Re: [tsvwg] FW: New Version Notification for draft-white-tsvwg-l4sops-00.txt

Greg White <g.white@CableLabs.com> Mon, 19 October 2020 19:37 UTC

Return-Path: <g.white@CableLabs.com>
X-Original-To: tsvwg@ietfa.amsl.com
Delivered-To: tsvwg@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 5BB603A0114 for <tsvwg@ietfa.amsl.com>; Mon, 19 Oct 2020 12:37:07 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -0.2
X-Spam-Level:
X-Spam-Status: No, score=-0.2 tagged_above=-999 required=5 tests=[DKIM_SIGNED=0.1, DKIM_VALID=-0.1, DKIM_VALID_AU=-0.1, DKIM_VALID_EF=-0.1, HTML_MESSAGE=0.001, RCVD_IN_MSPIKE_H2=-0.001, SPF_PASS=-0.001, URIBL_BLOCKED=0.001] autolearn=ham autolearn_force=no
Authentication-Results: ietfa.amsl.com (amavisd-new); dkim=pass (2048-bit key) header.d=cablelabs.com
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id UChBjXOwT-lI for <tsvwg@ietfa.amsl.com>; Mon, 19 Oct 2020 12:37:04 -0700 (PDT)
Received: from NAM10-DM6-obe.outbound.protection.outlook.com (mail-dm6nam10on2124.outbound.protection.outlook.com [40.107.93.124]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id 5B4FB3A00E5 for <tsvwg@ietf.org>; Mon, 19 Oct 2020 12:37:04 -0700 (PDT)
ARC-Seal: i=1; a=rsa-sha256; s=arcselector9901; d=microsoft.com; cv=none; b=dsAWTEuVymmvU59oDSagHom9zoin7QiXPC3KPVCQT2tyVxjSn45szTq7PwJZ0G3NRcW6WrRdcCyBym+wU83CO9PsKy3HJ20C6jYPZLog+pD6LFzWJSmKwJQlUnJe8G/bSUJCZZXbaAhlOa39+dbLHz48thOCFuQkjj5d6jWTAWVFsAEeGOVeouf8hb8RROUyuLLIux+/2tkj3Ay0N4HQkUN61p8NbFn/H6yHpmYm4GbwO0xTUzYdAiHMOMr0yu4as3c6h0zc+/iAHQB6uSQIPC1gBDXa+e/nt5VqTIXRbebKI5EHYzHb+e0y97bRyl5Mkk8xLhXZtuxINULowurySw==
ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=microsoft.com; s=arcselector9901; h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-SenderADCheck; bh=y1wTJbxFhVnsWcxTBzUFr5M8HM+GnXJdqLfXqaVCv2s=; b=KctQWN6smk1VPzFuYyISooKW2XBoXbmK+XsVOp2rZPx+MZRnbrqgKuuzYMcpdzaPXu0Zmie6+0zrDMNGGiIQIGlOGCxTvqbJylZJdnN6XpjCY/10TFRvtFtM+FnywTHUQxWZ89Io/RDdML/91llDkuMIhtJ3lsha+XtuXwlP/56JhxNmF2/hTI6Fz3pM/KB/eyHkXdWFnm/ProGGKM05cbIpeM9YMYESDOWBP5GAIn+cg5Wat+9oqGjnlxSgwoOer6BiZwpoo8eAPATi7mofx/d7MwnpmpYJDsLq2+8eiCZ9bHsrBdH6ply4pjfNnMrFAcBVzIJpXw7ur7AloB0e3A==
ARC-Authentication-Results: i=1; mx.microsoft.com 1; spf=pass smtp.mailfrom=cablelabs.com; dmarc=pass action=none header.from=cablelabs.com; dkim=pass header.d=cablelabs.com; arc=none
