Re: [tsvwg] L4S DSCP (was: L4S drafts: Next Steps)

Bob Briscoe <in@bobbriscoe.net> Tue, 30 March 2021 08:21 UTC

Return-Path: <in@bobbriscoe.net>
X-Original-To: tsvwg@ietfa.amsl.com
Delivered-To: tsvwg@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id A8CDE3A2B0F for <tsvwg@ietfa.amsl.com>; Tue, 30 Mar 2021 01:21:25 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -1.434
X-Spam-Level:
X-Spam-Status: No, score=-1.434 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, DKIM_SIGNED=0.1, DKIM_VALID=-0.1, DKIM_VALID_AU=-0.1, DKIM_VALID_EF=-0.1, NICE_REPLY_A=-0.001, SPF_HELO_NONE=0.001, SPF_SOFTFAIL=0.665, URIBL_BLOCKED=0.001] autolearn=no autolearn_force=no
Authentication-Results: ietfa.amsl.com (amavisd-new); dkim=pass (2048-bit key) header.d=bobbriscoe.net
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id sBdQ5GB6rLkd for <tsvwg@ietfa.amsl.com>; Tue, 30 Mar 2021 01:21:20 -0700 (PDT)
Received: from mail-ssdrsserver2.hosting.co.uk (mail-ssdrsserver2.hosting.co.uk [185.185.85.90]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id BA7923A2B0E for <tsvwg@ietf.org>; Tue, 30 Mar 2021 01:21:20 -0700 (PDT)
DKIM-Signature: v=1; a=rsa-sha256; q=dns/txt; c=relaxed/relaxed; d=bobbriscoe.net; s=default; h=Content-Transfer-Encoding:Content-Type: In-Reply-To:MIME-Version:Date:Message-ID:From:References:Cc:To:Subject:Sender :Reply-To:Content-ID:Content-Description:Resent-Date:Resent-From: Resent-Sender:Resent-To:Resent-Cc:Resent-Message-ID:List-Id:List-Help: List-Unsubscribe:List-Subscribe:List-Post:List-Owner:List-Archive; bh=Ins4RVOckseubpnVp91QhCf5nmoc9vhWvTiLWXZDYig=; b=chtt3J1aFycSWgMBDCHHGx+kAu /0rRlQL6VizCjtfU9/mj1sqV+a9KmBswo6MmejoFjaZkeKqLChkelopLmCi/0Mqo6J3buRH29aVeI 3wbi3CJcPgbTo6BQZWBp5x0ip1MqVGqCxHZRKQQbMZ4o5DDWRAUVRtJMHC0T/nrGrpvPqH6JaXRol NsreXzhoPzDmKbIpCVQ9wwKxpxueb22UvsYbZik/2iVrveQethZww3rBvbIbDaCSicRgsxcXXu2XT KjYJocvlCCeqa7XbckoN7iRvTgAu57BfSa6bwWj6muKFjGf7ZdrwFU8p16ZkhwU6xfh05CNLfV8jB oRABY8mw==;
Received: from 67.153.238.178.in-addr.arpa ([178.238.153.67]:60924 helo=[192.168.1.11]) by ssdrsserver2.hosting.co.uk with esmtpsa (TLS1.2) tls TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256 (Exim 4.94) (envelope-from <in@bobbriscoe.net>) id 1lR9cg-0001jj-22; Tue, 30 Mar 2021 09:21:14 +0100
To: Sebastian Moeller <moeller0@gmx.de>
Cc: "tsvwg@ietf.org" <tsvwg@ietf.org>
References: <MN2PR19MB404527384A1B1DD9CFC2A3D983659@MN2PR19MB4045.namprd19.prod.outlook.com> <6f0ac4bf-bd1a-65cd-1d40-a97d4aa71aab@bobbriscoe.net> <7B4426F9-E1C5-4F88-A264-0D54C809D523@gmail.com> <AM8PR07MB74761AFC8F5BE0F9573DFF32B9629@AM8PR07MB7476.eurprd07.prod.outlook.com> <6481E606-2458-49D7-B580-8DF7B93494FD@gmx.de> <AM8PR07MB747675E421F0B7A6246C67BEB9619@AM8PR07MB7476.eurprd07.prod.outlook.com> <9A9D4AC3-43F0-4778-839B-E1E247A3C5FA@gmx.de> <AM8PR07MB7476026EA3AA7AD49622B296B9619@AM8PR07MB7476.eurprd07.prod.outlook.com> <7C0C3D20-250E-471F-89EC-9FF828B0BA10@gmx.de> <AM8PR07MB747613F8333DE25A81C68692B9619@AM8PR07MB7476.eurprd07.prod.outlook.com> <F5B88AF1-B3B4-4A77-8AD8-D7B5943B40F2@gmx.de> <CACL_3VGqnkv_GXvD2O8hWKy1U4jYYegO+gpbRJY0b5Wj3xW=iA@mail.gmail.com> <80f5696a-e423-cf31-6aed-dba9c52c8000@bobbriscoe.net> <4C122B37-CC29-4B38-A175-450863F69D0E@gmx.de>
From: Bob Briscoe <in@bobbriscoe.net>
Message-ID: <352bf0e9-aa72-127f-a3ff-8c4d3eea821d@bobbriscoe.net>
Date: Tue, 30 Mar 2021 09:21:12 +0100
User-Agent: Mozilla/5.0 (X11; Linux x86_64; rv:78.0) Gecko/20100101 Thunderbird/78.7.1
MIME-Version: 1.0
In-Reply-To: <4C122B37-CC29-4B38-A175-450863F69D0E@gmx.de>
Content-Type: text/plain; charset="utf-8"; format="flowed"
Content-Transfer-Encoding: 8bit
Content-Language: en-GB
X-AntiAbuse: This header was added to track abuse, please include it with any abuse report
X-AntiAbuse: Primary Hostname - ssdrsserver2.hosting.co.uk
X-AntiAbuse: Original Domain - ietf.org
X-AntiAbuse: Originator/Caller UID/GID - [47 12] / [47 12]
X-AntiAbuse: Sender Address Domain - bobbriscoe.net
X-Get-Message-Sender-Via: ssdrsserver2.hosting.co.uk: authenticated_id: in@bobbriscoe.net
X-Authenticated-Sender: ssdrsserver2.hosting.co.uk: in@bobbriscoe.net
X-Source:
X-Source-Args:
X-Source-Dir:
Archived-At: <https://mailarchive.ietf.org/arch/msg/tsvwg/CKNw8WA6jSMYGiphh-Tg5sVvBOA>
Subject: Re: [tsvwg] L4S DSCP (was: L4S drafts: Next Steps)
X-BeenThere: tsvwg@ietf.org
X-Mailman-Version: 2.1.29
Precedence: list
List-Id: Transport Area Working Group <tsvwg.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/tsvwg>, <mailto:tsvwg-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/tsvwg/>
List-Post: <mailto:tsvwg@ietf.org>
List-Help: <mailto:tsvwg-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/tsvwg>, <mailto:tsvwg-request@ietf.org?subject=subscribe>
X-List-Received-Date: Tue, 30 Mar 2021 08:21:26 -0000

