Re: [tsvwg] links to Canary methods for roll-out of new transport features
"Holland, Jake" <jholland@akamai.com> Sat, 21 August 2021 22:39 UTC
Return-Path: <jholland@akamai.com>
X-Original-To: tsvwg@ietfa.amsl.com
Delivered-To: tsvwg@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 5CA913A1236 for <tsvwg@ietfa.amsl.com>; Sat, 21 Aug 2021 15:39:53 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -2.551
X-Spam-Level:
X-Spam-Status: No, score=-2.551 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, DKIMWL_WL_HIGH=-0.452, DKIM_SIGNED=0.1, DKIM_VALID=-0.1, DKIM_VALID_AU=-0.1, DKIM_VALID_EF=-0.1, SPF_HELO_NONE=0.001, SPF_PASS=-0.001, URIBL_BLOCKED=0.001] autolearn=ham autolearn_force=no
Authentication-Results: ietfa.amsl.com (amavisd-new); dkim=pass (2048-bit key) header.d=akamai.com
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id tgwGqp5fwaUj for <tsvwg@ietfa.amsl.com>; Sat, 21 Aug 2021 15:39:47 -0700 (PDT)
Received: from mx0a-00190b01.pphosted.com (mx0a-00190b01.pphosted.com [IPv6:2620:100:9001:583::1]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id 713373A1234 for <tsvwg@ietf.org>; Sat, 21 Aug 2021 15:39:47 -0700 (PDT)
Received: from pps.filterd (m0122333.ppops.net [127.0.0.1]) by mx0a-00190b01.pphosted.com (8.16.1.2/8.16.0.43) with SMTP id 17LHgtfG024279; Sat, 21 Aug 2021 23:38:28 +0100
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=akamai.com; h=from : to : cc : subject : date : message-id : references : in-reply-to : content-type : content-id : content-transfer-encoding : mime-version; s=jan2016.eng; bh=i0eQFdbNVxX8RK5Iw1G46rdS9BR7K0XM0yJ1Nn2TwS4=; b=AAtMmM5kSYdxUyV3TdgsbErZjWk9luECRnCVd6c7y6AJyarFLGmL/OY3sJ+eXh5zsklz EsmUb00YhrtlUctFzVhRx8qAVbdwOJQV/FXnaYIPsdqjew6nqBDui35HQcMUiyJSmeUt jWZQVLykWqKXJkd91Ip45vbqeFGMoUiv61yeSkr1QKFFZvzWZovsB7TR0J1utPERnMe7 bpJKKfNmIdIn/N1B+ATqMBVHI0jYmbeIMsz1TFgP9i2ol7VKcNtH8tA0Scs7GWJMnroP fL+UtoqyAWQOu++1QUmPJ0srhLSJ1WZwDJ9WmjKJdi+IoI+PEP4Lf9Rjc62LN9vVVjAg +w==
Received: from prod-mail-ppoint8 (a72-247-45-34.deploy.static.akamaitechnologies.com [72.247.45.34] (may be forged)) by mx0a-00190b01.pphosted.com with ESMTP id 3ajrr84rnr-1 (version=TLSv1.2 cipher=ECDHE-RSA-AES256-GCM-SHA384 bits=256 verify=NOT); Sat, 21 Aug 2021 23:38:28 +0100
Received: from pps.filterd (prod-mail-ppoint8.akamai.com [127.0.0.1]) by prod-mail-ppoint8.akamai.com (8.16.1.2/8.16.1.2) with SMTP id 17LMJWau005868; Sat, 21 Aug 2021 18:38:27 -0400
Received: from email.msg.corp.akamai.com ([172.27.165.118]) by prod-mail-ppoint8.akamai.com with ESMTP id 3ajvtykkps-1 (version=TLSv1.2 cipher=ECDHE-RSA-AES256-SHA384 bits=256 verify=NOT); Sat, 21 Aug 2021 18:38:27 -0400
Received: from USTX2EX-DAG1MB4.msg.corp.akamai.com (172.27.165.122) by ustx2ex-dag1mb3.msg.corp.akamai.com (172.27.165.121) with Microsoft SMTP Server (TLS) id 15.0.1497.23; Sat, 21 Aug 2021 17:38:26 -0500
Received: from USTX2EX-DAG1MB4.msg.corp.akamai.com ([172.27.165.122]) by ustx2ex-dag1mb4.msg.corp.akamai.com ([172.27.165.122]) with mapi id 15.00.1497.023; Sat, 21 Aug 2021 17:38:26 -0500
From: "Holland, Jake" <jholland@akamai.com>
To: Martin Duke <martin.h.duke@gmail.com>, Gorry Fairhurst <gorry@erg.abdn.ac.uk>
CC: Jonathan Morton <chromatix99@gmail.com>, tsvwg <tsvwg@ietf.org>
Thread-Topic: [tsvwg] links to Canary methods for roll-out of new transport features
Thread-Index: AQHXgnHiUvT/blkBJkOyxf9UjjV2uqtapvAAgADuEACAABMjgIAAEXwAgBZidoCADHf/gA==
Date: Sat, 21 Aug 2021 22:38:25 +0000
Message-ID: <15AD8CE4-F403-4837-86EF-86D3BFA70FBF@akamai.com>
