Re: [tsvwg] L4S DSCP (was: L4S drafts: Next Steps)

Sebastian Moeller <moeller0@gmx.de> Sun, 28 March 2021 15:13 UTC

Return-Path: <moeller0@gmx.de>
X-Original-To: tsvwg@ietfa.amsl.com
Delivered-To: tsvwg@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id B6D663A1EB7 for <tsvwg@ietfa.amsl.com>; Sun, 28 Mar 2021 08:13:01 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -1.649
X-Spam-Level:
X-Spam-Status: No, score=-1.649 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, DKIM_SIGNED=0.1, DKIM_VALID=-0.1, FREEMAIL_ENVFROM_END_DIGIT=0.25, FREEMAIL_FROM=0.001, RCVD_IN_MSPIKE_H2=-0.001, SPF_HELO_NONE=0.001, SPF_PASS=-0.001, URIBL_BLOCKED=0.001] autolearn=no autolearn_force=no
Authentication-Results: ietfa.amsl.com (amavisd-new); dkim=pass (1024-bit key) header.d=gmx.net
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id TrNksMoA2pdp for <tsvwg@ietfa.amsl.com>; Sun, 28 Mar 2021 08:12:57 -0700 (PDT)
Received: from mout.gmx.net (mout.gmx.net [212.227.17.21]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id 99F673A1EC0 for <tsvwg@ietf.org>; Sun, 28 Mar 2021 08:12:56 -0700 (PDT)
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/simple; d=gmx.net; s=badeba3b8450; t=1616944366; bh=fv3e6bTb8pXv/KdEoolj0VlpNr9S8M5XG0VHSF5q4XM=; h=X-UI-Sender-Class:Subject:From:In-Reply-To:Date:Cc:References:To; b=amU1+fZkUpHd01IflnUdPKFirL5X4Lswa/TPmJpCUHuIuOppbYta6v1e943F8Gb4L fQBHkgdrW3I6DZmluSVv58oz6ezvPSFfLgGsnvxE/uEqsGjUIheLsFR4ah32saFk9F MBpz+4w34295+JZPRjp0cVV4X4H7wWzh5Gxgzeqs=
X-UI-Sender-Class: 01bb95c1-4bf8-414a-932a-4f6e2808ef9c
Received: from [192.168.42.229] ([77.10.97.225]) by mail.gmx.net (mrgmx104 [212.227.17.168]) with ESMTPSA (Nemesis) id 1MybKf-1lq0X23F2z-00yxKA; Sun, 28 Mar 2021 17:12:45 +0200
Content-Type: text/plain; charset="utf-8"
Mime-Version: 1.0 (Mac OS X Mail 12.4 \(3445.104.17\))
From: Sebastian Moeller <moeller0@gmx.de>
In-Reply-To: <HE1PR0701MB22999F18CBC7874B410B5E13C2609@HE1PR0701MB2299.eurprd07.prod.outlook.com>
Date: Sun, 28 Mar 2021 17:12:41 +0200
Cc: Pete Heist <pete@heistp.net>, Kyle Rose <krose@krose.org>, "C. M. Heard" <heard@pobox.com>, Jonathan Morton <chromatix99@gmail.com>, "De Schepper, Koen (Nokia - BE/Antwerp)" <koen.de_schepper@nokia-bell-labs.com>, tsvwg IETF list <tsvwg@ietf.org>
Content-Transfer-Encoding: quoted-printable
Message-Id: <9839D5ED-78DB-4F91-99F9-39CAB8C2121B@gmx.de>
