Re: [tsvwg] ECT(1) Flag Day Plausibility

"Holland, Jake" <jholland@akamai.com> Mon, 10 May 2021 01:02 UTC

Return-Path: <jholland@akamai.com>
X-Original-To: tsvwg@ietfa.amsl.com
Delivered-To: tsvwg@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 04CCA3A280E for <tsvwg@ietfa.amsl.com>; Sun, 9 May 2021 18:02:46 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -0.897
X-Spam-Level:
X-Spam-Status: No, score=-0.897 tagged_above=-999 required=5 tests=[DKIMWL_WL_HIGH=-0.698, DKIM_SIGNED=0.1, DKIM_VALID=-0.1, DKIM_VALID_AU=-0.1, DKIM_VALID_EF=-0.1, SPF_HELO_NONE=0.001, SPF_PASS=-0.001, URIBL_BLOCKED=0.001] autolearn=ham autolearn_force=no
Authentication-Results: ietfa.amsl.com (amavisd-new); dkim=pass (2048-bit key) header.d=akamai.com
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id FvEyVAkmvHra for <tsvwg@ietfa.amsl.com>; Sun, 9 May 2021 18:02:41 -0700 (PDT)
Received: from mx0b-00190b01.pphosted.com (mx0b-00190b01.pphosted.com [IPv6:2620:100:9005:57f::1]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id 634063A280B for <tsvwg@ietf.org>; Sun, 9 May 2021 18:02:41 -0700 (PDT)
Received: from pps.filterd (m0122330.ppops.net [127.0.0.1]) by mx0b-00190b01.pphosted.com (8.16.0.43/8.16.0.43) with SMTP id 14A0xHG7024683; Mon, 10 May 2021 02:02:35 +0100
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=akamai.com; h=from : to : cc : subject : date : message-id : references : in-reply-to : content-type : content-id : content-transfer-encoding : mime-version; s=jan2016.eng; bh=Q7SJai+BRriTLguOGAsLfYewgTxZRo/r/bsfVHSEPbc=; b=LCV5Xwq3Glrh2kvVonMOJLtuMW1bCaepbiE9bfylCsSfWGsppcsPs1kxTzeCB6qDJo7q QzNXBsvhzzdaKtDK9v4E3zFT5iZmvTaMks64swgKi/9wd499GdjNWI1pGzh1mmeDGz7s 9dgDSGgNx6BC/rdlJtE9gWuqzqE8midKFlN0jyQeaBG88g0zXI+cwZMwRFPN88YZj3k6 oBkBjnoCS3TowfAPAeIDkWfza+WD8at4LXr2orQIn2iO1OCjI2rM3qqmiSwBkgt/02m+ Pky9xxzJkvTdrRE8lCkrh5EExQE4yf6BekW4cA3fY+amBSmRsCmACfXxctOUkNT1wL2T IQ==
Received: from prod-mail-ppoint7 (a72-247-45-33.deploy.static.akamaitechnologies.com [72.247.45.33] (may be forged)) by mx0b-00190b01.pphosted.com with ESMTP id 38eqwjh905-1 (version=TLSv1.2 cipher=ECDHE-RSA-AES256-GCM-SHA384 bits=256 verify=NOT); Mon, 10 May 2021 02:02:35 +0100
Received: from pps.filterd (prod-mail-ppoint7.akamai.com [127.0.0.1]) by prod-mail-ppoint7.akamai.com (8.16.1.2/8.16.1.2) with SMTP id 14A0Z5K1003604; Sun, 9 May 2021 21:02:34 -0400
Received: from email.msg.corp.akamai.com ([172.27.165.115]) by prod-mail-ppoint7.akamai.com with ESMTP id 38dnyy9864-1 (version=TLSv1.2 cipher=ECDHE-RSA-AES256-SHA384 bits=256 verify=NOT); Sun, 09 May 2021 21:02:34 -0400
Received: from USTX2EX-DAG1MB4.msg.corp.akamai.com (172.27.165.122) by ustx2ex-dag1mb1.msg.corp.akamai.com (172.27.165.119) with Microsoft SMTP Server (TLS) id 15.0.1497.2; Sun, 9 May 2021 20:02:34 -0500
Received: from USTX2EX-DAG1MB4.msg.corp.akamai.com ([172.27.165.122]) by ustx2ex-dag1mb4.msg.corp.akamai.com ([172.27.165.122]) with mapi id 15.00.1497.012; Sun, 9 May 2021 20:02:34 -0500
From: "Holland, Jake" <jholland@akamai.com>
To: "C. M. Heard" <heard@pobox.com>
CC: Jonathan Morton <chromatix99@gmail.com>, Ingemar Johansson S <ingemar.s.johansson@ericsson.com>, TSVWG <tsvwg@ietf.org>
Thread-Topic: [tsvwg] ECT(1) Flag Day Plausibility
Thread-Index: AQHXRINbQXqIJhM9Gk6mb/oPRBc6karcIDkA//+liAA=
Date: Mon, 10 May 2021 01:02:33 +0000
Message-ID: <A67A03BE-E554-47BA-815C-84DE83893405@akamai.com>
References: <1284557F-E91A-4997-A148-63179F6208A3@akamai.com> <CACL_3VH6cU+-x55XW+V3ds4z=RXcjZ5wOHkEPzUCA2QN8hRhsw@mail.gmail.com>
In-Reply-To: <CACL_3VH6cU+-x55XW+V3ds4z=RXcjZ5wOHkEPzUCA2QN8hRhsw@mail.gmail.com>
Accept-Language: en-US
Content-Language: en-US
X-MS-Has-Attach:
X-MS-TNEF-Correlator:
user-agent: Microsoft-MacOutlook/16.48.21041102
x-ms-exchange-messagesentrepresentingtype: 1
x-ms-exchange-transport-fromentityheader: Hosted
x-originating-ip: [172.27.164.43]
Content-Type: text/plain; charset="utf-8"
Content-ID: <E7274756F5A0594785EB0F3D1B0CACD1@akamai.com>
Content-Transfer-Encoding: base64
MIME-Version: 1.0
X-Proofpoint-Virus-Version: vendor=fsecure engine=2.50.10434:6.0.391, 18.0.761 definitions=2021-05-09_14:2021-05-06, 2021-05-09 signatures=0
X-Proofpoint-Spam-Details: rule=notspam policy=default score=0 adultscore=0 phishscore=0 bulkscore=0 spamscore=0 mlxlogscore=999 mlxscore=0 suspectscore=0 malwarescore=0 classifier=spam adjust=0 reason=mlx scancount=1 engine=8.12.0-2104190000 definitions=main-2105100001
X-Proofpoint-ORIG-GUID: tskEsUqdiUwxSVlyhCRfnsNLY9EnI_eU
X-Proofpoint-GUID: tskEsUqdiUwxSVlyhCRfnsNLY9EnI_eU
X-Proofpoint-Virus-Version: vendor=fsecure engine=2.50.10434:6.0.391, 18.0.761 definitions=2021-05-09_14:2021-05-06, 2021-05-09 signatures=0
X-Proofpoint-Spam-Details: rule=notspam policy=default score=0 priorityscore=1501 spamscore=0 adultscore=0 clxscore=1011 impostorscore=0 lowpriorityscore=0 malwarescore=0 bulkscore=0 suspectscore=0 phishscore=0 mlxlogscore=999 mlxscore=0 classifier=spam adjust=0 reason=mlx scancount=1 engine=8.12.0-2104190000 definitions=main-2105100003
X-Agari-Authentication-Results: mx.akamai.com; spf=${SPFResult} (sender IP is 72.247.45.33) smtp.mailfrom=jholland@akamai.com smtp.helo=prod-mail-ppoint7
Archived-At: <https://mailarchive.ietf.org/arch/msg/tsvwg/E710J3VlQ1w1HmfAYuB_i0SBxp0>
Subject: Re: [tsvwg] ECT(1) Flag Day Plausibility
X-BeenThere: tsvwg@ietf.org
X-Mailman-Version: 2.1.29
Precedence: list
List-Id: Transport Area Working Group <tsvwg.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/tsvwg>, <mailto:tsvwg-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/tsvwg/>
List-Post: <mailto:tsvwg@ietf.org>
List-Help: <mailto:tsvwg-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/tsvwg>, <mailto:tsvwg-request@ietf.org?subject=subscribe>
X-List-Received-Date: Mon, 10 May 2021 01:02:46 -0000