References: <AF731D2C-B796-4B20-973D-6DB496DB1228@akamai.com> <232F9BFA-0D05-48C5-807E-FA2A7904754A@erg.abdn.ac.uk> <eg5mzk.qx1zf8.0-qmf@smtp.gmail.com> <de1017ec-d437-4c61-9f9c-7d237eee8fcb@erg.abdn.ac.uk> <CAM4esxSf9F86dYKW5jg8AW-m7aa8bkcgkfANzwvtVBeAdYDAbA@mail.gmail.com>
In-Reply-To: <CAM4esxSf9F86dYKW5jg8AW-m7aa8bkcgkfANzwvtVBeAdYDAbA@mail.gmail.com>
Accept-Language: en-US
Content-Language: en-US
X-MS-Has-Attach:
X-MS-TNEF-Correlator:
user-agent: Microsoft-MacOutlook/16.51.21071101
x-ms-exchange-messagesentrepresentingtype: 1
x-ms-exchange-transport-fromentityheader: Hosted
x-originating-ip: [172.27.164.43]
Content-Type: text/plain; charset="utf-8"
Content-ID: <4244A61289923B4C99459440BA7F1298@akamai.com>
Content-Transfer-Encoding: base64
MIME-Version: 1.0
X-Proofpoint-Virus-Version: vendor=fsecure engine=2.50.10434:6.0.391, 18.0.790 definitions=2021-08-21_09:2021-08-20, 2021-08-21 signatures=0
X-Proofpoint-Spam-Details: rule=notspam policy=default score=0 adultscore=0 mlxscore=0 mlxlogscore=999 phishscore=0 spamscore=0 suspectscore=0 malwarescore=0 bulkscore=0 classifier=spam adjust=0 reason=mlx scancount=1 engine=8.12.0-2107140000 definitions=main-2108210141
X-Proofpoint-ORIG-GUID: Ug4YJ45ngskBsA6PwHUX5-vfjclng6ja
X-Proofpoint-GUID: Ug4YJ45ngskBsA6PwHUX5-vfjclng6ja
X-Proofpoint-Virus-Version: vendor=baseguard engine=ICAP:2.0.182.1,Aquarius:18.0.790,Hydra:6.0.391,FMLib:17.0.607.475 definitions=2021-08-21_10,2021-08-20_03,2020-04-07_01
X-Proofpoint-Spam-Details: rule=notspam policy=default score=0 malwarescore=0 mlxlogscore=999 spamscore=0 clxscore=1011 bulkscore=0 phishscore=0 priorityscore=1501 impostorscore=0 lowpriorityscore=0 adultscore=0 mlxscore=0 suspectscore=0 classifier=spam adjust=0 reason=mlx scancount=1 engine=8.12.0-2107140000 definitions=main-2108210142
X-Agari-Authentication-Results: mx.akamai.com; spf=${SPFResult} (sender IP is 72.247.45.34) smtp.mailfrom=jholland@akamai.com smtp.helo=prod-mail-ppoint8
Archived-At: <https://mailarchive.ietf.org/arch/msg/tsvwg/4k_5W_a5Ep-BWes1PTYstdbBOhc>
Subject: Re: [tsvwg] links to Canary methods for roll-out of new transport features
X-BeenThere: tsvwg@ietf.org
X-Mailman-Version: 2.1.29
Precedence: list
List-Id: Transport Area Working Group <tsvwg.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/tsvwg>, <mailto:tsvwg-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/tsvwg/>
List-Post: <mailto:tsvwg@ietf.org>
List-Help: <mailto:tsvwg-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/tsvwg>, <mailto:tsvwg-request@ietf.org?subject=subscribe>
X-List-Received-Date: Sat, 21 Aug 2021 22:39:54 -0000
Hi Martin, From: Martin Duke <martin.h.duke@gmail.com> > Date: Fri,2021-08-13 at 10:14 AM > The "control" part of the canary experiment is how you identify collateral damage. The L4S hypotheses, informally, are that > (1) L4S flows will experience lower latency, etc > (2) Not-ECT flows, and 3168 flows that traverse most queueing configurations, will not suffer significant degradation. > (3) 3168 flows will only suffer starvation in queue configurations that are not deployed at scale in the internet. > > So the proper design of a canary deployment, IMO, is in two steps: > (a) Have servers choose between Not-ECT and ECT(0) to establish a baseline. > (b) servers choose between Not-ECT, ECT(0), and ECT(1) and compare the results. I don't think I understand this suggestion. I’m not sure if you’re saying when TCP Prague is turned on, the server would endeavor to actively send simultaneous competing non-L4S traffic on secondary