References: <MN2PR19MB404527384A1B1DD9CFC2A3D983659@MN2PR19MB4045.namprd19.prod.outlook.com> <6f0ac4bf-bd1a-65cd-1d40-a97d4aa71aab@bobbriscoe.net> <7B4426F9-E1C5-4F88-A264-0D54C809D523@gmail.com> <AM8PR07MB74761AFC8F5BE0F9573DFF32B9629@AM8PR07MB7476.eurprd07.prod.outlook.com> <6481E606-2458-49D7-B580-8DF7B93494FD@gmx.de> <AM8PR07MB747675E421F0B7A6246C67BEB9619@AM8PR07MB7476.eurprd07.prod.outlook.com> <9A9D4AC3-43F0-4778-839B-E1E247A3C5FA@gmx.de> <AM8PR07MB7476026EA3AA7AD49622B296B9619@AM8PR07MB7476.eurprd07.prod.outlook.com> <CAJU8_nUgNa-W4wf2Vb8sUUqv4XUsSFdVQFUWwrTGw0gDshahiQ@mail.gmail.com> <92b3b23db1dc4ce11162a31acf83c0dd01868a27.camel@heistp.net> <HE1PR0701MB22999F18CBC7874B410B5E13C2609@HE1PR0701MB2299.eurprd07.prod.outlook.com>
To: Ingemar Johansson S <ingemar.s.johansson@ericsson.com>
X-Mailer: Apple Mail (2.3445.104.17)
X-Provags-ID: V03:K1:GWvItDeuhczcLeQGacXlflzNEHLggayJ1wNkb2mQQrUwNfVUYQ4 ARiuZwYc/c3XU++G6fU6mFlCBbvjx3t7LdDu5KKY2py++PJU6jLEWPLU9D3eo3Cg9FCVKf7 QkgRr+6X4qpSEZ6ilFx9tuj3m62yg+n0PFRsGUE24uV1RIWhO4kJoylV0GvpqHT9SxaZRRb ZP4qBQsJelCsvWO0VsRDw==
X-UI-Out-Filterresults: notjunk:1;V03:K0:igqRVo+p660=:vh/ar/AYKnhtkCaltxJEw0 CVkuWdDRXb+Ng+/R8Ml9kPUrIuKBZcWZFaoGYIwd/W1iE0ZXo7b0uWLR3+MPsL32BmMMZ0vwZ 6Kw0Eynaga7BW+ChVLIrKcNU/7HOMoVqopvCCHIvQUB+6Wm7p1sFxBsx+rb/cz0beLTYa3RyH yGlPGYAU2ScKJD5WnZVt5g7l2darSm/sBuOtQMRWE3cobgGjAAW2mmlbsVz4/0gfgJzBy6iHZ o3IzI5m/rbXXeFSDt02RvoC4lxxhvm3ANa79eVYB3AFcQnDR9tOHCg5JKOJ8OJX5EKloiTSr/ Iqw8eP4VJWvWg5qrchjpnK8zhXfEN67kGyELUKed8odOh3deIhD3Ek2ywQir3wQZBdAMV8XsX KyDeJF/WBHdvuRTy9jiGej5MSLdngbKQAztABxUwm7JBRMTHIfUrxOU9+AG2qLxGhAd6QBX83 99DxEEWUdyLmU1IsCKUsjZiGhdpvidyn0HJ0OxbHBvnazKuX0B1A2B+voeSZdlzJ4Zrbng+92 NHNjmyryqUh+CWQG5ItetoXPMRNnea5Xvtb0TZaJ2I5BcxtkTjX3v+g6+MPzzfXQNjt65pK2L oy6/+TeQ4BwrCriU6rD+Il/4O4CFTQ/JLM+c3NdZUaIp/vvR7RhuZ9f0HokjK7f7m5a5yOmJC +aPR+QI0QwVYnWqMJmpAxsFea2qgV6HOeTy1jsUCxTFqJPx5bOPXj9ilMMStjs7nl21hMRRWW bgeLi34D1JmrHSZt2LmR79RQdTYsxkZA9ToMq/2ZVhmoSWxdQWOISTjLAKWplP4ShX9Be/Kuo 1MOymFhL09w3/9YmDDl/KJjDWRjwVDClaLkVEYfInsTLNNJ4n7MB8racYJfoi//HFdOA/nhes 8epTNPSgk7bj1TK7YnVpRJ3rH0kB0zJIP9kCwQSwT+taG9qwxYKiklW22ZNz/YDHqe56DBHmd rLuk1jeHzsL9ZPRvfWXepsL64tD1M99yTJHGiblNkn14CPo2m1JC4SbbUXYjcKFvZEfPghLU3 sWxcg6ieywuYxraRX7pM0ZC29SJF2tOH6FNLpxmQDnSIHh2KmzLfia0Z9aWnbfYzOJaUibfWb nooZWXohjIbAFi79YxBY0+sbzPTkR06+Blna9tHaI1UZKY90tEyrhEJK3jllMNSK7vjx2nty6 Hna6VknxBbyzxFe7SKntCG18P1ABZiNnUFUeVup6y6asqmFmjx91YQQjzZdFs4jEVX0JU=
Archived-At: <https://mailarchive.ietf.org/arch/msg/tsvwg/eqkpeUL4L_Pcawh9pGSHFpWP8eI>
Subject: Re: [tsvwg] L4S DSCP (was: L4S drafts: Next Steps)
X-BeenThere: tsvwg@ietf.org
X-Mailman-Version: 2.1.29
Precedence: list
List-Id: Transport Area Working Group <tsvwg.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/tsvwg>, <mailto:tsvwg-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/tsvwg/>
List-Post: <mailto:tsvwg@ietf.org>
List-Help: <mailto:tsvwg-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/tsvwg>, <mailto:tsvwg-request@ietf.org?subject=subscribe>
X-List-Received-Date: Sun, 28 Mar 2021 15:13:08 -0000

