Re: [tsvwg] Reasons for WGLC/RFC asap

Greg White <g.white@CableLabs.com> Fri, 20 November 2020 00:42 UTC

Return-Path: <g.white@CableLabs.com>
X-Original-To: tsvwg@ietfa.amsl.com
Delivered-To: tsvwg@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 4287D3A142E for <tsvwg@ietfa.amsl.com>; Thu, 19 Nov 2020 16:42:14 -0800 (PST)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -2.1
X-Spam-Level:
X-Spam-Status: No, score=-2.1 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, DKIM_SIGNED=0.1, DKIM_VALID=-0.1, DKIM_VALID_AU=-0.1, DKIM_VALID_EF=-0.1, HTML_MESSAGE=0.001, RCVD_IN_MSPIKE_H2=-0.001, SPF_PASS=-0.001, URIBL_BLOCKED=0.001] autolearn=ham autolearn_force=no
Authentication-Results: ietfa.amsl.com (amavisd-new); dkim=pass (2048-bit key) header.d=cablelabs.com
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id EGzHdCkA_-M1 for <tsvwg@ietfa.amsl.com>; Thu, 19 Nov 2020 16:42:12 -0800 (PST)
Received: from NAM10-BN7-obe.outbound.protection.outlook.com (mail-bn7nam10on2105.outbound.protection.outlook.com [40.107.92.105]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id A31893A142D for <tsvwg@ietf.org>; Thu, 19 Nov 2020 16:42:11 -0800 (PST)
ARC-Seal: i=1; a=rsa-sha256; s=arcselector9901; d=microsoft.com; cv=none; b=VwlSzlmkS0EiIsZvRf61KPIHLSpKmlNyN2xl8X+BKLp7TLtrTGzyDFBDrodDeCjq2r7/HW/ThlzRw64VgqQym1s+3X9yQyE37l2rAeJ/ARKhtXOQX+Aif4JDGvaIkn46hmntOXNYkv2UxMViWYz15JOIKty9ihToG4J7jUlf582+bBDjFpqjay/Kq/vE+ILHm23dMSlxO5rjdtXPOlrxvNgtQz2sQbo7R5sf29Vpu1NE3VQZiTUSVv1Lutu/sCQVIFTYfJh3CP6aWVMDhG9uhax8MrTCzm8BHQjnSZyLMO3tSwLjH0R7la83W0JN+EyQWrWV5241Y/PNy2QxcQSnRQ==
ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=microsoft.com; s=arcselector9901; h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-SenderADCheck; bh=LjARr2Tu/QN0ca2pzerP+xvvEcNck5B5c1wo8VUFxoY=; b=VysoEH/jDsDJyqlAt9xCZf2ci5UCOv4KbeEF1gJq/XXRI2dCwT7Dt2LCDmmM75j4sG/W13LwvdyizvGh1dtV3PvSU7H6RLfEd3QyN2pGS9kjggMWqPGGKByec5T5+Rhgahuem4dEVIiEV7yhPho9EMvexws4uTRfnc2yfZDo9vRlXWgwZER4qhH35utheiOi4WG5qa6myf9jI8EROoy/q5qgpggkLCt+wF0rjduG+lOhQC/0kEZ+wovfdNE6VxBLDPofXfktuUpIXohPbu1C/z5z80I/yweJrvkqEMdWnubbM+DO0IM7RjGyh0JDWfepNI2r3UxT2D4hz2v9JEXbdw==
ARC-Authentication-Results: i=1; mx.microsoft.com 1; spf=pass smtp.mailfrom=cablelabs.com; dmarc=pass action=none header.from=cablelabs.com; dkim=pass header.d=cablelabs.com; arc=none
