Transport Working Group J. Morton Internet-Draft Updates: 3168, 8311 (if approved) P. Heist Intended status: Experimental Expires: 6 May 2021 R.W. Grimes, Ed. 2 November 2020 The Some Congestion Experienced ECN Codepoint draft-morton-tsvwg-sce-02 Abstract This memo reclassifies ECT(1) to be an early notification of congestion on ECT(0) marked packets, which can be used by AQM algorithms and transports as an earlier signal of congestion than CE. It is a simple, transparent, and backward compatible upgrade to existing IETF-approved AQMs, RFC3168, and nearly all congestion control algorithms. Status of This Memo This Internet-Draft is submitted in full conformance with the provisions of BCP 78 and BCP 79. Internet-Drafts are working documents of the Internet Engineering Task Force (IETF). Note that other groups may also distribute working documents as Internet-Drafts. The list of current Internet- Drafts is at https://datatracker.ietf.org/drafts/current/. Internet-Drafts are draft documents valid for a maximum of six months and may be updated, replaced, or obsoleted by other documents at any time. It is inappropriate to use Internet-Drafts as reference material or to cite them other than as "work in progress." This Internet-Draft will expire on 6 May 2021. Copyright Notice Copyright (c) 2020 IETF Trust and the persons identified as the document authors. All rights reserved. Morton, et al. Expires 6 May 2021 [Page 1] Internet-Draft sceb November 2020 This document is subject to BCP 78 and the IETF Trust's Legal Provisions Relating to IETF Documents (https://trustee.ietf.org/ license-info) in effect on the date of publication of this document. Please review these documents carefully, as they describe your rights and restrictions with respect to this document. Code Components extracted from this document must include Simplified BSD License text as described in Section 4.e of the Trust Legal Provisions and are provided without warranty as described in the Simplified BSD License. Table of Contents 1. Terminology . . . . . . . . . . . . . . . . . . . . . . . . . 3 2. Introduction . . . . . . . . . . . . . . . . . . . . . . . . 3 3. Background . . . . . . . . . . . . . . . . . . . . . . . . . 4 4. Some Congestion Experienced . . . . . . . . . . . . . . . . . 5 5. Design Rationale . . . . . . . . . . . . . . . . . . . . . . 7 5.1. Risks with ECN Signaling . . . . . . . . . . . . . . . . 7 5.2. Unresponsive Flows . . . . . . . . . . . . . . . . . . . 8 5.3. Fairness . . . . . . . . . . . . . . . . . . . . . . . . 9 5.4. ECT(1) as SCE . . . . . . . . . . . . . . . . . . . . . . 9 6. Diffserv Usage . . . . . . . . . . . . . . . . . . . . . . . 10 6.1. SCE Diffserv Codepoints (DSCPs) . . . . . . . . . . . . . 10 6.1.1. SCE-CAPABLE . . . . . . . . . . . . . . . . . . . . . 10 6.1.2. SCE-LOWDELAY . . . . . . . . . . . . . . . . . . . . 11 6.1.3. SCE-LOWCOST . . . . . . . . . . . . . . . . . . . . . 11 6.2. Diffserv Codepoints for Experimental and Private Use . . 11 6.3. Diffserv Codepoints for Public Use . . . . . . . . . . . 12 7. Examples of use . . . . . . . . . . . . . . . . . . . . . . . 12 7.1. Codel-type AQMs . . . . . . . . . . . . . . . . . . . . . 12 7.2. RED-type AQMs (including PIE) . . . . . . . . . . . . . . 13 7.3. Simple Two-Queue Middleboxes . . . . . . . . . . . . . . 13 7.4. TCP . . . . . . . . . . . . . . . . . . . . . . . . . . . 14 7.5. Other . . . . . . . . . . . . . . . . . . . . . . . . . . 14 8. Compatibility . . . . . . . . . . . . . . . . . . . . . . . . 14 8.1. Existing ECN & AQM Deployments . . . . . . . . . . . . . 14 8.2. L4S . . . . . . . . . . . . . . . . . . . . . . . . . . . 15 9. Ongoing Research and Development . . . . . . . . . . . . . . 16 10. Related Work . . . . . . . . . . . . . . . . . . . . . . . . 16 11. IANA Considerations . . . . . . . . . . . . . . . . . . . . . 16 12. Security Considerations . . . . . . . . . . . . . . . . . . . 17 13. Acknowledgements . . . . . . . . . . . . . . . . . . . . . . 17 14. Normative References . . . . . . . . . . . . . . . . . . . . 17 15. Informative References . . . . . . . . . . . . . . . . . . . 17 Authors' Addresses . . . . . . . . . . . . . . . . . . . . . . . 21 Morton, et al. Expires 6 May 2021 [Page 2] Internet-Draft sceb November 2020 1. Terminology The key words "MUST", "MUST NOT", "REQUIRED", "SHALL", "SHALL NOT", "SHOULD", "SHOULD NOT", "RECOMMENDED", "NOT RECOMMENDED", "MAY", and "OPTIONAL" in this document are to be interpreted as described in [RFC2119] and [RFC8174] when, and only when, they appear in all capitals, as shown here. 2. Introduction Traditional TCP congestion control exhibits a "sawtooth" pattern which, in the most favourable cases, oscillates around the optimum operating point of maximum throughput and minimum delay, which exists at the point where the congestion window equals path BDP. The term "sawtooth" brings to mind the straight-edged graphs of TCP Reno, but the equally common TCP CUBIC is essentially similar in character, as are other AIMD-derived algorithms. A number of proposals have sought to improve this, but introduce various other tradoffs in return. TCP Vegas is consistently outcompeted by standard TCPs, DCTCP proved to be too aggressive for deployment in the public Internet, and while BBR appears to have avoided