Re: [tsvwg] Reasons for WGLC/RFC asap

Greg White <g.white@CableLabs.com> Fri, 20 November 2020 22:14 UTC

Return-Path: <g.white@CableLabs.com>
X-Original-To: tsvwg@ietfa.amsl.com
Delivered-To: tsvwg@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 1F54F3A0A49 for <tsvwg@ietfa.amsl.com>; Fri, 20 Nov 2020 14:14:53 -0800 (PST)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -1.1
X-Spam-Level:
X-Spam-Status: No, score=-1.1 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, DKIM_SIGNED=0.1, DKIM_VALID=-0.1, DKIM_VALID_AU=-0.1, DKIM_VALID_EF=-0.1, HTML_MESSAGE=0.001, RCVD_IN_MSPIKE_H2=-0.001, SPF_PASS=-0.001, URIBL_BLOCKED=0.001, URI_DOTEDU=1] autolearn=no autolearn_force=no
Authentication-Results: ietfa.amsl.com (amavisd-new); dkim=pass (2048-bit key) header.d=cablelabs.com
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id H0iOaNp5qviH for <tsvwg@ietfa.amsl.com>; Fri, 20 Nov 2020 14:14:50 -0800 (PST)
Received: from NAM04-SN1-obe.outbound.protection.outlook.com (mail-eopbgr700104.outbound.protection.outlook.com [40.107.70.104]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id 55AFE3A0A4A for <tsvwg@ietf.org>; Fri, 20 Nov 2020 14:14:47 -0800 (PST)
ARC-Seal: i=1; a=rsa-sha256; s=arcselector9901; d=microsoft.com; cv=none; b=PqgZEKR+ClRN2HvOTun3tQHL548ObduGUkfalmkaIXdE5srCC1k0yyFwUkXGHAnZsGu/h6aCPDeNwOUijtYBm8SJiP3g0bWgf4LPPvESdDJHc73AHfHkFM4hGxf79yNWVkUPCz8fOUPJWIRh8KBRlFnjw+QmGFoHlbeCKgyBP/mbbAFGstuzW/rGxoxyG4fNSJBtmcHckFi8CVsYvb2FfQL/o2Ly2w9XDI0BJEybdPmi34zgsaNO2NZLiQzw83Zrh3cyycqYQwi7OPKb/0mlmtTAaocu8NcPnZEMl3zWbSSrUfWH7pP4C8apju0bftAM+LUNTaDlflTax+8cN0NQIg==
ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=microsoft.com; s=arcselector9901; h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-SenderADCheck; bh=BC9mMlmlee0VOELl57J9HYGCTI99LBffyCz9fpiLkPM=; b=GxAO6hli4Res9zz3sBOu+btuBQaRTkO1qg1tE3ujFPIipNgoBBkW9SWrYtahhpr996Wr4MJ0AWLVHsUV0Sq6aIkJ+cwEPCcjaT01ZqLT6OPBTEf3B3NUwpxMh7iIdqYSThBa2+WamPdSsM22Q7xEi3k/GTxU2BT/68Ypx/fuMjELBSdUwaCTLQAaMUnYSkG3kQR+ieB0AzyAzNfuch1Ue1VI1X/zNDtuYFvyboVSxvYfou3GjmmtvDDGMMXEDrblZB5cLWyogPOGVMIfl6tfiCAh1ab1f/kTRRJRTQm6BUsVFgiRWTXNkCigRD7gm2eESamro8sSIL6Ep5zh+S1QqQ==
ARC-Authentication-Results: i=1; mx.microsoft.com 1; spf=pass smtp.mailfrom=cablelabs.com; dmarc=pass action=none header.from=cablelabs.com; dkim=pass header.d=cablelabs.com; arc=none
