason=mlx scancount=1 engine=8.12.0-2206140000 definitions=main-2207180089
Archived-At: <https://mailarchive.ietf.org/arch/msg/tsvwg/2VP7_6cdbLSgY2bXKTMRCpvqft8>
Subject: Re: [tsvwg] ECN encapsulation drafts - update and next step
X-BeenThere: tsvwg@ietf.org
X-Mailman-Version: 2.1.39
Precedence: list
List-Id: Transport Area Working Group <tsvwg.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/tsvwg>, <mailto:tsvwg-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/tsvwg/>
List-Post: <mailto:tsvwg@ietf.org>
List-Help: <mailto:tsvwg-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/tsvwg>, <mailto:tsvwg-request@ietf.org?subject=subscribe>
X-List-Received-Date: Mon, 18 Jul 2022 21:27:42 -0000

Hi Sebastian,

> This is quite a lot of text. I still think that recommending quite different methods here is increasing ambiguity of the signal
> (making the job of the end-points interpreting that signal harder); but if these methods are not interpreted as "incompatible" that is no show stopper*.

Good, thanks!

> However the text is clearly on an abstract level and appears to be incomplete.:
> 
> *  A counter ('in') tracks octets arriving within the payload of
>       marked L2 frames and another ('out') tracks octets departing in
>       marked IP packets.  While 'in' exceeds 'out', forwarded IP packets
>       are ECN-marked.  If 'out' exceeds 'in' for longer than a timeout,
>       both counters are zeroed, to ensure that the start of the next
>       congestion episode propagates immediately;
> 
> If the issue arises that the L2-layer supports and exercises ECN, but all packets it carries are Not-ECT packets and will be dropped instead of marked,
> the out counter will not increase, the in counter however will accumulate quite some debt,

Yes, it will, and that's part of a larger structural problem for all of Section 4.6, as one cannot propagate any ECN marking to a Not-ECT packet via any algorithm.  For this (goal #2) algorithm, something would need to be done, e.g.:
> 	So surely such tracking would need to count marked and dropped octets...

Beyond that:
> The text for goal #1 above that paragraph used the phrase "propagation of congestion signal" which can be more easily understood to be either a CE-mark or a drop,
> than "('out') tracks octets departing in marked IP packets" which to me reads clearly as not encompassing drops.

Since it's necessary to modify text here, let's put in some more direct text to explicitly state that rule 1 in Section 4.4 requires that Not-ECT IP packets be dropped instead of marked with CE.  It might be possible to write that text once in Section 4.6 in a way that applies to both goals and all three examples.  Bob - care to suggest some changes to accomplish that?

Thanks, --David

-----Original Message-----
From: Sebastian Moeller <moeller0@gmx.de> 
Sent: Saturday, July 16, 2022 4:57 PM
To: Black, David
Cc: tsvwg@ietf.org
Subject: Re: [tsvwg] ECN encapsulation drafts - update and next step


[EXTERNAL EMAIL] 

Hi David,


> On Jul 15, 2022, at 23:40, Black, David <David.Black@dell.com> wrote:
> 
> Hi Sebastian,
> 
> This might have a quick resolution ...
> 
>> To clarify, we are talking about what you called paragraph 2 in https://mailarchive.ietf.org/arch/msg/tsvwg/btsauScSUsHaQIt0YE8eH5f-_Uc/
>> 
>> "Congestion indications SHOULD be propagated on the basis that an
>> encapsulator or decapsulator SHOULD approximately preserve the
>> proportion of PDUs with congestion indications arriving and leaving."
>> 
>> This is the part where I object to continuing with if we recommend incompatible approaches. I am NOT objection to the rest of the draft.
> 
> Thank you for clarifying. The text quoted above is not present in the -17 version of the draft.
> 
> Please check section 4.6 of the -17 version (https://datatracker.ietf.org/doc/html/draft-ietf-tsvwg-ecn-encap-guidelines-17*section-4.6), and let us know if you have any further problems with the text in that section.

	This is quite a lot of text. I still think that recommending quite different methods here is increasing ambiguity of the signal (making the job of the end-points interpreting that signal harder); but if these methods are not interpreted as "incompatible" that is no show stopper*. 

However the text is clearly on an abstract level and appears to be incomplete.:

*  A counter ('in') tracks octets arriving within the payload of
      marked L2 frames and another ('out') tracks octets departing in
      marked IP packets.  While 'in' exceeds 'out', forwarded IP packets
      are ECN-marked.  If 'out' exceeds 'in' for longer than a timeout,
      both counters are zeroed, to ensure that the start of the next
      congestion episode propagates immediately;

If the issue arises that the L2-layer supports and exercises ECN, but all packets it carries are Not-ECT packets and will be dropped instead of marked, the out counter will not increase, the in counter however will accumulate quite some debt, that will be imposed on later IP packets, potentially constructed out of un-marked L2-frames. That in spite of congestion already being signaled by dropped Not-ECT IP packets. And the zeroing condition does not apply here since IN >> OUT.
	So surely such tracking would need to count marked and dropped octets... 

