[tsvwg] dave taht's rationale for option 3 on ect(1) (more testing)
Dave Taht <dave.taht@gmail.com> Sun, 17 May 2020 18:14 UTC
Return-Path: <dave.taht@gmail.com>
X-Original-To: tsvwg@ietfa.amsl.com
Delivered-To: tsvwg@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id EB8933A0BB0 for <tsvwg@ietfa.amsl.com>; Sun, 17 May 2020 11:14:56 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -0.198
X-Spam-Level:
X-Spam-Status: No, score=-0.198 tagged_above=-999 required=5 tests=[DKIM_SIGNED=0.1, DKIM_VALID=-0.1, DKIM_VALID_AU=-0.1, DKIM_VALID_EF=-0.1, FREEMAIL_FROM=0.001, SPF_HELO_NONE=0.001, SPF_PASS=-0.001, URIBL_BLOCKED=0.001] autolearn=ham autolearn_force=no
Authentication-Results: ietfa.amsl.com (amavisd-new); dkim=pass (2048-bit key) header.d=gmail.com
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id kyDeDxeKMz0b for <tsvwg@ietfa.amsl.com>; Sun, 17 May 2020 11:14:55 -0700 (PDT)
Received: from mail-io1-xd2a.google.com (mail-io1-xd2a.google.com [IPv6:2607:f8b0:4864:20::d2a]) (using TLSv1.2 with cipher ECDHE-RSA-AES128-GCM-SHA256 (128/128 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id 9A4B63A0B24 for <tsvwg@ietf.org>; Sun, 17 May 2020 11:14:55 -0700 (PDT)
Received: by mail-io1-xd2a.google.com with SMTP id o5so8172145iow.8 for <tsvwg@ietf.org>; Sun, 17 May 2020 11:14:55 -0700 (PDT)
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=gmail.com; s=20161025; h=mime-version:from:date:message-id:subject:to :content-transfer-encoding; bh=HV4uLT7mtBNiEjq+LeoQu1GR7DiJuZkzrtj0SRyC0Sw=; b=UCElZ/A+QC4kPTYqinT2xmo5i6B0Bl7rwMbNo7SEFO+go5mct7bzfHaF4m1U6L0+ej gPl6idJuLrKjBF344i/R/sKOOg0lp43Y/+N0PGwLBmezUX60OdyDpYWq4OIurcT2w2AZ 7LFaeP3dMpS6uKkhIDcVxWs1tzi/vXvoNpxiZHa0/EpcILMsVZT7LxDOFAdiXZhT9ZPb hjHY3gHl+7SD/bpGUwD7P7hpRAaiXjerypzAFVAHzRxoZXANuzh2ffXq8FQ4jcRtFb7w O0+tO8DZmegMvISXDWYvhARqxNITkfSZqiiVaUVirlz/oV6A+l5aaphjOO9LRNhZ0YIv oIkA==
X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20161025; h=x-gm-message-state:mime-version:from:date:message-id:subject:to :content-transfer-encoding; bh=HV4uLT7mtBNiEjq+LeoQu1GR7DiJuZkzrtj0SRyC0Sw=; b=BQGLcz+qhDwlRP0D5dEarzgY1ov1YRldjWJt7k35vb/H29PUz7A4Ue7FJfFIVxeMaG /yIi+umZuogAwOQ2lE1Yq1knlYzdf0S8dLXO/XkVeaDUJtfs6yR9etOFUNQJgzby6bF+ dsJiW9H+MiHuPpsh3NatYV33YAWsTw7fBTDKIGTvzqNcCPjhiGcHcqiZek+2UgIr/cEO u9pq5jvetOgUyHN1QBNVjI/p6Oa6xE3sU9RBmGoYNePKxHbY4pAeYWZk0iKeuRKszVGb m+ZvywOEL4L0LB8sw3Di0jlyVoDK+sBkeJvG4Oo1ZvvXSZAukWyKv8919o9re/K6eNHs pTLA==
X-Gm-Message-State: AOAM532e9r7/AgV7Pz8NVc/ksUrvC5R1n6f8pcf9C+tqr9svQLc1or5m foDOVoEi8/nKoYdXN7QTEjpB7u+MkY/6+C8qwBZchr/oTyg=
X-Google-Smtp-Source: ABdhPJz7XUjW3u68YxyD9qFvvtT5clCjGzXR/YVN+OGYDLMV3Jr3XYNst8m8PZONZzSUKPRNlFEprfVuoihZnhkXJrs=
X-Received: by 2002:a05:6638:1014:: with SMTP id r20mr12152707jab.29.1589739294537; Sun, 17 May 2020 11:14:54 -0700 (PDT)
MIME-Version: 1.0
From: Dave Taht <dave.taht@gmail.com>
Date: Sun, 17 May 2020 11:14:42 -0700
Message-ID: <CAA93jw5HHY6xA1NOxrqad-crY4mmhmiB7Gyga8RBEaz4ShGj8w@mail.gmail.com>
To: tsvwg IETF list <tsvwg@ietf.org>
Content-Type: text/plain; charset="UTF-8"
Content-Transfer-Encoding: quoted-printable
Archived-At: <https://mailarchive.ietf.org/arch/msg/tsvwg/Pr0D2tec6UM22f_9sZsR3pCv2VA>
Subject: [tsvwg] dave taht's rationale for option 3 on ect(1) (more testing)
X-BeenThere: tsvwg@ietf.org
X-Mailman-Version: 2.1.29
Precedence: list
List-Id: Transport Area Working Group <tsvwg.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/tsvwg>, <mailto:tsvwg-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/tsvwg/>
List-Post: <mailto:tsvwg@ietf.org>
List-Help: <mailto:tsvwg-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/tsvwg>, <mailto:tsvwg-request@ietf.org?subject=subscribe>
