Re: [arch-d] A Public Option for the Core

Christian Huitema <huitema@huitema.net> Mon, 17 August 2020 15:47 UTC

Return-Path: <huitema@huitema.net>
X-Original-To: architecture-discuss@ietfa.amsl.com
Delivered-To: architecture-discuss@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id D59193A0DAA for <architecture-discuss@ietfa.amsl.com>; Mon, 17 Aug 2020 08:47:10 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -2.847
X-Spam-Level:
X-Spam-Status: No, score=-2.847 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, HTML_MESSAGE=0.001, NICE_REPLY_A=-0.949, SPF_HELO_NONE=0.001, SPF_PASS=-0.001, URIBL_BLOCKED=0.001] autolearn=ham autolearn_force=no
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id M0yeFF-W_uzN for <architecture-discuss@ietfa.amsl.com>; Mon, 17 Aug 2020 08:47:09 -0700 (PDT)
Received: from mx43-out1.antispamcloud.com (mx43-out1.antispamcloud.com [138.201.61.189]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id B530B3A0EC8 for <architecture-discuss@ietf.org>; Mon, 17 Aug 2020 08:47:08 -0700 (PDT)
Received: from xse505.mail2web.com ([66.113.197.251] helo=xse.mail2web.com) by mx18.antispamcloud.com with esmtp (Exim 4.92) (envelope-from <huitema@huitema.net>) id 1k7hKw-0004n1-R6 for architecture-discuss@ietf.org; Mon, 17 Aug 2020 17:46:49 +0200
Received: from xsmtp21.mail2web.com (unknown [10.100.68.60]) by xse.mail2web.com (Postfix) with ESMTPS id 4BVd59229czVns for <architecture-discuss@ietf.org>; Mon, 17 Aug 2020 08:19:57 -0700 (PDT)
Received: from [10.5.2.14] (helo=xmail04.myhosting.com) by xsmtp21.mail2web.com with esmtps (TLS1.0:DHE_RSA_AES_256_CBC_SHA1:256) (Exim 4.92) (envelope-from <huitema@huitema.net>) id 1k7gvV-0002TW-4b for architecture-discuss@ietf.org; Mon, 17 Aug 2020 08:19:57 -0700
Received: (qmail 14629 invoked from network); 17 Aug 2020 15:19:57 -0000
Received: from unknown (HELO [192.168.1.107]) (Authenticated-user:_huitema@huitema.net@[172.58.43.0]) (envelope-sender <huitema@huitema.net>) by xmail04.myhosting.com (qmail-ldap-1.03) with ESMTPA for <architecture-discuss@ietf.org>; 17 Aug 2020 15:19:56 -0000
To: Joseph Touch <touch@strayalpha.com>, Toerless Eckert <tte@cs.fau.de>
Cc: architecture-discuss@ietf.org
References: <754DE168-DF3B-4471-A145-39C6143E538A@comcast.net> <FB381338-A278-45B2-A40B-3A065E3A3ED1@strayalpha.com> <1fd2ed7d-d4bc-c5b7-9a4a-7966d5e60513@gmail.com> <20200817074637.GW62842@faui48f.informatik.uni-erlangen.de> <60B2B44D-5E6D-4CB2-AD63-1A8CB846BFA3@strayalpha.com>
From: Christian Huitema <huitema@huitema.net>
Autocrypt: addr=huitema@huitema.net; prefer-encrypt=mutual; keydata= mDMEXtavGxYJKwYBBAHaRw8BAQdA1ou9A5MHTP9N3jfsWzlDZ+jPnQkusmc7sfLmWVz1Rmu0 J0NocmlzdGlhbiBIdWl0ZW1hIDxodWl0ZW1hQGh1aXRlbWEubmV0PoiWBBMWCAA+FiEEw3G4 Nwi4QEpAAXUUELAmqKBYtJQFAl7WrxsCGwMFCQlmAYAFCwkIBwIGFQoJCAsCBBYCAwECHgEC F4AACgkQELAmqKBYtJQbMwD/ebj/qnSbthC/5kD5DxZ/Ip0CGJw5QBz/+fJp3R8iAlsBAMjK r2tmyWyJz0CUkVG24WaR5EAJDvgwDv8h22U6QVkAuDgEXtavGxIKKwYBBAGXVQEFAQEHQJoM 6MUAIqpoqdCIiACiEynZf7nlJg2Eu0pXIhbUGONdAwEIB4h+BBgWCAAmFiEEw3G4Nwi4QEpA AXUUELAmqKBYtJQFAl7WrxsCGwwFCQlmAYAACgkQELAmqKBYtJRm2wD7BzeK5gEXSmBcBf0j BYdSaJcXNzx4yPLbP4GnUMAyl2cBAJzcsR4RkwO4dCRqM9CHpVJCwHtbUDJaa55//E0kp+gH
