[tsvwg] L4S ops, RFC 3168 & RFC 8311 (was: Adoption call for draft-white-tsvwg-l4sops - to conclude 24th March 2021)

"Black, David" <David.Black@dell.com> Thu, 25 March 2021 15:32 UTC

Return-Path: <David.Black@dell.com>
X-Original-To: tsvwg@ietfa.amsl.com
Delivered-To: tsvwg@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 067D83A2588 for <tsvwg@ietfa.amsl.com>; Thu, 25 Mar 2021 08:32:25 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -2.35
X-Spam-Level:
X-Spam-Status: No, score=-2.35 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, DKIMWL_WL_HIGH=-0.251, DKIM_SIGNED=0.1, DKIM_VALID=-0.1, DKIM_VALID_AU=-0.1, DKIM_VALID_EF=-0.1, RCVD_IN_DNSWL_NONE=-0.0001, SPF_HELO_NONE=0.001, SPF_PASS=-0.001, URIBL_BLOCKED=0.001] autolearn=ham autolearn_force=no
Authentication-Results: ietfa.amsl.com (amavisd-new); dkim=pass (2048-bit key) header.d=dell.com
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id nGbOObzAqppQ for <tsvwg@ietfa.amsl.com>; Thu, 25 Mar 2021 08:32:20 -0700 (PDT)
Received: from mx0a-00154904.pphosted.com (mx0a-00154904.pphosted.com [148.163.133.20]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id 1D4043A2585 for <tsvwg@ietf.org>; Thu, 25 Mar 2021 08:32:19 -0700 (PDT)
Received: from pps.filterd (m0170392.ppops.net [127.0.0.1]) by mx0a-00154904.pphosted.com (8.16.0.43/8.16.0.43) with SMTP id 12PFDIQF012294; Thu, 25 Mar 2021 11:32:12 -0400
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=dell.com; h=from : to : cc : subject : date : message-id : content-type : content-transfer-encoding : mime-version; s=smtpout1; bh=dsn+NhhwlzGNpX+Eyf316F341R8UX2fbD9IgaCWO7fc=; b=WCeUnWwZJKpP75EUIxmGSBhPizM9oEGLznnDlMFnKtPvWU4icqFY9LYZd1R5Embi3GcC ZVqfK2qHuFODGk34SPjIotDlfa7ZpKGXr4U+rA7tmYMVTsTTA1u11fmlIzK80JYok4aW K6V0fYuTaVXe+jN3BDwTI4z1YSOLgGSUDPPP+2cDIcywCqFWxfVkmWX321HAysaVk33/ aIBNdKBQlsQAm2psx6h4Pc7B/o6aiIPZt+59ndIF7d0wRMPopnJY8Ffw/I3KbEXthzIi qKdKS9bwtUtHyQnDe5/CF7wRCies+St/PETpnPVpkLrUIIUjwJyB2A2DHRW7Wp+ObL0L zQ==
Received: from mx0b-00154901.pphosted.com (mx0b-00154901.pphosted.com [67.231.157.37]) by mx0a-00154904.pphosted.com with ESMTP id 37dc7cjrhh-1 (version=TLSv1.2 cipher=ECDHE-RSA-AES256-GCM-SHA384 bits=256 verify=NOT); Thu, 25 Mar 2021 11:32:12 -0400
Received: from pps.filterd (m0144104.ppops.net [127.0.0.1]) by mx0b-00154901.pphosted.com (8.16.0.43/8.16.0.43) with SMTP id 12PFAC3W127935; Thu, 25 Mar 2021 11:32:11 -0400