Hi Ingemar,


> On Mar 27, 2021, at 21:00, Ingemar Johansson S <ingemar.s.johansson@ericsson.com> wrote:
> 
> Hi Pete, Kyle, Charles, Sebastian, Jonathan
> CC others
>  
> I have followed this discussion for a while now. 
> It is possible in a 5G system to set up traffic filters that include 5-tuples and DSCP + more, so what you propose is possible. 

	[SM] Excellent news, thanks for this information.


> But with that said, I don’t at all see that this needs standardization and why this would be needed as part of the L4S work.

	[SM] A guard DSCP would need to be unambiguously agreed on by all participants (or rather a PHB, different DSCPs could take that role). IMHO a standards document is exactly the place to lay down the "law" on how to do this. And in addition the L4S-ops ID/RFC should spell this out in detail to facilitate such an approach. I wonder how issues affecting interoperability between entities are regulated on the 3GPP world, but I naively assume that this is handled in standards documents, no?


> In addition, your  intended purpose with such an guard DSCP is quite likely to be met with confusion among 3GPP operators as there is no evidence of RFC3168 AQM in 5G systems. 

	[SM] Hmm, I am puzzled why you see it a problem to explain in detail to them what risk an unguarded L4S deployment will carry, but let me help you out here. As long as 3GPP operators can guarantee that L4S packets never ever leave their domain, they are already free to use what ever method they want, the do not need the IETF's blessing to use L4S. I assume however, that data packets carried over 3GPP member networks, might "occasionally" actually get sent to end-hosts outside of the operators network. It is that second case in which containment/informed consent becomes important. Why, because L4S traffic (as seen in TCP Prague) behaves considerably different under a number of conditions quite common on the existing internet, like:
a) running rough-shod over other glows in shared rfc3168 queues,
b) introducing a hitherto unseen level of RTT bias which will significantly change the sharing behaviour between short RTT (i.e. eyeball<->CDN) and longer RTT flows, with RTT distributions over the internet well within the range from single low double digits, to well above 100ms this is an important change that might require operator opt-in.
c) introducing an inherent disadvantage for existing standards compliant traffic versus the new comer, which also might require operator opt-in.

Especially b) and c) seem like POLICY issues, that operator will likely not accept getting dictated from an RFC, but consider to be under their sole direction?

