From nobody Mon Jul 18 09:59:37 2016 Return-Path: X-Original-To: tcpprague@ietfa.amsl.com Delivered-To: tcpprague@ietfa.amsl.com Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id D2DDB12DAF5; Mon, 18 Jul 2016 09:59:31 -0700 (PDT) X-Virus-Scanned: amavisd-new at amsl.com X-Spam-Flag: NO X-Spam-Score: -3.888 X-Spam-Level: X-Spam-Status: No, score=-3.888 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, HTML_MESSAGE=0.001, RCVD_IN_DNSWL_LOW=-0.7, RCVD_IN_MSPIKE_H2=-0.001, RP_MATCHES_RCVD=-1.287, SPF_PASS=-0.001] autolearn=ham autolearn_force=no Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id 59NgJrYsbaJh; Mon, 18 Jul 2016 09:59:29 -0700 (PDT) Received: from smtpb1.bt.com (smtpb1.bt.com [62.7.242.142]) (using TLSv1 with cipher AES128-SHA (128/128 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id 2F1AB12DB09; Mon, 18 Jul 2016 09:59:28 -0700 (PDT) Received: from EVMHT03-UKBR.domain1.systemhost.net (193.113.108.56) by EVMED06-UKBR.bt.com (10.216.161.38) with Microsoft SMTP Server (TLS) id 14.3.195.1; Mon, 18 Jul 2016 17:59:24 +0100 Received: from rew09926dag03c.domain1.systemhost.net (10.55.202.26) by EVMHT03-UKBR.domain1.systemhost.net (193.113.108.56) with Microsoft SMTP Server (TLS) id 8.3.342.0; Mon, 18 Jul 2016 17:59:26 +0100 Received: from rew09926dag03b.domain1.systemhost.net (10.55.202.22) by rew09926dag03c.domain1.systemhost.net (10.55.202.26) with Microsoft SMTP Server (TLS) id 15.0.1178.4; Mon, 18 Jul 2016 17:59:26 +0100 Received: from rew09926dag03b.domain1.systemhost.net ([fe80::d514:fe50:560c:401e]) by rew09926dag03b.domain1.systemhost.net ([fe80::d514:fe50:560c:401e%12]) with mapi id 15.00.1178.000; Mon, 18 Jul 2016 17:59:26 +0100 From: To: , Thread-Topic: Request for note takers and jabber scribe for L4S BoF Thread-Index: AdHhFNkt1/yn7sXhRj6n1ieTS3tC8g== Date: Mon, 18 Jul 2016 16:59:25 +0000 Message-ID: <4c49d7be2c244dffa5a94098793eb333@rew09926dag03b.domain1.systemhost.net> Accept-Language: en-GB, en-US Content-Language: en-US X-MS-Has-Attach: X-MS-TNEF-Correlator: x-ms-exchange-transport-fromentityheader: Hosted x-originating-ip: [10.216.161.29] Content-Type: multipart/alternative; boundary="_000_4c49d7be2c244dffa5a94098793eb333rew09926dag03bdomain1sy_" MIME-Version: 1.0 Archived-At: Cc: lars@netapp.com Subject: [tcpPrague] Request for note takers and jabber scribe for L4S BoF X-BeenThere: tcpprague@ietf.org X-Mailman-Version: 2.1.17 Precedence: list List-Id: "To coordinate implementation and standardisation of TCP Prague across platforms. TCP Prague will be an evolution of DCTCP designed to live alongside other TCP variants and derivatives." List-Unsubscribe: , List-Archive: List-Post: List-Help: List-Subscribe: , X-List-Received-Date: Mon, 18 Jul 2016 16:59:32 -0000 --_000_4c49d7be2c244dffa5a94098793eb333rew09926dag03bdomain1sy_ Content-Type: text/plain; charset="us-ascii" Content-Transfer-Encoding: quoted-printable We have the L4S BoF tomorrow 2pm-4pm. We need a couple of people to take notes and also someone to watch /scribe = in the jabber room. Please let us know if you can volunteer (it would be great to get volunteer= s in advance, so we don't use up meeting time) Thanks Phil & Lars (L4S BoF Chairs) --_000_4c49d7be2c244dffa5a94098793eb333rew09926dag03bdomain1sy_ Content-Type: text/html; charset="us-ascii" Content-Transfer-Encoding: quoted-printable

We have the L4S BoF tomorrow 2pm-4pm.

We need a couple of people to take notes and also so= meone to watch /scribe in the jabber room.

Please let us know if you can volunteer (it would be= great to get volunteers in advance, so we don’t use up meeting time)=

 

Thanks

Phil & Lars (L4S BoF Chairs)

 

--_000_4c49d7be2c244dffa5a94098793eb333rew09926dag03bdomain1sy_-- From nobody Tue Jul 19 10:22:36 2016 Return-Path: X-Original-To: tcpprague@ietfa.amsl.com Delivered-To: tcpprague@ietfa.amsl.com Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 9E8FC12D7F4 for ; Tue, 19 Jul 2016 10:22:32 -0700 (PDT) X-Virus-Scanned: amavisd-new at amsl.com X-Spam-Flag: NO X-Spam-Score: -1.9 X-Spam-Level: X-Spam-Status: No, score=-1.9 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, HTML_MESSAGE=0.001, RCVD_IN_DNSWL_NONE=-0.0001, SPF_PASS=-0.001] autolearn=ham autolearn_force=no Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id dzCQLlAHkcbY for ; Tue, 19 Jul 2016 10:22:26 -0700 (PDT) Received: from server.dnsblock1.com (server.dnsblock1.com [85.13.236.178]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id 1E4DF12D73F for ; Tue, 19 Jul 2016 10:22:25 -0700 (PDT) Received: from dhcp-b315.meeting.ietf.org ([31.133.179.21]:59445) by server.dnsblock1.com with esmtpsa (TLSv1.2:ECDHE-RSA-AES128-GCM-SHA256:128) (Exim 4.87) (envelope-from ) id 1bPYit-0004r1-2k; Tue, 19 Jul 2016 18:22:23 +0100 To: Colin Perkins From: Bob Briscoe Message-ID: <578E61CE.4090404@bobbriscoe.net> Date: Tue, 19 Jul 2016 18:22:22 +0100 User-Agent: Mozilla/5.0 (X11; Linux x86_64; rv:38.0) Gecko/20100101 Thunderbird/38.8.0 MIME-Version: 1.0 Content-Type: multipart/alternative; boundary="------------090806020309040502080404" X-AntiAbuse: This header was added to track abuse, please include it with any abuse report X-AntiAbuse: Primary Hostname - server.dnsblock1.com X-AntiAbuse: Original Domain - ietf.org X-AntiAbuse: Originator/Caller UID/GID - [47 12] / [47 12] X-AntiAbuse: Sender Address Domain - bobbriscoe.net X-Get-Message-Sender-Via: server.dnsblock1.com: authenticated_id: in@bobbriscoe.net X-Authenticated-Sender: server.dnsblock1.com: in@bobbriscoe.net Archived-At: Cc: TCP Prague List Subject: [tcpPrague] Impact of an L4S experiment on non-TCP transports using ECT(1) X-BeenThere: tcpprague@ietf.org X-Mailman-Version: 2.1.17 Precedence: list List-Id: "To coordinate implementation and standardisation of TCP Prague across platforms. TCP Prague will be an evolution of DCTCP designed to live alongside other TCP variants and derivatives." List-Unsubscribe: , List-Archive: List-Post: List-Help: List-Subscribe: , X-List-Received-Date: Tue, 19 Jul 2016 17:22:32 -0000 This is a multi-part message in MIME format. --------------090806020309040502080404 Content-Type: text/plain; charset=utf-8; format=flowed Content-Transfer-Encoding: 8bit Colin, For the writing about the proposed effect of L4S on RFC6679, see the L4S problem statement section 1.4, item 3B) https://tools.ietf.org/html/draft-briscoe-tsvwg-aqm-tcpm-rmcat-l4s-problem-02#section-1.4 It there are any other RFCs beyond the list there that use ECT(1) that we're not aware of, pls let me know. Can you explain the impact on circuit breaker? Prior to the problem statement, text about 6679 was written in the L4S identifier draft that I've presented in tsvwg, and mentioned the effect on other transports including RTP-ECN. We wrote what we thought the process would be in https://tools.ietf.org/html/draft-briscoe-tsvwg-ecn-l4s-id-01#section-1.3 However, the tsv management have now clarified how they want this done (I'm expecting discussion in tsvwg tomorrow now we've had the BoF). I can send you the draft text we're proposing to use to update 3168, 6679 etc, if you want (or you can wait until it's actually submitted as a draft, perhaps tonight. Essentially the idea is 2-stage: 1) a PS to obsolete RFC3540 (experimental) and to update RFC3168 RFC4960 RFC6679 RFC4340 to reserve ECT(1) for future experiments again 2) the L4S identifier draft (draft-briscoe-tsvwg-ecn-l4s-id) to use the newly reserved ECT(1) codepoint experimentally I appreciate that there might be implementations in progress that use ECT(1), but as 6679 did not say what ECT(1) is for, I doubt it. If an RTP implementation is using a field in the IP header for something that hasn't been standardised by the IETF and is not the current experimental use (the ECN nonce), then I think it has no right to complain if it gets stamped on by a new IETF-sanctioned experiment. You will recall I checked the intent of the ECT(1) text in 6679 on the avtcore list some time ago. See your response then, pasted below. Bob -------- Forwarded Message -------- Subject: Re: [AVTCORE] RFC6679 ECN in RTP: intent of ect = 0, 1, or random? Date: Mon, 9 Nov 2015 10:55:14 +0000 From: Colin Perkins To: Bob Briscoe CC: Ingemar Johansson S , Magnus Westerlund , Ken Carlberg Bob, This sounds interesting, and would be a good fit for the RMCAT working group, but doesn’t sound like it would be an update to the ECN-for-RTP RFC (which specifies ECN negotiation, marking, and feedback, but no congestion control algorithms). Colin > On 5 Nov 2015, at 10:04, Bob Briscoe wrote: > > Colin, > > OK. In the fullness of time, if our proposal continues to get traction, I'll draft a little experimental bis to ECN in RTP to specify scalable congestion control. It will be v simple: > > If using scalable cc: > * sender only uses scalable cc if (all) receiver(s) report ECN support > * sender rate equation is like TFRC equation, but with 1/p instead of 1/sqrt(p) > * fall back to TFRC equation on loss rather than ECN (and also possibly on ECN accompanied by high variable delay) for 'a few' 1RTT (TBD) > * sender sets ECT(1) not ECT(0) > * no changes on receiver > * I think it would work deployed one RTP hop at a time, but that would have to be tested > > But I'd want to implement and test it first, of course. > > > > Bob > > On 05/11/15 07:34, Colin Perkins wrote: >> Bob, >> >>> On 4 Nov 2015, at 17:50, Bob Briscoe wrote: >>> >>> Piers, >>> >>> I realised I didn't send the mail thanking you for your response. Thank you - v useful, and confirmation of my vague memory of events. >>> >>> 1. Would the authors (and wider community) be happy to allow ECT(1) not to be set-aside for future anti-cheating use, as long as there was another way, in principle, for the sender to check for cheating? >> I have no objection. You might check with the RMCAT chairs, since some of their proposals make use of ECN with RTP, but I doubt this will be a problem. >> >>> For TCP, we worked out a way for the sender to check for cheating without burning a codepoint - by the sender introducing one or two CE codepoints of its own, and checking the receiver reports them. Would this be harder for RTP? Are the receiver reports deterministic enough for the sender to determine whether codepoints it injected are correctly counted in the next report? >> The sender could easily set a CE mark on a small number of packets it’s sending. For unicast cases, where there’s an explicit control loop, it should be able to correlate this with the returned RTCP feedback. Where it might be difficult is with open loop layered multicast congestion control, where some receivers might see the CE mark and drop a layer since they don’t know it’s a synthetic mark. >> >> Colin >> >> >> >> >>> 2. A couple of days after I posted the original question, we posted the -00 individual draft aiming to start the process of repurposing ECT(1). You will see the sentence in the scope section >>> >>> See security considerations for discussion on feedback integrity checking. >>> >>> >>> Bob >>> >>> On 19/10/15 10:15, Piers O'Hanlon wrote: >>>> Hi Bob, >>>> >>>> I think the reasoning was that ECT(1)/random could potentially be used to detect cheating/failures as mentioned in section 7.4, but I can't see that it's going to make a lot of difference if ECT(1) is not used. >>>> >>>> Piers >>>> >>>> On 17 Oct 2015, at 22:59, Bob Briscoe wrote: >>>> >>>>> Guys, >>>>> [Ignore last identical email - I left the list off the distr in error] >>>>> >>>>> I'm writing a draft to propose a new use for ECT(1). >>>>> >>>>> In reading RFC6679, It says that the there is no intent to use an ECN nonce. >>>>> Also it says the receiver might want to advise the sender not to use ect=random, if its behind a header compression link. And that ect=0 is recommended and the default. >>>>> >>>>> But it doesn't seem to actually say why a sender might send ECT(1) instead of ECT(0). Or why a sender might use the two randomly. Or why a receiver might ask for ect=1, or ect=random. >>>>> >>>>> I'm trying to work out whether there would be any detriment to RFC6679 if it couldn't use ECT(1). It looks like not. >>>>> >>>>> >>>>> Bob >>>>> >>>>> -- >>>>> ________________________________________________________________ >>>>> Bob Briscoehttp://bobbriscoe.net/ >>> -- >>> ________________________________________________________________ >>> Bob Briscoehttp://bobbriscoe.net/ >>> >> >> > > -- > ________________________________________________________________ > Bob Briscoe http://bobbriscoe.net/ > > _______________________________________________ > Audio/Video Transport Core Maintenance > avt@ietf.org > https://www.ietf.org/mailman/listinfo/avt -- ________________________________________________________________ Bob Briscoe http://bobbriscoe.net/ --------------090806020309040502080404 Content-Type: text/html; charset=utf-8 Content-Transfer-Encoding: 8bit Colin,

For the writing about the proposed effect of L4S on RFC6679, see the L4S problem statement section 1.4, item 3B)
https://tools.ietf.org/html/draft-briscoe-tsvwg-aqm-tcpm-rmcat-l4s-problem-02#section-1.4

It there are any other RFCs beyond the list there that use ECT(1) that we're not aware of, pls let me know.
Can you explain the impact on circuit breaker?

Prior to the problem statement, text about 6679 was written in the L4S identifier draft that I've presented in tsvwg, and mentioned the effect on other transports including RTP-ECN.
We wrote what we thought the process would be in https://tools.ietf.org/html/draft-briscoe-tsvwg-ecn-l4s-id-01#section-1.3
However, the tsv management have now clarified how they want this done (I'm expecting discussion in tsvwg tomorrow now we've had the BoF).


I can send you the draft text we're proposing to use to update 3168, 6679 etc, if you want (or you can wait until it's actually submitted as a draft, perhaps tonight.
Essentially the idea is 2-stage:
1) a PS to obsolete RFC3540 (experimental) and to update RFC3168 RFC4960 RFC6679 RFC4340 to reserve ECT(1) for future experiments again
2) the L4S identifier draft (draft-briscoe-tsvwg-ecn-l4s-id) to use the newly reserved ECT(1) codepoint experimentally

I appreciate that there might be implementations in progress that use ECT(1), but as 6679 did not say what ECT(1) is for, I doubt it.
If an RTP implementation is using a field in the IP header for something that hasn't been standardised by the IETF and is not the current experimental use (the ECN nonce), then I think it has no right to complain if it gets stamped on by a new IETF-sanctioned experiment.

