Re: [tsvwg] Follow-up to your DSCP and ECN codepoint comments at tsvwg interim

Bob Briscoe <in@bobbriscoe.net> Wed, 18 March 2020 17:33 UTC

Return-Path: <in@bobbriscoe.net>
X-Original-To: tsvwg@ietfa.amsl.com
Delivered-To: tsvwg@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id D1DF23A192E for <tsvwg@ietfa.amsl.com>; Wed, 18 Mar 2020 10:33:52 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -2.098
X-Spam-Level:
X-Spam-Status: No, score=-2.098 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, DKIM_SIGNED=0.1, DKIM_VALID=-0.1, DKIM_VALID_AU=-0.1, DKIM_VALID_EF=-0.1, HTML_MESSAGE=0.001, SPF_HELO_NONE=0.001, SPF_PASS=-0.001, URIBL_BLOCKED=0.001] autolearn=ham autolearn_force=no
Authentication-Results: ietfa.amsl.com (amavisd-new); dkim=pass (2048-bit key) header.d=bobbriscoe.net
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id b2w5TMjKKSPL for <tsvwg@ietfa.amsl.com>; Wed, 18 Mar 2020 10:33:49 -0700 (PDT)
Received: from cl3.bcs-hosting.net (cl3.bcs-hosting.net [3.11.37.202]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id 71E863A192D for <tsvwg@ietf.org>; Wed, 18 Mar 2020 10:33:49 -0700 (PDT)
DKIM-Signature: v=1; a=rsa-sha256; q=dns/txt; c=relaxed/relaxed; d=bobbriscoe.net; s=default; h=Content-Type:In-Reply-To:MIME-Version:Date: Message-ID:From:References:Cc:To:Subject:Sender:Reply-To: Content-Transfer-Encoding:Content-ID:Content-Description:Resent-Date: Resent-From:Resent-Sender:Resent-To:Resent-Cc:Resent-Message-ID:List-Id: List-Help:List-Unsubscribe:List-Subscribe:List-Post:List-Owner:List-Archive; bh=qWxoauPwMcZb1+88iXx3/PWzmXb0NA5CQTdEiv4+k5o=; b=13AYubYVMc0f7hUxxCO3lIJNw GHADhVAotzEGFRWNUAYesomwo/fmn6i9ogB527oV+6WIBJXLafS1Vv0EtX+uroVt1rJlShoQ23rR1 4dsozLBz8e+9TfByDxQVi96565SJEGakvDZr7Akfp239reBVlR/n1oEKFRwTdk+lbqtHTGgJD7j5q 60OWzY7XUKHMMQqD6O1ahO2yZI1xVxZ7BxBfkBQolZlJ3Ms+lkggQNCQpcUENrdSKD/GqHm6SkYsf ENPBaDJ5q0YTqbndrhdwhYYEON5jLLsMAazCMIwzBa7qBv0bnWvi5W31i0hvaPgIcpFeVuKtMog7O 5wf2zs+bg==;
Received: from [31.185.135.141] (port=39610 helo=[192.168.0.11]) by cl3.bcs-hosting.net with esmtpsa (TLS1.2) tls TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256 (Exim 4.93) (envelope-from <in@bobbriscoe.net>) id 1jEcZf-00CkoX-7y; Wed, 18 Mar 2020 17:33:47 +0000
To: Jonathan Morton <chromatix99@gmail.com>, Gorry Fairhurst <gorry@erg.abdn.ac.uk>
Cc: tsvwg@ietf.org
References: <7409b3a3-ba14-eb6d-154b-97c9d2da707b@bobbriscoe.net> <fe1b3c14f94d1fdd46b99d4fb057d093525310f0.camel@petri-meat.com> <0206bfc0-2c1b-64af-9fc4-ecb38e83be45@bobbriscoe.net> <E3D0E6F7-E7C2-4E7A-8283-283A447DBD29@gmx.de> <6f051485-30d7-b025-8dc4-1ca97694e29c@mti-systems.com> <2CC63847-707F-4B50-8F44-CFC6CD22F9B0@eggert.org> <58F65740-81FE-4AC3-ABD3-CA54E6F2BB4C@gmail.com> <62d04148-8024-e72e-fd29-00b729604be5@erg.abdn.ac.uk> <19BA0D6A-1E29-44F5-9366-93799DEA7D42@gmail.com>
From: Bob Briscoe <in@bobbriscoe.net>
Message-ID: <922508a9-6e00-922d-084e-157de477dec6@bobbriscoe.net>
Date: Wed, 18 Mar 2020 17:33:46 +0000
User-Agent: Mozilla/5.0 (X11; Linux x86_64; rv:60.0) Gecko/20100101 Thunderbird/60.6.1
MIME-Version: 1.0
In-Reply-To: <19BA0D6A-1E29-44F5-9366-93799DEA7D42@gmail.com>
Content-Type: multipart/alternative; boundary="------------5C3555E005FC1F1E4912553B"
Content-Language: en-GB
X-AntiAbuse: This header was added to track abuse, please include it with any abuse report
X-AntiAbuse: Primary Hostname - cl3.bcs-hosting.net
X-AntiAbuse: Original Domain - ietf.org
X-AntiAbuse: Originator/Caller UID/GID - [47 12] / [47 12]
X-AntiAbuse: Sender Address Domain - bobbriscoe.net
X-Get-Message-Sender-Via: cl3.bcs-hosting.net: authenticated_id: in@bobbriscoe.net
X-Authenticated-Sender: cl3.bcs-hosting.net: in@bobbriscoe.net
X-Source:
X-Source-Args:
X-Source-Dir:
Archived-At: <https://mailarchive.ietf.org/arch/msg/tsvwg/wHTG06XTMEOYR6FlsH3F1X8uv34>
Subject: Re: [tsvwg] Follow-up to your DSCP and ECN codepoint comments at tsvwg interim
X-BeenThere: tsvwg@ietf.org
X-Mailman-Version: 2.1.29
Precedence: list
List-Id: Transport Area Working Group <tsvwg.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/tsvwg>, <mailto:tsvwg-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/tsvwg/>
List-Post: <mailto:tsvwg@ietf.org>
List-Help: <mailto:tsvwg-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/tsvwg>, <mailto:tsvwg-request@ietf.org?subject=subscribe>
X-List-Received-Date: Wed, 18 Mar 2020 17:33:53 -0000

