Re: [tsvwg] L4S DSCP (was: L4S drafts: Next Steps)

"alex.burr@ealdwulf.org.uk" <alex.burr@ealdwulf.org.uk> Mon, 29 March 2021 13:23 UTC

Return-Path: <alex.burr@ealdwulf.org.uk>
X-Original-To: tsvwg@ietfa.amsl.com
Delivered-To: tsvwg@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id B33823A1220 for <tsvwg@ietfa.amsl.com>; Mon, 29 Mar 2021 06:23:51 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -1.119
X-Spam-Level:
X-Spam-Status: No, score=-1.119 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, DKIM_SIGNED=0.1, DKIM_VALID=-0.1, HTML_MESSAGE=0.001, RCVD_IN_MSPIKE_H2=-0.001, SPF_HELO_NONE=0.001, SPF_NEUTRAL=0.779, URIBL_BLOCKED=0.001] autolearn=no autolearn_force=no
Authentication-Results: ietfa.amsl.com (amavisd-new); dkim=pass (2048-bit key) header.d=yahoo.com
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id 2TgTo2DczeQj for <tsvwg@ietfa.amsl.com>; Mon, 29 Mar 2021 06:23:47 -0700 (PDT)
Received: from sonic302-2.consmr.mail.bf2.yahoo.com (sonic302-2.consmr.mail.bf2.yahoo.com [74.6.135.41]) (using TLSv1.2 with cipher ECDHE-RSA-AES128-GCM-SHA256 (128/128 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id E584C3A121B for <tsvwg@ietf.org>; Mon, 29 Mar 2021 06:23:46 -0700 (PDT)
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=yahoo.com; s=s2048; t=1617024224; bh=fvKM/Dr6wtS04QjcqCYN6nMGMZie8QkqKfoVD54V8fY=; h=Date:From:Reply-To:To:In-Reply-To:References:Subject:From:Subject:Reply-To; b=ZOQjvK3HjUq7rkw1LGy9E28GrpekpqAWLTXHokJo/YxrJWbW6EiXV2mfvZkgL3yX3R2H3ZVgOL43swN3+RfkWWbMHEwoD0s924d6cvd28JQQUFK6AMY/DEy9FI2/Pq1g57GAo1+ph0P2TzoDahzKCCbTYtJZMWJXReR06LC23OPH8ogikdh8K6yY7xc6oZiks/G2s8D3L7dOGitxuyi0uU8VaSMTYprbxm3yN2QHmPYUmhitPtkNE4j0jzCj7MnOCgeODM1gZcyP+PVTDrraLJQuyrAwSmsQ+8nh0piqrW9oDFtwcum7ozF8SNs24hBklMCcdOuIBvqpWjCIqcMkbg==
X-SONIC-DKIM-SIGN: v=1; a=rsa-sha256; c=relaxed/relaxed; d=yahoo.com; s=s2048; t=1617024224; bh=XeCPdagbHKNerP6238WTO+cQnZK2Fq/mdQuRFu+NZ7S=; h=X-Sonic-MF:Date:From:To:Subject:From:Subject; b=EiUE7K2eojN8LdYaLH6Rq+A/2LzUnsDggvgdbmdRtF4EY33KAZqTuIdm7iFZMUstfwuNFsIMZtFtOmMntmtQtl4VqgQmGEQFkbhURkgsq2kOjdtauq6RmT2rH83Jfx1x29JX+goYpvVEtiPKt+pwC7iXTOKdR7T1EAh5T1geRjBZG+Hl83FQMLJHuDOXf4kHnjFuJte9uqtUO8W00xJBF4R/Vz+cUD2F6ZINxcYhiGH5PHETRlNZwluM6VyB2Eddk0xnCGiH0YtxNtbVlI64TpbvIIVmq0bYQ45/cDqXfjUZfTSaXADi6gyX4E36ebIa2mbyiatRktIw2uYoutqIrg==
