Re: [tsvwg] Another tunnel/VPN scenario (was RE: Reasons for WGLC/RFC asap)

Mirja Kuehlewind <mirja.kuehlewind@ericsson.com> Fri, 04 December 2020 12:32 UTC

Return-Path: <mirja.kuehlewind@ericsson.com>
X-Original-To: tsvwg@ietfa.amsl.com
Delivered-To: tsvwg@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id E1A5B3A0C21 for <tsvwg@ietfa.amsl.com>; Fri, 4 Dec 2020 04:32:26 -0800 (PST)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -2.102
X-Spam-Level:
X-Spam-Status: No, score=-2.102 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, DKIMWL_WL_HIGH=-0.001, DKIM_SIGNED=0.1, DKIM_VALID=-0.1, DKIM_VALID_AU=-0.1, DKIM_VALID_EF=-0.1, RCVD_IN_MSPIKE_H2=-0.001, SPF_PASS=-0.001, URIBL_BLOCKED=0.001] autolearn=ham autolearn_force=no
Authentication-Results: ietfa.amsl.com (amavisd-new); dkim=pass (1024-bit key) header.d=ericsson.com
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id QVWZcneJHDoi for <tsvwg@ietfa.amsl.com>; Fri, 4 Dec 2020 04:32:25 -0800 (PST)
Received: from EUR04-DB3-obe.outbound.protection.outlook.com (mail-eopbgr60046.outbound.protection.outlook.com [40.107.6.46]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id CCF983A0816 for <tsvwg@ietf.org>; Fri, 4 Dec 2020 04:32:24 -0800 (PST)
ARC-Seal: i=1; a=rsa-sha256; s=arcselector9901; d=microsoft.com; cv=none; b=brKW/gzGNrVj/6TrKq8e8n7PKoi4Ywxyg7WzeS1ZnzqnJXkh+pjI1H67Y8njSVvRa6SfNt20wls93cH6TstHUOWEzUD3m3HksyqyseVEzChGRZ3+uwMhm3A+tjLDCCt+lHhQu1om6qVn2rDLEeXlXtYvi9beZEstPvUk1txaA1UkyVSBLtEGRkFRcfwOiNh3jojCg9idlV5QZcHKbZcwwzrwzY4XS11DHghW4z6uuhDGhthdKOdOXRacadYGhQzTwICzx9d6lepTYFdFQsadlvOPog1Z6LTreNlajLNR+bg10KAzeJq9HX5GtDiHCVU6bhBprVhDu5k/mNiH6h88dA==
ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=microsoft.com; s=arcselector9901; h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-SenderADCheck; bh=HyZPbCbEj04mg0DDrO9N+A6Gq91MrMiJLIC0gSINx3Q=; b=APCPMN92vJwEZdLknSJiWuaj1gBjBbNxZUCn0hmQHrr03tC8KICwf0F7wcnIscuLs5LrBFs1LJuoF5C7BdegQY51yKcjVRRw4hqn2aamh1Nu00UzOhe6Qv9M0zCZjVAZ/JGingXKp14LTVKelQD+k0Akxs+oyBGiBLL6sCb4XFvgRONIoUEvMT/GxUFyjj7tVRSmd+A7UuB37H/wA2Q/zZuSae4nLw50u5j44UV3YqB+AJ7rkol3ziCzNevTaGZ6tQcoLhKqenPCbIfMaUzEwq2Mxsvep1ocmUWHFKzZIuHrJW69xch/XdH76+b0NJhu+8Kp0Dem81X9gQCFI9j0GQ==
ARC-Authentication-Results: i=1; mx.microsoft.com 1; spf=pass smtp.mailfrom=ericsson.com; dmarc=pass action=none header.from=ericsson.com; dkim=pass header.d=ericsson.com; arc=none