You will recall I checked the intent of the ECT(1) text in 6679 on the avtcore list some time ago.
See your response then, pasted below.


Bob


-------- Forwarded Message --------
Subject: Re: [AVTCORE] RFC6679 ECN in RTP: intent of ect = 0, 1, or random?
Date: Mon, 9 Nov 2015 10:55:14 +0000
From: Colin Perkins <csp@csperkins.org>
To: Bob Briscoe <ietf@bobbriscoe.net>
CC: Ingemar Johansson S <ingemar.s.johansson@ericsson.com>, Magnus Westerlund <magnus.westerlund@ericsson.com>, Ken Carlberg <carlberg@g11.org.uk>


Bob,

This sounds interesting, and would be a good fit for the RMCAT working group, but doesn’t sound like it would be an update to the ECN-for-RTP RFC (which specifies ECN negotiation, marking, and feedback, but no congestion control algorithms).

Colin




> On 5 Nov 2015, at 10:04, Bob Briscoe <ietf@bobbriscoe.net> wrote:
> 
> Colin,
> 
> OK. In the fullness of time, if our proposal continues to get traction, I'll draft a little experimental bis to ECN in RTP to specify scalable congestion control. It will be v simple:
> 
> If using scalable cc:
> * sender only uses scalable cc if (all) receiver(s) report ECN support
> * sender rate equation is like TFRC equation, but with 1/p instead of 1/sqrt(p)
> * fall back to TFRC equation on loss rather than ECN (and also possibly on ECN accompanied by high variable delay) for 'a few' 1RTT (TBD)
> * sender sets ECT(1) not ECT(0)
> * no changes on receiver
> * I think it would work deployed one RTP hop at a time, but that would have to be tested
> 
> But I'd want to implement and test it first, of course.
> 
> 
> 
> Bob
> 
> On 05/11/15 07:34, Colin Perkins wrote:
>> Bob,
>> 
>>> On 4 Nov 2015, at 17:50, Bob Briscoe <ietf@bobbriscoe.net> wrote:
>>> 
>>> Piers,
>>> 
>>> I realised I didn't send the mail thanking you for your response. Thank you - v useful, and confirmation of my vague memory of events.
>>> 
>>> 1. Would the authors (and wider community) be happy to allow ECT(1) not to be set-aside for future anti-cheating use, as long as there was another way, in principle, for the sender to check for cheating?
>> I have no objection. You might check with the RMCAT chairs, since some of their proposals make use of ECN with RTP, but I doubt this will be a problem.
>> 
>>> For TCP, we worked out a way for the sender to check for cheating without burning a codepoint - by the sender introducing one or two CE codepoints of its own, and checking the receiver reports them. Would this be harder for RTP? Are the receiver reports deterministic enough for the sender to determine whether codepoints it injected are correctly counted in the next report?
>> The sender could easily set a CE mark on a small number of packets it’s sending. For unicast cases, where there’s an explicit control loop, it should be able to correlate this with the returned RTCP feedback. Where it might be difficult is with open loop layered multicast congestion control, where some receivers might see the CE mark and drop a layer since they don’t know it’s a synthetic mark.
>> 
>> Colin
>> 
>> 
>> 
>> 
>>> 2. A couple of days after I posted the original question, we posted the -00 individual draft aiming to start the process of repurposing ECT(1). You will see the sentence in the scope section <https://tools.ietf.org/html/draft-briscoe-tsvwg-ecn-l4s-id-00#section-1.3>
>>> 
>>> See security considerations for discussion on feedback integrity checking.
>>> 
>>> 
>>> Bob
>>> 
>>> On 19/10/15 10:15, Piers O'Hanlon wrote:
>>>> Hi Bob,
>>>> 
>>>> I think the reasoning was that ECT(1)/random could potentially be used to detect cheating/failures as mentioned in section 7.4, but I can't see that it's going to make a lot of difference if ECT(1) is not used.
>>>> 
>>>> Piers
>>>> 
>>>> On 17 Oct 2015, at 22:59, Bob Briscoe wrote:
>>>> 
>>>>> Guys,
>>>>> [Ignore last identical email - I left the list off the distr in error]
>>>>> 
>>>>> I'm writing a draft to propose a new use for ECT(1).
>>>>> 
>>>>> In reading RFC6679, It says that the there is no intent to use an ECN nonce.
>>>>> Also it says the receiver might want to advise the sender not to use ect=random, if its behind a header compression link. And that ect=0 is recommended and the default.
>>>>> 
>>>>> But it doesn't seem to actually say why a sender might send ECT(1) instead of ECT(0). Or why a sender might use the two randomly. Or why a receiver might ask for ect=1, or ect=random.
>>>>> 
>>>>> I'm trying to work out whether there would be any detriment to RFC6679 if it couldn't use ECT(1). It looks like not.
>>>>> 
>>>>> 
>>>>> Bob
>>>>> 
>>>>> -- 
>>>>> ________________________________________________________________
>>>>> Bob Briscoehttp://bobbriscoe.net/
>>> -- 
>>> ________________________________________________________________
>>> Bob Briscoehttp://bobbriscoe.net/
>>> 
>> 
>> 
> 
> -- 
> ________________________________________________________________
> Bob Briscoe                               http://bobbriscoe.net/
> 
> _______________________________________________
> Audio/Video Transport Core Maintenance
> avt@ietf.org
> https://www.ietf.org/mailman/listinfo/avt


-- 
________________________________________________________________
Bob Briscoe                               http://bobbriscoe.net/
--------------090806020309040502080404-- From nobody Wed Jul 20 01:34:37 2016 Return-Path: X-Original-To: tcpprague@ietfa.amsl.com Delivered-To: tcpprague@ietfa.amsl.com Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id BD10A12D9C1 for ; Wed, 20 Jul 2016 01:34:35 -0700 (PDT) X-Virus-Scanned: amavisd-new at amsl.com X-Spam-Flag: NO X-Spam-Score: -4.199 X-Spam-Level: X-Spam-Status: No, score=-4.199 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, HTML_MESSAGE=0.001, RCVD_IN_DNSWL_MED=-2.3] autolearn=ham autolearn_force=no Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id yKBfa0LbYZe4 for ; Wed, 20 Jul 2016 01:34:32 -0700 (PDT) Received: from haggis.mythic-beasts.com (haggis.mythic-beasts.com [IPv6:2a00:1098:0:86:1000:0:2:1]) (using TLSv1.2 with cipher DHE-RSA-AES128-SHA (128/128 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id 98A9112D0B8 for ; Wed, 20 Jul 2016 01:34:32 -0700 (PDT) Received: from [2001:67c:370:152:a0bb:2468:bce:8f02] (port=52159) by haggis.mythic-beasts.com with esmtpsa (TLS1.0:DHE_RSA_AES_256_CBC_SHA1:256) (Exim 4.80) (envelope-from ) id 1bPmxZ-0004Mu-5R; Wed, 20 Jul 2016 09:34:30 +0100 Content-Type: multipart/alternative; boundary="Apple-Mail=_B94719FF-E2D1-4084-8B9D-AE559E20AC30" Mime-Version: 1.0 (Mac OS X Mail 9.3 \(3124\)) From: Colin Perkins In-Reply-To: <578E61CE.4090404@bobbriscoe.net> Date: Wed, 20 Jul 2016 10:34:17 +0200 Message-Id: <959F4E4E-1C8D-431B-9A11-80D3D69E7F92@csperkins.org> References: <578E61CE.4090404@bobbriscoe.net> To: Bob Briscoe X-Mailer: Apple Mail (2.3124) X-BlackCat-Spam-Score: -28 X-Mythic-Debug: Threshold = On = Archived-At: Cc: TCP Prague List Subject: Re: [tcpPrague] Impact of an L4S experiment on non-TCP transports using ECT(1) X-BeenThere: tcpprague@ietf.org X-Mailman-Version: 2.1.17 Precedence: list List-Id: "To coordinate implementation and standardisation of TCP Prague across platforms. TCP Prague will be an evolution of DCTCP designed to live alongside other TCP variants and derivatives." List-Unsubscribe: , List-Archive: List-Post: List-Help: List-Subscribe: , X-List-Received-Date: Wed, 20 Jul 2016 08:34:36 -0000 --Apple-Mail=_B94719FF-E2D1-4084-8B9D-AE559E20AC30 Content-Transfer-Encoding: quoted-printable Content-Type: text/plain; charset=utf-8 Bob, > On 19 Jul 2016, at 19:22, Bob Briscoe wrote: >=20 > Colin, >=20 > For the writing about the proposed effect of L4S on RFC6679, see the = L4S problem statement section 1.4, item 3B) > = https://tools.ietf.org/html/draft-briscoe-tsvwg-aqm-tcpm-rmcat-l4s-problem= -02#section-1.4 = >=20 > It there are any other RFCs beyond the list there that use ECT(1) that = we're not aware of, pls let me know. > Can you explain the impact on circuit breaker? The ongoing experiments with AQM and ECN, of which L4S is a part, have = made it very unclear how a transport should respond to ECN-CE marks, for = either ECT(0) or ECT(1). The circuit breaker got caught in that = discussion.=20 Colin > Prior to the problem statement, text about 6679 was written in the L4S = identifier draft that I've presented in tsvwg, and mentioned the effect = on other transports including RTP-ECN. > We wrote what we thought the process would be in = https://tools.ietf.org/html/draft-briscoe-tsvwg-ecn-l4s-id-01#section-1.3 = > However, the tsv management have now clarified how they want this done = (I'm expecting discussion in tsvwg tomorrow now we've had the BoF). >=20 >=20 > I can send you the draft text we're proposing to use to update 3168, = 6679 etc, if you want (or you can wait until it's actually submitted as = a draft, perhaps tonight. > Essentially the idea is 2-stage: > 1) a PS to obsolete RFC3540 (experimental) and to update RFC3168 = RFC4960 RFC6679 RFC4340 to reserve ECT(1) for future experiments again > 2) the L4S identifier draft (draft-briscoe-tsvwg-ecn-l4s-id) to use = the newly reserved ECT(1) codepoint experimentally >=20 > I appreciate that there might be implementations in progress that use = ECT(1), but as 6679 did not say what ECT(1) is for, I doubt it. > If an RTP implementation is using a field in the IP header for = something that hasn't been standardised by the IETF and is not the = current experimental use (the ECN nonce), then I think it has no right = to complain if it gets stamped on by a new IETF-sanctioned experiment. >=20 > You will recall I checked the intent of the ECT(1) text in 6679 on the = avtcore list some time ago. > See your response then, pasted below. >=20 >=20 > Bob >=20 >=20 > -------- Forwarded Message -------- > Subject: Re: [AVTCORE] RFC6679 ECN in RTP: intent of ect =3D 0, = 1, or random? > Date: Mon, 9 Nov 2015 10:55:14 +0000 > From: Colin Perkins > To: Bob Briscoe > CC: Ingemar Johansson S = , Magnus Westerlund = = , Ken = Carlberg >=20 > Bob, >=20 > This sounds interesting, and would be a good fit for the RMCAT working = group, but doesn=E2=80=99t sound like it would be an update to the = ECN-for-RTP RFC (which specifies ECN negotiation, marking, and feedback, = but no congestion control algorithms). >=20 > Colin >=20 >=20 >=20 >=20 > > On 5 Nov 2015, at 10:04, Bob Briscoe = wrote: > >=20 > > Colin, > >=20 > > OK. In the fullness of time, if our proposal continues to get = traction, I'll draft a little experimental bis to ECN in RTP to specify = scalable congestion control. It will be v simple: > >=20 > > If using scalable cc: > > * sender only uses scalable cc if (all) receiver(s) report ECN = support > > * sender rate equation is like TFRC equation, but with 1/p instead = of 1/sqrt(p) > > * fall back to TFRC equation on loss rather than ECN (and also = possibly on ECN accompanied by high variable delay) for 'a few' 1RTT = (TBD) > > * sender sets ECT(1) not ECT(0) > > * no changes on receiver > > * I think it would work deployed one RTP hop at a time, but that = would have to be tested > >=20 > > But I'd want to implement and test it first, of course. > >=20 > >=20 > >=20 > > Bob > >=20 > > On 05/11/15 07:34, Colin Perkins wrote: > >> Bob, > >>=20 > >>> On 4 Nov 2015, at 17:50, Bob Briscoe = wrote: > >>>=20 > >>> Piers, > >>>=20 > >>> I realised I didn't send the mail thanking you for your response. = Thank you - v useful, and confirmation of my vague memory of events. > >>>=20 > >>> 1. Would the authors (and wider community) be happy to allow = ECT(1) not to be set-aside for future anti-cheating use, as long as = there was another way, in principle, for the sender to check for = cheating? > >> I have no objection. You might check with the RMCAT chairs, since = some of their proposals make use of ECN with RTP, but I doubt this will = be a problem. > >>=20 > >>> For TCP, we worked out a way for the sender to check for cheating = without burning a codepoint - by the sender introducing one or two CE = codepoints of its own, and checking the receiver reports them. Would = this be harder for RTP? Are the receiver reports deterministic enough = for the sender to determine whether codepoints it injected are correctly = counted in the next report? > >> The sender could easily set a CE mark on a small number of packets = it=E2=80=99s sending. For unicast cases, where there=E2=80=99s an = explicit control loop, it should be able to correlate this with the = returned RTCP feedback. Where it might be difficult is with open loop = layered multicast congestion control, where some receivers might see the = CE mark and drop a layer since they don=E2=80=99t know it=E2=80=99s a = synthetic mark. > >>=20 > >> Colin > >>=20 > >>=20 > >>=20 > >>=20 > >>> 2. A couple of days after I posted the original question, we = posted the -00 individual draft aiming to start the process of = repurposing ECT(1). You will see the sentence in the scope section = = > >>>=20 > >>> See security considerations for discussion on feedback integrity = checking. > >>>=20 > >>>=20 > >>> Bob > >>>=20 > >>> On 19/10/15 10:15, Piers O'Hanlon wrote: > >>>> Hi Bob, > >>>>=20 > >>>> I think the reasoning was that ECT(1)/random could potentially be = used to detect cheating/failures as mentioned in section 7.4, but I = can't see that it's going to make a lot of difference if ECT(1) is not = used. > >>>>=20 > >>>> Piers > >>>>=20 > >>>> On 17 Oct 2015, at 22:59, Bob Briscoe wrote: > >>>>=20 > >>>>> Guys, > >>>>> [Ignore last identical email - I left the list off the distr in = error] > >>>>>=20 > >>>>> I'm writing a draft to propose a new use for ECT(1). > >>>>>=20 > >>>>> In reading RFC6679, It says that the there is no intent to use = an ECN nonce. > >>>>> Also it says the receiver might want to advise the sender not to = use ect=3Drandom, if its behind a header compression link. And that = ect=3D0 is recommended and the default. > >>>>>=20 > >>>>> But it doesn't seem to actually say why a sender might send = ECT(1) instead of ECT(0). Or why a sender might use the two randomly. Or = why a receiver might ask for ect=3D1, or ect=3Drandom. > >>>>>=20 > >>>>> I'm trying to work out whether there would be any detriment to = RFC6679 if it couldn't use ECT(1). It looks like not. > >>>>>=20 > >>>>>=20 > >>>>> Bob > >>>>>=20 > >>>>> --=20 > >>>>> ________________________________________________________________ > >>>>> Bob Briscoehttp://bobbriscoe.net/ > >>> --=20 > >>> ________________________________________________________________ > >>> Bob Briscoehttp://bobbriscoe.net/ > >>>=20 > >>=20 > >>=20 > >=20 > > --=20 > > ________________________________________________________________ > > Bob Briscoe http://bobbriscoe.net/ = > >=20 > > _______________________________________________ > > Audio/Video Transport Core Maintenance > > avt@ietf.org > > https://www.ietf.org/mailman/listinfo/avt = >=20 >=20 > --=20 > ________________________________________________________________ > Bob Briscoe http://bobbriscoe.net/ = --=20 Colin Perkins https://csperkins.org/ --Apple-Mail=_B94719FF-E2D1-4084-8B9D-AE559E20AC30 Content-Transfer-Encoding: quoted-printable Content-Type: text/html; charset=utf-8 Bob,

On 19 Jul 2016, at 19:22, Bob = Briscoe <ietf@bobbriscoe.net> wrote:

=20 =20
Colin,

For the writing about the proposed effect of L4S on RFC6679, see the L4S problem statement section 1.4, item 3B)
https://tools.ietf.org/html/draft-briscoe-tsvwg-a= qm-tcpm-rmcat-l4s-problem-02#section-1.4

It there are any other RFCs beyond the list there that use ECT(1) that we're not aware of, pls let me know.
Can you explain the impact on circuit breaker?

