Re: [tsvwg] Review comments on a careful read of the L4S ID

Bob Briscoe <ietf@bobbriscoe.net> Fri, 07 May 2021 23:27 UTC

Return-Path: <ietf@bobbriscoe.net>
X-Original-To: tsvwg@ietfa.amsl.com
Delivered-To: tsvwg@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 800A33A381F for <tsvwg@ietfa.amsl.com>; Fri, 7 May 2021 16:27:59 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -1.434
X-Spam-Level:
X-Spam-Status: No, score=-1.434 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, DKIM_SIGNED=0.1, DKIM_VALID=-0.1, DKIM_VALID_AU=-0.1, DKIM_VALID_EF=-0.1, NICE_REPLY_A=-0.001, SPF_HELO_NONE=0.001, SPF_SOFTFAIL=0.665, URIBL_BLOCKED=0.001] autolearn=no autolearn_force=no
Authentication-Results: ietfa.amsl.com (amavisd-new); dkim=pass (2048-bit key) header.d=bobbriscoe.net
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id AMWykJ4uLj0L for <tsvwg@ietfa.amsl.com>; Fri, 7 May 2021 16:27:54 -0700 (PDT)
Received: from mail-ssdrsserver2.hosting.co.uk (mail-ssdrsserver2.hosting.co.uk [185.185.85.90]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id 2CDBF3A3823 for <tsvwg@ietf.org>; Fri, 7 May 2021 16:25:45 -0700 (PDT)
DKIM-Signature: v=1; a=rsa-sha256; q=dns/txt; c=relaxed/relaxed; d=bobbriscoe.net; s=default; h=Content-Transfer-Encoding:Content-Type: In-Reply-To:MIME-Version:Date:Message-ID:From:References:Cc:To:Subject:Sender :Reply-To:Content-ID:Content-Description:Resent-Date:Resent-From: Resent-Sender:Resent-To:Resent-Cc:Resent-Message-ID:List-Id:List-Help: List-Unsubscribe:List-Subscribe:List-Post:List-Owner:List-Archive; bh=a5r0vD/iK82yxSOMYxeoTmhDGclbZqXxKcWpBRDJydM=; b=Vu1wuzgDMb6p7VDaJg4mp+qs1N 7amt3lzrpmWnpNmROOYK1YWg29GNWrlytAXI4KwzozKBb527CbU7jRzdD/qUjxz1U3sOhUfkns8ME d4mcxNqczSl4Cg2Y3kDHhVEG7rw/TKxELGh+jLoDKGu+chapwViHk9BIMv9Y7UsZkGAvXNiuKkj9P jRgSTi6btGWwHjfivkxEsFgq//O+R9XvTdEna1uRXhxuHUJTOOw6mq1KS8ztZAmykYA5o2ncon+Uf jKdI8kJivbWRw5aeyiotZcCZJx2m6X4lVc31xTKbyhPy9QQyuUO4XahdV+BS+YrwU6iF7Ywoi2Odt xCx9f0Xw==;
Received: from 67.153.238.178.in-addr.arpa ([178.238.153.67]:36208 helo=[192.168.1.11]) by ssdrsserver2.hosting.co.uk with esmtpsa (TLS1.2) tls TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256 (Exim 4.94.2) (envelope-from <ietf@bobbriscoe.net>) id 1lf9qq-0002Cu-6m; Sat, 08 May 2021 00:25:43 +0100
To: "Black, David" <David.Black@dell.com>, Sebastian Moeller <moeller0@gmx.de>, Gorry Fairhurst <gorry@erg.abdn.ac.uk>, Greg White <g.white@CableLabs.com>
Cc: "tsvwg@ietf.org" <tsvwg@ietf.org>
References: <634676ca-272d-d616-c352-b38446cf7aab@erg.abdn.ac.uk> <C86C30F0-2EBD-4D70-A395-E30537687C2F@gmx.de> <MN2PR19MB4045028175677183883F89E483589@MN2PR19MB4045.namprd19.prod.outlook.com>
From: Bob Briscoe <ietf@bobbriscoe.net>
Message-ID: <f4056723-b4f2-8fdd-4109-df77bad3adb9@bobbriscoe.net>
Date: Sat, 08 May 2021 00:25:41 +0100
User-Agent: Mozilla/5.0 (X11; Linux x86_64; rv:78.0) Gecko/20100101 Thunderbird/78.7.1
MIME-Version: 1.0
In-Reply-To: <MN2PR19MB4045028175677183883F89E483589@MN2PR19MB4045.namprd19.prod.outlook.com>
Content-Type: text/plain; charset="utf-8"; format="flowed"
Content-Transfer-Encoding: 8bit
Content-Language: en-GB
X-AntiAbuse: This header was added to track abuse, please include it with any abuse report
X-AntiAbuse: Primary Hostname - ssdrsserver2.hosting.co.uk
X-AntiAbuse: Original Domain - ietf.org
X-AntiAbuse: Originator/Caller UID/GID - [47 12] / [47 12]
X-AntiAbuse: Sender Address Domain - bobbriscoe.net
X-Get-Message-Sender-Via: ssdrsserver2.hosting.co.uk: authenticated_id: in@bobbriscoe.net
X-Authenticated-Sender: ssdrsserver2.hosting.co.uk: in@bobbriscoe.net
X-Source:
X-Source-Args:
X-Source-Dir:
Archived-At: <https://mailarchive.ietf.org/arch/msg/tsvwg/RiMqiyRqL-YdKVlI3sU-u2TrtbQ>
Subject: Re: [tsvwg] Review comments on a careful read of the L4S ID
X-BeenThere: tsvwg@ietf.org
X-Mailman-Version: 2.1.29
Precedence: list
List-Id: Transport Area Working Group <tsvwg.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/tsvwg>, <mailto:tsvwg-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/tsvwg/>
List-Post: <mailto:tsvwg@ietf.org>
List-Help: <mailto:tsvwg-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/tsvwg>, <mailto:tsvwg-request@ietf.org?subject=subscribe>
X-List-Received-Date: Fri, 07 May 2021 23:28:00 -0000

David, Sebastian, Gorry, and adding Greg as author of l4sops for the 
last point inline below, see [BB]...