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=ericsson.com; s=selector1; h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-SenderADCheck; bh=HyZPbCbEj04mg0DDrO9N+A6Gq91MrMiJLIC0gSINx3Q=; b=eJ8SZSrFnE/xEnKuX8QAd9rl0xTOIDv6wkOyHL7DqD698yBkS5+pV/lB+2FjOnewAf5/b0vp1F5jm/JjVPxTdMITo5942Y3797lWdg0I/Mu+lsdp4zhwXta0QEbnhuMFyQynIm5e07IL/yktIV4vfhYNyQjWztDGYMZM8+UJxPA=
Received: from AM0PR07MB3939.eurprd07.prod.outlook.com (2603:10a6:208:40::14) by AM9PR07MB7121.eurprd07.prod.outlook.com (2603:10a6:20b:2cd::13) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id 15.20.3632.6; Fri, 4 Dec 2020 12:32:22 +0000
Received: from AM0PR07MB3939.eurprd07.prod.outlook.com ([fe80::50e6:68f7:3047:3cf0]) by AM0PR07MB3939.eurprd07.prod.outlook.com ([fe80::50e6:68f7:3047:3cf0%3]) with mapi id 15.20.3632.020; Fri, 4 Dec 2020 12:32:22 +0000
From: Mirja Kuehlewind <mirja.kuehlewind@ericsson.com>
To: Michael Welzl <michawe@ifi.uio.no>, Jonathan Morton <chromatix99@gmail.com>
CC: "tsvwg@ietf.org" <tsvwg@ietf.org>
Thread-Topic: [tsvwg] Another tunnel/VPN scenario (was RE: Reasons for WGLC/RFC asap)
Thread-Index: Ada+ubjC7VBEnrRcR/2NZb+fxDokigARVxdAAATngoAClvgNgAAC1A0AAAV97IAADJIOgAAWtruAAAMp4QAAAegqAAAAbHsAAAAe2IAAA5xSAA==
Date: Fri, 04 Dec 2020 12:32:22 +0000
Message-ID: <216A1CE6-C7ED-4ACB-9E8A-AB0CC0408712@ericsson.com>
References: <MN2PR19MB4045A76BC832A078250E436483E00@MN2PR19MB4045.namprd19.prod.outlook.com> <HE1PR0701MB2876A45ED62F1174A2462FF3C2FF0@HE1PR0701MB2876.eurprd07.prod.outlook.com> <56178FE4-E6EA-4736-B77F-8E71915A171B@gmx.de> <0763351c-3ba0-2205-59eb-89a1aa74d303@bobbriscoe.net> <CC0517BE-2DFC-4425-AA0A-0E5AC4873942@gmx.de> <35560310-023f-93c5-0a3d-bd3d92447bcc@bobbriscoe.net> <b86e3a0d-3f09-b6f5-0e3b-0779b8684d4a@mti-systems.com> <7335DBFA-D255-43BE-8175-36AB231D101F@ifi.uio.no> <DA84354E-91EC-4211-98AD-83ED3594234A@gmail.com> <1AB2EA08-4494-4668-AD82-03AEBD266689@ifi.uio.no> <CC06401C-2345-4F68-96FA-B4A87C25064E@gmail.com> <24C55646-C786-4B55-BFEE-D30BBB4ED7C4@ifi.uio.no>
In-Reply-To: <24C55646-C786-4B55-BFEE-D30BBB4ED7C4@ifi.uio.no>
Accept-Language: en-US
Content-Language: en-GB
X-MS-Has-Attach:
X-MS-TNEF-Correlator:
user-agent: Microsoft-MacOutlook/16.43.20110804
authentication-results: ifi.uio.no; dkim=none (message not signed) header.d=none;ifi.uio.no; dmarc=none action=none header.from=ericsson.com;
x-originating-ip: [93.195.67.71]
x-ms-publictraffictype: Email
x-ms-office365-filtering-correlation-id: 4f16d8fc-7200-4b02-70b2-08d89850a649
x-ms-traffictypediagnostic: AM9PR07MB7121:
x-microsoft-antispam-prvs: <AM9PR07MB712137037658860B7F79FC32F4F10@AM9PR07MB7121.eurprd07.prod.outlook.com>
x-ms-oob-tlc-oobclassifiers: OLM:10000;
x-ms-exchange-senderadcheck: 1
x-microsoft-antispam: BCL:0;
