Re: [tsvwg] SCE and tunnels / encapsulations

Dave Taht <dave.taht@gmail.com> Mon, 27 April 2020 06:43 UTC

Return-Path: <dave.taht@gmail.com>
X-Original-To: tsvwg@ietfa.amsl.com
Delivered-To: tsvwg@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id BDD893A0E04 for <tsvwg@ietfa.amsl.com>; Sun, 26 Apr 2020 23:43:25 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -2.098
X-Spam-Level:
X-Spam-Status: No, score=-2.098 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, DKIM_SIGNED=0.1, DKIM_VALID=-0.1, DKIM_VALID_AU=-0.1, DKIM_VALID_EF=-0.1, FREEMAIL_FROM=0.001, SPF_HELO_NONE=0.001, SPF_PASS=-0.001, URIBL_BLOCKED=0.001] autolearn=ham autolearn_force=no
Authentication-Results: ietfa.amsl.com (amavisd-new); dkim=pass (2048-bit key) header.d=gmail.com
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id H90p3xLkKq9v for <tsvwg@ietfa.amsl.com>; Sun, 26 Apr 2020 23:43:22 -0700 (PDT)
Received: from mail-il1-x12c.google.com (mail-il1-x12c.google.com [IPv6:2607:f8b0:4864:20::12c]) (using TLSv1.2 with cipher ECDHE-RSA-AES128-GCM-SHA256 (128/128 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id 9241F3A0E03 for <tsvwg@ietf.org>; Sun, 26 Apr 2020 23:43:22 -0700 (PDT)
Received: by mail-il1-x12c.google.com with SMTP id s10so15639793iln.11 for <tsvwg@ietf.org>; Sun, 26 Apr 2020 23:43:22 -0700 (PDT)
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=gmail.com; s=20161025; h=mime-version:references:in-reply-to:from:date:message-id:subject:to :cc:content-transfer-encoding; bh=iFeP6e2iQPWqIHngd+NFXJ+XMzVytxlhXdKQTMUi8LA=; b=ZGfm3nH/8aCYU1ay6TbKUTUjHxWl9jHQVYNWOK7Qnr9OZ/MYtrZFiXSlFpAEDm4r5B VSQjmWIEpY36bvfPAwYc+L85rvn5WE7Xw8PpdBx/4cW6N/4asuKv03nXEjKzit+ktpP9 DO61f7J8f1De+mO66xU1oLaVopr8H/Bfge2Evhx0A2wt45LhAztjOTmHi6NpKgJAKqXP wvFjwMeCtrtp8M+8lziVUkqnj+RofaRrXNCujOY+MS+wmpU4qKo/yO95gRnemvN1FVAs e/vfLUNpwa0znU8TlsqKfb7AuzvAma1ish6yHU+fSO5/WWwAZZtYlb7NX+t3ZJmpc8Br clhg==
