Re: [tsvwg] David Black (individual) on safety of L4S for the Internet

Sebastian Moeller <moeller0@gmx.de> Sat, 16 May 2020 14:31 UTC

Return-Path: <moeller0@gmx.de>
X-Original-To: tsvwg@ietfa.amsl.com
Delivered-To: tsvwg@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 2E3513A045B; Sat, 16 May 2020 07:31:48 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: 0.995
X-Spam-Level:
X-Spam-Status: No, score=0.995 tagged_above=-999 required=5 tests=[DKIM_SIGNED=0.1, DKIM_VALID=-0.1, FREEMAIL_ENVFROM_END_DIGIT=0.25, FREEMAIL_FROM=0.001, RCVD_IN_MSPIKE_H2=-0.001, SPF_HELO_NONE=0.001, SPF_PASS=-0.001, THIS_AD=0.744, URIBL_BLOCKED=0.001] autolearn=no autolearn_force=no
Authentication-Results: ietfa.amsl.com (amavisd-new); dkim=pass (1024-bit key) header.d=gmx.net
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id 0xjA34dmqvH8; Sat, 16 May 2020 07:31:46 -0700 (PDT)
Received: from mout.gmx.net (mout.gmx.net [212.227.15.19]) (using TLSv1.2 with cipher ECDHE-RSA-AES128-GCM-SHA256 (128/128 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id B92823A0440; Sat, 16 May 2020 07:31:45 -0700 (PDT)
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/simple; d=gmx.net; s=badeba3b8450; t=1589639459; bh=5wflrsIBkszuEbXj+J24m61qMmOlMp71uX6xWW7H/JI=; h=X-UI-Sender-Class:Subject:From:In-Reply-To:Date:Cc:References:To; b=cOvyQXHCzAZzr/pZW3BdZL1FbuPXV8oow8zkBw0laGBIxbEODmroCCE8r0Rw8LfRz ALFJ2VaQ2EmKhn7C/2iLDEdUFg6P8aXQyznsfuUZmwcLbFOFZ2w+U2uABzF/F1hXMj qUPlXlQlUgzwYrIxPuPcZNphZjHkArMYZ8pPHeX4=
X-UI-Sender-Class: 01bb95c1-4bf8-414a-932a-4f6e2808ef9c
Received: from hms-beagle2.lan ([77.1.133.219]) by mail.gmx.com (mrgmx004 [212.227.17.190]) with ESMTPSA (Nemesis) id 1MLi8g-1jrUix2KX2-00HfO3; Sat, 16 May 2020 16:30:59 +0200
Content-Type: text/plain; charset="us-ascii"
Mime-Version: 1.0 (Mac OS X Mail 12.4 \(3445.104.14\))
From: Sebastian Moeller <moeller0@gmx.de>
In-Reply-To: <eb0228d4-419e-5b94-7e6e-888436f69e2a@bobbriscoe.net>
Date: Sat, 16 May 2020 16:30:57 +0200
Cc: "tsvwg@ietf.org" <tsvwg@ietf.org>, tsvwg-chairs@ietf.org
Content-Transfer-Encoding: quoted-printable
Message-Id: <B2E09E7E-17C6-4CE8-B6B7-9EC6F478BE15@gmx.de>
References: <MN2PR19MB4045DBC270D70DECE5F2B4AC83A20@MN2PR19MB4045.namprd19.prod.outlook.com> <75435344.181735.1589475836060@mail.yahoo.com> <eb4ff580-0700-764f-df82-ce13344b5743@bobbriscoe.net> <MN2PR19MB4045638F9583301BFEDA9CF083BD0@MN2PR19MB4045.namprd19.prod.outlook.com> <8a554935-3603-c827-469d-c9e093bf5fa3@erg.abdn.ac.uk> <6B8E37BF-F5E8-4BB2-B38E-471A1802BBEC@gmx.de> <eb0228d4-419e-5b94-7e6e-888436f69e2a@bobbriscoe.net>