x-microsoft-antispam-message-info: ZSO5TExvPfozemtHD/AsBXdTFQ+OV2l7ICAUA26LbrOu/JhOav54E2F5WTqkNEQc2xJOWyYBd5cPmxkYCp9zTGICSpYEd0ywP80RQ0UZ7f87Ucm7TYvBnfI4bk6Hs7fLG+fBaCXkxqmxHTthycSXTMgMciuk++AzkTUSGvbB7XYXkPT7jwlIqq7ZrYn5xlGTmeXRMfrHnoFQAUlsVL1+10ByKc0ow0D52C6pmj3Y7LmVIt1SEnMpl8DnSh6boGBc+u98P+65cserNCHOmphXLmEZGgVM5d+xwcQfwvkFVqqceVSt8Z/km/wPM/AUsdWfj4he+1OHX3BPDby1e7fD5rUkUGfVrjLK9oUlM/nNT8gtgL01DyQ7N3nZVVW3vDo/
x-forefront-antispam-report: CIP:255.255.255.255; CTRY:; LANG:en; SCL:1; SRV:; IPV:NLI; SFV:NSPM; H:AM0PR07MB3939.eurprd07.prod.outlook.com; PTR:; CAT:NONE; SFS:(4636009)(396003)(39860400002)(376002)(346002)(366004)(136003)(83380400001)(86362001)(6486002)(316002)(26005)(2906002)(5660300002)(66946007)(110136005)(186003)(66476007)(66574015)(66446008)(2616005)(66556008)(8936002)(76116006)(53546011)(64756008)(4326008)(6512007)(44832011)(478600001)(36756003)(6506007)(8676002)(71200400001)(33656002)(45980500001); DIR:OUT; SFP:1101;
x-ms-exchange-antispam-messagedata: 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
x-ms-exchange-transport-forked: True
Content-Type: text/plain; charset="utf-8"
Content-ID: <7A31EA7468D9DB4BBD040579F3793072@eurprd07.prod.outlook.com>
Content-Transfer-Encoding: base64
MIME-Version: 1.0
X-OriginatorOrg: ericsson.com
X-MS-Exchange-CrossTenant-AuthAs: Internal
X-MS-Exchange-CrossTenant-AuthSource: AM0PR07MB3939.eurprd07.prod.outlook.com
X-MS-Exchange-CrossTenant-Network-Message-Id: 4f16d8fc-7200-4b02-70b2-08d89850a649
X-MS-Exchange-CrossTenant-originalarrivaltime: 04 Dec 2020 12:32:22.6712 (UTC)
X-MS-Exchange-CrossTenant-fromentityheader: Hosted
X-MS-Exchange-CrossTenant-id: 92e84ceb-fbfd-47ab-be52-080c6b87953f
X-MS-Exchange-CrossTenant-mailboxtype: HOSTED
X-MS-Exchange-CrossTenant-userprincipalname: XfXYXSqCFWRdufCRbCvTW/Ar792g8bd8EVycZZf5zyz62IZ1R8TexH9W9wXoQWjkTeyDeGa/mXvzNyb1gnONBzFsqqq0/biIvAlrUmXjbi8=
X-MS-Exchange-Transport-CrossTenantHeadersStamped: AM9PR07MB7121
Archived-At: <https://mailarchive.ietf.org/arch/msg/tsvwg/qzNGB05RFR4rqMQFlo6r5xzMcqQ>
Subject: Re: [tsvwg] Another tunnel/VPN scenario (was RE: Reasons for WGLC/RFC asap)
X-BeenThere: tsvwg@ietf.org
X-Mailman-Version: 2.1.29
Precedence: list
List-Id: Transport Area Working Group <tsvwg.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/tsvwg>, <mailto:tsvwg-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/tsvwg/>
List-Post: <mailto:tsvwg@ietf.org>
List-Help: <mailto:tsvwg-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/tsvwg>, <mailto:tsvwg-request@ietf.org?subject=subscribe>
X-List-Received-Date: Fri, 04 Dec 2020 12:32:27 -0000

