Re: [tsvwg] L4S: Guard DSCP

Pete Heist <pete@heistp.net> Mon, 03 May 2021 07:42 UTC

Return-Path: <pete@heistp.net>
X-Original-To: tsvwg@ietfa.amsl.com
Delivered-To: tsvwg@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id A14253A0E72 for <tsvwg@ietfa.amsl.com>; Mon, 3 May 2021 00:42:21 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -1.998
X-Spam-Level:
X-Spam-Status: No, score=-1.998 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, DKIM_SIGNED=0.1, DKIM_VALID=-0.1, DKIM_VALID_AU=-0.1, DKIM_VALID_EF=-0.1, HTML_MESSAGE=0.001, HTTPS_HTTP_MISMATCH=0.1, SPF_HELO_NONE=0.001, SPF_PASS=-0.001, URIBL_BLOCKED=0.001] autolearn=ham autolearn_force=no
Authentication-Results: ietfa.amsl.com (amavisd-new); dkim=pass (2048-bit key) header.d=heistp.net
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id 28nOazQ0RDzM for <tsvwg@ietfa.amsl.com>; Mon, 3 May 2021 00:42:16 -0700 (PDT)
Received: from mail-wr1-x434.google.com (mail-wr1-x434.google.com [IPv6:2a00:1450:4864:20::434]) (using TLSv1.2 with cipher ECDHE-RSA-AES128-GCM-SHA256 (128/128 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id 5D8873A0E73 for <tsvwg@ietf.org>; Mon, 3 May 2021 00:42:16 -0700 (PDT)
Received: by mail-wr1-x434.google.com with SMTP id m9so4477435wrx.3 for <tsvwg@ietf.org>; Mon, 03 May 2021 00:42:16 -0700 (PDT)
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=heistp.net; s=google; h=message-id:subject:from:to:cc:date:in-reply-to:references :user-agent:mime-version; bh=k6yDJp9iyxLg+Krq4bdm7oQXJjotdyXDu8RdSxRqbQs=; b=DtzmHMzAIyVEzdcPWRZ4C3ZE7TwOaEzWms4hYjEVuAryzh/f2BxG4bC299bpN34TUK OKK+h1riIIQJ6rMPduCh8HiL5ZTaUr9MYSR9deW9870M1pl21LHs5JF3Y7leUbsD2KKs eOX49tjXRMrju0fj5UFg4q0xtBYrvrmrr5WV/Y8twS06qgHVkG1QbtHq3jxvHOMg/aIn f/hSIRofZXqeJkXvjkJ3vx9yH9HDRNJm4ovp12Zp0x3r9ABrTd35RdFUcb4zB7Ej4lvf /KvtRu/v//yOPROAqoFkXaUQevhaHloZDOpsTqVm33y97+xy3z+mKjAxwBfY3kjdt8xy uwOA==
X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20161025; h=x-gm-message-state:message-id:subject:from:to:cc:date:in-reply-to :references:user-agent:mime-version; bh=k6yDJp9iyxLg+Krq4bdm7oQXJjotdyXDu8RdSxRqbQs=; b=tqD6sS9XHNWvNhFBpm9xmy8FRHQiToOMgsWssvB6JsWxICjAg5Ndmy0h9NAUCjm+7K Ap1IHPySGvfW5+xa+FAIj84yDKfFk72vW5Jd+JrphdePk5I3oE6NN8IEOTMFUMBTM/9t nK09P0fymDjvbOD7bwjqfDADZw96g/bup/+cVKqP5ZBWEitixm2BJq5vdQqCcM5bc1I7 yA2DAim8maOZIOtwRXc/gNZr1TkIfNYfx5HY1WLixTZXiJUgP1hXXj+ATKg4AWDL/r4V swbPcIe5tBQ2JefIFa3y89EpLttfUMK3RGY/VdfmP7zcaeU3G867esF/HX+Y7AG7dMJx iFjA==
X-Gm-Message-State: AOAM531YbnwOdrfx7x1OkZK8lGhADBhWwHlL1LKFHhL4dWy5mNX2Pvar 1VrLdT854svhSXgU9vyUb5cjww==
X-Google-Smtp-Source: ABdhPJxTTixOTyQLN7eUrW12x3dzeOvN2I3MArOTEISBgK7rXo86C99RbLdDQdBg+UnYfUdlf7v+bw==
X-Received: by 2002:a05:6000:144f:: with SMTP id v15mr23067061wrx.182.1620027733924; Mon, 03 May 2021 00:42:13 -0700 (PDT)
Received: from [10.72.0.88] (h-1169.lbcfree.net. [185.193.85.130]) by smtp.gmail.com with ESMTPSA id s18sm11481416wro.95.2021.05.03.00.42.12 (version=TLS1_3 cipher=TLS_AES_256_GCM_SHA384 bits=256/256); Mon, 03 May 2021 00:42:13 -0700 (PDT)
Message-ID: <1cc7e0721ad545f9a282f36292bd08adc1f44bb9.camel@heistp.net>
From: Pete Heist <pete@heistp.net>
To: Greg White <g.white@CableLabs.com>
Cc: "C. M. Heard" <heard@pobox.com>, TSVWG <tsvwg@ietf.org>
Date: Mon, 03 May 2021 09:42:11 +0200
In-Reply-To: <DCA82FEF-4DA0-4612-ABAC-9FD4AE2D5AED@cablelabs.com>
References: <MN2PR19MB4045D7179410986A46C3E30783469@MN2PR19MB4045.namprd19.prod.outlook.com> <458e847061d1dd6a45bfa5bec046d201e88c8075.camel@heistp.net> <CACL_3VE3rfmAZewOCWTzfC5A9v7c2HgZ8NAxdt_5qKg5Rn0QNQ@mail.gmail.com> <a9e0781559a0ca4fcf02c225b67d3037bc56ea8f.camel@heistp.net> <02DBC945-B1D5-4A70-8906-E48831951C5C@gmx.de> <CACL_3VF8Nt-fH9RwncFVVvwicuON7A_R6JU8Y_OXqBwTOpdmKw@mail.gmail.com> <64AC29EE-2576-41C4-8411-7C66518A3853@gmail.com> <CACL_3VG3M-jFOHkCPCinnDP3G=gYU_0nnDz5Qwi9BJ501PrZFg@mail.gmail.com> <MN2PR19MB404525C9FD6052D0A195F44683429@MN2PR19MB4045.namprd19.prod.outlook.com> <CACL_3VGDd80FeqrH+8_2+Chbh-cT9-bpW-gfH7itSgXN3=_cbA@mail.gmail.com> <MN2PR19MB4045FE83AE49A3317476A6BD83419@MN2PR19MB4045.namprd19.prod.outlook.com> <C8C168F2-59F0-438D-9ACB-A63D1F310D91@cablelabs.com> <CACL_3VEa8kRBY20RRP5vWLwBGUcVkBD73rSjsiY82mkj0VN8aw@mail.gmail.com> <DCA82FEF-4DA0-4612-ABAC-9FD4AE2D5AED@cablelabs.com>
Content-Type: multipart/alternative; boundary="=-EcvI0XF9FFr4EtCPkoBQ"
User-Agent: Evolution 3.40.0
MIME-Version: 1.0
Archived-At: <https://mailarchive.ietf.org/arch/msg/tsvwg/LZlQE-pOwPW9ADm6zMzYqQfPzU4>
Subject: Re: [tsvwg] L4S: Guard DSCP
X-BeenThere: tsvwg@ietf.org
X-Mailman-Version: 2.1.29
Precedence: list
List-Id: Transport Area Working Group <tsvwg.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/tsvwg>, <mailto:tsvwg-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/tsvwg/>
List-Post: <mailto:tsvwg@ietf.org>
List-Help: <mailto:tsvwg-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/tsvwg>, <mailto:tsvwg-request@ietf.org?subject=subscribe>
X-List-Received-Date: Mon, 03 May 2021 07:42:22 -0000

