Re: [tsvwg] Update to Position Statement on ECT(1)

"C. M. Heard" <heard@pobox.com> Sat, 30 May 2020 04:28 UTC

Return-Path: <heard@pobox.com>
X-Original-To: tsvwg@ietfa.amsl.com
Delivered-To: tsvwg@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id CD5AA3A13B5 for <tsvwg@ietfa.amsl.com>; Fri, 29 May 2020 21:28:17 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -2.098
X-Spam-Level:
X-Spam-Status: No, score=-2.098 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, DKIM_SIGNED=0.1, DKIM_VALID=-0.1, DKIM_VALID_AU=-0.1, DKIM_VALID_EF=-0.1, HTML_MESSAGE=0.001, SPF_HELO_NONE=0.001, SPF_PASS=-0.001, URIBL_BLOCKED=0.001] autolearn=ham autolearn_force=no
Authentication-Results: ietfa.amsl.com (amavisd-new); dkim=pass (1024-bit key) header.d=pobox.com; domainkeys=pass (1024-bit key) header.from=heard@pobox.com header.d=pobox.com
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id r8JTlD42UGN9 for <tsvwg@ietfa.amsl.com>; Fri, 29 May 2020 21:28:16 -0700 (PDT)
Received: from pb-smtp21.pobox.com (pb-smtp21.pobox.com [173.228.157.53]) (using TLSv1.2 with cipher AECDH-AES256-SHA (256/256 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id 3F0EC3A13B4 for <tsvwg@ietf.org>; Fri, 29 May 2020 21:28:15 -0700 (PDT)
Received: from pb-smtp21.pobox.com (unknown [127.0.0.1]) by pb-smtp21.pobox.com (Postfix) with ESMTP id F0CCDC2180 for <tsvwg@ietf.org>; Sat, 30 May 2020 00:28:14 -0400 (EDT) (envelope-from heard@pobox.com)
DKIM-Signature: v=1; a=rsa-sha1; c=relaxed; d=pobox.com; h=mime-version :references:in-reply-to:from:date:message-id:subject:to:cc :content-type; s=sasl; bh=dt28UEaSOzOxN7o1a+UXrtO37uQ=; b=QhNbCP EmLQyb+2euXewrRuR86cvXrY9NOyMsCK+KBfYc+2YML2rUbObp6J82tU4+pnqCuJ RYUsE2nUOIbtGBNQieznQLUyqn04mgs19TOgyWwiXpF4kOOPlOvaKFXlFRxvrPYL +2sjVrIWuIh3AuZYsJYhJEUJetjQFHfz1+wjs=
DomainKey-Signature: a=rsa-sha1; c=nofws; d=pobox.com; h=mime-version :references:in-reply-to:from:date:message-id:subject:to:cc :content-type; q=dns; s=sasl; b=ompKhWxW9VjpFO+A7UX/rIbXzgDkeRwR 07wnthrECTnfOhyXQWeciDdMS74kh+l8OPcGJ2DlCRleFclq4DxONbH5cMpa7l0W dDFBuuS4UVRVXNUc9UCRfjIcUYEI3EELnLhVMGCURZ0faKLGyMiW9fk7pqxyYr0V KKW6B+U2Ozs=
Received: from pb-smtp21.sea.icgroup.com (unknown [127.0.0.1]) by pb-smtp21.pobox.com (Postfix) with ESMTP id E87D5C217F for <tsvwg@ietf.org>; Sat, 30 May 2020 00:28:14 -0400 (EDT) (envelope-from heard@pobox.com)
Received: from mail-io1-f51.google.com (unknown [209.85.166.51]) (using TLSv1.2 with cipher ECDHE-RSA-AES128-GCM-SHA256 (128/128 bits)) (No client certificate requested) by pb-smtp21.pobox.com (Postfix) with ESMTPSA id 929A0C217C for <tsvwg@ietf.org>; Sat, 30 May 2020 00:28:12 -0400 (EDT) (envelope-from heard@pobox.com)
