Re: [tsvwg] ECT(1) Flag Day Plausibility
"Holland, Jake" <jholland@akamai.com> Mon, 10 May 2021 01:02 UTC
Return-Path: <jholland@akamai.com>
X-Original-To: tsvwg@ietfa.amsl.com
Delivered-To: tsvwg@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 04CCA3A280E for <tsvwg@ietfa.amsl.com>; Sun, 9 May 2021 18:02:46 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -0.897
X-Spam-Level:
X-Spam-Status: No, score=-0.897 tagged_above=-999 required=5 tests=[DKIMWL_WL_HIGH=-0.698, DKIM_SIGNED=0.1, DKIM_VALID=-0.1, DKIM_VALID_AU=-0.1, DKIM_VALID_EF=-0.1, SPF_HELO_NONE=0.001, SPF_PASS=-0.001, URIBL_BLOCKED=0.001] autolearn=ham autolearn_force=no
Authentication-Results: ietfa.amsl.com (amavisd-new); dkim=pass (2048-bit key) header.d=akamai.com
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id FvEyVAkmvHra for <tsvwg@ietfa.amsl.com>; Sun, 9 May 2021 18:02:41 -0700 (PDT)
Received: from mx0b-00190b01.pphosted.com (mx0b-00190b01.pphosted.com [IPv6:2620:100:9005:57f::1]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id 634063A280B for <tsvwg@ietf.org>; Sun, 9 May 2021 18:02:41 -0700 (PDT)
Received: from pps.filterd (m0122330.ppops.net [127.0.0.1]) by mx0b-00190b01.pphosted.com (8.16.0.43/8.16.0.43) with SMTP id 14A0xHG7024683; Mon, 10 May 2021 02:02:35 +0100
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=akamai.com; h=from : to : cc : subject : date : message-id : references : in-reply-to : content-type : content-id : content-transfer-encoding : mime-version; s=jan2016.eng; bh=Q7SJai+BRriTLguOGAsLfYewgTxZRo/r/bsfVHSEPbc=; b=LCV5Xwq3Glrh2kvVonMOJLtuMW1bCaepbiE9bfylCsSfWGsppcsPs1kxTzeCB6qDJo7q QzNXBsvhzzdaKtDK9v4E3zFT5iZmvTaMks64swgKi/9wd499GdjNWI1pGzh1mmeDGz7s 9dgDSGgNx6BC/rdlJtE9gWuqzqE8midKFlN0jyQeaBG88g0zXI+cwZMwRFPN88YZj3k6 oBkBjnoCS3TowfAPAeIDkWfza+WD8at4LXr2orQIn2iO1OCjI2rM3qqmiSwBkgt/02m+ Pky9xxzJkvTdrRE8lCkrh5EExQE4yf6BekW4cA3fY+amBSmRsCmACfXxctOUkNT1wL2T IQ==
Received: from prod-mail-ppoint7 (a72-247-45-33.deploy.static.akamaitechnologies.com [72.247.45.33] (may be forged)) by mx0b-00190b01.pphosted.com with ESMTP id 38eqwjh905-1 (version=TLSv1.2 cipher=ECDHE-RSA-AES256-GCM-SHA384 bits=256 verify=NOT); Mon, 10 May 2021 02:02:35 +0100
Received: from pps.filterd (prod-mail-ppoint7.akamai.com [127.0.0.1]) by prod-mail-ppoint7.akamai.com (8.16.1.2/8.16.1.2) with SMTP id 14A0Z5K1003604; Sun, 9 May 2021 21:02:34 -0400
Received: from email.msg.corp.akamai.com ([172.27.165.115]) by prod-mail-ppoint7.akamai.com with ESMTP id 38dnyy9864-1 (version=TLSv1.2 cipher=ECDHE-RSA-AES256-SHA384 bits=256 verify=NOT); Sun, 09 May 2021 21:02:34 -0400
Received: from USTX2EX-DAG1MB4.msg.corp.akamai.com (172.27.165.122) by ustx2ex-dag1mb1.msg.corp.akamai.com (172.27.165.119) with Microsoft SMTP Server (TLS) id 15.0.1497.2; Sun, 9 May 2021 20:02:34 -0500
Received: from USTX2EX-DAG1MB4.msg.corp.akamai.com ([172.27.165.122]) by ustx2ex-dag1mb4.msg.corp.akamai.com ([172.27.165.122]) with mapi id 15.00.1497.012; Sun, 9 May 2021 20:02:34 -0500
From: "Holland, Jake" <jholland@akamai.com>
To: "C. M. Heard" <heard@pobox.com>
CC: Jonathan Morton <chromatix99@gmail.com>, Ingemar Johansson S <ingemar.s.johansson@ericsson.com>, TSVWG <tsvwg@ietf.org>
Thread-Topic: [tsvwg] ECT(1) Flag Day Plausibility
Thread-Index: AQHXRINbQXqIJhM9Gk6mb/oPRBc6karcIDkA//+liAA=
Date: Mon, 10 May 2021 01:02:33 +0000
Message-ID: <A67A03BE-E554-47BA-815C-84DE83893405@akamai.com>
