Re: [tsvwg] David Black (individual) on safety of L4S for the Internet

"Black, David" <David.Black@dell.com> Fri, 15 May 2020 00:03 UTC

Return-Path: <David.Black@dell.com>
X-Original-To: tsvwg@ietfa.amsl.com
Delivered-To: tsvwg@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 786B23A07A0 for <tsvwg@ietfa.amsl.com>; Thu, 14 May 2020 17:03:52 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -2.1
X-Spam-Level:
X-Spam-Status: No, score=-2.1 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, DKIM_SIGNED=0.1, DKIM_VALID=-0.1, DKIM_VALID_AU=-0.1, DKIM_VALID_EF=-0.1, RCVD_IN_MSPIKE_H2=-0.001, SPF_HELO_NONE=0.001, SPF_PASS=-0.001, URIBL_BLOCKED=0.001] autolearn=ham autolearn_force=no
Authentication-Results: ietfa.amsl.com (amavisd-new); dkim=pass (2048-bit key) header.d=dell.com header.b=nyslrva0; dkim=pass (1024-bit key) header.d=dell.onmicrosoft.com header.b=VpdKxPgY
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id bvM4JeCV7FSG for <tsvwg@ietfa.amsl.com>; Thu, 14 May 2020 17:03:50 -0700 (PDT)
Received: from mx0b-00154904.pphosted.com (mx0b-00154904.pphosted.com [148.163.137.20]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id 18C0A3A079D for <tsvwg@ietf.org>; Thu, 14 May 2020 17:03:49 -0700 (PDT)
Received: from pps.filterd (m0170394.ppops.net [127.0.0.1]) by mx0b-00154904.pphosted.com (8.16.0.42/8.16.0.42) with SMTP id 04ENtr2I006252; Thu, 14 May 2020 20:03:04 -0400
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=dell.com; h=from : to : cc : subject : date : message-id : references : in-reply-to : content-type : content-transfer-encoding : mime-version; s=smtpout1; bh=7PojNSqCDmyS564/Nt6XeyjjKEbRVTs+N4zfZdsdBf0=; b=nyslrva0iE/0F8HHCcZJs79A/aXdWGy4Hm6NuhtnP/1Fv6Vxny4c6S+RSqtDbBvEZVgJ m+skOKiVVdL1Kvj6ycenFSfxmUOIC2EzrKjG36ROPR/x5sfhNoM1jz3ecWLRwMibVb7z AVxXteg2JgaGywcFMn41JtXYGPgs9dSjhxRmMmfzCVr/5mrKb7yULyb7RUl+6iBAThvg TXoE1Rk9iWUx9pbWHM9qa2IYc1o3BJeF48bWMZrjuDQC7nFgoMtuS43MHmv3Rhe3pZ/B 209YHgtuZszCzeneiiJUgf3zm3oOmgpImP6yMKBTtR6yYMlzhOa7XXx4V22H9iJ/NC34 RQ==
Received: from mx0b-00154901.pphosted.com (mx0b-00154901.pphosted.com [67.231.157.37]) by mx0b-00154904.pphosted.com with ESMTP id 310r9qkw3f-1 (version=TLSv1.2 cipher=ECDHE-RSA-AES256-GCM-SHA384 bits=256 verify=NOT); Thu, 14 May 2020 20:03:04 -0400
Received: from pps.filterd (m0144103.ppops.net [127.0.0.1]) by mx0b-00154901.pphosted.com (8.16.0.42/8.16.0.42) with SMTP id 04ENt32H044920; Thu, 14 May 2020 20:03:04 -0400
Received: from nam12-mw2-obe.outbound.protection.outlook.com (mail-mw2nam12lp2048.outbound.protection.outlook.com [104.47.66.48]) by mx0b-00154901.pphosted.com with ESMTP id 31172jge35-1 (version=TLSv1.2 cipher=ECDHE-RSA-AES256-GCM-SHA384 bits=256 verify=OK); Thu, 14 May 2020 20:03:04 -0400
ARC-Seal: i=1; a=rsa-sha256; s=arcselector9901; d=microsoft.com; cv=none; b=cdMNzLlgjpd3aJw8T/8UPzZXGfbqwpCJob1BXJLnR9pfa4odcLhKVCw6TF+QoWJaYFfyLszDfGZvpOv0YxgHjLgUUr2xwusBaypWYgDhGbULznILGEYy04VwDnNiwx1WTAsC62F9lS6xoDFORywkc//fjE3OhxIdsZNHllEGiuCPFTzXce+1cBhpvwkhKpEdQzIM1/lvZbbxsmdzrWsWhanlWLCpHUYy45n9v4tZRw4QqKiepKwh8CTkSOMiL/x0+R21cWxzRyjoqI931oJ/XMETe6X82LDCDeFZUNni2um9N4aVgQ2wdnuLGNFeLcC2+HeSlM6FJzC5n4xcEzeTIA==
ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=microsoft.com; s=arcselector9901; h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-SenderADCheck; bh=7PojNSqCDmyS564/Nt6XeyjjKEbRVTs+N4zfZdsdBf0=; b=cLkh4kEebPRk924g5jEIn+oEXVqAGKtu46D1VxOuhkNO8y2q7aGsix9K428XG+MbMF7v0D4Ri21PoyWn5QSEEhOv1MgbRZRiVZYe8uw+3z0mNfQfvOn83LWfELog3Shm3YyhmvCdj68pVVEBDhnYsWJNZod3b4aBMqpnPFs43+hJPL0fuEzj5Ve2RSDHEdnw9xV4/wDOPoQI+4W+XzIqd1u6B+S6fcZmf0BF8a272dRLD5tn13XFLCYdmM5BsjpCkJeZ0usfXZGekM7iLB5LcbtlpJc4IREfEnk682I62/itwneF76iJPbGPDg4ILINrS3Sm0xLqaES1I7BLj5KC/Q==
ARC-Authentication-Results: i=1; mx.microsoft.com 1; spf=pass smtp.mailfrom=dell.com; dmarc=pass action=none header.from=dell.com; dkim=pass header.d=dell.com; arc=none
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=Dell.onmicrosoft.com; s=selector1-Dell-onmicrosoft-com; h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-SenderADCheck; bh=7PojNSqCDmyS564/Nt6XeyjjKEbRVTs+N4zfZdsdBf0=; b=VpdKxPgYRQHF2FCfZ3ObVaNv+9V2BsuQhfBI1eABkWQLsd9d4cS/yuD7EsKSsinr1bPdKyXymcJ0QlXR3FFBHAmxDFzWP3dkO0nVx0hzxzf1KRPP+Fl62+RQytJoc1rlyqb4xhgvGVx/KDTA6L3UztrnyoRjoK+OcKEX6z1+xj8=
Received: from MN2PR19MB4045.namprd19.prod.outlook.com (2603:10b6:208:1e4::9) by MN2PR19MB3247.namprd19.prod.outlook.com (2603:10b6:208:135::21) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id 15.20.2979.33; Fri, 15 May 2020 00:03:01 +0000
Received: from MN2PR19MB4045.namprd19.prod.outlook.com ([fe80::3574:5511:eec9:567]) by MN2PR19MB4045.namprd19.prod.outlook.com ([fe80::3574:5511:eec9:567%9]) with mapi id 15.20.3000.022; Fri, 15 May 2020 00:03:01 +0000
From: "Black, David" <David.Black@dell.com>
To: Bob Briscoe <in@bobbriscoe.net>, "tsvwg@ietf.org" <tsvwg@ietf.org>
Thread-Topic: [tsvwg] David Black (individual) on safety of L4S for the Internet
Thread-Index: AdYlazOuUjQjHzTnQCi7t5vPqFGjWAEpnNkAAAgMYoAABR2VYA==
Date: Fri, 15 May 2020 00:03:01 +0000
Message-ID: <MN2PR19MB4045638F9583301BFEDA9CF083BD0@MN2PR19MB4045.namprd19.prod.outlook.com>
References: <MN2PR19MB4045DBC270D70DECE5F2B4AC83A20@MN2PR19MB4045.namprd19.prod.outlook.com> <75435344.181735.1589475836060@mail.yahoo.com> <eb4ff580-0700-764f-df82-ce13344b5743@bobbriscoe.net>
In-Reply-To: <eb4ff580-0700-764f-df82-ce13344b5743@bobbriscoe.net>
Accept-Language: en-US
Content-Language: en-US
X-MS-Has-Attach:
X-MS-TNEF-Correlator:
msip_labels: MSIP_Label_17cb76b2-10b8-4fe1-93d4-2202842406cd_Enabled=True; MSIP_Label_17cb76b2-10b8-4fe1-93d4-2202842406cd_SiteId=945c199a-83a2-4e80-9f8c-5a91be5752dd; MSIP_Label_17cb76b2-10b8-4fe1-93d4-2202842406cd_Owner=david.black@emc.com; MSIP_Label_17cb76b2-10b8-4fe1-93d4-2202842406cd_SetDate=2020-05-14T23:20:54.7781573Z; MSIP_Label_17cb76b2-10b8-4fe1-93d4-2202842406cd_Name=External Public; MSIP_Label_17cb76b2-10b8-4fe1-93d4-2202842406cd_Application=Microsoft Azure Information Protection; MSIP_Label_17cb76b2-10b8-4fe1-93d4-2202842406cd_ActionId=362d831b-981d-4247-9085-3a35fdbbb499; MSIP_Label_17cb76b2-10b8-4fe1-93d4-2202842406cd_Extended_MSFT_Method=Manual
authentication-results: bobbriscoe.net; dkim=none (message not signed) header.d=none;bobbriscoe.net; dmarc=none action=none header.from=dell.com;
x-originating-ip: [72.74.71.221]
x-ms-publictraffictype: Email
x-ms-office365-filtering-correlation-id: 2e56bb8c-8b7c-4be5-336a-08d7f863557b
x-ms-traffictypediagnostic: MN2PR19MB3247:
x-ms-exchange-transport-forked: True
x-microsoft-antispam-prvs: <MN2PR19MB3247B9F71E34BD01A2138A0383BD0@MN2PR19MB3247.namprd19.prod.outlook.com>
x-exotenant: 2khUwGVqB6N9v58KS13ncyUmMJd8q4