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=cablelabs.com; s=selector2; h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-SenderADCheck; bh=LjARr2Tu/QN0ca2pzerP+xvvEcNck5B5c1wo8VUFxoY=; b=bu5sNK6A+2OvnHiJjUiEW5uKfQ8Rk7qWQgcVPoOKkl3WnjUdyt+8TXAEqjmjAjdQq4FA9Tq65dzP1UREWDxysAsrMAzTrmTtVs0bkeWrZ1ib47unv39Pknop6D4VaJv3g5p5hAUvigxXUrkz1RNdHvF9c4jOm5TAet1U0nm5QZbrzs7fZP9jVopAdgVvKBFJmi/aM7nKflCycBOvNqa5G16fdhzSiGUqtm/VdVJqEM9y9zVKQavFsQgPxtYN8TInhr7wubsxi3cToFXVasfjWb7BCnSoIWghvuzVhKjiHxOUOB11IiC20oPPPwtHGBfQwuklQO9iDzAmcBsUKKl6zA==
Received: from CY4PR0601MB3713.namprd06.prod.outlook.com (2603:10b6:910:92::10) by CY4PR06MB2373.namprd06.prod.outlook.com (2603:10b6:903:d::16) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id 15.20.3541.25; Fri, 20 Nov 2020 00:42:06 +0000
Received: from CY4PR0601MB3713.namprd06.prod.outlook.com ([fe80::e03a:dba6:a8d0:17e0]) by CY4PR0601MB3713.namprd06.prod.outlook.com ([fe80::e03a:dba6:a8d0:17e0%7]) with mapi id 15.20.3499.034; Fri, 20 Nov 2020 00:42:06 +0000
From: Greg White <g.white@CableLabs.com>
To: Pete Heist <pete@heistp.net>, Gorry Fairhurst <gorry@erg.abdn.ac.uk>
CC: tsvwg IETF list <tsvwg@ietf.org>
Thread-Topic: [tsvwg] Reasons for WGLC/RFC asap
Thread-Index: Ada9kaHRGNO57vIZSgq7zPn1SuIYhAA/oM4AAABxjAAAB0DVgP//2LmA
Date: Fri, 20 Nov 2020 00:42:06 +0000
Message-ID: <60207B2F-29A6-4E7C-B0F9-AA79F86B7C3F@cablelabs.com>
References: <AM8PR07MB747626CB7622CB89209018A8B9E10@AM8PR07MB7476.eurprd07.prod.outlook.com> <507f049aba1d228cb122545702f1ab9e51467745.camel@heistp.net> <b1d743be-4df0-c9c4-2839-3156df509628@erg.abdn.ac.uk> <559f0accc589e902590f17d78dde719802d5dc96.camel@heistp.net>
In-Reply-To: <559f0accc589e902590f17d78dde719802d5dc96.camel@heistp.net>
Accept-Language: en-US
Content-Language: en-US
X-MS-Has-Attach:
X-MS-TNEF-Correlator:
user-agent: Microsoft-MacOutlook/16.42.20100402
authentication-results: heistp.net; dkim=none (message not signed) header.d=none;heistp.net; dmarc=none action=none header.from=CableLabs.com;
x-originating-ip: [98.245.82.7]
x-ms-publictraffictype: Email
x-ms-office365-filtering-correlation-id: 2d94d096-8c9e-445f-7146-08d88ced1b5b
x-ms-traffictypediagnostic: CY4PR06MB2373:
x-microsoft-antispam-prvs: <CY4PR06MB2373FC7D4F24CA996C7142FCEEFF0@CY4PR06MB2373.namprd06.prod.outlook.com>
x-ms-oob-tlc-oobclassifiers: OLM:10000;
x-ms-exchange-senderadcheck: 1
x-microsoft-antispam: BCL:0;