both of these problems, its complexity makes it difficult to implement correctly. Each of these proposals is characterised by primarily changing only the endpoints, not the network nodes on the path between them; though DCTCP is intended for use with a specific style of AQM, it can work with standard AQMs as long as there is no competing non-DCTCP traffic. Some other proposals have attempted to convey information about the network path explicitly, by having network nodes inject data about link capacity and/or utilisation into passing traffic. These proposals have generally been unsuccessful due to the complex slow- path processing required in network nodes, and are not widely deployed. The only successful proposal of this type is Explicit Congestion Notification [RFC3168] which allows an AQM to signal congestion by marking packets with (essentially) a one-bit signal in preference to dropping them. ECN defines a two-bit field supporting four codepoints, of which three are in active use and the fourth is a semantic duplicate. It was explicitly suggested during ECN's development that new meaning could be given to this spare codepoint, including as a lesser indication of congestion in [RFC3168] (section 20.2). With an alternative use of this codepoint having fallen out of favour, the time is right to revisit this suggestion and propose a workable method of applying it. Morton, et al. Expires 6 May 2021 [Page 3] Internet-Draft sceb November 2020 In so doing, care must be taken that backwards compatibility is maintained with existing traffic, endpoints and network nodes that are known or suspected to have been deployed. Keeping the changes to on-wire protocols minimal, and the complexity of implementation low, are also highly desirable. This memo reclassifies ECT(1) to be an early notification of congestion on ECT(0) marked packets, which can be used by AQM algorithms and transports as an earlier signal of congestion than CE ("Congestion Experienced"). This memo also briefly discusses how transports should respond to ECT(1) marked packets. Detailed specifications of this behaviour are left to transport-specific memos. 3. Background [RFC3168] defines the lower two bits of the (former) TOS byte in the IPv4/6 header as the ECN field. This may take four values: Not-ECT, ECT(0), ECT(1) or CE. +========+=====================================+============+ | Binary | Keyword | References | +========+=====================================+============+ | 00 | Not-ECT (Not ECN-Capable Transport) | [RFC3168] | +--------+-------------------------------------+------------+ | 01 | ECT(1) (ECN-Capable Transport(1)) | [RFC3168] | +--------+-------------------------------------+------------+ | 10 | ECT(0) (ECN-Capable Transport(0)) | [RFC3168] | +--------+-------------------------------------+------------+ | 11 | CE (Congestion Experienced) | [RFC3168] | +--------+-------------------------------------+------------+ Table 1 Research has shown that the ECT(1) codepoint goes essentially unused, with the "Nonce Sum" extension to ECN having not been implemented in practice and thus subsequently obsoleted by [RFC8311] (section 3). Additionally, known [RFC3168] compliant senders do not emit ECT(1), and compliant middleboxes do not alter the field to ECT(1), while compliant receivers all interpret ECT(1) identically to ECT(0). These are useful properties which represent an opportunity for improvement. Experience gained with 7 years of [RFC8290] deployment in the field suggests that it remains difficult to maintain the desired 100% link utilisation, whilst simultaneously strictly minimising induced delay due to excess queue depth - irrespective of whether ECN is in use. Morton, et al. Expires 6 May 2021 [Page 4] Internet-Draft sceb November 2020 This leads to a reluctance amongst hardware vendors to implement the most effective AQM schemes because their headline benchmarks are throughput-based. The underlying cause is the very sharp "multiplicative decrease" reaction required of transport protocols to congestion signalling (whether that be packet loss or CE marks), which tends to leave the congestion window significantly smaller than the ideal BDP when triggered at only slightly above the ideal value. The availability of this sharp response is required to assure network stability (AIMD principle), but there is presently no standardised and backwards- compatible means of providing a less drastic signal. 4. Some Congestion Experienced As consensus has arisen that some form of ECN signaling should be an earlier signal than drop, this memo changes the meaning of ECT(1) to SCE, meaning "Some Congestion Experienced". Since there is no longer ambiguity between two ECT codepoints, ECT(0) is referred to as ECT. The ECN-field codepoint table then becomes: +========+=====================================+==============+ | Binary | Keyword | References | +========+=====================================+==============+ | 00 | Not-ECT (Not ECN-Capable Transport) | [RFC3168] | +--------+-------------------------------------+--------------+ | 01 | SCE (Some Congestion Experienced) | [This draft] | +--------+-------------------------------------+--------------+ | 10 | ECT (ECN-Capable Transport) | [RFC3168] | +--------+-------------------------------------+--------------+ | 11 | CE (Congestion Experienced) | [RFC3168] | +--------+-------------------------------------+--------------+ Table 2 This permits middleboxes implementing AQM to signal incipient congestion, below the threshold required to justify setting CE, by converting some proportion of ECT codepoints to SCE ("SCE marking"). Existing [RFC3168] compliant receivers MUST transparently ignore this new signal with respect to congestion control, and both existing and SCE-aware middleboxes SHOULD convert SCE to CE in the same circumstances as for ECT, thus ensuring backwards compatibility with [RFC3168] ECN endpoints. The permitted ECN codepoint transitions by middleboxes are: Morton, et al. Expires 6 May 2021 [Page 5] Internet-Draft sceb November 2020 +=========+==================+ | From | To | +=========+==================+ | Not-ECT | Not-ECT | +---------+------------------+ | ECT | ECT or SCE or CE | +---------+------------------+ | SCE | SCE or CE | +---------+------------------+ | CE | CE | +---------+------------------+ Table 3 Note that dropping a packet is an allowed action for any ECN codepoint. While that is the only way of indicating congestion with Not-ECT, it may also be used to both indicate and reduce congestion in any state. To re-state the allowed transitions another way: for ECN-aware flows, the ECN marking of an individual packet MAY be increased by a middlebox to signal congestion, but MUST NOT be decreased, and packets SHALL NOT be altered to appear to be ECN-aware if they were not originally, nor vice versa. Note however that SCE is numerically less than ECT, but semantically greater, and the latter definition applies for this rule. Receivers and transport protocols conforming to this specification SHALL continue to apply the [RFC3168] interpretation of the CE codepoint, that is, to signal the sender to back off send rate to the same extent as if a packet loss were detected. This maintains compatibility with existing middleboxes, senders and receivers. New SCE-aware receivers and transport protocols SHOULD interpret the SCE codepoint as an indication of mild congestion, and respond accordingly by applying send rates intermediate between those resulting from a continuous sequence of ECT codepoints, and those resulting from a CE codepoint. The ratio of ECT and SCE codepoints received indicates the relative severity of such congestion, with a higher proportion of SCE codepoints indicating more congestion. The intent of SCE marking is a "cruise control" signal which permits middleboxes to request relatively small reductions in send rate, or merely a slowing of send rate growth. Accordingly, SCE marks SHOULD progressively trigger exit from exponential slow-start growth, then reduction to Reno-linear growth (for congestion control algorithms which support higher growth rates in congestion-avoidance phase), then a halt to send rate growth, then a gradual reduction of send Morton, et al. Expires 6 May 2021 [Page 6] Internet-Draft sceb November 2020 rate. For immediate large reductions of send rate, the CE mark MUST retain its original Multiplicative Decrease power as per [RFC8511], and compliant AQMs SHOULD retain the ability to employ it where appropriate. Details of how to implement SCE awareness at the transport layer are left to additional Internet Drafts. To ensure RTT-fair convergence with single-queue SCE AQMs, transports SHOULD stabilise at lower SCE- mark ratios for higher BDPs, and MAY reduce their response to CE marks IFF they are responding to SCE signals received at around the same time (eg. within 1-2 RTTs) in the same flow. To maximise the benefit of SCE, middleboxes SHOULD begin to produce SCE marks at lower congestion levels than they begin to produce CE marks. This will usually ensure that SCE-aware flows avoid receiving CE marks. When a single-queue AQM is upgraded to SCE awareness, this will tend to cause SCE flows to give way to non-SCE flows; to avoid this behaviour, single-queue AQMs MAY be left as [RFC3168] compliant without SCE support. For the avoidance of doubt, a decision to mark CE or to drop a packet always takes precedence over SCE marking. 5. Design Rationale The SCE design sees ECN as a "network feature". The risks with ECN signaling (Section 5.1), the need to handle unresponsive flows (Section 5.2), the utility of fairness (Section 5.3), and the availability of only one ECN codepoint all influenced the SCE signaling design. This section discusses these related concerns, along with what is needed from middleboxes to address them, and how that ultimately led to the selection of ECT(1) as an additional signal of lesser congestion (Section 5.4). 5.1. Risks with ECN Signaling The safety and effectiveness of ECN signaling depends upon the unaltered transmission of the ECN bits, both for the indication of ECN support, and for ECN signaling. Unlike a drop, which is reliably and irrevocably signaled, ECN signals may be erased or manipulated. Specifically, any of the following results in the lack of a congestion response, which is likely to lead to the near starvation of competing flows: * if transports indicate ECT(0) but do not respond to CE * if packets are erroneously changed from Not-ECT to ECT(0) in the network Morton, et al. Expires 6 May 2021 [Page 7] Internet-Draft sceb November 2020 * if CE marks are erased after a bottleneck * if ECE marks are erased post-negotiation Although the lack of a congestion response is similar to when transports do not respond appropriately to drop, the difference is that with ECN, the behavior can be brought about in the network, without changes to the endpoint. This may happen by accident, for example due to a broken network configuration or endpoint implementation, or on purpose, e.g. using a simple firewall rule. Unresponsive flow mitigation, discussed in the next section, deals with flows that are not responding to congestion signals, including for the reasons listed above. 