Re: [tsvwg] Dual-Q Pol[i]cing

Paul Vixie <paul@redbarn.org> Tue, 26 May 2020 17:52 UTC

Return-Path: <paul@redbarn.org>
X-Original-To: tsvwg@ietfa.amsl.com
Delivered-To: tsvwg@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 35D453A084D for <tsvwg@ietfa.amsl.com>; Tue, 26 May 2020 10:52:51 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -1.899
X-Spam-Level:
X-Spam-Status: No, score=-1.899 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, SPF_HELO_NONE=0.001, SPF_PASS=-0.001, URIBL_BLOCKED=0.001] autolearn=ham autolearn_force=no
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id P_jYKuIZFNh0 for <tsvwg@ietfa.amsl.com>; Tue, 26 May 2020 10:52:49 -0700 (PDT)
Received: from family.redbarn.org (family.redbarn.org [24.104.150.213]) (using TLSv1.2 with cipher AECDH-AES256-SHA (256/256 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id 892D53A0838 for <tsvwg@ietf.org>; Tue, 26 May 2020 10:52:49 -0700 (PDT)
Received: from linux-9daj.localnet (vixp1.redbarn.org [24.104.150.140]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (Client did not present a certificate) by family.redbarn.org (Postfix) with ESMTPSA id 103A5B074A; Tue, 26 May 2020 17:52:45 +0000 (UTC)
From: Paul Vixie <paul@redbarn.org>
To: "C. M. Heard" <heard@pobox.com>, Gorry Fairhurst <gorry@erg.abdn.ac.uk>
Cc: TSVWG <tsvwg@ietf.org>
Date: Tue, 26 May 2020 17:52:43 +0000
Message-ID: <2671290.j8ep2V3Ful@linux-9daj>
Organization: none
In-Reply-To: <72f81549-571d-30a1-1ac6-5a93f1cd7202@erg.abdn.ac.uk>
References: <dbc71da6-70f1-7369-1d2d-f08fb3b08b69@erg.abdn.ac.uk> <3521327.lj06MrXY7o@linux-9daj> <72f81549-571d-30a1-1ac6-5a93f1cd7202@erg.abdn.ac.uk>
MIME-Version: 1.0
Content-Transfer-Encoding: 7bit
Content-Type: text/plain; charset="us-ascii"
Archived-At: <https://mailarchive.ietf.org/arch/msg/tsvwg/qQpQD5La6Sv9sLu85GX5JZo262M>
Subject: Re: [tsvwg] Dual-Q Pol[i]cing
X-BeenThere: tsvwg@ietf.org
X-Mailman-Version: 2.1.29
Precedence: list
List-Id: Transport Area Working Group <tsvwg.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/tsvwg>, <mailto:tsvwg-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/tsvwg/>
List-Post: <mailto:tsvwg@ietf.org>
List-Help: <mailto:tsvwg-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/tsvwg>, <mailto:tsvwg-request@ietf.org?subject=subscribe>
X-List-Received-Date: Tue, 26 May 2020 17:52:51 -0000

On Monday, 25 May 2020 17:08:55 UTC Gorry Fairhurst wrote:
> On 25/05/2020 17:33, Paul Vixie wrote:
> > On Monday, 25 May 2020 16:21:17 UTC C. M. Heard wrote:
> >> On Mon, May 25, 2020 at 8:50 AM Paul Vixie wrote:
> >>> On Monday, 25 May 2020 10:00:30 UTC Sebastian Moeller wrote:
> >>>> ... 
> >> 
> >> Because it may inform the conversation, is your current policy to disable
> >> ECN marking and/or to bleach ECN bits out of inbound traffic from the
> >> WAN?
> >> Per RFC 3168, those bits are intended to affect drop vs mark behavior of
> >> routers.
> > 
> > no. i'm following choice other, which is, don't enable those features.
> 
> Thanks. That's your choice, and I have seen networks that have made
> similar choices for various reasons, and ones that have not made those
> choices.

i've called this a datacenter/cloud signal pattern and some of you have 
wondered why. one reason is trust. see also rod grimes' reply up thread 
<202005251649.04PGn8WW081025@gndrsh.dnsmgr.net> mentioning yandex and netflix. 
but none of these decisions is simple; we have to look at potential added 
risks as well as potential added benefits. if the latter seems orders of 
magnitude greater than the former, then we may decide to accept the risks.

in dualq i'd perhaps see microsecond delivery on the fast path and millisecond 
delivery on the slow path. that difference could be relevant for traffic which 
is both sourced and sunk nearby or inside my network. however, it will never 
be relevant for arriving WAN traffic, whose speed-of-light constraints while 
reaching me will far exceed the difference between my slow and fast queues.

so even if i had no fears of having the configuration of my switches or 
routers set, however briefly (on a packet by packet basis) by a non-contracted 
unidentified third party, i would also see no benefit to allowing congestion 
signaling as input to my network other than from my own nearby/internal hosts. 
that's also true of output from the network to my endpoints, since congestion 
notification signals are also game-worthy. but less so, and i can imagine at 
least looking at the SCE running fraction in my transport, and considering it 
as a possible reason to reduce window size. that will never happen for the L4S 
pattern when it comes from the WAN, for reasons as given.

-- 
Paul