Re: [tsvwg] I-D Action: draft-ietf-tsvwg-l4sops-00.txt

Greg White <g.white@CableLabs.com> Tue, 11 May 2021 23:21 UTC

Return-Path: <g.white@CableLabs.com>
X-Original-To: tsvwg@ietfa.amsl.com
Delivered-To: tsvwg@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id D68623A2A64 for <tsvwg@ietfa.amsl.com>; Tue, 11 May 2021 16:21:49 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -2.1
X-Spam-Level:
X-Spam-Status: No, score=-2.1 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, DKIM_SIGNED=0.1, DKIM_VALID=-0.1, DKIM_VALID_AU=-0.1, DKIM_VALID_EF=-0.1, RCVD_IN_DNSWL_BLOCKED=0.001, RCVD_IN_MSPIKE_H2=-0.001, SPF_PASS=-0.001, URIBL_BLOCKED=0.001] autolearn=ham autolearn_force=no
Authentication-Results: ietfa.amsl.com (amavisd-new); dkim=pass (2048-bit key) header.d=cablelabs.com
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id EUdF7dN8a4wp for <tsvwg@ietfa.amsl.com>; Tue, 11 May 2021 16:21:43 -0700 (PDT)
Received: from NAM04-MW2-obe.outbound.protection.outlook.com (mail-mw2nam08on2126.outbound.protection.outlook.com [40.107.101.126]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id 249973A2A68 for <tsvwg@ietf.org>; Tue, 11 May 2021 16:21:42 -0700 (PDT)
ARC-Seal: i=1; a=rsa-sha256; s=arcselector9901; d=microsoft.com; cv=none; b=bCAHK6M331mZTukrJpf9mlh/ZQC4sF8DN9x5IQj6cSjvVbXFqHIORxrssjbKmOg7n+O5LmW9lOhj46Oq/lDPDSGdU184FSngFFeR0ZcJV7uQjO8IAsFWvV6NbYFuDs1pQA13YqJ91cjCRPhwgDayKNlehAgTQdgd96i637oBfG1BscNg5+xF87gZ/dzf84HcVvSiYMHA0J/p0cjNfu+V0LpWTs7r4lMSyroDQEhoBbee2gTWONh1GC57Dntli8a+otpkpxQfoIcu6ZmgejsNtp46RZZIa6drK17xOpH9DiN0DbWSc64NXRpOKEgij4hiogGmgdNzIWPIOZ1aj04Now==
ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=microsoft.com; s=arcselector9901; h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-SenderADCheck; bh=JgOtNfZZRP1aO6+FYB++HqjlkqUOT1X9mcud48ACiwQ=; b=TUG3VJWVZyyJQnUq5oWEjFKjKdCRlNgkALgbBMQPxXWNQUT6ikUHyzqrwUuz8H7P5EVT7nrlqlvBxteMuCZpC1cFRaU2S/usml1/7vFB7ei0LK/ziYvyTRMF5aKJt2EZGmoQEBLq/mIduJJWqFSxIx+WZOn4iaKH48wPtomFEstarIFwEqj3AuW0ehc2wxMZFRhygYvgsltwlzXs/RsIhquwDXWha2jdSZ64dFAsSXsQU8eapUOwjX09eAP5aPt+fzKJQINRTdW4xJI8HEIYsS4vlBsZR/DJ/LcANbxq/qgZN11OqQb4oRqxWLe3U0KrUh1/FcKOde7mwFvHOmbgwg==
ARC-Authentication-Results: i=1; mx.microsoft.com 1; spf=pass smtp.mailfrom=cablelabs.com; dmarc=pass action=none header.from=cablelabs.com; dkim=pass header.d=cablelabs.com; arc=none
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=cablelabs.com; s=selector2; h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-SenderADCheck; bh=JgOtNfZZRP1aO6+FYB++HqjlkqUOT1X9mcud48ACiwQ=; b=gkuiuV91kTFf+ZpBUMs0dHujx8J9OzkdvfTQvw6+tMpUDLaOcPDyFRkxoKVp6YyFjp5OdTbLn9ZF8huAM2oNVpiytNB6MK8Zowc0/g4P/sTzCeyb3S4CNY7/ReT90Hs1nhD/VVMiOhq2DZSWGDNa2vm7wzazzx7+q9IC8W3QUMKMi1RmFXHNPHHz51WR4m/mqPRGFmAPmAug7CzKswzzNup3q7VdbRjStaZIKMa48Di+Yt9BEA6hkkCEC/yuLqe5vbYwtFaQo7PuiwW2wCgOERLDDimoNwrIlOqHrgCA0VLhNlhTsGr1GPdsb8hfagaQy/mzGPVii90C87PSgQhYGA==
Received: from CY4PR06MB2821.namprd06.prod.outlook.com (2603:10b6:903:130::11) by CY4PR06MB3046.namprd06.prod.outlook.com (2603:10b6:903:70::23) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id 15.20.4108.29; Tue, 11 May 2021 23:21:40 +0000
Received: from CY4PR06MB2821.namprd06.prod.outlook.com ([fe80::8161:6d07:dea0:8696]) by CY4PR06MB2821.namprd06.prod.outlook.com ([fe80::8161:6d07:dea0:8696%8]) with mapi id 15.20.4108.031; Tue, 11 May 2021 23:21:39 +0000
From: Greg White <g.white@CableLabs.com>
To: Sebastian Moeller <moeller0@gmx.de>