5.2. Unresponsive Flows A single unresponsive flow has the potential to nearly starve all other competing flows in a congested bottleneck, resulting in unacceptable network delays and collapses in throughput. The need to handle unresponsive flows is corroborated in [RFC7567] (section 4), stating: | "Research, engineering, and measurement efforts are needed | regarding the design of mechanisms to deal with flows that are | unresponsive to congestion notification or are responsive, but are | more aggressive than present TCP." The source language from [RFC2309] (section 5) is more direct: | "It is urgent to begin or continue research, engineering, and | measurement efforts contributing to the design of mechanisms to | deal with flows that are unresponsive to congestion notification | or are responsive but more aggressive than TCP." The [COBALT] AQM algorithm is one example of how unresponsive flows can be dealt with, using the [BLUE] algorithm to detect overload and trigger drops. Regardless of how it's done exactly, unresponsive flow mitigation is most effectively implemented with some level of flow awareness, so that drops may be directed to the offending flow/s. Once flow awareness is available, fairness steering becomes possible, discussed further in the following section. Morton, et al. Expires 6 May 2021 [Page 8] Internet-Draft sceb November 2020 5.3. Fairness In order for SCE flows to compete fairly with non-SCE flows, at least one of the following is required: some form of fairness steering, or some way of separating SCE and non-SCE flows. Following is a non- exhaustive list of options: * FQ (fair queueing), to isolate and schedule flows fairly from separate queues * AF (approximate fairness), so that SCE and non-SCE flows can share the same queue, e.g. [AFD], [I-D.morton-tsvwg-codel-approx-fair], [I-D.morton-tsvwg-lightweight-fair-queueing] * DSCP [RFC2474], to explicitly separate SCE and non-SCE flows (see Section 6) When available, fairness is viewed as an advantage, in that it: * controls aggressive flows * prevents network bias * promotes the fair interoperation between the ever-expanding matrix of new congestion control mechanisms The abundance of new and proposed congestion controls is making their fair competition across bandwidths, RTTs and network conditions more difficult if not impossible to ensure in the endpoint alone [CC-REVOLUTION] [CC-COMPAT]. Congestion control implementations may dominate one another under different conditions, e.g. [BBR-CUBIC], while the widespread deployment of potentially beneficial congestion controls that seek to minimize delay is discouraged by the fact that they are often out-competed in bottlenecks by standard TCP. Fairness in the network both improves these conditions and assists transports responding to SCE. 5.4. ECT(1) as SCE With only a single ECN codepoint remaining, options are limited for how to signal congestion with high fidelity. Meanwhile, the recent rise in ECN signaling makes backwards compatibility with [RFC3168] a practical requirement. Fortunately, the same network technologies that mitigate the well recognized risks listed in Section 5 above, also make the use of ECT(1) as defined by SCE possible, without a separate traffic identifier. Where those technologies cannot be deployed, Diffserv Morton, et al. Expires 6 May 2021 [Page 9] Internet-Draft sceb November 2020 may be used to identify SCE traffic (see Section 6), a purpose for which it was expressly designed. Where that is impossible, SCE allows a graceful fallback to [RFC3168] ECN. SCE's usage of ECT(1) provides a safe and solid foundation on which future innovations in the network can improve the availability and performance of high- fidelity congestion signaling. 6. Diffserv Usage SCE is not dependent on Diffserv [RFC2474] for its signaling, but makes use of it in the following ways: * to mark SCE traffic for experimental or private use * to assist middleboxes in their operation * to request special SCE treatment, such as low delay or low cost 6.1. SCE Diffserv Codepoints (DSCPs) All SCE DSCPs indicate SCE support in the originating endpoint. This MAY assist SCE marking middleboxes in their operation, but MUST NOT be depended upon for effective congestion control. See Section 7.3 for an example of such a usage. SCE middleboxes MUST retain any SCE DSCPs that arrive on incoming packets, and MUST NOT set them on packets that do not already have them. The SCE DSCPs MAY be set on TCP ACK and control packets which have the Not-ECT codepoint set in the ECN field, IFF the TCP connection as a whole is SCE capable (or in the process of being negotiated as such). This allows all packets relating to that connection to be treated equally by middleboxes which distinguish them. Should ECN negotiation fail, the DSCP should be changed to some non-SCE value for subsequent traffic on that connection. 