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=cablelabs.com; s=selector2; h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-SenderADCheck; bh=y1wTJbxFhVnsWcxTBzUFr5M8HM+GnXJdqLfXqaVCv2s=; b=v9h+QDPR3W9J83TqXVDe9GyVd/YX8KkXRphCMX3qMrbCZAM6ROSJOuCXYjv8n3xmXFiRmFlx4edZ9lvRaHJiuXYELftL/42PO6dusvJ0K0UdR+hIMNK7+iwUTu9SvuJ7/EniqmSyjjEeKfs40Yep5v5BPST5IUIg0wMje4Uc54IrTmCFkujduseeTJLhS2zf8CmwZ8Pwb/l0PDdNUGtbgyIPVXdgW9JhrYgY3ha/KS2WuzwYZi0h/krTuaKPyR86SqI3bBbeNfuBC0Tlb9Lz4zVbZKVgwpuQE9qUx634BInIOM8OdmcTWw2H863hAFI31j/W6s7eMWXXrg5pDZJ6tA==
Received: from CY4PR0601MB3713.namprd06.prod.outlook.com (2603:10b6:910:92::10) by CY4PR0601MB3586.namprd06.prod.outlook.com (2603:10b6:910:8d::34) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id 15.20.3477.21; Mon, 19 Oct 2020 19:37:02 +0000
Received: from CY4PR0601MB3713.namprd06.prod.outlook.com ([fe80::e4c7:a5e:7c6c:ab4a]) by CY4PR0601MB3713.namprd06.prod.outlook.com ([fe80::e4c7:a5e:7c6c:ab4a%6]) with mapi id 15.20.3477.028; Mon, 19 Oct 2020 19:37:02 +0000
From: Greg White <g.white@CableLabs.com>
To: Sebastian Moeller <moeller0@gmx.de>
CC: "tsvwg@ietf.org" <tsvwg@ietf.org>
Thread-Topic: [tsvwg] FW: New Version Notification for draft-white-tsvwg-l4sops-00.txt
Thread-Index: AQHWZl+qAMxjEGBxPEeYUJIdRvF2j6kfkXqAgAHnjICAffTJAA==
Date: Mon, 19 Oct 2020 19:37:02 +0000
Message-ID: <A232B6C6-8AFD-44C9-9077-B8BE9EADCE98@cablelabs.com>
References: <159610640877.23292.15712739866659063100@ietfa.amsl.com> <EDC0072E-EE8F-4734-80AA-9C09867C4661@cablelabs.com> <B53646AB-D92F-4BF0-ABF9-991884A084DA@gmx.de>
In-Reply-To: <B53646AB-D92F-4BF0-ABF9-991884A084DA@gmx.de>
Accept-Language: en-US
Content-Language: en-US
X-MS-Has-Attach:
X-MS-TNEF-Correlator:
user-agent: Microsoft-MacOutlook/16.42.20100402
authentication-results: gmx.de; dkim=none (message not signed) header.d=none;gmx.de; dmarc=none action=none header.from=CableLabs.com;
x-originating-ip: [98.245.82.7]
x-ms-publictraffictype: Email
x-ms-office365-filtering-correlation-id: f5db534e-4ebf-400f-073e-08d874665a47
x-ms-traffictypediagnostic: CY4PR0601MB3586:
x-microsoft-antispam-prvs: <CY4PR0601MB3586BFD1E3FEFFF38E0F3F33EE1E0@CY4PR0601MB3586.namprd06.prod.outlook.com>
x-ms-oob-tlc-oobclassifiers: OLM:10000;
x-ms-exchange-senderadcheck: 1
x-microsoft-antispam: BCL:0;
