Re: [tsvwg] L4S: Guard DSCP

Ruediger.Geib@telekom.de Tue, 27 April 2021 05:36 UTC

Return-Path: <Ruediger.Geib@telekom.de>
X-Original-To: tsvwg@ietfa.amsl.com
Delivered-To: tsvwg@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 246B63A0DBC for <tsvwg@ietfa.amsl.com>; Mon, 26 Apr 2021 22:36:45 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -4.417
X-Spam-Level:
X-Spam-Status: No, score=-4.417 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, DKIMWL_WL_HIGH=-0.001, DKIM_SIGNED=0.1, DKIM_VALID=-0.1, DKIM_VALID_AU=-0.1, DKIM_VALID_EF=-0.1, HTML_MESSAGE=0.001, RCVD_IN_DNSWL_MED=-2.3, RCVD_IN_MSPIKE_H3=-0.01, RCVD_IN_MSPIKE_WL=-0.01, SPF_HELO_NONE=0.001, SPF_NONE=0.001, URIBL_BLOCKED=0.001] autolearn=ham autolearn_force=no
Authentication-Results: ietfa.amsl.com (amavisd-new); dkim=pass (2048-bit key) header.d=telekom.de
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id EbyP8ZGus-Yl for <tsvwg@ietfa.amsl.com>; Mon, 26 Apr 2021 22:36:39 -0700 (PDT)
Received: from mailout11.telekom.de (mailout11.telekom.de [194.25.225.207]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id E641F3A0DB2 for <tsvwg@ietf.org>; Mon, 26 Apr 2021 22:36:38 -0700 (PDT)
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=telekom.de; i=@telekom.de; q=dns/txt; s=dtag1; t=1619501799; x=1651037799; h=from:to:cc:subject:date:message-id:references: in-reply-to:mime-version; bh=UULNmhzlndbc4w+D3wQFHxMlAvcH7ilmyJQtheBCeUY=; b=R/Pu+lW0GKSvsAkMUIr0UbzxE7rSIJljLxjRTF7pf2IOjZA5hQEssQRs Vc8VN5gxvDaag6Qs2F8JIPhAr8yErwxYUYrzCWrFlVzIOMf+cWo61bTrP fTnI0x4k+WmnYqLRs1YKB4PIe4jAX/maS+zceNQwil+L+r3DvNlOabHVn zERX8khuj6GJMHHDb4apoitYO4Tx9qdQbPrzJIgLcyxveSsWq520XebWt ZDbHsCf6+s9UuUhmPLBFrjFTKcQN87bxhMyJvoWaXiANQRXrQ3MFDSAxz XTmjRa1lw1JRk5p+RfgpN3haw4ECWOOekTbzTp6zHpr5YwoA4h8GJu+oa w==;
IronPort-HdrOrdr: A9a23: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
Received: from qdec94.de.t-internal.com ([10.171.255.41]) by MAILOUT11.dmznet.de.t-internal.com with ESMTP/TLS/DHE-RSA-AES128-SHA256; 27 Apr 2021 07:36:35 +0200
IronPort-SDR: ms2GzFtsOiD1rEOY8lqcn2Suh2EQuN/t/LtPWh1ChDgN99vId20srTT8GbwxPhj64WrSSmjJnx vehlNTYYhsAFvAnJy+gAu+oZeAadBrvqk=
X-IronPort-AV: E=Sophos;i="5.82,254,1613430000"; d="scan'208,217";a="322041061"
X-MGA-submission: MDFVgy+tsDLEr3f0s5ThVt29Jm5OF0TSqfXhvDyVBiAVOVks66GswGp7uaGMQZscr5YyBPPB2EDR6MNhS4CNG5MK2Gvc/CrzlvVXULK+q1UWhXdPtSecSXntw5Ph8QpBaQctkaSMj519EV6c/Tvg0c1JeWavESY0WfG2IzPCyves0g==
Received: from he105715.emea1.cds.t-internal.com ([10.169.118.51]) by QDEC97.de.t-internal.com with ESMTP/TLS/ECDHE-RSA-AES128-SHA256; 27 Apr 2021 07:36:35 +0200