On Fri, 2021-04-30 at 21:21 +0000, Greg White wrote:
>  
> 
> [GW] There has been little evidence shown of single queue RFC3168
> bottlenecks.  In Pete Heist’s data (one small ISP in Czech) the known
> instances of RFC3168 were all fq_codel, and the rest of the observed
> CE markings were agreed to likely be fq_codel or CAKE as well.
>  Similarly the earlier data from Apple showing some level of ECN
> marking in France were consistent with the reported fq_codel
> deployments by one of the ISPs there.  Also, I don’t believe that any
> ISP has come forward to state that they have single queue RFC3168
> bottlenecks in their network (and, given the amount of list traffic
> on this topic, I would assume that any ISP that monitors TSVWG would
> have self-identified by now).  

While the known RFC3168 AQM marking in this case was from fq_codel,
it's hard to say what the unknown marking was from
(https://datatracker.ietf.org/doc/draft-heist-tsvwg-ecn-deployment-observations/
). Those could be fq_codel/Cake, WiFi drivers in Linux (afaik including
ath9k, ath10k, mt76 and iwl drivers), or even if uncommon, single queue
AQMs in non-default switch configs. The latter could lead to all non-
L4S flows through a bottleneck, ECN capable or not, being dominated by
a single L4S flow.

Regarding WiFi: In my spare time I help administer a WiFi network that
includes five Open Mesh OM2P-HS APs (different ISP/region from where
the ECN data was collected). All of those APs received Linux's ath9k
drivers with fq_codel via an automatic update several years ago,
without my intervention. It's not possible in the admin interface to
disable it, but it is possible and even reasonable to turn Automatic
Updates off, which would add delay to any patches required by the L4S
experiment. Most users of this and other WiFi products are innocent
bystanders with no knowledge of RFC3168.

Coming back to the Guard DSCP topic, the discussion seems to show a
fault line on whether or not the L4S experiment needs to be contained
to participating networks. In my opinion, it does, and specifically
using DSCP, or an equivalent mechanism not involving the ECN bits
alone, so as to preserve their end-to-end passage. I think the history
of ToS and DSCP suggests that netops folks faced with (or just aware
of) problems will act using the simplest method available to them, i.e.
bleaching. The introduction of a signaling mechanism that isn't
compatible with RFC3168, a proposed standard which is currently in use,
would unfortunately invite that, and could make bleaching of the entire
DS byte routine.

Mike's proposal to use DSCP at the endpoints seems sensible to me,
avoiding any action on the ECN field in the network.

Pete

> > I recall from the lengthy discussion that went on about one year
> > ago (see,
> > e.g., https://mailarchive.ietf.org/arch/msg/tsvwg/ij5BqzNtMxKV8VbHE
> > 8pUevZjx7k/ [mailarchive.ietf.org]) that one of the big objections
> > to the use of a Guard DSCP as a means to contain the experiment is
> > that an L4S experimental domain does not map well to a DSCP domain,
> > and so the Guard DSCP may be inadvertently bleached (e.g. by
> > tunnels) inside the participating network. If correct, that
> > objection is hard to address.
> 
>  
> Mike Heard