Re: [tsvwg] draft-white-tsvwg-l4sops-02.txt proposa for additional sections

Greg White <g.white@CableLabs.com> Wed, 05 May 2021 23:33 UTC

Return-Path: <g.white@CableLabs.com>
X-Original-To: tsvwg@ietfa.amsl.com
Delivered-To: tsvwg@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id B6AB43A2634 for <tsvwg@ietfa.amsl.com>; Wed, 5 May 2021 16:33:05 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -2.101
X-Spam-Level:
X-Spam-Status: No, score=-2.101 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, DKIM_SIGNED=0.1, DKIM_VALID=-0.1, DKIM_VALID_AU=-0.1, DKIM_VALID_EF=-0.1, RCVD_IN_DNSWL_NONE=-0.0001, RCVD_IN_MSPIKE_H2=-0.001, SPF_PASS=-0.001, URIBL_BLOCKED=0.001] autolearn=ham autolearn_force=no
Authentication-Results: ietfa.amsl.com (amavisd-new); dkim=pass (2048-bit key) header.d=cablelabs.com
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id 7SfQzlwgT8nu for <tsvwg@ietfa.amsl.com>; Wed, 5 May 2021 16:33:01 -0700 (PDT)
Received: from NAM02-CY1-obe.outbound.protection.outlook.com (mail-eopbgr760139.outbound.protection.outlook.com [40.107.76.139]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id 29FFC3A2633 for <tsvwg@ietf.org>; Wed, 5 May 2021 16:33:01 -0700 (PDT)
ARC-Seal: i=1; a=rsa-sha256; s=arcselector9901; d=microsoft.com; cv=none; b=GtHtTSUbXnK6itKHhnl7/oHCO4KV2+s32VBm7q0ThDOELCsY28DCyhH+E3KIfoPmxf8qOHDOiZooBVlRI3xMJIOuwhZNxFemcSZ58DyvaeDdIhY/X7PbjNNtVpaPWnC2E0q4IPcVqUFQEckc97hnsqsavnvGX+4PKh6qNBh1Bh9FoCSUfNIK0fWZU3MD36WR2M7bbEhcHopQngtWoc0Cp5xudbpn/uqUGtSxKVNBBiPwy+++DEQbTZHQP0XnK1hCmcNcMTfx8yCEMI7Ifee0CV/I1VKqisQWtwczaN3a1KoOqK9ZjaptHQ5udZ4cbTh/jMPhJv+wbqIZipflEdtxzA==
ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=microsoft.com; s=arcselector9901; h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-SenderADCheck; bh=z07x+0HnYtmnQVWOM7PEFO3HngAgVm/20vRy/eJWqg8=; b=P8JjpYej6DXsZOzrZu0EtbrVv0JqmSjKQMn+WNINLk6c/xhNuR34TXrD7roApTZtmhP0t0aODodj/lbS3fLYDtAAtHvPyrINeNVuM/qxI2xEs+czaujGcTpo7EWruBiy1hw0E25bPrWMnYbvfywRFm9O/hgcao3SfWHM7W8e9IhvuN+aIqhrorhDzPyM/k193ZZhI2CDy6CMox6T4ztU8QatWKP9ChVhtvYupJ92yxY2tJqVf8M3uqVA5RVRsqTnSV+pOROVBs6HD+iPKLZJJV7JfEcs4wplkywI41xs9DTNinlj6+itEOga0T2PzJvzfvkF88Hb1J2dhWtgOhkMBg==
ARC-Authentication-Results: i=1; mx.microsoft.com 1; spf=pass smtp.mailfrom=cablelabs.com; dmarc=pass action=none header.from=cablelabs.com; dkim=pass header.d=cablelabs.com; arc=none
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=cablelabs.com; s=selector2; h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-SenderADCheck; bh=z07x+0HnYtmnQVWOM7PEFO3HngAgVm/20vRy/eJWqg8=; b=wy0ADCyZ+GtZUPak3zksO4+XJU6x3kzyTTZ1xaLVhTRCuCBVZfiEX3CSMTwkXpILmtwRxFnQ//Je47TUPM9DZ703FR/wpJksbepv/w+OCbT3IcRhHCv1ZQwrs4yLuPc5QnSlJbQvBp2uIU7LFvtn59zB/I9VslNJJEMSxTwXN+dneUzZDS0i7XHB7G4V2w/XSr7WswtWVJt8t0fqdjtd8gIGna6Hm5R3UdGZS3B9SE5MgH3CO3gbgaJTl7NPB3hnzyIx4IjM+rPjFlj4H9PxSYGlGtqEkzMNQVPPITlEWuwkVLxYAADz+xm7mxulGmlNBmJrzxvjOJwr4ZYekJW07Q==
Received: from CY4PR06MB2821.namprd06.prod.outlook.com (2603:10b6:903:130::11) by CY4PR06MB3461.namprd06.prod.outlook.com (2603:10b6:903:12e::23) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id 15.20.4087.26; Wed, 5 May 2021 23:32:58 +0000
Received: from CY4PR06MB2821.namprd06.prod.outlook.com ([fe80::8161:6d07:dea0:8696]) by CY4PR06MB2821.namprd06.prod.outlook.com ([fe80::8161:6d07:dea0:8696%8]) with mapi id 15.20.4087.043; Wed, 5 May 2021 23:32:58 +0000
From: Greg White <g.white@CableLabs.com>
To: Sebastian Moeller <moeller0@gmx.de>
CC: Ingemar Johansson S <ingemar.s.johansson@ericsson.com>, tsvwg IETF list <tsvwg@ietf.org>
Thread-Topic: [tsvwg] draft-white-tsvwg-l4sops-02.txt proposa for additional sections
