Re: [tsvwg] links to Canary methods for roll-out of new transport features
Jonathan Morton <chromatix99@gmail.com> Fri, 27 August 2021 21:13 UTC
Return-Path: <chromatix99@gmail.com>
X-Original-To: tsvwg@ietfa.amsl.com
Delivered-To: tsvwg@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id BCF1D3A1A1D for <tsvwg@ietfa.amsl.com>; Fri, 27 Aug 2021 14:13:03 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -1.849
X-Spam-Level:
X-Spam-Status: No, score=-1.849 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, DKIM_SIGNED=0.1, DKIM_VALID=-0.1, DKIM_VALID_AU=-0.1, DKIM_VALID_EF=-0.1, FREEMAIL_ENVFROM_END_DIGIT=0.25, FREEMAIL_FROM=0.001, SPF_HELO_NONE=0.001, SPF_PASS=-0.001] autolearn=ham autolearn_force=no
Authentication-Results: ietfa.amsl.com (amavisd-new); dkim=pass (2048-bit key) header.d=gmail.com
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id 3B2WdlRu5F31 for <tsvwg@ietfa.amsl.com>; Fri, 27 Aug 2021 14:12:58 -0700 (PDT)
Received: from mail-lj1-x22f.google.com (mail-lj1-x22f.google.com [IPv6:2a00:1450:4864:20::22f]) (using TLSv1.2 with cipher ECDHE-RSA-AES128-GCM-SHA256 (128/128 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id 8D1C13A1A1B for <tsvwg@ietf.org>; Fri, 27 Aug 2021 14:12:58 -0700 (PDT)
Received: by mail-lj1-x22f.google.com with SMTP id y6so13750875lje.2 for <tsvwg@ietf.org>; Fri, 27 Aug 2021 14:12:58 -0700 (PDT)
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=gmail.com; s=20161025; h=mime-version:subject:from:in-reply-to:date:cc :content-transfer-encoding:message-id:references:to; bh=1Aspr5XoVxvp+UsORc6iT43sTq3PBsPkvgnd2JWB53Q=; b=LpJ0NFPjCKX1D6syfkyTIPutxKR9ysAAIROLqyq691jc6Wx2q3GYaXpmDz8UE8wCcB RGi890LAevV3gORp+qJxS39hfdEaLOeB9xKnxGma/AoGVU/uMSgxAJwQUfKVdr043AAO 52X9gCh+N0/cQOtvHgODBQPRje3yqYEx1nYoIXDXx98CQRNWgAjA6CXp1nE2rsjoz31i zPUGD9CocRJpVupBrXfKgamMgJpzKhHBXcgUbQ4QP+TDKmeRyVSbauXcxybyC89k2U7B wIFOashAGEg63z5GHFDQv9ansttOllf4ifYHF4bjY8KYQoL2fooPnydyGMAJe0FE2oxs mCAA==
X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20161025; h=x-gm-message-state:mime-version:subject:from:in-reply-to:date:cc :content-transfer-encoding:message-id:references:to; bh=1Aspr5XoVxvp+UsORc6iT43sTq3PBsPkvgnd2JWB53Q=; b=QVHbWi67QRpyiD09nu3Pr+PLhi72u+q69+zAffaCfJ+TRWBHuF6+S8pfUNtuHmEFWK h3tOEc+6kf5SVkD6mu5AoerSehxz4c0wvfn8bVnC3ZERq2nkHYJmO7t1cAiEkhQi7vYu mBu6I9ovj4PXC24E4yfY/ZZ/I+69DWxtx39bZa8fUoFwkCQbn9ddc5eUEAJ2XiTFefJQ kyhT/let0nlJhkfwExc7shDYr1XZkXn5IC50CP/b/6QQHq7TxAAoPu94isj5cco+rkX7 xUK8KvCX1lz7ANqyr6tjfJ2RsyWR9He3ezZCFRz3FpfkkJr3twXpzsVxWFy3RN1Mp4jD bDkw==
X-Gm-Message-State: AOAM532Uze9n+oICqeDIUhc1sKpiyF+rYVZAwR8hAv2opLHiAzBpIsGN LmKlMKqat9AKe4XtxtFMGqE=
X-Google-Smtp-Source: ABdhPJzQLmCD88C0oFk7gdT7+Br5vfVcx2bS/xZlVWPCg1Yw0T2CzRp1wRUbDJHcxWx/3Y8mLJYDZA==
X-Received: by 2002:a2e:b558:: with SMTP id a24mr9163384ljn.225.1630098774068; Fri, 27 Aug 2021 14:12:54 -0700 (PDT)
Received: from smtpclient.apple (178-55-70-16.bb.dnainternet.fi. [178.55.70.16]) by smtp.gmail.com with ESMTPSA id bn3sm876909ljb.18.2021.08.27.14.12.53 (version=TLS1_2 cipher=ECDHE-ECDSA-AES128-GCM-SHA256 bits=128/128); Fri, 27 Aug 2021 14:12:53 -0700 (PDT)
Content-Type: text/plain; charset="utf-8"
Mime-Version: 1.0 (Mac OS X Mail 14.0 \(3654.100.0.2.22\))
From: Jonathan Morton <chromatix99@gmail.com>
In-Reply-To: <CAM4esxS_bv-NW53mv1D=-dSVzUPyqUBEuUvBkszqdiVM9q6o9w@mail.gmail.com>
Date: Sat, 28 Aug 2021 00:12:52 +0300
Cc: "Holland, Jake" <jholland@akamai.com>, Gorry Fairhurst <gorry@erg.abdn.ac.uk>, tsvwg <tsvwg@ietf.org>
Content-Transfer-Encoding: quoted-printable
Message-Id: <EA8512F8-80C2-4301-8FFD-46E836E3471F@gmail.com>
