Re: [tsvwg] Adoption call for draft-white-tsvwg-l4sops - to conclude 24th March 2021

Ingemar Johansson S <ingemar.s.johansson@ericsson.com> Thu, 25 March 2021 13:08 UTC

Return-Path: <ingemar.s.johansson@ericsson.com>
X-Original-To: tsvwg@ietfa.amsl.com
Delivered-To: tsvwg@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 188253A20B8 for <tsvwg@ietfa.amsl.com>; Thu, 25 Mar 2021 06:08:16 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -2.351
X-Spam-Level:
X-Spam-Status: No, score=-2.351 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, DKIMWL_WL_HIGH=-0.251, DKIM_SIGNED=0.1, DKIM_VALID=-0.1, DKIM_VALID_AU=-0.1, DKIM_VALID_EF=-0.1, RCVD_IN_DNSWL_BLOCKED=0.001, RCVD_IN_MSPIKE_H2=-0.001, SPF_PASS=-0.001, URIBL_BLOCKED=0.001] autolearn=ham autolearn_force=no
Authentication-Results: ietfa.amsl.com (amavisd-new); dkim=pass (1024-bit key) header.d=ericsson.com
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id 6mvKgwY6zKf6 for <tsvwg@ietfa.amsl.com>; Thu, 25 Mar 2021 06:08:11 -0700 (PDT)
Received: from EUR01-DB5-obe.outbound.protection.outlook.com (mail-eopbgr150049.outbound.protection.outlook.com [40.107.15.49]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id AD4743A20B4 for <tsvwg@ietf.org>; Thu, 25 Mar 2021 06:08:10 -0700 (PDT)
ARC-Seal: i=1; a=rsa-sha256; s=arcselector9901; d=microsoft.com; cv=none; b=E/7itK4q2NFHpf++eoMKi8V8gD+luMnWv2LukMVxID4gmIcZigBBGZz1VVZ397Z5yAg7pIY80/ojjiFjyagYU/u2NmNzmpV40/4P7nNDCgRRq2RAA4gAwFfKWev2j0anWsNQ00BWoz/BNaW33aSMDyTLFjn/jo9CmtvS1b2J0GeojMG/LPd1r8Jqi2zI+5WYNO6CXNl8OgCfGzzQmQLKWoHVlmsnw2wdP5smID5IEmfEIpuwlSGExSCw5+Z8ScpuhQeROTa2HD1cINBzE33OHeHh7C2FFA4CqLFN8ZthTBWBmnGybTTkuFR4wBx8SbIpt+ognUk/+7UccQGNn6gwiQ==
ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=microsoft.com; s=arcselector9901; h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-SenderADCheck; bh=HI+DlbnWfY6deldBVPzzUb6/226DuFTiSKUKFtOtgRc=; b=YNql4wnJ1U+CnLLi8VyQvoO2t5yO+F8SqvCCtg3BaK5Ta2PsO5MafcNNoclC04dsEdC+ed+j987rVfPrICu3NXmyYmKqduFYUzy3gmb5AMJfMDlBlD8+CdLUQf1HzILvb/aUOymlDamjWxvfpV6l3eEK5INCoUV+YQXnGKrz8YhVB7bjE7AweOUVU/ghN9cGw6JIrA1tAwx/AityoF443mQit7Hu/kVdKLvef84LMec88QkQKRscMRM//NW3q8mZMKPrr2eUoiJrbar7pFoE5Rld+Q7+C51aqJ6pAR5Svv47j9sAJu4q55xLjbmCa5kKT2zDSzngCrEyPI7GKLrexQ==
ARC-Authentication-Results: i=1; mx.microsoft.com 1; spf=pass smtp.mailfrom=ericsson.com; dmarc=pass action=none header.from=ericsson.com; dkim=pass header.d=ericsson.com; arc=none
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=ericsson.com; s=selector1; h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-SenderADCheck; bh=HI+DlbnWfY6deldBVPzzUb6/226DuFTiSKUKFtOtgRc=; b=mS/REuPp0Au6mr4bM1YUYN8ZNLLm0La6c7Vc9AsmJuvFw4Wcjpj1uWkeQglJ6Ncz0wR4uazBdYIMDK6oQKuFgmkzTQ3GUokXsxaMzoEn+D2DbUmlevHPNRajFDRQVnLaB6UC9K6dZ7UCcHjRSfnSngBa2nmU3KmGQrWDe5nSu+0=
Received: from HE1PR0701MB2299.eurprd07.prod.outlook.com (2603:10a6:3:6c::8) by HE1PR0701MB2108.eurprd07.prod.outlook.com (2603:10a6:3:27::16) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id 15.20.3999.16; Thu, 25 Mar 2021 13:08:04 +0000
