Re: [tsvwg] L4S DSCP (was: L4S drafts: Next Steps)

Jonathan Morton <chromatix99@gmail.com> Sat, 03 April 2021 11:54 UTC

Return-Path: <chromatix99@gmail.com>
X-Original-To: tsvwg@ietfa.amsl.com
Delivered-To: tsvwg@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 5D95D3A1A46 for <tsvwg@ietfa.amsl.com>; Sat, 3 Apr 2021 04:54:00 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -1.848
X-Spam-Level:
X-Spam-Status: No, score=-1.848 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, DKIM_SIGNED=0.1, DKIM_VALID=-0.1, DKIM_VALID_AU=-0.1, DKIM_VALID_EF=-0.1, FREEMAIL_ENVFROM_END_DIGIT=0.25, FREEMAIL_FROM=0.001, RCVD_IN_DNSWL_NONE=-0.0001, SPF_HELO_NONE=0.001, SPF_PASS=-0.001, URIBL_BLOCKED=0.001] autolearn=ham autolearn_force=no
Authentication-Results: ietfa.amsl.com (amavisd-new); dkim=pass (2048-bit key) header.d=gmail.com
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id fD8JhISKkxKd for <tsvwg@ietfa.amsl.com>; Sat, 3 Apr 2021 04:53:55 -0700 (PDT)
Received: from mail-lj1-x234.google.com (mail-lj1-x234.google.com [IPv6:2a00:1450:4864:20::234]) (using TLSv1.2 with cipher ECDHE-RSA-AES128-GCM-SHA256 (128/128 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id 7CD7F3A1A45 for <tsvwg@ietf.org>; Sat, 3 Apr 2021 04:53:55 -0700 (PDT)
Received: by mail-lj1-x234.google.com with SMTP id u9so7968698ljd.11 for <tsvwg@ietf.org>; Sat, 03 Apr 2021 04:53:55 -0700 (PDT)
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=gmail.com; s=20161025; h=mime-version:subject:from:in-reply-to:date:cc :content-transfer-encoding:message-id:references:to; bh=TRAK2PPx8veS0ZP4sTfvG1fOzASaG9Yp2U0CNrq/Z3A=; b=jnjZU1OC+pp9NKCeccxLfeh4YdMQixEdKBFiUJHKL/Qaa/pSGWu1m9knl7gvZXf516 /Jzi2Fn0+1TUxP8Y9EjUt4refaZjlCWHCHaSfOXSR3tL+I7WshvAJarlRT+KV1aYUGFZ FSKtagYXXOAqCcQFIMWdFr1B0huzXVeReHB3Ll7Ocb8ACmRsLtHlvesoTDmJYsGB5lxB H4pVgCghHBoc9G2R0pOxEPBIQQmWAdwyLnnofYeo7nZcCbU0CJTkOptcIvCmUGBSPO4U Muq3yllINYLX6L4qdW1LZ0dcNM4lfSo1NyUt0L0zdms9+qcJpVVFS4OTzZUP3bWE8Mdd SUIw==
X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20161025; h=x-gm-message-state:mime-version:subject:from:in-reply-to:date:cc :content-transfer-encoding:message-id:references:to; bh=TRAK2PPx8veS0ZP4sTfvG1fOzASaG9Yp2U0CNrq/Z3A=; b=MfcaGcm2i/Etl6nJhQFkQ/KP9Dpd5IP3gr45UCfC5xqei4nFd+qkcnxFlzgSr/hS0t KPEcz+PQveVRdrvaqvEQqbhMMOfX2ByOXy5tFyJueZUg92zhdvFjCpd82guabqBj2iS1 o0t0aeHoEe2We6EzaiTTfYhBRfsg65t6X+gw2MFkKfMuIQ50urkzLZ8952lQFoNPdZID mmaTxusFY+fQHcUNIUvJ7u+66eKMoF43sh1xGjC1w2tUkgLRC+RoknnEuG2MlIUGUdoO /dDDKU/QHYZiKOQ3u3/fA0ld4b2kA+kK7piHE7a+KGKScnicr3RHiXjYsSF/z2b7xs6R 6hDQ==
X-Gm-Message-State: AOAM5323DCVAwOPj0D05Stlb9UY58HKI/r7hafiQLWRCZTH1xnITWwrJ fWDj4pBZa7RFgz6togH33aQ=
X-Google-Smtp-Source: ABdhPJyPpIDoibkEpo0IjlFY1F7MQd6MX9iSId+pQcpeeDL02YkaMDfP91r+mariqsIJq+AmaILezA==
X-Received: by 2002:a2e:b175:: with SMTP id a21mr11025568ljm.5.1617450828254; Sat, 03 Apr 2021 04:53:48 -0700 (PDT)
Received: from jonathartonsmbp.lan (178-55-25-11.bb.dnainternet.fi. [178.55.25.11]) by smtp.gmail.com with ESMTPSA id x17sm1128747lfg.164.2021.04.03.04.53.47 (version=TLS1_2 cipher=ECDHE-ECDSA-AES128-GCM-SHA256 bits=128/128); Sat, 03 Apr 2021 04:53:47 -0700 (PDT)
Content-Type: text/plain; charset="us-ascii"
Mime-Version: 1.0 (Mac OS X Mail 11.5 \(3445.9.7\))
From: Jonathan Morton <chromatix99@gmail.com>
In-Reply-To: <316659632.1952357.1617447999612@mail.yahoo.com>
Date: Sat, 03 Apr 2021 14:53:46 +0300
Cc: tsvwg IETF list <tsvwg@ietf.org>, Pete Heist <pete@heistp.net>
Content-Transfer-Encoding: quoted-printable
Message-Id: <66BB74D3-60FB-4C70-B698-0E1E91FFF53A@gmail.com>
References: <MN2PR19MB404527384A1B1DD9CFC2A3D983659@MN2PR19MB4045.namprd19.prod.outlook.com> <6f0ac4bf-bd1a-65cd-1d40-a97d4aa71aab@bobbriscoe.net> <7B4426F9-E1C5-4F88-A264-0D54C809D523@gmail.com> <AM8PR07MB74761AFC8F5BE0F9573DFF32B9629@AM8PR07MB7476.eurprd07.prod.outlook.com> <6481E606-2458-49D7-B580-8DF7B93494FD@gmx.de> <AM8PR07MB747675E421F0B7A6246C67BEB9619@AM8PR07MB7476.eurprd07.prod.outlook.com> <9A9D4AC3-43F0-4778-839B-E1E247A3C5FA@gmx.de> <AM8PR07MB7476026EA3AA7AD49622B296B9619@AM8PR07MB7476.eurprd07.prod.outlook.com> <CAJU8_nUgNa-W4wf2Vb8sUUqv4XUsSFdVQFUWwrTGw0gDshahiQ@mail.gmail.com> <92b3b23db1dc4ce11162a31acf83c0dd01868a27.camel@heistp.net> <1841247348.815218.1617024220610@mail.yahoo.com> <B2D6891F-8041-4E9E-BE57-09C861702718@gmail.com> <316659632.1952357.1617447999612@mail.yahoo.com>
To: "alex.burr@ealdwulf.org.uk" <alex.burr@ealdwulf.org.uk>
X-Mailer: Apple Mail (2.3445.9.7)
Archived-At: <https://mailarchive.ietf.org/arch/msg/tsvwg/ZKzRHveOr5xhDljovE6XzsxvIBo>
Subject: Re: [tsvwg] L4S DSCP (was: L4S drafts: Next Steps)
X-BeenThere: tsvwg@ietf.org
X-Mailman-Version: 2.1.29
Precedence: list
List-Id: Transport Area Working Group <tsvwg.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/tsvwg>, <mailto:tsvwg-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/tsvwg/>
List-Post: <mailto:tsvwg@ietf.org>
List-Help: <mailto:tsvwg-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/tsvwg>, <mailto:tsvwg-request@ietf.org?subject=subscribe>
X-List-Received-Date: Sat, 03 Apr 2021 11:54:00 -0000