Received: from nam11-co1-obe.outbound.protection.outlook.com (mail-co1nam11lp2173.outbound.protection.outlook.com [104.47.56.173]) by mx0b-00154901.pphosted.com with ESMTP id 37dxdr4aja-1 (version=TLSv1.2 cipher=ECDHE-RSA-AES256-GCM-SHA384 bits=256 verify=OK); Thu, 25 Mar 2021 11:32:10 -0400
ARC-Seal: i=1; a=rsa-sha256; s=arcselector9901; d=microsoft.com; cv=none; b=lzyY+o01d+rSZnjqFsBMcfoTIDAx9rdz6hrRvnxVM6q/oko24mMjjICZJSm5N1iZ1U1msRfvaW1ENDZNnYlbi6yV8RaBfYYfZRE8MyASS6DuNG6w6j9wEwULc6eeQ7SEO1PkEnCvEaWsFYE7XvaFRgB31fM630+SgigNYeM8BlcG0yoN4yCmdh8e4Rb/19qNOw7OoYzd4LraUZjRbYFXz3zXKNnG0rD5ObtoFn46rRbMaEiERoya3Suy1wc77ZO+ycmoQUyo+kl/WfCgNVXNWBXzBJdD5OLvScKS5gIpg7bthFRZLvaF8Wm0nVh9KEz4bXADoQ6lOAoR0tNSpQBGnA==
ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=microsoft.com; s=arcselector9901; h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-SenderADCheck; bh=dsn+NhhwlzGNpX+Eyf316F341R8UX2fbD9IgaCWO7fc=; b=m+S9tvK7iy+06sbxQ236QltCA70mUS94pXPRAXGd1q9eLOf//xr9La/FPwIQeaLmpgQFCEjtG38Y3YeH0CiINtdrzrXNCos2cTYAfabRCE5NFHkZMx4kCBplWRxrR+WwDGFqyvRwRiQLyq2TWHayYdNhlzW9eB5poQ6dyGFAFSKMCNCn2+wfBSv9UgnVmuQA8wXJTwNICpOtNYryLNMWta0hXbarC5TZm+JRqRdigQ+wES/DcxIoE4cUIPvQOAYc1ftN1GWuDgTx1fEjdlNMMoRuyfuZXwV/2KoTv3Au9rSAJ92Qux/R3R8keX0/WI4J1SDRrDpK7sP+p1Qce0vHwg==
ARC-Authentication-Results: i=1; mx.microsoft.com 1; spf=pass smtp.mailfrom=dell.com; dmarc=pass action=none header.from=dell.com; dkim=pass header.d=dell.com; arc=none
Received: from MN2PR19MB4045.namprd19.prod.outlook.com (2603:10b6:208:1e4::9) by MN2PR19MB3438.namprd19.prod.outlook.com (2603:10b6:208:18d::29) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id 15.20.3955.18; Thu, 25 Mar 2021 15:32:07 +0000
Received: from MN2PR19MB4045.namprd19.prod.outlook.com ([fe80::b1f3:f51d:c01c:2feb]) by MN2PR19MB4045.namprd19.prod.outlook.com ([fe80::b1f3:f51d:c01c:2feb%6]) with mapi id 15.20.3977.024; Thu, 25 Mar 2021 15:32:07 +0000
From: "Black, David" <David.Black@dell.com>
To: Sebastian Moeller <moeller0@gmx.de>, Ingemar Johansson S <ingemar.s.johansson@ericsson.com>
CC: "tsvwg@ietf.org" <tsvwg@ietf.org>, "Black, David" <David.Black@dell.com>
Thread-Topic: L4S ops, RFC 3168 & RFC 8311 (was: Adoption call for draft-white-tsvwg-l4sops - to conclude 24th March 2021)
Thread-Index: AdchjAJzsKKEhKVyRxSUM0btp3Ms6w==
Date: Thu, 25 Mar 2021 15:32:07 +0000
Message-ID: <MN2PR19MB4045823D956AB45E5AA32EC783629@MN2PR19MB4045.namprd19.prod.outlook.com>
Accept-Language: en-US
Content-Language: en-US
X-MS-Has-Attach:
X-MS-TNEF-Correlator:
msip_labels: MSIP_Label_17cb76b2-10b8-4fe1-93d4-2202842406cd_Enabled=True; MSIP_Label_17cb76b2-10b8-4fe1-93d4-2202842406cd_SiteId=945c199a-83a2-4e80-9f8c-5a91be5752dd; MSIP_Label_17cb76b2-10b8-4fe1-93d4-2202842406cd_Owner=david.black@emc.com; MSIP_Label_17cb76b2-10b8-4fe1-93d4-2202842406cd_SetDate=2021-03-25T15:32:02.5499793Z; MSIP_Label_17cb76b2-10b8-4fe1-93d4-2202842406cd_Name=External Public; MSIP_Label_17cb76b2-10b8-4fe1-93d4-2202842406cd_Application=Microsoft Azure Information Protection; MSIP_Label_17cb76b2-10b8-4fe1-93d4-2202842406cd_ActionId=93970c14-893d-44fa-b8a0-f38579ad790c; MSIP_Label_17cb76b2-10b8-4fe1-93d4-2202842406cd_Extended_MSFT_Method=Manual
authentication-results: gmx.de; dkim=none (message not signed) header.d=none;gmx.de; dmarc=none action=none header.from=dell.com;
x-originating-ip: [72.74.71.221]
x-ms-publictraffictype: Email
x-ms-office365-filtering-correlation-id: 4b21e625-51b4-49df-4165-08d8efa3266b
x-ms-traffictypediagnostic: MN2PR19MB3438:
x-ms-exchange-transport-forked: True
x-microsoft-antispam-prvs: <MN2PR19MB343814C43F6BDE0D6A6EEAC283629@MN2PR19MB3438.namprd19.prod.outlook.com>
x-exotenant: 2khUwGVqB6N9v58KS13ncyUmMJd8q4
x-ms-oob-tlc-oobclassifiers: OLM:2000;
x-ms-exchange-senderadcheck: 1
x-microsoft-antispam: BCL:0;
x-microsoft-antispam-message-info: Sd5bJ6m4+Sp6RcFz8wKou9ZRnZDiA0UEPi71XiGDFWIxnjeJi0lRbvgdn4346IhVLZgrDFD7t3DfAwoEsNccSFIcVQ/UFVxFldhHpe1INno7QYSzqducDr31WWozi51geua8yADOktYD/mNGnM67I2DJLPyLU3YFvJzkdf3Wk703/0/VS7p3gs1jPsHoQmiWaXed5bwAYwyGSk0s3oWLEJ42XIIy2Jnbn9AkzTARGrf78ZMRCEeA+nxiPwBBUOpo1ndcz9h0LCg+4YpnpxWsfDV/c/8TlfE0XR/wnLKv+yfTVn/FSfRcDCBSTmW6RE26Yw7wlzZyh8g4GsdzNqinN1VAoD+zSVbjgdrg8u4+ond1D19NvbTWe5Hx9D78FOKbXx3eul2UqfjagmrwvkZQeCn32aAby+OmF/nMEGpiWMIWgJ/eTYpC/nPs09MzWPszRC7gBAfWMYozUqj99v7mM5FhzHLuwnP9aXVW5yC4SIucmNcRQgasmFbaKY5pc9nUYbOYurpEPtX/f4iaSiZC4Ne76+zFUoVu2TcJGQmqGW+BwOYabwEJ+w6n2H71y6hB6OA5FNMcD9zCFj6w43g46XYU1O/FKUqfW0Qu2UAEeMAA+2JvkXIh2gMhogcC5xIuhu5MM4LAICETuqEic4o7Jj+vigFzrfm7T/Z5GJKGI7rGAmgK5uglnRvYXHUOUCP6+a06RdZR6JdNrEbNe7tj91JSyODOgX+5bY7ctuzknN2e83C0AwnYzYZBNjlTxyTl
x-forefront-antispam-report: CIP:255.255.255.255; CTRY:; LANG:en; SCL:1; SRV:; IPV:NLI; SFV:NSPM; H:MN2PR19MB4045.namprd19.prod.outlook.com; PTR:; CAT:NONE; SFS:(4636009)(136003)(366004)(376002)(39860400002)(346002)(396003)(4326008)(55016002)(2906002)(186003)(76116006)(966005)(66446008)(66946007)(83380400001)(53546011)(6506007)(66556008)(30864003)(33656002)(66574015)(26005)(478600001)(64756008)(66476007)(8676002)(7696005)(8936002)(71200400001)(86362001)(786003)(5660300002)(316002)(9686003)(54906003)(110136005)(38100700001)(107886003)(52536014); DIR:OUT; SFP:1101;