Thread-Index: AQHXMwMiySWNtmew9UW5JDXx5rrgGKq4w/aAgAAJJwCAAEN2gIAcAGuAgAB1uwD//7yggA==
Date: Wed, 05 May 2021 23:32:58 +0000
Message-ID: <FB5820CE-5273-411E-984A-0A8524101C79@cablelabs.com>
References: <C2BD1FC5-673F-4C29-8FFE-16CA367F388A@gmx.de> <HE1PR0701MB2299CEAEED3FB9C1CCEA5385C24B9@HE1PR0701MB2299.eurprd07.prod.outlook.com> <3D9E48B1-6CA2-44A8-B4AB-E705E0799F33@gmx.de> <HE1PR0701MB2299D0906E6C4C4692337D0EC24B9@HE1PR0701MB2299.eurprd07.prod.outlook.com> <25905C45-2F9E-43EC-B89D-74BBF413DC00@cablelabs.com> <31990E51-05A7-41ED-9C24-5B40F5B4CC32@gmx.de>
In-Reply-To: <31990E51-05A7-41ED-9C24-5B40F5B4CC32@gmx.de>
Accept-Language: en-US
Content-Language: en-US
X-MS-Has-Attach:
X-MS-TNEF-Correlator:
user-agent: Microsoft-MacOutlook/16.44.20121301
authentication-results: gmx.de; dkim=none (message not signed) header.d=none;gmx.de; dmarc=none action=none header.from=CableLabs.com;
x-originating-ip: [73.243.9.160]
x-ms-publictraffictype: Email
x-ms-office365-filtering-correlation-id: 9757b057-2d84-461e-acad-08d9101e1dd1
x-ms-traffictypediagnostic: CY4PR06MB3461:
x-microsoft-antispam-prvs: <CY4PR06MB34615ED77F113984AA8D2158EE599@CY4PR06MB3461.namprd06.prod.outlook.com>
x-ms-oob-tlc-oobclassifiers: OLM:4941;
x-ms-exchange-senderadcheck: 1
x-microsoft-antispam: BCL:0;
x-microsoft-antispam-message-info: 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
x-forefront-antispam-report: CIP:255.255.255.255; CTRY:; LANG:en; SCL:1; SRV:; IPV:NLI; SFV:NSPM; H:CY4PR06MB2821.namprd06.prod.outlook.com; PTR:; CAT:NONE; SFS:(376002)(346002)(396003)(366004)(136003)(39850400004)(4326008)(478600001)(71200400001)(83380400001)(6512007)(186003)(6506007)(8936002)(53546011)(6916009)(2616005)(8676002)(5660300002)(316002)(6486002)(36756003)(26005)(38100700002)(76116006)(2906002)(966005)(66556008)(64756008)(66946007)(66446008)(66476007)(86362001)(30864003)(54906003)(122000001)(33656002)(45980500001)(85282002); DIR:OUT; SFP:1102;
x-ms-exchange-antispam-messagedata: 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
x-ms-exchange-transport-forked: True
Content-Type: text/plain; charset="utf-8"
Content-ID: <B8C42BB51291C847955886106A2E2F83@namprd06.prod.outlook.com>
Content-Transfer-Encoding: base64
MIME-Version: 1.0
X-OriginatorOrg: cablelabs.com
X-MS-Exchange-CrossTenant-AuthAs: Internal
X-MS-Exchange-CrossTenant-AuthSource: CY4PR06MB2821.namprd06.prod.outlook.com
X-MS-Exchange-CrossTenant-Network-Message-Id: 9757b057-2d84-461e-acad-08d9101e1dd1
X-MS-Exchange-CrossTenant-originalarrivaltime: 05 May 2021 23:32:58.3140 (UTC)
X-MS-Exchange-CrossTenant-fromentityheader: Hosted
X-MS-Exchange-CrossTenant-id: ce4fbcd1-1d81-4af0-ad0b-2998c441e160
X-MS-Exchange-CrossTenant-mailboxtype: HOSTED
X-MS-Exchange-CrossTenant-userprincipalname: XkqYTHvfNZjZ5eTlTLYaqkcj+GQuQzIlKvoUe+M6gIiWf9ICVnITMzCifr7F2b4ibo9pT7/wEQOccPJzOebOcw==
X-MS-Exchange-Transport-CrossTenantHeadersStamped: CY4PR06MB3461
Archived-At: <https://mailarchive.ietf.org/arch/msg/tsvwg/2atpINTdUP0v39NzIgq2_spUCvE>
Subject: Re: [tsvwg] draft-white-tsvwg-l4sops-02.txt proposa for additional sections
X-BeenThere: tsvwg@ietf.org
X-Mailman-Version: 2.1.29
Precedence: list
List-Id: Transport Area Working Group <tsvwg.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/tsvwg>, <mailto:tsvwg-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/tsvwg/>
List-Post: <mailto:tsvwg@ietf.org>
List-Help: <mailto:tsvwg-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/tsvwg>, <mailto:tsvwg-request@ietf.org?subject=subscribe>
X-List-Received-Date: Wed, 05 May 2021 23:33:06 -0000