x-microsoft-antispam-message-info: gymrscmULm2S0VJn8KS2GlUoi/+9WVj1cdm3rv5cCQGp5/bt1APcZx9pcJyRCm2x1lyYky9r6D1GMFLX/ZPqRw1nJS+LrVPt4Q7hBlN7bcZla+NoW2Lu4QKcYIxO/PW4ydAlmdV7jxp5iTRL4L/lp4mpMiZRBvRfNUlK94WICiNdqTQbJtfBnGUrXmmbXuuxmuWvfQPVx2BebtBGqtabNz0yMnM9XVSg0cjMCImedHUvFnTYf30rywRD5nt66tq19u2Wlxh7oVxnWWhy35EAP48cJ/YrPhihpMG+hwY/xkjq8cobWP+9izr51U6Dp8uVlen2DgdBMIuSps/N/F2JHcUfjtIXN+9+1aZwx9f7LjIcoxka1HJp71yaF7qlyq0L5MTizXJ7thKnCSLvy44yJbY4E2cDn6wWZfF4RKc7LWbvQe3oeAt2rfQaYR0Y3dxMGAFavN3gGUaDH3IWtoLP4w==
x-forefront-antispam-report: CIP:255.255.255.255; CTRY:; LANG:en; SCL:1; SRV:; IPV:NLI; SFV:NSPM; H:CY4PR0601MB3713.namprd06.prod.outlook.com; PTR:; CAT:NONE; SFS:(396003)(366004)(136003)(39840400004)(376002)(346002)(66946007)(86362001)(66446008)(76116006)(5660300002)(33656002)(6512007)(8936002)(186003)(26005)(6916009)(66476007)(66556008)(64756008)(316002)(36756003)(6486002)(53546011)(6506007)(8676002)(15650500001)(71200400001)(4326008)(2906002)(966005)(66574015)(83380400001)(478600001)(2616005)(85282002); DIR:OUT; SFP:1102;
x-ms-exchange-antispam-messagedata: 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
x-ms-exchange-transport-forked: True
Content-Type: multipart/alternative; boundary="_000_A232B6C68AFD44C99077B8BE9EADCE98cablelabscom_"
MIME-Version: 1.0
X-OriginatorOrg: cablelabs.com
X-MS-Exchange-CrossTenant-AuthAs: Internal
X-MS-Exchange-CrossTenant-AuthSource: CY4PR0601MB3713.namprd06.prod.outlook.com
X-MS-Exchange-CrossTenant-Network-Message-Id: f5db534e-4ebf-400f-073e-08d874665a47
X-MS-Exchange-CrossTenant-originalarrivaltime: 19 Oct 2020 19:37:02.1686 (UTC)
X-MS-Exchange-CrossTenant-fromentityheader: Hosted
X-MS-Exchange-CrossTenant-id: ce4fbcd1-1d81-4af0-ad0b-2998c441e160
X-MS-Exchange-CrossTenant-mailboxtype: HOSTED
X-MS-Exchange-CrossTenant-userprincipalname: fnCINDAyJ05kUXScvHvnLlf8GD3WJyTsjMEh6ySBJL9QBAfJZn7RJxGx8cbtNky/yLideFLgNumJ7QHM58JlYw==
X-MS-Exchange-Transport-CrossTenantHeadersStamped: CY4PR0601MB3586
Archived-At: <https://mailarchive.ietf.org/arch/msg/tsvwg/A3YORiVQizrikWXD2R_BOIsxJQQ>
Subject: Re: [tsvwg] FW: New Version Notification for draft-white-tsvwg-l4sops-00.txt
X-BeenThere: tsvwg@ietf.org
X-Mailman-Version: 2.1.29
Precedence: list
List-Id: Transport Area Working Group <tsvwg.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/tsvwg>, <mailto:tsvwg-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/tsvwg/>
List-Post: <mailto:tsvwg@ietf.org>
List-Help: <mailto:tsvwg-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/tsvwg>, <mailto:tsvwg-request@ietf.org?subject=subscribe>
X-List-Received-Date: Mon, 19 Oct 2020 19:37:07 -0000