X-List-Received-Date: Sun, 17 May 2020 18:14:57 -0000
The codebases, simulations, etc, for the l4s and SCE approaches are still in a very raw state. With these early implementations, many problems have been identified, and only a few resolved. The internet drafts and codebases are out of alignment, with new bugs landing in the codebases and operating systems every time someone takes them out for a spin. Nearly all the tests bufferbloat.net considered basic in the development of the original pie, codel, and fq_codel aqms in the aqm working group as of 2004 have yet to be run. Participants may weight the results differently, but adversarial tests of all kinds need to be run, regularly, in response to every change to the specification and code, in order to retain an accurate picture of the problems found, fixed, or ignored. (I confess that much of my interest in lossless congestion control comes from longer RTT near earth orbit, geo, and gto - and even more distant space-born applications, which is a from-orbit viewpoint I suspect few here share) To the greatest extent possible, tests to be performed in simulation AND on a variety of real hardware, AND in virtualized environments. The recent bugs found in encapsulations need to be evaluated against more tunnel types and operating systems. More shipping switches and hardware based need to be tested and configured using ect(1) -> CE transitions, in particular, to see what happens. Problems with legacy uses of the IP stack, for private and industrial and embedded r/t control use, have not been explored either. Examples include 6lowpan, and other relatively unknown services in the ietf you can find in all the other ethernet packet types known to man. The potential side effects on classic traffic, have been barely explored, if at all. The impact on conventional udp and classic gaming, voice, and DNS traffic of the pie side of the l4s solution, (with the initial exploration of the rrul_be test showing up bugs galore), is largely unknown. The true effects on the internet of senders such as the increasingly available BBRv1 with RFC3168 ecn accidentally enabled deployment needs analysis, as do the effects of a modestly or truly lying senders. The costs and methods required to mitigate ECN-enabled DDOS attacks, also is absent from analysis. The side effects of essentially deprioritizing classic routing protocols and other essential oam and maintenance packet types (such as rip v2 (used on cable), ospf, Babel, ISIS, RA, ND and ARP), needs to be explored. The effects on existing deployed RFC3168 compliant multicast file transports such as uftp[1], needs to be tested. Recognising “loss and mark” as an even stronger signal than either, not thought about. There's a long list of other more trivial things - dynamically reducing mss size at cwnd 2 or less, improving packet pacing to cope with sub cwnds, more fully exploring l4s-style behaviors on unreliable, jittery networks such as wifi and lte, and chirping. In short: I see no reason for the IVTF to allocate the ECT(1) codepoint at this time without a ton more simulation and testing. With a lot more robust, repeatable testing, good software engineering practices, complete with regression tests, and continuous integration, and source code that matches the internet drafts (and vice versa), perhaps we can all find a way forward closer to the goals of low latency and high throughput and the most viable, safest, use for this last half a bit in the IP header. -- "For a successful technology, reality must take precedence over public relations, for Mother Nature cannot be fooled" - Richard Feynman dave@taht.net <Dave Täht> CTO, TekLibre, LLC Tel: 1-831-435-0729