I believe this is not the intended method, but a consequence of trying to keep this concise, still this is not ideal.
The text for goal #1 above that paragraph used the phrase "propagation of congestion signal" which can be more easily understood to be either a CE-mark or a drop, than "('out') tracks octets departing in marked IP packets" which to me reads clearly as not encompassing drops.


I would rather describe less here than more, but it is the clearly the decision of the authors how deep they want to go here.


Regards
	Sebastian


*) Also he differences in markings/drops emitted from such an reframing node will probably be relatively small, compared to say changing how a single received CE mark is to be interpreted.


> 
> Thanks, --David
> 
> -----Original Message-----
> From: Sebastian Moeller <moeller0@gmx.de> 
> Sent: Friday, July 15, 2022 3:29 AM
> To: Black, David
> Cc: tsvwg@ietf.org
> Subject: Re: [tsvwg] ECN encapsulation drafts - update and next step
> 
> 
> [EXTERNAL EMAIL] 
> 
> Hi David,
> 
> 
> it seems like there is considerable confusion about the course of the recent discussion on the mailing list regarding this topic, thanks for giving me the opportunity to summarize it. See below [SM]
> 
> 
>> On Jul 15, 2022, at 01:55, Black, David <David.Black=40dell.com@dmarc.ietf.org> wrote:
>> 
>> Writing as the WG chair responsible for these two drafts … the two ECN encapsulation drafts are:
>> 	• draft-ietf-tsvwg-ecn-encap-guidelines; and
>> 	• draft-ietf-tsvwg-rfc6040update-shim .
>> Both drafts have been through WG Last Call with each emerging with a single open issue around propagation of ECN codepoints.
>> 
>> The rfc6040update-shim draft issue around reassembly of fragments was resolved well over a year ago. The text that resolves the issue initially appeared in Section 5 of the -13 version of the draft, and has not been changed since.
>> 
>> The open issue in the ECN encap draft is how to specify propagation of ECN codepoints across reframing of L2 frames to IP packets when L2 framing boundaries do not necessarily align with IP packet boundaries. I believe that the current -17 version of the ecn-encap draft contains text (in Section 4.6) that reflects the current situation – there are two possible design approaches, both approaches yield implementations that are workable in practice, and the WG as a whole is not recommending one approach over the other, much as individual working group members have strong individual preferences for each approach.
> 
> 	[SM] I interpret this as your position is the two approaches are "compatible enough" (I will get to the confusion about compatibility below). 
> 
>> Sebastian Moeller has strongly objected to moving forward with that text
> 
> 	[SM] To clarify, we are talking about what you called paragraph 2 in https://urldefense.com/v3/__https://mailarchive.ietf.org/arch/msg/tsvwg/btsauScSUsHaQIt0YE8eH5f-_Uc/__;!!LpKI!mCzIJj85D64iWM4gj90WbV_HnSFuqXSiscgq-frpcGHetSubcmkJekbZtfhdafFKaI6gFEfEtZLNyR4DLw$ [mailarchive[.]ietf[.]org]
> 
> "Congestion indications SHOULD be propagated on the basis that an
> encapsulator or decapsulator SHOULD approximately preserve the
> proportion of PDUs with congestion indications arriving and leaving."
> 
> This is the part where I object to continuing with if we recommend incompatible approaches. I am NOT objection to the rest of the draft.
> 
> 
> 
>> on the grounds that it amounts to "two incompatible methods/implementations." The text in the draft definitely describes multiple ways to implement the same functionality and the results can be expected to exhibit different behavior under similar circumstances. That leaves the question of whether the multiple methods/implementations are incompatible, which requires consideration of what they could be incompatible with.
> 
> 	[SM] As far as I am concerned the issue is that end points should be able to deduce the kind of signal the marking node in the network intended to convey to them, since communication is already a challenge, it helps if any signal sent is as unambiguous as possible. A congestion control algorithm can work better and/or faster the more it knows about the veridical situation at the marking node when the marking was performed, I hope this is an uncontentious statement.
> 
> 
>> Multiple implementations of reframing L2 frames to IP packets do not directly interact with each other – the crucial area of compatibility is interaction of the reframing ECN codepoint propagation behavior with congestion control functionality that reacts to ECN congestion indications.
> 
> 	[SM] May I ask why? If for whatever reason multiple non-IP encapsulations (with different frame sizes) are stacked on top of each other that employ some ECN marking the propagation problem would apply here as well. However that is rather theoretical and a case probably not worth caring for.
> 
>> Different ECN codepoint propagation approaches can be expected to interact differently with different congestion control algorithms, but I've not seen any evidence of an incompatibility (e.g., congestion control algorithm failure) in that interaction. I'll observe that some amount of variability in this area is a feature (not a bug), e.g., there is not a single standard congestion control algorithm for all traffic on the entire Internet, nor should there be.
