Re: [Detnet] Alvaro Retana's Discuss on draft-ietf-detnet-architecture-11: (with DISCUSS and COMMENT)

Lou Berger <lberger@labn.net> Sat, 23 February 2019 21:01 UTC

Return-Path: <lberger@labn.net>
X-Original-To: detnet@ietfa.amsl.com
Delivered-To: detnet@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 06D6D130EE5 for <detnet@ietfa.amsl.com>; Sat, 23 Feb 2019 13:01:37 -0800 (PST)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -1.807
X-Spam-Level:
X-Spam-Status: No, score=-1.807 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, DKIM_SIGNED=0.1, DKIM_VALID=-0.1, HTML_MESSAGE=0.001, HTML_OBFUSCATE_10_20=0.093, RCVD_IN_MSPIKE_H2=-0.001, SPF_PASS=-0.001, URIBL_BLOCKED=0.001] autolearn=no autolearn_force=no
Authentication-Results: ietfa.amsl.com (amavisd-new); dkim=pass (768-bit key) header.d=labn.net
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id tGY3eYU6k2WU for <detnet@ietfa.amsl.com>; Sat, 23 Feb 2019 13:01:35 -0800 (PST)
Received: from gproxy3-pub.mail.unifiedlayer.com (gproxy3-pub.mail.unifiedlayer.com [69.89.30.42]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id 157E8130ECD for <detnet@ietf.org>; Sat, 23 Feb 2019 13:01:35 -0800 (PST)
Received: from CMGW (unknown [10.9.0.13]) by gproxy3.mail.unifiedlayer.com (Postfix) with ESMTP id 8A0AC406B2 for <detnet@ietf.org>; Sat, 23 Feb 2019 13:39:51 -0700 (MST)
Received: from box313.bluehost.com ([69.89.31.113]) by cmsmtp with ESMTP id xe5PgpEgjeyBxxe5PgNk2h; Sat, 23 Feb 2019 13:39:51 -0700
X-Authority-Reason: nr=8
DKIM-Signature: v=1; a=rsa-sha256; q=dns/txt; c=relaxed/relaxed; d=labn.net; s=default; h=Content-Type:In-Reply-To:MIME-Version:Date:Message-ID:From: References:Cc:To:Subject:Sender:Reply-To:Content-Transfer-Encoding:Content-ID :Content-Description:Resent-Date:Resent-From:Resent-Sender:Resent-To: Resent-Cc:Resent-Message-ID:List-Id:List-Help:List-Unsubscribe:List-Subscribe :List-Post:List-Owner:List-Archive; bh=+uPMnwykIpNDTfV+WT0R8PGq/vALfLPsjWp1aSfUJt4=; b=P+q5Eq92X++WfB9t6tqqXK6csM Bp1teQIbKcQpfW6YEm6t9artVNhx3/+6OVt7BITg61MUo+uG85HAHbCjm0P/lXFu0u+DknaKBZN6W 3fgSOmzQMiHsZ4JnQwVFdpC7Q;
Received: from pool-72-66-11-201.washdc.fios.verizon.net ([72.66.11.201]:38774 helo=[IPv6:::1]) by box313.bluehost.com with esmtpsa (TLSv1.2:ECDHE-RSA-AES128-GCM-SHA256:128) (Exim 4.91) (envelope-from <lberger@labn.net>) id 1gxe5M-003nBT-Dd; Sat, 23 Feb 2019 13:39:51 -0700