x-microsoft-antispam-message-info: dB4pHlRfp8e0b8W3Ky36mVXUI3/CBE+JKYRr3i9lQAkU9NFT3R8E0R/sgGcxBg551WhY3h3W6S70VBAiSk1TlfEpLvZrD/QV+gBj3g3rqDiD4XPLoVD+pojPis3iRQqnobVGUba8fYkeICdHZ1IrwG+vwxYmOw3QJcqd0NdOc/gshkxSA6q2JtULx6BpU9uTr4KP3g8hm+RmzbWjCDFgTPwpl+bxLdln8tGFGlxpaxnvRtNZ5pQk0/qMSX0BNw2lpKvobXkU4QoAoSHzCtFgTzwFVF2c/B29zrT1d4FAF5bave05fiEVGvc8N1ULWnEtZmXd5C/WRiUPE/fai0YKQEkn48sUvIZfiOrimPmEwLfipElFGEb9CyZLvakP4J6oFZDMsEaKfDkgTaS99J5RIjPJZOcvuSgTVduZYEgP6RMcbOVtatgQqCsm6je31cqodhTIEP8Ftrdd6qxNkVst8A==
x-forefront-antispam-report: CIP:255.255.255.255; CTRY:; LANG:en; SCL:1; SRV:; IPV:NLI; SFV:NSPM; H:CY4PR0601MB3713.namprd06.prod.outlook.com; PTR:; CAT:NONE; SFS:(39850400004)(396003)(376002)(366004)(136003)(346002)(8936002)(166002)(66446008)(8676002)(66574015)(6486002)(186003)(64756008)(83380400001)(66556008)(966005)(478600001)(66946007)(4001150100001)(66476007)(76116006)(5660300002)(26005)(36756003)(2906002)(86362001)(71200400001)(33656002)(9326002)(4326008)(316002)(2616005)(53546011)(110136005)(6506007)(6512007)(85282002); DIR:OUT; SFP:1102;
x-ms-exchange-antispam-messagedata: 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
x-ms-exchange-transport-forked: True
Content-Type: multipart/alternative; boundary="_000_60207B2F29A64E7CB0F9AA79F86B7C3Fcablelabscom_"
MIME-Version: 1.0
X-OriginatorOrg: cablelabs.com
X-MS-Exchange-CrossTenant-AuthAs: Internal
X-MS-Exchange-CrossTenant-AuthSource: CY4PR0601MB3713.namprd06.prod.outlook.com
X-MS-Exchange-CrossTenant-Network-Message-Id: 2d94d096-8c9e-445f-7146-08d88ced1b5b
X-MS-Exchange-CrossTenant-originalarrivaltime: 20 Nov 2020 00:42:06.5831 (UTC)
X-MS-Exchange-CrossTenant-fromentityheader: Hosted
X-MS-Exchange-CrossTenant-id: ce4fbcd1-1d81-4af0-ad0b-2998c441e160
X-MS-Exchange-CrossTenant-mailboxtype: HOSTED
X-MS-Exchange-CrossTenant-userprincipalname: BWgWc/v2LiFOUOyr8/5GYZYzu81j7CQjoNzszo/XUklTTBPqmd6O62XRVqsH0DBafPnBOmuTM4S495qwBTmNxA==
X-MS-Exchange-Transport-CrossTenantHeadersStamped: CY4PR06MB2373
Archived-At: <https://mailarchive.ietf.org/arch/msg/tsvwg/Org88XYw_6VelsvG811W9VSzS08>
Subject: Re: [tsvwg] Reasons for WGLC/RFC asap
X-BeenThere: tsvwg@ietf.org
X-Mailman-Version: 2.1.29
Precedence: list
List-Id: Transport Area Working Group <tsvwg.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/tsvwg>, <mailto:tsvwg-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/tsvwg/>
List-Post: <mailto:tsvwg@ietf.org>
List-Help: <mailto:tsvwg-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/tsvwg>, <mailto:tsvwg-request@ietf.org?subject=subscribe>
X-List-Received-Date: Fri, 20 Nov 2020 00:42:14 -0000