> 
> 	[SM] This is about the information content of the received signal, the less ambiguous it is the better for the end points, independent on how the endpoints react to that signal.
> 
> 
>> I'm going to stop here to allow Sebastian to restate and summarize his objection – in its current form, it does not appear to be a well-grounded technical objection, but that conclusion is based almost entirely on his use of one word, "incompatible", which might have been a poor word choice on his part.
> 
> 	[SM] Let me try to re-cap this:
> 
> Starting in https://urldefense.com/v3/__https://mailarchive.ietf.org/arch/msg/tsvwg/kIegjead67IfIS7XTx9g6Gw5qeY/__;!!LpKI!mCzIJj85D64iWM4gj90WbV_HnSFuqXSiscgq-frpcGHetSubcmkJekbZtfhdafFKaI6gFEfEtZKhXLa7qA$ [mailarchive[.]ietf[.]org]:
> 
>>> Jonathan:
>>>>> Two possible implementation approaches to propagating congestion
>>>>> indications are packet counting (e.g., proportion of IP PDUs sent with
>>>>> congestion indications approximately matches the proportion of layer-2
>>>>> frames received with congestion indications) and byte counting (e.g.,
>>>>> number of payload bytes in IP PDUs that have congestion indications
>>>>> is approximately equivalent to the number of bytes in layer-2 frames
>>>>> received with congestion indications).
>> 
>> Bob:
>> [BB]
>> 1) "Two possible" avoids saying that they are incompatible. I think it's 
>> best to say it how it is.
>> And I think the text ought to refer to the two relevant RFCs (§2.4 of 
>> RFC7141 and §5.3 of RFC3168) that are the source of the disagreement.
> 
> It was Bob, the author of the draft, that classified the two approaches as incompatible. So I argue that "incompatible" has not been a poor word choice on my part, if it was a poor choice at all.
> 
> 
> I then took Bob at his word, and accepted his classification in good faith:
> 
> https://urldefense.com/v3/__https://mailarchive.ietf.org/arch/msg/tsvwg/B4wELnQhE9lxOkv-drwqF9dSpT0/__;!!LpKI!mCzIJj85D64iWM4gj90WbV_HnSFuqXSiscgq-frpcGHetSubcmkJekbZtfhdafFKaI6gFEfEtZL_VBO5QA$ [mailarchive[.]ietf[.]org]
> 
>>>> [BB]
>>>> 1) "Two possible" avoids saying that they are incompatible. I think it's best to say it how it is.
>>> 
>>> [snipped here because this is addressed at the idea of having two "incompatible" methods proposed]
>> 
>> 	[SM] I respectfully disagree, an RFC should not propose two incompatible methods/implementations. I consider this to be really fundamental, the endpoints are supposed to interpret the "congestion signal" from the network and act appropriately, a requirement that will work much better if the network employs unambiguous behavior in creating and handling such marks. I understand that real life implementations might differ from an RFC's SHOULD (and that is fine) but I would think it wise for the RFC to not sow the seeds of confusion by proposing incompatible implementations. So IMHO if we can not come to an agreement we are indeed better off by not mentioning any method at all because that would be less confusing.
> 
> 
> 
> To which Bob replied:
> https://urldefense.com/v3/__https://mailarchive.ietf.org/arch/msg/tsvwg/H-m5E3OSH-oBjYjsvLb1vKOPKaw/__;!!LpKI!mCzIJj85D64iWM4gj90WbV_HnSFuqXSiscgq-frpcGHetSubcmkJekbZtfhdafFKaI6gFEfEtZLXXdUI7w$ [mailarchive[.]ietf[.]org]
> 
>> [BB] David already said that the chairs have decided to wrap this up.
>> There are loads of RFCs and standards from other bodies where a choice 
>> is left open and written up as 'for further study'.
>> Not everyone has infinite time to continually write to a mailing list.
>> The world is not perfect.
> 
> 
> 
> This does not imply that Bob changed his assessment of these approaches as incompatible, but simply that he is fine with just publishing the RFC with contradictory recommendations.
> 
> 
> 	I do not see that a request to make sure we publish useful and contradiction-free RFCs could be in any way controversial, so I am a bit puzzled about the turn of the discussion here. 
> 	So the question is, is Bob correct in that the two approaches are incompatible or does your opinion that they are "compatible enough" (if that is an acceptable re-phrasing of your position) carry the WG's consensus.
> 
> 
> Regards
> 	Sebastian
> 
> 
> P.S.: For what it is worth, at this point in time, I personally would mildly prefer to drop that paragraph and carry on with the rest. Partly because I do not think that the situation we are discussing here is more than a rare corner-case, and it seems wiser to first empirically figure out what works than giving recommendations mostly built on theoretical considerations. If working implementations of both proposed approaches should exist that confirm they both work (equally well) re-adding such a paragraph might make sense, but lacking such data not saying anything might be the more conservative approach.
> 
> 
>> 
>> Thanks, --David
>> 
>> David L. Black, Sr. Distinguished Engineer, Technology & Standards
>> Infrastructure Solutions Group, Dell Technologies
>> mobile +1 978-394-7754 David.Black@dell.com