Hi Sebastian,

On 5/5/21, 3:34 PM, "Sebastian Moeller" <moeller0@gmx.de> wrote:

    Hi Greg,


    > On May 5, 2021, at 22:32, Greg White <g.white@CableLabs.com> wrote:
    > 
    > Hi Sebastian and Ingemar,
    > 
    > I didn't see a resolution to this on the mailing list.   
    > 
    > Sebastian, I agree that a section like you described would be appropriate, but in regards to the proposed text for 6.2, since the actual steps (and IETF recommendations) for discontinuing the experiment might depend on the situation at hand (what the implementations are, who deployed them, how much, where, how controlled, etc.) it seems to me to be premature (and unnecessary) to predict the specific actions that participants or non-participants should take, particularly actions like bleaching or blackholing traffic.

    	[SM] I disagree, if we want to avoid a situation with ECT(1) as nonce again, we should make sure that on failure we make continued use of ECT(1) as unlikely as possible. That requires sending a strong signal to the protocol end points...

[GW] My point is that the sort of overt discontinuation of the experiment that you are envisioning would need to be communicated to the world (likely via a new RFC), and I believe there will be reasonable and intelligent people in the future who, if that decision is made, can craft proper guidance as part of that communication, with the benefit of knowing the facts available at the time. What to me seems important, today, is that end-systems and network nodes support the ability to shut off L4S features if it should come to that.


    >   What seems more germane for this document is a reiteration of the requirements on implementations that would be important for concluding the experiment, i.e. that L4S congestion controllers be configurable to shut off L4S support and that L4S network elements be configurable to treat ECT1 the same as ECT0.

    	[SM] That is the very least one would hope for, that nobody is going to deploy an experimental AQM with out an off-switch ;)

[GW] Well, it is certainly a good idea to try to ensure that is the case!  Hence the requirements in ECN-L4S-ID and a reminder of them in this document...