X-YMail-OSG: uBnKVDwVM1nqPzyETv_2359BTPcvtAeIjRE4p8qYrYBkNFwHQ6nSujdTVqsXXg2 k1eKUYXQnHM8aAvECHFVFPdQhFsktrgry.ReNgWRa.LeB5ZFnQY5O4ZI6Op1MgNb.QuKUQnHT4go HE0L31XisF1QGOcmA0Ncw5_AAU3dAvuTucG6uyDJZZUNhY_R2T7AVyARKbh_jpSJ5pLDsEPuXImC QUIkcRUlIaRKob8xIw8g0e58X.F0Ld42uqpn0zZSu8dz0qdnLox3Tv6xfsVHbLGY1JdcdVAFCnhw wbD1qBEjRzoni5Ayvd6jIJt1wTD0nl3sDbdFduofGVuOVVkoyv4YTJvKpAmn2qh5KUgma.OFst9K e3lWYW7itKmXHvTs9T5O9EtZmj8A0vW4_925SGGX92wApOJvjWQF8YTWCuIC339R3xpLHFYtSGKC 8MRgMInGeqEekyhQmKx.jxCX1ZqOPN09TyDHvxkgCBiN8VpBwAOxrqh4rjtWBRLT6f.2IRbL3X4k HTIfI3k7h6yqThe0ynG7Il9Vld6ZgxKms8BaNLQz72NqwL__sjpU9WWP7Wv6hWkY2RSzk.IKB807 23.vLMAdpEYYkDdjeV8QgAaHbw6ZoXLwSEydDKx0sNGm8OGiS26jLnqmSdBpnR4eb1pMUrNq85so vrkIraoSHzTbg2ch9fn8RnMg7DhSW9WbRfBNDI2mbo6Brk7ow4gf.XdsxwiGZfyxehkTS1xLbIAf QI7Ox.YieXa25zwEBoFa6G7imAxM6G.DvUyUtI6bRMsHO.QWo8hJl2gonnM4.pXTbooUEmdpilF7 AORazIs_byCap7MtV1yh.tC7AX2Xkhi2GHvJ3LWIdC4AVDoND.HzsTXtZrzB8Y8CAcTSDzM.rV1r DZ_lbPk2xAr779iZoWeKFBKVBuKozNKJDIze6wg7S7whjjo5Kc4jehhvSLC91mHdaxP4heuaNMvm NODrpjLaptS9PZscH2ETFy3I.nCvV9JQ0vkoAmitZtn8q7bNE2oPQ4DkqRxnsUqhU8o.Fk.dMHQE SrtxfYoyizodGI8ZoEHevqX35WANh27FZsdkxvgz939wMn0rYQUMiEHE4SqiElSon_j4U6y5wgN5 Sv_jlMaLqwMPObRVCdIbHGqSNpi3rUe0FAXPge5hlhZi9mdN1vlhXUGCk0Mx7pX4fmm2MmsBX0vF 94Ef5999NlUANqLaMRUQyURxyg8jK15glW.4Skrrrb1WTG1P6lVxXCSig8Rp5DLBw.R_k542bYUl nsgIbF872ztqap0SXwqH9XfKGAUhGEzdpQkAvPBQs99W2GVG70C5E82Qg4GEaTLRdcfrhkHsQ_td Ak18oyoYh3oEYxj24HRciYdOzPynGlgCofY3ss3whulk7k3IogRVH1cl9YsPE3AbMYo6JR6.EDKC Qz6R2NKvXJZLSTaepsCvHCaxZFMdjB2OLz5LJwBcYCbIxjFVMQSzZgMjDIBcmMHxBw0Nv19Noupn hJqdFQppVpnBRly19NbOVNAuAn_BYRoatqGn5UiMQ6LxKzY4pbc64iuuJ7ilM0YnW4BYswHiKgXG 2Bp.wMZNagsqpG3gL3WgAaRXtEbQxAujkMNtwKjGW4zFZDd.gNZoj_HTaEL17ubTlNxNGqW0ZhlR Kcmf0bqEalAhWgwqR3gEZYcMt_AIvkKaBnYjcsxCqF7paF_BWS9L8gUIG_Gn_DgzKJ4ynuO68llE mXBw4YrDOtD8cJ9E1DcQY8sXAoNWOzQqTjkRPpH96opZNCASmz.cDo5SrxsXV8bug5MhF8yJx0U. xoRyW0yvTBC.aMy8oGCqzEyXB7aamKOB0zC5ej5JgLGQMhoXx1DPeaNi8bs3PR53.BiBHGZb_kCt eDHsXYz.ggx9AgNdMR3qIWsVjGOtDAaPIeLHhqtnz.VJyFEeH2LH26yMZkde.jxc2jE60ALEg9rd __cXY3P9i6Ef_0lFEVbwbwwo9c5bPpQEzQpp_AGF5OaEWVzyPBxhAGyXoBRzG_Ck2WnnSR1nPMJj v8Ej1OcY06uIMR91Sy2INve7nqbzgoe5qPO_Q2yi4FmUyt38fHmyQ_EtFJxQD2NaK3I11VjpNVIO Z5s2bEhnZzz1bDtJzcCSENZ03xqpBe0XtSIbvqkXUG5RAVsHLU1OryU1oqRs4s7Pv7KYTr0Xf_zk 3uB473wxqURMz2yUpFvwxWV0PweQwtunLv0AyOggFnVA7ZTy1GdEGGzVcY9.ZS3O8dSuSmS9L2or anYCFbL2OXIZ7dAzjAGaBrmKHJYRHBkJy45XA1EINbXh97IPoiTEe5ExG8a4l9Fsenl5H.r.Prvv i18SC9UkUize5PZ9_kp0hA6Za9EC3QAShcNZJliML6f85aSCgabr.t_nx5XLg.dJR0dQPAeVwdx1 RHWnvRUDUgaYZnp1ACHsXgGbEwHkI7yxHZ9iwPOE6DwgMi1H2dD9XTfDbszCEdYSMsB5.Qx.h6DA icFMZ7TRJYSeJ8CKElZJFnXNuzpB_EI1eEEqPFI915A7oZpPB0QOiUiDmT6TQFvHiZQ.rUq0V5R1 v3Qkl3pgRFEwYsisblC5nh.YB7Yumf9m8c.KphC6uTVuPcN_QCjGPgQ7Erm4A4dEQoVhFpnMjU9r 4VyaaIdx80OefMf0-