X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20161025; h=x-gm-message-state:mime-version:references:in-reply-to:from:date :message-id:subject:to:cc:content-transfer-encoding; bh=iFeP6e2iQPWqIHngd+NFXJ+XMzVytxlhXdKQTMUi8LA=; b=NeyTAh2LacKJKJoyRzQ8ZneHV3bLEEmUhunxnYxzfs6n8MIuNQduwwwvboVS7nbNBr tvy9vMa7V6zQm0RyKwtr/0h6JWC5Y1KYvQRIP03xXTn+xxHYhFTTpC8AUdebxz+E9ZDU mruP4KZHipbh+9a1TwgpLCsH/sccEU0FKRs4cm7nXR+Uk6nHe7p4aRn7ln3i3ekLBG3c fbOibXnK+q76SPAxZbGx60IpIZO/5XgUw9FkPGvucSWcgHOe4GQFG3GCdEPGT19V1rkV seSwkdcuhDXqvWh1cISFZuBbKC0Iv4qcxG62VYWtnpAEDM3OhzBBV5pjJfjRLkv0+yZU g+Rg==
X-Gm-Message-State: AGi0PuZ3bzXDiBR1SKPap70vrUm0pUQv6gTn1xIjXVAkFI1+v+2VHwXE Fm+uah3Fn7339q54izpHwYqYnPp3VsYbFd138Iw=
X-Google-Smtp-Source: APiQypIupEbXbD16EOaQpoQLC/nls2uKBpiOBHA23npScqX+0RZ+bjNws4dAdExZgr6misP1Vlss1gAd1acsBZJGh6Q=
X-Received: by 2002:a92:dc0d:: with SMTP id t13mr20014658iln.287.1587969801410; Sun, 26 Apr 2020 23:43:21 -0700 (PDT)
MIME-Version: 1.0
References: <7409882f-7539-a7df-1dae-5c1259acaa28@bobbriscoe.net> <CAA93jw6v9EoesD9fdo8nGjSJBdZT=J5bAjqYzc6kbKFYLiwMJA@mail.gmail.com> <ecc7ab6f-d5c5-0f49-1e06-13a63b58bff5@bobbriscoe.net> <CAA93jw7sqDTMmC9NwTKJfpTvdYowihu5KAq96mL=9kGqO+H8cg@mail.gmail.com> <CAA93jw4FxodkcR2jMttodq9s-M7i9MWPWQ6o2cdja+ZmDv-KFg@mail.gmail.com> <B5056843-E35C-4B86-A884-7C2101075882@gmx.de>
In-Reply-To: <B5056843-E35C-4B86-A884-7C2101075882@gmx.de>
From: Dave Taht <dave.taht@gmail.com>
Date: Sun, 26 Apr 2020 23:43:09 -0700
Message-ID: <CAA93jw62vQNW2n1pogm7JOzh2hDF8Ft74OrB23fdFCf7ejdr3g@mail.gmail.com>
To: Sebastian Moeller <moeller0@gmx.de>
Cc: tsvwg IETF list <tsvwg@ietf.org>, Bob Briscoe <ietf@bobbriscoe.net>
Content-Type: text/plain; charset="UTF-8"
Content-Transfer-Encoding: quoted-printable
Archived-At: <https://mailarchive.ietf.org/arch/msg/tsvwg/2x3QhiUWy6ITZSshK4bTOVK0U8Y>
Subject: Re: [tsvwg] SCE and tunnels / encapsulations
X-BeenThere: tsvwg@ietf.org
X-Mailman-Version: 2.1.29
Precedence: list
List-Id: Transport Area Working Group <tsvwg.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/tsvwg>, <mailto:tsvwg-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/tsvwg/>
List-Post: <mailto:tsvwg@ietf.org>
List-Help: <mailto:tsvwg-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/tsvwg>, <mailto:tsvwg-request@ietf.org?subject=subscribe>
X-List-Received-Date: Mon, 27 Apr 2020 06:43:27 -0000

