Re: [tsvwg] L4S DSCP (was: L4S drafts: Next Steps)

Sebastian Moeller <moeller0@gmx.de> Mon, 29 March 2021 12:59 UTC

Return-Path: <moeller0@gmx.de>
X-Original-To: tsvwg@ietfa.amsl.com
Delivered-To: tsvwg@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 844FB3A113B for <tsvwg@ietfa.amsl.com>; Mon, 29 Mar 2021 05:59:45 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -1.649
X-Spam-Level:
X-Spam-Status: No, score=-1.649 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, DKIM_SIGNED=0.1, DKIM_VALID=-0.1, FREEMAIL_ENVFROM_END_DIGIT=0.25, FREEMAIL_FROM=0.001, RCVD_IN_MSPIKE_H2=-0.001, SPF_HELO_NONE=0.001, SPF_PASS=-0.001, URIBL_BLOCKED=0.001] autolearn=no autolearn_force=no
Authentication-Results: ietfa.amsl.com (amavisd-new); dkim=pass (1024-bit key) header.d=gmx.net
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id HyCMZWpxTBNf for <tsvwg@ietfa.amsl.com>; Mon, 29 Mar 2021 05:59:40 -0700 (PDT)
Received: from mout.gmx.net (mout.gmx.net [212.227.17.21]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id 6E0493A1137 for <tsvwg@ietf.org>; Mon, 29 Mar 2021 05:59:40 -0700 (PDT)
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/simple; d=gmx.net; s=badeba3b8450; t=1617022731; bh=3uOu3hAEheELU2/+ueyD8A73egRy0dPl9ChXCt8dirI=; h=X-UI-Sender-Class:Subject:From:In-Reply-To:Date:Cc:References:To; b=R47jv4G+7aQuB1iPzHJz3kvujCjVT9LVut7M5fiJIUvZ4pVnSa2qRcwH5gvnesP/q w19uPwMc13vUW6SYVt4xzPA6uH7wNTuU91f2CLMCix4MURp8mZz2I1z6X8ZYF/NxH9 V3fMfIUOIXim/BsLOAkBGCWwd0RF7gLqqbsi2SqA=
X-UI-Sender-Class: 01bb95c1-4bf8-414a-932a-4f6e2808ef9c
Received: from [192.168.250.106] ([134.76.241.253]) by mail.gmx.net (mrgmx105 [212.227.17.168]) with ESMTPSA (Nemesis) id 1MtOKc-1lm5ci3yCE-00uoh1; Mon, 29 Mar 2021 14:58:50 +0200
Content-Type: text/plain; charset="utf-8"
Mime-Version: 1.0 (Mac OS X Mail 12.4 \(3445.104.17\))
From: Sebastian Moeller <moeller0@gmx.de>
In-Reply-To: <80f5696a-e423-cf31-6aed-dba9c52c8000@bobbriscoe.net>
Date: Mon, 29 Mar 2021 14:58:48 +0200
Cc: "C. M. Heard" <heard@pobox.com>, "tsvwg@ietf.org" <tsvwg@ietf.org>
Content-Transfer-Encoding: quoted-printable
Message-Id: <4C122B37-CC29-4B38-A175-450863F69D0E@gmx.de>
References: <MN2PR19MB404527384A1B1DD9CFC2A3D983659@MN2PR19MB4045.namprd19.prod.outlook.com> <6f0ac4bf-bd1a-65cd-1d40-a97d4aa71aab@bobbriscoe.net> <7B4426F9-E1C5-4F88-A264-0D54C809D523@gmail.com> <AM8PR07MB74761AFC8F5BE0F9573DFF32B9629@AM8PR07MB7476.eurprd07.prod.outlook.com> <6481E606-2458-49D7-B580-8DF7B93494FD@gmx.de> <AM8PR07MB747675E421F0B7A6246C67BEB9619@AM8PR07MB7476.eurprd07.prod.outlook.com> <9A9D4AC3-43F0-4778-839B-E1E247A3C5FA@gmx.de> <AM8PR07MB7476026EA3AA7AD49622B296B9619@AM8PR07MB7476.eurprd07.prod.outlook.com> <7C0C3D20-250E-471F-89EC-9FF828B0BA10@gmx.de> <AM8PR07MB747613F8333DE25A81C68692B9619@AM8PR07MB7476.eurprd07.prod.outlook.com> <F5B88AF1-B3B4-4A77-8AD8-D7B5943B40F2@gmx.de> <CACL_3VGqnkv_GXvD2O8hWKy1U4jYYegO+gpbRJY0b5Wj3xW=iA@mail.gmail.com> <80f5696a-e423-cf31-6aed-dba9c52c8000@bobbriscoe.net>
