Re: [tsvwg] David Black (individual) on safety of L4S for the Internet

Bob Briscoe <in@bobbriscoe.net> Fri, 15 May 2020 23:12 UTC

Return-Path: <in@bobbriscoe.net>
X-Original-To: tsvwg@ietfa.amsl.com
Delivered-To: tsvwg@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id DFEA03A0A18 for <tsvwg@ietfa.amsl.com>; Fri, 15 May 2020 16:12:57 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -2.099
X-Spam-Level:
X-Spam-Status: No, score=-2.099 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, DKIM_SIGNED=0.1, DKIM_VALID=-0.1, DKIM_VALID_AU=-0.1, DKIM_VALID_EF=-0.1, SPF_HELO_FAIL=0.001, SPF_PASS=-0.001, URIBL_BLOCKED=0.001] autolearn=ham autolearn_force=no
Authentication-Results: ietfa.amsl.com (amavisd-new); dkim=pass (2048-bit key) header.d=bobbriscoe.net
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id hq-FNXF_NIY0 for <tsvwg@ietfa.amsl.com>; Fri, 15 May 2020 16:12:55 -0700 (PDT)
Received: from cl3.bcs-hosting.net (cl3.bcs-hosting.net [3.11.37.202]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id 8C65E3A0971 for <tsvwg@ietf.org>; Fri, 15 May 2020 16:12:55 -0700 (PDT)
DKIM-Signature: v=1; a=rsa-sha256; q=dns/txt; c=relaxed/relaxed; d=bobbriscoe.net; s=default; h=Content-Transfer-Encoding:Content-Type: In-Reply-To:MIME-Version:Date:Message-ID:From:References:Cc:To:Subject:Sender :Reply-To:Content-ID:Content-Description:Resent-Date:Resent-From: Resent-Sender:Resent-To:Resent-Cc:Resent-Message-ID:List-Id:List-Help: List-Unsubscribe:List-Subscribe:List-Post:List-Owner:List-Archive; bh=Lsg/eYjxwdJOdKKmIaU4zv4BazVIImkXtrfettUvcbA=; b=0A9EQAOyjcqyffAU3dgRWMA/hR ULBT5bhof8nJmKax8Dd7jQuuAp5Vz3wT/4LGKhFs/eXCDqVv7pz0W8+Abs5kGqIg5Ter4yZE8Fnci kvKyUb2B7xrgjhWy8NXB16/MfOjaeYZlFA52zBJoKA60lL2j3bdkASW4f+pnRkHEQz1OU8tWZKKk9 KsjWAtCpI4IdZWMyYiFfma23wl5f7+yfMZIUHuhO4Hl1QiudGlc0ur2I8RdIX0kzw7BUmGGolZXP0 /5Eqr4b0owZ+VsQt4kdBvTC6tuxTFJ7DKxoCxrugjazdWTzxfANwDaChYHIhP6C03frsfU/pvt5bO wHcrbwKg==;
Received: from [31.185.128.97] (port=39582 helo=[192.168.0.6]) by cl3.bcs-hosting.net with esmtpsa (TLS1.2) tls TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256 (Exim 4.93) (envelope-from <in@bobbriscoe.net>) id 1jZjVd-009Bk6-MA; Sat, 16 May 2020 00:12:53 +0100
To: Sebastian Moeller <moeller0@gmx.de>
Cc: Gorry Fairhurst <gorry@erg.abdn.ac.uk>, "tsvwg@ietf.org" <tsvwg@ietf.org>
References: <MN2PR19MB4045DBC270D70DECE5F2B4AC83A20@MN2PR19MB4045.namprd19.prod.outlook.com> <75435344.181735.1589475836060@mail.yahoo.com> <eb4ff580-0700-764f-df82-ce13344b5743@bobbriscoe.net> <MN2PR19MB4045638F9583301BFEDA9CF083BD0@MN2PR19MB4045.namprd19.prod.outlook.com> <8a554935-3603-c827-469d-c9e093bf5fa3@erg.abdn.ac.uk> <6B8E37BF-F5E8-4BB2-B38E-471A1802BBEC@gmx.de>
From: Bob Briscoe <in@bobbriscoe.net>
Message-ID: <eb0228d4-419e-5b94-7e6e-888436f69e2a@bobbriscoe.net>
Date: Sat, 16 May 2020 00:12:52 +0100
User-Agent: Mozilla/5.0 (X11; Linux x86_64; rv:60.0) Gecko/20100101 Thunderbird/60.6.1
MIME-Version: 1.0
In-Reply-To: <6B8E37BF-F5E8-4BB2-B38E-471A1802BBEC@gmx.de>
Content-Type: text/plain; charset="utf-8"; format="flowed"
Content-Transfer-Encoding: 8bit
Content-Language: en-GB
X-AntiAbuse: This header was added to track abuse, please include it with any abuse report
X-AntiAbuse: Primary Hostname - cl3.bcs-hosting.net
X-AntiAbuse: Original Domain - ietf.org
X-AntiAbuse: Originator/Caller UID/GID - [47 12] / [47 12]
X-AntiAbuse: Sender Address Domain - bobbriscoe.net
X-Get-Message-Sender-Via: cl3.bcs-hosting.net: authenticated_id: in@bobbriscoe.net
X-Authenticated-Sender: cl3.bcs-hosting.net: in@bobbriscoe.net
X-Source:
X-Source-Args:
X-Source-Dir:
Archived-At: <https://mailarchive.ietf.org/arch/msg/tsvwg/PwP5TjwSU6qYWPyu8XBOW-0bxEw>
Subject: Re: [tsvwg] David Black (individual) on safety of L4S for the Internet
X-BeenThere: tsvwg@ietf.org
X-Mailman-Version: 2.1.29
Precedence: list
List-Id: Transport Area Working Group <tsvwg.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/tsvwg>, <mailto:tsvwg-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/tsvwg/>
List-Post: <mailto:tsvwg@ietf.org>
List-Help: <mailto:tsvwg-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/tsvwg>, <mailto:tsvwg-request@ietf.org?subject=subscribe>
X-List-Received-Date: Fri, 15 May 2020 23:12:58 -0000

