Re: [tsvwg] David Black (individual) on safety of L4S for the Internet

Sebastian Moeller <moeller0@gmx.de> Fri, 15 May 2020 15:53 UTC

Return-Path: <moeller0@gmx.de>
X-Original-To: tsvwg@ietfa.amsl.com
Delivered-To: tsvwg@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 1F7D33A0BF1 for <tsvwg@ietfa.amsl.com>; Fri, 15 May 2020 08:53:52 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -1.649
X-Spam-Level:
X-Spam-Status: No, score=-1.649 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, DKIM_SIGNED=0.1, DKIM_VALID=-0.1, FREEMAIL_ENVFROM_END_DIGIT=0.25, FREEMAIL_FROM=0.001, RCVD_IN_MSPIKE_H2=-0.001, SPF_HELO_NONE=0.001, SPF_PASS=-0.001, URIBL_BLOCKED=0.001] autolearn=no autolearn_force=no
Authentication-Results: ietfa.amsl.com (amavisd-new); dkim=pass (1024-bit key) header.d=gmx.net
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id R9TFad5GNosR for <tsvwg@ietfa.amsl.com>; Fri, 15 May 2020 08:53:50 -0700 (PDT)
Received: from mout.gmx.net (mout.gmx.net [212.227.15.15]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id AF0BA3A0BD7 for <tsvwg@ietf.org>; Fri, 15 May 2020 08:53:49 -0700 (PDT)
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/simple; d=gmx.net; s=badeba3b8450; t=1589557983; bh=oeUqQOlJeusLZCe+TANFOHeY0306gS87E38i14ftpu8=; h=X-UI-Sender-Class:Subject:From:In-Reply-To:Date:Cc:References:To; b=elp09obRHos3KlsTswOJhgL3jNCZBP17p0YnjMLO3ZmiwKlAOaAikQi3fcuG+JCYc V9866VOqp3+FRhPAmgBDeHZIsK7y2UrE0qRH+SW/CAczDWWKXvcw0iOk/lcyXKikue +wQWJH+4eeCcAIhiUn5xg4g4EP4b7e6ziPFGxKVY=
X-UI-Sender-Class: 01bb95c1-4bf8-414a-932a-4f6e2808ef9c
Received: from [10.11.12.16] ([134.76.241.253]) by mail.gmx.com (mrgmx004 [212.227.17.190]) with ESMTPSA (Nemesis) id 1MmlT2-1ipnyb1L9i-00jp18; Fri, 15 May 2020 17:53:03 +0200
Content-Type: text/plain; charset="us-ascii"
Mime-Version: 1.0 (Mac OS X Mail 12.4 \(3445.104.14\))
From: Sebastian Moeller <moeller0@gmx.de>
In-Reply-To: <24cea9d4-165c-1429-ac1f-645d60dd5938@erg.abdn.ac.uk>
Date: Fri, 15 May 2020 17:53:01 +0200
Cc: "Black, David" <David.Black@dell.com>, Bob Briscoe <in@bobbriscoe.net>, "tsvwg@ietf.org" <tsvwg@ietf.org>
Content-Transfer-Encoding: quoted-printable
Message-Id: <2949B2C6-C1EC-4060-B2C0-57F9BC98D67B@gmx.de>
References: <MN2PR19MB4045DBC270D70DECE5F2B4AC83A20@MN2PR19MB4045.namprd19.prod.outlook.com> <75435344.181735.1589475836060@mail.yahoo.com> <eb4ff580-0700-764f-df82-ce13344b5743@bobbriscoe.net> <MN2PR19MB4045638F9583301BFEDA9CF083BD0@MN2PR19MB4045.namprd19.prod.outlook.com> <8a554935-3603-c827-469d-c9e093bf5fa3@erg.abdn.ac.uk> <6B8E37BF-F5E8-4BB2-B38E-471A1802BBEC@gmx.de> <24cea9d4-165c-1429-ac1f-645d60dd5938@erg.abdn.ac.uk>