6.1.1. SCE-CAPABLE The SCE-CAPABLE DSCP indicates SCE support, with standard, best- effort service implied. This is the appropriate service for capacity-seeking traffic, for which latency is a secondary consideration. Morton, et al. Expires 6 May 2021 [Page 10] Internet-Draft sceb November 2020 6.1.2. SCE-LOWDELAY The SCE-LOWDELAY DSCP is used to both indicate SCE support and request low-delay service. This MAY be used by AQMs to select a low delay queue with tighter marking parameters that reduce delay, at the possible expense of throughput. 6.1.3. SCE-LOWCOST The SCE-LOWCOST DSCP is used to both indicate SCE support and request altruistic low-cost service. This MAY be used by AQMs to deprioritise this traffic in favour of low-delay and best-effort traffic, similar to the LE PHB [RFC8622]. 6.2. Diffserv Codepoints for Experimental and Private Use Prior to approval for public experiment, the SCE DSCPs are defined in the experimental pool xxxx11, and the following rules MUST be observed to contain SCE traffic within the experimental network: * SCE senders SHOULD set one of the SCE DSCPs when participating in an SCE experimental network. * SCE middleboxes MUST NOT mark SCE on packets lacking an SCE DSCP, or packets that may leave the experimental network. * SCE receivers MUST check that one of the SCE DSCPs is present before returning SCE feedback. * All SCE DSCPs MUST be bleached at the experimental network boundaries. The following values are proposed for guidance only. Because they are in the experimental pool, they may be changed to suit the environment: +==============+================+=================+ | Name | Value (Binary) | Value (Decimal) | +==============+================+=================+ | SCE-CAPABLE | 000111 | 7 | +--------------+----------------+-----------------+ | SCE-LOWDELAY | 001011 | 11 | +--------------+----------------+-----------------+ | SCE-LOWCOST | 000011 | 3 | +--------------+----------------+-----------------+ Table 4 Morton, et al. Expires 6 May 2021 [Page 11] Internet-Draft sceb November 2020 6.3. Diffserv Codepoints for Public Use In the event that SCE is approved for public experiment, the DSCPs will be allocated in an appropriate standards action pool, using a value that is intended to be treated as best-effort traffic by existing deployed devices. One of the SCE DSCPs SHOULD be set by sending endpoints on all SCE capable traffic. However, they neither need to be checked by middleboxes that do not require them before marking SCE, nor by receiving endpoints before returning SCE feedback. That way, they can serve as hints for middleboxes, but the SCE signaling mechanism is not dependent on end-to-end DSCP traversal. Unless and until a public experiment is approved, the guidance in Section 6.2 MUST be followed. 7. Examples of use 7.1. Codel-type AQMs A simple and natural way to implement SCE in a Codel-type AQM is to mark all ECT packets as SCE if they are over half the Codel target sojourn time, and not marked CE by Codel itself. This threshold function does not necessarily produce the best performance, but is very easy to implement and provides useful information to SCE-aware flows, often sufficient to avoid receiving CE marks whilst still efficiently using available capacity. For a more sophisticated approach avoiding even small-scale oscillation, a stochastic ramp function may be implemented with 100% marking at the Codel target, falling to 0% marking at or above zero sojourn time. The lower point of the ramp should be chosen so that SCE is not accidentally signalled due to CPU scheduling latencies or serialisation delays of single packets. Absent rigorous analysis of these factors, setting the lower limit at half the Codel target should be safe in many cases. The default configuration of Codel is 100ms interval, 5ms target. A typical ramp function for these parameters might cease marking below 2.5ms sojourn time, increase marking probability linearly to 100% at 5ms, and mark at 100% for sojourn times above 5ms (in which CE marking is also possible). In single-queue AQMs, the above strategy will result in SCE flows yielding to pressure from non-SCE flows, since CE marks do not occur until SCE marking has reached 100%. A balance between smooth SCE behaviour and fairness versus non-SCE traffic can be found by having Morton, et al. Expires 6 May 2021 [Page 12] Internet-Draft sceb November 2020 the marking ramp cross the Codel target at some lower SCE marking rate, perhaps even 0%. A two-part ramp, reaching 1/sqrt(X) at the Codel target (for some chosen X, a cwnd at which the crossover between smoothness and fairness occurs) and ramping up more steeply thereafter, has been implemented successfully for experimentation. The CNQ algorithm [I-D.morton-tsvwg-cheap-nasty-queueing] offers a relatively simple way to limit this yielding behaviour and ensure that, even in competition with non-SCE flows, SCE flows maintain a reasonable minimum throughput capability. This may be sufficient to avoid the need for the two-part ramp described above. Flow-isolating AQMs, including especially CNQ and DRR++ based algorithms, should avoid signalling SCE to flows classified as "sparse", in order to encourage the fastest possible convergence to the fair share. 