Received: by mail-io1-f51.google.com with SMTP id y18so1575622iow.3 for <tsvwg@ietf.org>; Fri, 29 May 2020 21:28:12 -0700 (PDT)
X-Gm-Message-State: AOAM533e2poQY+++cBPHN88OFYqURnHR1cFMn9qgiUsurTlSgBzRjCI1 QRCsLWtFVXOp2r6dbhc3oGIY3fQd+AQVHvWf8PA=
X-Google-Smtp-Source: ABdhPJy8xs/TiC9RTalABQeG1c1t5JWzHFVYYnKoS2t0x6jC5h3e4CCVfgzWafBYyCHQqKFR1Fs62piGCC+pvsRHaD0=
X-Received: by 2002:a5e:c64a:: with SMTP id s10mr9644595ioo.1.1590812891325; Fri, 29 May 2020 21:28:11 -0700 (PDT)
MIME-Version: 1.0
References: <BE44EAE9-5CFB-4F5D-85B8-05AFA516C151@akamai.com> <CACL_3VEbUHB-Omwp1-g5Tq3G3J-kKj9N3jPZLcfruicw3X=AsA@mail.gmail.com> <2CBBD8CD-2088-4E41-B113-EED665853D3C@akamai.com> <CAM4esxSFCBcxXjz5JJJg1z6+wwfN3mTrtJ8bKiBsj2TeOmmFSw@mail.gmail.com> <93331803-e7db-95dc-a4ae-052c347c3c86@bobbriscoe.net> <MN2PR19MB4045568B4A794F1DCE6974BB83B90@MN2PR19MB4045.namprd19.prod.outlook.com> <42234fd1-6ee8-cbcc-408c-1ea2b2554f2b@bobbriscoe.net> <9539CFBB-5F07-4104-B30D-BFE323F20352@akamai.com> <CACL_3VG3xwP=XLdzpdH2BMiFgb7a4aBNnp-SWkMSm+0=GbibXQ@mail.gmail.com> <5CD259C9-FA69-42C5-A879-1A85BB57343D@akamai.com> <B32AB94B-ECAA-4B76-80E3-510E4D071C51@gmx.de> <318274A2-E8D3-4CFA-B4BD-CD67EDA4A759@akamai.com>
In-Reply-To: <318274A2-E8D3-4CFA-B4BD-CD67EDA4A759@akamai.com>
From: "C. M. Heard" <heard@pobox.com>
Date: Fri, 29 May 2020 21:27:59 -0700
X-Gmail-Original-Message-ID: <CACL_3VE=aBwOKygXE0ZzEG725bggT7zJz7+yg-yV5dxEG7bc9Q@mail.gmail.com>
Message-ID: <CACL_3VE=aBwOKygXE0ZzEG725bggT7zJz7+yg-yV5dxEG7bc9Q@mail.gmail.com>
To: "Holland, Jake" <jholland@akamai.com>
Cc: Sebastian Moeller <moeller0@gmx.de>, Gorry Fairhurst <gorry@erg.abdn.ac.uk>, TSVWG <tsvwg@ietf.org>
Content-Type: multipart/alternative; boundary="0000000000004aabbd05a6d5fd34"
X-Pobox-Relay-ID: F9308062-A22D-11EA-8E8A-8D86F504CC47-06080547!pb-smtp21.pobox.com
Archived-At: <https://mailarchive.ietf.org/arch/msg/tsvwg/yLqSM9-5xAYi80_ruYjpCW7KDYM>
Subject: Re: [tsvwg] Update to Position Statement on ECT(1)
X-BeenThere: tsvwg@ietf.org
X-Mailman-Version: 2.1.29
Precedence: list
List-Id: Transport Area Working Group <tsvwg.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/tsvwg>, <mailto:tsvwg-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/tsvwg/>
List-Post: <mailto:tsvwg@ietf.org>
List-Help: <mailto:tsvwg-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/tsvwg>, <mailto:tsvwg-request@ietf.org?subject=subscribe>
X-List-Received-Date: Sat, 30 May 2020 04:28:18 -0000

