Re: [tsvwg] L4S DSCP (was: L4S drafts: Next Steps)

Sebastian Moeller <moeller0@gmx.de> Sun, 28 March 2021 20:04 UTC

Return-Path: <moeller0@gmx.de>
X-Original-To: tsvwg@ietfa.amsl.com
Delivered-To: tsvwg@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 5AE133A250C for <tsvwg@ietfa.amsl.com>; Sun, 28 Mar 2021 13:04:21 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -2.349
X-Spam-Level:
X-Spam-Status: No, score=-2.349 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, DKIM_SIGNED=0.1, DKIM_VALID=-0.1, FREEMAIL_ENVFROM_END_DIGIT=0.25, FREEMAIL_FROM=0.001, RCVD_IN_DNSWL_LOW=-0.7, RCVD_IN_MSPIKE_H2=-0.001, SPF_HELO_NONE=0.001, SPF_PASS=-0.001, URIBL_BLOCKED=0.001] autolearn=ham autolearn_force=no
Authentication-Results: ietfa.amsl.com (amavisd-new); dkim=pass (1024-bit key) header.d=gmx.net
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id as5lPO-1kdUa for <tsvwg@ietfa.amsl.com>; Sun, 28 Mar 2021 13:04:17 -0700 (PDT)
Received: from mout.gmx.net (mout.gmx.net [212.227.17.21]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id 83FEA3A2508 for <tsvwg@ietf.org>; Sun, 28 Mar 2021 13:04:16 -0700 (PDT)
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/simple; d=gmx.net; s=badeba3b8450; t=1616961845; bh=uMo5zqCWRbAyFu1MrwrkFGj/fYJJXoUZIoPwONEc9vw=; h=X-UI-Sender-Class:Subject:From:In-Reply-To:Date:Cc:References:To; b=Xcch1BrtYXnYKY3SRMvQQHbf3L5AsFLXQUJHX1KpEExaWRVZMjHtuYVOS7yinI+QE k+lUPa5UyMwq/0pmQnHfl44b0zwqFF/9fGr62GmOMIleFCB/YJrpDkcwrHOzahH7Zd O//FxslYI0qoLY1dopZ5xxQrdA3ZLRZE3VioesUY=
X-UI-Sender-Class: 01bb95c1-4bf8-414a-932a-4f6e2808ef9c
Received: from [192.168.42.229] ([77.10.97.225]) by mail.gmx.net (mrgmx104 [212.227.17.168]) with ESMTPSA (Nemesis) id 1MdNY8-1lzfPQ3AYq-00ZSUi; Sun, 28 Mar 2021 22:04:04 +0200
Content-Type: text/plain; charset="utf-8"
Mime-Version: 1.0 (Mac OS X Mail 12.4 \(3445.104.17\))
From: Sebastian Moeller <moeller0@gmx.de>
In-Reply-To: <HE1PR0701MB2299A10C53522C01802BDBBAC27F9@HE1PR0701MB2299.eurprd07.prod.outlook.com>
Date: Sun, 28 Mar 2021 22:04:01 +0200
Cc: Pete Heist <pete@heistp.net>, Kyle Rose <krose@krose.org>, "C. M. Heard" <heard@pobox.com>, Jonathan Morton <chromatix99@gmail.com>, "De Schepper, Koen (Nokia - BE/Antwerp)" <koen.de_schepper@nokia-bell-labs.com>, tsvwg IETF list <tsvwg@ietf.org>
Content-Transfer-Encoding: quoted-printable
Message-Id: <0D80B066-E1E3-4370-B2F6-CA13633F34FA@gmx.de>