7.2. RED-type AQMs (including PIE) There are several reasonable methods of producing SCE signals in a RED-type AQM. The simplest would be a threshold function, giving a hard boundary in queue depth between 0% and 100% SCE marking. This could be a sensible option for limited hardware implementations. The threshold should be set below the point at which a growing queue might trigger CE marking or packet drops. Another option would be to implement a second marking probability function, occupying a queue-depth space just below that occupied by the main marking probability function. This should be arranged so that high marking rates (ideally 100%) are achieved at or before the point at which CE marking or packet drops begin. For PIE specifically, a second marking probability function could be added with the same parameters as the main marking probability function, except for a lower QDELAY_REF value. This would result in the SCE marking probability remaining strictly higher than the CE marking probability for ECT flows. 7.3. Simple Two-Queue Middleboxes In high-capacity or resource constrained SCE marking middleboxes, DSCP may be used to select one of two queues, in lieu of implementing fairness steering. Packets marked with an SCE DSCP are placed in an SCE queue, where an AQM instance may mark congestion with either SCE or CE. Packets not marked with an SCE DSCP are placed in a second [RFC3168] queue, whose AQM instance may only mark congestion with CE. Morton, et al. Expires 6 May 2021 [Page 13] Internet-Draft sceb November 2020 For approximate flow fairness, the queues may be scheduled in proportion to the number of flows they contain. Note that as long as the SCE DSCP remains intact from the sending endpoint to the marking queue, the SCE queue may be used. If it has been erased or altered to a non-SCE DSCP, the packet will be placed in the [RFC3168] queue, and may still benefit from standard ECN. If this middlebox is to be used in public environments, some form of unresponsive flow mitigation is warranted to ensure that flows haven't indicated their support for either SCE or [RFC3168] ECN incorrectly. If flows do not respond to the signals they advertise support for, they will dominate competing traffic in the same queue. 7.4. TCP The proposed mechanism for TCP to feed back SCE signals to the sender is outlined in [I-D.grimes-tcpm-tcpsce]. Use is made of the redundant NS bit in the TCP header, which was formerly associated with ECT(1) in the Nonce Sum specification. The recommended response to each single segment marked with SCE is to reduce cwnd by an amortised 1/sqrt(cwnd) segments. Other responses, such as the 1/cwnd from DCTCP, are also acceptable but may perform less well. 7.5. Other New transports under development, such as QUIC, may implement a fine- grained signal back to the sender based on SCE. QUIC itself appears to have this sort of feedback already (counting ECT(0), ECT(1) and CE packets received), and the data should be made available for congestion control. 8. Compatibility 8.1. Existing ECN & AQM Deployments SCE explicitly retains [RFC8511] compliant Multiplicative Decrease responses to CE marks, and conventional Multiplicative Decrease responses to packet loss. SCE senders' behaviour is thus naturally compliant with existing specifications when running over existing networks. Morton, et al. Expires 6 May 2021 [Page 14] Internet-Draft sceb November 2020 Existing endpoints, supporting Not-ECT or [RFC3168] compliant congestion control, are required to treat SCE marks (that is, ECT(1)) as identical to ECT(0), and will thus transparently ignore SCE marks. This is allowed for in SCE's design, and allows SCE middleboxes to be deployed into a heterogeneous network. Hence the incremental deployability of SCE endpoints and middleboxes is good. 8.2. L4S L4S [I-D.ietf-tsvwg-l4s-arch] also claims the ECT(1) codepoint, with significantly different semantic meaning than SCE, so a discussion around the potential for L4S and SCE compatibility is warranted. In the L4S system, ECT(1) is used to identify L4S flows, to distinguish them from [RFC3168] flows - necessary since in L4S, the semantic meaning of CE marks is also changed. Since L4S connections are explicitly negotiated through support of AccECN, and AccECN doesn't support SCE, there is no ambiguity regarding the mode of the connection as far as endpoints are concerned. SCE middleboxes will treat L4S flows in the same way as [RFC3168] does. However, because SCE middleboxes are likely to upgrade ECT(1) marked packets to CE at a higher threshold than L4S middleboxes would, L4S flows will outcompete non-L4S flows in a single SCE-aware queue. This is the same known safety concern with L4S deployment in regards to existing [RFC3168] queues, resulting from the redefinition of CE in L4S. Fairness steering in SCE middleboxes could mitigate this. L4S middleboxes may interpret ECT packets which have received SCE markings at some other SCE-aware middlebox as though they were L4S traffic. This may result in a higher CE marking rate and/or different queuing behaviour. It may also result in the reordering of packets