X-Sonic-MF: <alex.burr@ealdwulf.org.uk>
Received: from sonic.gate.mail.ne1.yahoo.com by sonic302.consmr.mail.bf2.yahoo.com with HTTP; Mon, 29 Mar 2021 13:23:44 +0000
Date: Mon, 29 Mar 2021 13:23:40 +0000
From: "alex.burr@ealdwulf.org.uk" <alex.burr@ealdwulf.org.uk>
Reply-To: "alex.burr@ealdwulf.org.uk" <alex.burr@ealdwulf.org.uk>
To: tsvwg IETF list <tsvwg@ietf.org>, Pete Heist <pete@heistp.net>
Message-ID: <1841247348.815218.1617024220610@mail.yahoo.com>
In-Reply-To: <92b3b23db1dc4ce11162a31acf83c0dd01868a27.camel@heistp.net>
References: <MN2PR19MB404527384A1B1DD9CFC2A3D983659@MN2PR19MB4045.namprd19.prod.outlook.com> <6f0ac4bf-bd1a-65cd-1d40-a97d4aa71aab@bobbriscoe.net> <7B4426F9-E1C5-4F88-A264-0D54C809D523@gmail.com> <AM8PR07MB74761AFC8F5BE0F9573DFF32B9629@AM8PR07MB7476.eurprd07.prod.outlook.com> <6481E606-2458-49D7-B580-8DF7B93494FD@gmx.de> <AM8PR07MB747675E421F0B7A6246C67BEB9619@AM8PR07MB7476.eurprd07.prod.outlook.com> <9A9D4AC3-43F0-4778-839B-E1E247A3C5FA@gmx.de> <AM8PR07MB7476026EA3AA7AD49622B296B9619@AM8PR07MB7476.eurprd07.prod.outlook.com> <CAJU8_nUgNa-W4wf2Vb8sUUqv4XUsSFdVQFUWwrTGw0gDshahiQ@mail.gmail.com> <92b3b23db1dc4ce11162a31acf83c0dd01868a27.camel@heistp.net>
MIME-Version: 1.0
Content-Type: multipart/alternative; boundary="----=_Part_815217_1654347291.1617024220608"
X-Mailer: WebService/1.1.17936 YMailNorrin Mozilla/5.0 (X11; Ubuntu; Linux x86_64; rv:86.0) Gecko/20100101 Firefox/86.0
Archived-At: <https://mailarchive.ietf.org/arch/msg/tsvwg/1Nwt1OrsAESof9v496JoRHKSOBg>
Subject: Re: [tsvwg] L4S DSCP (was: L4S drafts: Next Steps)
X-BeenThere: tsvwg@ietf.org
X-Mailman-Version: 2.1.29
Precedence: list
List-Id: Transport Area Working Group <tsvwg.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/tsvwg>, <mailto:tsvwg-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/tsvwg/>
List-Post: <mailto:tsvwg@ietf.org>
List-Help: <mailto:tsvwg-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/tsvwg>, <mailto:tsvwg-request@ietf.org?subject=subscribe>
X-List-Received-Date: Mon, 29 Mar 2021 13:23:52 -0000