To: Alvaro Retana <aretana.ietf@gmail.com>, The IESG <iesg@ietf.org>
Cc: draft-ietf-detnet-architecture@ietf.org, detnet@ietf.org, detnet-chairs@ietf.org
References: <155067820715.31361.3746519237969586434.idtracker@ietfa.amsl.com> <108f9294-fb9d-557a-011a-6a53156bcb37@labn.net> <CAMMESsx4juKOjPNPQW2iLDYRC6REr8jKWLJLBDUt-AsmC-eFmA@mail.gmail.com> <7056c886-3aa9-2d85-7824-ee5f1ac9bb33@labn.net> <CAMMESszvQ-QgZLNfPF2MMq6UNtCR5DLzhMvzuFF_eCiyUiu5qg@mail.gmail.com>
From: Lou Berger <lberger@labn.net>
Message-ID: <f647a19c-584f-6a34-77d5-702d26d31013@labn.net>
Date: Sat, 23 Feb 2019 15:39:12 -0500
User-Agent: Mozilla/5.0 (Windows NT 10.0; WOW64; rv:60.0) Gecko/20100101 Thunderbird/60.3.1
MIME-Version: 1.0
In-Reply-To: <CAMMESszvQ-QgZLNfPF2MMq6UNtCR5DLzhMvzuFF_eCiyUiu5qg@mail.gmail.com>
Content-Type: multipart/alternative; boundary="------------14BCA084D4D9DEB70C9FEF59"
Content-Language: en-US
X-AntiAbuse: This header was added to track abuse, please include it with any abuse report
X-AntiAbuse: Primary Hostname - box313.bluehost.com
X-AntiAbuse: Original Domain - ietf.org
X-AntiAbuse: Originator/Caller UID/GID - [47 12] / [47 12]
X-AntiAbuse: Sender Address Domain - labn.net
X-BWhitelist: no
X-Source-IP: 72.66.11.201
X-Source-L: No
X-Exim-ID: 1gxe5M-003nBT-Dd
X-Source:
X-Source-Args:
X-Source-Dir:
X-Source-Sender: pool-72-66-11-201.washdc.fios.verizon.net ([IPv6:::1]) [72.66.11.201]:38774
X-Source-Auth: lberger@labn.net
X-Email-Count: 10
X-Source-Cap: bGFibm1vYmk7bGFibm1vYmk7Ym94MzEzLmJsdWVob3N0LmNvbQ==
X-Org: HG=bhcustomer;ORG=bluehost;
X-Local-Domain: yes
Archived-At: <https://mailarchive.ietf.org/arch/msg/detnet/Zoou_Qez6nqAqgga8sDP9sxAM30>
Subject: Re: [Detnet] Alvaro Retana's Discuss on draft-ietf-detnet-architecture-11: (with DISCUSS and COMMENT)
X-BeenThere: detnet@ietf.org
X-Mailman-Version: 2.1.29
Precedence: list
List-Id: Discussions on Deterministic Networking BoF and Proposed WG <detnet.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/detnet>, <mailto:detnet-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/detnet/>
List-Post: <mailto:detnet@ietf.org>
List-Help: <mailto:detnet-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/detnet>, <mailto:detnet-request@ietf.org?subject=subscribe>
X-List-Received-Date: Sat, 23 Feb 2019 21:01:37 -0000

