Re: [tsvwg] FQ & VPNs

Pete Heist <pete@heistp.net> Mon, 22 February 2021 10:27 UTC

Return-Path: <pete@heistp.net>
X-Original-To: tsvwg@ietfa.amsl.com
Delivered-To: tsvwg@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 8E3573A1265 for <tsvwg@ietfa.amsl.com>; Mon, 22 Feb 2021 02:27:52 -0800 (PST)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -2.099
X-Spam-Level:
X-Spam-Status: No, score=-2.099 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, DKIM_SIGNED=0.1, DKIM_VALID=-0.1, DKIM_VALID_AU=-0.1, DKIM_VALID_EF=-0.1, SPF_HELO_NONE=0.001, SPF_PASS=-0.001, URIBL_BLOCKED=0.001] autolearn=ham autolearn_force=no
Authentication-Results: ietfa.amsl.com (amavisd-new); dkim=pass (2048-bit key) header.d=heistp.net
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id wuu86mI3wmLr for <tsvwg@ietfa.amsl.com>; Mon, 22 Feb 2021 02:27:50 -0800 (PST)
Received: from mail-wr1-x429.google.com (mail-wr1-x429.google.com [IPv6:2a00:1450:4864:20::429]) (using TLSv1.2 with cipher ECDHE-RSA-AES128-GCM-SHA256 (128/128 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id 8C96A3A1260 for <tsvwg@ietf.org>; Mon, 22 Feb 2021 02:27:50 -0800 (PST)
Received: by mail-wr1-x429.google.com with SMTP id l30so2782695wrb.12 for <tsvwg@ietf.org>; Mon, 22 Feb 2021 02:27:50 -0800 (PST)
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=heistp.net; s=google; h=message-id:subject:from:to:cc:date:in-reply-to:references :user-agent:mime-version:content-transfer-encoding; bh=vGNjomzixu+6XTYapr8m0Bq3SxQOiC8WM+ti223TkYQ=; b=j3CGoZEbyvzhJ8TIyv+qWK4MrGCnxCfni77ErR9B/LTl8unbdFkJBnJyi/o6pKeU72 CvIgh9c/XhAfEfYVDkaBoV3X3MSPxyqm7zjUhr5MJRXQIptj3KDQ1/fFLwEC2m4KCSzU A9bnv+SEDjZdwAr5j7lLNgFIWpUKS1ucsL5fYji+UQqT8EI9mFKjIUisrCvnAs9OgvDw M52KHmZaxTQSpD1cfeaIM/aa9GMEPfI7oXPhXSOzqwqgvM7oEHgMi1A+c/RRddIOFIIg iG2ll6Vt4d4YdtbrATuwWdSMFw0DgMxTxILXy4B93eJB/ASIyzd4MKpvuwlHiedLv4Q0 FzFQ==
X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20161025; h=x-gm-message-state:message-id:subject:from:to:cc:date:in-reply-to :references:user-agent:mime-version:content-transfer-encoding; bh=vGNjomzixu+6XTYapr8m0Bq3SxQOiC8WM+ti223TkYQ=; b=cNed7ozps4IEFATpYJXkJRTFthkH3HqqQZSJldmvP74ugkLwk8UzaNnx1AA5XfFh4z R1Gn0Zs8aBHfgFVGJF/9oSJoHnACYl+sOl/UgmTFDM2mpK53UzqIAGJK0oMspBqXyVNE VyOztr8OiYovG7z1hBIe59qVxIvWZf1zqocVVXxjsRbNBomnwPJxbygJyKW8RFKUQegU q5mozvBqlXUJldqBwDuOn8FW3UPUC4/vievoUYLKQQRa86R7lhZetK0ncho4yCpfVO6D 5yAZxtyFjduXZi1rr/P8eF+jf6eHGKX5k4pu8kgPNgRRMuRcwzSXZI5KzCr99Y1nBgt2 LtVw==
X-Gm-Message-State: AOAM533zSzCKR15UgYzLCsUC1NdbmtaBJD+RAenooehFCuPhri3AJBlR hCHGMgrJZ1xGKbxzVOj7KDM3sQ==
X-Google-Smtp-Source: ABdhPJznQYEUTooXwmPb4qwp5m7WgEgDiPq9V9co208lbIKy9hPwgQNg46eyLwcNs3y2DoKoHv5xMg==