ya know? I think everybody should get some sleep.

certainly a patch needs to get prepared and queued up for
linux-stable, which, btw, I think for the first time in ages,
everybody here can agree on. That's a good feeling.

On Sun, Apr 26, 2020 at 11:03 PM Sebastian Moeller <moeller0@gmx.de> wrote:
>
> Hi Dave,
>
> Good point.
>
> But I can not help myself noting that all of this assumed that the heavily tunneled paths we are talking about will actually roll out a pist-rfc3168 AQM. I for one do not believe that the business case for doing that had changed one iota either by L4S or by SCE, so at least for initial roll-out I consider this to be a non-issue.
> I also add one level of confusion I spit in Bob's argument:
> In the tunneled traffic of day a complete end user link or of a VPN, how can you expect exclusively L4S traffic to be present? So I question that even if we had AQMs on tunneled paths that doing the 1/p congestion control feed back would be a safe thing to do. And leaking individual packet's ECT(1) out of a VPN is IMHO severe enough an isolation violation to stop using that VPN for good. But again, I really do not see the internet growing AQMs at the problematic places any time soon, and I assume even with ECT(1) as output we would have time to prepare not only safe but also high fidelity tunnel passage should this become a limiting step in the future.
>
>
> Best
> Sebastian
>
> On 27 April 2020 07:35:52 CEST, Dave Taht <dave.taht@gmail.com> wrote:
>>
>> I learned something I didn't know btw. ping -Q "value" on linux, at
>> least - sets the same value on the receive as the send.
>> they took "echo" seriously way back then.
>>
>> and generating frags can be "interesting" when transiting a tunnel.
>> Abusing one of my wireguard tunnels
>> as a test:
>>
>> ping -s 1500 -f -Q 1 never.you.mind.ip
>> ping -s 1500 -f -Q 2 never.you.mind.ip
>>
>> shows that 2 can change to 3 by the aqm and be turned back into 3 at
>> the egress point (inner)
>> shows that 1 can change to 3 by the aqm and but *not* be turned back
>> into 3 at the egress point (inner), it stays at 1
>>
>> with what? 20%? 60%? of the world transiting tunnels? this is a major
>> deployment problem for both l4s and sce.
>>
>>
>>
>>
>>
>>
>>
>> On Sun, Apr 26, 2020 at 9:18 PM Dave Taht <dave.taht@gmail.com> wrote:
>>>
>>>
>>>  thank you for taking a look.
>>>
>>>  It would be good to know what cisco and juniper actually do, by
>>>  spitting these bits into them
>>>  they are all available as vms now, cisco has 3 major linux versions in their
>>>  stacks so far as I recall, pretty ancient, and for all I know do some
>>>  tunnel types in hw.
>>>
>>>  openvpn and other userspace vpns would be good to look at also.
>>>
>>>  On Sun, Apr 26, 2020 at 8:17 PM Bob Briscoe <ietf@bobbriscoe.net> wrote:
>>>>
>>>>
>>>>  Dave,
>>>>
>>>>  On 27/04/2020 01:33, Dave Taht wrote:
>>>>
>>>>  At one point I had done a thorough survey of all the open source
>>>>  network stacks in the world,
>>>>  and largely found they copied both bits back and forth. But I've lost
>>>>  my notes on this and do not
>>>>  remember clearly.
>>>>
>>>>
>>>>  Should copy ECN field to outer on encap, but shouldn't blindly copy them back from outer on decap.
>>>>  Forwarded ECN field should depend on combination of outer and inner (see table at github URL below).
>>>
>>>
>>>>  Earlier this evening, Olivier and I checked all the different tunnel code in Linux that we could find.
>>>>
>>>>  Most followed RFC3168 behaviour (i.e. propagating CE but stripping off ECT(1))
>>>
>>>
>>>  Yea, that was (I think), essentially my conclusion, long predating l4s and sce.
>>>
>>>  I am under the impression that ipsec tunneling actually doesn't do
>>>  even that much, by
>>>  default. Please feel free to correct my bad memories! but get some sleep!
>>>
>>>> Foo over UDP (and therefore Generic UDP Encap (GUE)) copied nothing on decap, just stripped the outer off.