Received: from HE1PR0701MB2299.eurprd07.prod.outlook.com ([fe80::78cb:103b:9ddd:1850]) by HE1PR0701MB2299.eurprd07.prod.outlook.com ([fe80::78cb:103b:9ddd:1850%7]) with mapi id 15.20.3977.026; Thu, 25 Mar 2021 13:08:04 +0000
From: Ingemar Johansson S <ingemar.s.johansson@ericsson.com>
To: Sebastian Moeller <moeller0@gmx.de>
CC: Bob Briscoe <ietf@bobbriscoe.net>, "tsvwg@ietf.org" <tsvwg@ietf.org>, Ingemar Johansson S <ingemar.s.johansson@ericsson.com>
Thread-Topic: [tsvwg] Adoption call for draft-white-tsvwg-l4sops - to conclude 24th March 2021
Thread-Index: AQHXFP4lZrMzfDQuY0Gapf7yUNe4tKqQ1J6AgAMBkICAAAZIAIAAq4MAgAADwICAAB2yYIAABS8AgAAT3pA=
Date: Thu, 25 Mar 2021 13:08:04 +0000
Message-ID: <HE1PR0701MB22999BC63287924F2E42EDFAC2629@HE1PR0701MB2299.eurprd07.prod.outlook.com>
References: <e9da704b-7705-baf9-a82c-39d4fe4e7ef1@erg.abdn.ac.uk> <98c8af7ffd471d6c353006c92c7deb3c28441557.camel@petri-meat.com> <0958b1c7-f4d2-ac7c-c127-b6fefef8f554@bobbriscoe.net> <18b86be43d62ea0a7dc55c760a50818dc68234ef.camel@petri-meat.com> <296c7a3b-15fc-5a30-efc0-cdc27a176db3@bobbriscoe.net> <B5AA611B-93CB-49FE-A57B-8293B4E15650@gmx.de> <HE1PR0701MB229912A63BDCDB0333F7B7CCC2629@HE1PR0701MB2299.eurprd07.prod.outlook.com> <84343CA8-C428-4859-9DBC-5C7C717E25B3@gmx.de>
In-Reply-To: <84343CA8-C428-4859-9DBC-5C7C717E25B3@gmx.de>
Accept-Language: sv-SE, en-US
Content-Language: en-US
X-MS-Has-Attach: yes
X-MS-TNEF-Correlator:
authentication-results: gmx.de; dkim=none (message not signed) header.d=none;gmx.de; dmarc=none action=none header.from=ericsson.com;
x-originating-ip: [83.227.122.88]
x-ms-publictraffictype: Email
x-ms-office365-filtering-correlation-id: bfba2793-2b9a-415a-aa9d-08d8ef8f0690
x-ms-traffictypediagnostic: HE1PR0701MB2108:
x-ms-exchange-transport-forked: True
x-microsoft-antispam-prvs: <HE1PR0701MB2108DB87FC98275D6DF59FD6C2629@HE1PR0701MB2108.eurprd07.prod.outlook.com>
x-ms-oob-tlc-oobclassifiers: OLM:4714;
x-ms-exchange-senderadcheck: 1
x-microsoft-antispam: BCL:0;
x-microsoft-antispam-message-info: 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
x-forefront-antispam-report: CIP:255.255.255.255; CTRY:; LANG:en; SCL:1; SRV:; IPV:NLI; SFV:NSPM; H:HE1PR0701MB2299.eurprd07.prod.outlook.com; PTR:; CAT:NONE; SFS:(4636009)(39860400002)(136003)(346002)(376002)(396003)(366004)(66946007)(66616009)(66476007)(66556008)(6506007)(2906002)(53546011)(64756008)(966005)(76116006)(8936002)(66446008)(478600001)(7696005)(107886003)(6916009)(8676002)(4326008)(55016002)(9686003)(83380400001)(54906003)(5660300002)(66574015)(86362001)(71200400001)(316002)(33656002)(186003)(26005)(38100700001)(52536014)(99936003); DIR:OUT; SFP:1101;