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=cablelabs.com; s=selector2; h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-SenderADCheck; bh=BC9mMlmlee0VOELl57J9HYGCTI99LBffyCz9fpiLkPM=; b=Kb7/bPlEFSpacWMuVjCg+sWDfk1w3BksteZrfxNwS4dqFzQGhf3yPUISNyYTmDyE03rXlu+e2Yn88QOeNvGPgShu2t+o1nSOW64+d4UEj1Qcm0hWAqH1qaZ9dAqp4kSolQ6TetS+0WQsRCg/vBGVAX4CYOwPpGDalx/1WaARjyUXx22jxizPkNnNqMrpd226nMq9WbqJc84PHDAr7YtKdntis1F6ZLAsG7L4lJIKMfsexoJUYGcLs3TJu02Ae4pNlgUpZLxyEHgNYNxWvN6o04As2YJ4kKxn1DBg3dEMFeYJ0FP1FNrmioWG9HV4fD+/PkQTDoTFZhaKAt49Wpn6vQ==
Received: from CY4PR0601MB3713.namprd06.prod.outlook.com (2603:10b6:910:92::10) by CY4PR0601MB3713.namprd06.prod.outlook.com (2603:10b6:910:92::10) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id 15.20.3499.29; Fri, 20 Nov 2020 22:14:41 +0000
Received: from CY4PR0601MB3713.namprd06.prod.outlook.com ([fe80::e03a:dba6:a8d0:17e0]) by CY4PR0601MB3713.namprd06.prod.outlook.com ([fe80::e03a:dba6:a8d0:17e0%7]) with mapi id 15.20.3499.034; Fri, 20 Nov 2020 22:14:41 +0000
From: Greg White <g.white@CableLabs.com>
To: Sebastian Moeller <moeller0@gmx.de>, Ingemar Johansson S <ingemar.s.johansson=40ericsson.com@dmarc.ietf.org>
CC: tsvwg IETF list <tsvwg@ietf.org>
Thread-Topic: [tsvwg] Reasons for WGLC/RFC asap
Thread-Index: Ada9kaHRGNO57vIZSgq7zPn1SuIYhAAQZ1iAABevuwAACIsIYAACHYWAAAPTeVAAAlcCAAAB1G0AACVeUAAAD3IsAA==
Date: Fri, 20 Nov 2020 22:14:40 +0000
Message-ID: <36CD217D-1E40-4286-A202-5D1027792160@cablelabs.com>
References: <AM8PR07MB747626CB7622CB89209018A8B9E10@AM8PR07MB7476.eurprd07.prod.outlook.com> <5dff4f73463c2a7e7cc8dc8255ae9825e78f4c11.camel@petri-meat.com> <4FF8800F-B618-4818-AF5E-1E997EA9FBF3@eggert.org> <HE1PR0701MB2876C4FDA655284D4E563042C2E00@HE1PR0701MB2876.eurprd07.prod.outlook.com> <3EAC47AC-5937-4DB2-8B3C-D8C8A4459FBA@eggert.org> <HE1PR0701MB28761E448ACA1DAE0B2DCF56C2E00@HE1PR0701MB2876.eurprd07.prod.outlook.com> <F73E8DBB-0887-462C-ACC6-FA9212E50DF7@eggert.org> <HE1PR0701MB2876C5AE506AFCCCD99C1F54C2E00@HE1PR0701MB2876.eurprd07.prod.outlook.com> <BDCF6C59-28FF-4923-99AA-9D10EC9C8AC3@gmx.de>
In-Reply-To: <BDCF6C59-28FF-4923-99AA-9D10EC9C8AC3@gmx.de>
Accept-Language: en-US
Content-Language: en-US
X-MS-Has-Attach:
X-MS-TNEF-Correlator:
user-agent: Microsoft-MacOutlook/16.42.20100402
authentication-results: gmx.de; dkim=none (message not signed) header.d=none;gmx.de; dmarc=none action=none header.from=CableLabs.com;
x-originating-ip: [98.245.82.7]
x-ms-publictraffictype: Email
x-ms-office365-filtering-correlation-id: 4077e518-471b-444c-6b90-08d88da1ad66
x-ms-traffictypediagnostic: CY4PR0601MB3713:
x-microsoft-antispam-prvs: <CY4PR0601MB371341C322C4924977597F78EEFF0@CY4PR0601MB3713.namprd06.prod.outlook.com>
x-ms-oob-tlc-oobclassifiers: OLM:6108;
x-ms-exchange-senderadcheck: 1
x-microsoft-antispam: BCL:0;