Hi *Alvaro*,

see below.

On 2/22/2019 6:02 AM, Alvaro Retana wrote:
> On February 21, 2019 at 7:35:32 PM, Lou Berger (lberger@labn.net 
> <mailto:lberger@labn.net>) wrote:
>
> Hi!
>
>> >>> ----------------------------------------------------------------------
>> >>> DISCUSS:
>> >>> 
>> ----------------------------------------------------------------------
>> >>>
>> >>> I support Mirja's and Alissa's DISCUSSes...and have a related set 
>> of concerns
>> >>> about the coexistence with non-DetNet traffic and privacy:
>> >>>
>> >>> §3.3.1 talks about what I think is a hard to achieve balance 
>> between coexisting
>> >>> with non-DetNet traffic and keeping that traffic from disrupting 
>> DetNet flows.
>> >>> Because of the constraints, the intent of prioritizing DetNet 
>> flows is clear
>> >>> (and that is ok), but that may result in starvation of non-DetNet
>> >>> traffic...even if the text does explicitly say that it "must be 
>> avoided".
>> >>>
>> >>> I would like to see the potential case of starving non-DetNet 
>> traffic called
>> >>> out somewhere.
>> >>
>> >> This is the objective of section 3.3.1..
>> >>
>> >>
>> >>> I'm looking for something similar to the first paragraph in §5,
>> >>> but focused on the non-DetNet traffic.
>> >>
>> >> The current text reads:
>> >>
>> >> 3.3.1. Coexistence with normal traffic
>> >>
>> >> A DetNet network supports the dedication of a high proportion of the
>> >> network bandwidth to DetNet flows. But, no matter how much is
>> >> dedicated for DetNet flows, it is a goal of DetNet to coexist with
>> >> existing Class of Service schemes (e.g., DiffServ). It is also
>> >> important that non-DetNet traffic not disrupt the DetNet flow, of
>> >> course (see Section 3.3.2 and Section 5). For these reasons:
>> >>
>> >> o Bandwidth (transmission opportunities) not utilized by a DetNet
>> >> flow is available to non-DetNet packets (though not to other
>> >> DetNet flows).
>> >>
>> >> o DetNet flows can be shaped or scheduled, in order to ensure that
>> >> the highest-priority non-DetNet packet is also ensured a worst-
>> >> case latency.
>> >>
>> >> o When transmission opportunities for DetNet flows are scheduled in
>> >> detail, then the algorithm constructing the schedule should leave
>> >> sufficient opportunities for non-DetNet packets to satisfy the
>> >> needs of the users of the network. Detailed scheduling can also
>> >> permit the time-shared use of buffer resources by different DetNet
>> >> flows.
>> >>
>> >> Starvation of non-DetNet traffic must be avoided, e.g., by traffic
>> >> policing functions (e.g., [RFC2475]). Thus, the net effect of the
>> >> presence of DetNet flows in a network on the non-DetNet flows is
>> >> primarily a reduction in the available bandwidth.
>> >>
>> >>
>> >> I think we need a little bit more to understand what you'd like to 
>> see changed or added. Can you suggest text or what specific topic 
>> you'd like to see added/addressed?
>> >
>> > Yes, let me try to explain better…while comparing with the current
>> > text in §5, which basically says that even though the objective of
>> > DetNet is to provide bounded latency, a MIIM may delay the traffic and
>> > the objective may not be achieved.
>> >
>> > For non-DetNet traffic, the objective is to not starve it, while
>> > providing specific guarantees to the DetNet flows — said other way
>> > (from the Introduction): "Unused reserved resources are available to
>> > non-DetNet packets as long as all guarantees are fulfilled.”  However,
>> > the algorithms (maybe error, misconfiguration…or even maliciously) may
>> > end up*not* constructing the schedule to leave sufficient
>> > opportunities for non-DetNet packets (as suggested in the text above
>> > from §3.3.1).
>> >
>> > I see a parallel in how there is a risk of the intention for DetNet
>> > flows not being met (because of an attack) and how the intention for
>> > non-DetNet traffic may also not be met.
>> >
>> Okay, this sounds like basically the same point that Benjamin was
>> making, i.e., there must be mechanisms preventing non-detnet traffic
>> from impacting detnet traffic, and detnet traffic trying to use more
>> than its allocation and impacting non-detnet traffic. Is this correct or
>> are you asking for something different/additional?
>
> Yes.  I’m not asking so much for a mechanism, but for at least the 
> recognition that it is a risk.
>
Fair enough- I expect the response a response for the architecture and 
security draft authors to address this.  I'm sure you will confirm that 
it does!


>>
>>
>>
>> >
>> >>> Related to the above is the fact that the identification of flows 
>> could be used
>> >>> to specifically *not* include some of them as DetNet flows. This is a
>> >>> variation of the concern outlined in §6, but applied to 
>> non-DetNet flows, with
>> >>> the potential starvation mentioned above. Again, I would like to 
>> at least see
>> >>> some discussion of this risk.
>> >>
>> >> I don't follow - what is the risk that should be addressed?
>> >>
>> > §6 talks about potential privacy concerns due to the identification of
>> > flows.  I interpret that as potentially being able to identify the
>> > user (application, or both maybe).
>> >
>> Currently flow identification is based on IP headers (6 tuple) and/or
>> MPLS labels.  So DetNet has the same privacy concerns as standard 
>> IP/MPLS.
>>
>>
>> > As far as I understand the architecture, DetNet flows are identified
>> > at the edge and then assigned to specific paths. If the
>> > identification of flows can be used to identify the user (for
>> > example), then it can be used to not only attack specific DetNet flow,
>> > but also to decide to not provide guarantees to a specific flow based
>> > on who the user or the application may be.
>> >
>> Given DetNet flow identification, is this any different than standard 
>> PBR?
>
> Right, it is not really different.  It is just not mentioned anywhere 
> that identification (or misidentification as it may be, maybe 
> maliciously) can lead to not providing guarantees, potential starving, 
> etc..
>
I thought the quotes capture in the various mails on the topic showed 
how it was -- but let's wait for the updated text and see if it 
sufficiently addresses your concern/point, and then go from there.

Thanks again for the feedback.

Lou


> Thanks!
>
> Alvaro.
>
>
> _______________________________________________
> detnet mailing list
> detnet@ietf.org
> https://www.ietf.org/mailman/listinfo/detnet