The = ongoing experiments with AQM and ECN, of which L4S is a part, have made = it very unclear how a transport should respond to ECN-CE marks, for = either ECT(0) or ECT(1). The circuit breaker got caught in that = discussion. 

Colin




Prior to the problem statement, text about 6679 was written in the L4S identifier draft that I've presented in tsvwg, and mentioned the effect on other transports including RTP-ECN.
We wrote what we thought the process would be in https://tools.ietf.org/html/draft-briscoe-tsvwg-ecn-l4s-id-01#sec= tion-1.3
However, the tsv management have now clarified how they want this done (I'm expecting discussion in tsvwg tomorrow now we've had the BoF).


I can send you the draft text we're proposing to use to update 3168, 6679 etc, if you want (or you can wait until it's actually submitted as a draft, perhaps tonight.
Essentially the idea is 2-stage:
1) a PS to obsolete RFC3540 (experimental) and to update RFC3168 RFC4960 RFC6679 RFC4340 to reserve ECT(1) for future experiments again
2) the L4S identifier draft (draft-briscoe-tsvwg-ecn-l4s-id) to use the newly reserved ECT(1) codepoint experimentally

I appreciate that there might be implementations in progress that use ECT(1), but as 6679 did not say what ECT(1) is for, I doubt = it.
If an RTP implementation is using a field in the IP header for something that hasn't been standardised by the IETF and is not the current experimental use (the ECN nonce), then I think it has no right to complain if it gets stamped on by a new IETF-sanctioned experiment.

You will recall I checked the intent of the ECT(1) text in 6679 on the avtcore list some time ago.
See your response then, pasted below.


Bob


-------- Forwarded Message --------
Subject: Re: [AVTCORE] RFC6679 ECN in RTP: intent of ect = =3D 0, 1, or random?
Date: Mon, 9 Nov 2015 10:55:14 +0000
From: Colin Perkins <csp@csperkins.org>
To: Bob Briscoe <ietf@bobbriscoe.net>
CC: Ingemar Johansson S <ingemar.s.johansson@e= ricsson.com>, Magnus Westerlund <magnus.westerlund@erics= son.com>, Ken Carlberg <carlberg@g11.org.uk>


Bob,

This sounds interesting, and would be a good fit for the RMCAT working =
group, but doesn=E2=80=99t sound like it would be an update to the =
ECN-for-RTP RFC (which specifies ECN negotiation, marking, and feedback, =
but no congestion control algorithms).

Colin




> On 5 Nov 2015, at 10:04, Bob Briscoe <ietf@bobbriscoe.net> =
wrote:
>=20
> Colin,
>=20
> OK. In the fullness of time, if our proposal continues to get =
traction, I'll draft a little experimental bis to ECN in RTP to specify =
scalable congestion control. It will be v simple:
>=20
> If using scalable cc:
> * sender only uses scalable cc if (all) receiver(s) report ECN =
support
> * sender rate equation is like TFRC equation, but with 1/p instead =
of 1/sqrt(p)
> * fall back to TFRC equation on loss rather than ECN (and also =
possibly on ECN accompanied by high variable delay) for 'a few' 1RTT =
(TBD)
> * sender sets ECT(1) not ECT(0)
> * no changes on receiver
> * I think it would work deployed one RTP hop at a time, but that =
would have to be tested
>=20
> But I'd want to implement and test it first, of course.
>=20
>=20
>=20
> Bob
>=20
> On 05/11/15 07:34, Colin Perkins wrote:
>> Bob,
>>=20
>>> On 4 Nov 2015, at 17:50, Bob Briscoe <ietf@bobbriscoe.net> =
wrote:
>>>=20
>>> Piers,
>>>=20
>>> I realised I didn't send the mail thanking you for your =
response. Thank you - v useful, and confirmation of my vague memory of =
events.
>>>=20
>>> 1. Would the authors (and wider community) be happy to =
allow ECT(1) not to be set-aside for future anti-cheating use, as long =
as there was another way, in principle, for the sender to check for =
cheating?
>> I have no objection. You might check with the RMCAT chairs, =
since some of their proposals make use of ECN with RTP, but I doubt this =
will be a problem.
>>=20
>>> For TCP, we worked out a way for the sender to check for =
cheating without burning a codepoint - by the sender introducing one or =
two CE codepoints of its own, and checking the receiver reports them. =
Would this be harder for RTP? Are the receiver reports deterministic =
enough for the sender to determine whether codepoints it injected are =
correctly counted in the next report?
>> The sender could easily set a CE mark on a small number of =
packets it=E2=80=99s sending. For unicast cases, where there=E2=80=99s =
an explicit control loop, it should be able to correlate this with the =
returned RTCP feedback. Where it might be difficult is with open loop =
layered multicast congestion control, where some receivers might see the =
CE mark and drop a layer since they don=E2=80=99t know it=E2=80=99s a =
synthetic mark.
>>=20
>> Colin
>>=20
>>=20
>>=20
>>=20
>>> 2. A couple of days after I posted the original question, =
we posted the -00 individual draft aiming to start the process of =
repurposing ECT(1). You will see the sentence in the scope section <https://tools.ietf.org/html/draft-briscoe-tsvwg-ecn-l4s-id-00=
#section-1.3>
>>>=20
>>> See security considerations for discussion on feedback =
integrity checking.
>>>=20
>>>=20
>>> Bob
>>>=20
>>> On 19/10/15 10:15, Piers O'Hanlon wrote:
>>>> Hi Bob,
>>>>=20
>>>> I think the reasoning was that ECT(1)/random could =
potentially be used to detect cheating/failures as mentioned in section =
7.4, but I can't see that it's going to make a lot of difference if =
ECT(1) is not used.
>>>>=20
>>>> Piers
>>>>=20
>>>> On 17 Oct 2015, at 22:59, Bob Briscoe wrote:
>>>>=20
>>>>> Guys,
>>>>> [Ignore last identical email - I left the list off =
the distr in error]
>>>>>=20
>>>>> I'm writing a draft to propose a new use for =
ECT(1).
>>>>>=20
>>>>> In reading RFC6679, It says that the there is no =
intent to use an ECN nonce.
>>>>> Also it says the receiver might want to advise the =
sender not to use ect=3Drandom, if its behind a header compression link. =
And that ect=3D0 is recommended and the default.
>>>>>=20
>>>>> But it doesn't seem to actually say why a sender =
might send ECT(1) instead of ECT(0). Or why a sender might use the two =
randomly. Or why a receiver might ask for ect=3D1, or ect=3Drandom.
>>>>>=20
>>>>> I'm trying to work out whether there would be any =
detriment to RFC6679 if it couldn't use ECT(1). It looks like not.
>>>>>=20
>>>>>=20
>>>>> Bob
>>>>>=20
>>>>> --=20
>>>>> =
________________________________________________________________
>>>>> Bob Briscoehttp://bobbriscoe.net/
>>> --=20
>>> =
________________________________________________________________
>>> Bob Briscoehttp://bobbriscoe.net/
>>>=20
>>=20
>>=20
>=20
> --=20
> ________________________________________________________________
> Bob Briscoe                               http://bobbriscoe.net/
>=20
> _______________________________________________
> Audio/Video Transport Core Maintenance
> avt@ietf.org
> https://www.ietf.org/ma=
ilman/listinfo/avt


--=20
________________________________________________________________
Bob Briscoe                               http://bobbriscoe.net/