CC: "tsvwg@ietf.org" <tsvwg@ietf.org>
Thread-Topic: [tsvwg] I-D Action: draft-ietf-tsvwg-l4sops-00.txt
Thread-Index: AQHXQg+ithPpZgnifUuy9aSRG662RqrVbjGAgADJB4CAAYrlAIAGzfiA
Date: Tue, 11 May 2021 23:21:39 +0000
Message-ID: <FD12B656-9743-47C3-897B-C0155C5566AF@cablelabs.com>
References: <162026122806.29902.12130492993431477595@ietfa.amsl.com> <0D313261-6F18-45AA-A40E-7CBCDF229EAD@cablelabs.com> <55F0F23A-EBCA-4703-A2B8-176AD26789C9@gmx.de> <3830918D-0DF5-43C0-AA91-B5C4300EE1E3@cablelabs.com>
In-Reply-To: <3830918D-0DF5-43C0-AA91-B5C4300EE1E3@cablelabs.com>
Accept-Language: en-US
Content-Language: en-US
X-MS-Has-Attach:
X-MS-TNEF-Correlator:
user-agent: Microsoft-MacOutlook/16.44.20121301
authentication-results: gmx.de; dkim=none (message not signed) header.d=none;gmx.de; dmarc=none action=none header.from=CableLabs.com;
x-originating-ip: [73.243.9.160]
x-ms-publictraffictype: Email
x-ms-office365-filtering-correlation-id: 7d8f1367-bf2b-46c0-54d9-08d914d387d7
x-ms-traffictypediagnostic: CY4PR06MB3046:
x-microsoft-antispam-prvs: <CY4PR06MB3046E9DD53905261521BFBB8EE539@CY4PR06MB3046.namprd06.prod.outlook.com>
x-ms-oob-tlc-oobclassifiers: OLM:10000;
x-ms-exchange-senderadcheck: 1
x-microsoft-antispam: BCL:0;
x-microsoft-antispam-message-info: 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
x-forefront-antispam-report: CIP:255.255.255.255; CTRY:; LANG:en; SCL:1; SRV:; IPV:NLI; SFV:NSPM; H:CY4PR06MB2821.namprd06.prod.outlook.com; PTR:; CAT:NONE; SFS:(39850400004)(376002)(346002)(136003)(396003)(366004)(2616005)(26005)(6916009)(316002)(6506007)(122000001)(5660300002)(33656002)(76116006)(38100700002)(53546011)(2906002)(4326008)(86362001)(6512007)(71200400001)(66946007)(966005)(186003)(66574015)(8936002)(8676002)(36756003)(83380400001)(66446008)(66476007)(64756008)(66556008)(6486002)(478600001)(85282002)(45980500001); DIR:OUT; SFP:1102;
x-ms-exchange-antispam-messagedata: 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
x-ms-exchange-transport-forked: True
Content-Type: text/plain; charset="utf-8"
Content-ID: <E60743559D58294AACC27600C3371167@namprd06.prod.outlook.com>
Content-Transfer-Encoding: base64
MIME-Version: 1.0
X-OriginatorOrg: cablelabs.com
X-MS-Exchange-CrossTenant-AuthAs: Internal
X-MS-Exchange-CrossTenant-AuthSource: CY4PR06MB2821.namprd06.prod.outlook.com
X-MS-Exchange-CrossTenant-Network-Message-Id: 7d8f1367-bf2b-46c0-54d9-08d914d387d7
X-MS-Exchange-CrossTenant-originalarrivaltime: 11 May 2021 23:21:39.8727 (UTC)
X-MS-Exchange-CrossTenant-fromentityheader: Hosted
X-MS-Exchange-CrossTenant-id: ce4fbcd1-1d81-4af0-ad0b-2998c441e160
X-MS-Exchange-CrossTenant-mailboxtype: HOSTED
X-MS-Exchange-CrossTenant-userprincipalname: VOhDdxtTW+Hxnok9HlE5IzdlitmlJxtLB56eTyb2aQGGpmYcNdQEIcGBppZ1QytADwTREJtBOskGnuEBcpQ+BQ==
X-MS-Exchange-Transport-CrossTenantHeadersStamped: CY4PR06MB3046
Archived-At: <https://mailarchive.ietf.org/arch/msg/tsvwg/8TaUHRKHU4uilZgC7KzZ4aoY_gc>
Subject: Re: [tsvwg] I-D Action: draft-ietf-tsvwg-l4sops-00.txt
X-BeenThere: tsvwg@ietf.org
X-Mailman-Version: 2.1.29
Precedence: list
List-Id: Transport Area Working Group <tsvwg.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/tsvwg>, <mailto:tsvwg-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/tsvwg/>
List-Post: <mailto:tsvwg@ietf.org>
List-Help: <mailto:tsvwg-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/tsvwg>, <mailto:tsvwg-request@ietf.org?subject=subscribe>
X-List-Received-Date: Tue, 11 May 2021 23:21:50 -0000