Responses below.

From: Sebastian Moeller <moeller0@gmx.de>
Date: Friday, July 31, 2020 at 4:11 AM
To: Greg White <g.white@CableLabs.com>
Cc: "tsvwg@ietf.org" <tsvwg@ietf.org>
Subject: Re: [tsvwg] FW: New Version Notification for draft-white-tsvwg-l4sops-00.txt


Hi Greg,



comments for section 3:



"3.  Operator of an L4S host



   Support for L4S involves both endpoints: ECT1 marking & L4S-

   compatible congestion control on the sender, and ECN feedback on the

   receiver.  Between these two entities, it is incumbent upon the

   sender to evaluate the potential for unfairness and make decisions

   whether or not to use L4S congestion control.  The receiver is not

   expected to perform any testing or monitoring for unfairness, and is

   also not expected to invoke any active response in the case that

   unfairness occurs."



[SM] Maybe worth noting that the receiver will need to play a role in that it is only information send back from the receiver to the sender that will allow the sender to make appropriate decisions. In other words the reciever is still passively involved, which is compatible with your text, but maybe make this explicit?



[GW]  I don’t object, but to me it already seems explicit in the first sentence, which includes “… and ECN feedback on the receiver”.   If you think more is needed, would you mind making a suggestion of what wording would make this clear?





"3.1.  CDN Servers



   Some hosts (such as CDN leaf nodes and servers internal to an ISP)

   are deployed in environments in which they serve content to a

   constrained set of networks or clients.  The operator of such hosts

   may be able to determine whether there is the possibility of RFC3168

   FIFO bottlenecks being present, and utilize this information to make

   decisions on selectively deploying L4S."





[SM] Mmmh, in reality the ISP needs full control over all the end-hosts in that set, otherwise we are back at the concern that an ISP might make unfortunate choices for the connected machines in its customers leaf networks, no?



[GW] If an ISP is known to have implemented single-queue RFC3168 ECN bottlenecks, a server deployed to serve that network probably should not attempt L4S until those bottlenecks are upgraded. In this case it is irrelevant whether end users have also implemented RFC3168 FIFOs.





   "o  Prior to deploying L4S on servers:



      *  Consult with network operators on presence of RFC3168 FIFO

         bottlenecks"



[SM] As above, these bottlenecks can be actually located at end-hosts, so it might be required to check with all operators of networks and end-hosts. That said, checking with the network operators should be done, independent of the fact that it will not give a full picture, since a positive answer from net ops will already have consequences.



[GW] Agreed.  I will add some text to provide some more detail here.





     " *  Perform downstream tests per access network



         +  Tests (TBD) to detect absence of RFC 3168"



[SM] That will require perpetual vigilance though, as it is simply hard to prove a negative, as an AQM might be instantiated not only on intermediary network hops but also on end-systems.





[GW] This bullet will need more text, that is for sure.  After a period of pre-launch testing, a CDN node could potentially move to using in-band detection mechanisms.  In the end, based on the guidance in this draft, each system operator will need to decide for themselves what level of assurance is appropriate to deploy L4S (or what level of evidence is appropriate to preclude deployment).  I’m also not sure I agree that perpetual vigilance would be needed, since once L4S becomes widely deployed, it may follow that the IETF would deprecate RFC3168.   Absent that, any new deployment of single-queue RFC3168 would likely be accompanied by some level of validation by the operator of that bottleneck that their newly enabled feature is providing a benefit and not the opposite.





         "+  Enable AccECN feedback, but enable/disable L4S per access

            network"



[SM] Sounds like decent way to try to asses whether L4S capable endpoints might exist in those networks. ASSUMING that all L4S transports will use AccECN, which I am just not certain of. I think we heard rumblings from Google employees that envision using DCTCP style ECN marking without using TCP-Prague and/or witout following all the principles declared required for using L4S style signaling.



[GW]  It is always possible that an end system or a middle box will implement something that doesn’t comply with RFCs.  I’m not sure there is a lot that can be done about that possibility (particularly in an RFC).



   "o  In-band RFC3168 detection and monitoring:



      *  Real-time response (fallback)



[SM] This is again having all the issues of being an imprecise heuristic... which is worth noting in some part of this document, no?



[GW] Yes, I agree.  I would appreciate contributions of text from those who have been working on those algorithms (including references to material that characterizes the imprecision).



      "*  Non-real-time response (disable for future connections)"



[SM] Mmmh, how realistic is it to assume that an operator will be willing to maintain that much state?



[GW] I definitely think this is realistic enough (at least in some contexts) to include in the guidance document.  Think about this in combination with some of the other approaches above. If a CDN node is deployed in a network in which all of the known single-queue bottlenecks are free of RFC3168, and pre-launch testing has not detected any unknown ones, then an in-band detection mechanism would not be expected to return very many hits.  In that case, it wouldn’t be too much state to build a black-list of end system IPs where a hit occurred.