-- 
Colin Perkins



= --Apple-Mail=_B94719FF-E2D1-4084-8B9D-AE559E20AC30-- From nobody Wed Jul 20 13:51:31 2016 Return-Path: X-Original-To: tcpprague@ietfa.amsl.com Delivered-To: tcpprague@ietfa.amsl.com Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id BAE4112D66F for ; Wed, 20 Jul 2016 13:51:29 -0700 (PDT) X-Virus-Scanned: amavisd-new at amsl.com X-Spam-Flag: NO X-Spam-Score: -4.22 X-Spam-Level: X-Spam-Status: No, score=-4.22 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, DKIM_SIGNED=0.1, DKIM_VALID=-0.1, HTML_MESSAGE=0.001, RCVD_IN_DNSWL_MED=-2.3, RCVD_IN_MSPIKE_H3=-0.01, RCVD_IN_MSPIKE_WL=-0.01, SPF_PASS=-0.001] autolearn=ham autolearn_force=no Authentication-Results: ietfa.amsl.com (amavisd-new); dkim=pass (1024-bit key) header.d=ericsson.onmicrosoft.com Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id 4Sv0QqpHxb1Y for ; Wed, 20 Jul 2016 13:51:26 -0700 (PDT) Received: from sesbmg23.ericsson.net (sesbmg23.ericsson.net [193.180.251.37]) (using TLSv1 with cipher DHE-RSA-AES256-SHA (256/256 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id 5AC5712D98A for ; Wed, 20 Jul 2016 13:51:25 -0700 (PDT) X-AuditID: c1b4fb25-f79f26d00000327e-cc-578fe44b9de5 Received: from ESESSHC004.ericsson.se (Unknown_Domain [153.88.183.30]) by sesbmg23.ericsson.net (Symantec Mail Security) with SMTP id 1D.62.12926.B44EF875; Wed, 20 Jul 2016 22:51:23 +0200 (CEST) Received: from EUR03-DB5-obe.outbound.protection.outlook.com (153.88.183.145) by oa.msg.ericsson.com (153.88.183.30) with Microsoft SMTP Server (TLS) id 14.3.294.0; Wed, 20 Jul 2016 22:51:23 +0200 DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=ericsson.onmicrosoft.com; s=selector1-ericsson-com; h=From:Date:Subject:Message-ID:Content-Type:MIME-Version; bh=Y5sL4OD8RCySAG2h9vUswLO2tL+vYH2BZUrtyX36GGE=; b=li0e98ADc2O9iONMkGoeNSm6k+501G3CjvjeiP/YA7VrewS0j7Jt1gPrnKn++tn40v1T+O2XC5rVeG0bwfTmaLh9r/sbr+BzIyBTQ8HCsZSsrK6Vd5QRTQm/jIK8SfkWCEBZ9M9ut5oavWyd28v0GMer+3zsOQjlik8512HxU7E= Received: from DB4PR07MB348.eurprd07.prod.outlook.com (10.141.234.148) by DB4PR07MB348.eurprd07.prod.outlook.com (10.141.234.148) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA384_P384) id 15.1.544.10; Wed, 20 Jul 2016 20:51:20 +0000 Received: from DB4PR07MB348.eurprd07.prod.outlook.com ([10.141.234.148]) by DB4PR07MB348.eurprd07.prod.outlook.com ([10.141.234.148]) with mapi id 15.01.0544.014; Wed, 20 Jul 2016 20:51:20 +0000 From: Ingemar Johansson S To: "csp@csperkins.org" , "ietf@bobbriscoe.net" Thread-Topic: [tcpPrague] Impact of an L4S experiment on non-TCP transports using ECT(1) Thread-Index: AQHR4rkm2jbcykViakufN1v67Etb56AhyrmA Date: Wed, 20 Jul 2016 20:51:20 +0000 Message-ID: References: <578E61CE.4090404@bobbriscoe.net> <959F4E4E-1C8D-431B-9A11-80D3D69E7F92@csperkins.org> In-Reply-To: <959F4E4E-1C8D-431B-9A11-80D3D69E7F92@csperkins.org> Accept-Language: en-US Content-Language: en-US X-MS-Has-Attach: yes X-MS-TNEF-Correlator: authentication-results: spf=none (sender IP is ) smtp.mailfrom=ingemar.s.johansson@ericsson.com; x-originating-ip: [46.189.28.225] x-ms-office365-filtering-correlation-id: 7cef396f-47c9-40e8-1fb4-08d3b0df9a63 x-microsoft-exchange-diagnostics: 1; DB4PR07MB348; 6:/Lxi0Jtb+B0j+Bj8KFd1vxMYkGCQAoIJT885D5cOIaV5LemgDOCTKBwO53ka8nxMoa/rUGFZTvXnkycq8Nliap3OtqwQtcimR2h22fLW/SMzZTdQ/NJQGXzorfITp40Og5IFGRvEzt0lRC+6xrAtrx7on/9UyZD+6xzH/IOpCB+kOblayD7LY3uT2qAjbUMY7ph39lsOXpSZcd3tDe2avxDiPSr721481LOQ4ZWuQg5lkh7hdJS/3qeSD2UHwP4Wkzt7v31MIZkbe2aiXpUPYFDRM7LoJ7s+6UbiL5gHufQ=; 5:n3AUcePGTQJubXxoDiQ2+da5VbaFU31aN3hR2sbRgFO2dvsHwz4H9LLSRg7TNpjOsrINtA814f5OwqZpia4LODaaGHiEkvI7M14R+jPfscM3GysZWqZaAxuotNwXgn/lEx5pyhuBL3bVBZH97UHvaQ==; 24:+9GgjM8xvpqgKhKmZ0xva93b+CnB+m8p/Bshm5HDybSFL99IDEOmbmyj9wgJ+LaVLXlPXt0iEePE6SlmAYFNwkPl8+pDTNnGoMv0I8f9R4E=; 7:H4vsqnB8DmCpHFM0FZ+zSzoJAaDToiAbGw/wszl+WJUMsDxPbHc+xV+Qmg+mpLKb33E/vDJcX+IdDbZ8ScTtiPDVP9aCv35xvIQ07xOcBsBApplYKlAmFQZU32uFFXb+4jyt1Jv4milQ5ue3qhCRcmL9WKjW9bqggzPq4xHvIOeTipOLoo4gJxP290IuuIXjKmQyxqfuHhZbOpU6QAkz/v/9aCnsXs/tnRVux4IGT6WHfU9vBiDh1dIQJKgL/PkU x-microsoft-antispam: UriScan:;BCL:0;PCL:0;RULEID:;SRVR:DB4PR07MB348; x-microsoft-antispam-prvs: x-exchange-antispam-report-test: UriScan:(37575265505322)(20558992708506)(192374486261705)(21748063052155); x-exchange-antispam-report-cfa-test: BCL:0; PCL:0; RULEID:(102415321)(601004)(2401047)(5005006)(8121501046)(10201501046)(3002001); SRVR:DB4PR07MB348; BCL:0; PCL:0; RULEID:; SRVR:DB4PR07MB348; x-forefront-prvs: 000947967F x-forefront-antispam-report: SFV:NSPM; SFS:(10009020)(7916002)(85664002)(199003)(189002)(24454002)(69234005)(105586002)(99936001)(8936002)(77096005)(3280700002)(107886002)(122556002)(2906002)(561944003)(2501003)(15975445007)(54356999)(19300405004)(76176999)(19580395003)(19580405001)(50986999)(66066001)(81166006)(4001430100002)(33656002)(86362001)(3660700001)(7736002)(7696003)(586003)(4326007)(9326002)(81156014)(6116002)(102836003)(19625215002)(3846002)(790700001)(2950100001)(2900100001)(5002640100001)(7906003)(5003600100003)(7846002)(106116001)(92566002)(76576001)(16236675004)(106356001)(97736004)(101416001)(5001770100001)(74316002)(189998001)(68736007)(11100500001)(15395725005)(9686002)(10400500002)(19617315012)(87936001); DIR:OUT; SFP:1101; SCL:1; SRVR:DB4PR07MB348; H:DB4PR07MB348.eurprd07.prod.outlook.com; FPR:; SPF:None; PTR:InfoNoRecords; A:1; MX:1; LANG:en; received-spf: None (protection.outlook.com: ericsson.com does not designate permitted sender hosts) spamdiagnosticoutput: 1:99 spamdiagnosticmetadata: NSPM Content-Type: multipart/signed; protocol="application/x-pkcs7-signature"; micalg=SHA1; boundary="----=_NextPart_000_013B_01D1E2D9.39A17C00" MIME-Version: 1.0 X-MS-Exchange-CrossTenant-originalarrivaltime: 20 Jul 2016 20:51:20.1032 (UTC) X-MS-Exchange-CrossTenant-fromentityheader: Hosted X-MS-Exchange-CrossTenant-id: 92e84ceb-fbfd-47ab-be52-080c6b87953f X-MS-Exchange-Transport-CrossTenantHeadersStamped: DB4PR07MB348 X-OriginatorOrg: ericsson.com X-Brightmail-Tracker: H4sIAAAAAAAAA1WSfUhTYRTGeXfvrtt0cF2ah2mhQ0M0rTTDSEQD0Qg/iMBUIpfedEyn7Jpl CZmmpcPUSs0FZmhJuki0dIoaDl2aEWpBaOhyTWh+hQ01kz7udifUf7/znOc95znw8jDRKlfM kynyKKVCmiUhBHjDmZ69ASdNVYkHb2/4hraaR1HoyHwTN7S2aAiPwGIWDRPcmDqDgYhpadni JGDJgrB0KkuWTykPhKcKMs31Gk6upZVzubR8lShCxjJOBeLzgDwMk721GMu7YWLuOVGBBDwR OYxAt1WGs8UoguaGVdsLnKzEYLEcYxt1HHjQ+MFe6BH0qadsswgyDJ7qNpGVXchk+LjRbtMx MgNKjGOElXeRSdBimHfY8dwsG2T8PIaD4G2XP7vMBzZKBm12IWN5N/3LFkJEpoN5ZJ1rtfPJ SNgscbTKiLlg842Gw25ygxnTQ/uVLjA/OU6w7ArmL7+5rD8Nvk9XclndC6pWum0JgIyF3g2Z 9SogVwjQDty1e6LAsrKMWJaBvtxi1+VgMfXhLGsRaD4dZ9kDepa7CXaQgYCSpZcYm5+C1mel qBr5qf/JqmZ8GFmJ4EZ3NVLbbnaGsQYTzppSQGsqdmDZHxamF/AdfvJoCVMzwTHSD5rVJ/6X rXwM7v8cIlj2gnuqefuYEFgaWUNNyLENudIUfT47Iyg4kFLK0mg6RxGooPI6EfPzhl5s+2jR ++VIHSJ5SOIk9OyvShRxpfl0QbYOeTNzjB3tE0iMK3IUlMRFGPeZaQvTpQVXKGXOOeXFLIrW IXceLnETxpu9EkVkhjSPklNULqXc6XJ4fHERUnl2uq+dXR0W7Y9IbatZLx6bm5RzzPIjvj+8 v54KjvszOz6lmn1NhMdrllRpA8Ks+kH3oJSKO69Oq6e6auIK90T5h4anhvCbLN9i+x2u3kos dNVzH9ddMqKZa9ed9L1NHdFBFwSjqYQuQeyYlLAdvRmQto9w9nAOkzZWy48WtEtwOlN6yA9T 0tK/bbusDIEDAAA= Archived-At: Cc: Ingemar Johansson S , "tcpPrague@ietf.org" Subject: Re: [tcpPrague] Impact of an L4S experiment on non-TCP transports using ECT(1) X-BeenThere: tcpprague@ietf.org X-Mailman-Version: 2.1.17 Precedence: list List-Id: "To coordinate implementation and standardisation of TCP Prague across platforms. TCP Prague will be an evolution of DCTCP designed to live alongside other TCP variants and derivatives." List-Unsubscribe: , List-Archive: List-Post: List-Help: List-Subscribe: , X-List-Received-Date: Wed, 20 Jul 2016 20:51:30 -0000 ------=_NextPart_000_013B_01D1E2D9.39A17C00 Content-Type: multipart/alternative; boundary="----=_NextPart_001_013C_01D1E2D9.39A17C00" ------=_NextPart_001_013C_01D1E2D9.39A17C00 Content-Type: text/plain; charset="utf-8" Content-Transfer-Encoding: quoted-printable Hi =20 FYI, I am trying to get some info if there are any implementations = (pending or existing) of ECN support for 3GPP MSTI according to = TS26.114. I am almost certain that there are no but it needs to be = checked out, given vacation period and all it may take a while to get a = clear answer. =20 /Ingeamr=20 =20 From: Colin Perkins [mailto:csp@csperkins.org]=20 Sent: den 20 juli 2016 10:34 To: Bob Briscoe Cc: TCP Prague List Subject: Re: [tcpPrague] Impact of an L4S experiment on non-TCP = transports using ECT(1) =20 Bob, =20 On 19 Jul 2016, at 19:22, Bob Briscoe > wrote: =20 Colin, For the writing about the proposed effect of L4S on RFC6679, see the L4S = problem statement section 1.4, item 3B) https://tools.ietf.org/html/draft-briscoe-tsvwg-aqm-tcpm-rmcat-l4s-proble= m-02#section-1.4 It there are any other RFCs beyond the list there that use ECT(1) that = we're not aware of, pls let me know. Can you explain the impact on circuit breaker? =20 The ongoing experiments with AQM and ECN, of which L4S is a part, have = made it very unclear how a transport should respond to ECN-CE marks, for = either ECT(0) or ECT(1). The circuit breaker got caught in that = discussion.=20 =20 Colin =20 =20 =20 Prior to the problem statement, text about 6679 was written in the L4S = identifier draft that I've presented in tsvwg, and mentioned the effect = on other transports including RTP-ECN. We wrote what we thought the process would be in = https://tools.ietf.org/html/draft-briscoe-tsvwg-ecn-l4s-id-01#section-1.3= However, the tsv management have now clarified how they want this done = (I'm expecting discussion in tsvwg tomorrow now we've had the BoF). I can send you the draft text we're proposing to use to update 3168, = 6679 etc, if you want (or you can wait until it's actually submitted as = a draft, perhaps tonight. Essentially the idea is 2-stage: 1) a PS to obsolete RFC3540 (experimental) and to update RFC3168 RFC4960 = RFC6679 RFC4340 to reserve ECT(1) for future experiments again 2) the L4S identifier draft (draft-briscoe-tsvwg-ecn-l4s-id) to use the = newly reserved ECT(1) codepoint experimentally I appreciate that there might be implementations in progress that use = ECT(1), but as 6679 did not say what ECT(1) is for, I doubt it. If an RTP implementation is using a field in the IP header for something = that hasn't been standardised by the IETF and is not the current = experimental use (the ECN nonce), then I think it has no right to = complain if it gets stamped on by a new IETF-sanctioned experiment. You will recall I checked the intent of the ECT(1) text in 6679 on the = avtcore list some time ago. See your response then, pasted below. Bob -------- Forwarded Message --------=20 Subject:=20 Re: [AVTCORE] RFC6679 ECN in RTP: intent of ect =3D 0, 1, or random? Date:=20 Mon, 9 Nov 2015 10:55:14 +0000 From:=20 Colin Perkins To:=20 Bob Briscoe CC:=20 Ingemar Johansson S = , Magnus Westerlund = = , Ken Carlberg = =20 Bob, =20 This sounds interesting, and would be a good fit for the RMCAT working = group, but doesn=E2=80=99t sound like it would be an update to the = ECN-for-RTP RFC (which specifies ECN negotiation, marking, and feedback, = but no congestion control algorithms). =20 Colin =20 =20 =20 =20 > On 5 Nov 2015, at 10:04, Bob Briscoe = wrote: >=20 > Colin, >=20 > OK. In the fullness of time, if our proposal continues to get = traction, I'll draft a little experimental bis to ECN in RTP to specify = scalable congestion control. It will be v simple: >=20 > If using scalable cc: > * sender only uses scalable cc if (all) receiver(s) report ECN support > * sender rate equation is like TFRC equation, but with 1/p instead of = 1/sqrt(p) > * fall back to TFRC equation on loss rather than ECN (and also = possibly on ECN accompanied by high variable delay) for 'a few' 1RTT = (TBD) > * sender sets ECT(1) not ECT(0) > * no changes on receiver > * I think it would work deployed one RTP hop at a time, but that would = have to be tested >=20 > But I'd want to implement and test it first, of course. >=20 >=20 >=20 > Bob >=20 > On 05/11/15 07:34, Colin Perkins wrote: >> Bob, >>=20 >>> On 4 Nov 2015, at 17:50, Bob Briscoe = wrote: >>>=20 >>> Piers, >>>=20 >>> I realised I didn't send the mail thanking you for your response. = Thank you - v useful, and confirmation of my vague memory of events. >>>=20 >>> 1. Would the authors (and wider community) be happy to allow ECT(1) = not to be set-aside for future anti-cheating use, as long as there was = another way, in principle, for the sender to check for cheating? >> I have no objection. You might check with the RMCAT chairs, since = some of their proposals make use of ECN with RTP, but I doubt this will = be a problem. >>=20 >>> For TCP, we worked out a way for the sender to check for cheating = without burning a codepoint - by the sender introducing one or two CE = codepoints of its own, and checking the receiver reports them. Would = this be harder for RTP? Are the receiver reports deterministic enough = for the sender to determine whether codepoints it injected are correctly = counted in the next report? >> The sender could easily set a CE mark on a small number of packets = it=E2=80=99s sending. For unicast cases, where there=E2=80=99s an = explicit control loop, it should be able to correlate this with the = returned RTCP feedback. Where it might be difficult is with open loop = layered multicast congestion control, where some receivers might see the = CE mark and drop a layer since they don=E2=80=99t know it=E2=80=99s a = synthetic mark. >>=20 >> Colin >>=20 >>=20 >>=20 >>=20 >>> 2. A couple of days after I posted the original question, we posted = the -00 individual draft aiming to start the process of repurposing = ECT(1). You will see the sentence in the scope section = = >>>=20 >>> See security considerations for discussion on feedback integrity = checking. >>>=20 >>>=20 >>> Bob >>>=20 >>> On 19/10/15 10:15, Piers O'Hanlon wrote: >>>> Hi Bob, >>>>=20 >>>> I think the reasoning was that ECT(1)/random could potentially be = used to detect cheating/failures as mentioned in section 7.4, but I = can't see that it's going to make a lot of difference if ECT(1) is not = used. >>>>=20 >>>> Piers >>>>=20 >>>> On 17 Oct 2015, at 22:59, Bob Briscoe wrote: >>>>=20 >>>>> Guys, >>>>> [Ignore last identical email - I left the list off the distr in = error] >>>>>=20 >>>>> I'm writing a draft to propose a new use for ECT(1). >>>>>=20 >>>>> In reading RFC6679, It says that the there is no intent to use an = ECN nonce. >>>>> Also it says the receiver might want to advise the sender not to = use ect=3Drandom, if its behind a header compression link. And that = ect=3D0 is recommended and the default. >>>>>=20 >>>>> But it doesn't seem to actually say why a sender might send ECT(1) = instead of ECT(0). Or why a sender might use the two randomly. Or why a = receiver might ask for ect=3D1, or ect=3Drandom. >>>>>=20 >>>>> I'm trying to work out whether there would be any detriment to = RFC6679 if it couldn't use ECT(1). It looks like not. >>>>>=20 >>>>>=20 >>>>> Bob >>>>>=20 >>>>> --=20 >>>>> ________________________________________________________________ >>>>> Bob Briscoehttp://bobbriscoe.net/ >>> --=20 >>> ________________________________________________________________ >>> Bob Briscoehttp://bobbriscoe.net/ >>>=20 >>=20 >>=20 >=20 > --=20 > ________________________________________________________________ > Bob Briscoe http://bobbriscoe.net/ >=20 > _______________________________________________ > Audio/Video Transport Core Maintenance > avt@ietf.org =20 > https://www.ietf.org/mailman/listinfo/avt =20 --=20 ________________________________________________________________ Bob Briscoe http://bobbriscoe.net/ =20 =20 --=20 Colin Perkins https://csperkins.org/ =20 =20 =20 ------=_NextPart_001_013C_01D1E2D9.39A17C00 Content-Type: text/html; charset="utf-8" Content-Transfer-Encoding: quoted-printable

Hi=

 

FYI, I am = trying to get some info if there are any implementations (pending or = existing) of ECN support for 3GPP MSTI according to TS26.114. I am = almost certain that there are no but it needs to be checked out, given = vacation period and all it may take a while to get a clear = answer.

 

/Ingeamr =

 

From:<= /b> = Colin Perkins [mailto:csp@csperkins.org]
Sent: den 20 juli = 2016 10:34
To: Bob Briscoe = <ietf@bobbriscoe.net>
Cc: TCP Prague List = <tcpPrague@ietf.org>
Subject: Re: [tcpPrague] Impact of = an L4S experiment on non-TCP transports using = ECT(1)

 

Bob,

 

On 19 Jul 2016, at 19:22, Bob Briscoe <ietf@bobbriscoe.net> = wrote:

 

Colin,

For the writing about the proposed = effect of L4S on RFC6679, see the L4S problem statement section 1.4, = item 3B)
https://tools.ietf.org/html/draft-briscoe-tsvwg= -aqm-tcpm-rmcat-l4s-problem-02#section-1.4

It there are any = other RFCs beyond the list there that use ECT(1) that we're not aware = of, pls let me know.
Can you explain the impact on circuit = breaker?

 

The ongoing experiments with AQM and ECN, of which L4S = is a part, have made it very unclear how a transport should respond to = ECN-CE marks, for either ECT(0) or ECT(1). The circuit breaker got = caught in that discussion. 

