[tsvwg] Changes to normative text in ecn-l4s-id as a result of WGLC

Bob Briscoe <ietf@bobbriscoe.net> Fri, 19 November 2021 13:39 UTC

Return-Path: <ietf@bobbriscoe.net>
X-Original-To: tsvwg@ietfa.amsl.com
Delivered-To: tsvwg@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 6F32F3A0906 for <tsvwg@ietfa.amsl.com>; Fri, 19 Nov 2021 05:39:30 -0800 (PST)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -2.099
X-Spam-Level:
X-Spam-Status: No, score=-2.099 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, DKIM_SIGNED=0.1, DKIM_VALID=-0.1, DKIM_VALID_AU=-0.1, DKIM_VALID_EF=-0.1, HTML_MESSAGE=0.001, RCVD_IN_MSPIKE_H2=-0.001, SPF_HELO_NONE=0.001, SPF_PASS=-0.001, URIBL_BLOCKED=0.001] autolearn=ham autolearn_force=no
Authentication-Results: ietfa.amsl.com (amavisd-new); dkim=pass (2048-bit key) header.d=bobbriscoe.net
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id aRcLpNF1w0cD for <tsvwg@ietfa.amsl.com>; Fri, 19 Nov 2021 05:39:27 -0800 (PST)
Received: from mail-ssdrsserver2.hostinginterface.eu (mail-ssdrsserver2.hostinginterface.eu [185.185.85.90]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id DB0143A0909 for <tsvwg@ietf.org>; Fri, 19 Nov 2021 05:39:26 -0800 (PST)
DKIM-Signature: v=1; a=rsa-sha256; q=dns/txt; c=relaxed/relaxed; d=bobbriscoe.net; s=default; h=Content-Type:In-Reply-To:MIME-Version:Date: Message-ID:Cc:References:To:From:Subject:Sender:Reply-To: Content-Transfer-Encoding:Content-ID:Content-Description:Resent-Date: Resent-From:Resent-Sender:Resent-To:Resent-Cc:Resent-Message-ID:List-Id: List-Help:List-Unsubscribe:List-Subscribe:List-Post:List-Owner:List-Archive; bh=tfB1JQEe8GSxcu4KNVSUhlFPjcsnhZsqBJ3HLV9HiwA=; b=YOj0leySqiixwT9G0fLI80cnsD yIORn4QofZL4VS8ANVz+0Pph4x+FZdD+b0JaR4n/lmI8PsAuEERymXOnJal6cINfY/YHAb+mskdkL p7dJi3Kj9zKVEKmJRSJkOzElNjuE4f9uYRZmjKLm1xIA0lEmqQi5wlKliwakqyU0ZyXNgprR2P6av bomZSdUzDnvvwfCw/qc5rt9zFTaQ/vBbxvvceHdC3Tu1MsjYYE6tNmfg7eTtrBTooW2FwKDGISSaH qjn+r7PSSNkJQHwLz8ioEykkk+QVmpdRxSnejjTtg+p1+nF1vizLxg0dXw+2CVefG8Pz1bVR2I/WW 20tHLBDA==;
Received: from 67.153.238.178.in-addr.arpa ([178.238.153.67]:51718 helo=[192.168.1.11]) by ssdrsserver2.hostinginterface.eu with esmtpsa (TLS1.2) tls TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256 (Exim 4.94.2) (envelope-from <ietf@bobbriscoe.net>) id 1mo473-0007jS-AX; Fri, 19 Nov 2021 13:39:24 +0000
From: Bob Briscoe <ietf@bobbriscoe.net>
To: Gorry Fairhurst <gorry@erg.abdn.ac.uk>, "pete@heistp.net" <pete@heistp.net>, "tsvwg@ietf.org" <tsvwg@ietf.org>, "De Schepper, Koen (Koen)" <koen.de_schepper@nokia.com>
References: <7dd8896c-4cd8-9819-1f2a-e427b453d5f8@mti-systems.com> <B575CC81-4633-471A-991F-8F78F3F2F47F@ericsson.com> <aa968ff5-262c-1fd4-981d-05507ac1e59e@erg.abdn.ac.uk> <464c0ae7-cd22-6053-9507-2b9ee687ad7a@erg.abdn.ac.uk> <d5fadfb2-d449-8096-8fbb-1c7705407883@bobbriscoe.net>
Message-ID: <74f44c86-8855-2100-15c4-35c16707e244@bobbriscoe.net>
Date: Fri, 19 Nov 2021 13:39:22 +0000
User-Agent: Mozilla/5.0 (X11; Linux x86_64; rv:78.0) Gecko/20100101 Thunderbird/78.14.0
MIME-Version: 1.0
In-Reply-To: <d5fadfb2-d449-8096-8fbb-1c7705407883@bobbriscoe.net>
Content-Type: multipart/alternative; boundary="------------8CDD5A0411168FE696C0291C"
Content-Language: en-GB
X-AntiAbuse: This header was added to track abuse, please include it with any abuse report
X-AntiAbuse: Primary Hostname - ssdrsserver2.hostinginterface.eu
X-AntiAbuse: Original Domain - ietf.org
X-AntiAbuse: Originator/Caller UID/GID - [47 12] / [47 12]
X-AntiAbuse: Sender Address Domain - bobbriscoe.net
X-Get-Message-Sender-Via: ssdrsserver2.hostinginterface.eu: authenticated_id: in@bobbriscoe.net
X-Authenticated-Sender: ssdrsserver2.hostinginterface.eu: in@bobbriscoe.net
X-Source:
X-Source-Args:
X-Source-Dir:
Archived-At: <https://mailarchive.ietf.org/arch/msg/tsvwg/Yo69vUXpcuCVEq7orNGIDfOELw4>
Subject: [tsvwg] Changes to normative text in ecn-l4s-id as a result of WGLC
X-BeenThere: tsvwg@ietf.org
X-Mailman-Version: 2.1.29
Precedence: list
List-Id: Transport Area Working Group <tsvwg.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/tsvwg>, <mailto:tsvwg-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/tsvwg/>
List-Post: <mailto:tsvwg@ietf.org>
List-Help: <mailto:tsvwg-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/tsvwg>, <mailto:tsvwg-request@ietf.org?subject=subscribe>
X-List-Received-Date: Fri, 19 Nov 2021 13:39:30 -0000