for both SCE and non-SCE aware flows through L4S middleboxes, as packets marked ECT(1) will on average traverse the bottleneck with lower delay than packets not marked ECT(1). Although this could be mitigated by [I-D.ietf-tcpm-rack], it may lead to reduced throughput and head-of-line blocking for flows that traverse both SCE and L4S bottlenecks. There are at least two secondary concerns brought about by the L4S use of ECT(1) as a traffic identifier: Morton, et al. Expires 6 May 2021 [Page 15] Internet-Draft sceb November 2020 * If it is found necessary to firewall L4S traffic off from the general Internet, then SCE-marked packets are also likely to be dropped at this boundary. This could have a significantly detrimental effect on ECT traffic traversing both an SCE and an L4S enabled network, even if the endpoints are not explicitly SCE aware. * If it is found necessary to bleach ECT(1) in order to disable L4S in a network, this would erase SCE signals sent to endpoints. Although not ideal, SCE transports would still safely fall back to relying on CE for congestion notification. Lastly, an ambiguous definition of ECT(1) complicates network debugging with packet captures, since it would be unclear whether a packet was marked ECT(1) due to congestion at an SCE bottleneck, or because it is an L4S flow. Although examination of other packets in the flow could reduce this ambiguity, the necessity of observing flow state is generally discouraged for debugging purposes. Thus far, the working group is operating under the assumption that coexistence of SCE and L4S is not an option. 9. Ongoing Research and Development The SCE proposal is a work in progress, with ongoing or planned work in at least the following areas: * AQM strategies for a small number of FIFO queues * Tunnel traversal, with possible updates to [RFC3168] and [RFC6040] * Research ways of reducing RTT dependence (Prague requirement #5) * Performance in environments with jitter and burstiness * New testing tools that cover many short flows, and VBR UDP flows * Testing, with guidance from [RFC2914], [RFC7141] and [RFC5033] 10. Related Work [RFC8087] [RFC7567] [RFC7928] [RFC8290] [RFC8289] [RFC8033] [RFC8034] 11. IANA Considerations There are no IANA considerations. Morton, et al. Expires 6 May 2021 [Page 16] Internet-Draft sceb November 2020 12. Security Considerations An adversary could inappropriately set SCE marks at middleboxes he controls to slow down SCE-aware flows, eventually reaching a minimum congestion window. However, the same threat already exists with respect to inappropriately setting CE marks on normal ECN flows, and this would have a greater impact per mark. Therefore no new threat is exposed by SCE in practice. An adversary could also simply ignore SCE marks at the receiver, or ignore SCE information fed back from the receiver to the sender, in an attempt to gain some advantage in throughput. Again, the same could be said about ignoring CE marks, so no truly new threat is exposed. Additionally, correctly implemented SCE detection may actually improve long-term goodput compared to ignoring SCE. An adversary could erase congestion information by converting SCE marks to ECT or Not-ECT codepoints, thus hiding it from the receiver. This has equivalent effects to ignoring SCE signals at the receiver. An identical threat already exists for erasing congestion information from CE marked packets, and may be mitigated by AQMs switching to dropping packets from flows observed to be non-responsive to CE. An adversary could drop SCE-marked packets, believing them to be bogons (see also L4S Compatibility, above). Endpoints should be able to recover from this through retransmission and a reduction of cwnd. However, it is possible for this to lead to a significant denial of service. A workaround is to disable ECN for connections over the affected path. 13. Acknowledgements Thanks to Dave Taht for his contributions to the SCE effort, and his work on writing the original draft-morton-taht-sce-00 that was submitted for IETF/104 on which this draft is based. Many thanks to John Gilmore, the members of the ecn-sane project and the cake@lists.bufferbloat.net mailing list, and the former IETF AQM working group. 14. Normative References [RFC8311] Black, D., "Relaxing Restrictions on Explicit Congestion Notification (ECN) Experimentation", RFC 8311, DOI 10.17487/RFC8311, January 2018, . 15. Informative References Morton, et al. Expires 6 May 2021 [Page 17] Internet-Draft sceb November 2020 [AFD] Pan, R., Breslau, L., Prabhakar, B., and S. Shenker, "Approximate fairness through differential dropping", in ACM SIGCOMM Computer Communication Review, April 2003, . [BBR-CUBIC] Borgli, R.J. and J. Misund, "Comparing BBR and CUBIC Congestion Controls", in University of Oslo, INF5072, 2018, . [BLUE] Feng, W., Kandlur, D.D., Saha, D., and K.G. Shin, "BLUE: A New Class of Active Queue Management Algorithms", in Computer Science Technical Report, April 1999, . [CC-COMPAT] Fejes, F., Gombos, G., Laki, S., and S. Nadas, "Compatibility of Scalable Congestion Controls", in Second Workshop on the Future of Internet Transport - FIT 2020, Paris, France (Virtual), 2020, . [CC-REVOLUTION] Fejes, F., Gombos, G., Laki, S., and S. Nadas, "Who will Save the Internet from the Congestion Control