x-microsoft-antispam-message-info: RE33viPrQTzb87wgOqpvJZmOk6lqBvxiBCfr1exPT12d9tQtNUOd5zMDQd8AwoUOb1rW9r7fb5zk1Rl9+Zz8YwYPyQ3FTvG/fnno+5lif48hSN13kobIbTu7ma5x0zLMWHNwAp1r3wvAs+RuP2qd/Wg+ioN0s//7XHGL/Wqw6cifippL1T5dusAgfC1VBpmwGxFD6GHCEjw+WC4Hi8YqbUPRYbKsWOw8nPwO+HMesc1/sQBonB8vleEXakzaLTRSrM0HvITe7PtSgQYASWzCCIyA/4ypu2yfMrDtLLJm6eWD+Iv/Z67dchOC/whRetkj1kVpoL1sZ8RE0pPv+jdnL/6KQBtAGFqr7iQbrDozF8tq6Tncprnc9auGY/HBzE//HCxSl/b6PoG/qi9Nz8XKpgficbhZvjLn1Rr75Ny++xJM6zSXOMlpZul65g+s7vzAJwinAuuUs1QeYiFijKh0Sg==
x-forefront-antispam-report: CIP:255.255.255.255; CTRY:; LANG:en; SCL:1; SRV:; IPV:NLI; SFV:NSPM; H:CY4PR0601MB3713.namprd06.prod.outlook.com; PTR:; CAT:NONE; SFS:(346002)(136003)(39840400004)(366004)(376002)(396003)(36756003)(8936002)(83380400001)(110136005)(478600001)(4326008)(2906002)(166002)(66946007)(33656002)(64756008)(186003)(6486002)(2616005)(66446008)(66556008)(66476007)(86362001)(76116006)(66574015)(8676002)(966005)(316002)(53546011)(4001150100001)(6512007)(5660300002)(71200400001)(30864003)(6506007)(26005)(85282002); DIR:OUT; SFP:1102;
x-ms-exchange-antispam-messagedata: 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
x-ms-exchange-transport-forked: True
Content-Type: multipart/alternative; boundary="_000_36CD217D1E404286A2025D1027792160cablelabscom_"
MIME-Version: 1.0
X-OriginatorOrg: cablelabs.com
X-MS-Exchange-CrossTenant-AuthAs: Internal
X-MS-Exchange-CrossTenant-AuthSource: CY4PR0601MB3713.namprd06.prod.outlook.com
X-MS-Exchange-CrossTenant-Network-Message-Id: 4077e518-471b-444c-6b90-08d88da1ad66
X-MS-Exchange-CrossTenant-originalarrivaltime: 20 Nov 2020 22:14:41.0607 (UTC)
X-MS-Exchange-CrossTenant-fromentityheader: Hosted
X-MS-Exchange-CrossTenant-id: ce4fbcd1-1d81-4af0-ad0b-2998c441e160
X-MS-Exchange-CrossTenant-mailboxtype: HOSTED
X-MS-Exchange-CrossTenant-userprincipalname: oG4tEB6iGKRHaF8pLjYCdilApNpq0EP/fjLP8s4tzNfHJzFjnv9sZwQsJ0+d8bnBKaYfTauAvEIFkGhmXhGvsw==
X-MS-Exchange-Transport-CrossTenantHeadersStamped: CY4PR0601MB3713
Archived-At: <https://mailarchive.ietf.org/arch/msg/tsvwg/WTkWVU19j8qPw-X1ApKBFbufNEg>
Subject: Re: [tsvwg] Reasons for WGLC/RFC asap
X-BeenThere: tsvwg@ietf.org
X-Mailman-Version: 2.1.29
Precedence: list
List-Id: Transport Area Working Group <tsvwg.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/tsvwg>, <mailto:tsvwg-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/tsvwg/>
List-Post: <mailto:tsvwg@ietf.org>
List-Help: <mailto:tsvwg-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/tsvwg>, <mailto:tsvwg-request@ietf.org?subject=subscribe>
X-List-Received-Date: Fri, 20 Nov 2020 22:14:53 -0000

