Re: [Detnet] Benjamin Kaduk's Discuss on draft-ietf-detnet-architecture-11: (with DISCUSS and COMMENT)

Benjamin Kaduk <kaduk@mit.edu> Mon, 04 March 2019 03:41 UTC

Return-Path: <kaduk@mit.edu>
X-Original-To: detnet@ietfa.amsl.com
Delivered-To: detnet@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 47C51130F41; Sun, 3 Mar 2019 19:41:42 -0800 (PST)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -1.7
X-Spam-Level:
X-Spam-Status: No, score=-1.7 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, DKIM_INVALID=0.1, DKIM_SIGNED=0.1, RCVD_IN_DNSWL_NONE=-0.0001, SPF_PASS=-0.001, URIBL_BLOCKED=0.001] autolearn=no autolearn_force=no
Authentication-Results: ietfa.amsl.com (amavisd-new); dkim=fail (1024-bit key) reason="fail (body has been altered)" header.d=mit.edu
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id 8wXCkd7oxhsf; Sun, 3 Mar 2019 19:41:39 -0800 (PST)
Received: from NAM03-CO1-obe.outbound.protection.outlook.com (mail-eopbgr790129.outbound.protection.outlook.com [40.107.79.129]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-SHA384 (256/256 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id 5DB57130F40; Sun, 3 Mar 2019 19:41:39 -0800 (PST)
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=mit.edu; s=selector1; h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-SenderADCheck; bh=OCyfYOyuqQ964kvEx+QCHXGlgqOZyjUm7nJjTSzbxLQ=; b=AENWIA8RfXSb75CAo8ZYKp4pW7/TDjG/y1VOLdLkK78qlLeqw/cTkWrxmeGVoMEkCXB8JCsyrnvnm9wC4RQ6JU2U8AjDKM6KKuf4zgWVDxzLKwkPvAbJ9ZscaWwF8FkFKUod+TzsIiHDIc/oZ+78SfKnQADsYuZsQdFXICfXJBs=
Received: from SN6PR0102CA0033.prod.exchangelabs.com (2603:10b6:805:1::46) by BN6PR01MB3282.prod.exchangelabs.com (2603:10b6:404:d3::15) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id 15.20.1665.19; Mon, 4 Mar 2019 03:41:37 +0000
Received: from BY2NAM03FT003.eop-NAM03.prod.protection.outlook.com (2a01:111:f400:7e4a::207) by SN6PR0102CA0033.outlook.office365.com (2603:10b6:805:1::46) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA384) id 15.20.1665.16 via Frontend Transport; Mon, 4 Mar 2019 03:41:36 +0000
Authentication-Results: spf=pass (sender IP is 18.9.28.11) smtp.mailfrom=mit.edu; ietf.org; dkim=none (message not signed) header.d=none;ietf.org; dmarc=bestguesspass action=none header.from=mit.edu;
Received-SPF: Pass (protection.outlook.com: domain of mit.edu designates 18.9.28.11 as permitted sender) receiver=protection.outlook.com; client-ip=18.9.28.11; helo=outgoing.mit.edu;
Received: from outgoing.mit.edu (18.9.28.11) by BY2NAM03FT003.mail.protection.outlook.com (10.152.84.105) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA384) id 15.20.1643.13 via Frontend Transport; Mon, 4 Mar 2019 03:41:35 +0000
Received: from kduck.mit.edu (24-107-191-124.dhcp.stls.mo.charter.com [24.107.191.124]) (authenticated bits=56) (User authenticated as kaduk@ATHENA.MIT.EDU) by outgoing.mit.edu (8.14.7/8.12.4) with ESMTP id x243fWGK018367 (version=TLSv1/SSLv3 cipher=DHE-RSA-AES256-GCM-SHA384 bits=256 verify=NOT); Sun, 3 Mar 2019 22:41:34 -0500
Date: Sun, 03 Mar 2019 21:41:31 -0600
From: Benjamin Kaduk <kaduk@mit.edu>
To: János Farkas <janos.farkas@ericsson.com>
CC: The IESG <iesg@ietf.org>, draft-ietf-detnet-architecture@ietf.org, Lou Berger <lberger@labn.net>, detnet-chairs@ietf.org, DetNet WG <detnet@ietf.org>
Message-ID: <20190304034131.GN53396@kduck.mit.edu>
References: <155063426136.20704.6779201119170972943.idtracker@ietfa.amsl.com> <1cd55c7d-6d1c-b56f-38d3-d6bd78b004e2@ericsson.com>
MIME-Version: 1.0
Content-Type: text/plain; charset="iso-8859-1"