On Thu, May 28, 2020 at 1:21 AM "Holland, Jake" wrote:

> On 5/28/20, 12:57 AM, "Sebastian Moeller" wrote:
> > I have a question regarding tunneling, that IMHO is left unanswered
> > so far. Why is the rule for ECN and tunneling not simply: copy the
> > inner to outer on encapsulation and the outer to inner on
> > decapsulation. Period.
>
> Please see RFC 6040.  Section 7 gives the design principles,
> and Section 4 describes the current standard rules.  The Intro
> also reviews some of the other considerations that went into it.
>

Consider applying Sebastian's suggestion to ECT(0) and ECT(1) only.

Only the combination marked (**) below would be changed from RFC 6040:

            +---------+------------------------------------------------+
            |Arriving |            Arriving Outer Header               |
            |   Inner +---------+------------+------------+------------+
            |  Header | Not-ECT | ECT(0)     | ECT(1)     |     CE     |
            +---------+---------+------------+------------+------------+
            | Not-ECT | Not-ECT |Not-ECT(!!!)|Not-ECT(!!!)| <drop>(!!!)|
            |  ECT(0) |  ECT(0) | ECT(0)     | ECT(1) (++)|     CE     |
            |  ECT(1) |  ECT(1) | ECT(0) (**)| ECT(1)     |     CE     |
            |    CE   |      CE |     CE     |     CE(!!!)|     CE     |
            +---------+---------+------------+------------+------------+


That combination was marked with (!) in RFC 6040 because no existing
standard relied upon it.

[I]t seems the consensus at the time landed on a copy of outer
> to inner for ECT(1) overwriting ECT(0) on decapsulation, but not
> for ECT(0) overwriting ECT(1) (which I think is the only change I'd
> want in order to enable the 2-signal proposal, to the extent it
> seems possibly worth doing).  To me it's an understandable decision,
> especially considering RFC 6660, which seems essentially "SCE but
> only applicable inside DSCP", and would prefer not to lose that pre-
> congestion signal if something weird happens while it's tunneled.
>

But RFC 6660 actually relies only on the combination (++) which would be
unchanged.

In a later message, Gorry Fairhurst admonished:

> Please relate ECN tunnel discussions to the relevant work items. Is this
> related to draft-ietf-tsvwg-rfc6040update-shim or the
> draft-ietf-tsvwg-ecn-encap-guidelines or to draft-ietf-intarea-tunnels?
>

The discussion strayed a bit but the topic of this thread is the
ECT(1)->ECT(0) alternative for safely accomplishing the goals of L4S. This
message concerns a minimal change to RFC 6040 needed to make ECT(1)->ECT(0)
work.

AFAICT that change would break no existing standard. Also AFAICT the only
effect on draft-ietf-intarea-tunnels would be a need to refer to a 6040bis
instead of RFC 6040. In draft-ietf-tsvwg-ecn-encap-guidelines the change
would necessitate an update to the rules in Section 4.4, Decapsulation
Guidelines, specifically rules 1 and 4, and in addition numerous references
to 6040 would need to be changed. I have not reviewed all 41 occurrences,
but a spot check indicates that some of the text surrounding those
references would need updating as well. The effect on
draft-ietf-tsvwg-rfc6040update-shim, to the extent that it was not rolled
into a 6040bis, would be to update the discussion of fragment reassembly,
probably to recommend preserving the pre-reassembly and post-reassembly
fractions of packets with ECT(0), ECT(1), and CE and to update the
discussion of ECN handling in the various protocols under IETF change
control.

There are lot of other changes to ongoing work items needed to make the
ECT(1)->ECT(0) alternative work, most notably (AFAICT) a reworking of
AccECN. That does not mean all of the existing work goes down the drain,
but the changes are not trivial.

And as Bob Briscoe has vocally noted, the adoption tail would grow very
long (though as he also notes, the future is longer than the present or
past),

Chairs: if all this is considered off-topic for the TSVWG list, given the
decision to move forward with the L4S work, just say the word, and I'll
happily comply. But, as David Black said in the "dispute" thread, "I am
confident that TSVWG *does not* currently have rough consensus that the L4S
experiment is safe to perform on the Internet." So there may be some value
in further exploration of the ECT(1)->ECT(0) alternative. If that needs to
go elsewhere, so be it.

Thanks & regards,

Mike Heard