Gorry, Pete, Koen, list,
See [BB2]

On 07/11/2021 21:24, Bob Briscoe wrote:
>> NiT:
>> “ To include additional traffic with L4S, a network element only reads
>>    identifiers such as those itemized above.  It MUST NOT alter these
>>    non-ECN identifiers, so that they survive for any potential use later
>>    on the network path.”
>>
>> - Actually I think this MUST statemen t only applies to the L4S 
>> processing within the device, and I think it doesn’t mean L4S is 
>> unable to work across a policy enforcement point or some other device 
>> that otherwise modifies the other packet headers.
>>
>> .... so is this better as:
>>
>> “ To include additional traffic with L4S, a network element only reads
>>    identifiers such as those itemized above.  The L4S forwarding
>>   MUST NOT alter these
>>    non-ECN identifiers, so that they survive for any potential use later
>>    on the network path.”
>
> [BB] Note that this is not a nit - it is a correction to a normative 
> statement.
> Also, there is no definition of what the extent of an 'L4S forwarding 
> [element]' is. Classification for L4S might be much earlier in the 
> path. How about
>
> "The process of including additional traffic with L4S only involves 
> reading identifiers such as those itemized above. It MUST NOT alter 
> these non-ECN identifiers, so that they survive for any potential use 
> later on the network path."
>
> This is actually rather meaningless, because if a network element 
> wants to alter any of the identifiers, it doesn't have to be part of 
> "the process of including additional traffic with L4S". So the other 
> alternative would be to remove any normative text from this para, and 
> just say "The process ... wouldn't normally be expected to alter these 
> identifiers." But I've left it with the MUST NOT, so as not to 
> radically alter the draft. 