Received: from HE105715.EMEA1.cds.t-internal.com (10.169.118.51) by HE105715.emea1.cds.t-internal.com (10.169.118.51) with Microsoft SMTP Server (TLS) id 15.0.1497.2; Tue, 27 Apr 2021 07:36:34 +0200
Received: from HE104160.emea1.cds.t-internal.com (10.171.40.36) by HE105715.EMEA1.cds.t-internal.com (10.169.118.51) with Microsoft SMTP Server (TLS) id 15.0.1497.2 via Frontend Transport; Tue, 27 Apr 2021 07:36:34 +0200
Received: from DEU01-FR2-obe.outbound.protection.outlook.com (104.47.11.172) by O365mail03.telekom.de (172.30.0.232) with Microsoft SMTP Server (TLS) id 15.0.1497.2; Tue, 27 Apr 2021 07:36:32 +0200
ARC-Seal: i=1; a=rsa-sha256; s=arcselector9901; d=microsoft.com; cv=none; b=faXHRlfALza3HRej54k+yEmch0uQAOl7FzqTZ9I8P2GDImlw7nwXltmn/jkd9vHo0RjWdHdSSwFSemQ+ScFGRw4IR781SIzn2yvXeMNJuN37skefJzTmxG5OgvZtIys3pKGMg8Hg4oi4qQgso1on4fy5DXm25yeiP3XOmDJk3hawwo9MGWzW6xKyVMxmbuiMnjgnNTR4sPp6gc+ag6UzH8eAqBA/W4q9JKeInHZ9fU+/FcyMBs6bZZBTpnv9stc+IjpFZ98vmpJ6E2wB22icJcob1TikwwcERugjkojAxRYWHPMmV0cghljkkkGXEQIpNUY3iuEwgY6NkndmDfm1Ag==
ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=microsoft.com; s=arcselector9901; h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-SenderADCheck; bh=UULNmhzlndbc4w+D3wQFHxMlAvcH7ilmyJQtheBCeUY=; b=HfS4sdt0/bDtS/91bFabPb7BJFMBK+b5CEO5AAvHzDkCzMkWah2yi7iW7B6JfjNPwfZDfjEFWC/8ZVARWLnX2W8Pl9waaq0nf5LtW+5MR9RT2zHChWbwWlnACzeNK1pUdWPDSicyWeiGMzSQdq9qa649V2ycpiaw54WTjdM1ikoJpnUA61/IXj3hYfRdc2SsYry0mFV4y03hyDwtdwBBOrlfTerMMw6EykNNflc9vztPT/15DbR98UJHwDYrNKkg4AbgeSk2Q7eP0kR0c0H5MRSmNdDmntkJuMB+u8pSvpKo+pHZK3TEZ13ibD3HtqFTN97wcT3s9ZrXYd6w1v8Zdg==
ARC-Authentication-Results: i=1; mx.microsoft.com 1; spf=pass smtp.mailfrom=telekom.de; dmarc=pass action=none header.from=telekom.de; dkim=pass header.d=telekom.de; arc=none
Received: from FR2P281MB0611.DEUP281.PROD.OUTLOOK.COM (2603:10a6:d10:2c::12) by FRYP281MB0029.DEUP281.PROD.OUTLOOK.COM (2603:10a6:d10:8::9) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id 15.20.4087.16; Tue, 27 Apr 2021 05:36:33 +0000
Received: from FR2P281MB0611.DEUP281.PROD.OUTLOOK.COM ([fe80::a1b1:1a30:2c9a:6604]) by FR2P281MB0611.DEUP281.PROD.OUTLOOK.COM ([fe80::a1b1:1a30:2c9a:6604%7]) with mapi id 15.20.4087.025; Tue, 27 Apr 2021 05:36:33 +0000
From: Ruediger.Geib@telekom.de
To: David.Black@dell.com
CC: tsvwg@ietf.org
Thread-Topic: [tsvwg] L4S: Guard DSCP
Thread-Index: Adc3zgHga2vzMJZxQH2ZLyO97LVStwBFOBYAACZIpYAACipXgAADcPSAAByV9oAAAgR6gAAIwGMAACMWBnAAEkeNkA==
Date: Tue, 27 Apr 2021 05:36:33 +0000
Message-ID: <FR2P281MB0611408C60E73B044F9899659C419@FR2P281MB0611.DEUP281.PROD.OUTLOOK.COM>