x-ms-exchange-antispam-messagedata: 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
Content-Type: text/plain; charset="us-ascii"
Content-Transfer-Encoding: quoted-printable
MIME-Version: 1.0
X-OriginatorOrg: Dell.com
X-MS-Exchange-CrossTenant-AuthAs: Internal
X-MS-Exchange-CrossTenant-AuthSource: MN2PR19MB4045.namprd19.prod.outlook.com
X-MS-Exchange-CrossTenant-Network-Message-Id: 4b21e625-51b4-49df-4165-08d8efa3266b
X-MS-Exchange-CrossTenant-originalarrivaltime: 25 Mar 2021 15:32:07.5150 (UTC)
X-MS-Exchange-CrossTenant-fromentityheader: Hosted
X-MS-Exchange-CrossTenant-id: 945c199a-83a2-4e80-9f8c-5a91be5752dd
X-MS-Exchange-CrossTenant-mailboxtype: HOSTED
X-MS-Exchange-CrossTenant-userprincipalname: NR2MfNRanUkINXZKpNJh0t6IB/gswjB1UJ3AQSWWJlZsL07D2UcZN1lA4FTfLxcJ2rE/F50CIAuAi4QBYsoRdw==
X-MS-Exchange-Transport-CrossTenantHeadersStamped: MN2PR19MB3438
X-Proofpoint-Virus-Version: vendor=fsecure engine=2.50.10434:6.0.369, 18.0.761 definitions=2021-03-25_04:2021-03-24, 2021-03-25 signatures=0
X-Proofpoint-Spam-Details: rule=outbound_notspam policy=outbound score=0 mlxscore=0 adultscore=0 lowpriorityscore=0 spamscore=0 phishscore=0 bulkscore=0 impostorscore=0 clxscore=1011 priorityscore=1501 suspectscore=0 mlxlogscore=999 malwarescore=0 classifier=spam adjust=0 reason=mlx scancount=1 engine=8.12.0-2009150000 definitions=main-2103250111
X-Proofpoint-Spam-Details: rule=notspam policy=default score=0 mlxlogscore=999 mlxscore=0 spamscore=0 phishscore=0 bulkscore=0 suspectscore=0 malwarescore=0 adultscore=0 classifier=spam adjust=0 reason=mlx scancount=1 engine=8.12.0-2009150000 definitions=main-2103250111
Archived-At: <https://mailarchive.ietf.org/arch/msg/tsvwg/BM4PZdhYVL6tAuYf40BLjTq0zsg>
Subject: [tsvwg] L4S ops, RFC 3168 & RFC 8311 (was: Adoption call for draft-white-tsvwg-l4sops - to conclude 24th March 2021)
X-BeenThere: tsvwg@ietf.org
X-Mailman-Version: 2.1.29
Precedence: list
List-Id: Transport Area Working Group <tsvwg.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/tsvwg>, <mailto:tsvwg-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/tsvwg/>
List-Post: <mailto:tsvwg@ietf.org>
List-Help: <mailto:tsvwg-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/tsvwg>, <mailto:tsvwg-request@ietf.org?subject=subscribe>
X-List-Received-Date: Thu, 25 Mar 2021 15:32:25 -0000