Sebastian,

On 15/05/2020 12:26, Sebastian Moeller wrote:
> Hi Gory,
>
>
>> On May 15, 2020, at 11:59, Gorry Fairhurst <gorry@erg.abdn.ac.uk> wrote:
>>
>> See in-line
>>
>> On 15/05/2020 01:03, Black, David wrote:
>>> Bob,
>>> [still posting as an individual, not as WG chair]
>>>
>>>
>>>> Firstly an appeal to everyone to stop talking about wiping the ECN field
>>>> as if it is acceptable. Bleaching ECN is not a safety mechanism, except
>>>> as a last resort. Treating ECT(1)
>>>> /as if/
>>>>   it is Not-ECT is far
>>>> preferable to wiping it so it
>>>> /is/
>>>>   Not-ECT.
>>>>
>>> I concur with that appeal ... but ...
>>>
>>> .... We've been through an analogous adventure with DSCP bleaching, as RFC 2474 recommends that behavior for DSCPs (treat unknown DSCPs as best effort without changing the DSCP) but the network operators went ahead and bleached DSCPs at network boundaries, as described in Section 1 of RFC 8100 (
>>> https://www.rfc-editor.org/rfc/rfc8100.html#section-1
>>> ).  I strongly suggest reviewing that history towards understanding why things turned out that way.
>>>
>>>
>> Well, some operators have chosen a model that does that, I can't resist self-citing some research that shows this might not be the full story ... "Exploring DSCP modification pathologies in the Internet" (2018).
>>
>> https://www.sciencedirect.com/science/article/pii/S0140366417312835
> 	[SM] Well, my take on that is that there is a 80% or higher chance (transparent plus Reset ToS prec. plus Reset ToS prec. CS6/CS7)  for DSCPs with 3 leading zero bits to survive internet traversal. That seems like a viable starting position for a LL classifier IMHO.

[BB]
I don't think you've read the paper closely enough. The measurements you 
quote did not cross any access network. They were  from a couple of 
dozen vantage points in Digital Ocean data centres to large numbers of 
popular web server destinations. That doesn't measure what typical 
access networks do to the DSCP.