x-ms-oob-tlc-oobclassifiers: OLM:10000;
x-forefront-prvs: 04041A2886
x-ms-exchange-senderadcheck: 1
x-microsoft-antispam: BCL:0;
x-microsoft-antispam-message-info: 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
x-forefront-antispam-report: CIP:255.255.255.255; CTRY:; LANG:en; SCL:1; SRV:; IPV:NLI; SFV:NSPM; H:MN2PR19MB4045.namprd19.prod.outlook.com; PTR:; CAT:NONE; SFTY:; SFS:(4636009)(396003)(376002)(366004)(346002)(136003)(39860400002)(55016002)(316002)(66446008)(8676002)(2906002)(52536014)(786003)(66476007)(6506007)(26005)(64756008)(53546011)(76116006)(66556008)(186003)(110136005)(8936002)(66946007)(9686003)(66574014)(30864003)(86362001)(5660300002)(966005)(71200400001)(4326008)(107886003)(478600001)(7696005)(33656002); DIR:OUT; SFP:1101;
x-ms-exchange-antispam-messagedata: b8C4w3DumSusjeoljiQmTdb7bqMMoZ3miAtrhgyk02XXDyu1rBswhIQeR3w4/pkhajayTgPOzHzbhsLXI2uwnJJqJ4dGp47easlJsFnDQNKDPHAoQ16EY2analpKXgq/9As7zE4BhluyUd7NZ55sZFbkVbzBWad6Zz0UCHeOEIv//WAMLvYPjHL7dm0LAf2WJSZuTsfDxPCjh6OKPUu2x5+OXDSfMWYGQ4pLDRc05hqheVNK/Czs1SZgE5ACqBaOkZia3ZIU7PfegcDPY4igqZS/2Lj4O4aFvG34Y0j7dxIZmy76MEmzu0EOvA4C4N2my3enilatCNfOVcIMVrdEmHk9jz8bmQx9zXghiit5oCalrqPqtnPsYJ3g7G1rZczD83ONj9pmidLKga12fC5M8Goj82mzDKO7sCoEB49KS2uwAE7eUqzKepcYwVqwW8o8CWY+g/qgnLGC5j1SYd/+x+EJB5TvKZSHjIi1POUj3eg=
Content-Type: text/plain; charset="utf-8"
Content-Transfer-Encoding: base64
MIME-Version: 1.0
X-OriginatorOrg: Dell.com
X-MS-Exchange-CrossTenant-Network-Message-Id: 2e56bb8c-8b7c-4be5-336a-08d7f863557b
X-MS-Exchange-CrossTenant-originalarrivaltime: 15 May 2020 00:03:01.4797 (UTC)
X-MS-Exchange-CrossTenant-fromentityheader: Hosted
X-MS-Exchange-CrossTenant-id: 945c199a-83a2-4e80-9f8c-5a91be5752dd
X-MS-Exchange-CrossTenant-mailboxtype: HOSTED
X-MS-Exchange-CrossTenant-userprincipalname: QdoV9EHBR3TddqyTbKfodF77kuIlYWpH5QXErF+1UiZCmf3yc5bsXGOMCymVxfnfiwpiT/nr6rGfj2bG9IIpVg==
X-MS-Exchange-Transport-CrossTenantHeadersStamped: MN2PR19MB3247
X-Proofpoint-Virus-Version: vendor=fsecure engine=2.50.10434:6.0.216, 18.0.676 definitions=2020-05-14_08:2020-05-14, 2020-05-14 signatures=0
X-Proofpoint-Spam-Details: rule=outbound_notspam policy=outbound score=0 clxscore=1011 suspectscore=0 priorityscore=1501 mlxlogscore=999 adultscore=0 spamscore=0 lowpriorityscore=0 bulkscore=0 impostorscore=0 malwarescore=0 mlxscore=0 cotscore=-2147483648 phishscore=0 classifier=spam adjust=0 reason=mlx scancount=1 engine=8.12.0-2004280000 definitions=main-2005140204
X-Proofpoint-Spam-Details: rule=notspam policy=default score=0 bulkscore=0 suspectscore=0 malwarescore=0 adultscore=0 spamscore=0 phishscore=0 mlxlogscore=999 mlxscore=0 classifier=spam adjust=0 reason=mlx scancount=1 engine=8.12.0-2004280000 definitions=main-2005140204
Archived-At: <https://mailarchive.ietf.org/arch/msg/tsvwg/Ta4cdTFe0QLFA8PtKP8_qvhDvto>
Subject: Re: [tsvwg] David Black (individual) on safety of L4S for the Internet
X-BeenThere: tsvwg@ietf.org
X-Mailman-Version: 2.1.29
Precedence: list
List-Id: Transport Area Working Group <tsvwg.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/tsvwg>, <mailto:tsvwg-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/tsvwg/>
List-Post: <mailto:tsvwg@ietf.org>
List-Help: <mailto:tsvwg-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/tsvwg>, <mailto:tsvwg-request@ietf.org?subject=subscribe>
X-List-Received-Date: Fri, 15 May 2020 00:03:53 -0000