> 	[SM] Fair enough, that is why I proposed to direct readers of rfc3168 to the L4S ops ID and leaving out the redirection via rfc8311.
> The point is, if we are going to encourage/permit end-points to behave in a way that violates the assumptions made by operators
> of rfc3168 AQMs the onus is on us to at least inform them about the fact, and what remedies we came up with.

Hmm - as an author of both RFCs, I'm having mixed reactions to this idea.

On the one hand, RFC 3168 is updated by RFC 8311, which is one of only 3 RFCs that updates RFC 3168, so I think it's reasonable to expect that an implementer of RFC 3168 will look at RFC 8311.

On the other hand, once an implementer looks at RFC 8311,  s/he will see that for L4S, RFC 8311 references only the ecn-l4s-id draft, to which adding a reference to the L4S ops draft may be a good idea.  We can do that and avoid the EXP updates PS problem by submitting errata (an erratum?) directly against RFC 8311 to add a reference to the l4s-ops draft, and perhaps also add some text to cite it.  I think that would work better than asking for a process exception (which the IESG can grant) to directly update RFC 8311 from the L4S ops draft, and has the additional advantage that errata can be applied to RFC 8311 before the L4S ops draft is published as an RFC.

Thanks, --David

-----Original Message-----
From: tsvwg <tsvwg-bounces@ietf.org> On Behalf Of Sebastian Moeller
Sent: Thursday, March 25, 2021 9:20 AM
To: Ingemar Johansson S
Cc: tsvwg@ietf.org
Subject: Re: [tsvwg] Adoption call for draft-white-tsvwg-l4sops - to conclude 24th March 2021


[EXTERNAL EMAIL] 

Hi Ingemar,


> On Mar 25, 2021, at 14:08, Ingemar Johansson S <ingemar.s.johansson@ericsson.com> wrote:
> 
> Hi
> 
> One reflection around all this is that it really does not matter how many
> warning signs you put, information may still not reach the intended
> audience. 

	[SM] While potentially true, not really an actionable position to take... We can expect that parties interested in participating n the L4S experiment actually read the relevant L4S RFCs, but if we require others to also change their behavior/configurations/expectations we should take active steps to reach these parties, even if we can not guarantee to reach them all. In short we need to make a good faith effort. At least that is what common sense tells me, is there any relevant RFC instructing us to do otherwise?


> I guess there must be an abundance of cases with other IETF work that does
> not reach the audience, sometimes with suboptimal performance as a result.

	[SM] We are actively contemplating of releasing protocols into the wide internet that run roughshod over rfc3168 and the expected sharing-between-flows properties of deployed AQM. Are you really advocating that we just do what pleases our whims right now, just because doing so is more convenient to us? I am puzzled, truly puzzled.


> And I don't find it too productive to dump a lot of informational text in
> RFC8311 around what can possibly go wrong, especially as it is not fully
> clear how serious these problems really are.

	[SM] Fair enough, that is why I proposed to direct readers of rfc3168 to the L4S ops ID and leaving out the redirection via rfc8311. The point is, if we are going to encourage/permit end-points to behave in a way that violates the assumptions made by operators of rfc3168 AQMs the onus is on us to at least inform them about the fact, and what remedies we came up with.


> Only way forward I see is to
> move on with the L4S experiment and document possible issues as they come.
> The L4S ops draft provide good initial input here and it will likely be
> complemented with more best current practice.

	[SM] Expect my, "I am running roughshod over L4S" ID any time soon, if all I need to do is to document issues... @chairs is this the official position of this WG and of the wider IETF, how to handle such conflicts of interest? I would be amazed if it would be...

Best Regards
	Sebastian

P.S.: I really tried to keep this focussed on how best to get the relevant information into the hands of potentially affected AQM operators; yet it turned again into a side-show about differences in opinion on how safe and sound engineering should be performed. 



