Re: [tsvwg] Gorry Fairhurst Individual thoughts on choosing whether/how to advance ECN work.

Bob Briscoe <in@bobbriscoe.net> Fri, 22 May 2020 22:44 UTC

Return-Path: <in@bobbriscoe.net>
X-Original-To: tsvwg@ietfa.amsl.com
Delivered-To: tsvwg@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 348B23A0DDB for <tsvwg@ietfa.amsl.com>; Fri, 22 May 2020 15:44:21 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -2.099
X-Spam-Level:
X-Spam-Status: No, score=-2.099 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, DKIM_SIGNED=0.1, DKIM_VALID=-0.1, DKIM_VALID_AU=-0.1, DKIM_VALID_EF=-0.1, SPF_HELO_FAIL=0.001, SPF_PASS=-0.001, URIBL_BLOCKED=0.001] autolearn=ham autolearn_force=no
Authentication-Results: ietfa.amsl.com (amavisd-new); dkim=pass (2048-bit key) header.d=bobbriscoe.net
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id baPmbWGZd8Mi for <tsvwg@ietfa.amsl.com>; Fri, 22 May 2020 15:44:09 -0700 (PDT)
Received: from cl3.bcs-hosting.net (cl3.bcs-hosting.net [3.11.37.202]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id 843903A0DD1 for <tsvwg@ietf.org>; Fri, 22 May 2020 15:44:09 -0700 (PDT)
DKIM-Signature: v=1; a=rsa-sha256; q=dns/txt; c=relaxed/relaxed; d=bobbriscoe.net; s=default; h=Content-Transfer-Encoding:Content-Type: In-Reply-To:MIME-Version:Date:Message-ID:From:References:Cc:To:Subject:Sender :Reply-To:Content-ID:Content-Description:Resent-Date:Resent-From: Resent-Sender:Resent-To:Resent-Cc:Resent-Message-ID:List-Id:List-Help: List-Unsubscribe:List-Subscribe:List-Post:List-Owner:List-Archive; bh=7ESVH4e4ZdpOhP5qxAuQpknz2cW6cqwBtBaGAeHClxs=; b=r1vUN0wBVhu09qqbYBK8O/G3Wr ftGwjqzqDNM6KWY8yUTiwxra2jMpw37wTTCmHvtbuwGgW59q7Jz4TRGNFYw3y8kZrXoJXNdolbiM7 liNeUw04BjSizycilNCX+EvL08DffvR0FOC99ZpH7MPa6fyg4adOuPG6EfdSChyks6haCPLqlzhln QGLzrvqm1WXX+zZa6tpzPESL4GgMkn/bGhZKhoXmdpBgV5XOjOPf4pdemzuYj+wjX8rMG6DvAesnQ JtoxQ7mVG4XMF+RJVBOD8QBMOJC6acSYIcKzRGa+ULFY1zISwNOTNh3ROWJNBXiE/TD0Uf1OVxArN P5OVxtSQ==;
Received: from [31.185.135.128] (port=38116 helo=[192.168.0.6]) by cl3.bcs-hosting.net with esmtpsa (TLS1.2) tls TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256 (Exim 4.93) (envelope-from <in@bobbriscoe.net>) id 1jcGOc-00BtEL-Co; Fri, 22 May 2020 23:44:06 +0100
To: Paul Vixie <paul@redbarn.org>, Gorry Fairhurst <gorry@erg.abdn.ac.uk>, tsvwg@ietf.org
Cc: Joseph Touch <touch@strayalpha.com>
References: <dbc71da6-70f1-7369-1d2d-f08fb3b08b69@erg.abdn.ac.uk> <999D213E-D708-4189-990E-1801F8C6E814@strayalpha.com> <21483444.sDhFMENYeD@linux-9daj>
From: Bob Briscoe <in@bobbriscoe.net>
Message-ID: <a85600da-e69f-9190-7ca1-d23a7e7246f9@bobbriscoe.net>
Date: Fri, 22 May 2020 23:44:04 +0100
User-Agent: Mozilla/5.0 (X11; Linux x86_64; rv:60.0) Gecko/20100101 Thunderbird/60.6.1
MIME-Version: 1.0
In-Reply-To: <21483444.sDhFMENYeD@linux-9daj>
Content-Type: text/plain; charset="utf-8"; format="flowed"
Content-Transfer-Encoding: 8bit
Content-Language: en-GB
X-AntiAbuse: This header was added to track abuse, please include it with any abuse report
X-AntiAbuse: Primary Hostname - cl3.bcs-hosting.net
X-AntiAbuse: Original Domain - ietf.org
X-AntiAbuse: Originator/Caller UID/GID - [47 12] / [47 12]
X-AntiAbuse: Sender Address Domain - bobbriscoe.net
X-Get-Message-Sender-Via: cl3.bcs-hosting.net: authenticated_id: in@bobbriscoe.net
X-Authenticated-Sender: cl3.bcs-hosting.net: in@bobbriscoe.net
X-Source:
X-Source-Args:
X-Source-Dir:
Archived-At: <https://mailarchive.ietf.org/arch/msg/tsvwg/1GkfPE5SMJz1AEn3W3gNNhh-DxE>
Subject: Re: [tsvwg] Gorry Fairhurst Individual thoughts on choosing whether/how to advance ECN work.
X-BeenThere: tsvwg@ietf.org
X-Mailman-Version: 2.1.29
Precedence: list
List-Id: Transport Area Working Group <tsvwg.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/tsvwg>, <mailto:tsvwg-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/tsvwg/>
List-Post: <mailto:tsvwg@ietf.org>
List-Help: <mailto:tsvwg-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/tsvwg>, <mailto:tsvwg-request@ietf.org?subject=subscribe>
X-List-Received-Date: Fri, 22 May 2020 22:44:22 -0000