Bob,
[still posting as an individual, not as WG chair]

> Firstly an appeal to everyone to stop talking about wiping the ECN field
> as if it is acceptable. Bleaching ECN is not a safety mechanism, except
> as a last resort. Treating ECT(1) /as if/ it is Not-ECT is far
> preferable to wiping it so it /is/ Not-ECT.

I concur with that appeal ... but ...

... We've been through an analogous adventure with DSCP bleaching, as RFC 2474 recommends that behavior for DSCPs (treat unknown DSCPs as best effort without changing the DSCP) but the network operators went ahead and bleached DSCPs at network boundaries, as described in Section 1 of RFC 8100 (https://www.rfc-editor.org/rfc/rfc8100.html#section-1).  I strongly suggest reviewing that history towards understanding why things turned out that way.

> Consider an RFC3168 AQM in network A, and an L4S or RFC3168 ECN AQM in
> network B downstream. If network A wipes the ECN field, 

To be specific, my understanding of the wiping under discussion is to rewrite ECT(1) to Not-ECT, not zero out all ECN field values (e.g., rewriting CE to Not-ECT is very wrong and dangerous).  In particular, ECT(0) would not be wiped.

> but the
> bottleneck is in network B, then the wiping destroyed the ECN service in
> network B, with no safety benefit in network A.

But there may be a safety benefit in network B.  Suppose a flow uses DCTCP and the RFC 3168 bottleneck in network B drops a Not-ECT packet that it would have been marked CE if network A had not wiped its ECT(1) mark to Not-ECT.  That drop triggers DCTCP's drop reaction, which is safe for an RFC3168 bottleneck, in contrast to DCTCP's CE-mark reaction, which is not.  Please refer to the prior discussion with Neal Cardwell on DCTCP's differing reactions to drops vs. CE-marks.

Now for the good news (perhaps) ... on this concern:

> Some non-participating networks will be willing to actively take such
> measures. Others won't. Some might be unaware of the L4S experiment.
> Clearly a safety case is weaker if it requires action by
> non-participants. But that doesn't rule it out.

I generally agree.  Over in the IETF Security area, there's a long track record of dealing with this sort of situation, where a counter-measure may be vitally necessary in some cases, but not in others, via the use of "MUST implement, MAY use" requirements.  Such requirements ensure that the counter-measure will be available if a network operator discovers that it is needed.  Among the reasons that this approach makes sense here is that the measures under discussion may be needed by a network operator to counter denial-of-service attacks that take advantage of the L4S low-latency service.