Sebastian,

If you are not adding to a thread, please consider remaining silent.
I've corrected all your misunderstandings inline (I ignored the one that 
is just a restatement of an opinion), tagged [BB].


On 29/03/2021 13:58, Sebastian Moeller wrote:
> Hi Bob,
>
>
>> On Mar 29, 2021, at 02:35, Bob Briscoe <in@bobbriscoe.net> wrote:
>>
>> Mike,
>>
>> Many of the arguments for why a DSCP is not useful e2e also apply when it is used as a guard DSCP in a single network. For instance, when an IP header with a DSCP is tunnelled in pipe mode, it is not propagated to the outer. So it won't be visible, won't be bleached, etc.
> 	[SM] Excellent point, sothe  L4S-ops draft should probably a recommendation to also propagate DSCPs in and out while tunneling, if tunneling is something the diffserv domain wants to support for L4S, otherwise the recommendation might simply be to bleach on tunnel ingress (which is a also a naturally safe default, if the tunnel might terminate in another potentially unknown diffserve domain).

[BB] L4S does not involve a DSCP, so there is no need to discuss DSCPs 
in l4sops.


>
>> There's far too much vagueness in this thread.
> 	[SM] Not that much more than in the L4S drafts, where problems magically seem to dissolved when they are punted to the protocols that night want to use L4S signaling, really.
>
>> In the email I just sent to Jonathan, I asked him to address each of the critiques of a DSCP in Appx B.4, not just dismiss them all as invalid, which is untenable.
>> Certainly, some of the critiques are not relevant to the way the DSCP is used in Jonathan's scheme, but many are like the tunnel issue above.
> 	[SM] Odd that tunneling always moves into the spot-light if it helps your argument, but gets more or less ignored when it causes unsolved challenges for L4S, like a tunnel with mixed traffic running over one of the relative common (common as far as AQMs go) FQ rfc3168 compliant AQM. Is it really to much to ask for consistent application of the same yard stick to all proposals?

[BB] The tunnel issue with L4S in VPNs over FQ is addressed in l4sops.
https://datatracker.ietf.org/doc/html/draft-white-tsvwg-l4sops-02#section-3
A solution is mentioned that at least isolates L4S from Classic traffic 
within the same VPN. A later revision will give more details of this 
solution, which we have been working out off list.

The tunnel issue was central to the choice of the L4S identifier - you 
will find it mentioned all over the ecn-l4s-id draft.