To: Gorry Fairhurst <gorry@erg.abdn.ac.uk>
X-Mailer: Apple Mail (2.3445.104.14)
X-Provags-ID: V03:K1:oFLA8boPFdvPEChUAeqSfy9TbrFTWRSfpCFk6ruPluutDXW9U3v POegJKT/cjzY+fojsR0bn97hWZUwa0/vp9BG91xbN6jUr7oDRkIRg/wfbukY/hj+Lh/KOWS KMsVqhyYryJixT3UcnzOfwE8k77VfiS0TixX3muGtePya8pOA7c9HWwWSVw0AFwhRb9rHa6 jv27pgZPODAlBow1mWRow==
X-UI-Out-Filterresults: notjunk:1;V03:K0:KQc8kKH1BF0=:lBz83UlyHucH7k4N1E1UA9 tbMqXyu2z83cwXWs2OCZFT5bDEh1YCTlelt6yZa9Kkc0+b6AxPg7rTA1lghjEQROLKRvc/SI3 /npoczGWTi2Cg8rLjThEUruYGzgvaeB5OOzhgPR67iXamjlAuLg6dS5A8EQt7ni12qBMjpAlY B0LZLrZN6r2QqyYWamYln7st0LQYwrVjqscyNku1EV067pSuEmQmiKDpiyYJ/MR+1SP+v0DOy XNo17j0Xk1xJtx64icUgiDdYZztf8pAgoci116UDyYMPMbBFiy8vEfNBvAv+r5rpzX+Q3Lzwq 3+a27wY53PsaKSCq2UEGSplG0trLuFsKKddnXXS8DPsNAB5lYQigIFupT+/P/oNy3BjVIAI8N Ug9EcvtdQVqR/slLBi3Z6xMSFgvwym06/Tk4mgIvP+AxXwYspSHQXRJYO017f6S21VkOQjbDQ o1DmqiWa7t6E3AV5ZtU92O8vxTNtMZjz8hNrcaj6qG6xx/9XZXzTOXCK2MYKBWEAkJdQ1T6Dd jBLwYsDLhXwwGQ3fiGGR1rVT+oxaa0IutyZ30CkYlUvLLr87wAQdqmSKwenBajH3OJrDH5HqY P6EDzO0N81VIuHvTWIEbaerJ8lAhAeTtFPGZqkJI6YKoUBPx8voS00AdwVMU2Olht44EC7hBz b+okRrKaCvth6HIHwlQKMXf4QKrPbwYZlx0kXkfEqfXjDoNMKQ7KrY1rJVuQUNkro2J/dXfA2 NLh6r7fBLtIWxcbRN4R8z0LQlTV9KravWEiCJzUVi+Lre5ElLsOLVpGIvtK8hbd84aAz6bSwe 81oF/QN4fo2hGEc39Ql1RN2e2qzkqd1P1njBNTQH2TUj73UnsGspvGxaD5wGF0jKsSzMtFedk jo9uSoO4/6R0Wn8jI4O5QN5EdaOMaSOVX3zn0eDNNHeAK5N7v2pN+G1h71uLFzOcOQiZgjZvf sBqkRKgy6Wvq2Rak2X0WMbwmoLL50pWt/o9NzNufflWf3M1R52Xvax1Pko+EivOScqAQ0T+m0 /EbN2O9UlIUEYnuteeS6R0FCsPqnHy7I31FRKcyX+WHZZ1+3b4cdy9FGG2iRUtpnRYMQeXuVe VkK7GznwXqVlQPgFjCAeoHbcAdWFPVoRTzC3qETE9qIWd+c9XlG4P+P8Jae/u9Aei3/aYgxAb 74fphWGVROLYt18nL5vUjOhXOYkqFG+qGNZfTA23O4g2K3nDqSkg7ncB+ce/XCrWO/JG0ZUjG c6bJqm6KUb3NtmMUa
Archived-At: <https://mailarchive.ietf.org/arch/msg/tsvwg/upLBrMgZkAY3oi8UErbO8Zpt5yo>
Subject: Re: [tsvwg] David Black (individual) on safety of L4S for the Internet
X-BeenThere: tsvwg@ietf.org
X-Mailman-Version: 2.1.29
Precedence: list
List-Id: Transport Area Working Group <tsvwg.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/tsvwg>, <mailto:tsvwg-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/tsvwg/>
List-Post: <mailto:tsvwg@ietf.org>
List-Help: <mailto:tsvwg-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/tsvwg>, <mailto:tsvwg-request@ietf.org?subject=subscribe>
X-List-Received-Date: Fri, 15 May 2020 15:53:54 -0000