>>>
>>>
>>>  a problem for both of your proposals.
>>>
>>>  My explorations LONG predate foo. so far as I know that was tom
>>>  herbert and facebook's thing
>>>  Is it deployed to any extent?
>>>
>>>>
>>>>  None copy ECT(1) from the outer when there's ECT(0) on the inner.
>>>
>>>
>>>  So I'm kind of confused now. But: ECT(1) on the inner does get copied
>>>  to the outer?
>>>
>>>  But: not the reverse?
>>>
>>>  I'd thought the nonce idea was sort of respected in the field,
>>>  and that NOT passing that along e2e kind of made sense. Or maybe the nonce idea
>>>  worried about the info leak too much?
>>>
>>>> The table of how it's meant to be done is even pasted from RFC6040 into comments, but the code doesn't actually do what the table says in the one case of an ECT(1) outer and ECT(0) inner.
>>>> https://github.com/torvalds/linux/blob/master/include/net/inet_ecn.h#L163
>>>
>>>
>>>  Sigh.
>>>
>>>>
>>>>  macOS/xnu-darwin propagates ECT(1) correctly per RFC6040.
>>>>  https://github.com/apple/darwin-xnu/blob/a449c6a3b8014d9406c2ddbdc81795da24aa7443/bsd/netinet/ip_ecn.c#L105
>>>
>>>
>>>  Good to know.
>>>
>>>  Easy patches throughout, but the long tail here is a decade+ long.
>>>
>>>>
>>>>
>>>>  Bob
>>>>
>>>>
>>>>  On Sun, Apr 26, 2020 at 4:57 PM Bob Briscoe <ietf@bobbriscoe.net> wrote:
>>>>
>>>>  Jonathan, and other SCE contributors
>>>>
>>>>  This is one of the factors that strongly distinguishes L4S from SCE, so
>>>>  it's important.
>>>>
>>>>  In the slides you have contributed for tomorrow's tsvwg meeting, the
>>>>  question put by the chairs for #11 was:
>>>>  "ECT(1) propagation through current Internet (tunnels, lower layers). ":
>>>>
>>>>  The SCE responses regarding tunnels are:
>>>>  1.    "ECT(1) traverses the Internet well, due to foresight in RFC-3168.."
>>>>  2.    "Update to RFC-3168 desirable to obtain full benefits on tunnel path"
>>>>
>>>>  These sentences are both falsehoods.
>>>>
>>>>  Sentence #1:
>>>>  Where an AQM applies ECT(1) (SCE) marks to the outer headers of
>>>>  encapsulated packets, as an RFC3168 decapsulator strips off the outer
>>>>  header, all SCE marks will just disappear. It only propagates CE marking
>>>>  to the onward packet (which is one of the main reasons L4S solely uses
>>>>  CE as an output from the network).
>>>>
>>>>  Sentence #2:
>>>>  Without an update to RFC3168, there are no benefits from SCE on a tunnel
>>>>  path. So an update to RFC3168 is not merely desirable, it is essential,
>>>>  to obtain /any/ SCE-related benefit on a tunnel path.
>>>>
>>>>
>>>>  We need to get real here. This is not a research project. This is not a
>>>>  debating game. More than 50% of the Internet is now over mobile and all
>>>>  mobile networks use tunnels. Overlays and encapsulations are widely used
>>>>  over the rest of the Internet, to support v6 over v4, VPNs, retail over
>>>>  wholesale ISPs, virtual network overlays, etc, etc.
>>>>
>>>>  As you know, RFC6040 is the update to RFC3168 that SCE needs.
>>>>  Q1. Have you tested whether SCE works over tunnels that claim to comply
>>>>  with RFC6040?
>>>>  Q2. Have you attempted to measure the uptake of RFC6040 in tunnels over
>>>>  the Internet?
>>>>
>>>>
>>>>  Regards
>>>>
>>>>
>>>>
>>>>  Bob
>>>>
>>>>  --
>>>> ________________________________
>>>>  Bob Briscoe                               http://bobbriscoe.net/
>>>>
>>>>
>>>>
>>>>  --
>>>> ________________________________
>>>>  Bob Briscoe                               http://bobbriscoe.net/
>>>
>>>
>>>
>>>
>>>  --
>>>  Make Music, Not War
>>>
>>>  Dave Täht
>>>  CTO, TekLibre, LLC
>>>  http://www.teklibre.com
>>>  Tel: 1-831-435-0729
>>
>>
>>
>>
>> --
>> Make Music, Not War
>>
>> Dave Täht
>> CTO, TekLibre, LLC
>> http://www.teklibre.com
>> Tel: 1-831-435-0729
>>
>
> --
> Sent from my Android device with K-9 Mail. Please excuse my brevity.



-- 
Make Music, Not War

Dave Täht
CTO, TekLibre, LLC
http://www.teklibre.com
Tel: 1-831-435-0729