References: <MN2PR19MB4045D7179410986A46C3E30783469@MN2PR19MB4045.namprd19.prod.outlook.com> <458e847061d1dd6a45bfa5bec046d201e88c8075.camel@heistp.net> <CACL_3VE3rfmAZewOCWTzfC5A9v7c2HgZ8NAxdt_5qKg5Rn0QNQ@mail.gmail.com> <a9e0781559a0ca4fcf02c225b67d3037bc56ea8f.camel@heistp.net> <02DBC945-B1D5-4A70-8906-E48831951C5C@gmx.de> <CACL_3VF8Nt-fH9RwncFVVvwicuON7A_R6JU8Y_OXqBwTOpdmKw@mail.gmail.com> <64AC29EE-2576-41C4-8411-7C66518A3853@gmail.com> <CACL_3VG3M-jFOHkCPCinnDP3G=gYU_0nnDz5Qwi9BJ501PrZFg@mail.gmail.com> <MN2PR19MB404525C9FD6052D0A195F44683429@MN2PR19MB4045.namprd19.prod.outlook.com>
In-Reply-To: <MN2PR19MB404525C9FD6052D0A195F44683429@MN2PR19MB4045.namprd19.prod.outlook.com>
Accept-Language: de-DE, en-US
Content-Language: de-DE
X-MS-Has-Attach:
X-MS-TNEF-Correlator:
msip_labels: MSIP_Label_17cb76b2-10b8-4fe1-93d4-2202842406cd_Enabled=True; MSIP_Label_17cb76b2-10b8-4fe1-93d4-2202842406cd_SiteId=945c199a-83a2-4e80-9f8c-5a91be5752dd; MSIP_Label_17cb76b2-10b8-4fe1-93d4-2202842406cd_Owner=david.black@emc.com; MSIP_Label_17cb76b2-10b8-4fe1-93d4-2202842406cd_SetDate=2021-04-26T20:43:37.4719016Z; MSIP_Label_17cb76b2-10b8-4fe1-93d4-2202842406cd_Name=External Public; MSIP_Label_17cb76b2-10b8-4fe1-93d4-2202842406cd_Application=Microsoft Azure Information Protection; MSIP_Label_17cb76b2-10b8-4fe1-93d4-2202842406cd_ActionId=53b97a1a-e789-4fd1-ac25-6cd50f8bfc93; MSIP_Label_17cb76b2-10b8-4fe1-93d4-2202842406cd_Extended_MSFT_Method=Manual
authentication-results: dell.com; dkim=none (message not signed) header.d=none;dell.com; dmarc=none action=none header.from=telekom.de;
x-originating-ip: [87.147.148.2]
x-ms-publictraffictype: Email
x-ms-office365-filtering-correlation-id: dda5f657-74b0-48f4-6b3c-08d9093e6aea
x-ms-traffictypediagnostic: FRYP281MB0029:
x-microsoft-antispam-prvs: <FRYP281MB0029057377BD1A6BF9162B259C419@FRYP281MB0029.DEUP281.PROD.OUTLOOK.COM>
x-ms-oob-tlc-oobclassifiers: OLM:9508;
x-ms-exchange-senderadcheck: 1
x-microsoft-antispam: BCL:0;
x-microsoft-antispam-message-info: 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
x-forefront-antispam-report: CIP:255.255.255.255; CTRY:; LANG:en; SCL:1; SRV:; IPV:NLI; SFV:NSPM; H:FR2P281MB0611.DEUP281.PROD.OUTLOOK.COM; PTR:; CAT:NONE; SFS:(366004)(346002)(396003)(376002)(39860400002)(136003)(7696005)(9326002)(86362001)(33656002)(6916009)(2906002)(4326008)(53546011)(6506007)(478600001)(5660300002)(85182001)(55016002)(9686003)(83380400001)(66574015)(316002)(8936002)(71200400001)(66476007)(122000001)(38100700002)(26005)(66946007)(66446008)(8676002)(52536014)(186003)(76116006)(64756008)(66556008)(85202003)(21314003); DIR:OUT; SFP:1101;