Message-ID: <0e575946-dfd4-7753-8c34-47987d0b3c7e@huitema.net>
Date: Mon, 17 Aug 2020 08:19:59 -0700
User-Agent: Mozilla/5.0 (Windows NT 10.0; WOW64; rv:68.0) Gecko/20100101 Thunderbird/68.11.0
MIME-Version: 1.0
In-Reply-To: <60B2B44D-5E6D-4CB2-AD63-1A8CB846BFA3@strayalpha.com>
Content-Type: multipart/alternative; boundary="------------2071ABA806FF67575C1C2484"
Content-Language: en-US
X-Originating-IP: 66.113.197.251
X-Spampanel-Domain: xsmtpout.mail2web.com
X-Spampanel-Username: 66.113.197.0/24
Authentication-Results: antispamcloud.com; auth=pass smtp.auth=66.113.197.0/24@xsmtpout.mail2web.com
X-Spampanel-Outgoing-Class: unsure
X-Spampanel-Outgoing-Evidence: Combined (0.15)
X-Recommended-Action: accept
X-Filter-ID: Mvzo4OR0dZXEDF/gcnlw0Uc1Z+hCSaILZIw3vLzlsGSpSDasLI4SayDByyq9LIhVUZbR67CQ7/vm /hHDJU4RXkTNWdUk1Ol2OGx3IfrIJKywOmJyM1qr8uRnWBrbSAGDsYLBcJLyHnVrULITPs15U6ts NHuRxlWqWR9fNqLY1ai4Dcwf+CZK8NXgy3In+fX7qYHlpECSsoxLtktFfjAAAFO05s+oip5EC/YK rMQ9+O9t+TYaqvvx766D6vBkj4PuYZsDfA+C63qRuwF/FjcGPDzNg5nLVJLqiE3T2fGty7mOo0r3 6TvtZGZKJo7Ywel+UOUPX0VHiKUyAtskn6r56i8KMZYGrZmgW9KwYivcW5A61Ks3CiInn/dDFS2W PS2yGYffiENaEvSwZ91SD/eSc+7o0ZSfcEjJYb2rnSV2fRCARv6mkfvK/UihTJjyS3/OdDr2WLJq FULjiIcCiyuiCgTQeC2dL1Bxyk8yV+29SYS0kEOL0o9EBIpturfzKMtFD1+RO9x9UH6x/+ZJK1fw q9G5tr1naPLrD+uYvNqtQnWYBq6S+OMHcfXl6o0I271KKTjECb0PwpN4olPuA0AI937kIM09yvSV B0zYhsH8AJscf1pPDHIpzyRJIAFazjKWyDxxCxxrsm1URHCkCrGekkK4G+F9iVA2rkbFj7qgW3L2 E1fQaKDDAkslbTQXAHOWL1MD8t8dBWLQjRG9dLB8kAixxLw9Tqj+m4GeC+uhnIAYOuoLOTrs2MSY MOWrSMXjQ74yPwmHuVj8tPrdUT9Gs8+ADlOi46n1PALad1UBUTOcTD53rSwSTIedTYkUaByAMod+ Su3cUNt/0umLnsd0MJoiu8eNlY3cwoWTHujvw4nfv4Rl05n4RPg8dvzcszF60JczxCjNbhVGwrVA ijGFu7zpwlGzT4HD3EMMzICh8kMVKPqpdskk5LxBR/9t1zMMNgZ00xRl+f8iOCsvtWSXGxqnOR+D xGR3qCP3ei1hX999s+yzMCxnaIvRTEOY/XUFLzItWCgLp9eSUEiS8gk+ZPjEzm1SsR8v3aJbN/NZ fa/X7fXWg6J5cHei57l/ibtd
X-Report-Abuse-To: spam@quarantine11.antispamcloud.com
Archived-At: <https://mailarchive.ietf.org/arch/msg/architecture-discuss/VbP2Zc2mo0tjtSpIlTKY5DkR9OA>
Subject: Re: [arch-d] A Public Option for the Core
X-BeenThere: architecture-discuss@ietf.org
X-Mailman-Version: 2.1.29
Precedence: list
List-Id: open discussion forum for long/wide-range architectural issues <architecture-discuss.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/architecture-discuss>, <mailto:architecture-discuss-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/architecture-discuss/>
List-Post: <mailto:architecture-discuss@ietf.org>
List-Help: <mailto:architecture-discuss-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/architecture-discuss>, <mailto:architecture-discuss-request@ietf.org?subject=subscribe>
X-List-Received-Date: Mon, 17 Aug 2020 15:47:11 -0000