Returning to Alex's original question:

> So I was wondering what your position is, regarding third party actions being necessary  as part of a safety case -
> what limitations should there be, on  third party actions that a safety case may necessitate?

At a minimum, the third parties MUST have the tools readily available to take any safety actions that may become necessary.   Analogy - a fire inspector is not interested in whether the building owner could buy a fire extinguisher at a nearby store - the fire extinguisher has to be installed and maintained so that it's readily available if needed.

Beyond that, I welcome discussion on how to reduce the occurrence of situations in which such actions become necessary.

Thanks, --David (as an individual)

> -----Original Message-----
> From: Bob Briscoe <in@bobbriscoe.net>
> Sent: Thursday, May 14, 2020 4:54 PM
> To: alex.burr@ealdwulf.org.uk; tsvwg@ietf.org; Black, David
> Subject: Re: [tsvwg] David Black (individual) on safety of L4S for the Internet
> 
> 
> [EXTERNAL EMAIL]
> 
> Alex, David, all,
> 
> Firstly an appeal to everyone to stop talking about wiping the ECN field
> as if it is acceptable. Bleaching ECN is not a safety mechanism, except
> as a last resort. Treating ECT(1) /as if/ it is Not-ECT is far
> preferable to wiping it so it /is/ Not-ECT.
> 
> Consider an RFC3168 AQM in network A, and an L4S or RFC3168 ECN AQM in
> network B downstream. If network A wipes the ECN field, but the
> bottleneck is in network B, then the wiping destroyed the ECN service in
> network B, with no safety benefit in network A.
> 
> Now to your point, Alex, pls see inline...
> 
> 
> On 14/05/2020 18:03, alex.burr@ealdwulf.org.uk wrote:
> > Hi David,
> >   you write "In contrast to reliance on TCP Prague, that combination of FQ and
> bleaching looks like it could provide a robust safety case."
> >
> > Some of those who have responded to the consensus call seem to
> assume  that a safety case should not necessitate any action on the part of third
> parties, eg operators who are running RFC3168 AQMs. That you reject
> bleaching not on that ground, but because it would nobble the use of ECT(1),
> makes me wonder if your position is more nuanced.
> >
> > Some responders are evidently more  relaxed about third parties needing to
> act in order to maintain effective  congestion control on the internet, as
> evidenced by their willingness to contemplate ECT(1) bleaching.
> >
> > If action on the part of third parties is allowed to be necessary as part of a
> safety case, as long as that action is sufficiently easy, then it seems possible
> that an action could be found which does make L4S safe without making ECT(1)
> bleaching likely, or make it  limited in scope. For example, maybe there is a
> simple way for operators to signal to endpoints that RFC3168 AQMs are in use.
> So I was wondering what your position is, regarding third party actions being
> necessary  as part of a safety case - what limitations should there be, on  third
> party actions that a safety case may necessitate?
> 
> [BB] Regarding safety actions by nodes or networks not taking part in
> the ECT(1) experiment; I don't think the real question is whether a
> safety case is 'allowed' to include these. As long as a proposal clearly
> states which measures would need non-participant action, then we can all
> decide how much weight to give their proposal.
> 
> Some non-participating networks will be willing to actively take such
> measures. Others won't. Some might be unaware of the L4S experiment.
> Clearly a safety case is weaker if it requires action by
> non-participants. But that doesn't rule it out.
> 
> This whole ECT(1) question does not have a formula that gives a correct
> answer. Different people weigh different factors more strongly than
> others, and the current quest is to find out which factors weigh most
> heavily for most people.
> 
> For instance, if there is a simple way to detect any problems and
> configure RFC3168 AQMs to be safer, some people will find that to be an
> acceptable compromise if they believe that single-queue RFC3168 AQMs are
> likely to be rare, even though they would not accept such a compromise
> if these AQMs were widespread. Others see safety as an absolute matter.
> For them, an inherently safe signalling system is paramount,
> particularly if they are unsure whether single-queue RFC3168 AQMs are
> rare. Others don't see this as a safety issue anyway, because the
> unfairness disappears at low link rates.
> 
> 
> Bob
> >
> > Alex
> >
> >
> >
> > On Friday, May 8, 2020, 9:10:18 PM GMT+1, Black, David
> <david.black@dell.com> wrote:
> >
> >
> >
> >
> >
> >
> >
> >
> > This the longer explanation of why I find myself in group 2 on the ECT(1)
> question because “If you believe L4S will not be safe for the internet without