x-ms-exchange-antispam-messagedata: 9v2+nnLKvZNOYO0AglrQMnNBBvhtg8lKPEJBrI6lTVFQR2mG9lEC6ri3f8MrFpeHseHAPAEAnUpcp5OFjEBXDXT+K04jZvZdaTSSP4g4lY41tSrN3PSms9fhCIt3j2HM1SzhMI36vl3x+cT2T5KXLiS9GNIJHFfv6fWoBHA689680owXgJZvLVR8Rp8ZmxMHimUgWdOi5eWbZovGpy6wG1bO2YzwoAtQpYvdlyZnPKcrUqAkMpOKfyZwXveGJeekDqDcXITPcM9efLDPsJljZV+3duxRWpveYc5QegcIQLrkjbhISjyZJhQZpibJJEYOJY8zxAB2n832WaEHTI/ZQ+Rqxo7US3sEQH47r6COvokdFHcdYRMO4m6LeXLKZRuJ3qO8GI2RqzWB0wOCxdCkVfgBz9cKY+PIlIAEmQMRDc4b3GCNZBCNFeL5gW4YRpxxDd2QOUDWe+RwjxUavNGgUkYmhVl0QWlXuJW0PFncacXL6+wmRcB6WSsTwTOyxAHG+/W3Ni4rHcmWJ3WnNbo1ljaANeJkK7tsaZ19XAaoy2a8OAmUxsOjBk0jSkUpHEZgoOyy8BGhRJyu2zzmQ0n9OFB/c4ARNLGQ+aHY8kyaDcDG8zrr2RR5NUEhCiAEqfFeGS866BabzR26QwVp83Ih0pGUKrBb6JVyM7jsw8yG0rk2MJ63B7K5GmftqTYrDFvuQhdYhBIdwDVv9sIAGiObif2P0ziqnpAgC/CcoNfFXJGRGCuMUsYPIfAPMNWdTOXeihVP0NFiXJ/2UjCKZLQwNT597l6QC+I9Ybuaq2nEb4a8PZmudEerJ4ODeKpfwczK/PjlIdMZ2hzNbtv3h2KVd1/A0JH2UO0YZu6yT2E02m2KRa9NWPHDMaSw7VDu2taIr+hnJBoy8wJwUjU4LjnK6c2bS9ZxvQAbZWSo2MwY9xd673CKtCL66wm80qxhLhM5se7b9yZRZ/u3GrNSkvhF7hSTNQmdnTiWrHGsc2UVy9FX/72g0bkl7YX4ArtwgIgZwFFh+U10WV6dgEYyaAuYJkC2obS+yUIiPW44otuS1G08wLnJWGRBb/yEQ6ZzOYBoChtVSW5B+4r77LNrM7Jt6jTcgGI4kUb6VEPu+SQn4hwDSCkxVV31jiScC78ZFKKIwbFvhoqffnBaWK9N87wOv8KH91EFaJJVZNN4atXUQPSg7+awfVpB1EYOY5yGpi92OMBMMkn5XzzMu4c+klgE3+uj48br8U82vJeYaqBL7A6P/S/tjFmlaOtGVJEFSUQdfdKzVhWJgKHndlumCUubQ+XtNViB8x5/IPd94LIZCyrmTbIMO5bOZHGL9r5tDsGJ
Content-Type: multipart/signed; protocol="application/x-pkcs7-signature"; micalg="SHA1"; boundary="----=_NextPart_000_0303_01D72180.44F8B740"
MIME-Version: 1.0
X-OriginatorOrg: ericsson.com
X-MS-Exchange-CrossTenant-AuthAs: Internal
X-MS-Exchange-CrossTenant-AuthSource: HE1PR0701MB2299.eurprd07.prod.outlook.com
X-MS-Exchange-CrossTenant-Network-Message-Id: bfba2793-2b9a-415a-aa9d-08d8ef8f0690
X-MS-Exchange-CrossTenant-originalarrivaltime: 25 Mar 2021 13:08:04.1241 (UTC)
X-MS-Exchange-CrossTenant-fromentityheader: Hosted
X-MS-Exchange-CrossTenant-id: 92e84ceb-fbfd-47ab-be52-080c6b87953f
X-MS-Exchange-CrossTenant-mailboxtype: HOSTED
X-MS-Exchange-CrossTenant-userprincipalname: ZOH/DTev4Dm+CI2KgimKG56sMD/KJa5cEqY4CXwNUCnT9r7K2twQHGVZL13vnYFAHmd64OkV9Ar7E6tJNeHzMIB65JE/zCp6uHP4+G6EM6qFVxp4M3GrQY6Yy93q7Amr
X-MS-Exchange-Transport-CrossTenantHeadersStamped: HE1PR0701MB2108
Archived-At: <https://mailarchive.ietf.org/arch/msg/tsvwg/F6pGuFaPGdS1TvtsFbJrWLxcuJU>
Subject: Re: [tsvwg] Adoption call for draft-white-tsvwg-l4sops - to conclude 24th March 2021
X-BeenThere: tsvwg@ietf.org
X-Mailman-Version: 2.1.29
Precedence: list
List-Id: Transport Area Working Group <tsvwg.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/tsvwg>, <mailto:tsvwg-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/tsvwg/>
List-Post: <mailto:tsvwg@ietf.org>
List-Help: <mailto:tsvwg-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/tsvwg>, <mailto:tsvwg-request@ietf.org?subject=subscribe>
X-List-Received-Date: Thu, 25 Mar 2021 13:08:16 -0000

Hi

One reflection around all this is that it really does not matter how many
warning signs you put, information may still not reach the intended
audience. 