To: Bob Briscoe <in@bobbriscoe.net>
X-Mailer: Apple Mail (2.3445.104.17)
X-Provags-ID: V03:K1:P5sj183xlQPc1yqRgt1Utp+ZUmlQg7+PN51zoPy00ok2eWLhkEU 8a3Hhw/UKcZAAl0hhED3fHoNEgpMdSnZY9OQxweK8Ltwvvqabhz3URmZzsJOXDsFUsbn6Of DP/pDySboY87EU81Xby8evplKRVmPtZ8f6T5lk1sKDNblSvSxSFed6gU3nE//owkqRvSkcg n0rByeQ7gi52ao4OY5CSQ==
X-UI-Out-Filterresults: notjunk:1;V03:K0:AHzybnWShWE=:tBzDbnJBVnL6ZOFDdiwzsO 7uNHYL0LhPFitCZzvFvG2sr40/i+JGjyCRRRi2wS8LyygyAcXBC2lmUTsuclVkw6aaWWIX0a5 rDcrBoL3KKtB2EPDBhKUWVJB16WPPaULdxI7ZfWATlFLyMpo+LHYsyqKbU9cgAiPiGRLeg4/7 0X79uYjJis6zGA4pwxFMxiBgyyUq0O2lux7hLUSn3/w1X8TgSf/FSB4LtHj0Lko9VVzAkGQT6 PorGzxxliPdBIVZFKl83OGXHqbgf3jkk6KPcM98Q1pprlXrLIJdeXhkZq0OOEVplD7I1mSmdy SEK+8iOFPSXgcbZ/S5MOeIPHWKwepuO3icmLyxRSxChC+5i1TtBzwsQsqPEpLqaE3JAsYduCf DjnmSxi6ZlXRWun6ydc1WFyGEaQkXeh8/abFIxADLYfsFeMCwxpbX/ViyDq1irubmBDPUTBS7 aodRh5QdOOw9UtwtioGG6KV4YWQYOfHCGteHydDJNm5rPMO78M3Pt+7S7SE28vDVUN5HLMhY1 nP3Yg4rBOiTrXA+mbZ/goaq2I4QrtxvkjMATUYveRzudJyvrgjvP8aQFSQ8vUpTrYQ9nU9R2W 6YIbJklsbhFSebYM7I2nSgxARuhYXi4gAb69mM4ARVPSxMX4oJrAxQNL1WsnPgcbfa49PfeZG GeGata4GY6QnNIbs/bHlCA8Tg8zAevPgHWNceSUz2dvnnm8Uu3izxP9fv3fzHdN1ny2882fIn 31lra7sVy7AS0dc9d9jzWn8QgbdzHbM2xw0s0bTJEyxNqKHn1dMIRF26XH/4zj6SCI2Lx1FYA mS/b5IhCOE+vCzqibIRbIZie8EO8PNQcBd311z4N/CZ8cRxyCAZi58owY3KH3xU4kL3IEBXmT SoHJ0YTTHA5S9qXDm16rNyaXGhmzY4OUOQPyfbtSRQVbFSdkJ/HpUTAU2VoTf3taYljyPsCrM af0xo9qDhPXk5hicNokVzrUX2ZzHh4PjdmHGgJpKacudu2eB51/WNTm1qo8A4moErP36H8CFT 6ngbZMcRNfZXesTIfQcSwHMJvlTA35ChZnOJVgR/f7JSDczwfVA2YmyzO6Fg0jdseNNn/qSeR 3cCMKLktKVcn049BM3RSgNl//E95vt/35M0W7ZAiDAysXvpaQy7yVctOvRrv65Rt+xh8aEhVC waJNbWED9Vvc7N+oElALqPrY3eiMPcMsJdp8vmG14IVtJ41JItsxzQQHTGRhNFl76T/g4=
Archived-At: <https://mailarchive.ietf.org/arch/msg/tsvwg/iSsWPnI1sH-wSujfGY8yEdMsF6Y>
Subject: Re: [tsvwg] L4S DSCP (was: L4S drafts: Next Steps)
X-BeenThere: tsvwg@ietf.org
X-Mailman-Version: 2.1.29
Precedence: list
List-Id: Transport Area Working Group <tsvwg.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/tsvwg>, <mailto:tsvwg-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/tsvwg/>
List-Post: <mailto:tsvwg@ietf.org>
List-Help: <mailto:tsvwg-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/tsvwg>, <mailto:tsvwg-request@ietf.org?subject=subscribe>
X-List-Received-Date: Mon, 29 Mar 2021 12:59:46 -0000