    > Here is a suggestion on what we add to L4Sops (I also did some wordsmithing of your text prior to 6.2):
    > 
    > 
    > 6. Conclusion of the L4S experiment
    > 
    > This section gives guidance on how L4S-deploying networks and endpoints should respond to either of the two possible outcomes of the IETF-supported L4S experiment.
    > 
    > 6.1 Successful termination of the L4S experiment
    > 
    > If the L4S experiment is deemed successful, the IETF would be expected to move the L4S specifications to standards track.  Networks would then be encouraged to continue/begin deploying L4S-aware nodes and to replace all non-L4S-aware RFC3168 AQMs already deployed as far as feasible, or at least restrict RFC3168 AQM to interpret ECT(1) equal to NotECT. Networks that participated in the experiment would be expected to track the evolution of the L4S standards and adapt their implementations accordingly (e.g. if as part of switching from experimental to standards track, changes in the L4S RFCs become necessary).
    > 
    > 6.2 Unsuccessful termination of the L4S experiment
    > 
    > If the L4S experiment is deemed unsuccessful due to lack of deployment,

    	[SM] I do not consider passive deployment numbers to be a great metric for success and failure, sorry. The success should to be measured against the list of goals of the L4S experiment, the very least would be "active deployment" meaning if the AQM are known to be deployed but no traffic actually exercises the ECT(1) AQM path, the number of AQM nodes seems irrelevant as a success measure.

[GW] I was intending "deployment" to mean both network elements and endpoints, are you reading it to mean only network gear?  Maybe we can add a word or two to make this clear.  How about: "If the L4S experiment is deemed unsuccessful due to lack of deployment of compliant end-systems or AQMs, ..."


    > it might need to be terminated: any L4S network nodes should then be un-deployed and the ECT(1) codepoint usage should be released/recycled as quickly as possible, recognizing that this process may take some time. To facilitate this potential outcome, [draft-ecn-l4s-id] requires L4S hosts to be configurable to revert to non-L4S congestion control, and networks to be configurable to treat ECT(1) the same as ECT(0).

    	[SM] As above, if we want to expedite recycling of ECT(1) we should use stronger measures here... The thing is the AQM nodes themselves  might be under control of able network experts that change configuration in lock-step with what happens in RFC-space, but we need to get to all end-nodes that still use ECT(1) as well. 

[GW] As alluded to above, stronger measures might be necessary, or they might not, depending on the situation that exists at the time.  