x-ms-exchange-antispam-messagedata: C1p0uCYL3UHwxG8PuGSGUp/PnrHAaQggwCg9Q/tMftV0kcMe0HlxQ0vmJMV6w+EVqeblfBuUgIxnHhP11yCbQFYg37HhJLDiz/ITWZRfFuqBo4O3IxJLYNEmXdzsMIxGZm8CTffAUfaLfgiNQXEMoKSro5KyQWxAf5/sZrS0Mf2bhtZGr+6hWqIweCd2sDBWVQ2jkpji4cobdB0swVNMWGElUoxgmVYr5UuIexG+cDg3srncAXkDRnQdy1XQulA8r6ap0drNdk2bUy4AXkKYjVlAArJSMZhi3slDty9VkMG+T4DOFw1QnQanZFele8QrDcbht81Z8PKT6hCODdMUbYG+40mfd4k+na/Ar1I1t8J63zhN1q2CXN/5Lm/z7tfeFN2d15WjLwXK+PSmcK037G5/nFXNpnivofUw6gSDtyTCE+iJ78zSjZaofHUjYj9H6Kw+LI0ElWPAq0v/9SmWIo8quDOvHoTDXWWWTggcfyojDzfKVLx1BqpWKfF0rpA6of64ZXcC8RywHHwdWChJaL1zSLHcA9k/+u/Fe+kB/4lh1HYttx/4IV6Az4BWzJXMqS9M0PUKVMg3fX8StHAB4MyEgg3KXG8ZMxZRL2XBfxJNqlMz7iU+/WpRBUiznw9/GYWJ8z2PkhZmVxrp8eN1g7mhQsSX2tYSZOy/VDYbAe6zEoOBLvDp9ZRMBK1tE8XTGdERtfOpJeNWMSJOw5mwyAAR+D4T7VWUbJSMgs5yd9wuvVz/eCOarmuyGNcO0vUV7i6PRYd+4+kHh6nInhX8kuHJbYPcMtBku8kKH7R7lIK+t8goEg5dWsoVjfjkC74OJejFgmU30bEGqlYAv1P8a8yUefccYzHd/Mslj19piT71l2qsu55X0yDfNt6815lXgrcSTME9NYtF6JhRUBONVAQgcaw4+MWAz+3HKTb8dRbLJ57ixI+Rd4xfxGF8pncSTdkQLpO45gpDhoeuVTWeguatWC3N7Z4XjNZnDoS4qz/ogKmtYxPLnHfLGkLl3QdQ9/KCSAxsG0HeIHzGZhYoL4p/zUXWT3LLeYaKax9IqQkEKmKiXBe4N6FymgbQxseq18dYu/nstihHm9JYZGR2fzHGPR4CzhmcHyd+0fClEloI5l/dMb5ZS0gy69KEgPboe8txBuYU/CyqtXb24ZXyMORB6PQLgwbEuZ5eD5J4bLRdLaphiv0k2Vf0g5KFg1jGReNs+5X4SeEEhJ5/x1f/2tmjmepM5yYysiR/vRzLceicIUFyWCgmetBxqXpd/fv3giU5iA8SLcAJ5L6izyNE4V9BpIY827jvLYuXt0e/6vg=
x-ms-exchange-transport-forked: True
Content-Type: multipart/alternative; boundary="_000_FR2P281MB0611408C60E73B044F9899659C419FR2P281MB0611DEUP_"
MIME-Version: 1.0
X-MS-Exchange-CrossTenant-AuthAs: Internal
X-MS-Exchange-CrossTenant-AuthSource: FR2P281MB0611.DEUP281.PROD.OUTLOOK.COM
X-MS-Exchange-CrossTenant-Network-Message-Id: dda5f657-74b0-48f4-6b3c-08d9093e6aea
X-MS-Exchange-CrossTenant-originalarrivaltime: 27 Apr 2021 05:36:33.5607 (UTC)
X-MS-Exchange-CrossTenant-fromentityheader: Hosted
X-MS-Exchange-CrossTenant-id: bde4dffc-4b60-4cf6-8b04-a5eeb25f5c4f
X-MS-Exchange-CrossTenant-mailboxtype: HOSTED
X-MS-Exchange-CrossTenant-userprincipalname: 9gpbY3kZzby311D3Xywn2/H8M+0pfUDjqgevKLIEC3dWear8OYCif2gPhlPjH5/YaKVBxOd8eXa3QmHIJTB92aAFQH3M9VJ2Hq4zvjbrVMQ=
X-MS-Exchange-Transport-CrossTenantHeadersStamped: FRYP281MB0029
X-TM-SNTS-SMTP: 3271682C329B54D3B9D70BF424E7DC9B6CEB1AD81807852D652E57C1D20A30252000:8
X-OriginatorOrg: telekom.de
Archived-At: <https://mailarchive.ietf.org/arch/msg/tsvwg/iNFZr_PwzRdmW-Hae47U0v-aD2s>
Subject: Re: [tsvwg] L4S: Guard DSCP
X-BeenThere: tsvwg@ietf.org
X-Mailman-Version: 2.1.29
Precedence: list
List-Id: Transport Area Working Group <tsvwg.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/tsvwg>, <mailto:tsvwg-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/tsvwg/>
List-Post: <mailto:tsvwg@ietf.org>
List-Help: <mailto:tsvwg-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/tsvwg>, <mailto:tsvwg-request@ietf.org?subject=subscribe>
X-List-Received-Date: Tue, 27 Apr 2021 05:36:45 -0000