Hi Bob,


> On Mar 29, 2021, at 02:35, Bob Briscoe <in@bobbriscoe.net> wrote:
> 
> Mike,
> 
> Many of the arguments for why a DSCP is not useful e2e also apply when it is used as a guard DSCP in a single network. For instance, when an IP header with a DSCP is tunnelled in pipe mode, it is not propagated to the outer. So it won't be visible, won't be bleached, etc.

	[SM] Excellent point, sothe  L4S-ops draft should probably a recommendation to also propagate DSCPs in and out while tunneling, if tunneling is something the diffserv domain wants to support for L4S, otherwise the recommendation might simply be to bleach on tunnel ingress (which is a also a naturally safe default, if the tunnel might terminate in another potentially unknown diffserve domain).

> 
> There's far too much vagueness in this thread.

	[SM] Not that much more than in the L4S drafts, where problems magically seem to dissolved when they are punted to the protocols that night want to use L4S signaling, really.

> In the email I just sent to Jonathan, I asked him to address each of the critiques of a DSCP in Appx B.4, not just dismiss them all as invalid, which is untenable.
> Certainly, some of the critiques are not relevant to the way the DSCP is used in Jonathan's scheme, but many are like the tunnel issue above.

	[SM] Odd that tunneling always moves into the spot-light if it helps your argument, but gets more or less ignored when it causes unsolved challenges for L4S, like a tunnel with mixed traffic running over one of the relative common (common as far as AQMs go) FQ rfc3168 compliant AQM. Is it really to much to ask for consistent application of the same yard stick to all proposals?

> So far, we've only just started on the basics like whether the feedback approach is even practical.

	[SM] Using DSCPs for feed-back is exactly what the "A Non-Queue-Building Per-Hop Behavior (NQB PHB) for Differentiated Services" ID is all about. I have heard very little comment from your side about its practicability issues (I probably have missed those though). Interesting to cite from that draft:

"7.  Relationship to L4S
   Traffic flows marked with the NQB DSCP as described in this draft are
   intended to be compatible with [I-D.ietf-tsvwg-l4s-arch, with the
   result being that NQB traffic and L4S traffic can share the low-
   latency queue in an L4S dual-queue node
   [I-D.ietf-tsvwg-aqm-dualq-coupled].  Compliance with the DualQ
   coupled AQM requirements is considered sufficient to enable fair
   allocation of bandwidth between the QB and NQB queues."


and


"4.1.  End-to-end usage and DSCP Re-marking
   In contrast to the existing standard DSCPs, many of which are
   typically only meaningful within a DiffServ Domain (e.g. an AS or an
   enterprise network), this DSCP is expected to be used end-to-end
   across the Internet.  Some network operators typically bleach (zero
   out) the DiffServ field on ingress into their network
   [Custura][Barik], and in some cases apply their own DSCP for internal
   usage.  Networks that support the NQB PHB SHOULD preserve the NQB
   DSCP when forwarding via an interconnect from or to another network.
   Bleaching the NQB DSCP is not expected to cause harm to default
   traffic, but it will severely limit the ability to provide NQB
   treatment end-to-end."


And from Greg White directly on the topic of SLAs (https://mailarchive.ietf.org/arch/msg/tsvwg/NrWh_sfCBRcASHirmScjeIAHlFA/):

"When we discussed this concern before, it seemed to me that an SLA might be a good approach (at least in the near term).  So, perhaps we aren’t communicating well.  It is possible that a peering network is already using the value 42 (0b101010) - or for that matter any DSCP that IANA might assign for NQB - in a manner that is inconsistent with NQB, so default bleaching is probably the best near term situation.  For an ISP that wishes to support the NQB PHB, they can validate (and set up SLAs) that identify the NQB traffic from a peer, and treat it per the PHB, whichever DSCP is chosen.  Alternatively, if the ISP does not wish to support the NQB PHB at all, then they can choose to bleach it to Default, or pass it though with Default treatment, whichever they choose."

This is pretty much what you seem to argue for as being impractical, no?


Best Regards
	Sebastian

 

> 
> 
> Bob
> 
> On 27/03/2021 03:00, C. M. Heard wrote:
>> On Fri, Mar 26, 2021Sebastian Moeller wrote:
>> On Mar 26, 2021, at 18:34, De Schepper, Koen wrote:
>> > My first point is that requiring to set a DiffServ codepoint alone would already support that.
>> 
>>  [SM] Well, sure, but you came to the ECT(1) decision for a reason (a reason I do not agree with, but that is a different topic, I am trying to build you a bridge here how to run your experiments without taking the rest of the internet down), so I am not going to argue about that. My proposal adds an GUARD DSCP for the duration of the EXPERIMENT to allow your measurements in live production networks without negative side-effects for non-participants. This layer of safety can be removed if the experiment has run ist course and measurements in consenting networks has provided data that L4S is safe without the DSCP. At which point the DSCP could be dropped, try doing that if you only use a DSCP as L4S classifier.
>> 
>> This point sure seems to have been lost in much of the discussion. Note again: GUARD DSCP for the duration of the EXPERIMENT. NOT DSCP instead of ECT(1).
>> 
>> I've read several comments objecting that using DSCP to distinguish L4S traffic is undeployable end-to-end on the general Internet. Well, according to the intended status of the drafts, L4S is starting life as an EXPERIMENT, and as such is not expected (or at least should not be expected) to be deployed on the general Internet. If the WG's desire is to have L4S deployed on the general Internet as soon as the specs are approved, then the WG should take Steven Blake's advice and deprecrate/obsolete RFC 3168 and change the intended status of the drafts, or else use a mechanism that is backward compatible with RFC 3168, such Jake Holland's proposal to use ECT(1) -> ECT(0) as the L4S congestion signal, leaving the semantics of CE unchanged.
>> 
>> Mike Heard
> 
> -- 
> ________________________________________________________________
> Bob Briscoe                               
> http://bobbriscoe.net/