Hi Pete,

Thanks for summarizing your concerns.

As others have pointed out, it is believed that the vast majority of RFC3168 implementations are fq_codel/CAKE instances, so this is an important situation to understand.

I think that it has also been pointed out that these implementations are all software upgradable, and many of them are run on systems that automatically (or readily at least) receive updates that address security vulnerabilities, fix bugs, make performance or feature enhancements, etc.

Is it possible that in these software implementations, the LSB of the ECN field can be added to the FQ flow identifier, thus allowing the FQ to segregate the L4S traffic in the tunnel from the Classic traffic?  If so, would that solve this problem?  Is that an experiment that you’d be willing to try?

It would be good also to test this with the low CE threshold enabled for queues that contain ECN==*1 as well.  These seem like two really simple changes that could propagate into the fq_codel/CAKE deployed base along the timelines that it will take for L4S experimentation to ramp up.

-Greg

From: tsvwg <tsvwg-bounces@ietf.org> on behalf of Pete Heist <pete@heistp.net>
Date: Thursday, November 19, 2020 at 1:03 PM
To: Gorry Fairhurst <gorry@erg.abdn.ac.uk>
Cc: tsvwg IETF list <tsvwg@ietf.org>
Subject: Re: [tsvwg] Reasons for WGLC/RFC asap

On Thu, 2020-11-19 at 16:34 +0000, Gorry Fairhurst wrote:
On 19/11/2020 16:22, Pete Heist wrote:

Hi Koen,

Rather than thinking of this as advantages and disadvantages to waiting, I see it as an engineering process. It was decided earlier this year that the L4S proposal has enough support to continue, so we're on that path now. Part of that decision, as I understood it, also recognized that there are valid safety concerns around compatibility with existing AQMs, and some solution needs to be devised.

RFC3168 bottleneck detection was added to TCP Prague, which appears to be difficult to do reliably when there is jitter or cross-flow traffic, and it has since been disabled in the reference implementation. The l4s-ops draft was started, but isn't complete yet and may need WG adoption as part of a LC. We can then decide how effective the proposed mitigations are against the risks and prevalence.

To start a WGLC now would circumvent that earlier recognition that a safety case needs to be made. Meanwhile, since testing showed that tunnels through RFC3168 FQ AQMs are a straightforward path to unsafe flow interaction, along with other issues relative to the goals, it doesn't seem like the engineering process is done just yet.


By the way, I liked your data - and it helped me a lot to look at this, thanks very much for doing this.
I'm glad, as I think we're at our best when we're doing engineering and producing data. I wish it were easier to do!

It would help me if you clarify what you mean by  "unsafe" - to me "safety" relates to traffic unresponsive to drop, as in CBR traffic, etc. I've not understood how CE-marked traffic can erode safety, but maybe I missed something?
Sure, so the existing RFC3168 CE signal in use on the Internet today indicates an MD (multiplicative decrease), whereas the redefined CE signal in L4S indicates an AD (additive decrease). Two congestion controls responding to CE in a different way, or one that responds to CE with an AD and one that responds only to drop (i.e. all standard congestion controls that advertise Not-ECT), will not interact safely in the same RFC3168 signaling queue. We're probably on the same page here already, but I'll refer to section 5 of RFC8257.

That is one of the reasons why ECT(1) is used in L4S to place L4S flows in the L queue- to keep them separate from conventional flows in the C queue. As long as flows have advertised their capability correctly, that works.

However, existing RFC3168 queues do not have knowledge of L4S, therefore will not know that ECT(1) means that traffic needs to be segregated and signaled in a different way. They will signal a Prague flow, which sets ECT(1), with CE, expecting the flow to respond with an MD, rather than AD. Meanwhile they'll signal an RFC3168 or non-ECN flow with either CE or drop, and in either case the flow will respond with an MD, causing conventional flows to yield to Prague flows to varying degrees depending on the AQM in use.

Here's an example of CUBIC and Prague when they end up in the same fq_codel queue:
http://sce.dnsmgr.net/results/l4s-2020-11-11T120000-final/l4s-s6-rfc3168-1q/l4s-s6-rfc3168-1q/l4s-s6-rfc3168-1q-ns-prague-vs-cubic-fq_codel-50Mbit-20ms_tcp_delivery_with_rtt.svg

Here's a more extreme example of Reno and Prague sharing a single PIE queue with ECN enabled (less common):
http://sce.dnsmgr.net/results/l4s-2020-11-11T120000-final/l4s-s6-rfc3168-1q/l4s-s6-rfc3168-1q/l4s-s6-rfc3168-1q-ns-prague-vs-reno-pie-50Mbit-20ms_tcp_delivery_with_rtt.svg

In the example with PIE, Reno appears to be driven at or close to minimum cwnd. In the fq_codel example, the steady state throughput of Prague:CUBIC is around 19:1. We've seen a range in the Codel case from around 12:1 to 20:1. In my opinion, we could use the word "unsafe" here in both cases.