 

Colin

 

 

 



Prior to the problem statement, text about 6679 was = written in the L4S identifier draft that I've presented in tsvwg, and = mentioned the effect on other transports including RTP-ECN.
We wrote = what we thought the process would be in https://tools.ietf.org/html/draft-briscoe-tsvwg-ecn-l4s-id-01#s= ection-1.3
However, the tsv management have now clarified how = they want this done (I'm expecting discussion in tsvwg tomorrow now = we've had the BoF).


I can send you the draft text we're = proposing to use to update 3168, 6679 etc, if you want (or you can wait = until it's actually submitted as a draft, perhaps = tonight.
Essentially the idea is 2-stage:
1) a PS to obsolete = RFC3540 (experimental) and to update RFC3168 RFC4960 RFC6679 RFC4340 to = reserve ECT(1) for future experiments again
2) the L4S identifier = draft (draft-briscoe-tsvwg-ecn-l4s-id) to use the newly reserved ECT(1) = codepoint experimentally

I appreciate that there might be = implementations in progress that use ECT(1), but as 6679 did not say = what ECT(1) is for, I doubt it.
If an RTP implementation is using a = field in the IP header for something that hasn't been standardised by = the IETF and is not the current experimental use (the ECN nonce), then I = think it has no right to complain if it gets stamped on by a new = IETF-sanctioned experiment.

You will recall I checked the intent = of the ECT(1) text in 6679 on the avtcore list some time ago.
See = your response then, pasted below.


Bob


-------- = Forwarded Message --------

Subject:

Re: [AVTCORE] = RFC6679 ECN in RTP: intent of ect =3D 0, 1, or = random?

Date:

Mon, 9 Nov 2015 = 10:55:14 +0000

From:

Colin Perkins <csp@csperkins.org>

To:

Bob Briscoe <ietf@bobbriscoe.net><= /o:p>

CC:

Ingemar Johansson = S <ingemar.s.johansson@= ericsson.com>, Magnus Westerlund <magnus.westerlund@eric= sson.com>, Ken Carlberg <carlberg@g11.org.uk><= /o:p>

 

Bob,<=
/pre>
 
This sounds interesting, and would =
be a good fit for the RMCAT working group, but doesn=E2=80=99t sound =
like it would be an update to the ECN-for-RTP RFC (which specifies ECN =
negotiation, marking, and feedback, but no congestion control =
algorithms).
 
Colin<=
/o:p>
 
 
<=
o:p> 
 
> On 5 Nov =
2015, at 10:04, Bob Briscoe <ietf@bobbriscoe.net> =
wrote:
> 
> =
Colin,
> 
> OK. In the =
fullness of time, if our proposal continues to get traction, I'll draft =
a little experimental bis to ECN in RTP to specify scalable congestion =
control. It will be v simple:
> =
> If using scalable =
cc:
> * sender only uses scalable cc if (all) =
receiver(s) report ECN support
> * sender rate =
equation is like TFRC equation, but with 1/p instead of =
1/sqrt(p)
> * fall back to TFRC equation on loss =
rather than ECN (and also possibly on ECN accompanied by high variable =
delay) for 'a few' 1RTT (TBD)
> * sender sets =
ECT(1) not ECT(0)
> * no changes on =
receiver
> * I think it would work deployed one =
RTP hop at a time, but that would have to be =
tested
> 
> But I'd want =
to implement and test it first, of course.
> =
> 
> =
> Bob
> =
> On 05/11/15 07:34, Colin Perkins =
wrote:
>> Bob,
>> =
>>> On 4 Nov 2015, at 17:50, Bob Briscoe =
<ietf@bobbriscoe.net> =
wrote:
>>> =
>>> =
Piers,
>>> =
>>> I realised I didn't send the mail =
thanking you for your response. Thank you - v useful, and confirmation =
of my vague memory of events.
>>> =
>>> 1. Would the authors (and wider =
community) be happy to allow ECT(1) not to be set-aside for future =
anti-cheating use, as long as there was another way, in principle, for =
the sender to check for cheating?
>> I have =
no objection. You might check with the RMCAT chairs, since some of their =
proposals make use of ECN with RTP, but I doubt this will be a =
problem.
>> =
>>> For TCP, we worked out a way for the =
sender to check for cheating without burning a codepoint - by the sender =
introducing one or two CE codepoints of its own, and checking the =
receiver reports them. Would this be harder for RTP? Are the receiver =
reports deterministic enough for the sender to determine whether =
codepoints it injected are correctly counted in the next =
report?
>> The sender could easily set a CE =
mark on a small number of packets it=E2=80=99s sending. For unicast =
cases, where there=E2=80=99s an explicit control loop, it should be able =
to correlate this with the returned RTCP feedback. Where it might be =
difficult is with open loop layered multicast congestion control, where =
some receivers might see the CE mark and drop a layer since they =
don=E2=80=99t know it=E2=80=99s a synthetic =
mark.
>> 
>> =
Colin
>> 
>> =
>> 
>> =
>>> 2. A couple of days after I posted =
the original question, we posted the -00 individual draft aiming to =
start the process of repurposing ECT(1). You will see the sentence in =
the scope section <https://tools.ietf.org/html/draft-briscoe-tsvwg-ecn-l4s-id-=
00#section-1.3>
>>> =
>>> See security considerations for =
discussion on feedback integrity =
checking.
>>> =
>>> 
>>> =
Bob
>>> 
>>> =
On 19/10/15 10:15, Piers O'Hanlon =
wrote:
>>>> Hi =
Bob,
>>>> =
>>>> I think the reasoning was that =
ECT(1)/random could potentially be used to detect cheating/failures as =
mentioned in section 7.4, but I can't see that it's going to make a lot =
of difference if ECT(1) is not =
used.
>>>> =
>>>> =
Piers
>>>> =
>>>> On 17 Oct 2015, at 22:59, Bob =
Briscoe wrote:
>>>> =
>>>>> =
Guys,
>>>>> [Ignore last identical =
email - I left the list off the distr in =
error]
>>>>> =
>>>>> I'm writing a draft to =
propose a new use for ECT(1).
>>>>> =
>>>>> In reading RFC6679, It says =
that the there is no intent to use an ECN =
nonce.
>>>>> Also it says the =
receiver might want to advise the sender not to use ect=3Drandom, if its =
behind a header compression link. And that ect=3D0 is recommended and =
the default.
>>>>> =
>>>>> But it doesn't seem to =
actually say why a sender might send ECT(1) instead of ECT(0). Or why a =
sender might use the two randomly. Or why a receiver might ask for =
ect=3D1, or ect=3Drandom.
>>>>> =
>>>>> I'm trying to work out =
whether there would be any detriment to RFC6679 if it couldn't use =
ECT(1). It looks like not.
>>>>> =
>>>>> =
>>>>> =
Bob
>>>>> =
>>>>> -- =
>>>>> =
________________________________________________________________
>>>>> Bob Briscoehttp://bobbriscoe.net/<=
o:p>
>>> -- 
>>> =
________________________________________________________________
>>> Bob Briscoehttp://bobbriscoe.net/<=
o:p>
>>> 
>> =
>> 
> =
> -- 
> =
________________________________________________________________
> Bob =
Briscoe=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=
=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=
=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0 http://bobbriscoe.net/
> 
> =
_______________________________________________
>=
 Audio/Video Transport Core Maintenance
> avt@ietf.org
> =
https://www.ietf.org/m=
ailman/listinfo/avt
 



-- =
___________________________________________________=
_____________
Bob =
Briscoe=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=
=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=
=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0 http://bobbriscoe.net/

 

 

-- 

Colin = Perkins

 

 

 