[BB2] I've had offlist pushback from Koen about the latest change to 
deal with your concern here. 
https://datatracker.ietf.org/doc/html/draft-ietf-tsvwg-ecn-l4s-id-19#section-5.4.1.1
He also disagrees with the non-normative alternative I suggested of 
"...wouldn't normally be expected to alter non-L4S identifiers" because 
that's not necessarily true for Diffserv. He proposes that saying 
nothing about altering non-L4S identifiers would be best, and all the 
co-authors now agree with that.

However, Koen has also said that there should be a "MUST NOT" to stop 
anyone thinking they can include additional traffic in the L queue by 
altering the ECN field to ECT(1) based on other non-ECN identifiers.

So for the para at the end of "5.4.1.1.  Inclusion of Additional Traffic 
with L4S" 
https://datatracker.ietf.org/doc/html/draft-ietf-tsvwg-ecn-l4s-id#section-5.4.1.1
the new proposal for the list to consider is:

CURRENT:

    The process of including additional traffic with L4S only involves
    reading identifiers such as those itemized above.  It MUST NOT alter
    these non-ECN identifiers, so that they survive for any potential use
    later on the network path.

PROPOSED:
    In order to include non-L4S packets in the L queue, a network node
    MUST NOT alter Not-ECT or ECT(0) in the IP-ECN field to an L4S
    identifier. This ensures that these codepoints survive for any
    potential use later on the network path.


> On Sun, 2021-11-07 at 18:47 +0000, Bob Briscoe wrote:
>> On 24/08/2021 21:27, Pete Heist wrote:
>>> l4s-id Section 5.4.1.2:
>>> An operator that excludes traffic carrying the L4S identifier from
>>> L4S treatment MUST NOT treat such traffic as if it carries the ECT(0)
>>> codepoint, which could confuse the sender.
>> It might not directly relate to the section, but in order to comply
>> with this MUST NOT, the operator would also have to make sure that all
>> existing RFC3168 middleboxes are undeployed (see #1 above).
>
> [BB] Ah, I can see the confusion here. We shouldn't have said "An 
> operator ... MUST NOT treat...". We should have said:
>
> "A network node that supports L4S but excludes certain traffic 
> carrying the L4S identifier from L4S treatment MUST NOT treat..."
>
> I've also changed the subject of the other normative requirements in 
> this section from 'operator' to 'network node'.

[BB2] Koen also pushed back on the above change in "5.4.1.2. Exclusion 
of Traffic From L4S Treatment". He pointed out that the approach ought 
to be consistent with the similar but converse position in "2.5.1.1.  
Requirements in Unexpected Cases" in the DualQ draft: 
https://datatracker.ietf.org/doc/html/draft-ietf-tsvwg-aqm-dualq-coupled#section-2.5.1.1

The principle here is to deal with queue classification separately from 
AQM classification, but to recommend rather than mandate where possible, 
because operator-specific exclusion of traffic is meant to be for 
flexibility, so we shouldn't prevent flexibility unless important for 
interop.

So, if a network node that supports L4S classifies an ECT(1) packet into 
a Classic queue (due to some other non-ECN identifier), the output from 
the AQM in the Classic queue ought to still be compatible with an L4S 
congestion control.

    A network node that supports L4S but excludes certain L4S packets 
from L4S treatment MUST still apply marking or dropping that is 
compatible with an L4S congestion response. For instance, it could 
either drop such packets with the same likelihood as Classic packets or 
it could ECN-mark them with a likelihood appropriate to L4S traffic 
(e.g. the coupled probability in a DualQ coupled AQM) but aiming for the 
Classic delay target. It MUST NOT ECN-mark such packets with a Classic 
marking probability, which could confuse the sender.


Bob


-- 
________________________________________________________________
Bob Briscoe                               http://bobbriscoe.net/