Revolution?", in Workshop on Buffer Sizing, Stanford University, 2019, . [COBALT] Palmei, J., Gupta, S., Imputato, P., Morton, J., Tahiliani, M.P., Avallone, S., and D. Taht, "Design and Evaluation of COBALT Queue Discipline", in 2019 IEEE International Symposium on Local and Metropolitan Area Networks (LANMAN), September 2019, . [I-D.grimes-tcpm-tcpsce] Grimes, R. and P. Heist, "Some Congestion Experienced in TCP", Work in Progress, Internet-Draft, draft-grimes-tcpm- tcpsce-01, 4 November 2019, . Morton, et al. Expires 6 May 2021 [Page 18] Internet-Draft sceb November 2020 [I-D.ietf-tcpm-rack] Cheng, Y., Cardwell, N., Dukkipati, N., and P. Jha, "The RACK-TLP loss detection algorithm for TCP", Work in Progress, Internet-Draft, draft-ietf-tcpm-rack-11, 30 September 2020, . [I-D.ietf-tsvwg-l4s-arch] Briscoe, B., Schepper, K., Bagnulo, M., and G. White, "Low Latency, Low Loss, Scalable Throughput (L4S) Internet Service: Architecture", Work in Progress, Internet-Draft, draft-ietf-tsvwg-l4s-arch-07, 27 October 2020, . [I-D.morton-tsvwg-cheap-nasty-queueing] Morton, J. and P. Heist, "Cheap Nasty Queueing", Work in Progress, Internet-Draft, draft-morton-tsvwg-cheap-nasty- queueing-01, 4 November 2019, . [I-D.morton-tsvwg-codel-approx-fair] Morton, J. and P. Heist, "Controlled Delay Approximate Fairness AQM", Work in Progress, Internet-Draft, draft- morton-tsvwg-codel-approx-fair-01, 9 March 2020, . [I-D.morton-tsvwg-lightweight-fair-queueing] Morton, J. and P. Heist, "Lightweight Fair Queueing", Work in Progress, Internet-Draft, draft-morton-tsvwg- lightweight-fair-queueing-00, 2 July 2019, . [RFC2119] Bradner, S., "Key words for use in RFCs to Indicate Requirement Levels", BCP 14, RFC 2119, DOI 10.17487/RFC2119, March 1997, . [RFC2309] Braden, B., Clark, D., Crowcroft, J., Davie, B., Deering, S., Estrin, D., Floyd, S., Jacobson, V., Minshall, G., Partridge, C., Peterson, L., Ramakrishnan, K., Shenker, S., Wroclawski, J., and L. Zhang, "Recommendations on Queue Management and Congestion Avoidance in the Internet", RFC 2309, DOI 10.17487/RFC2309, April 1998, . Morton, et al. Expires 6 May 2021 [Page 19] Internet-Draft sceb November 2020 [RFC2474] Nichols, K., Blake, S., Baker, F., and D. Black, "Definition of the Differentiated Services Field (DS Field) in the IPv4 and IPv6 Headers", RFC 2474, DOI 10.17487/RFC2474, December 1998, . [RFC2914] Floyd, S., "Congestion Control Principles", BCP 41, RFC 2914, DOI 10.17487/RFC2914, September 2000, . [RFC3168] Ramakrishnan, K., Floyd, S., and D. Black, "The Addition of Explicit Congestion Notification (ECN) to IP", RFC 3168, DOI 10.17487/RFC3168, September 2001, . [RFC5033] Floyd, S. and M. Allman, "Specifying New Congestion Control Algorithms", BCP 133, RFC 5033, DOI 10.17487/RFC5033, August 2007, . [RFC6040] Briscoe, B., "Tunnelling of Explicit Congestion Notification", RFC 6040, DOI 10.17487/RFC6040, November 2010, . [RFC7141] Briscoe, B. and J. Manner, "Byte and Packet Congestion Notification", BCP 41, RFC 7141, DOI 10.17487/RFC7141, February 2014, . [RFC7567] Baker, F., Ed. and G. Fairhurst, Ed., "IETF Recommendations Regarding Active Queue Management", BCP 197, RFC 7567, DOI 10.17487/RFC7567, July 2015, . [RFC7928] Kuhn, N., Ed., Natarajan, P., Ed., Khademi, N., Ed., and D. Ros, "Characterization Guidelines for Active Queue Management (AQM)", RFC 7928, DOI 10.17487/RFC7928, July 2016, . [RFC8033] Pan, R., Natarajan, P., Baker, F., and G. White, "Proportional Integral Controller Enhanced (PIE): A Lightweight Control Scheme to Address the Bufferbloat Problem", RFC 8033, DOI 10.17487/RFC8033, February 2017, . Morton, et al. Expires 6 May 2021 [Page 20] Internet-Draft sceb November 2020 [RFC8034] White, G. and R. Pan, "Active Queue Management (AQM) Based on Proportional Integral Controller Enhanced PIE) for Data-Over-Cable Service Interface Specifications (DOCSIS) Cable Modems", RFC 8034, DOI 10.17487/RFC8034, February 2017, . [RFC8087] Fairhurst, G. and M. Welzl, "The Benefits of Using Explicit Congestion Notification (ECN)", RFC 8087, DOI 10.17487/RFC8087, March 2017, . [RFC8174] Leiba, B., "Ambiguity of Uppercase vs Lowercase in RFC 2119 Key Words", BCP 14, RFC 8174, DOI 10.17487/RFC8174, May 2017, . [RFC8289] Nichols, K., Jacobson, V., McGregor, A., Ed., and J. Iyengar, Ed., "Controlled Delay Active Queue Management", RFC 8289, DOI 10.17487/RFC8289, January 2018, . [RFC8290] Hoeiland-Joergensen, T., McKenney, P., Taht, D., Gettys, J., and E. Dumazet, "The Flow Queue CoDel Packet Scheduler and Active Queue Management Algorithm", RFC 8290, DOI 10.17487/RFC8290, January 2018, . [RFC8511] Khademi, N., Welzl, M., Armitage, G., and G. Fairhurst, "TCP Alternative Backoff with ECN (ABE)", RFC 8511, DOI 10.17487/RFC8511, December 2018, . [RFC8622] Bless, R., "A Lower-Effort Per-Hop Behavior (LE PHB) for Differentiated Services", RFC 8622, DOI 10.17487/RFC8622, June 2019, . Authors' Addresses Jonathan Morton Kokkonranta 21 FI-31520 Pitkajarvi Finland Phone: +358 44 927 2377 Email: chromatix99@gmail.com Morton, et al. Expires 6 May 2021 [Page 21] Internet-Draft sceb November 2020 Peter G. Heist Redacted 463 11 Liberec 30 Czech Republic Email: pete@heistp.net Rodney W. Grimes (editor) Redacted Portland, OR 97217 United States Email: rgrimes@freebsd.org Morton, et al. Expires 6 May 2021 [Page 22]