    Best Regards
    	Sebastian

    > 
    > 
    > 
    > -Greg
    > 
    > 
    > 
    > 
    > 
    > 
    > 
    > 
    > On 4/17/21, 12:56 PM, "Ingemar Johansson S" <ingemar.s.johansson@ericsson.com> wrote:
    > 
    >    Hi Sebastian
    >    Please see inline [IJ]
    >    /Ingemar
    > 
    >> -----Original Message-----
    >> From: Sebastian Moeller <moeller0@gmx.de>
    >> Sent: den 17 april 2021 16:55
    >> To: Ingemar Johansson S <ingemar.s.johansson@ericsson.com>
    >> Cc: tsvwg IETF list <tsvwg@ietf.org>; Greg White <g.white@cablelabs.com>
    >> Subject: Re: [tsvwg] draft-white-tsvwg-l4sops-02.txt proposa for
    >    additional
    >> sections
    >> 
    >> Hi Ingemar,
    >> 
    >> in essence you seem to argue against adding such a section, do i
    >    understand
    >> that correctly?
    > 
    >    [IJ] Not yet. But I am interested to know if there is any precedence in this
    >    area in IETF, i.e, is there any experimental RFC that dictates in detail of
    >    the experimental RFC is undone. What I have seen is that RFCs are declared
    >    historical but I have a hard time to see how the exit of an RFC is
    >    formulated in detail, especially if other SDOs adopt the RFC ? Should IETF
    >    oversee that endpoints are updated. You have your mentioned how hard it is
    >    to update e.g. RFC3168 edge routers. 
    > 
    >> 
    >> 
    >>> On Apr 17, 2021, at 16:21, Ingemar Johansson S
    >> <ingemar.s.johansson@ericsson.com> wrote:
    >>> 
    >>> Hi Sebastian..
    >>> Unfortunately the proposed section 6.2 sounds a lot like the famous
    >>> Mission Impossible one-liner "This tape will self-destruct in five
    >>> seconds. Good luck, Jim."
    >> 
    >> 	[SM] How that? Section 6 is requiring network operators tat
    >> deployed L4S during the experiment to take active steps to incentivize
    >    end-
    >> points to stop using L4S-signaling ASAP, there is no "self-destruction"
    >> involved at all; I am not sure whether that is a fitting analogy. How
    >    about
    >> commenting upon the specifics of my proposal instead?
    >    [IJ] I see it as some kind of requirement for a self-destruction mechanism
    >    in the sense that nodes that implement L4S should exit L4S at a given day or
    >    otherwise put some requirement on network operators to terminate it. How
    >    many will follow these guidelines and based what decision, a special IETF
    >    interim that declares "now we close the shop, everybody out!" . What it
    >    other SDOs have picked up L4S ?
    >    The only thing I see that experimental RFCs fade away because or lack of
    >    interest, poor performance or whatever other reason that may exist. 
    > 
    >> 
    >> 
    >>> The ECN Nonce was experimental and was recently declared historic a
    >>> few years ago, literary speaking RFC3540 did not self destruct, it
    >>> just faded away.
    >> 
    >> 	[SM] Sure, but I note that the Nonce had no negative side-effects on
    >> standards compliant AQMs (unlike L4S): if after a terminated experiment
    >    L4S
    >> signaling is still employed by end-points this will still wreck havoc with
    >    rfc 3168
    >> AQM and strongly violate the expected sharing behaviour at those nodes.
    >> Now at that point in time, rfc3168 will still have PS status and there are
    >    no
    >> motions to change that I am aware of, while L4S will have failed and the
    >    RFC
    >> needs to be made historic; I would humbly argue that rfc3168 operators
    >> should be able expect no delayed side-effects from a terminated
    >> experiment, no?
    >> 
    >> 
    >>> I don't see anywhere in RFC3540 about what end hosts and networks
    >>> should do when RFC3540 is declared historic.
    >> 
    >> 	[SM] Given the lack of side-effects there is/was no need to do so.
    >> 
    >> 
    >>> And I guess that the way
    >>> forward, in case the whole L4S experiment falls flat, is that the L4S
    >>> ID RFC is declared historic, I guess this should be enough.
    >> 
    >> 	[SM] How is that going to help one iota with the situation that will
    >> arose then: end-points will continue to negotiate L4S-signaling and
    >    rfc3168
    >> AQM on the path will take a hit from that.
    >> 	Yes,  I agree that this is a consequence of a design decision in L4S
    >> (one I consider sub-optimal), but it has become clear, that team L4S is
    >    not
    >> going to entertain the idea of actually changing the L4S design one bit.
    >    So if
    >> that dangerous signal stays part of L4S, we need a way to un-deploy L4S
    >> signaling from end-points. My proposal does not achieve that by itself,
    >    but it
    >> will
    >> 
    >>> But lets imagine that detailed information is needed to address the
    >>> case that L4S fails. This leads to the question.
    >>> Are there any other examples in IETF's history where an experimental
    >>> RFC has been accompanied with a detailed instruction on how to clean
    >>> up after the experiment ?
    >> 
    >> 	[SM] While I am as much a fan of precedence as the next guy, I am
    >> not interested in changing/improvinf IETF processes in general. I am
    >> interested however in keeping the blast range of the L4S experiment as
    >    small
    >> as possible. Data so far strongly indicates failure is likely and hence
    >    prident
    >> engineering requires to take precautions.
    >    [IJ] Sure, I understand that you believe that L4S will be a big fail, and
    >    you want some exit method other than the declare historical. But perhaps I
    >    misunderstand how IETF works and your intentions?. I have too few years in