Sebastian,

On the L4S Interim call yesterday, you mentioned that the data on ECN usage in this Roddav paper for ports 80 and 443 were more realistic.  I'm not sure that I agree!

The Port 80 traffic shows 0.26% having a non-zero ECN field.  Ok, fine.   But, then it shows the breakdown of that 0.26% as:  0.22% ECT(1), 88.22% ECT(0) and 11.55% CE.  Disregarding the small amount of ECT1 traffic, this is 11.6% CE-marking!  While not as obviously broken as the overall statistic of 94% CE marking, it does still seem awfully high to be actual CE-marking for Classic ECN.  

For Port 443, the picture is a little bit more believable, but I'm not sure what we learn from it:  0.3% prevalence of non-zero ECN field, and, of that, 1.15% CE.   
We don't know what the end-to-end RTT is for these connections, but I would estimate the RTT for the NYC-SaoPaulo link itself to be about 130ms, so maybe end-to-end it's 150ms RTT typically? 
If 100% of the ECT connections were traversing an RFC3168 bottleneck (unlikely), I think a 1.15% CE marking rate would mean on the order of a few hundred kbps per flow.  Fairly low, but believable.  If it is more like 10% of them (aligning with Pete's data) that were experiencing a 3168 AQM, then that means 11.5% CE marking for those flows (and a throughput more like ~100 kbps - pretty low, but still believable).  So, is this "evidence" that the prevalence of 3168 AQMs is between 10% and 100%?  I doubt it.

Is it possible that this link was carrying traffic from Buenos Aires?

Currently, I plan to write:

Other studies (e.g. [Trammel], [Bauer], [Mandalari]) have examined ECN traversal, but have not reported data on prevalence of CE-marking by networks. Another [Roddav] examined traces from a Tier 1 ISP link in 2018 and observed that 94% of the non-zero ECN marked packets were CE, which appears to reflect a misconfiguration of equipment using that link, as opposed to providing evidence of RFC3168 AQM deployment.

Let me know if you think there is something more insightful we can conclude from that paper.


-Greg




On 5/7/21, 9:28 AM, "tsvwg on behalf of Greg White" <tsvwg-bounces@ietf.org on behalf of g.white@CableLabs.com> wrote:

    Hi Sebastian,

    Thanks for pointing this paper out.  I had not seen it previously, and will include a mention of it in the draft.  The results seem a bit puzzling though.  They report that, of the ~5% of IPv4 packets with a non-zero ECN field, 94% of them were CE!  It is hard to believe that this is actual evidence of ECN marking in the wild.  It seems more like evidence of some kind of ToS munging happening for traffic on this ISP's link between NYC and Sao Paulo.  

    While in terms of total packets that CAIDA dataset is huge, in terms of visibility to traffic in the wild (roughly 80-90% of which is directly peered locally as I understand it) it might not be that representative.  Does anyone have further insight into this paper, or the peculiarities of the CAIDA equinix-nyc trace?

    So far, I think the data from Akamai and Apple have been the most useful in understanding the situation.

    -Greg



    On 5/6/21, 3:53 AM, "Sebastian Moeller" <moeller0@gmx.de> wrote:

        Hi List, hi Greg,

        sorry for being late, but...

        ...speaking of evidence for ECN marking in the wild; here an analysis of CAIDA internet "back-bone link " traffic from 2018 https://ieeexplore.ieee.org/document/8909187 that has not beed discussed as far as I can tell. The data showed between ~5% of IPv4 packets carrying something other than NotECT in the ECN bitfield, a more detailed look at port resolution showed 0.26% (port 80) or 0.3% (port 443) in IPv4. I do not think this was broken down by network, but indicates non-zero ECN usage in the wild in 2018. IMHO the percentage of traffic might be a better proxy for ECN prevalence than number of networks. That said for figuring out how many/which operators should be pro-actively informed of the coming changes identifying the networks seems helpful.