> On 3 Apr, 2021, at 2:06 pm, alex.burr@ealdwulf.org.uk wrote:
> 
> Regarding the two DSCP scheme, I'm not sure that I follow you as to how it avoids my argument above. Specifically, what outcomes of such an experiment would help us decide how L4S should interact with RFC3168 AQMs in the long term?

It is clear that L4S aims squarely for actual, operational deployments as quickly as the standardisation process permits.  My aim here is to ensure that whatever passes the process is safely deployable.  My view is that the "experiment" should be to verify that the system *is* safely deployable, before committing permanent allocations of codepoints to it.

I am convinced that L4S' current form is not up to the task, so this is a modification which tries to make it so without too many implementation changes.  Without modifications like these, I firmly believe this particular problem space would be better served by a wholesale move to non-ambiguous signalling than by any further work on L4S.

> I thought you might be saying that it allows the experiment to detect RFC3168 AQMs.

Not precisely.  Rather, it gives a way to verify that the path is wholly over a participating network.  If such verification is not forthcoming, the safe thing to do is to drop back to AIMD mode, and behave as much like conventional TCP as is practical.  Anything else risks misinterpreting RFC-3168 signals as L4S signals; the reverse is much less harmful.

> But if we see CE on a packet that doesn't have the Y DSCP, it might just have been bleached.

If the X or Y DSCP was bleached, we can infer that the path either crosses a participating network's border (where such bleaching is expected) or is wholly in a non-participating network (where random bleaching often occurs).  We should expect participating networks to preserve the X and Y DSCPs over the relevant paths, because the system would rely on that to function.  Initially these networks will be relatively small and manageable islands within the greater Internet.

> If we see a CE marked packet with the X DSCP, I guess that's more evidence of an RFC3618 AQM, which would at least give us a lower bound?

Yes.  Receiving the X DSCP indicates that the path does *not* pass through an L4S middlebox, but also does not pass through a participating network's border, so the path should be assumed to lie wholly outside the participating networks.  Any ECN AQMs in these networks will be RFC-3168 compliant and L4S ignorant.

The big advantage of this approach over that of applying a single "guard" DSCP is that it handles the case of L4S endpoints being deployed outside of the participating networks.  In a large-scale deployment scenario, that should be expected to happen.  However there is still the possibility of L4S middleboxes being deployed without the corresponding network preparations being undertaken, and that has the potential to defeat this measure.

Nevertheless, I hear David Black will put forward his notion of how a single guard DSCP should work, and we should pay attention to that.  Not necessarily to agree, but to take as a third possible option.  I'm sure it will at least draw from existing codified practice.

 - Jonathan Morton