"3.2.  Other hosts



   o  In-band RFC3168 detection (and possibly fallback)



   o  Per-dst path test:



      *  For a connection capable of L4S feedback



      *  If CE feedback, perform active test (TBD) for RFC3168 presence"



[SM] Remind me again, have we actually seen numbers for that active tests yet, especially regarding convergence time and false positive and false negative rates?



[GW] I don’t think I’ve seen any yet.



     " *  Could cache result per-dst"



[SM] This again will be quite a lot of state, no?



[GW] Not a lot of state per destination, and thus could fairly easily be used for subsequent connections assuming that the prevalence of RFC3168 is low.  I guess the question is how to manage this if it is found that the prevalence of RFC3168 is higher than it is currently believed to be.  For example, if RFC3168 is found to be prevalent in a certain subnet, mechanisms could be devised to generate a lower complexity rule for that subnet rather than per-dst entries in a cache.



   o  Query a TBD public whitelist of domains that are participating in

      L4S experiment"



[SM] +1; I very much hope that the initial experiment will be performed with an explicit allow list, that will also ALLOW end users to register/unregister explicitly.



[GW] While I included this suggestion in the initial draft, I don’t think an explicit allow list is realistic and would only serve to create an unnecessary roadblock to deployment.  Knowledge of a participating domain doesn’t imply lack of RFC3168 FIFOs on the path to that domain (or, as you’ve mentioned, in an end-user network).





Best Regards

  Sebastian







> On Jul 30, 2020, at 13:05, Greg White  wrote:

>

> TSVWG members-

>

> I've posted a rough draft of Operational Guidance for L4S deployment.  This is not much more than an outline at this point, and is almost certainly incomplete even at that, so please read it with that in mind.

>

> -Greg

>

>

> From: "internet-drafts@ietf.org"

> Date: Thursday, July 30, 2020 at 4:53 AM

> To: Greg White

> Subject: New Version Notification for draft-white-tsvwg-l4sops-00.txt

>

> A new version of I-D, draft-white-tsvwg-l4sops-00.txt

> has been successfully submitted by Greg White and posted to the

> IETF repository.

>

> Name:          draft-white-tsvwg-l4sops

> Revision:      00

> Title:         Operational Guidance for Deployment of L4S in the Internet

> Document date: 2020-07-30

> Group:         Individual Submission

> Pages:         7

> URL:            https://protection.greathorn.com/services/v2/lookupUrl/f7c346c8-8443-44e5-b71e-435217709fda/327/00c0c12b60d0de99234622c38cfe321b95178998?domain=www.ietf.org&path=/internet-drafts/draft-white-tsvwg-l4sops-00.txt

> Status:         https://protection.greathorn.com/services/v2/lookupUrl/e5e7af28-9419-4d0e-a559-650861096bf9/327/00c0c12b60d0de99234622c38cfe321b95178998?domain=datatracker.ietf.org&path=/doc/draft-white-tsvwg-l4sops/

> Htmlized:       https://protection.greathorn.com/services/v2/lookupUrl/3b91a498-7692-49a5-aeb2-601ef0ba245a/327/00c0c12b60d0de99234622c38cfe321b95178998?domain=tools.ietf.org&path=/html/draft-white-tsvwg-l4sops-00

> Htmlized:       https://protection.greathorn.com/services/v2/lookupUrl/813cf103-4e26-44a1-8c2f-a2648d5dacc0/327/00c0c12b60d0de99234622c38cfe321b95178998?domain=datatracker.ietf.org&path=/doc/html/draft-white-tsvwg-l4sops

>

>

> Abstract:

>   This is an early, work-in-progress draft - a start at getting some of

>   the ideas from the mailing list and email exchanges on paper.

>

>   This draft is intended to provide guidance to operators of end-

>   systems, operators of networks, and researchers in order to ensure

>   reasonable fairness between L4S and Classic flows sharing a single-

>   queue RFC3168 bottleneck link.  This draft identifies opportunites to

>   prevent and/or detect and resolve fairness problems in such networks.

>

>

>

>

> Please note that it may take a couple of minutes from the time of submission

> until the htmlized version and diff are available at tools.ietf.org.

>

> The IETF Secretariat

>

>

>