[tsvwg] Deprecating RFC 3168 for future ECN experimentation
Steven Blake <slblake@petri-meat.com> Fri, 26 March 2021 17:01 UTC
Return-Path: <slblake@petri-meat.com>
X-Original-To: tsvwg@ietfa.amsl.com
Delivered-To: tsvwg@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id C47FB3A232B for <tsvwg@ietfa.amsl.com>; Fri, 26 Mar 2021 10:01:49 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -1.898
X-Spam-Level:
X-Spam-Status: No, score=-1.898 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, RCVD_IN_DNSWL_NONE=-0.0001, RCVD_IN_MSPIKE_H3=0.001, RCVD_IN_MSPIKE_WL=0.001, SPF_HELO_NONE=0.001, SPF_PASS=-0.001] autolearn=ham autolearn_force=no
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id vRZ8uM6pQBwn for <tsvwg@ietfa.amsl.com>; Fri, 26 Mar 2021 10:01:47 -0700 (PDT)
Received: from dog.birch.relay.mailchannels.net (dog.birch.relay.mailchannels.net [23.83.209.48]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id 24AE53A2329 for <tsvwg@ietf.org>; Fri, 26 Mar 2021 10:01:46 -0700 (PDT)
X-Sender-Id: totalchoicehosting|x-authuser|slblake+petri-meat.com@eagle.tchmachines.com
Received: from relay.mailchannels.net (localhost [127.0.0.1]) by relay.mailchannels.net (Postfix) with ESMTP id DBAE4121BCB for <tsvwg@ietf.org>; Fri, 26 Mar 2021 17:01:45 +0000 (UTC)
Received: from eagle.tchmachines.com (100-96-133-36.trex.outbound.svc.cluster.local [100.96.133.36]) (Authenticated sender: totalchoicehosting) by relay.mailchannels.net (Postfix) with ESMTPA id 2A521121998 for <tsvwg@ietf.org>; Fri, 26 Mar 2021 17:01:45 +0000 (UTC)
X-Sender-Id: totalchoicehosting|x-authuser|slblake+petri-meat.com@eagle.tchmachines.com
Received: from eagle.tchmachines.com (eagle.tchmachines.com [208.76.80.20]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384) by 100.96.133.36 (trex/6.1.1); Fri, 26 Mar 2021 17:01:45 +0000
X-MC-Relay: Neutral
X-MailChannels-SenderId: totalchoicehosting|x-authuser|slblake+petri-meat.com@eagle.tchmachines.com
X-MailChannels-Auth-Id: totalchoicehosting
X-Language-Hook: 3d0746b92ca49d0b_1616778105550_2916030433
X-MC-Loop-Signature: 1616778105550:1991595068
X-MC-Ingress-Time: 1616778105550
Received: from [136.56.88.61] (port=55084 helo=axion.home.arpa) by eagle.tchmachines.com with esmtpsa (TLS1.2) tls TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384 (Exim 4.94) (envelope-from <slblake@petri-meat.com>) id 1lPpqB-00039X-9r for tsvwg@ietf.org; Fri, 26 Mar 2021 13:01:43 -0400
Message-ID: <1b673100019174d056c44339d3b1758df058a2aa.camel@petri-meat.com>
From: Steven Blake <slblake@petri-meat.com>
To: "tsvwg@ietf.org" <tsvwg@ietf.org>
Date: Fri, 26 Mar 2021 13:01:42 -0400
Content-Type: text/plain; charset="UTF-8"
User-Agent: Evolution 3.34.4 (3.34.4-1.fc31)
MIME-Version: 1.0
Content-Transfer-Encoding: 7bit
X-AuthUser: slblake+petri-meat.com@eagle.tchmachines.com
Archived-At: <https://mailarchive.ietf.org/arch/msg/tsvwg/hvSH7HlO25Zb0A-YmyVTZ-GZ5k0>
Subject: [tsvwg] Deprecating RFC 3168 for future ECN experimentation
X-BeenThere: tsvwg@ietf.org
X-Mailman-Version: 2.1.29
Precedence: list
List-Id: Transport Area Working Group <tsvwg.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/tsvwg>, <mailto:tsvwg-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/tsvwg/>
List-Post: <mailto:tsvwg@ietf.org>
List-Help: <mailto:tsvwg-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/tsvwg>, <mailto:tsvwg-request@ietf.org?subject=subscribe>
X-List-Received-Date: Fri, 26 Mar 2021 17:01:50 -0000