    >    the IETF to know how all these processes work 
    > 
    >> 
    >> BUT Ingemar, how about you propose an alternative text for the L4S-ops
    >> draft how to handle possible actions after the experiment has run its
    >    course
    >> that acknowledge that L4S is one of the riskier experiments the IETF has
    >    ever
    >> started? Maybe my choice of wording was perceived as too adversarial, and
    >> we agree in principle?
    >> Or is your argument that you reject adding section 6 to the OPs ID?
    >> 
    >> Best Regards
    >> 	Sebastian
    >> 
    >>> 
    >>> /Ingemar
    >>> 
    >>>> -----Original Message-----
    >>>> From: tsvwg <tsvwg-bounces@ietf.org> On Behalf Of Sebastian Moeller
    >>>> Sent: den 16 april 2021 22:57
    >>>> To: tsvwg IETF list <tsvwg@ietf.org>; Greg White
    >>>> <g.white@cablelabs.com>
    >>>> Subject: [tsvwg] draft-white-tsvwg-l4sops-02.txt proposa for
    >>>> additional sections
    >>>> 
    >>>> Hi Greg, hi list,
    >>>> 
    >>>> I think that the L4S ops draft could be improved by saying something
    >>> explicit
    >>>> about the end of the L4S experiment and what differential actions are
    >>>> recommended for participants at that point in time. I made this
    >>>> argument already at the end of
    >>>> https://mailarchive.ietf.org/arch/msg/tsvwg/NXEACkPX1pFriOtqsoifPzoI8
    >>>> Sk/ but I believe that it might have been overlooked there at the end
    >>>> of a
    >>> long
    >>>> email.
    >>>> 
    >>>> So, here is my proposal to that regard as a new section 6:
    >>>> 
    >>>> 
    >>>> 6. What L4S-deploying networks should to do at the end of the L4S
    >>>> experiment
    >>>> 
    >>>> This section gives guidance how L4S-deploying networks should respond
    >>>> to any of the two possible outcomes of the IETF-supported L4S
    >> experiment.
    >>>> 
    >>>> [COMMENT: I believe that there needs to be a proper definition how
    >>>> the L4S experiment is supposed to be evaluated at the end to decide
    >>>> between success and failure, but the L4S-ops document seems to be the
    >>>> wrong place for that, so I propose to add this to one of the L4S core
    >>>> IDs, preferably
    >>> to
    >>>> section 6 of
    >>>> https://datatracker.ietf.org/doc/draft-ietf-tsvwg-ecn-l4s-id/
    >>>> which already contains discussion about what the experiment is
    >>>> supposed to figure out, so adding a section how to evaluate the
    >>>> outcome there seems a natural fit; IMHO the deciding factor here
    >>>> could be whether L4S is
    >>> promoted
    >>>> to proposed standard status after the experiment, if and only if that
    >>> happens
    >>>> L4S should be considered a success... I base this on the already
    >>>> known problematic side-effects of L4S and the fact that L4S will
    >>>> consume a
    >>> rather
    >>>> scarce resource in an IP-level code-point the exists in both IPv4 and
    >>> IPv6,
    >>>> which IMHO should be released ASAP if L4S fails to succeed]
    >>>> 
    >>>> 6.1 Successful termination of the L4S experiment
    >>>> 
    >>>> If the L4S experiment is deemed successful, participating networks
    >>>> are encouraged to continue deploying L4S-aware nodes and if possible
    >>>> replace
    >>> all
    >>>> non-L4S-aware rfc3168 AQM already deployed as far as feasible, or at
    >>>> least restrict rfc3168 AQM to interpret ECT(1) equal to NotECT.
    >>>> Participants are
    >>> also
    >>>> expected to track the evolution of the L4S standards and adapt their
    >>>> implementations accordingly (e.g. if as part of switching from
    >>> experimental
    >>>> to standards track, changes in the L4S RFCs become necessary).
    >>>> 
    >>>> 
    >>>> 6.2 Unsuccesful termination of the L4S experiment
    >>>> 
    >>>> If the L4S experiment is deemed unsuccessful, it might need to be
    >>>> terminated: L4S network nodes should be un-deployed and the ECT(1)
    >>>> codepoint usage should be released/recycled quickly.
    >>>> 	To achieve the former, participants of the L4S experiment are
    >>>> expected to configure their L4S-aware network nodes such that either
    >>>> the LL-queue of a dual queue AQM gets completely disabled, or that
    >>>> the LL- queue is switched from issuing CE-marks to pure drops;
    >>>> thereby removing L4S-signaling from the network. To achieve the
    >>>> latter, all endpoint hosts need to stop negotiating L4S-congestion
    >>>> signaling. For nodes under control
    >>> of
    >>>> participating networks that should only require re-configuration of
    >>>> the endpoint hosts. For nodes not under control of participants of
    >>>> the experiment that will be a considerable challenge. To give a
    >>>> strong signal
    >>> to
    >>>> such out-of-network endpoints drastic measures might be required,
    >>>> like re- marking ECT(1) packets to NotECT or even dropping all ECT(1)
    >>>> packets on network ingress, as these will give clear and strong
    >>>> incentives to
    >>> endpoints to
    >>>> stop using ECT(1)/L4S-signaling. But to avoid "burning" the ECT(1)
    >>> codepoint
    >>>> indefinitely, such measures should be restricted to a limited
    >>>> duration
    >>> (e.g. 24
    >>>> month) after an unsuccessful termination of the L4S experiment, to
    >>>> allow
    >>> the
    >>>> ECT(1) codepoint to be recycled for other uses/experiments afterwards.
    >>>> 
    >>>> 
    >>>> 
    >>>> I am sure that this is not going to be complete and that there will
    >>>> be
    >>> differing
    >>>> opinions on these sections, but I believe something similar in scope
    >>> should
    >>>> be added.
    >>>> 
    >>>> Best Regards
    >>>> 	Sebastian
    > 
    >