To: Bob Briscoe <in@bobbriscoe.net>
X-Mailer: Apple Mail (2.3445.104.14)
X-Provags-ID: V03:K1:VeyPsG0PowEeCZkGAX6FUhSYHgogoebQIffJJXeH6Sp2RRkBLNR YPSLwpiRElRrOQc5vLAGUPXA0eOuICJdf9PclYNLRhIs59xp5mCX1i4oU1aKdajqP86VhFb UeJY/kh+pjQEf6VW0eRKZCHlAmDe6LIfAyBifEfNM2NhK0xnIdbEL+VRnhvNIKfaNzQsLmW KaiNxoZ1v5P00pzNr2kCg==
X-UI-Out-Filterresults: notjunk:1;V03:K0:ItvwbzPD7V4=:w0hWXt6dEsZbw5Ed1JFSCN 5G7aapiht3PTQTVksbPcobI3q3UiChmE5tTOpIVm9ADXw+uMGyJgM//26WnjoNLTzILvX/Ym+ xNflgq3khib7kokA1aRHe8aHnpU/BlSuHYYQ1NpFoYk03LbeI7WnOwAzTSsEw4K5AY7UCNy/5 8GYGQvl0RHSbdQAtHiE27GsgnDPvI47OmdDyNxWFKInP/yd08i9aiyW3JSNKkHISFJmj7ryni MOYBatQCCfPxvCtg+juWp2zYivsD7fQGZMBbFErwBBVW+L84p7XUol89RI7wc/8iQet/gq4/3 qZPkkZxFs3QH+CzemjFIkbR4C6KbCrqC3tRzH86vg2bBRqsqUFGiSdPeSoy8Ml4jYfpe8rSva ZKb7uj+GCRVYsHJOOJvTSFyHKavKo91LAs0+QS8QehlEW/EQoRcP7zmgc1eoeHOYFa7Uisn5S VynrP/8SXsdnm/18iXK9DVVupUILSVSGi2iHKTc2cyMFW3vUhvwN70raVzWpnguFvgzfWlt9K WbiqBwzTviumnJs+IzpefCKqM1OrxBhBw1rgAq66Pw9EA31m5CNd0lNK5nRn5HsScM2Q284AP 0wBxOZ7P5BrT9O7ytiji2keFX3GTn0SNBD9HjTTDNqNpUtIyfh4dxCeL3Z2NsDMH2wAuZL7X/ 10qv5wYhrqT1vS/CMJCUUM8lQmeQAFMbAzYmP9bSrIKQMAAD0npKYIo4IvDysCPdxpH41TDI0 jmuNhR8brflN+JsJdmVYML0QRdcoke+1lKw6X8HEO2IQsTNBuq6NnVJ+baTxCAfgut80SnOBZ wv178TLF27jIyD7AJ4pIOQNaBSRnX0ailV2YZpIcPgX/TueVQ/2ZItvRFbvINDUXY0zwrJuM2 +edLEvG07/yAXaDYaN+3LKTBE38ExPk9o5NLnKWq891lvIX63ZSlD+qRKg6ASH1fx+8bhj8r6 g7ARyAmxBB5ZUJrxyul9fYcVhYlwxw1beFFZtncP2Y76vwCHa6cdfUn7C3osFAxHFbRBi5x14 C+a1gAypQca4k/537WKcGZJvAh7y/m5T01NBw8BVSi4uqZLgX1Ei7JefSYBggUBvJQQsMmsJU K99lMHGNFBLAx/LYC/2RSENmQrm2c9Shmn3IewEDlZxqQ3bOuPe259tAdA+wpoIpSp0kCfz0l CjjKYRFBeyfD+SgxDpKfs1b9+u7mHAIOPzOgNminbHI8o4t2RJMeDakaFiG71Z3AjoGfW9Jq/ +gK5Kn+Gpe8MeJ35u
Archived-At: <https://mailarchive.ietf.org/arch/msg/tsvwg/fd2SKThUVNUjSyq-eQen3IhNj9g>
Subject: Re: [tsvwg] David Black (individual) on safety of L4S for the Internet
X-BeenThere: tsvwg@ietf.org
X-Mailman-Version: 2.1.29
Precedence: list
List-Id: Transport Area Working Group <tsvwg.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/tsvwg>, <mailto:tsvwg-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/tsvwg/>
List-Post: <mailto:tsvwg@ietf.org>
List-Help: <mailto:tsvwg-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/tsvwg>, <mailto:tsvwg-request@ietf.org?subject=subscribe>
X-List-Received-Date: Sat, 16 May 2020 14:31:48 -0000