------=_NextPart_001_013C_01D1E2D9.39A17C00-- ------=_NextPart_000_013B_01D1E2D9.39A17C00 Content-Type: application/pkcs7-signature; name="smime.p7s" Content-Transfer-Encoding: base64 Content-Disposition: attachment; filename="smime.p7s" MIAGCSqGSIb3DQEHAqCAMIACAQExCzAJBgUrDgMCGgUAMIAGCSqGSIb3DQEHAQAAoIIVYzCCAyAw ggIIoAMCAQICAR0wDQYJKoZIhvcNAQEFBQAwOTELMAkGA1UEBhMCRkkxDzANBgNVBAoTBlNvbmVy YTEZMBcGA1UEAxMQU29uZXJhIENsYXNzMiBDQTAeFw0wMTA0MDYwNzI5NDBaFw0yMTA0MDYwNzI5 NDBaMDkxCzAJBgNVBAYTAkZJMQ8wDQYDVQQKEwZTb25lcmExGTAXBgNVBAMTEFNvbmVyYSBDbGFz czIgQ0EwggEiMA0GCSqGSIb3DQEBAQUAA4IBDwAwggEKAoIBAQCQF0o1ncrwDZbHRPoWN/xIvb1/ gC01O+FvqGepvwMcTYxvMkfVQWikEwTBNQyahEP8XB3/ibPoFxjNkV/7iePqv05dfBsm03V57eaE 41flrSnE9Doo56V7hDZps/1edr2jLZnTkE4jKH0YY/FUOyaddluXQrL/rvBO7N05lU6DBn/nSUDI xQGyVFpmHT38+ek8Cp6BuHDwAYvkI1R8yK74kB4AlnLUVM9hI7zq+50CldG2uXE6aQg/D7ThQseI 9T+YqKe6HOBxce9YV4FQelxrdEYOgwOYw46obvJ2Mm4ng8Jz89wY6LST6nVEawRgIHFXh53zvqCQ Iz2KJOHaIdvDAgMBAAGjMzAxMA8GA1UdEwEB/wQFMAMBAf8wEQYDVR0OBAoECEqgqliE0148MAsG A1UdDwQEAwIBBjANBgkqhkiG9w0BAQUFAAOCAQEAWs6H+RZyFVdLHdmb56ImMOyTZ9/WLdI0r/c4 pc6rFrmrL3w1y6zQD7RMK/yA72uMkV82dvfbsxsZ6vSyEf1hcUS/KLM6Hb+zQ+ifv9wxCHGwnY3W NEcykMZlJPegSnwEc485bxeMcrW9S8h6+HuDwyhOnAnqZz+yZwQbwxTa+OdJJJHQHWr6YTnva+ch dQYH2BK0ISBwQnGB2jyaNr6mWw1qbJofkXv5+e9Cuk5OnswMjZTc2UWcXuxCUGOu9F3EsRLcyjuo Lp0UWgV1t+zXY+K6NbYECJHo2p2c9ma1GKwKplQmNDPSG8HUfxo6jguqMm7b/E8ln9kyx5ZacKzf TDCCBX0wggRloAMCAQICEQCH7S4aKCZKxRmqOuu5DaLLMA0GCSqGSIb3DQEBCwUAMDkxCzAJBgNV BAYTAkZJMQ8wDQYDVQQKEwZTb25lcmExGTAXBgNVBAMTEFNvbmVyYSBDbGFzczIgQ0EwHhcNMTQx MjA1MDgxOTE1WhcNMjEwNDA1MTAyOTAwWjA3MRQwEgYDVQQKDAtUZWxpYVNvbmVyYTEfMB0GA1UE AwwWVGVsaWFTb25lcmEgUm9vdCBDQSB2MTCCAiIwDQYJKoZIhvcNAQEBBQADggIPADCCAgoCggIB AMK+6yfwIaPzaSZVfp3FVRaRXP3vIb9TgHot0pGMYzHw7CTww6XScnwQbfQ3t+XmfHnqjLWCi65I tqwA3GV17CpNX8GH9SBlK4GoRz6JI5UwFpB/6FcHSOcZrr9FZ7E3GwYq/t75rH2D+1665I+XZ75L jo1kB1c4VWk0Nj0TSO9P4tNmHqTPGrdeNjPUtAa9GAH9d4RQAEX1jF3oI7x+/jXh7VB7qTCNGdMJ jmhnXb88lxhTuylixcpecsHHltTbLaC0H2kD7OriUPEMPPCs81Mt8Bz17Ww5OXOAFshSsCPN4D7c 3TxHoLs1iuKYaIu+5b9y7tL6pe0S7fyYGKkmdtwoSxAgHNN/Fnct7W+A90m7UwW7XWjH1Mh1Fj+J Wov3F0fUTPHSiXk+TT2YqGHeOh7S+F4D4MHJHIzTjU3TlTazN19jY5szFPAtJmtTfImMMsJu7D0h ADnJoWjiUIMusDor8zagrC/kb2HCUQk5PotTubtn2txTuXZZNp1D5SDgPTJghSJRt8czu90VL6R4 pgd7gUY2BIbdeTXHlSw7sKMXNeVzH7RcWe/a6hBle3rQf5+ztCo3O3CLm1u5K7fsslESl1MpWtTw EhDcTwK7EpIvYtQ/aUN8Ddb8WHUBiJ1YFkveupD/RwGJBmr2X7KQarMCpgKIv7NHfirZ1fpoeDVN AgMBAAGjggGAMIIBfDBOBggrBgEFBQcBAQRCMEAwPgYIKwYBBQUHMAKGMmh0dHA6Ly9jYS50cnVz dC50ZWxpYXNvbmVyYS5jb20vc29uZXJhY2xhc3MyY2EuY2VyMA8GA1UdEwEB/wQFMAMBAf8wGQYD VR0gBBIwEDAOBgwrBgEEAYIPAgMBAQIwDgYDVR0PAQH/BAQDAgEGMB0GA1UdDgQWBBTwj1k4ALP1 j5qWDNXr+nuqF+gTEjCBuQYDVR0fBIGxMIGuMG+gbaBrhmlsZGFwOi8vY3JsLTEudHJ1c3QudGVs aWFzb25lcmEuY29tL2NuPVNvbmVyYSUyMENsYXNzMiUyMENBLG89U29uZXJhLGM9Rkk/Y2VydGlm aWNhdGVyZXZvY2F0aW9ubGlzdDtiaW5hcnkwO6A5oDeGNWh0dHA6Ly9jcmwtMi50cnVzdC50ZWxp YXNvbmVyYS5jb20vc29uZXJhY2xhc3MyY2EuY3JsMBMGA1UdIwQMMAqACEqgqliE0148MA0GCSqG SIb3DQEBCwUAA4IBAQAQ1elFTM6fGkQ/aRKdkUZicO3Cb9uzBJOpOtFctw+1El0/17lsjoVvJkZB D3KnUobnrriFdAa+7FAN55KLmZeB/3Y2bG0bB4toSyaVHjOQnQY9M0dv8U852w0Q7GwchKfebLUI bh9TMt2hI3Xc6j4knFTBUo7C1WAfO51K4bn1irmX6/Ej2VTgiOFsvOAny28W6enFSEQpSHw60VhN fSttSqTOxyrRR/7kW7Y8yb/3DZDZ/dH6ZCfx/y+BNIv2NuSd85M9HXUzplXXohti4Ql/qeaMn6by Ius6XlMWZZfkdVRvTuk2PkeC7UmAJ2+/DUWOPpawaytMXVfF4Hvxk34NMIIGADCCA+igAwIBAgIQ eyeE6FBBHSc8YzDpWR1mVTANBgkqhkiG9w0BAQUFADA6MREwDwYDVQQKDAhFcmljc3NvbjElMCMG A1UEAwwcRXJpY3Nzb24gTkwgSW5kaXZpZHVhbCBDQSB2MjAeFw0xNDEyMDIxNDI5MTdaFw0xNzEy MDIxNDI5MTZaMHQxETAPBgNVBAoMCEVyaWNzc29uMRwwGgYDVQQDDBNJbmdlbWFyIEpvaGFuc3Nv biBTMS8wLQYJKoZIhvcNAQkBFiBpbmdlbWFyLnMuam9oYW5zc29uQGVyaWNzc29uLmNvbTEQMA4G A1UEBRMHRVBMSUpPSDCCASIwDQYJKoZIhvcNAQEBBQADggEPADCCAQoCggEBAK6dOkJu7hl4aOKX k6YBf5PgWpDbO6iINxyYJetBuJZJqEdDqKukaHZmP8Rn5hhiQZDWa89koR41DNS7umMwZtHQkN+j m3b5Z1LUMQle7XDtUy3rn47hgjYUFgZOEp1fWYIoAKxZNOTf4AfiMbOGn2t8IFxe8JUYrAVy6tAE YnSnPM+nn4UeipLBwncBVhxUQU5R4W8b5k7tY8HJB+CWGgSbkyLWfxeuiwAA48nKqa6fOqo2ZpS4 ukNf9u8Hk3fIT8XvDJVnT2NwB7Z29oL3Fq20tm4M96SkuLlNjLZ9wvskfmYAk+PUP44ugvkB7Uon cAzoPXlkz3N5IB9Ly7/SIgsCAwEAAaOCAcYwggHCMEgGA1UdHwRBMD8wPaA7oDmGN2h0dHA6Ly9j cmwudHJ1c3QudGVsaWEuY29tL2VyaWNzc29ubmxpbmRpdmlkdWFsY2F2Mi5jcmwwgYIGCCsGAQUF BwEBBHYwdDAoBggrBgEFBQcwAYYcaHR0cDovL29jc3AyLnRydXN0LnRlbGlhLmNvbTBIBggrBgEF BQcwAoY8aHR0cDovL2NhLnRydXN0LnRlbGlhc29uZXJhLmNvbS9lcmljc3Nvbm5saW5kaXZpZHVh bGNhdjIuY2VyMCsGA1UdEQQkMCKBIGluZ2VtYXIucy5qb2hhbnNzb25AZXJpY3Nzb24uY29tMFUG A1UdIAROMEwwSgYMKwYBBAGCDwIDAQESMDowOAYIKwYBBQUHAgEWLGh0dHBzOi8vcmVwb3NpdG9y eS50cnVzdC50ZWxpYXNvbmVyYS5jb20vQ1BTMB0GA1UdJQQWMBQGCCsGAQUFBwMEBggrBgEFBQcD AjAdBgNVHQ4EFgQUOrfg77a5Xcj2OffxTY1aeC+5CqEwHwYDVR0jBBgwFoAUsQ3K1Ea3r4YCwy9v BsoOdnF/SzcwDgYDVR0PAQH/BAQDAgWgMA0GCSqGSIb3DQEBBQUAA4ICAQCddA412wylfbLwBiyQ uVz1IDcaYZ14Yh1L52IhX14BGl0eNc/5BbWL3yCF2eGv8h6FmckZHOM7+OS4g+inNZbaKysTkLah T3UbrUWFPpkZFAS1HfaxBJZTVS3UIVnIYP06ZvRRRNf3VJzwpZSES4tu0euzI2CatWCZLa+N4QyT ZkMnw1JLUXbz0dPA40b9Qdoec23PkpMqf1CxNNuaRBF9L5wKGily7RyPOtkcrWJ3R2oSGC7ugKK9 vWzQzEHoE95txgF/kq7MdRJks8BXqnb3w8Fthu+1zIORjcR9yxv1e9gYo0ZcaPqyjC/LDdzsHv59 5hkwQnxAGyPDBgCdq5Ion/4Lx+YI61SKcyGEH+VYD6CJX44/IfRAE+tq8BHZYOJLW8uCd7Jboqd2 jklsUfSPN8i4cvQpfYzDkrSziyfcvdplEvxSEbTEFZ+w6IbvCtV0xBSfS9+RhqBOn6LZSdw/jp+b 9penQAWekRykrKyKroDtwesqg0HbC7bkprqOwSaar5gcFGYVYJ5JuHT3Ou44hGn/yiwbTnc2Mb12 8nWesZQZvIT2n5Y42ZYebo1cLBYdF6U/Q5OHLOUk596LephQggvKphe7F2w87CpaUUoANa4H1ri+ LTOKdz+itrkbu3dDs6oDZuSwMU3fJaf8d/3PPLoGJtFQWQ8v2e/Oxxe0sDCCBrYwggSeoAMCAQIC EQCgDMvMm5mY7OI6cPR8wcBZMA0GCSqGSIb3DQEBBQUAMDcxFDASBgNVBAoMC1RlbGlhU29uZXJh MR8wHQYDVQQDDBZUZWxpYVNvbmVyYSBSb290IENBIHYxMB4XDTE0MDUyNzA3NDYyMVoXDTI0MDUy NzA3NDYyMVowOjERMA8GA1UECgwIRXJpY3Nzb24xJTAjBgNVBAMMHEVyaWNzc29uIE5MIEluZGl2 aWR1YWwgQ0EgdjIwggIiMA0GCSqGSIb3DQEBAQUAA4ICDwAwggIKAoICAQDaulPrX0iWU5+JOOqj ddx4Gnl17DJhklkoXOgOSBMhW6FzGVt5RR7KPv+rjt2YpbwdoqWSYa4VPkS/72vuQoWsvz2avWWX hPTdNzrB3zs5cJO7sKIyd+LRy4l/8kKK4iPm+Q18XyGF0xTuc5WS3WiMScJSxEKdIOP8xehBraHZ abrGh9OxQHC4iBHkzD0YF3J/vBqBTr7blRzYf1h3j5a7qVIHCPfz+eCE175mResXDQRI7LvMiZtV aqitBl0oAJiJyeBmvEujBNsIEgUQ6JcQFG5ny0EazLywv7clwb7izvLgoXc6SFrd0D7TGJtkdldV JtMwDYXpyFMGAijT6uf8h2kuPIwrDgQFNEyIQZ4q52ZpRGwugC6sMxgHEDGjA/CxX9aC5Vi1EMRJ iOGF6gV3T+V5yHDHSBBeQbVAXm8wSTDBfXQwdro/AXqET0mG6Rpe4q2FGBaauE8qHEO6qR3WAEgv jVfFU2k6xZx1qmvwhkXadxh6ZIMXzgb6WpjivLnR0GEKNrgN2DXdvo+6eAt45Bhvmeka2TrJDxML WiBy8QYgNeNXYQsuREnDsjWo6wF0LqbA5769om9nn/uJzmzxb3nT1iHue5co9J93ta06kxiASHvc IzZwAOjKnmk0vR3IT7Qbzq2of3E1s18xo8DM9D91Cak0Nq+RALtdv1uZKQIDAQABo4IBuDCCAbQw gYoGCCsGAQUFBwEBBH4wfDAtBggrBgEFBQcwAYYhaHR0cDovL29jc3AudHJ1c3QudGVsaWFzb25l cmEuY29tMEsGCCsGAQUFBzAChj9odHRwOi8vcmVwb3NpdG9yeS50cnVzdC50ZWxpYXNvbmVyYS5j b20vdGVsaWFzb25lcmFyb290Y2F2MS5jZXIwEgYDVR0TAQH/BAgwBgEB/wIBADBVBgNVHSAETjBM MEoGDCsGAQQBgg8CAwEBAjA6MDgGCCsGAQUFBwIBFixodHRwczovL3JlcG9zaXRvcnkudHJ1c3Qu dGVsaWFzb25lcmEuY29tL0NQUzBLBgNVHR8ERDBCMECgPqA8hjpodHRwOi8vY3JsLTMudHJ1c3Qu dGVsaWFzb25lcmEuY29tL3RlbGlhc29uZXJhcm9vdGNhdjEuY3JsMB0GA1UdJQQWMBQGCCsGAQUF BwMCBggrBgEFBQcDBDAOBgNVHQ8BAf8EBAMCAQYwHQYDVR0OBBYEFLENytRGt6+GAsMvbwbKDnZx f0s3MB8GA1UdIwQYMBaAFPCPWTgAs/WPmpYM1ev6e6oX6BMSMA0GCSqGSIb3DQEBBQUAA4ICAQBu ByBsr6x3PZBCsmGbcSZ/XL+0tnVMblInoJgL1Bh3PiRicgdo8l+6cvWp/ArBwMYNwSNyrvY9Iewy aV8n65c5oN+l2JDUuzrdANVKnYxha7ZyCEiPmY98sB2bnZgxfJLXQYoRwI7pOOwfyoP2fCYVCd+x hsfysYiIl4ORzE3TpeppQ2yWkyBBmoHUXJh97ue6+bJ2fqnVUoOVMVnYYEtvsz67v7w2z3fvdcy0 4/RnoylxSenxADi1tY9iIydHMgyOu3dfzsxU8AivMGG4aKStsCfUEyg0LlkbhqMrdness3e1qAEu eSRNASLfpFwyRmzmiuNh9onzuhER2yYhK/6IeCs4HQHrPhkY8JUmhtmdL2uErOZWOs38FQhGWHWX I0g6SgdDObU0GEHju0MkDziOhm+BVwPZKN7B7wD7OPj6vlLVo6d8vLGK9bywhEfXjxLIC3Qhtu5l JPTgIo5Bup+aBBjiJ/u9BfqryqZpudnWfG+wxC327rpNAq2OKdFsR92wbehSZD3mSSAemDVwGB2Y u0XHQYyyYfpWsGyGEyRSHKFhRwJdINPzWLI89wy4Wc+PgqyekkEmJqe6g4XSQFj4mqtwvqhP4dg2 QCcKM/bh62RwfM7GeSS/LFGe84KmJjTDfvT8c2rK8nEyZ/emOtwCGXQ6tZCByMNLxeDwU1TGbTGC AvMwggLvAgEBME4wOjERMA8GA1UECgwIRXJpY3Nzb24xJTAjBgNVBAMMHEVyaWNzc29uIE5MIElu ZGl2aWR1YWwgQ0EgdjICEHsnhOhQQR0nPGMw6VkdZlUwCQYFKw4DAhoFAKCCAXowGAYJKoZIhvcN AQkDMQsGCSqGSIb3DQEHATAcBgkqhkiG9w0BCQUxDxcNMTYwNzIwMjA1MTE3WjAjBgkqhkiG9w0B CQQxFgQU5eTI6rMk6rZ024LAoH6Pu9GHG4owWwYJKoZIhvcNAQkPMU4wTDAKBggqhkiG9w0DBzAO BggqhkiG9w0DAgICAIAwDQYIKoZIhvcNAwICAUAwBwYFKw4DAgcwDQYIKoZIhvcNAwICASgwBwYF Kw4DAhowXQYJKwYBBAGCNxAEMVAwTjA6MREwDwYDVQQKDAhFcmljc3NvbjElMCMGA1UEAwwcRXJp Y3Nzb24gTkwgSW5kaXZpZHVhbCBDQSB2MgIQeyeE6FBBHSc8YzDpWR1mVTBfBgsqhkiG9w0BCRAC CzFQoE4wOjERMA8GA1UECgwIRXJpY3Nzb24xJTAjBgNVBAMMHEVyaWNzc29uIE5MIEluZGl2aWR1 YWwgQ0EgdjICEHsnhOhQQR0nPGMw6VkdZlUwDQYJKoZIhvcNAQEBBQAEggEAlpLEeB8yRHpCPpv0 dAjHWSkLNkHbmNC/ahziq0wSoh71AlCIkILrNWjiyzpcQ/aV40OAndsoyspMRlI/xBQT4mYYkQpA 42cVdAC8kSjfZjkq3+oU6ruqVRHV+8FrT+0qKwOCSjMkXtSGyvKmTcITaEXNvMgivr5YBjhhbJ7k BO8wuvtPyjI8LvvDSmqQWOqXXD9fsdKoQVDUyfyBtKClh80HjRV2cYSUUwzP5tFWmn2Pbps518KU 4WmE2oy/Ps2zxWu8fNTxGebyxrOST7b5/CJSz0qc6Mu6U1aDwUF2zKv8ammDUseuTcPRzpsBtDhA /ey8mXOcABbmNUAuyw4dpAAAAAAAAA== ------=_NextPart_000_013B_01D1E2D9.39A17C00-- From nobody Fri Jul 22 02:20:44 2016 Return-Path: X-Original-To: tcpprague@ietfa.amsl.com Delivered-To: tcpprague@ietfa.amsl.com Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 3CF5E12DBDB; Fri, 22 Jul 2016 02:20:43 -0700 (PDT) X-Virus-Scanned: amavisd-new at amsl.com X-Spam-Flag: NO X-Spam-Score: -1.901 X-Spam-Level: X-Spam-Status: No, score=-1.901 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, RCVD_IN_DNSWL_NONE=-0.0001, SPF_PASS=-0.001] autolearn=ham autolearn_force=no Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id 75hpyLrROttW; Fri, 22 Jul 2016 02:20:41 -0700 (PDT) Received: from server.dnsblock1.com (server.dnsblock1.com [85.13.236.178]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id 502A512DBCD; Fri, 22 Jul 2016 02:20:41 -0700 (PDT) Received: from dhcp-b315.meeting.ietf.org ([31.133.179.21]:42556) by server.dnsblock1.com with esmtpsa (TLSv1.2:ECDHE-RSA-AES128-GCM-SHA256:128) (Exim 4.87) (envelope-from ) id 1bQWdL-00085E-HG; Fri, 22 Jul 2016 10:20:39 +0100 To: marcelo bagnulo braun From: Bob Briscoe Message-ID: <5791E566.7010201@bobbriscoe.net> Date: Fri, 22 Jul 2016 10:20:38 +0100 User-Agent: Mozilla/5.0 (X11; Linux x86_64; rv:38.0) Gecko/20100101 Thunderbird/38.8.0 MIME-Version: 1.0 Content-Type: text/plain; charset=utf-8; format=flowed Content-Transfer-Encoding: 7bit X-AntiAbuse: This header was added to track abuse, please include it with any abuse report X-AntiAbuse: Primary Hostname - server.dnsblock1.com X-AntiAbuse: Original Domain - ietf.org X-AntiAbuse: Originator/Caller UID/GID - [47 12] / [47 12] X-AntiAbuse: Sender Address Domain - bobbriscoe.net X-Get-Message-Sender-Via: server.dnsblock1.com: authenticated_id: in@bobbriscoe.net X-Authenticated-Sender: server.dnsblock1.com: in@bobbriscoe.net Archived-At: Cc: tcpm IETF list , TCP Prague List Subject: [tcpPrague] Another requirement that L4S/TCPPrague depends on X-BeenThere: tcpprague@ietf.org X-Mailman-Version: 2.1.17 Precedence: list List-Id: "To coordinate implementation and standardisation of TCP Prague across platforms. TCP Prague will be an evolution of DCTCP designed to live alongside other TCP variants and derivatives." List-Unsubscribe: , List-Archive: List-Post: List-Help: List-Subscribe: , X-List-Received-Date: Fri, 22 Jul 2016 09:20:43 -0000 Marcelo, We need to add this I-D to the list of requirements that TCP Prague will have to depend on - in the L4S Problem Statement (assuming it could turn into an L4S architecture draft). A Mechanism for ECN Path Probing and Fallback https://tools.ietf.org/html/draft-kuehlewind-tcpm-ecn-fallback-01 Just asked one