The paper does include measurements from 107 vantage points connected to 
Internet access networks, but solely mobile. Here, for any DSCP except 
best efforts, the % unchanged is never better than 38%.

For how fixed access networks mangle Diffserv, you'd need to measure 
from vantage points on something like PlanetLab. Reference [31] measured 
from both MONROE and PlanetLab vantage points to characterize mobile and 
fixed access, but that was looking more at the effect on ECN than 
Diffserv. We did take some Diffserv measurements to look for correlation 
with ECN wiping. But from memory I think we only added the Diffserv test 
over mobile, 'cos that's where nearly all the ECN wiping was. I'll take 
a look at the data when I have some time (ha ha!)

> In reality L4S will only work well over short paths anyway (mostly CDN -> end-user)

[BB] Is this a fact, or an alternative fact?

> and there the number of Diffserve domain crossings should be on the lower side and SLAs might be an option to make an L4S-dscp actually survive well.
>
> 	As the bleaching ECT(1) argument demonstrates any marker on a packet will be considered fair game to manipulation if that still allows delivery of the packets and fiddling it gives advantages to either senders or to intermediate hops, so the superiority of ECT(1) in internet traversal really is just a snapshot due to the circumstances that nobody got sufficiently annoyed by ECT(1) yet.
>

[BB] The bleaching ECT(1) argument doesn't /demonstrate/ anything. It's 
your conjecture.

Currently, for fixed networks:
* according to our measurements (ref [31] in Gorry's study), from 54 
PlanetLab vantage points on 25 networks in 22 countries to the Alexa top 
500k web servers, consistent with previous studies, the ECN codepoint is 
wiped on 0.23% of paths.
* in contrast, according to Gorry's study measured at a similar time, 
from a couple of dozen vantage points in data centres, there is some 
form of DSCP pathology on 70% of paths.
* Gorry's study also found a high correlation between clearing the DSCP 
and clearing the ECN field, which supports the hypothesis that a 
well-documented bug reported on more than one brand of equipment is 
still prevalent, where the ECN field is cleared as an unintentional 
side-effect of clearing the DSCP.

For mobile:
* Our study from vantage points in 18 mobile networks found 10.5 always 
wiped the ECN codepoint, and the others never did.
* Gorry's study from 107 vantage points, in an unstated number of mobile 
networks, found only between about 5% and 25% of paths preserved the DSCP.

When we put a huge amount of effort into measurement studies, it's 
because data is important. When the data contradicts what you want to 
believe, you are welcome to say that the data might change in the 
future. And you can make up reasons why this might happen. But I'm not 
going to make the same points against your arguments again because, when 
you've said the same made-up things once, and twice and three times and 
four times, it achieves nothing other than demonstrating that you like 
the sound of your own keyboard.

> IMHO if L4S works and is really worth its salt (meets its promises), it should be able to pull its own weight, by making networks operators take care to not bleach its reference DSCP, instead of forcing ECT(1) on everybody.

[BB] There is no reference DSCP for L4S. ECT(1) already inherently 
identifies L4S packets. If a DSCP were used as well, networks supporting 
L4S would ignore it, given it's redundant anyway, and it might sometimes 
be bleached.

It is poor practice to use 2 identifiers for one feature, because both 
then have to be checked and cases where they are inconsistent have to be 
handled, potentially opening security vulnerabilities.


Bob

>> The reasons for field bleaching seem to vary, (and, alas, a significant proportion still seems to be due to configured ToS semantics).
> 	[SM] Clearly one of the reasons is that so far there is absolutely zero value to conserve an unhandled DSCP and treat it like BE for the operator in question. According to the L4S RFCs however, everybody is going to profit from L4S everywhere, so surely those operator straggling today to leave DSCPs alone will now do so for the L4S-dscp since that will give them better network performance (even if not participating in the L4S experiment, they could optimistically expect less bursty traffic patterns, allowing to drive the gear at higher average load). Either that or that "everybody is going to profit" claim is being falsified, either way an interesting result.
>
> Best Results
> 	Sebastian
>
>
>> Gorry

-- 
________________________________________________________________
Bob Briscoe                               http://bobbriscoe.net/