References: <1284557F-E91A-4997-A148-63179F6208A3@akamai.com> <CACL_3VH6cU+-x55XW+V3ds4z=RXcjZ5wOHkEPzUCA2QN8hRhsw@mail.gmail.com>
In-Reply-To: <CACL_3VH6cU+-x55XW+V3ds4z=RXcjZ5wOHkEPzUCA2QN8hRhsw@mail.gmail.com>
Accept-Language: en-US
Content-Language: en-US
X-MS-Has-Attach:
X-MS-TNEF-Correlator:
user-agent: Microsoft-MacOutlook/16.48.21041102
x-ms-exchange-messagesentrepresentingtype: 1
x-ms-exchange-transport-fromentityheader: Hosted
x-originating-ip: [172.27.164.43]
Content-Type: text/plain; charset="utf-8"
Content-ID: <E7274756F5A0594785EB0F3D1B0CACD1@akamai.com>
Content-Transfer-Encoding: base64
MIME-Version: 1.0
X-Proofpoint-Virus-Version: vendor=fsecure engine=2.50.10434:6.0.391, 18.0.761 definitions=2021-05-09_14:2021-05-06, 2021-05-09 signatures=0
X-Proofpoint-Spam-Details: rule=notspam policy=default score=0 adultscore=0 phishscore=0 bulkscore=0 spamscore=0 mlxlogscore=999 mlxscore=0 suspectscore=0 malwarescore=0 classifier=spam adjust=0 reason=mlx scancount=1 engine=8.12.0-2104190000 definitions=main-2105100001
X-Proofpoint-ORIG-GUID: tskEsUqdiUwxSVlyhCRfnsNLY9EnI_eU
X-Proofpoint-GUID: tskEsUqdiUwxSVlyhCRfnsNLY9EnI_eU
X-Proofpoint-Virus-Version: vendor=fsecure engine=2.50.10434:6.0.391, 18.0.761 definitions=2021-05-09_14:2021-05-06, 2021-05-09 signatures=0
X-Proofpoint-Spam-Details: rule=notspam policy=default score=0 priorityscore=1501 spamscore=0 adultscore=0 clxscore=1011 impostorscore=0 lowpriorityscore=0 malwarescore=0 bulkscore=0 suspectscore=0 phishscore=0 mlxlogscore=999 mlxscore=0 classifier=spam adjust=0 reason=mlx scancount=1 engine=8.12.0-2104190000 definitions=main-2105100003
X-Agari-Authentication-Results: mx.akamai.com; spf=${SPFResult} (sender IP is 72.247.45.33) smtp.mailfrom=jholland@akamai.com smtp.helo=prod-mail-ppoint7
Archived-At: <https://mailarchive.ietf.org/arch/msg/tsvwg/E710J3VlQ1w1HmfAYuB_i0SBxp0>
Subject: Re: [tsvwg] ECT(1) Flag Day Plausibility
X-BeenThere: tsvwg@ietf.org
X-Mailman-Version: 2.1.29
Precedence: list
List-Id: Transport Area Working Group <tsvwg.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/tsvwg>, <mailto:tsvwg-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/tsvwg/>
List-Post: <mailto:tsvwg@ietf.org>
List-Help: <mailto:tsvwg-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/tsvwg>, <mailto:tsvwg-request@ietf.org?subject=subscribe>
X-List-Received-Date: Mon, 10 May 2021 01:02:46 -0000
Hi Mike, From: "C. M. Heard" <heard@pobox.com> > Date: Sun,2021-05-09 at 4:27 PM ... > Why not instead try to clean up tunnel behavior so that the transitions ECT(1) -> ECT(0) and ECT(0) -> ECT(1) within the network make it through tunnels? If we go for a flag day, wouldn't this be more profitable? ... > On Fri, Mar 26, 2021 at 10:15 AM Martin Duke wrote: >>Bob has identified all of the problems with using DSCP for L4S. Among them is running L4S through a tunnel. >> >> Another axis of discussion was changing the L4S signal to be ECT(1)->ECT(0) and preserving the CE signal (thread: [1]), which comprehensively solves the coexistence issues. But this fell down, partially because of the (needless) RFC6040 tunnel decap behavior, which will revert any outer-header changes. There are some other problems, of course, they don't affect bystanders and I don't see them as likely to be fatal. That also would be a reasonable approach to me. I was including this idea under "SCE-like", in that