Paul,

On 15/05/2020 21:18, Paul Vixie wrote:
> On Friday, 15 May 2020 16:49:10 UTC Joseph Touch wrote:
>>> On May 15, 2020, at 7:54 AM, Gorry Fairhurst <gorry@erg.abdn.ac.uk> wrote:
>>>
>>> Alas, I don’t see how we can do all using just the current ECN field, and
>>> that’s why I say we have a shortage of bits.
> +1.
>
>> I agree with Gorry on the point above.
>>
>> I also haven’t quite seen a brief summary of the utility of these bits as a
>> signal in either direction (endpoint to net; net to endpoint) given the
>> assumption that “everybody lies”.
>>
>> IMO, lying is part of why DSCPs are useful only where either redundantly
>> validated on network ingress or inside managed networks.
>>
>> So my questions - not really experiments (as per one of the options) are:
>>
>> 	- assuming endpoints lie and/or network nodes lie (either by what
>> they indicate or what they rewrite), are either of these options still safe?
>>
>> 	- assuming everybody lies (as above), are either of these options
>> still useful? (i.e., more than just safe)
> on a cost:benefit analysis, if ECT(1) is defined to be an output from the
> network the risk (to first and second parties) of lies when is higher, and the
> benefit (to the third) is lower. therefore if this WG were to assign meaning
> to the ECT(1) bit based on risk of lies to good guys and benefit of lies to
> bad guys, the output choice would prevail.
>
> as an output that is intended to serially convey a changing fraction of path
> congestion, the benefit to a liar of lying about it would be to cause lower
> network utilization for affected flows. since the lie would have to be told by
> an on-path actor, this might even be within their established purview. here,
> the network is pressing for different endpoint behaviour.

[BB] I don't think any of the above is materially relevant to whether 
there should be one output or two. The number of outputs doesn't affect 
the network's ability to lie about one or both of them.

>
> as an input that is intended to select DCTCP-style shallow queues for some
> traffic, the benefit to the liar of lying about it would be to cause the
> liar's flows to be able to better compete against inside-the-DC flows. this is
> a denial-of-service vector at worst, and a nonconstructive competition form at
> best. here, the endpoint is pressing for different network behaviour.

[BB] The sender's congestion control (or lack thereof) is about 
behaviour. Misbehaviour and lying are orthogonal. So all this about 
lying or not is irrelevant to congestion control behaviour (as Gorry 
explained).

In Jonathan's example, an L4S sender sets ECT0, but behaves more 
aggressively in response to feedback (as if it was setting ECT1) which 
gives it more capacity share. Even if L4S had never existed, any sender 
can set ECT0 and behave more aggressively to attain more capacity share.

A sender can also set ECT1 to get classified into the L4S queue, and 
still behave more aggressively than other L4S sources to get more 
capacity share than them.

In summary, attaining capacity share is nothing to do with the truth of 
a codepoint, because capacity shares aren't determined by whatever 
codepoint the sender tells the network. Capacity shares aren't even 
determined by the network at all. They are determined by the sender's 
behaviour, irrespective of what codepoint it sets.

>
>> If not - and partly based on Gorry’s observation above, my inclination is
>> not to define these bits for such uses at all.
> enshrining the riskier design (ECT(1)-as-input) in all IP flows because it
> helps datacenter efficiency as long as that datacenter bleaches on ingress,
> strikes me as a poor tradeoff of cost and benefit for the last IP TOS bit.

[BB] Can you explain what made you say the second of these three lines, 
so we can try to unpick what's in your mind. There's surely some 
misconceptions behind these words. Where have you seen anything about 
helping datacenter efficiency? And what's this condition about bleaching 
on ingress to a DC?


>
> perhaps the smart edge, dumb core model doesn't work perfectly for datacenter
> networks. but as fq_codel shows, it works extremely well for edge networks,
> who are vastly more numerous and which provide an at least equal share of the
> "network effect" value of internetworking.

[BB] Again, there seems to be some misunderstanding that L4S is about 
data centre networks. What's all this about?

It might be worth reading 
https://tools.ietf.org/html/draft-ietf-tsvwg-l4s-arch-06#section-6.3 
where I think you'll see that the primary deployment use-case for L4S is 
similar to that of FQ-CoDel. Nonetheless, being simpler, it is being 
picked up by those operating the downstream bottleneck in to the access 
link (the BNG, metro node, CMTS, etc), not just the upstream bottleneck 
(home gateway).

It's also simple enough for other possible bottlenecks, e.g. peering 
points, DC ToRs, hypervisors, DC access links, campus access links, and 
so on.



Bob



>
> so, i am +1 to joe's inclination as quoted above.
>


-- 
________________________________________________________________
Bob Briscoe                               http://bobbriscoe.net/