  [SM] Ingemar, I and other OpenWrt users have an rfc3168 AQM on my internet access link, that by default uses ECN for the downlink. I do not have the view of the world as apple has, but I can guarantee the number is grater than zero. And as stated before people doing this today are exactly the latency conscious users L4S should aim at winning over...

This is great news!  Those users will undoubtedly be asking for (or implementing and submitting PRs to enable) L4S support in OpenWrt (it’s a simple software change after all, no kernel updates or new hardware needed).  They will be some of the first to see the benefits of it!  I would hope, for the sake of the Internet and the IETF, that people like you will do what you can to ensure that the L4S experiment has the best chance of success.

I don’t think I’ve heard you say that you are opposed to high-fidelity congestion control, or that you believe that it is impossible or inherently dangerous.  I seem to remember that you were (are?) of the belief that it would be a good thing in the context of the SCE codepoint definition, you just aren’t happy with the L4S codepoint decision.  Actually, I don’t remember hearing anyone claim that high-fidelity congestion signaling makes congestion control worse, or is inherently dangerous.

So, I think the discussion now centers on the following points?


  *   TCP Prague is unfinished, and some would like to see it finished before WGLC on the L4S drafts.
     *   Current TCP Prague performance does not show the benefits of high-fidelity CC in a number of cases.  Many believe that this is not an indication that high-fidelity CC is impossible, but others still want to be convinced.
  *   The DualQ AQM does not provide as precise per-flow fairness as FQ (or possibly VDQ-CSAQM) with the current TCP Prague
  *   Coexistence in light of single queue RFC3168 bottlenecks is not well understood (their prevalence, the frequency with which they are saturated with mixed-type long-running flows of moderate BDP, etc.) so we need to have safeguards in case it is a real issue
  *   Tunnels carrying mixed traffic can exhibit intra-tunnel flow unfairness in current FQ RFC3168 ECN bottlenecks, and non-RFC6040 compliant tunnels can still exhibit that issue in L4S-aware FQ bottlenecks

Also, there seems to be some difference of opinion in the community on the fundamental question of whether it is considered acceptable for a new congestion control to cause some level of harm (in the Ware sense*) to existing CCs, even if it otherwise provides substantial benefits that would be desirable to its users and encourage its adoption (and thus contribute to the decline in deployment of the status quo CCs).  In my personal opinion, strict adherence to zero-harm is too constraining, since it doesn’t provide any way to assess the upside potential of a new algorithm.

* https://www.cs.cmu.edu/~rware/assets/pdf/ware-hotnets19.pdf

-Greg


From: tsvwg <tsvwg-bounces@ietf.org> on behalf of Sebastian Moeller <moeller0@gmx.de>
Date: Friday, November 20, 2020 at 12:52 AM
To: Ingemar Johansson S <ingemar.s.johansson=40ericsson.com@dmarc.ietf.org>
Cc: tsvwg IETF list <tsvwg@ietf.org>
Subject: Re: [tsvwg] Reasons for WGLC/RFC asap


Hi Ingemar,



a correction below.