X-Received: by 2002:adf:a2d3:: with SMTP id t19mr13911903wra.299.1613989668826; Mon, 22 Feb 2021 02:27:48 -0800 (PST)
Received: from [10.72.0.88] (h-1169.lbcfree.net. [185.193.85.130]) by smtp.gmail.com with ESMTPSA id x12sm2300806wrq.84.2021.02.22.02.27.48 (version=TLS1_3 cipher=TLS_AES_256_GCM_SHA384 bits=256/256); Mon, 22 Feb 2021 02:27:48 -0800 (PST)
Message-ID: <dd000d1e145fde56b8d0bb433b3cc4b889df426e.camel@heistp.net>
From: Pete Heist <pete@heistp.net>
To: Greg White <g.white@CableLabs.com>
Cc: TSVWG <tsvwg@ietf.org>, Jonathan Morton <chromatix99@gmail.com>
Date: Mon, 22 Feb 2021 11:27:46 +0100
In-Reply-To: <C9DA0662-4B5F-4E42-8B4E-820C32F75E32@cablelabs.com>
References: <161366419040.16138.17111583810851995947@ietfa.amsl.com> <BF0810D9-E742-4FCB-90B1-6957551B585D@heistp.net> <b222bbdf-70ae-3e5b-b122-1160299fb4e2@bobbriscoe.net> <E7CC88FA-F064-4B72-BAA9-8BE40F7AF040@gmail.com> <52cb434a-bd91-6260-7be9-85bdbd07b625@bobbriscoe.net> <BCAB7068-A10A-4FC4-9719-E300F644262C@gmail.com> <43f43fa2-69c4-bc10-3ffb-e95e41809335@bobbriscoe.net> <4835a3cd-4d88-68ac-d172-1e21bc42a150@bobbriscoe.net> <CAA93jw7_yvkqU-uxHkbHkO2g_RFmzCmJcxQhMJcBQjo=+QMh=w@mail.gmail.com> <HE1PR0701MB2299CF42CA83576C86070BB0C2839@HE1PR0701MB2299.eurprd07.prod.outlook.com> <13EBAF97-A9AF-47A1-AB71-546C31F762C2@gmail.com> <HE1PR0701MB22999A319816198B515234BEC2829@HE1PR0701MB2299.eurprd07.prod.outlook.com> <CAA93jw6GNbgOSDfWo2mQPWSS5GQdTNqtq=fBgspP=MNkyPNtfA@mail.gmail.com> <eef468c8-1152-f6e8-cfbf-c80cb2d465a0@tomh.org> <94BF48C8-733B-42AC-ABC1-246692E2E0A1@gmail.com> <HE1PR0701MB2299C166CC9988746F3F16C5C2829@HE1PR0701MB2299.eurprd07.prod.outlook.com> <CD42B120-D4E2-42CC-B5EB-782033F1EC8F@gmail.com> <HE1PR0701MB22990B329FD117E78BF7711CC2829@HE1PR0701MB2299.eurprd07.prod.outlook.com> <010CB169-57C3-46B6-888E-EA0D180B3AD9@gmail.com> <C9DA0662-4B5F-4E42-8B4E-820C32F75E32@cablelabs.com>
Content-Type: text/plain; charset="UTF-8"
User-Agent: Evolution 3.38.3
MIME-Version: 1.0
Content-Transfer-Encoding: 8bit
Archived-At: <https://mailarchive.ietf.org/arch/msg/tsvwg/Hg0UdBWVoZ3h9oqZmGsbR942cmE>
Subject: Re: [tsvwg] FQ & VPNs
X-BeenThere: tsvwg@ietf.org
X-Mailman-Version: 2.1.29
Precedence: list
List-Id: Transport Area Working Group <tsvwg.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/tsvwg>, <mailto:tsvwg-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/tsvwg/>
List-Post: <mailto:tsvwg@ietf.org>
List-Help: <mailto:tsvwg-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/tsvwg>, <mailto:tsvwg-request@ietf.org?subject=subscribe>
X-List-Received-Date: Mon, 22 Feb 2021 10:27:53 -0000

Hi Greg, some comments below [PH].