 I guess you might direct confused operators to the tsv mailing list, where we can discuss such issues and patiently will explain the risk of the L4S experiment as well as possible mitigation strategies.


>  
> I only see that this discussion goes at length to protect classic ECN enabled traffic in the possible cases where network nodes implement RFC3168 AQMs (or FQ-CoDel) and omits the fact that these are eventually either upgraded or replaced over time. 

	[SM] Well, if you are wiling to WAIT with the L4S experiment UNTIL these are upgraded and/or replaced that sounds like a viable plan... if however you want an earlier experiment, maybe come up with a counter-proposal for a mitigation strategy that will also allow willing parties to participate in the experiment without force-recruiting those parts of the internet into the experiment that have not opted in. I do not claim my sketch is complete or without challenges, or that it the best possible mitigation/containment strategy, but so far we only have two proposals on the table, and mine seems less ambitious (and I believe fixing L4S' issues for good, like in Jonathan's proposal would be better, I see no way forward, where L4S proponents will agree to that, fallacy of sunk cost and all)...


> IANA already lists ECT(1) as intended for experimental purposes only so I would say that it is a bad idea long term to continue to claim ECT(1) for RFC3168 AQMs. 

	[SM] If the RFCs are changed that is a valid stance for the future, but will not help with legacy deployment, will it?  Then again, if you are willing to give notice now and wait for, say, a decade for deployments to change to the new mode, I see no issue with that. But then that would mean the L4S experiment would need to wait just as long (no objections from my side ;) ).
	To repeat, my proposal of using a guard DSCP only serves the purpose of allowing an L4S experiment in live production networks in the near future. If L4S aims for the long game with deployment in 10 years, we are probably better off with actually fixing its trouble spots for good ;)

Best Regards
	Sebastian


>  
> /I
>  
> From: tsvwg <tsvwg-bounces@ietf.org> On Behalf Of Pete Heist
> Sent: den 27 mars 2021 14:33
> To: tsvwg IETF list <tsvwg@ietf.org>
> Subject: Re: [tsvwg] L4S DSCP (was: L4S drafts: Next Steps)
>  
> ...
>  
> On Fri, 2021-03-26 at 08:54 -0400, Kyle Rose wrote:
> On Fri, Mar 26, 2021, 8:30 AM De Schepper, Koen (Nokia - BE/Antwerp) <koen.de_schepper@nokia-bell-labs.com> wrote:
> I understood the goal of your proposal. But before diving into the details of a DiffServ-based proposals, I'm taking a step back asking: Is using DiffServ an option at all.
>  
> Why wouldn't it be? The point of the proposal AIUI is to require networks to take action to explicitly opt-in to this experiment. Given the DiffServ bleaching that occurs by default at network boundaries, operators that take no action will not find themselves ambushed by novel behavior.
>  
> I agree- the topic of this thread is the use of a guard DSCP for experiment. Sorry if I contributed to mixing in other possible uses early on.
>  
> This approach allows for experimenting with ECT(1) as a classifier in a safe (contained, time-limited) way, thus allowing a path toward universal deployment (i.e., removing the DSCP guard) if the experiment is successful without requiring standardization and rollout of end-to-end DiffServ. And it does so (a) without permanently burning the ECT(1) code point if the experiment fails, and (b) in an opt-in manner that greatly reduces the potential for unintended side effects on classic traffic.
>  
> This seems to me like the obvious path toward consensus on an experimental deployment aimed at gathering real-world experience without first committing to something unproven.
>  
> Although an RFC isn't technically required to do this, it should still serve to codify how DSCP should be used and treated, and also to raise visibility as a sanctioned IETF experiment. After a successful experiment at "operator scope" (if that terminology captures it, but the larger the better), it should be easier to justify and start an experiment at Internet scope.
>  
> I also think that with codepoint space this tight, it's not just about verifying safety, but also effectiveness. I feel the same way even for proposals that fall under RFC4774 Option 3 ("Friendly Coexistence with Competing Traffic").
>  
> Pete
>  
> Kyle