References: <MN2PR19MB404527384A1B1DD9CFC2A3D983659@MN2PR19MB4045.namprd19.prod.outlook.com> <6f0ac4bf-bd1a-65cd-1d40-a97d4aa71aab@bobbriscoe.net> <7B4426F9-E1C5-4F88-A264-0D54C809D523@gmail.com> <AM8PR07MB74761AFC8F5BE0F9573DFF32B9629@AM8PR07MB7476.eurprd07.prod.outlook.com> <6481E606-2458-49D7-B580-8DF7B93494FD@gmx.de> <AM8PR07MB747675E421F0B7A6246C67BEB9619@AM8PR07MB7476.eurprd07.prod.outlook.com> <9A9D4AC3-43F0-4778-839B-E1E247A3C5FA@gmx.de> <AM8PR07MB7476026EA3AA7AD49622B296B9619@AM8PR07MB7476.eurprd07.prod.outlook.com> <CAJU8_nUgNa-W4wf2Vb8sUUqv4XUsSFdVQFUWwrTGw0gDshahiQ@mail.gmail.com> <92b3b23db1dc4ce11162a31acf83c0dd01868a27.camel@heistp.net> <HE1PR0701MB22999F18CBC7874B410B5E13C2609@HE1PR0701MB2299.eurprd07.prod.outlook.com> <9839D5ED-78DB-4F91-99F9-39CAB8C2121B@gmx.de> <HE1PR0701MB2299A10C53522C01802BDBBAC27F9@HE1PR0701MB2299.eurprd07.prod.outlook.com>
To: Ingemar Johansson S <ingemar.s.johansson@ericsson.com>
X-Mailer: Apple Mail (2.3445.104.17)
X-Provags-ID: V03:K1:aBpw9uEk9eR1R01tPGya086JFlkvTD5r7Tsho/yngHG8d56DanB O+trc5htYfhsBy+KduhlXN1679//wVJjb4hUGpaLN95hQTdaBxHqC2agAItKJm2os4HVqbd VSwKbMQFVUfNWeqcohfqElzVYO2b/8ehcvQmYyQpk+jP5fJyN5WwYmu2jywWyfAf+pIUkx+ EEnYIFpH2C7/17THFSk4Q==
X-UI-Out-Filterresults: notjunk:1;V03:K0:R3stPvp3V7A=:TKWK7ouKRTMNnbU3seT8Yi 0mD3SE92qChcSxOo+vimb+/GEOOOnQtpPZynZI81gwA2rKiGhPPK+w+4sUv1j3hywbUroQnku AVir930K2M24RQN0jZQKe7mdIdjzEYqvt+uh5BJj0kCt1hSyb5XEJeJvXxWocixqnlmNSPBLK P018U/Y4irJtXx0TMEI+UMLMhFdAlJd5fFgFys4yVnTAmXWcfukncxjOu9xY5SRobPvg9Iv4z Rs9eoyqbCKr+nf29peKYc2Rl+6fiXantakvTQIvchXBp3+xk8MCbSOhAJ0916c12FmjIkJPHC ruk8IKB8+g71yUZeD+rBOilxz+ssszkW/+lc3hCKf9oQz4j0JE9GZxG5UqGer4A0pMcrBOz1u lg33HIj2R10JJuQR+mRHN+XLGvnebFN8095PXeCBjla629mGDLxE6XmUuXua4Jst67tFQowbG nsjrJFD1uiZUTwjR2o/xudbuNa0IM+GwTSEXDBgl5b9hgODadmhm6z8VHs0urT4zpVwj/H+// NrAsLbQIBS0hGtiofQ8hy/bb/g47AzW2pk1hgscMJyFhBIox9lzbtFFbcLEYPisw1Fdykg7fo 7/4mviqMKH8sptcOuVtl6FFLmxLDDk+uAfI0Q3eo8Y3fO2d88uURHKYHXnx6vaO6b1oyf7X30 Dxf4qyjX4ovrDk3fGwYBJxEDyxPq5PJc+8FdI6dgdeL7tSbsza1HcqQ/H+9lRYgOKEVSfkRCX hHCidjgfk3hMsoD+j1j8RleW7rfMY9zYL6Iu9x07z++b+KqGH0HXzNtXcPL5yrMA4H5nBE4sf VtVSyF1XlLmIxUdTLAyRA4WI+kjQoD5ioeS3l/9IPtFxprNZkIlaQmF6N8G993Wht4TcaTtO1 +wKM6nIyDYA+Del6TbZt0dce0OjUD8DRfwXAiCXtEMScl/q+j/KTTOWvbA4e91yeUMQoBGt7l Jipn/YgJWHQN9tcpBJDL7Ne/fxfStC4qvhw2JysbN5KlM46Zpj8N2ABrnMHscYz3ILWfT9lGs h7a4Bn8zXL6nxm3rX95SQYvS740y8l7UkSKImTRJ3K/xFIAINLTFNCxdGymhTG2GjJMrH01lR 9rr8lS/mQ7GrUWZwjxqLh+SkrUCfCUOpQh9yBQVd2gKG1DKY8ywaQLqz2RD++HxsIzCPUrsbD SYQ+T4p6mXg6hozJP+W+BsjtkauysfORuZYY8oNg8ZGQfCnfpBeZCjeatQz7GqXyyNoDQ=
Archived-At: <https://mailarchive.ietf.org/arch/msg/tsvwg/bB3QQcXDj-fSB2gc7_6VXf0fZA8>
Subject: Re: [tsvwg] L4S DSCP (was: L4S drafts: Next Steps)
X-BeenThere: tsvwg@ietf.org
X-Mailman-Version: 2.1.29
Precedence: list
List-Id: Transport Area Working Group <tsvwg.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/tsvwg>, <mailto:tsvwg-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/tsvwg/>
List-Post: <mailto:tsvwg@ietf.org>
List-Help: <mailto:tsvwg-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/tsvwg>, <mailto:tsvwg-request@ietf.org?subject=subscribe>
X-List-Received-Date: Sun, 28 Mar 2021 20:04:21 -0000

