[tsvwg] dave taht's rationale for option 3 on ect(1) (more testing)

Dave Taht <dave.taht@gmail.com> Sun, 17 May 2020 18:14 UTC

Return-Path: <dave.taht@gmail.com>
X-Original-To: tsvwg@ietfa.amsl.com
Delivered-To: tsvwg@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id EB8933A0BB0 for <tsvwg@ietfa.amsl.com>; Sun, 17 May 2020 11:14:56 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -0.198
X-Spam-Level:
X-Spam-Status: No, score=-0.198 tagged_above=-999 required=5 tests=[DKIM_SIGNED=0.1, DKIM_VALID=-0.1, DKIM_VALID_AU=-0.1, DKIM_VALID_EF=-0.1, FREEMAIL_FROM=0.001, SPF_HELO_NONE=0.001, SPF_PASS=-0.001, URIBL_BLOCKED=0.001] autolearn=ham autolearn_force=no
Authentication-Results: ietfa.amsl.com (amavisd-new); dkim=pass (2048-bit key) header.d=gmail.com
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id kyDeDxeKMz0b for <tsvwg@ietfa.amsl.com>; Sun, 17 May 2020 11:14:55 -0700 (PDT)
Received: from mail-io1-xd2a.google.com (mail-io1-xd2a.google.com [IPv6:2607:f8b0:4864:20::d2a]) (using TLSv1.2 with cipher ECDHE-RSA-AES128-GCM-SHA256 (128/128 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id 9A4B63A0B24 for <tsvwg@ietf.org>; Sun, 17 May 2020 11:14:55 -0700 (PDT)
Received: by mail-io1-xd2a.google.com with SMTP id o5so8172145iow.8 for <tsvwg@ietf.org>; Sun, 17 May 2020 11:14:55 -0700 (PDT)
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=gmail.com; s=20161025; h=mime-version:from:date:message-id:subject:to :content-transfer-encoding; bh=HV4uLT7mtBNiEjq+LeoQu1GR7DiJuZkzrtj0SRyC0Sw=; b=UCElZ/A+QC4kPTYqinT2xmo5i6B0Bl7rwMbNo7SEFO+go5mct7bzfHaF4m1U6L0+ej gPl6idJuLrKjBF344i/R/sKOOg0lp43Y/+N0PGwLBmezUX60OdyDpYWq4OIurcT2w2AZ 7LFaeP3dMpS6uKkhIDcVxWs1tzi/vXvoNpxiZHa0/EpcILMsVZT7LxDOFAdiXZhT9ZPb hjHY3gHl+7SD/bpGUwD7P7hpRAaiXjerypzAFVAHzRxoZXANuzh2ffXq8FQ4jcRtFb7w O0+tO8DZmegMvISXDWYvhARqxNITkfSZqiiVaUVirlz/oV6A+l5aaphjOO9LRNhZ0YIv oIkA==
X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20161025; h=x-gm-message-state:mime-version:from:date:message-id:subject:to :content-transfer-encoding; bh=HV4uLT7mtBNiEjq+LeoQu1GR7DiJuZkzrtj0SRyC0Sw=; b=BQGLcz+qhDwlRP0D5dEarzgY1ov1YRldjWJt7k35vb/H29PUz7A4Ue7FJfFIVxeMaG /yIi+umZuogAwOQ2lE1Yq1knlYzdf0S8dLXO/XkVeaDUJtfs6yR9etOFUNQJgzby6bF+ dsJiW9H+MiHuPpsh3NatYV33YAWsTw7fBTDKIGTvzqNcCPjhiGcHcqiZek+2UgIr/cEO u9pq5jvetOgUyHN1QBNVjI/p6Oa6xE3sU9RBmGoYNePKxHbY4pAeYWZk0iKeuRKszVGb m+ZvywOEL4L0LB8sw3Di0jlyVoDK+sBkeJvG4Oo1ZvvXSZAukWyKv8919o9re/K6eNHs pTLA==
X-Gm-Message-State: AOAM532e9r7/AgV7Pz8NVc/ksUrvC5R1n6f8pcf9C+tqr9svQLc1or5m foDOVoEi8/nKoYdXN7QTEjpB7u+MkY/6+C8qwBZchr/oTyg=
X-Google-Smtp-Source: ABdhPJz7XUjW3u68YxyD9qFvvtT5clCjGzXR/YVN+OGYDLMV3Jr3XYNst8m8PZONZzSUKPRNlFEprfVuoihZnhkXJrs=
X-Received: by 2002:a05:6638:1014:: with SMTP id r20mr12152707jab.29.1589739294537; Sun, 17 May 2020 11:14:54 -0700 (PDT)
MIME-Version: 1.0
From: Dave Taht <dave.taht@gmail.com>
Date: Sun, 17 May 2020 11:14:42 -0700
Message-ID: <CAA93jw5HHY6xA1NOxrqad-crY4mmhmiB7Gyga8RBEaz4ShGj8w@mail.gmail.com>
To: tsvwg IETF list <tsvwg@ietf.org>
Content-Type: text/plain; charset="UTF-8"
Content-Transfer-Encoding: quoted-printable
Archived-At: <https://mailarchive.ietf.org/arch/msg/tsvwg/Pr0D2tec6UM22f_9sZsR3pCv2VA>
Subject: [tsvwg] dave taht's rationale for option 3 on ect(1) (more testing)
X-BeenThere: tsvwg@ietf.org
X-Mailman-Version: 2.1.29
Precedence: list
List-Id: Transport Area Working Group <tsvwg.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/tsvwg>, <mailto:tsvwg-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/tsvwg/>
List-Post: <mailto:tsvwg@ietf.org>
List-Help: <mailto:tsvwg-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/tsvwg>, <mailto:tsvwg-request@ietf.org?subject=subscribe>
X-List-Received-Date: Sun, 17 May 2020 18:14:57 -0000