> On Nov 19, 2020, at 15:24, Ingemar Johansson S  wrote:

>

> Hi

>

> Please see inline [IJ]

>

> /Ingemar

>

>> -----Original Message-----

>> From: Lars Eggert

>> Sent: den 19 november 2020 14:10

>> To: Ingemar Johansson S

>> Cc: Steven Blake ; tsvwg IETF list

>

>> Subject: Re: [tsvwg] Reasons for WGLC/RFC asap

>>

>> Hi,

>>

>> On 2020-11-19, at 14:36, Ingemar Johansson S

>>  wrote:

>>> The only way is see is that the L4S

>>> drafts are moved to WGLC, then people will hopefully read the drafts

>>> and come with requests for clarifications where needed. Until then you

>>> can only expect more of the same long incomprehensible discussion

>>> threads until March, when we will repeat the same process again.

>>

>> to clarify: I don't have opinions about the L4S drafts. I haven't read

> them in a

>> while, I agree that I should.

>>

>> One point I am trying to make is that since the set of documents we are

>> discussing seems incomplete, in that it doesn't seem to contain a TCP

> variant

>> that intends to delivers benefits over L4S paths w/o regressions.

>>

>> My main point though is that there seem to be questions raised about the

>> performance and behavior of L4S with various TCP variants. This is not an

>> issue with the content of the L4S drafts. It's a remaining uncertainty

> related to

>> the experimental evaluation and analysis that the L4S mechanisms have seen

>> so far. Going forward with a LC is not going to bring further clarity

> here.

>>

>>> [IJ] The only pain point I see now is the RTT bias in cases where long

>>> RTT Prague flows compete with short RTT ditto. This is being addressed

>>> by the developers and it is not only an L4S problem. Besides this,

>>> Prague will be presented at ICCRG tomorrow as I understand it.

>>

>> That is one point. I think interactions with tunnels was another.

> [IJ] My take is that this is something for L4S ops that I see as a product

> of the L4S experiment. It is not something that needs to be answered on its

> own as it is mainly the RFC3168 AQM issue in another shape, we don't know

> how widely spread this problem is or to how large extent this equipment can

> be updated, earlier discussions on fq-codel implementations in home gateways

> was not conclusive I guess but it appears that many of these have automatic

> upgrade features,



  [SM] This is simply untrue, most home router will only see an update if the user actively monitor's the provider's or manufacturer's website and most manufacturer's will only create and distribute updates around the time a device is still marketed/sold. There is pretty little home gear out these which gets automatic updates or only notifications of possible updates. I agree that that would be a great situation to be in, but realistically the home router update and security situation is only mildly above the update and security situation of IoT devices. Remember it is the "s" in IoT that stands for security/safety...

  So, if your stance is, automatic updates are robust, reliable and wide-spread, please post some references supporting that hypothesis.









> I guess the reason here is to be able to upgrade to combat

> security threats but this is admittedly speculation.



  [SM] For someone putting their operational safety in that basket I would have expected more robust and reliable numbers for how many devices might be amenable to automated updates. Like hard numbers supporting the hypothesis that automatic updates are wide spread enough to allow distribution of such functionality updates. Also think about who is supposed to make back-ports of the required Linux kernel changes to the often ancient kernel versions SoC-SDKs are based on? To be honest that level of engineering by wishful thinking frightens me a bit.





>

>>

>> I'm actually looking forward to the presentation on TCP Prague - is there

> a

>> draft?

> [IJ] Not that I know of, code is found at https://protection.greathorn.com/services/v2/lookupUrl/e306a141-abad-430f-a4f2-02ad90bdc40e/327/a503b21fc948618a92ec662ee8b3671098594e6d?domain=github.com&path=/L4STeam/



  [SM] Is it just me that sees a problem in that the reference protocol implementation just exists in a repository, without even an attempt of writing an internet dratf describing that protocol? There are zero guarantees the tomorrows TCP Prague still is L4S compliant (today's is not, the rfc3168 detection and fall back are disabled by default, see https://protection.greathorn.com/services/v2/lookupUrl/81c6e38a-dede-4789-8d8c-692e8b1cf6f9/327/a503b21fc948618a92ec662ee8b3671098594e6d?domain=github.com&path=/L4STeam/linux/commit/b256daedc7672b2188f19e8b6f71ef5db7afc720)720).