flows to the same receiver so they can detect whether there’s impairment in the secondary flows, like in the “Out of Band Active Detection” case in the Feb 2021 detection paper (https://arxiv.org/pdf/1911.00710.pdf)? If so, this is somewhat more complex than most canary systems--from the sender you don’t generally have a way to open a second connection correlated with the first (e.g. when a client is making web requests to a load-balanced service) so it would need a lot of extra cross- flow coordination features in the server as compared to a usual canary test. But I also don’t see how selecting between ECT(0) and Not-ECT when establishing a baseline is helpful here, since Non-ECT flows will get starved the same as ECT(0) flows if they’re traversing a shared marking classic queue in competition with TCP Prague traffic, whereas the suggestion makes it seem like the selection between ECT(0) and N-ECT is meant to do something helpful toward noticing problems. (Possible source of confusion: by "3168 flows" in 3), did you mean ECT(0) flows, thinking only those would be impacted? Or did you mean classic traffic in general across a 3168 marking queue?) This leads me to believe that either I don’t understand the intended suggestion, or that it didn’t incorporate some of the necessary considerations of the complicating factors discussed earlier in the thread. While the “self-harm” case should in principle be possible to notice when you do manage to get simultaneous flows for your Prague and classic traffic across the same marking bottleneck, the “being harmed by others” case would actually be worse than invisible to the canary, in that it would corrupt the baseline data and tend to make even the self-harm detection cases look like noise. If you had some legit problem paths with shared marking queues, you’d have results that look like “yes ECT(0) and N-ECT get impaired for this receiver when competing with our Prague flows, but they also get impaired randomly even when we’re not sending competing Prague traffic” (for instance, when someone else is sending Prague traffic or unresponsive traffic). For these reasons (and also the reasons Jonathan outlined in response to Gorry's question about the difference between this and other CC- related work), I don't see how the canary strategy can be used effectively here, so to me the detection strategies are a better fit to the problem (though they do have some of their own challenges, as previously discussed). With that said, canary testing would still of course be useful to detect implementation flaws where L4s/Prague flows systematically suffer unexpected impairment and I expect would be used as a matter of course, I'm just saying it would not help with the safety concerns we've been discussing to detect harm to other people's traffic, as I don't think they'd be able to see the collateral damage they're causing. Best regards, Jake
- [tsvwg] links to Canary methods for roll-out of n… Gorry Fairhurst
- Re: [tsvwg] links to Canary methods for roll-out … Holland, Jake
- Re: [tsvwg] links to Canary methods for roll-out … Gorry (erg)
- Re: [tsvwg] links to Canary methods for roll-out … Jonathan Morton
- Re: [tsvwg] links to Canary methods for roll-out … Gorry Fairhurst
- Re: [tsvwg] links to Canary methods for roll-out … Martin Duke
- Re: [tsvwg] links to Canary methods for roll-out … Holland, Jake
- Re: [tsvwg] links to Canary methods for roll-out … Martin Duke
- Re: [tsvwg] links to Canary methods for roll-out … Jonathan Morton