 Pete, tsvwg,

I can see that the idea of using a guard DSCP is proposed as a pragmatic way to make progress. However, I think an experiment isolated from RFC3168 AQMs by a DSCP would not, of itself, resolve the problem of L4S and RFC3168 AQMs. 

Suppose the L4S folks go away and deploy L4S in such a DSCP-guarded domain. They  make progress on some of the experimental goals listed in draft-ietf-tsvwg-ecn-l4s-id, and come back and say it works really well, and now they want to deploy it on the full internet. At that point, the WG is pretty much in the same position it is now - not knowing how to resolve the RFC3168 issue. Except that the stakes would be even higher, because:

- the L4S folks would have made even more investment in L4S, in a production deployment across multiple companies
- Other folks would potentially have deployed more RFC3168 AQMs
So unfortunately it seems to me that, although it now seems pretty hard for the WG to reach consensus on  how to resolve the RFC3168 issue, waiting for a DSCP-isolated experiment will make this harder, not easier. I think if would be better for the WG to find a path to that resolution sooner rather than later. That's not to say that a DSCP-guarded experiment couldn't contribute to such a resolution, but without some agreement on what the path to a decision looks like, it's not obvious that one is essential.
Alex


    On Saturday, March 27, 2021, 2:20:07 PM GMT, Pete Heist <pete@heistp.net> wrote:  
 
 ...
On Fri, 2021-03-26 at 08:54 -0400, Kyle Rose wrote:
On Fri, Mar 26, 2021, 8:30 AM De Schepper, Koen (Nokia - BE/Antwerp) <koen.de_schepper@nokia-bell-labs.com> wrote:

I understood the goal of your proposal. But before diving into the details of a DiffServ-based proposals, I'm taking a step back asking: Is using DiffServ an option at all.

Why wouldn't it be? The point of the proposal AIUI is to require networks to take action to explicitly opt-in to this experiment. Given the DiffServ bleaching that occurs by default at network boundaries, operators that take no action will not find themselves ambushed by novel behavior.

I agree- the topic of this thread is the use of a guard DSCP for experiment. Sorry if I contributed to mixing in other possible uses early on.

This approach allows for experimenting with ECT(1) as a classifier in a safe (contained, time-limited) way, thus allowing a path toward universal deployment (i.e., removing the DSCP guard) if the experiment is successful without requiring standardization and rollout of end-to-end DiffServ. And it does so (a) without permanently burning the ECT(1) code point if the experiment fails, and (b) in an opt-in manner that greatly reduces the potential for unintended side effects on classic traffic.
This seems to me like the obvious path toward consensus on an experimental deployment aimed at gathering real-world experience without first committing to something unproven.

Although an RFC isn't technically required to do this, it should still serve to codify how DSCP should be used and treated, and also to raise visibility as a sanctioned IETF experiment. After a successful experiment at "operator scope" (if that terminology captures it, but the larger the better), it should be easier to justify and start an experiment at Internet scope.
I also think that with codepoint space this tight, it's not just about verifying safety, but also effectiveness. I feel the same way even for proposals that fall under RFC4774 Option 3 ("Friendly Coexistence with Competing Traffic").
Pete

Kyle