Jonathan,

[Gorry asked us to hold this thread for a week or so - I've now asked 
him to allow it to proceed]
Inline...

On 12/03/2020 13:07, Jonathan Morton wrote:
>> On 12 Mar, 2020, at 2:19 pm, Gorry Fairhurst <gorry@erg.abdn.ac.uk> wrote:
>>> On 12/03/2020 11:45, Jonathan Morton wrote:
>>>> On 12 Mar, 2020, at 10:18 am, Lars Eggert <lars@eggert.org> wrote:
>>>>> [LE] Is it at worst a no-op, or can it degrade performance for 
>>>>> non-participating flows? 
>>>> [JM] Non-SCE flows see only an RFC-3168 compliant AQM on the
>>>>   path, and ignore the SCE signals.  SCE flows at worst have a tendency
>>>> to defer to existing traffic - the opposite to what you fear - but with a
>>>>   well-designed bottleneck qdisc, this effect is limited or eliminated.
>>>> The SCE proposal presents several such qdiscs as examples.
[BB] As SCE AQMs are deployed, they SCE-mark any ECT0 IP header to ECT1, 
whether or not the source is taking part in the SCE experiment.

Currently nearly all packets on connections to & from Apple devices use 
ECT0. So an SCE AQM would routinely alter a high proportion of current 
Apple-customer-traffic to ECT1.

That may not be a problem. But it is not 'safety first'. If there are 
ECT1 black holes in the Internet, they will currently be benign to 
traffic traversing them, because no-one is using ECT1. However, if these 
black-holes do exist, deploying an SCE AQM will open up these holes 
beneath a potentially high proportion of any Apple-customer's traffic 
traversing them.

I have checked the four main large-scale ECN measurement studies (2011, 
2013, 2015, 2018) and none reported any experiments testing for ECT1 
black holes. Have any been conducted to your knowledge?


In the L4S approach, the source opts into the experiment by setting 
ECT1, so any L4S source that hits a black hole can opt back out of the 
experiment - for that path.