>
>> So far, we've only just started on the basics like whether the feedback approach is even practical.
> 	[SM] Using DSCPs for feed-back is exactly what the "A Non-Queue-Building Per-Hop Behavior (NQB PHB) for Differentiated Services" ID is all about. I have heard very little comment from your side about its practicability issues (I probably have missed those though). Interesting to cite from that draft:
>
> "7.  Relationship to L4S
>     Traffic flows marked with the NQB DSCP as described in this draft are
>     intended to be compatible with [I-D.ietf-tsvwg-l4s-arch, with the
>     result being that NQB traffic and L4S traffic can share the low-
>     latency queue in an L4S dual-queue node
>     [I-D.ietf-tsvwg-aqm-dualq-coupled].  Compliance with the DualQ
>     coupled AQM requirements is considered sufficient to enable fair
>     allocation of bandwidth between the QB and NQB queues."
>
>
> and
>
>
> "4.1.  End-to-end usage and DSCP Re-marking
>     In contrast to the existing standard DSCPs, many of which are
>     typically only meaningful within a DiffServ Domain (e.g. an AS or an
>     enterprise network), this DSCP is expected to be used end-to-end
>     across the Internet.  Some network operators typically bleach (zero
>     out) the DiffServ field on ingress into their network
>     [Custura][Barik], and in some cases apply their own DSCP for internal
>     usage.  Networks that support the NQB PHB SHOULD preserve the NQB
>     DSCP when forwarding via an interconnect from or to another network.
>     Bleaching the NQB DSCP is not expected to cause harm to default
>     traffic, but it will severely limit the ability to provide NQB
>     treatment end-to-end."
>
>
> And from Greg White directly on the topic of SLAs (https://mailarchive.ietf.org/arch/msg/tsvwg/NrWh_sfCBRcASHirmScjeIAHlFA/)
>
> "When we discussed this concern before, it seemed to me that an SLA might be a good approach (at least in the near term).  So, perhaps we aren’t communicating well.  It is possible that a peering network is already using the value 42 (0b101010) - or for that matter any DSCP that IANA might assign for NQB - in a manner that is inconsistent with NQB, so default bleaching is probably the best near term situation.  For an ISP that wishes to support the NQB PHB, they can validate (and set up SLAs) that identify the NQB traffic from a peer, and treat it per the PHB, whichever DSCP is chosen.  Alternatively, if the ISP does not wish to support the NQB PHB at all, then they can choose to bleach it to Default, or pass it though with Default treatment, whichever they choose."
>
> This is pretty much what you seem to argue for as being impractical, no?

[BB] None of these 3 quotes about NQB are anything to do with DSCP 
feedback, nor reading the DSCP at the receiver.

Perhaps the ambiguity of the word end-to-end is the misunderstanding here.
* When the term end-to-end is used by transport layer people, it means 
from one end-system process to another (and even then it does not imply 
anything about feedback unless feedback is being talked about).
* But, when the word end-to-end is used by network layer people, it 
means that a DSCP survives (possibly remapped) as it traverses the path 
across networks /at the network layer/.

Also NQB is not L4S, which is the subject of this thread.


Bob

>
>
> Best Regards
> 	Sebastian
>
>   
>
>>
>> Bob
>>
>> On 27/03/2021 03:00, C. M. Heard wrote:
>>> On Fri, Mar 26, 2021Sebastian Moeller wrote:
>>> On Mar 26, 2021, at 18:34, De Schepper, Koen wrote:
>>>> My first point is that requiring to set a DiffServ codepoint alone would already support that.
>>>   [SM] Well, sure, but you came to the ECT(1) decision for a reason (a reason I do not agree with, but that is a different topic, I am trying to build you a bridge here how to run your experiments without taking the rest of the internet down), so I am not going to argue about that. My proposal adds an GUARD DSCP for the duration of the EXPERIMENT to allow your measurements in live production networks without negative side-effects for non-participants. This layer of safety can be removed if the experiment has run ist course and measurements in consenting networks has provided data that L4S is safe without the DSCP. At which point the DSCP could be dropped, try doing that if you only use a DSCP as L4S classifier.
>>>
>>> This point sure seems to have been lost in much of the discussion. Note again: GUARD DSCP for the duration of the EXPERIMENT. NOT DSCP instead of ECT(1).
>>>
>>> I've read several comments objecting that using DSCP to distinguish L4S traffic is undeployable end-to-end on the general Internet. Well, according to the intended status of the drafts, L4S is starting life as an EXPERIMENT, and as such is not expected (or at least should not be expected) to be deployed on the general Internet. If the WG's desire is to have L4S deployed on the general Internet as soon as the specs are approved, then the WG should take Steven Blake's advice and deprecrate/obsolete RFC 3168 and change the intended status of the drafts, or else use a mechanism that is backward compatible with RFC 3168, such Jake Holland's proposal to use ECT(1) -> ECT(0) as the L4S congestion signal, leaving the semantics of CE unchanged.
>>>
>>> Mike Heard
>> -- 
>> ________________________________________________________________
>> Bob Briscoe
>> http://bobbriscoe.net/

-- 
________________________________________________________________
Bob Briscoe                               http://bobbriscoe.net/