Hi Bob,

more below in-line, prefixed with [SM]. 


> On May 16, 2020, at 01:12, Bob Briscoe <in@bobbriscoe.net> wrote:
> 
> Sebastian,
> 
> On 15/05/2020 12:26, Sebastian Moeller wrote:
>> Hi Gory,
>> 
>> 
>>> On May 15, 2020, at 11:59, Gorry Fairhurst <gorry@erg.abdn.ac.uk> wrote:
>>> 
>>> See in-line
>>> 
>>> On 15/05/2020 01:03, Black, David wrote:
>>>> Bob,
>>>> [still posting as an individual, not as WG chair]
>>>> 
>>>> 
>>>>> Firstly an appeal to everyone to stop talking about wiping the ECN field
>>>>> as if it is acceptable. Bleaching ECN is not a safety mechanism, except
>>>>> as a last resort. Treating ECT(1)
>>>>> /as if/
>>>>>  it is Not-ECT is far
>>>>> preferable to wiping it so it
>>>>> /is/
>>>>>  Not-ECT.
>>>>> 
>>>> I concur with that appeal ... but ...
>>>> 
>>>> .... We've been through an analogous adventure with DSCP bleaching, as RFC 2474 recommends that behavior for DSCPs (treat unknown DSCPs as best effort without changing the DSCP) but the network operators went ahead and bleached DSCPs at network boundaries, as described in Section 1 of RFC 8100 (
>>>> https://www.rfc-editor.org/rfc/rfc8100.html#section-1
>>>> ).  I strongly suggest reviewing that history towards understanding why things turned out that way.
>>>> 
>>>> 
>>> Well, some operators have chosen a model that does that, I can't resist self-citing some research that shows this might not be the full story ... "Exploring DSCP modification pathologies in the Internet" (2018).
>>> 
>>> https://www.sciencedirect.com/science/article/pii/S0140366417312835
>> 	[SM] Well, my take on that is that there is a 80% or higher chance (transparent plus Reset ToS prec. plus Reset ToS prec. CS6/CS7)  for DSCPs with 3 leading zero bits to survive internet traversal. That seems like a viable starting position for a LL classifier IMHO.
> 
> [BB]
> I don't think you've read the paper closely enough. The measurements you quote did not cross any access network. They were  from a couple of dozen vantage points in Digital Ocean data centres to large numbers of popular web server destinations. That doesn't measure what typical access networks do to the DSCP.

	[SM] Oh, sure, But for L4S to go anywhere the edge ISPs need to be on-board anyway, so that final level of potential bleaching, is IMHO less of a hard obstacle and more of a test whether there is actually demand for L4S' promises and deliverables. That applies both to the fixed-line and the mobile edge. 


> 
> The paper does include measurements from 107 vantage points connected to Internet access networks, but solely mobile. Here, for any DSCP except best efforts, the % unchanged is never better than 38%.

	[SM] Yes, but either the carriers are interested in L4S ad then passing a single DSCP will not be an unsurmountable problem, or the market will have spoken about L4S.


> 
> For how fixed access networks mangle Diffserv, you'd need to measure from vantage points on something like PlanetLab. Reference [31] measured from both MONROE and PlanetLab vantage points to characterize mobile and fixed access, but that was looking more at the effect on ECN than Diffserv. We did take some Diffserv measurements to look for correlation with ECN wiping. But from memory I think we only added the Diffserv test over mobile, 'cos that's where nearly all the ECN wiping was. I'll take a look at the data when I have some time (ha ha!)

	[SM] That would surely be interesting in itself, but I believe orthogonal to the question whether DSCPs are a viable way to signal intent end-2-end. IMHO that will work if the intermediate networks can also profit, and according to L4S promises they should. (I am less optimistic about these advantages offered by L4S, but I am happy if I should be proven wrong about this by reality).


> 
>> In reality L4S will only work well over short paths anyway (mostly CDN -> end-user)
> 
> [BB] Is this a fact, or an alternative fact?

	[SM] Future tense should have made clear that this is a prediction, sorry, but as a non-native speaker of english I sometimes miss subtle points and assumed no "In reality I predict, L4S will...". 
	I base this prediction on ancient and recent rounds of testing from both team L4S and team SCE. The amount of realistic scenarios where L4S falls way short of how reasonable minds will read its promises, and the lack of sufficiently adversarial testing from team L4S, together with the hopes and wishes that ECT(1) will not be abused (instead of hard requirements and/or analysis). 
	I still think that on reasonable short paths things might work reasonably well most of the time though, and hence conceded positive uitility for L4S for short paths. I note that when I asked about bi-directional saturating tests, you did not deliver data, but just accepted that L4S will do badly under those circumstances.

> 
>> and there the number of Diffserve domain crossings should be on the lower side and SLAs might be an option to make an L4S-dscp actually survive well.
>> 
>> 	As the bleaching ECT(1) argument demonstrates any marker on a packet will be considered fair game to manipulation if that still allows delivery of the packets and fiddling it gives advantages to either senders or to intermediate hops, so the superiority of ECT(1) in internet traversal really is just a snapshot due to the circumstances that nobody got sufficiently annoyed by ECT(1) yet.
>> 
> 
> [BB] The bleaching ECT(1) argument doesn't /demonstrate/ anything. It's your conjecture.

	[SM] Erm, sorry, I did not introduce ECT(1)-bleaching, it were other's supportive of L4S that brought up that in case of failure bleaching ECT(1) might be an option. All I note above is that if bleaching ECT(1) gives an intermediate node an advantage it will be done, no amount of words in the L4S RFCs to the opposite. I also predict L4S to fail at least of non-short paths and hence assume ECT(1) bleaching to become a reality. Call it conjecture, but your hypothesis that ECT(1) will not be bleached is based on the same incomplete information and hence also just a conjecture.