the change of codepoint in a packet stream is interpreted as a high-fidelity congestion signal as output from the network. But I think Bob and others had some reasonable objections that not only is the classifier unreliable under that proposal, but also the unreliability increases with higher adoption, and we can expect some related performance problems down this path that would be avoided with the current l4s-id approach, assuming a way can be found to roll it out safely. I think we've seen a fair amount of discussion on SCE in general, and I was assuming we can expect a sort of "reversed SCE" to have roughly similar characteristics (with some unproven possibility that there are some further improvements possible). But we haven't seen much explicit discussion on sticking with the current l4s-id while making the world ready to handle it safely as a harm-avoidance strategy. The threads referenced at the top of the prior message (and maybe a few others earlier?) had a few people who seemed to be saying something about the concept, but had some conflicting views. People seemed to be taking the position that it was either trivial or essentially impossible and I don't think either is true. I think it would require a challenging but doable flag day. I think it would result in a slightly improved performance in the end, relative to using ECT(1)->ECT(0) as a congestion signal. And although 2 years ago I would have rated it almost certainly more trouble than it's worth, the lack of motion on this discussion (and even more so on the implementations) has me reconsidering that position. I hope that helps to clarify the intent behind the proposal. Best regards, Jake (To the tunnel point: I agree 6040 would also need fixing with a standards document that changes behaviors if we did something SCE- like, but if I understand correctly enough (not assured! grain of salt here) it could be done safely in parallel without blocking on a flag day, and traffic over tunnels mostly just wouldn't get the latency benefits until they get the upgrade, since they'd be stuck with basically classic behavior. Not sure that captures all the nuances, but I thought I'd try to dodge that rathole in this thread and leave it as a side issue. For the sake of staying focused on a flag day safety discussion, I was aiming to keep the effects here summarized as "worse performance", some of which comes from the tunnels having a long tail upgrade cycle that keeps their traffic's behavior classic, and some of which comes from other effects.)
- [tsvwg] ECT(1) Flag Day Plausibility Holland, Jake
- Re: [tsvwg] ECT(1) Flag Day Plausibility C. M. Heard
- Re: [tsvwg] ECT(1) Flag Day Plausibility Holland, Jake
- Re: [tsvwg] ECT(1) Flag Day Plausibility Bob Briscoe
- Re: [tsvwg] ECT(1) Flag Day Plausibility Pete Heist
- Re: [tsvwg] ECT(1) Flag Day Plausibility Bob Briscoe
- Re: [tsvwg] ECT(1) Flag Day Plausibility Martin Duke
- Re: [tsvwg] ECT(1) Flag Day Plausibility Holland, Jake
- Re: [tsvwg] ECT(1) Flag Day Plausibility Sebastian Moeller
- Re: [tsvwg] ECT(1) Flag Day Plausibility Bob Briscoe
- Re: [tsvwg] ECT(1) Flag Day Plausibility Bless, Roland (TM)
- Re: [tsvwg] ECT(1) Flag Day Plausibility Jonathan Morton
- Re: [tsvwg] ECT(1) Flag Day Plausibility Holland, Jake
- Re: [tsvwg] ECT(1) Flag Day Plausibility Greg White
- Re: [tsvwg] ECT(1) Flag Day Plausibility Bless, Roland (TM)