of the authors (Mirja). She says it has some wrong stuff in it, so it will need updating quite a bit anyway. And it will need to be updated wrt L4S changes. The probing and fall-back logic relevant to AccECN is already in draft-ietf-tcpm-accurate-ecn, which will have to be a prerequisite for L4S in TCP. Nonetheless, this draft is broader than AccECN, and broader than L4S: * It ought to cover any transport, not just TCP. * And even in the case of TCP, it covers Classic ECN * and even in the case of TCP Prague, it would cover the fall-back behaviour of the sending handler (at either end of a TCP connection), because that was ruled out of scope for AccECN. Bob -- ________________________________________________________________ Bob Briscoe http://bobbriscoe.net/ From nobody Fri Jul 22 04:01:18 2016 Return-Path: X-Original-To: tcpprague@ietfa.amsl.com Delivered-To: tcpprague@ietfa.amsl.com Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 2E98712DC66 for ; Fri, 22 Jul 2016 04:01:12 -0700 (PDT) X-Virus-Scanned: amavisd-new at amsl.com X-Spam-Flag: NO X-Spam-Score: -3.207 X-Spam-Level: X-Spam-Status: No, score=-3.207 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, RCVD_IN_MSPIKE_H4=-0.01, RCVD_IN_MSPIKE_WL=-0.01, RP_MATCHES_RCVD=-1.287] autolearn=ham autolearn_force=no Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id uL2TdspjU7Ez for ; Fri, 22 Jul 2016 04:01:10 -0700 (PDT) Received: from mail1.sandvine.com (mail1.sandvine.com [64.7.137.165]) (using TLSv1 with cipher ECDHE-RSA-AES256-SHA (256/256 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id BBE0712DB0C for ; Fri, 22 Jul 2016 04:01:08 -0700 (PDT) Received: from BLR-EXCHP-2.sandvine.com (192.168.196.172) by WTL-EXCHP-3.sandvine.com (192.168.196.177) with Microsoft SMTP Server (TLS) id 14.3.294.0; Fri, 22 Jul 2016 07:01:07 -0400 Received: from WTL-EXCHP-2.sandvine.com ([fe80::68ac:f071:19ff:3455]) by blr-exchp-2.sandvine.com ([fe80::6c6d:7108:c63c:9055%14]) with mapi id 14.03.0294.000; Fri, 22 Jul 2016 07:01:07 -0400 From: Dave Dolson To: TCP Prague List Thread-Topic: Treatment of ECT(1) pre L4S Thread-Index: AdHkCFgirgx3HT3iRm+SY64tLECkYQ== Date: Fri, 22 Jul 2016 11:01:06 +0000 Message-ID: <20160722110102.5697618.36413.99476@sandvine.com> Accept-Language: en-US Content-Language: en-US X-MS-Has-Attach: X-MS-TNEF-Correlator: x-c2processedorg: b2f06e69-072f-40ee-90c5-80a34e700794 Content-Type: text/plain; charset="utf-8" Content-ID: <6B3BE420BFDE294B956B3720A8B750E4@sandvine.com> Content-Transfer-Encoding: base64 MIME-Version: 1.0 Archived-At: Subject: [tcpPrague] Treatment of ECT(1) pre L4S X-BeenThere: tcpprague@ietf.org X-Mailman-Version: 2.1.17 Precedence: list List-Id: "To coordinate implementation and standardisation of TCP Prague across platforms. TCP Prague will be an evolution of DCTCP designed to live alongside other TCP variants and derivatives." List-Unsubscribe: , List-Archive: List-Post: List-Help: List-Subscribe: , X-List-Received-Date: Fri, 22 Jul 2016 11:01:12 -0000 SWYgYW4gb3BlcmF0b3Igd2VyZSB0byBkZXBsb3kgRUNOIHRvZGF5LCBwcmUgTDRTLCB3aGF0IHNo b3VsZCBiZSB0aGUgdHJlYXRtZW50IG9mIEVDVCgxKT8NCg0KSSBiZWxpZXZlLCBmcm9tIGEgZGlz Y3Vzc2lvbiB3aXRoIEtvZW4sIHRoYXQgdGhlIHNhZmVzdCBhcHByb2FjaCBpcyBmb3IgYSBwcmUt TDRTIGltcGxlbWVudGF0aW9uIHRvIHNpZ25hbCBjb25nZXN0aW9uIHRvIEVDVCgxKSBieSBkcm9w cGluZy4gSWYgRUNUKDEpIHdlcmUgdHJlYXRlZCB0aGUgc2FtZSBhcyBFQ1QoMCkgdGhlbiBuZXcg ZXhwZXJpbWVudGFsIFRDUC1QcmFndWUgZmxvd3Mgd291bGQgb3V0LWNvbXBldGUgYW55IEVDVCgw KSB0cmFmZmljLg0KDQpJcyB0aGlzIGFncmVlZD8gSWYgc28sIHNob3VsZCBpdCBiZSByZWNvbW1l bmRlZCBzb21ld2hlcmU/DQoNCk5vdGUgdGhhdCBJIGdvdCBtaXhlZCBhbnN3ZXJzIG9uIHRoaXMg ZnJvbSBvdGhlciBJRVRGIGZvbGtzLCBzbyBJIHRoaW5rIGl0IGlzIHdvcnRoIHNvcnRpbmcgb3V0 Lg0KDQoNCi1EYXZlDQoNCg0KDQo= From nobody Fri Jul 22 05:53:01 2016 Return-Path: X-Original-To: tcpprague@ietfa.amsl.com Delivered-To: tcpprague@ietfa.amsl.com Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 3512012D52D for ; Fri, 22 Jul 2016 05:52:56 -0700 (PDT) X-Virus-Scanned: amavisd-new at amsl.com X-Spam-Flag: NO X-Spam-Score: -1.901 X-Spam-Level: X-Spam-Status: No, score=-1.901 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, RCVD_IN_DNSWL_NONE=-0.0001, SPF_PASS=-0.001] autolearn=ham autolearn_force=no Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id AXz47wT2aAHk for ; Fri, 22 Jul 2016 05:52:53 -0700 (PDT) Received: from server.dnsblock1.com (server.dnsblock1.com [85.13.236.178]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id 6444A12D1A1 for ; Fri, 22 Jul 2016 05:52:53 -0700 (PDT) Received: from dhcp-b315.meeting.ietf.org ([31.133.179.21]:43160) by server.dnsblock1.com with esmtpsa (TLSv1.2:ECDHE-RSA-AES128-GCM-SHA256:128) (Exim 4.87) (envelope-from ) id 1bQZwh-0003jU-Ec for tcpprague@ietf.org; Fri, 22 Jul 2016 13:52:51 +0100 To: tcpprague@ietf.org References: <20160722110102.5697618.36413.99476@sandvine.com> From: Bob Briscoe Message-ID: <57921723.2010908@bobbriscoe.net> Date: Fri, 22 Jul 2016 13:52:51 +0100 User-Agent: Mozilla/5.0 (X11; Linux x86_64; rv:38.0) Gecko/20100101 Thunderbird/38.8.0 MIME-Version: 1.0 In-Reply-To: <20160722110102.5697618.36413.99476@sandvine.com> Content-Type: text/plain; charset=utf-8; format=flowed Content-Transfer-Encoding: 7bit X-AntiAbuse: This header was added to track abuse, please include it with any abuse report X-AntiAbuse: Primary Hostname - server.dnsblock1.com X-AntiAbuse: Original Domain - ietf.org X-AntiAbuse: Originator/Caller UID/GID - [47 12] / [47 12] X-AntiAbuse: Sender Address Domain - bobbriscoe.net X-Get-Message-Sender-Via: server.dnsblock1.com: authenticated_id: in@bobbriscoe.net X-Authenticated-Sender: server.dnsblock1.com: in@bobbriscoe.net Archived-At: Subject: Re: [tcpPrague] Treatment of ECT(1) pre L4S X-BeenThere: tcpprague@ietf.org X-Mailman-Version: 2.1.17 Precedence: list List-Id: "To coordinate implementation and standardisation of TCP Prague across platforms. TCP Prague will be an evolution of DCTCP designed to live alongside other TCP variants and derivatives." List-Unsubscribe: , List-Archive: List-Post: List-Help: List-Subscribe: , X-List-Received-Date: Fri, 22 Jul 2016 12:52:56 -0000 Dave, Assuming you're using an existing RED implementation... Advice #1: If you can, make ECT(1) separately configurable from ECT(0), even if you set them both to the same config for now. Advice #2: Don't drop ECT(1) if you are marking ECT(0). That would just introduce yet another odd behaviour. As long as you've satisfied advice #1, you can change this decision in future if it proves better. Advice #3: Once we have some L4S hosts, it might be possible to at least config ECT(1) to use the instantaneous queue size, rather than a smoothed queue size (ie RED's EWMA const = 2^0 = 1). If you're actually implementing the AQM now, my advice would be different. I assume you are just talking about configuring an existing implementation. On 22/07/16 12:01, Dave Dolson wrote: > If an operator were to deploy ECN today, pre L4S, what should be the treatment of ECT(1)? > > I believe, from a discussion with Koen, that the safest approach is for a pre-L4S implementation to signal congestion to ECT(1) by dropping. If ECT(1) were treated the same as ECT(0) then new experimental TCP-Prague flows would out-compete any ECT(0) traffic. > > Is this agreed? If so, should it be recommended somewhere? > > Note that I got mixed answers on this from other IETF folks, so I think it is worth sorting out. OK. But we'll need to do some experiments first. Bob > > > -Dave > > > > _______________________________________________ > tcpPrague mailing list > tcpPrague@ietf.org > https://www.ietf.org/mailman/listinfo/tcpprague -- ________________________________________________________________ Bob Briscoe http://bobbriscoe.net/ From nobody Sun Jul 24 08:59:03 2016 Return-Path: X-Original-To: tcpprague@ietfa.amsl.com Delivered-To: tcpprague@ietfa.amsl.com Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 68BB512B02B for ; Sun, 24 Jul 2016 08:59:01 -0700 (PDT) X-Virus-Scanned: amavisd-new at amsl.com X-Spam-Flag: NO X-Spam-Score: -1.901 X-Spam-Level: X-Spam-Status: No, score=-1.901 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, RCVD_IN_DNSWL_NONE=-0.0001, SPF_PASS=-0.001] autolearn=ham autolearn_force=no Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id lOcvx4zX9I37 for ; Sun, 24 Jul 2016 08:58:59 -0700 (PDT) Received: from server.dnsblock1.com (server.dnsblock1.com [85.13.236.178]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id AE47912B019 for ; Sun, 24 Jul 2016 08:58:59 -0700 (PDT) Received: from 157.251.114.87.dyn.plus.net ([87.114.251.157]:49490 helo=[192.168.0.6]) by server.dnsblock1.com with esmtpsa (TLSv1.2:ECDHE-RSA-AES128-GCM-SHA256:128) (Exim 4.87) (envelope-from ) id 1bRLnr-0006uB-IN; Sun, 24 Jul 2016 16:58:55 +0100 To: "EGGERT, Lars" , "EARDLEY, Phil" , Mirja Kuehlewind From: Bob Briscoe Message-ID: <5794E5BF.7050305@bobbriscoe.net> Date: Sun, 24 Jul 2016 16:58:55 +0100 User-Agent: Mozilla/5.0 (X11; Linux x86_64; rv:38.0) Gecko/20100101 Thunderbird/38.8.0 MIME-Version: 1.0 Content-Type: text/plain; charset=utf-8; format=flowed Content-Transfer-Encoding: 7bit X-AntiAbuse: This header was added to track abuse, please include it with any abuse report X-AntiAbuse: Primary Hostname - server.dnsblock1.com X-AntiAbuse: Original Domain - ietf.org X-AntiAbuse: Originator/Caller UID/GID - [47 12] / [47 12] X-AntiAbuse: Sender Address Domain - bobbriscoe.net X-Get-Message-Sender-Via: server.dnsblock1.com: authenticated_id: in@bobbriscoe.net X-Authenticated-Sender: server.dnsblock1.com: in@bobbriscoe.net Archived-At: Cc: TCP Prague List , "De Schepper, Koen \(Koen\)" Subject: [tcpPrague] Thank you for chairing and guiding the L4S BoF so well X-BeenThere: tcpprague@ietf.org X-Mailman-Version: 2.1.17 Precedence: list List-Id: "To coordinate implementation and standardisation of TCP Prague across platforms. TCP Prague will be an evolution of DCTCP designed to live alongside other TCP variants and derivatives." List-Unsubscribe: , List-Archive: List-Post: List-Help: List-Subscribe: , X-List-Received-Date: Sun, 24 Jul 2016 15:59:01 -0000 Lars, Phil, Mirja, Hopefully on behalf of everyone who attended, we (the proponents - Bob and Koen) would like to thank both the chairs for keeping the BoF to time, keeping it on topic, and guiding it to a useful conclusion. And we'd like to thank Mirja, as the responsible AD for guiding the process. We would also like to thank you all for your work in the background (before the BoF) helping to review slides and the agenda. Cheers Bob & Koen -- ________________________________________________________________ Bob Briscoe http://bobbriscoe.net/ From nobody Sun Jul 24 09:33:35 2016 Return-Path: X-Original-To: tcpprague@ietfa.amsl.com Delivered-To: tcpprague@ietfa.amsl.com Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 3A88D12D1EA for ; Sun, 24 Jul 2016 09:33:34 -0700 (PDT) X-Virus-Scanned: amavisd-new at amsl.com X-Spam-Flag: NO X-Spam-Score: -5.487 X-Spam-Level: X-Spam-Status: No, score=-5.487 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, RCVD_IN_DNSWL_MED=-2.3, RP_MATCHES_RCVD=-1.287] autolearn=ham autolearn_force=no Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id J49cwQ89QZ9I for ; Sun, 24 Jul 2016 09:33:21 -0700 (PDT) Received: from smtp.ee.ethz.ch (smtp.ee.ethz.ch [129.132.2.219]) (using TLSv1.2 with cipher AECDH-AES256-SHA (256/256 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id C4E4612D534 for ; Sun, 24 Jul 2016 09:33:21 -0700 (PDT) Received: from localhost (localhost [127.0.0.1]) by smtp.ee.ethz.ch (Postfix) with ESMTP id 6B2BCD9307; Sun, 24 Jul 2016 18:33:19 +0200 (MEST) X-Virus-Scanned: by amavisd-new on smtp.ee.ethz.ch Received: from smtp.ee.ethz.ch ([127.0.0.1]) by localhost (.ee.ethz.ch [127.0.0.1]) (amavisd-new, port 10024) with LMTP id CbSh094Q8C8c; Sun, 24 Jul 2016 18:33:19 +0200 (MEST) Received: from [192.168.178.33] (p5DEC2634.dip0.t-ipconnect.de [93.236.38.52]) (using TLSv1 with cipher ECDHE-RSA-AES256-SHA (256/256 bits)) (No client certificate requested) (Authenticated sender: mirjak) by smtp.ee.ethz.ch (Postfix) with ESMTPSA id DD670D9304; Sun, 24 Jul 2016 18:33:18 +0200 (MEST) Content-Type: text/plain; charset=us-ascii Mime-Version: 1.0 (Mac OS X Mail 9.3 \(3124\)) From: =?utf-8?Q?Mirja_K=C3=BChlewind?