Hi Ingemar,


> On Mar 28, 2021, at 21:01, Ingemar Johansson S <ingemar.s.johansson@ericsson.com> wrote:
> 
> Hi Sebastian+Jonathan + others
> 
> See inline [IJ] 
> /Ingemar
> 
>> -----Original Message-----
>> From: Sebastian Moeller <moeller0@gmx.de>
>> Sent: den 28 mars 2021 17:13
>> To: Ingemar Johansson S <ingemar.s.johansson@ericsson.com>
>> Cc: Pete Heist <pete@heistp.net>; Kyle Rose <krose@krose.org>; C. M.
>> Heard <heard@pobox.com>; Jonathan Morton <chromatix99@gmail.com>;
>> De Schepper, Koen (Nokia - BE/Antwerp) <koen.de_schepper@nokia-bell-
>> labs.com>; tsvwg IETF list <tsvwg@ietf.org>
>> Subject: Re: [tsvwg] L4S DSCP (was: L4S drafts: Next Steps)
>> 
>> Hi Ingemar,
>> 
>> 
>>> On Mar 27, 2021, at 21:00, Ingemar Johansson S
>> <ingemar.s.johansson@ericsson.com> wrote:
>>> 
>>> Hi Pete, Kyle, Charles, Sebastian, Jonathan CC others
>>> 
>>> I have followed this discussion for a while now.
>>> It is possible in a 5G system to set up traffic filters that include 5-tuples and
>> DSCP + more, so what you propose is possible.
>> 
>> 	[SM] Excellent news, thanks for this information.
>> 
>> 
>>> But with that said, I don’t at all see that this needs standardization and why
>> this would be needed as part of the L4S work.
>> 
>> 	[SM] A guard DSCP would need to be unambiguously agreed on by all
>> participants (or rather a PHB, different DSCPs could take that role). IMHO a
>> standards document is exactly the place to lay down the "law" on how to do
>> this. And in addition the L4S-ops ID/RFC should spell this out in detail to
>> facilitate such an approach. I wonder how issues affecting interoperability
>> between entities are regulated on the 3GPP world, but I naively assume that
>> this is handled in standards documents, no?
> [IJ] Like said before by others, if DSCP would have been this easy to use, then we would have had this discussion.

	[SM] Getting an experiment with known negative side-effects grated by the IETF does not hinge upon "ease of use" or convenience to the experimenter. If you have a better proposal how to secure/contain L4S for the duration of the experiment, I am all ears. Just not bothering for the safety of the existing internet however, is IMHO not an option, sorry.


> Operators can use DSCP in L4S experiments but that of course requires that they see a specific benefit with this. So far I have not seen anybody except you fighting so hard for this and that should tell a little about the magnitude of the problem you are trying to solve.  

	[SM] Or about the lack of fore-sight in those that think deploying existing L4S without any safe guards onto the existing internet. I have a pretty clear prediction about how the L4S experiment is going to proceed unless properly contained, and I want to save us all unnecessary hassle to post-hoc explain how this WG could allow such unfinished engineering to be released upon the rest of the internet... I am a bit puzzled, that after all the data that clearly shows L4S already failing hard in the lab, you consider an "experimental" deployment without any safety mechanisms as advisable...

