Re: [tsvwg] Scope of the L4S Experiment (was: Guard DSCP)

Gorry Fairhurst <gorry@erg.abdn.ac.uk> Thu, 06 May 2021 06:27 UTC

Return-Path: <gorry@erg.abdn.ac.uk>
X-Original-To: tsvwg@ietfa.amsl.com
Delivered-To: tsvwg@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id B48B83A10FA for <tsvwg@ietfa.amsl.com>; Wed, 5 May 2021 23:27:39 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: 1.1
X-Spam-Level: *
X-Spam-Status: No, score=1.1 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, BITCOIN_SPAM_02=2.5, HTML_MESSAGE=0.001, NICE_REPLY_A=-0.001, PDS_BTC_ID=0.499, SPF_HELO_NONE=0.001, SPF_PASS=-0.001, URIBL_BLOCKED=0.001] autolearn=no autolearn_force=no
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id mobNMP6Ng5Eg for <tsvwg@ietfa.amsl.com>; Wed, 5 May 2021 23:27:35 -0700 (PDT)
Received: from pegasus.erg.abdn.ac.uk (pegasus.erg.abdn.ac.uk [137.50.19.135]) by ietfa.amsl.com (Postfix) with ESMTP id 95D983A10F6 for <tsvwg@ietf.org>; Wed, 5 May 2021 23:27:35 -0700 (PDT)
Received: from GF-MacBook-Pro-2.local (unknown [84.43.100.18]) by pegasus.erg.abdn.ac.uk (Postfix) with ESMTPSA id 8D6601B000E5; Thu, 6 May 2021 07:27:27 +0100 (BST)
To: "Black, David" <David.Black@dell.com>, Jonathan Morton <chromatix99@gmail.com>, Ingemar Johansson S <ingemar.s.johansson=40ericsson.com@dmarc.ietf.org>
Cc: TSVWG <tsvwg@ietf.org>
References: <MN2PR19MB4045D7179410986A46C3E30783469@MN2PR19MB4045.namprd19.prod.outlook.com> <02DBC945-B1D5-4A70-8906-E48831951C5C@gmx.de> <CACL_3VF8Nt-fH9RwncFVVvwicuON7A_R6JU8Y_OXqBwTOpdmKw@mail.gmail.com> <64AC29EE-2576-41C4-8411-7C66518A3853@gmail.com> <CACL_3VG3M-jFOHkCPCinnDP3G=gYU_0nnDz5Qwi9BJ501PrZFg@mail.gmail.com> <MN2PR19MB404525C9FD6052D0A195F44683429@MN2PR19MB4045.namprd19.prod.outlook.com> <CACL_3VGDd80FeqrH+8_2+Chbh-cT9-bpW-gfH7itSgXN3=_cbA@mail.gmail.com> <MN2PR19MB4045FE83AE49A3317476A6BD83419@MN2PR19MB4045.namprd19.prod.outlook.com> <CACL_3VEmgtk3XvNmshwmTf10pP99iGP9bTk5XpQ+iKDuCRhn-w@mail.gmail.com> <MN2PR19MB4045E0692C6A5C3C18317D00835A9@MN2PR19MB4045.namprd19.prod.outlook.com> <59668c4b3f0cf8b404f0e8b1d67e7960a8c5bcd5.camel@petri-meat.com> <HE1PR0701MB22992C3782C0F2AFED8501EAC2599@HE1PR0701MB2299.eurprd07.prod.outlook.com> <872FD5D6-8720-4451-8205-093BD7F1BE87@gmail.com> <MN2PR19MB4045AE99F15FD7F809CD8F6183599@MN2PR19MB4045.namprd19.prod.outlook.com>
From: Gorry Fairhurst <gorry@erg.abdn.ac.uk>
Message-ID: <301825c0-2334-fe37-15eb-fcd66bd4814b@erg.abdn.ac.uk>
Date: Thu, 06 May 2021 07:27:26 +0100
User-Agent: Mozilla/5.0 (Macintosh; Intel Mac OS X 10.13; rv:78.0) Gecko/20100101 Thunderbird/78.9.1
MIME-Version: 1.0
In-Reply-To: <MN2PR19MB4045AE99F15FD7F809CD8F6183599@MN2PR19MB4045.namprd19.prod.outlook.com>
Content-Type: multipart/alternative; boundary="------------799B26564938FD26704ACA75"
Content-Language: en-GB
Archived-At: <https://mailarchive.ietf.org/arch/msg/tsvwg/lPCcXdh0sw8XBmKI9oMUPyTi3h4>
Subject: Re: [tsvwg] Scope of the L4S Experiment (was: Guard DSCP)
X-BeenThere: tsvwg@ietf.org
X-Mailman-Version: 2.1.29
Precedence: list
List-Id: Transport Area Working Group <tsvwg.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/tsvwg>, <mailto:tsvwg-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/tsvwg/>
List-Post: <mailto:tsvwg@ietf.org>
List-Help: <mailto:tsvwg-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/tsvwg>, <mailto:tsvwg-request@ietf.org?subject=subscribe>
X-List-Received-Date: Thu, 06 May 2021 06:27:40 -0000

On 05/05/2021 19:44, Black, David wrote:
> As a WG chair, without commenting on the rest of this discussion, I agree with this portion of Jonathan's summary of the role of BCPs at IETF:
>
> 	My view is that BCPs have approximately the same force as Proposed Standard RFCs,
> 	but cover a different class of subject matter - policy rather than technicalities.
> 	It is possible to deviate from what a BCP states, but there had better be a very good
> 	reason for doing so.
>
> In the past, I have seen the IESG apply more rigorous review to drafts intended for Best Current Practice status than to drafts intended for Proposed Standard status, but that can vary from year to year.
>
> Thanks, --David

+1 on the status of BCPs.The key question I have is whether this BCP is 
relevent to this proposed use.