Hi Mike,

From: "C. M. Heard" <heard@pobox.com>
> Date: Sun,2021-05-09 at 4:27 PM
...
> Why not instead try to clean up tunnel behavior so that the transitions ECT(1) -> ECT(0) and ECT(0) -> ECT(1)  within the network make it through tunnels? If we go for a flag day, wouldn't this be more profitable?
...
> On Fri, Mar 26, 2021 at 10:15 AM Martin Duke wrote:
>>Bob has identified all of the problems with using DSCP for L4S. Among them is running L4S through a tunnel.
>>
>> Another axis of discussion was changing the L4S signal to be ECT(1)->ECT(0) and preserving the CE signal (thread: [1]), which comprehensively solves the coexistence issues. But this fell down, partially because of the (needless) RFC6040 tunnel decap behavior, which will revert any outer-header changes. There are some other problems, of course, they don't affect bystanders and I don't see them as likely to be fatal.


That also would be a reasonable approach to me.  I was including
this idea under "SCE-like", in that the change of codepoint in a
packet stream is interpreted as a high-fidelity congestion signal
as output from the network.

But I think Bob and others had some reasonable objections that
not only is the classifier unreliable under that proposal, but
also the unreliability increases with higher adoption, and we
can expect some related performance problems down this path that
would be avoided with the current l4s-id approach, assuming a
way can be found to roll it out safely.

I think we've seen a fair amount of discussion on SCE in general,
and I was assuming we can expect a sort of "reversed SCE" to have
roughly similar characteristics (with some unproven possibility
that there are some further improvements possible).

But we haven't seen much explicit discussion on sticking with
the current l4s-id while making the world ready to handle it
safely as a harm-avoidance strategy.

The threads referenced at the top of the prior message (and
maybe a few others earlier?) had a few people who seemed to be
saying something about the concept, but had some conflicting
views.  People seemed to be taking the position that it was
either trivial or essentially impossible and I don't think
either is true.

I think it would require a challenging but doable flag day.  I
think it would result in a slightly improved performance in the
end, relative to using ECT(1)->ECT(0) as a congestion signal.

And although 2 years ago I would have rated it almost certainly
more trouble than it's worth, the lack of motion on this
discussion (and even more so on the implementations) has me
reconsidering that position.

I hope that helps to clarify the intent behind the proposal.

Best regards,
Jake

(To the tunnel point: I agree 6040 would also need fixing with a
standards document that changes behaviors if we did something SCE-
like, but if I understand correctly enough (not assured! grain
of salt here) it could be done safely in parallel without blocking
on a flag day, and traffic over tunnels mostly just wouldn't get the
latency benefits until they get the upgrade, since they'd be stuck
with basically classic behavior.  Not sure that captures all the
nuances, but I thought I'd try to dodge that rathole in this thread
and leave it as a side issue.  For the sake of staying focused on
a flag day safety discussion, I was aiming to keep the effects here
summarized as "worse performance", some of which comes from the
tunnels having a long tail upgrade cycle that keeps their traffic's
behavior classic, and some of which comes from other effects.)