I'm not sure why "tunnels have crept in here. There have always been side-effects with classification (and hence scheduling), but I don't see new issues relating to "tunnels" with ECN.
Tunnels are relevant because they provide an easy practical path to the unsafe flow interaction described above. The widely used fq_codel qdisc has ECN enabled by default. Fortunately, because it has flow-fair queueing, Prague flows and conventional flows are usually placed in a separate queue (hash collisions aside), causing Prague to only affect itself with additional delay (TCP RTT). However, a tunnel's encapsulated packets all share the same fq_codel queue because they all have the same 5-tuple, so there is unsafe interaction between the tunnel's flows. Here we use Wireguard through fq_codel:

http://sce.dnsmgr.net/results/l4s-2020-11-11T120000-final/l4s-s5-tunnel/l4s-s5-tunnel-phys-wireguard-prague-vs-cubic-fq_codel-50Mbit-20ms_tcp_delivery_with_rtt.svg

I'll leave it to the WG to come up with examples of what types of tunnels and traffic scenarios could lead to this, but one example is a user who has a privacy VPN on their PC, and fq_codel on their home gateway. Let's say one flow connects to an L4S capable server, and another flow to a non-L4S, conventional server. The L4S flow will dominate the non-L4S one (whether it's ECN capable or not), probably causing some level of poor service, perhaps for a video stream, download, or whatever.

I'm not commenting on when the Chairs think a WGLC will provide useful information, we'll say that in due course.
Ok, I trust that we'll engage enough disinterested people into congestion control who will add their input.

Thanks Gorry for looking this over. :)

Best wishes,

Gorry

Regards,
Pete

On Wed, 2020-11-18 at 10:31 +0000, De Schepper, Koen (Nokia - BE/Antwerp) wrote:

Hi all,

To continue on the discussions in the meeting, a recap and some extra thoughts. Did I miss some arguments?

Benefits to go for WGLC/RFC asap:

·         There is NOW a big need for solutions that can support Low Latency for new Interactive applications

·         The big L4S benefits were a good reason to justify the extra network effort to finally implement ECN in general and AQMs in network equipment

·         Timing is optimal now: implementations in NW equipment are coming and deployment can start now

·         Deployment of L4S support will include deployment of Classic ECN too! So even for the skeptics among us, that consider that the experiment can fail due to CCs not performing to expectations, we will fall back to having Classic ECN support

·         Current drafts are about the network part, and are ready and stable for a very long time now.

·         Only dependency to CCs in the drafts are the mandatory Prague requirements (only required input/review from future CC developers: are they feasible for you)

·         We have a good baseline for a CC (upstreaming to Linux is blocked by the non-RFC status)

·         Larger scale (outside the lab) experiments are blocked by non-RFCs status

·         It will create the required traction within the CC community to come up with improvements (if needed at all for the applications that would benefit from it; applications that don’t benefit from it yet, can/will not use it)

·         NW operators have benefits now (classic ECN and good AQMs) and in the future can offer their customers better Low Latency experience for the popular interactive applications

·         When more L4S CCs are developed, the real independent evaluation of those can start

Disadvantages to wait for WGLC/RFC:

·         We’ll gets stuck in an analysis paralysis (aren’t we already?)

·         Trust in L4S will vanish

·         No signs that we can expect more traction in CC development; trust and expectations of continuous delays will not attract people working on it, as there will be plenty of time before deployments are materializing

·         Product development of L4S will stall and die due to uncertainty on if L4S will finally materialize

·         Product development of Classic ECN will stall and die due to uncertainty on how L4S will finally materialize

What are the advantages to wait? Do they overcome these disadvantages?

Regards,
Koen.




-->