Content-Disposition: inline
Content-Transfer-Encoding: 8bit
In-Reply-To: <1cd55c7d-6d1c-b56f-38d3-d6bd78b004e2@ericsson.com>
User-Agent: Mutt/1.10.1 (2018-07-13)
X-EOPAttributedMessage: 0
X-Forefront-Antispam-Report: CIP:18.9.28.11; IPV:CAL; SCL:-1; CTRY:US; EFV:NLI; SFV:NSPM; SFS:(10019020)(979002)(346002)(376002)(39860400002)(136003)(396003)(2980300002)(199004)(189003)(75432002)(6306002)(2906002)(104016004)(58126008)(316002)(786003)(55016002)(446003)(47776003)(305945005)(14444005)(26005)(6666004)(5660300002)(7696005)(8936002)(23756003)(30864003)(76176011)(50466002)(356004)(26826003)(36906005)(106002)(106466001)(54906003)(478600001)(126002)(246002)(53546011)(6916009)(966005)(486006)(229853002)(33656002)(6246003)(476003)(53416004)(8676002)(186003)(1076003)(86362001)(4326008)(66574012)(11346002)(2870700001)(88552002)(426003)(336012)(956004)(969003)(989001)(999001)(1009001)(1019001); DIR:OUT; SFP:1102; SCL:1; SRVR:BN6PR01MB3282; H:outgoing.mit.edu; FPR:; SPF:Pass; LANG:en; PTR:outgoing-auth-1.mit.edu; A:1; MX:1;
X-MS-PublicTrafficType: Email
X-MS-Office365-Filtering-Correlation-Id: 008f7bf3-5348-4c93-ebdb-08d6a0534d94
X-Microsoft-Antispam: BCL:0; PCL:0; RULEID:(2390118)(7020095)(4652040)(8989299)(4534185)(4627221)(201703031133081)(201702281549075)(8990200)(5600127)(711020)(4605104)(4608103)(4709054)(2017052603328)(7153060); SRVR:BN6PR01MB3282;
X-MS-TrafficTypeDiagnostic: BN6PR01MB3282:
X-MS-Exchange-PUrlCount: 3
X-Microsoft-Exchange-Diagnostics: 1; BN6PR01MB3282; 20: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
X-Microsoft-Antispam-PRVS: <BN6PR01MB328218C2C0BA8F844056AC23A0710@BN6PR01MB3282.prod.exchangelabs.com>
X-Forefront-PRVS: 09669DB681
X-Microsoft-Exchange-Diagnostics: 1; BN6PR01MB3282; 23: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
X-MS-Exchange-SenderADCheck: 1
X-Microsoft-Antispam-Message-Info: U6p+UYQh487vPIWdzbg0sP/TSdgPVrg7qgSXzxTmC1f1Sks/gwe+UEXkSjdVIvcGfOMNV4tgX3jCx1jMTaCkwU3PfZWgPu76swBlDA0E1gbg7dlnN0qwxf47zKQTHcexHdP9XTXR+IgkMry0uvDdlnIGK82HkaGG+ImEmWHS3xb/oab32ybsUpYyJv6CiDM1p7dYXcSD3PGxIR2qYZ5kbUOy8kvy0qud1vsZ/0wVD6ZhCmYmXQkQkwTGq0tHQ0d9OjdV1MvEgRxv3sSiFQXp0JTLoyWFkHFsz4UDOV75w/tcknjkjgbKzev9JiGGcFDNeoL0jhrG2IY7HNQ5GmUhDImRhpgGmxkv/b49h7zhCW5+rP2g63Wy+7OsuP2lTeYlnv8oZIEc6jEjuIJmvla8nMkNz5NH55M/MDjUYNbuNLo=
X-OriginatorOrg: mit.edu
X-MS-Exchange-CrossTenant-OriginalArrivalTime: 04 Mar 2019 03:41:35.9055 (UTC)
X-MS-Exchange-CrossTenant-Network-Message-Id: 008f7bf3-5348-4c93-ebdb-08d6a0534d94
X-MS-Exchange-CrossTenant-Id: 64afd9ba-0ecf-4acf-bc36-935f6235ba8b
X-MS-Exchange-CrossTenant-OriginalAttributedTenantConnectingIp: TenantId=64afd9ba-0ecf-4acf-bc36-935f6235ba8b; Ip=[18.9.28.11]; Helo=[outgoing.mit.edu]
X-MS-Exchange-CrossTenant-FromEntityHeader: HybridOnPrem
X-MS-Exchange-Transport-CrossTenantHeadersStamped: BN6PR01MB3282
Archived-At: <https://mailarchive.ietf.org/arch/msg/detnet/-L_wsGPMqNEOtPMgsGYaJ30nFXk>
Subject: Re: [Detnet] Benjamin Kaduk's Discuss on draft-ietf-detnet-architecture-11: (with DISCUSS and COMMENT)
X-BeenThere: detnet@ietf.org
X-Mailman-Version: 2.1.29
Precedence: list
List-Id: Discussions on Deterministic Networking BoF and Proposed WG <detnet.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/detnet>, <mailto:detnet-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/detnet/>
List-Post: <mailto:detnet@ietf.org>
List-Help: <mailto:detnet-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/detnet>, <mailto:detnet-request@ietf.org?subject=subscribe>
X-List-Received-Date: Mon, 04 Mar 2019 03:41:42 -0000