A lot (not all) of the recent arguments revolve around the assumption by some that RFC 3168 ECN deployment barely exists in the Internet, and the few networks where it does can be safely ignored, or cleaned out, or be expected to take proactive measures to protect themselves, which may in practice require them to lobby their router vendors to spin patch releases to enable (some of) the mitigation measures detailed in -l4ops-02 Sec. 5. If that is the WG consensus, then I *strongly urge* the WG to do the following: 1. Push to move RFC 3168 ECN to Historic 2. Adopt the following "New ECN" signals for future ECN experimentation: - Not-ECT - ECT - CE-a - CE-b This second step would allow for two sets of experiments. The semantics of CE-a and CE-b for the first set of experiments would be as follows: - CE-a: "Decelerate" - CE-b: "Decelerate harder" (multiplicative decrease) The exact behavior elicited by the "Decelerate" signal would be the subject of investigation. Since we are certain that any remaining RFC 3168 deployments can be safely ignored, then ECT/CE-a/CE-b can be used as unambiguous signals to steer packets into a low-latency queue, if desired. The semantics of CE-a and CE-b for the second set of experiments would be as follows: - CE-a: "Decelerate" - CE-b: "Accelerate" An aggressive fraction (100%?) of CE-b marked packets traversing a queue not in "Accelerate" state would be re-marked to either CE-a or ECT. Any packet discard (or detection of high delay variation?) must disable the transport's "Accelerate" mechanism for some interval and should cause the transport to revert to "TCP-friendly" behavior for some (different?) interval. The exact behaviors of "Accelerate" and "Decelerate" signals would be the subject of investigation. Again, since we are certain that any remaining RFC 3168 deployments can be safely ignored, then ECT/CE-a/CE-b can be used as unambiguous signals to steer packets into a low-latency queue. The differences between these two sets of experiments hinge on whether there is more utility in an "Accelerate" signal coupled with a "Decelerate" signal, or with two separate levels of "Decelerate" signals. Since it is WG consensus that the RFC 3168 ECN experiment failed after two decades, we probably only get one more chance to get this right, so careful and exhaustive experimentation which explores the design space is in order. Obviously, both sets of experiments cannot be run simultaneously on intersecting parts of the Internet. I leave the options for safely isolating these experiments as an exercise for the reader. Since we are certain that any remaining RFC 3168 ECN deployments can be safely ignored, I suggest choosing bit assignments for the four signals that induce maximum pain in the obstinate minority that might still deploy RFC 3168 ECN. Now, *if it is not WG consensus* that any existing RFC 3168 ECN deployments can be safely ignored, then I *strongly urge* the WG *to not adopt* experimental proposals that place burden and/or risk on networks that have deployed it. TL;DR: Either RFC 3168 ECN exists in the Internet, or it doesn't. Decide, and act appropriately. Regards, // Steve
- [tsvwg] Deprecating RFC 3168 for future ECN exper… Steven Blake
- Re: [tsvwg] Deprecating RFC 3168 for future ECN e… Jonathan Morton
- Re: [tsvwg] Deprecating RFC 3168 for future ECN e… Pete Heist
- Re: [tsvwg] Deprecating RFC 3168 for future ECN e… Ingemar Johansson S
- Re: [tsvwg] Deprecating RFC 3168 for future ECN e… Sebastian Moeller
- Re: [tsvwg] Deprecating RFC 3168 for future ECN e… Bless, Roland (TM)
- Re: [tsvwg] Deprecating RFC 3168 for future ECN e… Gorry Fairhurst
- Re: [tsvwg] Deprecating RFC 3168 for future ECN e… Pete Heist
- Re: [tsvwg] Deprecating RFC 3168 for future ECN e… Gorry Fairhurst
- Re: [tsvwg] Deprecating RFC 3168 for future ECN e… Pete Heist
- Re: [tsvwg] Deprecating RFC 3168 for future ECN e… daihuichen
- Re: [tsvwg] Deprecating RFC 3168 for future ECN e… Jonathan Morton
- Re: [tsvwg] Deprecating RFC 3168 for future ECN e… daihuichen
- Re: [tsvwg] Deprecating RFC 3168 for future ECN e… Rodney W. Grimes
- Re: [tsvwg] Deprecating RFC 3168 for future ECN e… daihuichen