I guess there must be an abundance of cases with other IETF work that does
not reach the audience, sometimes with suboptimal performance as a result.
And I don't find it too productive to dump a lot of informational text in
RFC8311 around what can possibly go wrong, especially as it is not fully
clear how serious these problems really are. Only way forward I see is to
move on with the L4S experiment and document possible issues as they come.
The L4S ops draft provide good initial input here and it will likely be
complemented with more best current practice.

/Ingemar

> -----Original Message-----
> From: Sebastian Moeller <moeller0@gmx.de>
> Sent: den 25 mars 2021 12:45
> To: Ingemar Johansson S <ingemar.s.johansson@ericsson.com>
> Cc: Bob Briscoe <ietf@bobbriscoe.net>; tsvwg@ietf.org
> Subject: Re: [tsvwg] Adoption call for draft-white-tsvwg-l4sops - to
conclude
> 24th March 2021
> 
> Hi Ingemar,
> 
> thanks for responding.
> 
> > On Mar 25, 2021, at 12:35, Ingemar Johansson S
> <ingemar.s.johansson@ericsson.com> wrote:
> >
> > Sebastian..
> >
> > Isn't the updated by RFC8311 sufficient in RFC3168 ?. It refers to L4S
> > work, namely the L4S ID which targets experimental standards status.
> 
> 	[SM] IMHO not really, rfc8311 has no big warning signs, that those
> experimental standards are allowed/expected to carry negative side-effects
> for rfc3168-compliant AQMs and operators of rfc3168 AQM need to employ
> specific steps to ensure safety/functionality of their AQM to accommodate
> such experimental standards traffic.
> 	I am not trying to start a discussion about whether doing that at
all is
> a good idea, but how to make sure that information reaches the parties
that
> would need to follow those instructions. IMHO the link to rfc8311 does not
> convey enough urgency for rfc3168 deployers to go digging deeper, but I
> might be just naive here, not being/working for an operator.
> 
> > Also, to me it sounds odd to add an
> > Updated by : [L4S Ops - Informational RFC] to a proposed standard ? ,
> 
> 	[SM] Same sentiment, that why I asked. The information though
> seems important. If rfc3168 deployers need to do something extra to
> guarantee their safety and functionality, because of changes somewhere
> else, I believe the party responsible for those changes (aka this WG)
should
> make sure that even casual reads of rfc3168 know about the additional
steps
> we expect them to take.
> 
> Best Regards
> 	Sebastian
> 
> 
> > In any case it is the first time in RFC3168's history that it happens,
> > unless I missed something.
> >
> > /Ingemar
> >
> >> -----Original Message-----
> >> From: tsvwg <tsvwg-bounces@ietf.org> On Behalf Of Sebastian Moeller
> >> Sent: den 25 mars 2021 10:40
> >> To: Bob Briscoe <ietf@bobbriscoe.net>
> >> Cc: tsvwg@ietf.org
> >> Subject: Re: [tsvwg] Adoption call for draft-white-tsvwg-l4sops - to
> > conclude
> >> 24th March 2021
> >>
> >> Hi Bob,
> >>
> >>
> >>> On Mar 25, 2021, at 10:26, Bob Briscoe <ietf@bobbriscoe.net> wrote:
> >>>
> >>> Steven,
> >>>
> >>> On 24/03/2021 23:12, Steven Blake wrote:
> >>>> On Wed, 2021-03-24 at 22:50 +0000, Bob Briscoe wrote:
> >>>>> Steven,
> >>>>>
> >>>>>
> >>>>> On 23/03/2021 00:56, Steven Blake wrote:
> >>>>>> Sec. 4 (Operator of a Network) of the draft presumes that
> >>>>>> deployed equipment is capable to classifying packets specifically
on
> ECT(1).