On Sat, Mar 02, 2019 at 09:12:23PM +0100, János Farkas wrote:
> Hi Benjamin,
> 
> Coming to your detailed comments.
> Please see in-line.
> 
> Thank you,
> Janos
> 
> 
> On 2/20/2019 4:44 AM, Benjamin Kaduk wrote:
> > ----------------------------------------------------------------------
> > COMMENT:
> > ----------------------------------------------------------------------
> >
> >
> >
> > Abstract
> >
> >                                   DetNet operates at the IP layer and
> >     delivers service over sub-network technologies such as MPLS and IEEE
> >     802.1 Time-Sensitive Networking (TSN).
> >
> > I don't know what "sub-network technologies" means.  (Should I?  Is it
> > defined somewhere we can reference?)
> >
> > More generally, is DetNet supposed to be a "sub-layer" and/or "sub-network"
> > that lies between specific layers or classes of layer?  Does DetNet
> > itself have component "sub-layers" that provide distinct DetNet
> > functionality?  These are good questions to address early on in the
> > document so the reader is familiar with the concepts as they progress
> > through the document.
> Please note that the WG has reached consensus on introducing the term 
> "sub-layer", in particular using the terms "DetNet Service sub-layer" 
> and DetNet Forwarding sub-layer", see: 
> https://mailarchive.ietf.org/arch/msg/detnet/TR6oXu7IMWhelrH_I-tOuHGfDqo.
> These are explained in detail in Section 4. DetNet Architecture. I do 
> not see how to bring it earlier in the document.

That's a fair point.  I guess I would consider adding a Terminology entry
for "Sub-layer" that notes that "The DetNet architecture divides the DetNet
functionality into two sub-layers, the forwarding sub-layer and the service
sub-layer.", but use your judgement.

> Section 4. DetNet Architecture also explains what is meant by 
> sub-network. Figure 3 shows it and the text above Figure 3 explains.
> I don't see how could be this explanation earlier in the document.
> 
> As for the abstract, would it help to replace?:
> 
> OLD:
> DetNet operates at the IP layer and
>     delivers service over sub-network technologies such as MPLS and IEEE
>     802.1 Time-Sensitive Networking (TSN).
> 
> with
> 
> NEW:
> DetNet operates at the IP layer and
>     delivers service over lower layer technologies such as MPLS and IEEE
>     802.1 Time-Sensitive Networking (TSN).
> 
> Similar replacement could be done in the introduction:
> 
> OLD:
>     DetNet operates at the IP layer and delivers service over sub-network
>     technologies such as MPLS and IEEE 802.1 Time-Sensitive Networking
>     (TSN).
> 
> NEW:
>     DetNet operates at the IP layer and delivers service over lower layer
>     technologies such as MPLS and IEEE 802.1 Time-Sensitive Networking
>     (TSN).
> 
> 
> The next occurrence of sub-network is with a cross-reference to the 
> section with Figure 3 and description. I think it is fine this way as 
> the reader can jump there and check the details.

I agree; these two replacements in abstract+introduction would alleviate
the main question of whether this usage is some existing well-known thing
that the reader should be familiar with, and the rest of the document is
well-contained.