        > On May 6, 2021, at 05:54, Greg White <g.white@CableLabs.com> wrote:
        > 
        > All,
        > 
        > I had hoped to upload this further in advance of the interim meeting next week so that participants would have more chance to review it beforehand. 
        > 
        > There are quite a few changes from the last individual draft, as can be seen in the diff: https://www.ietf.org/rfcdiff?url1=draft-white-tsvwg-l4sops-02&url2=draft-ietf-tsvwg-l4sops-00 
        > And, there remain a few TODO items as well.  These changes/TODOs were the mainly result of review comments on the mailing list, though I received some offline comments and suggested text as well.
        > 
        > I'll do a relatively quick summary of the changes during the timeslot on Monday, but for now, the most notable changes are:
        > 
        > New Section 3.1 summarizing recent studies of RFC3168 deployment (Jake, Pete, please review and see if the text is an accurate summary).

        [SM] See above for an additional relevant study with 2018 data that might be worth adding in the next revision.

        > New Section 6 discussing actions that can be taken by an operator of FQ bottlenecks.

        [SM] There I find:
        "This unfairness is compounded by the fact that the FQ	
         	   scheduler will already be causing unfairness to flows within the	
         	   tunnel relative to flows that are not tunneled."

        This argues that the AQM "should" divine the number of true capacity seeking flows in the compound tunnel aggregate and assign the proper share. I argue that this is impossible to robustly solve in general, and, in the case of encrypted tunnels also arguably the wrong thing to do, as doing so would introduce additional, potential severe re-ordering in the encrypted flow. But a partial solutions already exist, on IPv6 a tunnel could make use of the flow-label field to give additional flow identifier to AQMs. Arguably that is what tunnels should do, as that keeps the policy decision how much reordering one will accept in the hand of the tunnel operators.



        > New Section 7 discussing conclusion of the L4S experiment (Sebastian, for now I went with the text proposed on the mailing list, we can revise it in the next draft if needed).

        [SM] Much appreciated, while I have my quibbles, getting this section in feels quite helpful (and I do not pretend my initial draft was in any way complete and/or perfect). But for completeness, I still think it a good idea to lay out the gamut of potentially required/recommended actions at network termination. The argument will be better the more objective it is, and it already carries a noticeable pro-L4S bias.


        Regards
        	Sebastian


        > 
        > -Greg
        > 
        > 
        > On 5/5/21, 6:34 PM, "tsvwg on behalf of internet-drafts@ietf.org" <tsvwg-bounces@ietf.org on behalf of internet-drafts@ietf.org> wrote:
        > 
        > 
        >    A New Internet-Draft is available from the on-line Internet-Drafts directories.
        >    This draft is a work item of the Transport Area Working Group WG of the IETF.
        > 
        >            Title           : Operational Guidance for Deployment of L4S in the Internet
        >            Author          : Greg White
        >    	Filename        : draft-ietf-tsvwg-l4sops-00.txt
        >    	Pages           : 18
        >    	Date            : 2021-05-05
        > 
        >    Abstract:
        >       This document is intended to provide guidance in order to ensure
        >       successful deployment of Low Latency Low Loss Scalable throughput
        >       (L4S) in the Internet.  Other L4S documents provide guidance for
        >       running an L4S experiment, but this document is focused solely on
        >       potential interactions between L4S flows and flows using the original
        >       ('Classic') ECN over a Classic ECN bottleneck link.  The document
        >       discusses the potential outcomes of these interactions, describes
        >       mechanisms to detect the presence of Classic ECN bottlenecks, and
        >       identifies opportunities to prevent and/or detect and resolve
        >       fairness problems in such networks.  This guidance is aimed at
        >       operators of end-systems, operators of networks, and researchers.
        > 
        > 
        >    The IETF datatracker status page for this draft is:
        >    https://datatracker.ietf.org/doc/draft-ietf-tsvwg-l4sops/
        > 
        >    There is also an HTML version available at:
        >    https://www.ietf.org/archive/id/draft-ietf-tsvwg-l4sops-00.html
        > 
        > 
        >    Please note that it may take a couple of minutes from the time of submission
        >    until the htmlized version and diff are available at tools.ietf.org.
        > 
        >    Internet-Drafts are also available by anonymous FTP at:
        >    ftp://ftp.ietf.org/internet-drafts/
        > 
        > 
        >