> >>>>>> Have the authors confirmed that this feature is available on
> >>>>>> commonly deployed operator gear (e.g., IOS-XR, JUNOS)?
> >>>>> [BB]
> >>>>> (Aside: I think you're reading an old (-01) draft. That section
> >>>>> has been Sec. 5. since draft-02 on 22 Feb 2021.
> >>>>> See my response to the initial adoption call about the probable
> >>>>> cause of this confusion - suspected problems with the IETF tools
> >>>>> servers.
> >>>>> )
> >>>> Oops! You're right. s/Sec. 4/Sec. 5.
> >>>>
> >>>>
> >>>>> To your point, I checked the manuals of one or two OSs of common
> >>>>> makes of router before I proposed the WRED technique for addition
> >>>>> to the draft. And I discussed the hardware capabilities with
> >>>>> people within one or two router vendors. In the cases I checked,
> >>>>> the CLI limits the flexibility that the admin has to define
> >>>>> classifiers as general bit patterns. However the hardware
> >>>>> underneath does have that flexibility.
> >>>>> So
> >>>>> this would require a CLI update for the routers I checked. The
> >>>>> Linux classifier architecture does provide sufficient flexibility
> >>>>> for such a classifier.
> >>>>>
> >>>>> I also suggested the ECT(1) tunnel bypass technique, but I didn't
> >>>>> exhaustively check the manuals of all the different types of
> >>>>> tunnel (there are dozens).
> >>>>>
> >>>>> I think this list of techniques is most useful for router
> >>>>> developers, who can then find the easiest and most efficient one
> >>>>> for their particular kit; whether they have to update the CLI, or
> >>>>> whether they can find a way for their users to configure their
> >>>>> unmodified systems in the field.
> >>>>
> >>>> So operators that *don't wish to participate in L4S experiments*
> >>>> may need to update *their* deployed software? Ask your favorite
> >>>> router vendor how many customer-specific releases they are
> >>>> maintaining because customers don't want to move forward once they
> >>>> get a working validated release.
> >>>
> >>> [BB] There is a common belief that, if any RFC3168 FIFO AQMs exist,
> >>> they
> >> will be rare. But Jake and Jonathan raised the concern that it still
> >> needs
> > to be
> >> possible to deploy RFC3168 routers from now onwards. In that case,
> >> operators that *don't wish to participate* would be updating their
> >> config, and l4sops then gives router developers ideas for how they
> >> might be able
> > to
> >> prevent an existing implementation of RFC3168 from acting on ECT(1),
> >> given an ECN implementation is likely to be hard-coded against the
> >> ECN codepoints.
> >>
> >>
> >> 	[SM] This asks the question, how would an operator that is about to
> >> enable an rfc3168 AQM know that he better read and follow the L4S-ops
> >> ID/RFC? Are we expecting all operators to read and follow all RFCs
> >> meticulously all the time?
> >> 	IMHO an operator intending on employing an rfc3168 AQM might
> read
> >> RFC3168 and RFCs referenced from there (which is IMHO already less
> >> likely), while an operator interested in L4S might read all of the
> >> L4S
> > IDs/RFCs.
> >> But here we would need the rfc3168 deploying operators to read and
> >> follow an L4S ID/RFC...
> >> 	I guess adding an updated by to rfc3168 pointing to the L4S-ops RFC
> >> might offer a solution, but can/should a informational RFC update a
> >> PS document (honest question, I am just not sure about whether our
> >> process permits that)?
> >>
> >> Best Regards
> >> 	Sebastian
> >>
> >> P.S.: This is basically the same issue I have with the only mildly
> >> related
> > NQB
> >> ID: in both contexts, we seem to expect parties genuinely not
> >> interested
> > in
> >> the topic of the ID to act in a specific way to accommodate either
> >> the NQB
> > or
> >> the L4S IDs/RFCs. And in both cases arguably bad things happen if
> >> those parties do not follow the recommendations.
> >>
> >>
> >>>
> >>>
> >>>
> >>> Bob
> >>>
> >>>>
> >>>>
> >>>> Regards,
> >>>>
> >>>> // Steve
> >>>>
> >>>>
> >>>>
> >>>>
> >>>
> >>> --
> >>>
> >>
> __________________________________________________________
> >> ______
> >>> Bob Briscoe
> >> https://protect2.fireeye.com/v1/url?k=532c5e52-0cb76757-532c1ec9-
> >> 86d2114eab2f-53274140f9ce9692&q=1&e=8a9723d1-2c84-4bf6-b7d7-
> >> b62af3457d9a&u=http%3A%2F%2Fbobbriscoe.net%2F
> >