> 
>> 
>> 
>>> In addition, your  intended purpose with such an guard DSCP is quite likely
>> to be met with confusion among 3GPP operators as there is no evidence of
>> RFC3168 AQM in 5G systems.
>> 
>> 	[SM] Hmm, I am puzzled why you see it a problem to explain in detail
>> to them what risk an unguarded L4S deployment will carry, but let me help
>> you out here. As long as 3GPP operators can guarantee that L4S packets
>> never ever leave their domain, they are already free to use what ever
>> method they want, the do not need the IETF's blessing to use L4S. I assume
>> however, that data packets carried over 3GPP member networks, might
>> "occasionally" actually get sent to end-hosts outside of the operators
>> network. It is that second case in which containment/informed consent
>> becomes important. Why, because L4S traffic (as seen in TCP Prague)
>> behaves considerably different under a number of conditions quite common
>> on the existing internet, like:
>> a) running rough-shod over other glows in shared rfc3168 queues,
>> b) introducing a hitherto unseen level of RTT bias which will significantly
>> change the sharing behaviour between short RTT (i.e. eyeball<->CDN) and
>> longer RTT flows, with RTT distributions over the internet well within the
>> range from single low double digits, to well above 100ms this is an important
>> change that might require operator opt-in.
>> c) introducing an inherent disadvantage for existing standards compliant
>> traffic versus the new comer, which also might require operator opt-in.
>> 
>> Especially b) and c) seem like POLICY issues, that operator will likely not
>> accept getting dictated from an RFC, but consider to be under their sole
>> direction?
> [IJ] See below about the use of the ECT(1) code point
> 
>> 
>> I guess you might direct confused operators to the tsv mailing list, where we
>> can discuss such issues and patiently will explain the risk of the L4S
>> experiment as well as possible mitigation strategies.
>> 
>> 
>>> 
>>> I only see that this discussion goes at length to protect classic ECN enabled
>> traffic in the possible cases where network nodes implement RFC3168 AQMs
>> (or FQ-CoDel) and omits the fact that these are eventually either upgraded
>> or replaced over time.
>> 
>> 	[SM] Well, if you are wiling to WAIT with the L4S experiment UNTIL
>> these are upgraded and/or replaced that sounds like a viable plan... if
>> however you want an earlier experiment, maybe come up with a counter-
>> proposal for a mitigation strategy that will also allow willing parties to
>> participate in the experiment without force-recruiting those parts of the
>> internet into the experiment that have not opted in. I do not claim my sketch
>> is complete or without challenges, or that it the best possible
>> mitigation/containment strategy, but so far we only have two proposals on
>> the table, and mine seems less ambitious (and I believe fixing L4S' issues for
>> good, like in Jonathan's proposal would be better, I see no way forward,
>> where L4S proponents will agree to that, fallacy of sunk cost and all)...
>> 
>> 
>>> IANA already lists ECT(1) as intended for experimental purposes only so I
>> would say that it is a bad idea long term to continue to claim ECT(1) for
>> RFC3168 AQMs.
>> 
>> 	[SM] If the RFCs are changed that is a valid stance for the future, but
>> will not help with legacy deployment, will it?  Then again, if you are willing to
>> give notice now and wait for, say, a decade for deployments to change to the
>> new mode, I see no issue with that. But then that would mean the L4S
>> experiment would need to wait just as long (no objections from my side ;) ).
> [IJ] Even legacy equipment is upgraded every once in a while or gets replaces because it gets too old or just breaks down. 

	[SM] Yes, are you willing to put a number on that, and more importantly, are you willing to hold the L4S experiment until that point? I do not consider that to be a proposal that is on the table, not from you, not from the rest of team L4S, nor the wider WG. So let's please come back to the concrete proposal how to get your experiment started, okay?