> 
> >
> > Section 1
> >
> >                            DetNet is for networks that are under a single
> >     administrative control or within a closed group of administrative
> >     control; these include campus-wide networks and private WANs.  DetNet
> >     is not for large groups of domains such as the Internet.
> >
> > side note: Campus-wide networks at educational institutions are basically
> > guaranteed to have untrusted entities participating in them, just as a
> > backdrop for security considerations.
> >
> > Section 3.1
> >
> >                          This mechanism distributes the contents of
> >     DetNet flows over multiple paths in time and/or space, so that the
> >     loss of some of the paths does need not cause the loss of any
> >
> > The failure models for which this statement is absolutely true as opposed
> > to probabilistically true seem rather unrealistic models of real physical
> > systems.
> >
> > Section 3.2.1.1
> >
> >     The primary means by which DetNet achieves its QoS assurances is to
> >     reduce, or even completely eliminate packet loss due to output packet
> >     contention within a DetNet node as a cause of packet loss.  [...]
> >
> > editing error?
> >
> >                                       Note that App-flows are generally
> >     not expected to be responsive to implicit [RFC2914] or explicit
> >     congestion notification [RFC3168].
> >
> > I note that the word "implicit" does not appear in RFC 2914; it may be
> > worth a bit more detailed of a mapping from concept to reference.
> > (This text/reference also appears in Section 4.3.2.)
> Would it help to change the text?:
> 
> OLD:
>     There is no expectation in DetNet for App-flows to be responsive to
>     implicit [RFC2914] or explicit congestion notification [RFC3168].
> 
> NEW:
>     There is no expectation in DetNet for App-flows to be responsive to
>     congestion control [RFC2914] or explicit congestion notification 
> [RFC3168].

Sure, thanks.

> 
> >
> > Section 3.2.1.2
> >
> >                                                                     In
> >     general, users are encouraged to use, instead of, "do this when you
> >     get the packet," a combination of:
> >
> > It seems that an architecture would be within its rights to *mandate* such
> > application design, rather than just encourage it.  What sorts of
> > exceptions would cause us to not want to mandate this design?
> This is not mandatory.
> For instance, it is not mandatory to use time synchronization. There may 
> be DetNet services that do not require time synchronization.

I was basically asking if you could list an example for me (here in email,
not necessarily in the document).

> 
> >
> > Section 3.2.2.2
> >
> > Please expand SRLG (it is only used once, so the abbreviation itself may
> > not be needed at all).
> Replace "SRLG" with "Shared Risk Link Group (SRLG)"
> 
> >
> > Section 3.2.3
> >
> >     Out-of-order packet delivery can be a side effect of distributing a
> >     single flow over multiple paths especially when there is a change
> >     from one path to another when combining the flow.  [...]
> >
> > nit: comma before "especially".
> Add comma.
> 
> >
> >     Resource allocation
> >             The DetNet forwarding sub-layer provides resource allocation.
> >             See Section 4.5.  The actual queuing and shaping mechanisms
> >             are typically provided by underlying subnet, these can be
> >
> > nit: is this usage of "subnet" common?
> Figure 3 shows it and the text above Figure 3 explains sub-net.
> 
> > Also, this comma looks to be a comma splice.
> Make it two sentences.
> 
> >
> >             closely associated with the means of providing paths for
> >             DetNet flows, the path and the resource allocation are
> >             conflated in this figure.
> >
> > nit: Hmm, actually, is this comma *also* a comma splice?
> Make it two sentences.
> 
> >
> >     Operations, Administration, and Maintenance (OAM) leverages in-band
> >     and out-of-band signaling that validates whether the service is
> >     effectively obtained within QoS constraints.  [...]
> >
> > nit: is there a singular/plural mismatch here ("the service"/"service" vs.
> > "effectively within"/"effectively obtained within")?
> Seems good to me.
> 
> >
> > Section 4.1.1
> >
> > This figure would have helped me a lot several sections earlier.
> >
> > Section 4.1.2
> >
> >     A "Deterministic Network" will be composed of DetNet enabled end
> >     systems, DetNet edge nodes, DetNet relay nodes and collectively
> >     deliver DetNet services.  DetNet relay and edge nodes are
> >
> > Nit: I think this is intended to be:
> > A "Deterministic Network" will be composed of DetNet-enabled end
> > systems, DetNet edge nodes, and DetNet relay nodes, which collectively
> > deliver DetNet services.  DetNet relay and edge nodes are
> Fine by me to make the cahnge.
> 
> >
> >                                                               Examples of
> >     sub-networks include MPLS TE, IEEE 802.1 TSN and OTN.  [...]
> >
> > nit: are these sub-networks or protocols used by sub-networks?
> These are sub-network technologies. They may include/use multiple protocols.

Should this be "examples of sub-networking technologies" then?

> 
> >
> >     Distinguishing the function of two DetNet data plane sub-layers, the
> >     DetNet service sub-layer and the DetNet forwarding sub-layer, helps
> >     to explore and evaluate various combinations of the data plane
> >     solutions available, some are illustrated in Figure 4.  This
> >
> > nit: this last comma is a comma splice.
> Suggest to replace with:
> "DetNet data plane is divided into two sub-layers: the
> DetNet service sub-layer and the DetNet forwarding sub-layer.
> This helps to explore and evaluate various combinations of the data plane
> solutions available. Some of them are illustrated in Figure 4."
> (https://mailarchive.ietf.org/arch/msg/detnet/JvPTAFVTJwxjhzZYEF9uCnUTFBA)

Thanks.