On Sun, 2021-02-21 at 23:49 +0000, Greg White wrote:
> On 2/21/21, 4:25 PM, "tsvwg on behalf of Jonathan Morton" <
> tsvwg-bounces@ietf.org on behalf of chromatix99@gmail.com> wrote:
> 
>     L4S cannot safely be deployed on existing networks - that is
> axiomatic in its current form.  Therefore, you have to prepare the
> network as fully L4S-aware before you can safely deploy your first
> endpoints - on Internet scale, that is not really feasible within a
> decade.  It would be easier to start deployment if you had a good way
> of containing L4S traffic to a small portion of the network (eg. a
> CDN and an associated ISP) in which dealing with the network
> preparation is actually feasible in the short term.
> 
> [GW] This is blatantly false. In the vast majority of paths, L4S is
> considered safe for deployment today.  In a minority of paths there
> exists the rare possibility of L4S flows achieving more than their
> "fair" share of the bottleneck link bandwidth, and an extremely rare
> possibility that this unfairness results in a significant temporary
> degradation of classic traffic performance.  In these paths there is
> almost certainly only one network element that will need to be
> updated in order to prevent any possibility of such degradation, and
> as far as anyone can discern at the moment those network elements are
> largely prosumer grade home routers that are increasingly being
> actively patched already. 

[PH] In regards to the proportion of paths with RFC3168 AQMs deployed,
referring to section 3.2 in our recent draft, and cautioning that this
is not authoritative:
https://www.ietf.org/archive/id/draft-heist-tsvwg-ecn-deployment-observations-01.html#name-rfc3168-aqm-activity

If we remove the IP addresses that I had an influence on, leaving only
the unknown sources of AQM marking, then the proportion of IPs that
successfully negotiated ECN and saw CE or ECE, i.e. apparently had an
AQM on the path, is (90-38)/382 = 0.14.

I also noticed during a few script runs, as it was refined, that as we
let it run longer, more IP addresses appeared that saw CE or ECE. AQMs
are only visible to us when flows both negotiate ECN and experience
congestion at those AQMs. It takes time for detection when 1.44% of
SYNs had ECN capability, so we may have missed some.

The 1.44% ECN SYN proportion may also make it more difficult to detect
ECN traffic within tunnels, because now we have the product of ECN
capable traffic with traffic that's traversing a tunnel. However, that
product does not apply to the potential for induced harm, since that
occurs to both ECN and non-ECN capable flows.

[PH] As to the level of harm induced when traffic winds up in the same
queue, it appears that in the presence of a "long-running" L4S flow,
short flows as well as long flows, ECN capable or not, may be affected.
As flows start up, there can be "good" cases:

http://sce.dnsmgr.net/results/l4s-2021-02-19T194323-s8/l4s-s8-rfc3168-second/l4s-s8-rfc3168-second-ns-prague-vs-cubic-ecn-fq_codel_1q_-50Mbit-20ms_tcp_delivery_with_rtt.svg

and "not as good" cases:

http://sce.dnsmgr.net/results/l4s-2021-02-19T193357-s8/l4s-s8-rfc3168-second/l4s-s8-rfc3168-second-ns-prague-vs-cubic-ecn-fq_codel_1q_-50Mbit-80ms_tcp_delivery_with_rtt.svg

It might be useful to have a histogram of FCT vs flow length, to
project what the user experience might be like for web browsing or
other applications in the presence of long-running L4S flows.

Regards,
Pete

> [snip]
> 
>     Conversely, let's look at SCE from the same perspective. 
> Remember, SCE is capable of achieving the same performance as L4S,
> given similar marking and response algorithms.  The difference is in
> backwards compatibility.
> 
> [GW] The WG considered SCE and has decided against it.  You seem to
> be repeating the same arguments (with the same transparent hyperbole)
> that led to that conclusion in hopes that the outcome somehow
> changes. 
> 
> [snip]
> 
>