On 06/05/2021 22:25, Black, David wrote:
> Hi Sebastian,
>
> Something does indeed need to be done about this, as there's an even bigger problem elsewhere in the L4S ID.
>
> There are (at least) two different reasons for not applying L4S AQM treatment to ECT(1) marked traffic:
> 	- Policy-based exclusion (e.g., Section 5.4.1.2 of the L4S ID draft).
> 	- Operational exclusion (e.g., L4S OPS draft).
> The L4S ID needs to allow both reasons for excluding ECT(1)-marked traffic from L4S AQM treatment.
>
> Unfortunately, the L4S ID currently prohibits both exclusions due to an unintended consequence of the first sentence of Section 5.1:
>
>     A network node that implements the L4S service MUST classify arriving ECT(1) packets for L4S treatment ...
>
> My understanding is that the L4S authors are going to rewrite that sentence to correct this oversight, and check for other places where this problem may occur.  That rewrite ought to cover both exclusion cases listed above.

[BB] Following you pointing this out, we were indeed going to add that 
the rule to classify ECT(1) as L4S was subject to policy exceptions (as 
in S.5.4.1.2).

For the l4sops draft point, see my response embedded below to Sebastian, 
plus some others while I'm at it...


>
> Thanks, --David
>
> -----Original Message-----
> From: tsvwg <tsvwg-bounces@ietf.org> On Behalf Of Sebastian Moeller
> Sent: Thursday, May 6, 2021 7:48 AM
> To: Gorry Fairhurst
> Cc: tsvwg@ietf.org
> Subject: Re: [tsvwg] Review comments on a careful read of the L4S ID
>
>
> [EXTERNAL EMAIL]
>
> Hi Gorry,
>
> see [SM] below for a question.
>
>
>> On May 6, 2021, at 08:52, Gorry Fairhurst <gorry@erg.abdn.ac.uk> wrote:
>>
>>
>> Here are some review comments on a careful read of the L4S ID that I hope will help in preparation of a new revision of the draft. More details have been sent to the authors.
>>
>> Best wishes,
>>
>> Gorry
>> [...]
>> =================================================================
>> 25. Missing drop-only requirement for excluded traffic
>>   
>> Section 5.4.1.2.  Exclusion of Traffic From L4S Treatment – this text:
>>   
>>     “The operator MUST NOT alter the end-to-end L4S ECN identifier from
>>     L4S to Classic, because its decision to exclude certain traffic from
>>     L4S treatment is local-only.”
>>   
>> ⁃           I think be the word /its/this/ .
[BB] Possibly, but an operator is an it, and it can make decisions. 
'Its' seems better to my English ear than 'this'. I'll leave it.

>> ⁃            Please add a requirement that ECT(1) traffic excluded from L4S treatment MUST be handled as non-ECN traffic (e.g., all congestion signalling is via drops), as Classic AQM treatment and ECN marking produce the wrong results for such traffic.

[BB] Good point. Here's the new para I've added at the end of the section:

An operator that excludes traffic carrying the L4S identifier from L4S 
treatment MUST NOT treat such traffic as if it carries the ECT(0) 
codepoint, which could confuse the sender.

>> =================================================================
> [...]
>
> We actually recommend doing exactly that as a measure of last resorts in https://urldefense.com/v3/__https://tools.ietf.org/html/draft-white-tsvwg-l4sops-02*page-11__;Iw!!LpKI!1yLUhTX-HOwh-wMGgmzGrZngRafqgEyTPQoamHkJO0n_ZR1k6R0cJ2RFGzexjN3L$ [tools[.]ietf[.]org]
> We could:
> a) simply accept that divergence
> b) add text to the ECN-ID draft to explicitly allow that for extreme situations (or reduce the MUST to a SHOULD, pointing out the cost of doing so)
> c) add text to the OPs draft why that violation of the ECN-ID draft is acceptable as a measure of last resort...

[BB] Thanks for pointing this out.

ecn-l4s-id is about what L4S nodes do, whereas l4sops is about what 
non-L4S nodes might do. So l4sops is not strictly contrary to 
ecn-l4s-id. However, that's splitting hairs, because l4sops is about 
trying to help 3168 and L4S nodes to be more compatible. So it is not 
particularly compatible to be inconsistent.

When I sent my review of l4sops to the list recently, I said I didn't 
like the mention of bleaching. Quoting:
     "For both 5.5. & 5.6., I think it's necessary to say why we are 
even mentioning these options, given they are not recommended."

An alternative to your a) b) c) would be
d) not to mention this in l4sops. I'd support that.

If 5.6 remains in l4sops, I'd support your c).


Bob



>
> Given that this is the final back-stop in the (unlikely) case that the L4S experiment should cause the next congestion collapse I think it made sense to tackle this explicitly, no?
>
>
> Best Regards
> 	Sebastian

-- 
________________________________________________________________
Bob Briscoe                               http://bobbriscoe.net/