> 
>> 	To repeat, my proposal of using a guard DSCP only serves the
>> purpose of allowing an L4S experiment in live production networks in the
>> near future. If L4S aims for the long game with deployment in 10 years, we
>> are probably better off with actually fixing its trouble spots for good ;)
> [IJ] Collected answer to all the above. All I see is that this RFC3168 AQM is brought up repeatedly, when prompted about the possibility that even RFC3168 AQMs can be updated (the obvious first step is to make these follow https://www.iana.org/assignments/dscp-registry/dscp-registry.xml ) , it is only met with all kinds of arguments like we don't do this until L4S is deemed safe for deployment and we wont allow the experiment to happen until [TSVWG formally says whatever...], this is probably as close to a catch 22 situation that you can get in IETF. 

	[SM] Nobody is stopping you from sending patches e.g. to the Linux kernel mailing list, so if you consider this to be an important point, you now the address to send your patches to. The power to resolve that catch22 is in your hand, which is to say, it is not a catch 22 situation at all.

> This is to me just smokes and mirrors with FUD as a main ingredient and it is getting harder and harder to keep  a serious discussion.

	[SM] Ironically, this argument comes as response to a concrete proposal how to get the L4S experiment air-borne. Maybe you re-rad my proposal and come back to the discussion without the assumption I would be out to get you/L4S? This is about how to contain the predicted fall-out of the experiment to those parties that have accepted that fall-out might happen and (hopefully) are prepared to clean up if something goes wrong. You know, really just standard cautious engineering practices.

@chairs, what am I to make out of the fact, that none of the L4S proponents seems to find the time to actually read my modest sketch of a proposal and discuss it on its merits?
Against my better judgment about the quality and readiness of L4S, I am trying hard to build a bridge, and all I receive in return is gross generalizations...


Best Regards
	Sebastian


> 
>> 
>> Best Regards
>> 	Sebastian
>> 
>> 
>>> 
>>> /I
>>> 
>>> From: tsvwg <tsvwg-bounces@ietf.org> On Behalf Of Pete Heist
>>> Sent: den 27 mars 2021 14:33
>>> To: tsvwg IETF list <tsvwg@ietf.org>
>>> Subject: Re: [tsvwg] L4S DSCP (was: L4S drafts: Next Steps)
>>> 
>>> ...
>>> 
>>> On Fri, 2021-03-26 at 08:54 -0400, Kyle Rose wrote:
>>> On Fri, Mar 26, 2021, 8:30 AM De Schepper, Koen (Nokia - BE/Antwerp)
>> <koen.de_schepper@nokia-bell-labs.com> wrote:
>>> I understood the goal of your proposal. But before diving into the details of
>> a DiffServ-based proposals, I'm taking a step back asking: Is using DiffServ an
>> option at all.
>>> 
>>> Why wouldn't it be? The point of the proposal AIUI is to require networks
>> to take action to explicitly opt-in to this experiment. Given the DiffServ
>> bleaching that occurs by default at network boundaries, operators that take
>> no action will not find themselves ambushed by novel behavior.
>>> 
>>> I agree- the topic of this thread is the use of a guard DSCP for experiment.
>> Sorry if I contributed to mixing in other possible uses early on.
>>> 
>>> This approach allows for experimenting with ECT(1) as a classifier in a safe
>> (contained, time-limited) way, thus allowing a path toward universal
>> deployment (i.e., removing the DSCP guard) if the experiment is successful
>> without requiring standardization and rollout of end-to-end DiffServ. And it
>> does so (a) without permanently burning the ECT(1) code point if the
>> experiment fails, and (b) in an opt-in manner that greatly reduces the
>> potential for unintended side effects on classic traffic.
>>> 
>>> This seems to me like the obvious path toward consensus on an
>> experimental deployment aimed at gathering real-world experience without
>> first committing to something unproven.
>>> 
>>> Although an RFC isn't technically required to do this, it should still serve to
>> codify how DSCP should be used and treated, and also to raise visibility as a
>> sanctioned IETF experiment. After a successful experiment at "operator
>> scope" (if that terminology captures it, but the larger the better), it should be
>> easier to justify and start an experiment at Internet scope.
>>> 
>>> I also think that with codepoint space this tight, it's not just about verifying
>> safety, but also effectiveness. I feel the same way even for proposals that
>> fall under RFC4774 Option 3 ("Friendly Coexistence with Competing Traffic").
>>> 
>>> Pete
>>> 
>>> Kyle