= In-Reply-To: <5794E5BF.7050305@bobbriscoe.net> Date: Sun, 24 Jul 2016 18:33:18 +0200 Content-Transfer-Encoding: quoted-printable Message-Id: References: <5794E5BF.7050305@bobbriscoe.net> To: Bob Briscoe X-Mailer: Apple Mail (2.3124) Archived-At: Cc: "EARDLEY, Phil" , "EGGERT, Lars" , TCP Prague List , "De Schepper, Koen \(Koen\)" Subject: Re: [tcpPrague] Thank you for chairing and guiding the L4S BoF so well X-BeenThere: tcpprague@ietf.org X-Mailman-Version: 2.1.17 Precedence: list List-Id: "To coordinate implementation and standardisation of TCP Prague across platforms. TCP Prague will be an evolution of DCTCP designed to live alongside other TCP variants and derivatives." List-Unsubscribe: , List-Archive: List-Post: List-Help: List-Subscribe: , X-List-Received-Date: Sun, 24 Jul 2016 16:33:34 -0000 Thanks a lot to you too! The bof went so well because you did a good job = and the demo work out super good! I personally think this is very good = work and I hope that this meeting brought the needed awareness on the = topic now to process this work successfully. Again if the current = processing does not work out we can always change something. Please let = me know if you see any problem in future! Mirja > Am 24.07.2016 um 17:58 schrieb Bob Briscoe : >=20 > Lars, Phil, Mirja, >=20 > Hopefully on behalf of everyone who attended, we (the proponents - Bob = and Koen) would like to thank both the chairs for keeping the BoF to = time, keeping it on topic, and guiding it to a useful conclusion. And = we'd like to thank Mirja, as the responsible AD for guiding the process. = We would also like to thank you all for your work in the background = (before the BoF) helping to review slides and the agenda. >=20 > Cheers >=20 >=20 > Bob & Koen >=20 > --=20 > ________________________________________________________________ > Bob Briscoe http://bobbriscoe.net/ From nobody Thu Jul 28 10:27:11 2016 Return-Path: X-Original-To: tcpprague@ietfa.amsl.com Delivered-To: tcpprague@ietfa.amsl.com Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id D5F9D12D51B; Thu, 28 Jul 2016 10:27:05 -0700 (PDT) X-Virus-Scanned: amavisd-new at amsl.com X-Spam-Flag: NO X-Spam-Score: -2.7 X-Spam-Level: X-Spam-Status: No, score=-2.7 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, DKIM_SIGNED=0.1, DKIM_VALID=-0.1, DKIM_VALID_AU=-0.1, FREEMAIL_FROM=0.001, RCVD_IN_DNSWL_LOW=-0.7, SPF_PASS=-0.001] autolearn=ham autolearn_force=no Authentication-Results: ietfa.amsl.com (amavisd-new); dkim=pass (2048-bit key) header.d=gmail.com Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id isI4ZQKkff7B; Thu, 28 Jul 2016 10:27:04 -0700 (PDT) Received: from mail-io0-x243.google.com (mail-io0-x243.google.com [IPv6:2607:f8b0:4001:c06::243]) (using TLSv1.2 with cipher ECDHE-RSA-AES128-GCM-SHA256 (128/128 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id 159BA12D89C; Thu, 28 Jul 2016 10:27:04 -0700 (PDT) Received: by mail-io0-x243.google.com with SMTP id y34so7976167ioi.3; Thu, 28 Jul 2016 10:27:04 -0700 (PDT) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=gmail.com; s=20120113; h=mime-version:from:date:message-id:subject:to :content-transfer-encoding; bh=9lUcIwZsX06uzY42iIBxBm5+bEUeAb+2WJVbcc0rXJE=; b=quCxpvp2MWck7p8TM77SAV3G+ZWjBLUN9Dt7M6wThONL8iG2Zf2mB4o+qmvJfPr4UQ pL+Itax9Zn9ZB/dWdeYRQMOL0OUtKytMK2ezXedzVrFU1OMzPFg5eDlovNeeYeH3Fo5Q qvrD2oqTUPLaFvD/YNPJWE2FpUOPxlx+mAS/SwH10lVMDwr6AylWbgrVyEOVlQVhPKog hwMPLy9KuvHnBuAwxjFSz8tVlDH+50G1uqccHKzajD6XE1dGYR+ijsOie1H7NCbwWTtZ 2TGnQlCwCq3zcyHcSHtX6RMvYxnHKvgi7e16yV52vh9c7tcwMNLEOF8M9V0PZ86B0Mtb ykwQ== X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20130820; h=x-gm-message-state:mime-version:from:date:message-id:subject:to :content-transfer-encoding; bh=9lUcIwZsX06uzY42iIBxBm5+bEUeAb+2WJVbcc0rXJE=; b=C7IoN5UDUzQ3F+axH2KRM+84w05/dPvFsJ7meTbqfMVCnkQC94JE+Vq3v/jo0Xi/Fv s9NX9BOoNLza+Ofg2BoWur+bNAyK74bhjWcW7Ue724nU+dhrJO7Povpbk2OpTr+y1Fsy GYYbanC6ZgDQl5FAGYzSotZsOYRzK4rdceX6FiTA7PR5+//6yJGzOENtuaUwZEvkRN0T zQl860PmNfRNin6PJqUR/WmYuX222Y2McZ1JkqI9A7JlvAJRgGhKl2PTf9iMrrj0HZel i4I2r/BFXht0O2d+4px+gd/GP9nRUjQA4/xdiXl7t+5n30RdfJL2s13xx/c5kXwR4A2E FAow== X-Gm-Message-State: AEkoouuDugR0DM3vkhB68SExezySXzCtai3ctUcgwBM7pTHtJNJahR41elI8/QUswDljFOG3fLklit+qVa0Yfw== X-Received: by 10.107.2.78 with SMTP id 75mr39173863ioc.128.1469726823231; Thu, 28 Jul 2016 10:27:03 -0700 (PDT) MIME-Version: 1.0 Received: by 10.79.14.17 with HTTP; Thu, 28 Jul 2016 10:27:02 -0700 (PDT) From: Dave Taht Date: Thu, 28 Jul 2016 19:27:02 +0200 Message-ID: To: "aqm@ietf.org" , tcpprague@ietf.org, bloat Content-Type: text/plain; charset=UTF-8 Content-Transfer-Encoding: quoted-printable Archived-At: Subject: [tcpPrague] what is the correct linux tc u32 match to ignore ecn but preserve tos? X-BeenThere: tcpprague@ietf.org X-Mailman-Version: 2.1.17 Precedence: list List-Id: "To coordinate implementation and standardisation of TCP Prague across platforms. TCP Prague will be an evolution of DCTCP designed to live alongside other TCP variants and derivatives." List-Unsubscribe: , List-Archive: List-Post: List-Help: List-Subscribe: , X-List-Received-Date: Thu, 28 Jul 2016 17:27:06 -0000 I can't ever get my endianess straight, and I figure that someone here might "just know" Do I use match u8 0xfc or 0xcf? tc filter add dev $DEV parent 1:0 protocol ip prio 10 u32 \ match ip tos 0x10 0xff flowid 1:10 (am trying to revise this from in front of a mac: https://www.bufferbloat.net/projects/cerowrt/wiki/Wondershaper_Must_Die/ ) Bonus points if you can come up with the right tc filter line for ipv6. What I would probably do is have a filter chain to then classify the thing further for L4s, but I don't understand how or where I'd direct CE markings correctly. (?) How does it happen in the pi2 code? is that on github somewhere? --=20 Dave T=C3=A4ht Let's go make home routers and wifi faster! With better software! http://blog.cerowrt.org=E3=AF=9D=E3=AF=9F From nobody Fri Jul 29 02:08:59 2016 Return-Path: X-Original-To: tcpprague@ietfa.amsl.com Delivered-To: tcpprague@ietfa.amsl.com Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 0966312B013 for ; Fri, 29 Jul 2016 02:08:58 -0700 (PDT) X-Virus-Scanned: amavisd-new at amsl.com X-Spam-Flag: NO X-Spam-Score: -6.902 X-Spam-Level: X-Spam-Status: No, score=-6.902 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, RCVD_IN_DNSWL_HI=-5, RCVD_IN_MSPIKE_H2=-0.001, SPF_PASS=-0.001] autolearn=ham autolearn_force=no Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id YscF0pb7EG3I for ; Fri, 29 Jul 2016 02:08:56 -0700 (PDT) Received: from smtp-fr.alcatel-lucent.com (fr-hpida-esg-02.alcatel-lucent.com [135.245.210.21]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id 4DDA912D740 for ; Fri, 29 Jul 2016 02:08:56 -0700 (PDT) Received: from fr712umx3.dmz.alcatel-lucent.com (unknown [135.245.210.42]) by Websense Email Security Gateway with ESMTPS id A3581840B058; Fri, 29 Jul 2016 09:08:52 +0000 (GMT) Received: from fr711usmtp1.zeu.alcatel-lucent.com (fr711usmtp1.zeu.alcatel-lucent.com [135.239.2.122]) by fr712umx3.dmz.alcatel-lucent.com (GMO-o) with ESMTP id u6T98rJ5009248 (version=TLSv1/SSLv3 cipher=DHE-RSA-AES256-SHA bits=256 verify=OK); Fri, 29 Jul 2016 09:08:54 GMT Received: from FR712WXCHHUB03.zeu.alcatel-lucent.com (fr712wxchhub03.zeu.alcatel-lucent.com [135.239.2.74]) by fr711usmtp1.zeu.alcatel-lucent.com (GMO) with ESMTP id u6T98pHp004647 (version=TLSv1/SSLv3 cipher=AES128-SHA bits=128 verify=FAIL); Fri, 29 Jul 2016 11:08:53 +0200 Received: from FR711WXCHMBA05.zeu.alcatel-lucent.com ([169.254.1.89]) by FR712WXCHHUB03.zeu.alcatel-lucent.com ([135.239.2.74]) with mapi id 14.03.0195.001; Fri, 29 Jul 2016 11:08:32 +0200 From: "De Schepper, Koen (Nokia - BE)" To: bloat , TCP Prague List Thread-Topic: DualPI2 qdisc implementation available for Linux Thread-Index: AQHR6XjHCipuhO1RrUa03YJRgBFr9A== Date: Fri, 29 Jul 2016 09:08:31 +0000 Message-ID: References: <68b1c3f2-dfc3-ffc3-da8b-24c535d77df0@pollere.com> In-Reply-To: <68b1c3f2-dfc3-ffc3-da8b-24c535d77df0@pollere.com> Accept-Language: nl-BE, en-US Content-Language: en-US X-MS-Has-Attach: X-MS-TNEF-Correlator: x-originating-ip: [135.239.27.41] Content-Type: text/plain; charset="utf-8" Content-Transfer-Encoding: base64 MIME-Version: 1.0 Archived-At: Subject: [tcpPrague] DualPI2 qdisc implementation available for Linux X-BeenThere: tcpprague@ietf.org X-Mailman-Version: 2.1.17 Precedence: list List-Id: "To coordinate implementation and standardisation of TCP Prague across platforms. TCP Prague will be an evolution of DCTCP designed to live alongside other TCP variants and derivatives." List-Unsubscribe: , List-Archive: List-Post: List-Help: List-Subscribe: , X-List-Received-Date: Fri, 29 Jul 2016 09:08:58 -0000 SGkgYWxsLA0KDQpGb3IgdGhvc2Ugd2hvIG1pc3NlZCB0aGUgTDRTIEJvRiwgdGhlIFBJMiBBUU0g d2l0aCBEdWFsUSBvcHRpb24gaXMgYXZhaWxhYmxlIG9uIHRoZSBmb2xsb3dpbmcgZ2l0OiBodHRw czovL2dpdGh1Yi5jb20vb2xnYWJvL2R1YWxwaTINCg0KUEkyIChQSSBJbXByb3ZlZCB3aXRoIGEg U3F1YXJlKSBpcyBhIHNpbXBsaWZpY2F0aW9uIG9mIFBJRSAoUEkgRW5oYW5jZWQpIHdpdGggdGhl IGFkdmFudGFnZSBvZiBhbHNvIHN1cHBvcnRpbmcgTDRTIGNvbmdlc3Rpb24gY29udHJvbHMgKGxp a2UgRENUQ1ApLiBQSTIgY29udHJvbHMgYnkgZGVmYXVsdCBhIHNpbmdsZSBxdWV1ZSwgd2l0aCBh IGNvbW1vbiB0YXJnZXQgKGRlZmF1bHQgMjBtcykuIFRvIGdldCB0aGUgbW9zdCBvdXQgb2YgdGhl IEw0UyB0cmFmZmljIHlvdSBuZWVkIGEgc2Vjb25kIEw0UyBxdWV1ZSBhbmQgYSBjb3VwbGVkIEFR TS4gUEkyIHN1cHBvcnRzIHRoaXMgYnkgc3BlY2lmeWluZyB0aGUgImR1YWxxIiBvcHRpb24uIFRo ZSBMNFMgcXVldWUgaXMgaGF2aW5nIGFuIGltbWVkaWF0ZSBzdGVwIEVDTiBtYXJrZXIgYXQgMW1z LCB3aGlsZSB0aGUgY2xhc3NpYyBxdWV1ZSBzdGlsbCBoYXMgdGhlIDIwbXMgdGFyZ2V0ICh3aXRo IG1hcmsvZHJvcCBjb3VwbGVkIGJhY2sgdG8gYm90aCBMNFMgYW5kIENsYXNzaWMpLg0KDQpOb3Rl IHRoYXQgUEkyIHN1cHBvcnRzIERDVENQLCBidXQgRENUQ1AgaXMgbm90IHRoZSB0YXJnZXQgdG8g YmUgdXNlZCBvbiB0aGUgaW50ZXJuZXQuIFRoZSBUQ1AtUHJhZ3VlIHJlcXVpcmVtZW50cyAoaHR0 cHM6Ly90b29scy5pZXRmLm9yZy9odG1sL2RyYWZ0LWJyaXNjb2UtdHN2d2ctYXFtLXRjcG0tcm1j YXQtbDRzLXByb2JsZW0tMDIjYXBwZW5kaXgtQSkgZGVmaW5lcyB3aGF0IGlzIG5lZWRlZCB0byBo YXZlIGFuIGVuZC1zeXN0ZW0gQ0MgaW1wbGVtZW50YXRpb24gd2hpY2ggYmVoYXZlcyBzaW1pbGFy IHRvIHdoYXQgRlEtWCBhY2hpZXZlcyBpbiB0aGUgbmV0d29yay4gRlEtWCBpcyBhIHdheSB0aGUg bmV0d29yayBjYW4gY29ycmVjdCB0aGUgYmVoYXZpb3Igb2YgY2xhc3NpYyBUQ1AgQ0NzLCBUQ1At UHJhZ3VlIGlzIHRoZSBlbmQtc3lzdGVtIGFsdGVybmF0aXZlIHRoYXQga2VlcHMgdGhlIG5ldHdv cmsgc2ltcGxlIGFuZCB0cmFuc3BvcnQgbGF5ZXIgaW5kZXBlbmRlbnQuDQoNCkZlZWwgZnJlZSB0 byB0cnkgaXQgb3V0LCBhbmQgam9pbiBpbiBkZXZlbG9waW5nIGEgVENQIENDIHRoYXQgbWVldHMg dGhlIFRDUC1QcmFndWUgcmVxdWlyZW1lbnRzLg0KDQpSZWdhcmRzLA0KS29lbi4NCg0KDQo=