> 
> /Ingemar
> 
>> -----Original Message-----
>> From: Sebastian Moeller <moeller0@gmx.de>
>> Sent: den 25 mars 2021 12:45
>> To: Ingemar Johansson S <ingemar.s.johansson@ericsson.com>
>> Cc: Bob Briscoe <ietf@bobbriscoe.net>; tsvwg@ietf.org
>> Subject: Re: [tsvwg] Adoption call for draft-white-tsvwg-l4sops - to
> conclude
>> 24th March 2021
>> 
>> Hi Ingemar,
>> 
>> thanks for responding.
>> 
>>> On Mar 25, 2021, at 12:35, Ingemar Johansson S
>> <ingemar.s.johansson@ericsson.com> wrote:
>>> 
>>> Sebastian..
>>> 
>>> Isn't the updated by RFC8311 sufficient in RFC3168 ?. It refers to L4S
>>> work, namely the L4S ID which targets experimental standards status.
>> 
>> 	[SM] IMHO not really, rfc8311 has no big warning signs, that those
>> experimental standards are allowed/expected to carry negative side-effects
>> for rfc3168-compliant AQMs and operators of rfc3168 AQM need to employ
>> specific steps to ensure safety/functionality of their AQM to accommodate
>> such experimental standards traffic.
>> 	I am not trying to start a discussion about whether doing that at
> all is
>> a good idea, but how to make sure that information reaches the parties
> that
>> would need to follow those instructions. IMHO the link to rfc8311 does not
>> convey enough urgency for rfc3168 deployers to go digging deeper, but I
>> might be just naive here, not being/working for an operator.
>> 
>>> Also, to me it sounds odd to add an
>>> Updated by : [L4S Ops - Informational RFC] to a proposed standard ? ,
>> 
>> 	[SM] Same sentiment, that why I asked. The information though
>> seems important. If rfc3168 deployers need to do something extra to
>> guarantee their safety and functionality, because of changes somewhere
>> else, I believe the party responsible for those changes (aka this WG)
> should
>> make sure that even casual reads of rfc3168 know about the additional
> steps
>> we expect them to take.
>> 
>> Best Regards
>> 	Sebastian
>> 
>> 
>>> In any case it is the first time in RFC3168's history that it happens,
>>> unless I missed something.
>>> 
>>> /Ingemar
>>> 
>>>> -----Original Message-----
>>>> From: tsvwg <tsvwg-bounces@ietf.org> On Behalf Of Sebastian Moeller
>>>> Sent: den 25 mars 2021 10:40
>>>> To: Bob Briscoe <ietf@bobbriscoe.net>
>>>> Cc: tsvwg@ietf.org
>>>> Subject: Re: [tsvwg] Adoption call for draft-white-tsvwg-l4sops - to
>>> conclude
>>>> 24th March 2021
>>>> 
>>>> Hi Bob,
>>>> 
>>>> 
>>>>> On Mar 25, 2021, at 10:26, Bob Briscoe <ietf@bobbriscoe.net> wrote:
>>>>> 
>>>>> Steven,
>>>>> 
>>>>> On 24/03/2021 23:12, Steven Blake wrote:
>>>>>> On Wed, 2021-03-24 at 22:50 +0000, Bob Briscoe wrote:
>>>>>>> Steven,
>>>>>>> 
>>>>>>> 
>>>>>>> On 23/03/2021 00:56, Steven Blake wrote:
>>>>>>>> Sec. 4 (Operator of a Network) of the draft presumes that
>>>>>>>> deployed equipment is capable to classifying packets specifically
> on
>> ECT(1).
>>>>>>>> Have the authors confirmed that this feature is available on
>>>>>>>> commonly deployed operator gear (e.g., IOS-XR, JUNOS)?
>>>>>>> [BB]
>>>>>>> (Aside: I think you're reading an old (-01) draft. That section
>>>>>>> has been Sec. 5. since draft-02 on 22 Feb 2021.
>>>>>>> See my response to the initial adoption call about the probable
>>>>>>> cause of this confusion - suspected problems with the IETF tools
>>>>>>> servers.
>>>>>>> )
>>>>>> Oops! You're right. s/Sec. 4/Sec. 5.
>>>>>> 
>>>>>> 
>>>>>>> To your point, I checked the manuals of one or two OSs of common
>>>>>>> makes of router before I proposed the WRED technique for addition
>>>>>>> to the draft. And I discussed the hardware capabilities with