> 
> Currently, for fixed networks:
> * according to our measurements (ref [31] in Gorry's study), from 54 PlanetLab vantage points on 25 networks in 22 countries to the Alexa top 500k web servers, consistent with previous studies, the ECN codepoint is wiped on 0.23% of paths.
> * in contrast, according to Gorry's study measured at a similar time, from a couple of dozen vantage points in data centres, there is some form of DSCP pathology on 70% of paths.

	[SM] Yes, but proper reading of that data indicates that by thoughtfully selecting a DSC with the 3 TOS precedence bits set to zero, significantly increases that percentage to above 80%. I did mention that explicitly, so let's stick to my numbers please.


> * Gorry's study also found a high correlation between clearing the DSCP and clearing the ECN field, which supports the hypothesis that a well-documented bug reported on more than one brand of equipment is still prevalent, where the ECN field is cleared as an unintentional side-effect of clearing the DSCP.

	[SM] Sure, but that does not change the fact the ECT(1) is not qualitatively different in that regard.

> 
> For mobile:
> * Our study from vantage points in 18 mobile networks found 10.5 always wiped the ECN codepoint, and the others never did.
> * Gorry's study from 107 vantage points, in an unstated number of mobile networks, found only between about 5% and 25% of paths preserved the DSCP.

	[SM] Yes that looks less attractive, but with mobile carriers interested in L4S' offerings, that should be relatively easy to change, given the size and range of the big mobile carriers action of a few players will "unlock" L4S for a considerable number of users, even if other ISPs struggle behind.


> 
> When we put a huge amount of effort into measurement studies, it's because data is important. When the data contradicts what you want to believe, you are welcome to say that the data might change in the future.

	[SM] I conceptually agree, except I offered a pretty close to the numbers reading of the paper. So let's stick to objective arguments, please. 


> And you can make up reasons why this might happen. But I'm not going to make the same points against your arguments again because, when you've said the same made-up things once, and twice and three times and four times, it achieves nothing other than demonstrating that you like the sound of your own keyboard.

	@chairs: I wonder whether this is the level of discourse to aim for on this list?

> 
>> IMHO if L4S works and is really worth its salt (meets its promises), it should be able to pull its own weight, by making networks operators take care to not bleach its reference DSCP, instead of forcing ECT(1) on everybody.
> 
> [BB] There is no reference DSCP for L4S.

	[SM] I apologize for being to terse here, I am talking about a hypothetical DSCP L4S could use as signal from the end-points to request 1/p-congestion signaling. I assumed that everybody participating in this discussion is sufficiently fluent about the L4S drafts to understand that. Your argument indicates that I was wrong, so thanks for giving me an opportunity to clarify this.

> ECT(1) already inherently identifies L4S packets.

	[SM] That is the plan, but we have gone though this ad nauseam, so please tell me L4S sees a CE marked packet, what kind of flow does this come from? I do not ask whether that is important to know, I ask how would an L4S node deduce this from a non-existent identifier.


> If a DSCP were used as well, networks supporting L4S would ignore it, given it's redundant anyway, and it might sometimes be bleached.

	[SM] Well, you probably missed my position, I am of the opinion that ECT(1) should not be used as input, and hence that situation would not really happen. I have given my rationale in the past, so will not repeat that here (but it is related to my prediction above).

> 
> It is poor practice to use 2 identifiers for one feature, because both then have to be checked and cases where they are inconsistent have to be handled, potentially opening security vulnerabilities.

	[SM] I am with you on this Bob, we just differ in which "identifier" we would jettison respectively.


Best Regards	


Sebastian

> 
> 
> Bob
> 
>>> The reasons for field bleaching seem to vary, (and, alas, a significant proportion still seems to be due to configured ToS semantics).
>> 	[SM] Clearly one of the reasons is that so far there is absolutely zero value to conserve an unhandled DSCP and treat it like BE for the operator in question. According to the L4S RFCs however, everybody is going to profit from L4S everywhere, so surely those operator straggling today to leave DSCPs alone will now do so for the L4S-dscp since that will give them better network performance (even if not participating in the L4S experiment, they could optimistically expect less bursty traffic patterns, allowing to drive the gear at higher average load). Either that or that "everybody is going to profit" claim is being falsified, either way an interesting result.
>> 
>> Best Results
>> 	Sebastian
>> 
>> 
>>> Gorry
> 
> -- 
> ________________________________________________________________
> Bob Briscoe                               http://bobbriscoe.net/