The codebases, simulations, etc, for the l4s and SCE approaches
are still in a very raw state. With these early implementations,
many problems have been identified, and only a few resolved. The
internet drafts and codebases are out of alignment, with new
bugs landing in the codebases and operating systems every time
someone takes them out for a spin.

Nearly all the tests bufferbloat.net considered basic in the
development of the original pie,
codel, and fq_codel aqms in the aqm working group as of 2004 have yet to be run.

Participants may weight the results differently, but adversarial tests
of all kinds
need to be run, regularly, in response to every change to the
specification and code,
in order to retain an accurate picture of the problems found, fixed, or ignored.

(I confess that much of my interest in lossless congestion control
comes from longer
 RTT near earth orbit, geo, and gto - and even more distant space-born
applications,
 which is a from-orbit viewpoint I suspect few here share)

To the greatest extent possible, tests to be performed in simulation
AND on a variety
of real hardware, AND in virtualized environments.

The recent bugs found in encapsulations need to be evaluated against more tunnel
types and operating systems. More shipping switches and hardware based
need to be tested and configured using ect(1) -> CE transitions, in
particular, to
see what happens.

Problems with legacy uses of the IP stack, for private and industrial
and embedded
r/t control use, have not been explored either. Examples include 6lowpan, and
other relatively unknown services in the ietf you can find in all the
other ethernet
packet types known to man.

The potential side effects on classic traffic, have been barely explored,
if at all. The impact on conventional udp and classic gaming, voice,
and DNS traffic
of the pie side of the l4s solution, (with the initial exploration of
the rrul_be test
showing up bugs galore), is largely unknown.

The true effects on the internet of senders such as the increasingly
available BBRv1 with RFC3168 ecn accidentally enabled deployment
needs analysis, as do the effects of a modestly or truly lying senders.

The costs and methods required to mitigate ECN-enabled DDOS attacks, also
is absent from analysis.

The side effects of essentially deprioritizing classic routing
protocols and other essential oam and maintenance packet types
(such as rip v2 (used on cable), ospf, Babel, ISIS, RA, ND and ARP),
needs to be explored.

The effects on existing deployed RFC3168 compliant multicast file
transports such as
uftp[1], needs to be tested.

Recognising “loss and mark” as an even stronger signal than either,
not thought about.
There's a long list of other more trivial things - dynamically
reducing mss size at cwnd 2 or less,
improving packet pacing to cope with sub cwnds, more fully exploring l4s-style
behaviors on unreliable, jittery networks such as wifi and lte, and chirping.

In short:

I see no reason for the IVTF to allocate the ECT(1) codepoint at this
time without
a ton more simulation and testing.

With a lot more robust, repeatable testing, good software engineering practices,
complete with regression tests, and continuous integration, and source code that
matches the internet drafts (and vice versa), perhaps we can all find
a way forward
closer to the goals of low latency and high throughput and the most
viable, safest,
use for this last half a bit in the IP header.


-- 
"For a successful technology, reality must take precedence over public
relations, for Mother Nature cannot be fooled" - Richard Feynman

dave@taht.net <Dave Täht> CTO, TekLibre, LLC Tel: 1-831-435-0729