Hi Gory,



> On May 15, 2020, at 14:20, Gorry Fairhurst <gorry@erg.abdn.ac.uk> wrote:
> 
> Hi,
> 
> On 15/05/2020 12:26, Sebastian Moeller wrote:
>> Hi Gorry,
>> 
>> 
>>> On May 15, 2020, at 11:59, Gorry Fairhurst <gorry@erg.abdn.ac.uk> wrote:
>>> 
>>> See in-line
>>> 
>>> On 15/05/2020 01:03, Black, David wrote:
>>>> Bob,
>>>> [still posting as an individual, not as WG chair]
>>>> 
>>>> 
>>>>> Firstly an appeal to everyone to stop talking about wiping the ECN field
>>>>> as if it is acceptable. Bleaching ECN is not a safety mechanism, except
>>>>> as a last resort. Treating ECT(1)
>>>>> /as if/
>>>>>  it is Not-ECT is far
>>>>> preferable to wiping it so it
>>>>> /is/
>>>>>  Not-ECT.
>>>>> 
>>>> I concur with that appeal ... but ...
>>>> 
>>>> .... We've been through an analogous adventure with DSCP bleaching, as RFC 2474 recommends that behavior for DSCPs (treat unknown DSCPs as best effort without changing the DSCP) but the network operators went ahead and bleached DSCPs at network boundaries, as described in Section 1 of RFC 8100 (
>>>> https://www.rfc-editor.org/rfc/rfc8100.html#section-1
>>>> ).  I strongly suggest reviewing that history towards understanding why things turned out that way.
>>>> 
>>>> 
>>> Well, some operators have chosen a model that does that, I can't resist self-citing some research that shows this might not be the full story ... "Exploring DSCP modification pathologies in the Internet" (2018).
>>> 
>>> https://www.sciencedirect.com/science/article/pii/S0140366417312835
>> 	[SM] Well, my take on that is that there is a 80% or higher chance (transparent plus Reset ToS prec. plus Reset ToS prec. CS6/CS7)  for DSCPs with 3 leading zero bits to survive internet traversal. That seems like a viable starting position for a LL classifier IMHO. In reality L4S will only work well over short paths anyway (mostly CDN -> end-user) and there the number of Diffserve domain crossings should be on the lower side and SLAs might be an option to make an L4S-dscp actually survive well.
> 
>> 	As the bleaching ECT(1) argument demonstrates any marker on a packet will be considered fair game to manipulation if that still allows delivery of the packets
> Not really the IETF recommendation.

	[SM] That was not my claim, I understand that the RFCs and reality diverged, but it is an argument that Tom Herbert made in the encrypted transport header discussion that seems appropriate here. Both endpoints, and network elements will fiddle with ECT(1) if that conveys an advantage, independent of whether it is recommended or not.


>>  and fiddling it gives advantages to either senders or to intermediate hops, so the superiority of ECT(1) in internet traversal really is just a snapshot due to the circumstances that nobody got sufficiently annoyed by ECT(1) yet. IMHO if L4S works and is really worth its salt (meets its promises), it should be able to pull its own weight, by making networks operators take care to not bleach its reference DSCP, instead of forcing ECT(1) on everybody.
> Equipment still configured for ToS Semantics is hard to change. Although, useful to do so.

	[SM] Well, that equipment, according to the cited paper, will also (with low probability) bleach the ECN field (interpreting it as TOS) so that issue already exists for L4S with ECT(1), no?


>>> The reasons for field bleaching seem to vary, (and, alas, a significant proportion still seems to be due to configured ToS semantics).
>> 	[SM] Clearly one of the reasons is that so far there is absolutely zero value to conserve an unhandled DSCP
> DSCPs might be utilised by other network segments and hence could add value to the traffic.

	[SM] Yes theoretically true, but as reality seems to demonstrate not a strong enough driver for bleachers/remappers to change their way. A L4S DSCP/PHB that directly implies desirable traffic properties to each network node (less burstyness or more re-ordering tolerance) might change that value equation.


>> and treat it like BE for the operator in question.
> Perhaps - because mapping to a PHB is different to changing the DSCP.

	[SM] I am not fully understanding this argument. Sure these are different things, but the recommendation, remap locally unused DSCPs to the BE PHB, seems not to have gotten too much traction according to the data. Unless we assume that each network only ever re-mapps those input DSCPs that it uses for its own internal purposes, and that by pure chance DSCPs in the decimal ~8-48 range (see Figure 2) all get remapped, because networks either use a lot of dscps internally or different networks use mostly not overlapping sets of DSCPs. Honestly, I would bet on networks simply re-mapping everthing to zero and then upmark those paket with their internal DSCPs. It is always safer to re-map to zero and only elevate packets with known properties...

Best Regards
	Sebastian

P.S.: I am really not seeing how your paper does support the case for ECT(1) for L4S at all. For the one critical segment, mobile, I see quite enough involvement of @mobile-corp email addresses here, that getting the mobile segment honor a L4S-DSCP seems in no way insurmountable, IFF they are actually as interested in HFCC.



>> According to the L4S RFCs however, everybody is going to profit from L4S everywhere, so surely those operator straggling today to leave DSCPs alone will now do so for the L4S-dscp since that will give them better network performance (even if not participating in the L4S experiment, they could optimistically expect less bursty traffic patterns, allowing to drive the gear at higher average load). Either that or that "everybody is going to profit" claim is being falsified, either way an interesting result.
>> 
>> Best Results
>> 	Sebastian
>> 
>> 
>>> Gorry
> 
> -- 
> G. Fairhurst, School of Engineering
> 
> I'm not sure how a transport would ensure that the bottleneck links are using a DSCP in their classifier, and how you would operators would police such a scheme
> - excepet perhaps to confine L4S as an ISP experiment for their own customer base (which they can already do using a private DSCP).
> This just involves more components in the deployment. I thought the WG has gone
> beyond the idea of doing an experiment within an ISP to proposing a new architecture, so I really don't understand how
> the use of a DSCP would help deploy that experiment.
> 
> Gorry.