Hi David,

maybe I missed an important point, but isn’t the intent of the Guard DSCP to inform the receiver about the meaning of a set ECN bit? My take is, if Domain decides to go for an experiment, Domain should be conservative with what they send to peers and configure suitable re-marking policies to set default DSCP/ECN 00 at interconnection, unless they know their peer is happy to participate in the L4S experiment too. What I also expect is that a few domains are liberal with what they send and forward traffic with a bunch of DSCPs, without setting up any kind of formal or informal agreement with their peers.

If the Guard DSCP is in range 000 xxx, it will pass some networks at least. Maybe that’s a way forward.

Regards,

Ruediger


Von: tsvwg <tsvwg-bounces@ietf.org> Im Auftrag von Black, David
Gesendet: Montag, 26. April 2021 22:46
An: C. M. Heard <heard@pobox.com>; Jonathan Morton <chromatix99@gmail.com>
Cc: TSVWG <tsvwg@ietf.org>
Betreff: Re: [tsvwg] L4S: Guard DSCP

[Still posting as an individual]

If ECT(1) is to be remarked, I agree with Sebastian's earlier comment that the robust remarking would be to Not-ECT:


> Not-ECT should work as downstream non-L4S bottlenecks will simply drop packets to signal congestion, to which L4S-compatible protocols

> are required to respond (but so are general internet wide used protocols, and still BBR does not do so immediately).