>>>>>>> people within one or two router vendors. In the cases I checked,
>>>>>>> the CLI limits the flexibility that the admin has to define
>>>>>>> classifiers as general bit patterns. However the hardware
>>>>>>> underneath does have that flexibility.
>>>>>>> So
>>>>>>> this would require a CLI update for the routers I checked. The
>>>>>>> Linux classifier architecture does provide sufficient flexibility
>>>>>>> for such a classifier.
>>>>>>> 
>>>>>>> I also suggested the ECT(1) tunnel bypass technique, but I didn't
>>>>>>> exhaustively check the manuals of all the different types of
>>>>>>> tunnel (there are dozens).
>>>>>>> 
>>>>>>> I think this list of techniques is most useful for router
>>>>>>> developers, who can then find the easiest and most efficient one
>>>>>>> for their particular kit; whether they have to update the CLI, or
>>>>>>> whether they can find a way for their users to configure their
>>>>>>> unmodified systems in the field.
>>>>>> 
>>>>>> So operators that *don't wish to participate in L4S experiments*
>>>>>> may need to update *their* deployed software? Ask your favorite
>>>>>> router vendor how many customer-specific releases they are
>>>>>> maintaining because customers don't want to move forward once they
>>>>>> get a working validated release.
>>>>> 
>>>>> [BB] There is a common belief that, if any RFC3168 FIFO AQMs exist,
>>>>> they
>>>> will be rare. But Jake and Jonathan raised the concern that it still
>>>> needs
>>> to be
>>>> possible to deploy RFC3168 routers from now onwards. In that case,
>>>> operators that *don't wish to participate* would be updating their
>>>> config, and l4sops then gives router developers ideas for how they
>>>> might be able
>>> to
>>>> prevent an existing implementation of RFC3168 from acting on ECT(1),
>>>> given an ECN implementation is likely to be hard-coded against the
>>>> ECN codepoints.
>>>> 
>>>> 
>>>> 	[SM] This asks the question, how would an operator that is about to
>>>> enable an rfc3168 AQM know that he better read and follow the L4S-ops
>>>> ID/RFC? Are we expecting all operators to read and follow all RFCs
>>>> meticulously all the time?
>>>> 	IMHO an operator intending on employing an rfc3168 AQM might
>> read
>>>> RFC3168 and RFCs referenced from there (which is IMHO already less
>>>> likely), while an operator interested in L4S might read all of the
>>>> L4S
>>> IDs/RFCs.
>>>> But here we would need the rfc3168 deploying operators to read and
>>>> follow an L4S ID/RFC...
>>>> 	I guess adding an updated by to rfc3168 pointing to the L4S-ops RFC
>>>> might offer a solution, but can/should a informational RFC update a
>>>> PS document (honest question, I am just not sure about whether our
>>>> process permits that)?
>>>> 
>>>> Best Regards
>>>> 	Sebastian
>>>> 
>>>> P.S.: This is basically the same issue I have with the only mildly
>>>> related
>>> NQB
>>>> ID: in both contexts, we seem to expect parties genuinely not
>>>> interested
>>> in
>>>> the topic of the ID to act in a specific way to accommodate either
>>>> the NQB
>>> or
>>>> the L4S IDs/RFCs. And in both cases arguably bad things happen if
>>>> those parties do not follow the recommendations.
>>>> 
>>>> 
>>>>> 
>>>>> 
>>>>> 
>>>>> Bob
>>>>> 
>>>>>> 
>>>>>> 
>>>>>> Regards,
>>>>>> 
>>>>>> // Steve
>>>>>> 
>>>>>> 
>>>>>> 
>>>>>> 
>>>>> 
>>>>> --
>>>>> 
>>>> 
>> __________________________________________________________
>>>> ______
>>>>> Bob Briscoe
>>>> https://protect2.fireeye.com/v1/url?k=532c5e52-0cb76757-532c1ec9-
>>>> 86d2114eab2f-53274140f9ce9692&q=1&e=8a9723d1-2c84-4bf6-b7d7-
>>>> b62af3457d9a&u=http%3A%2F%2Fbobbriscoe.net%2F
>>> 
>