>>

>>> Besides this there is discussion around all sorts of cases with

>>> RFC3168 style AQMs, additional discussion before a WGLC will

>>> definitely not make us more wise.

>>

>> Discussion won't, but experimentation would.

> [IJ] Yes, but we need to get past the discussion on all possible things that

> can happen. Recall from the discussion yesterday that Stuart Cheshire and

> his team has not need evidence of ECN marking AQMs. So I fear that we spend

> a lot of time discussing problems that are very rare.



  [SM] Ingemar, I and other OpenWrt users have an rfc3168 AQM on my internet access link, that by default uses ECN for the downlink. I do not have the view of the world as apple has, but I can guarantee the number is grater than zero. And as stated before people doing this today are exactly the latency conscious users L4S should aim at winning over...



>

>>

>>> As regards to investment, already today there is investment in this,

>>> examples that are disclosed in the open are Broadcom and Nokia. I can

>>> imagine that there is some expectation that L4S will materialize in

>>> RFCs

>>

>> Sorry I was unclear. You are right that there is investment by vendors.

> But I

>> think the key question if there will be an investment by operators, since

> they

>> need to eventually buy L4S kit and deploy it. And that investment will

> only pay

>> off if end systems actually have deployed a CC scheme that takes advantage

> of

>> L4S. So the ready availability of such a scheme is IMO a key requirement.

> [IJ] I would say that we already have CC algos that can be used. Surely they

> do not meet all the requirements today but I don't see why it will not be

> possible.



  [SM] This tells more about your confidence in your vision than in what might be achiebale in those CCs. IMHO ithe onus is on team L4S to demonstrate that possibility by demonstrating a CC that ticks all the check marks (does not need to be perfect, but should show significantly better performance in some dimension, while doing at least no harm in others, currently TCP Prague fails on both accounts).





> It is definitely the case that we will be discussing what typical

> RTTs are like forever but that is not something that should delay the L4S

> drafts I think.



  [SM] Sorry, this is getting absurd, I point out both Bob completely missing how PIE works (and what it's target variable actually describes ) and an inconsistency between two of the L4S drafts only to be ridiculed here. Ingemar, publishing RFC with inconsistent terms and definition is not a sign of a professional authoring process. Reviews are supposed to help finding such issues, and the response of the authors should not be something like your offense above, but a simple "thanks for pointing out the inconsistency, we are going to fix it, here is our proposed change". The ambiguity between the DualQ and the id drafts I pointed out are real, and "typical RTT" is not a well known term of art that every IETF member or operator is going to understand intuitively.

  Also, if my worst fear is correct, protocol and AQM "typical RTT"  values need to be selected in lock-step to be effective, and such a requirement needs to be made explicit in an RFC. And if I am wrong that the two uses of the term have different definitions that needs to be disambiguated in the internet drafts, no?





>

>>

>>> [IJ] If this would only be a IETF matter, then you are right. We

>>> however try to address this also in 3GPP standards to make the whole

>>> thing work in products, and that is of course hard to do if L4S is not

> even an

>> RFC.

>>

>> Is L4S currently a requirement for a future 3GPP release?

> [IJ] L4S is not currently pushed for in 3GPP, there is however work on the

> support for extended reality that requires low latency. L4S will definitely

> fit there. I would expect that L4S support can be proposed ~ mid next year.



  [SM] So you are willing to push an under-tested solution into 3GPP, but you insist upon that un-tested solution having IETF blessing? That seems rather odd, I would have expected that the primary requirement should be "works robustly and reliably without (unacceptable) side-effects" and not only "has RFC status". I have a hard time believing 3GPP works like that...



Best Regards

  Sebastian





>

>>

>> Thanks,

>> Lars