>>> [GF] ... Or rewrite ECT(1), as I understand for some existing 
>>> tunnels/encaps. I recall from the early L4S discussion that this 
>>> consideration was also be important, and hence we charted work to 
>>> try and improve ECN-marking in the IP layers. 
> [JM] I think we will need to have a focused discussion about tunnels at some point.  For the moment, I'll just note that if the SCE signal is erased (on either the forward or feedback path), then the flow will revert to conventional RFC-3168 behaviour, which is conservatively safe.
>
>>> [JM] SCE enabled middleboxes are easy to detect, by passing ECT(0) traffic through it and seeing if ECT(1) marks appear alongside (or before) CE marks. If CE marks or an AQM-like (or tail-drop-like) pattern of drops appears but ECT(1) does not, it's not an SCE enabled middlebox.  This is probably sufficient to reclaim the spare ECN codepoint.

[BB] Bear in mind that multiple parts need to deploy (sender, AQM, 
receiver) before there's any benefit.

Whether ECT1 is assigned to SCE or L4S, I think we should be honest with 
ourselves and plan for the codepoint not being reclaimable for at least 
20 years, even if deployment of all three parts never occurs (see nonce 
data point below). If there is widespread deployment but the experiment 
still fails despite this (e.g. an insurmountable technical flaw), I 
suspect at least double that (40 years) before use of the codepoint 
tails off enough to be reclaimed.

We should not understate the stakes.

>> [GF] Probably worth writing down. I've found it hard to test for ECN-marking on operational paths, but insight in this is always going to be welcome.
> [JM] Granted, there is the corner case where the middlebox in question is not a bottleneck on the path under test - so SCE or ECN functionality may be present but not visible.  That would appear to be the chief difficulty with achieving full probe coverage.

[BB] Even if the SCE AQM was the bottleneck, the measurement would have 
to be done just after the SCE AQM, because:

  * If measured at the receiver, absence of ECT(1) marks might still
    occur if an SCE AQM introduces ECT(1), but a subsequent tunnel decap
    eats them all up again.
  * If measured at the sender, absence of ECT(1) feedback could be due
    to the above tunnel problem, or due to the absence of a receiver (at
    least in TCP) that feeds back ECT(1).

    That's because an SCE TCP sender never knows whether it's paired up
    with a receiver that has ECT(1) feedback logic or not.
    (An SCE sender could test the receiver by sending fake ECT(1)
    markings to see if they cause feedback. But then that in turn would
    make in-network measurement think there was an SCE AQM when there
    wasn't.)


> But I think enough confidence could be obtained by such tests to permit reclaiming the codepoint for another experiment in a reasonable timeframe.  We can try paying more rigorous attention to this question if the WG deems it necessary.

[BB]  "Reasonable timeframe" needs to be understood in relation to the 
following data point. AFAICT there was one implementation of the ECN 
nonce on a private testbed, and possibly one instance deployed somewhere 
in Norway. But it still took 16 years of absence of measurements before 
we could reclaim the codepoint.


That said, when assigning a scarce codepoint in the IP header, designing 
an experiment for reversal is far less important than minimizing the 
chance the experiment will need to be reversed. That means a need for 
pre-existing strong (i.e. business, not just techie) interest in 
deploying /all/ the necessary parts of the experiment. That was what the 
ECN nonce failed on. With industry backing, even if there are teething 
problems, there will be energy (and money) to fix them.

I know the IETF doesn't normally look beyond 'techie', but it is capable 
of doing so.

Cheers



Bob

>
>> This was to be an important topic of the face-to-face meeting in Vancouver, where we have been planning to allow time for different viewpoints to be aired and the consensus of the group to be sought. We still plan to do that, and are considering how best to proceed.
>>
>> Comments in-line to show the expected direction of travel, but please do avoid growing this discussion thread for a week or so, until we have a plan to conclude it (see end of email).
>> The TSVWG Chairs are now aware that we need to plan to make progress and will be in touch in the next week or so, with a plan move forward in the absence of an IETF face-to-face meeting.
> Noted.
>
>   - Jonathan Morton
>
>

-- 
________________________________________________________________
Bob Briscoe                               http://bobbriscoe.net/