References: <AF731D2C-B796-4B20-973D-6DB496DB1228@akamai.com> <232F9BFA-0D05-48C5-807E-FA2A7904754A@erg.abdn.ac.uk> <eg5mzk.qx1zf8.0-qmf@smtp.gmail.com> <de1017ec-d437-4c61-9f9c-7d237eee8fcb@erg.abdn.ac.uk> <CAM4esxSf9F86dYKW5jg8AW-m7aa8bkcgkfANzwvtVBeAdYDAbA@mail.gmail.com> <15AD8CE4-F403-4837-86EF-86D3BFA70FBF@akamai.com> <CAM4esxS_bv-NW53mv1D=-dSVzUPyqUBEuUvBkszqdiVM9q6o9w@mail.gmail.com>
To: Martin Duke <martin.h.duke@gmail.com>
X-Mailer: Apple Mail (2.3654.100.0.2.22)
Archived-At: <https://mailarchive.ietf.org/arch/msg/tsvwg/YwZG7oyXEvrb6GpQo3KYWAKNVlE>
Subject: Re: [tsvwg] links to Canary methods for roll-out of new transport features
X-BeenThere: tsvwg@ietf.org
X-Mailman-Version: 2.1.29
Precedence: list
List-Id: Transport Area Working Group <tsvwg.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/tsvwg>, <mailto:tsvwg-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/tsvwg/>
List-Post: <mailto:tsvwg@ietf.org>
List-Help: <mailto:tsvwg-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/tsvwg>, <mailto:tsvwg-request@ietf.org?subject=subscribe>
X-List-Received-Date: Fri, 27 Aug 2021 21:13:04 -0000
> On 27 Aug, 2021, at 11:52 pm, Martin Duke <martin.h.duke@gmail.com> wrote: > > Hi Jake, > > I don't think I was clear enough. > > The assumption in my proposal is that in a large deployment these things will average out. So there is no intent to create additional connections solely to detect self-harm. As large deployments will likely have multiple connections to each endpoint and even larger pools of connections through important bottlenecks, I assert that if a provider > > (1) establishes a Not-ECT and ECT(0) baseline; > (2) Randomly turns on ECT(1) for 1/3 (?) of flows; and > (3) Both Not-ECT and ECT(0) meet some standard of non-degradation/non-starvation in the aggregate. > > then that is strong evidence that the hypothesis that the problematic 3168 queueing is not operating on the internet. I believe that would be a false assumption, and consequently a false assertion. That type of testing is only capable of detecting a problem in a conventional flow that just happens to run simultaneously with an L4S flow. It is not reasonable to assume that will routinely occur. This is a general problem with using canary testing to detect externalised problems. And this is a problem that is theoretically *expected* to occur… > As for including both Not-ECT and ECT(0) in the baseline, I seem to recall someone making separate claims about the impact of L4S on each; if that's inaccurate, I have no objection to collapsing the control into one or the other. For at least one type of expected bad interaction, Not-ECT and RFC-3168 ECN traffic will probably be affected equally. I explain why in my detailed comments document. Note that merely carrying ECT(1) is not relevant for this case, but the alternative congestion response associated with an L4S transport. > Meanwhile, I am not crystal-clear as to whether the proponents intend to deploy L4S endpoints with Prague, something else that meets the Prague requirements, or nothing at all. TCP Prague within a modified Linux kernel seems to be the only known L4S endpoint implementation at present. - Jonathan Morton
- [tsvwg] links to Canary methods for roll-out of n… Gorry Fairhurst
- Re: [tsvwg] links to Canary methods for roll-out … Holland, Jake
- Re: [tsvwg] links to Canary methods for roll-out … Gorry (erg)
- Re: [tsvwg] links to Canary methods for roll-out … Jonathan Morton
- Re: [tsvwg] links to Canary methods for roll-out … Gorry Fairhurst
- Re: [tsvwg] links to Canary methods for roll-out … Martin Duke
- Re: [tsvwg] links to Canary methods for roll-out … Holland, Jake
- Re: [tsvwg] links to Canary methods for roll-out … Martin Duke
- Re: [tsvwg] links to Canary methods for roll-out … Jonathan Morton