* The reclassification of RFC8311 in 2018 - as a PS - has enabled new 
experimental use of the ECT(1) codepoint by an RFC. This was not an 
option open to the IETF when RFC 4774 was published. RFC8311explicitly 
provides ABE (published as an EXP RFC in 2018) and L4S as an example.

* I would expectevidence/rationale in the L4S draft to explain why RFC 
4774 (a BCP) is not relevant. This might clarify whether L4S is an 
update to RFC 3168 (defining both transport and network aspects), or an 
instance of RFC 4774 (which I read as targeting multi-level ECN marking 
and use in an edge-to-edge context – e.g. as  realised in PCN, RFC 5696).

Gorry

>
> -----Original Message-----
> From: Jonathan Morton <chromatix99@gmail.com>
> Sent: Wednesday, May 5, 2021 9:47 AM
> To: Ingemar Johansson S
> Cc: Steven Blake; Black, David; C. M. Heard; TSVWG
> Subject: Re: [tsvwg] Scope of the L4S Experiment (was: Guard DSCP)
>
>
> [EXTERNAL EMAIL]
>
>> On 5 May, 2021, at 12:24 pm, Ingemar Johansson S <ingemar.s.johansson=40ericsson.com@dmarc.ietf.org> wrote:
>>
>> As mentioned below RFC4774 is a BCP, I had to look up the meaning of this. My understanding of  (https://urldefense.com/v3/__https://tools.ietf.org/html/rfc1818__;!!LpKI!1k2aHtuNmS8NqaE6aw6FbJXpRSyyQBXX9-m0yAnCxJRUpaTLhJVSFb9QUO9eEdep$ [tools[.]ietf[.]org]) is that it lists a set of guidance rules at the time of writing.
> RFC-1818 has status HISTORIC.  The document you should probably be reading is RFC-2026, Section 5:
>
> 	https://urldefense.com/v3/__https://tools.ietf.org/html/rfc2026*page-15__;Iw!!LpKI!1k2aHtuNmS8NqaE6aw6FbJXpRSyyQBXX9-m0yAnCxJRUpaTLhJVSFb9QUFSPRMK6$ [tools[.]ietf[.]org]
>
>>     The BCP subseries of the RFC series is designed to be a way to
>>     standardize practices and the results of community deliberations.  A
>>     BCP document is subject to the same basic set of procedures as
>>     standards track documents and thus is a vehicle by which the IETF
>>     community can define and ratify the community's best current thinking
>>     on a statement of principle or on what is believed to be the best way
>>     to perform some operations or IETF process function.
> My view is that BCPs have approximately the same force as Proposed Standard RFCs, but cover a different class of subject matter - policy rather than technicalities.  It is possible to deviate from what a BCP states, but there had better be a very good reason for doing so.  In this case, RFC-4774 details considerations for the standardisation process in the very specific field of congestion control signalling, which is precisely what we are discussing today.
>
> I think you are also seriously misinterpreting what RFC-4774 states.  It talks very specifically about "old routers" as the context for coexistence between "alternate ECN" traffic (ie. L4S), RFC-3168 and loss-based traffic.  That means fq_codel and Cake as they exist *today*, as well as any single-queue AQMs that may be out there, or which may yet be deployed conforming to RFC-3168 - and, incidentally, the bog-standard dumb FIFO, for completeness' sake.  You cannot sidestep that context merely by proposing that fq_codel and Cake be changed; you must actually show that the change has already taken place.  As of right now, it has not.
>
>> Option 3:  The alternate ECN semantics are defined in such a way as
>>     to ensure the fair and peaceful coexistence of the alternate-ECN
>>     traffic with best-effort and other traffic, even in environments that
>>     include old routers that do not understand the alternate ECN
>>     semantics.
> RFC-4774 Option 3 requires that the new, alternate ECN proposal is inherently compatible with existing traffic at existing routers.  That is categorically *not* true of L4S.  Option 3 therefore does not apply to L4S.
>
>> Option 2:  All alternate-ECN traffic deploys some mechanism for
>>     verifying that all routers on the path understand and agree to use
>>     the alternate ECN semantics for this traffic
>
> RFC-4774 Option 2 is a slightly more realistic target for L4S.  The "Classic ECN detection heuristic" algorithm aimed in this direction, as does my "dual DSCP" proposal for retrofitting to L4S.
>
>> Option 1:  Alternate-ECN traffic is clearly understood as unsafe for
>>     deployment in the global Internet
> If neither Option 2 nor Option 3's requirements are met, then Option 1 is the only viable solution.  That is what requires the use of a containment mechanism to explicitly keep L4S within the participating network(s).
>
>   - Jonathan Morton