On 8/17/2020 7:47 AM, Joseph Touch wrote:
> Hi, Toerless,
>
>> On Aug 17, 2020, at 12:46 AM, Toerless Eckert <tte@cs.fau.de
>> <mailto:tte@cs.fau.de>> wrote:
>>
>> Btw, IMHO: Having an application tell the network exactly what it
>> wants from the network is quite a challenging task for applications.
>> ...
>>
>> Hence we thought of a framework where the application would instead
>> attribute traffic as to what it is, e.g.: application FOO, wihthin
>> FOO floX,
>> e.g.: X = audio/video/...  Aka: Whatever the application developer
>> was able/
>> willing to tell.
>>
>> Then one can have a trusted layer that would map this information to
>> actual network service requirements/advisory information.
>
> That’s an implementation detail inside the endpoint. The *network*
> should not be doing that inference:
>
> a) because it is typically made to favor the provider, not the user
> b) because it’s often incorrect, either because the needed info isn’t
> available (encryption) or deliberately obscured (running DNS over
> ports other than 53)

At the bottom are issues of knowledge and trust. As Toerless points out,
knowledge itself is hard. Application developers have a hard time
understanding the network service that they actually want. Even examples
that appear trivial, like video, are not: the video refresh rate and the
desired definition depends on whether the video is displayed as a post
stamp, as a square in a grid, or full screen, not to mention adaptive
coding to actual images. Asking applications to label their traffic
leads to compromises.

From the provider point of view, trusting the labels set by applications
is fraught with a different kind of compromise. What if every
application pretended to be a real time service requiring super high
quality of service? What prevents the application from lying? Would that
lead to collapse? Those fears are very much there, which is why network
providers tend to rely on DPI, and not use application labels much.

In theory, labels could be trusted if the users were paying for the
extra service. In practice, paying for extra service happens very
rarely. First, there is the knowledge issue, why would applications
incur extra costs without knowing why? Then, there is the
interconnection issue. Most network paths involve several network
providers. The one with a business relation with the user might be paid
for the extra service, but what about the others? That would require an
agreed framework allowing for example traffic providers to charge the
ISP for the labelled traffic that they emit. Good luck with that.

>
> My broader concern is the latter part of the second one: I don’t like
> the impact of anti-inference strategies on network architecture. It
> tends to force designers to reinvent the Internet at other layers
> (inside HTTP, e.g.).

Or to encrypt everything, which is very much the current trend. And to
add padding and cover traffic to try defeat fingerprinting. And possibly
to deploy end-to-end FEC.


> Ultimately, there are only a few things the network can do with a
> packet: forward it, queue it, or drop it. Having classes of service
> that don’t map directly to those behaviors is an invitation for
> unnecessary state and complexity anyway.
>
> Back to neutrality, though, the point is that the *network* should be
> neutral to the user and use of a service, not that there should be
> only one service.

I don't know that. Given the knowledge and trust issue,
one-size-fits-all looks actually very practical. That does mean a
compromise, because the network should allow those applications that
want low latency to get it, but should not limit the bandwidth that
applications can use if it is available. That probably requires more
research and development in active queue management, and in congestion
control algorithms that can cooperate with active queue management and
deliver the profile that fits the application.

-- Christian Huitema