Hi all,

to add one more option.

To be clearly any issues discussed only occurred if RCF3168-AQMs (without FQ) are deployed in the network (no matter if any traffic is actually RFC3168-ECN enabled or not). 

My understanding of the current deployment status is that only ECN-AQMs with FG support are deployed today and I don't think we should put a lot of effort in a complicated RFC3168-AQM detection mechanism which might negative impact the L4S experiment if we have no evidence that these queues are actually deployed.

Further I would like to note that RCF3168 AQMs are already negatively impacting non ECN traffic and advantaging ECN traffic. However, I think it's actually a feature of L4S to provide better performance that non-ECN and therefore providing a deployment incentive for L4S, as long as non-L4S is not starved entirely. We really, really must stop taking about fairness as equal flow sharing. That is not the reality today (e.g. video traffic can take larger shares on low bandwidth links and that keeps it working) and it is not desired at all because not all flows are equal!!! The endpoints know what is required to make their application work and as long as there is a circuit breaker that avoids complete starving or collapse, the evolution of the Internet depends on this control in the endpoint and future applications that potentially have very different requirements. Enforcing equal sharing in the network hinders this evolution.

I also would like to note that L4S is not only about lower latency. Latency is the huge problem we have in the Internet today because the current network was optimized for high bandwidth applications, however, many of the critical things we do on the Internet today actually is more sensitive to latency. This problem is still not fully solved, event hough smaller queues and AQM deployments are a good step in the right direction. L4S goes even further and the point is not only about reducing latency but to enable the deployment of a completely new congestion control regime with takes into account all the lessons learnt from e.g. data center deployment where we not have to be bounded by today's limitation of "old" congestion controls and co-existence. L4S is exactly a way to transmission to this new regime without starving "old" traffic but there also need to be incentives to actually move to the new world. That's what I would like to see and why I'm existed about L4S.

Mirja




On 04.12.20, 12:49, "tsvwg on behalf of Michael Welzl" <tsvwg-bounces@ietf.org on behalf of michawe@ifi.uio.no> wrote:



    > On Dec 4, 2020, at 12:45 PM, Jonathan Morton <chromatix99@gmail.com> wrote:
    > 
    >> On 4 Dec, 2020, at 1:33 pm, Michael Welzl <michawe@ifi.uio.no> wrote:
    >> 
    >> Right; bad! But the inherent problem is the same: TCP Prague’s inability to detect the 3168-marking AQM algorithm. I thought that a mechanism was added, and then there were discussions of having it or not having it?  Sorry, I didn’t follow this closely enough.
    > 
    > Right, there was a heuristic added to TCP Prague to (attempt to) detect if the bottleneck was RFC-3168 or L4S.  In the datasets from around March this year, we showed that it didn't work reliably, with both false-positive and false-negative results in a variety of reasonably common scenarios.  This led to both the L4S "benefits" being disabled, and a continuation of the harm to conventional flows, depending on which way the failure went.
    > 
    > The code is still there but has been disabled by default, so we're effectively back to not having it.  That is reflected in our latest test data.
    > 
    > I believe the current proposals from L4S are:
    > 
    > 1: Use the heuristic data in manual network-operations interventions, not automatically.
    > 
    > 2: Have TCP Prague treat longer-RTT paths as RFC-3168 but shorter ones as L4S.  I assume, charitably, that this would be accompanied by a change in ECT codepoint at origin.
    > 
    > Those proposals do not seem very convincing to me, but I am just one voice in this WG.

    Yeah, so I have added my voice for this particular issue.

    Cheers,
    Michael