> >
> >     There are many valid options to create a data plane solution for
> >     DetNet traffic by selecting a technology approach for the DetNet
> >     service sub-layer and also selecting a technology approach for the
> >     DetNet forwarding sub-layer.  There are a high number of valid
> >     combinations.
> >
> > nit: I think "large number" is more conventional prose.
> Replace "high number" with "large number".
> 
> >
> > Section 4.3.1
> >
> > I think I'm confused about how, for these flows that "require the <foo>
> > feature", whether that means that the DetNet implementation must provide
> > <foo>, or that it is required for the application to have implemented the
> > <foo> feature.  A mapping (if it makes sense) to the categorization of end
> > systems in Section 4.2.1 would be a big help.
> The notation is crafted such that to provide mapping.

I inferred that intent, yet.  I'm claiming that "It only requires" confused
me about which entity required what.  Changing to "It only uses" would
remove that confusion (but would implicitly deny the ability for
opportunistic use of other features, so is not a perfect replacement).

> 
> >
> > Section 4.3.2
> >
> >     Asynchronous DetNet flows are characterized by:
> >
> >     o  A maximum packet size;
> >
> >     o  An observation interval; and
> >
> >     o  A maximum number of transmissions during that observation
> >        interval.
> >
> > Is there necessarily only a single tier of observation interval/rate?
> > (E.g., could there be a burst cap in a small interval and then a lower
> > overall baseline rate over large intervals?)
> We intentionally have a simple model here.

OK.

> 
> >
> >                       That is, while any useful application is written to
> >     expect a certain number of lost packets, the real-time applications
> >     of interest to DetNet demand that the loss of data due to the network
> >     is a rare event.
> >
> > (I might even go with "vanishingly rare".)
> Yes, there are extremely low loss requirements in certain use cases. 
> That's why we have PREOF.
> 
> >
> > Section 4.4.1
> >
> > (Is there a standard reference for "Northbound"?  I know we're all used to
> > it, but it's probably best to have a reference if we can.)
> RFC7426 is a reference. It is cited at the very beginning of the section.
> 
> >
> > Section 4.4.2
> >
> >                                           The deterministic sequence can
> >     typically be more complex than a direct sequence and include
> >     redundancy path, with one or more packet replication and elimination
> >     points.  [...]
> >
> > nit: "redundancy paths", plural?
> 
> Replace "redundancy paths", "redundant paths".
> 
> 
> >
> > Section 4.8
> >
> > How does *provisioning* require knowledge of *dynamic* state?
> I guess the idea was that the resource may change dynamically.
> 
> Would it help to delete "dynamic"?
> Thus get: "The state of a DetNet node's DetNet resources."

That would probably help, yes.  Maybe even "The current state", but I
didn't think about it very hard.

> >
> > Section 4.9
> >
> > Does aggregation like this pose a risk of all the aggregatees getting
> > affected when one exceeds their allocation substantially (so as to also
> > cause the aggregate to exceed the aggregate's allocation)?
> One way could be to apply rate limitation for each member flow being 
> aggregated at the input of the aggregate flow. The need to apply rate 
> limitation is explained at multiple places in the document.

OK

> >
> > Section 6
> >
> > The ability for an attacker to use QoS markings as part of traffic
> > correlation/inspection is not new with DetNet, but is probably still worth
> > mentioning explicitly.
> Do you mean mention it in Section 5 Security Considerations?

That's not what I had in mind, no. I was thinking

OLD:
   DetNet is provides a Quality of Service (QoS), and as such, does not
   directly raise any new privacy considerations.

NEW:
   DetNet provides a Quality of Service (QoS) mechanism, and the generic
   considerations for such mechanisms apply.  In particular, such markings
   allow for an attacker to correlate flows or to select particular types
   of flow for more detailed inspection.

> The text in my previous mail 
> (https://mailarchive.ietf.org/arch/msg/detnet/mOzgdXOJ5lGr4gLBGAapYt6Azl8) 
> has a paragraph starting:
> "To provide uninterrupted availability of the DetNet quality of service, 
> provisions must be made against DOS attacks and delay attacks."
> 
> Would it be good to extend that paragraph with a sentence, e.g.,?: 
> "Malicious QoS marking should be also considered".

I wouldn't oppose something like that, but it may not be needed in the
architecture document (as opposed to the documents that actually describe
the QoS markings).

-Benjamin