However, this entire discussion is disheartening, as the end-to-end usability of the ECN field, and in particular the ECT(1) value was a major L4S rationale for using ECT(1) by itself to indicate the low-latency service.  It would be rather unfortunate (IMHO, as an individual) if the L4S experiment were to result in widespread bleaching of ECT(1) to Not-ECT.

Thanks, --David

From: C. M. Heard <heard@pobox.com<mailto:heard@pobox.com>>
Sent: Sunday, April 25, 2021 11:55 PM
To: Jonathan Morton
Cc: Pete Heist; Sebastian Moeller; Black, David; TSVWG
Subject: Re: [tsvwg] L4S: Guard DSCP


[EXTERNAL EMAIL]
On Sun, Apr 25, 2021 at 4:44 PM Jonathan Morton wrote:
On 26 Apr, 2021, at 1:46 am, C. M. Heard wrote:

As mentioned above (and in draft-ietf-tsvwg-ecn-l4s-id-14 Section4), AccECN is a required part of L4S when the transport is TCP. Note that AccECN provides a means to echo back to the sender of a SYN whether the SYN contains not-ECT, ECT(0), ECT(1), or CE, if AccECN is negotiated (see draft-ietf-tcpm-accurate-ecn-14 Section-3.1.2 and in particular the first for lines of Table 2). Note further that draft-ietf-tsvwg-ecn-l4s-id-14 Appendix A.2.1 explicitly urges that L4S implementations set ECT(1) on SYN segments. Based on this, it should be possible for an L4S connection initiator to determine whether ECT(1) was bleached before its SYN was sent onward to a remote endpoint that supports AccECN. That is enough to tell it to fall back to RFC 3168 compatibility mode for that connection,

There are two big holes in this idea:

1: Some middleboxes discard unknown TCP options.  A path on which this occurs prevents AccECN from giving feedback about anything beyond the count of CE marks received, using the ACE field.  If passage of the option were required for AccECN to work, the ACE field probably wouldn't be in the spec.

A middlebox stripping the option is not really a problem, since AccECN negotiation relies entirely on the ACE field. Indeed, the initial SYN does not contain the option at all -- see draft-ietf-tcpm-accurate-ecn-14 Section 2.1.

2: What happens if the CE mark is applied to the SYN *after* it has passed the border guardian?  The receiver cannot distinguish which ECT codepoint was originally on it in that case, so the information added by the guardian is lost.

I did indeed fail to consider this case. It can be addressed, though there is an issue with the solution. The originating TCP will get an ACE field of 110 in the SYN-ACK, meaning AccECN / CE on SYN, which is indeed ambiguous. The safe thing for the originating TCP to do would be either to fall back to RFC 3168 compatibility mode unconditionally or to look at the guard DSCP to decide whether or not to do so. Looking at the guard DSCP allows the originating TCP to determine whether or not it is communicating with another L4S TCP in the domain and avoid the unnecessary fallback behavior in that case. Similar remarks apply for the case of a simultaneous open.

The issue with this solution is that inspection of the DSCP by the transport layer to avoid suboptimal behavior within the L4S domain (i.e., fallback to classic when an ECT(1) SYN is marked with CE) violates the David's desideratum Y:

DON'T

X.      Require AQMs to use Guard DSCP in addition to ECT(1) to identify L4S traffic.   This should be allowed, not required, which is already the case - see Section 5.4 of the ecn-l4s-id draft.

Y.      Rely on DSCPs for signaling or modify transport protocols to have reactions that vary by received DSCP.

Z.      Do anything else that would be a significant obstacle to removing use of the Guard DSCP if the L4S experiment succeeds.
I might also add that the business of falling back to RFC 3168 behavior based on what is in a SYN-ACK (or SYN) is not needed not needed to communicate with an endpoint in the L4S that supports AccECN but not L4S; indeed, in that situation precludes the possibility of L4S congestion control in one direction and classic RFC 3168 congestion control in the other direction. It's not clear how important that case is, though.

Mike Heard