> significant architectural changes, you are in this group.”
> >
> >
> >
> > Current practice is not to mix DCTCP-like traffic (1/p-class congestion control)
> with TCP-like traffic (1/sqrt(p)-class congestion control, e.g., NewReno) in the
> same queue because the DCTCP-like traffic outcompetes the TCP-like traffic to
> the point of starvation of the latter.  By using ECT(1) as the only classifier for
> low-latency traffic, L4S causes mixing of those two classes of traffic at network
> nodes that have not been modified to use ECT(1) as a classifier.  Hence the L4S
> experiment proponents are responsible for the safety of that traffic mixing at
> unmodified nodes.  I understand the L4S approach to achieving safety at
> unmodified nodes to be use of TCP Prague, specifically its heuristics that detect
> RFC 3168 bottlenecks.  As previously discussed, this traffic mixing does not
> cause problems at otherwise unmodified nodes that use FQ.
> >
> >
> >
> > For the proposed Internet-wide L4S experiment, the technology to be tested is
> necessarily experimental, but the safety of the experiment needs to be
> fundamental to avoid serious damage if things go wrong.  I do not currently see
> a strong safety case for L4S+TCP Prague – an example of such a strong safety
> case can be found in QUIC congestion control, where the fact that it is based on
> NewReno congestion control provides strong assurance that QUIC congestion
> control is safe for the Internet.   In contrast, TCP Prague is still research (it’s
> great research and I applaud the people who have invested their time and
> effort in it for what has been achieved), but a safety case ought not to be based
> on not-yet-stable research, and I don’t think another 6 months of testing and
> bug fixing will leave TCP Prague as anything other than research (ruling out
> group 3 for me).  Further, the L4S low-latency service will likely be used by
> protocols other than TCP Prague, which may not receive the level of scrutiny
> and testing that has been applied to TCP Prague.  The safety case needs to
> come from elsewhere.
> >
> >
> >
> > If ECT(1)-marked traffic starts causing problems, network operators are not
> going to wait for TCP Prague or other protocol implementations to be patched
> – they’re going to take action, e.g., as Neal Cardwell describes (and I’ve heard
> about this sort of potential consequence in other conversations, so please don’t
> blame Neal for this):
> >
> >
> >
> >> - L4S flows potentially causing unfairness in RFC3168 ECN bottlenecks has
> been mentioned as a potential concern. However, a robust RFC3168 ECN
> bottleneck
> >> should already have a mechanism to avoid unfairness caused by flows that
> are marked as ECT(0|1) and yet not performing RFC3168 responses. In
> particular,
> >> many of the large sources of known deployments of  RFC3168 --  Linux
> fq_codel and cake -- are already deployed with fair queueing. In such
> bottlenecks L4S
> >> traffic should not cause harm to other non-L4S flows. Furthermore, if there
> really are ISPs with deployments of RFC3168 bottlenecks that have neither FQ
> nor
> >> any other protection from non-RFC3168-ECT(1) flows, then they can bleach
> incoming ECT(1) code points to Not-ECT and treat L4S as Not-ECT (ISPs typically
> >> already transform the DSCP byte at their ingress anyway). So I do not see
> harm to RFC3168 ECN bottlenecks as a prohibitive concern.
> >
> >
> > In contrast to reliance on TCP Prague, that combination of FQ and bleaching
> looks like it could provide a robust safety case.  It would be most unfortunate if
> things wind up depending on this, especially bleaching, as the fact that ECT(1) is
> not bleached at network boundaries was a major reason for selection of ECT(1)
> as the identifier for low-latency L4S traffic.  Among the implications is that if
> the L4S experiment fails, that bleaching could be around much longer, making
> it infeasible to use ECT(1) for anything else Internet-wide.  In my view, it is the
> responsibility of the L4S proponents to design the L4S  technology and structure
> the experiment in a fashion that makes ECT(1) bleaching unlikely and/or likely
> to be limited in scope if it happens.
> >
> >
> >
> > Thanks, --David
> >
> > ----------------------------------------------------------------
> >
> > David L. Black, Sr. Distinguished Engineer, Dell EMC
> >
> > Dell Technologies, Infrastructure Systems Group
> >
> > 176 South St., Hopkinton, MA  01748
> >
> > +1 (774) 350-9323           Mobile: +1 (978) 394-7754
> >
> > David.Black@dell.com
> >
> > ----------------------------------------------------------------
> >
> >
> >
> >
> >
> >
> 
> --
> ________________________________________________________________
> Bob Briscoe                               http://bobbriscoe.net/
>