Re: [Int-area] Per-Application Networking Considerations

Jiayihao <jiayihao@huawei.com> Fri, 19 March 2021 14:21 UTC

Return-Path: <jiayihao@huawei.com>
X-Original-To: int-area@ietfa.amsl.com
Delivered-To: int-area@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 69F063A16B2; Fri, 19 Mar 2021 07:21:05 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -1.919
X-Spam-Level:
X-Spam-Status: No, score=-1.919 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, HTML_MESSAGE=0.001, RCVD_IN_MSPIKE_H3=-0.01, RCVD_IN_MSPIKE_WL=-0.01, SPF_HELO_NONE=0.001, SPF_PASS=-0.001] autolearn=ham autolearn_force=no
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id iwk-qaogOnVy; Fri, 19 Mar 2021 07:21:02 -0700 (PDT)
Received: from frasgout.his.huawei.com (frasgout.his.huawei.com [185.176.79.56]) (using TLSv1.2 with cipher AECDH-AES256-SHA (256/256 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id 387273A169B; Fri, 19 Mar 2021 07:21:02 -0700 (PDT)
Received: from fraeml706-chm.china.huawei.com (unknown [172.18.147.226]) by frasgout.his.huawei.com (SkyGuard) with ESMTP id 4F25Y11rT3z680g5; Fri, 19 Mar 2021 22:16:21 +0800 (CST)
Received: from dggemi710-chm.china.huawei.com (10.3.20.109) by fraeml706-chm.china.huawei.com (10.206.15.55) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256_P256) id 15.1.2106.2; Fri, 19 Mar 2021 15:20:58 +0100
Received: from dggemi759-chm.china.huawei.com (10.1.198.145) by dggemi710-chm.china.huawei.com (10.3.20.109) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256_P256) id 15.1.2106.2; Fri, 19 Mar 2021 22:20:56 +0800
Received: from dggemi759-chm.china.huawei.com ([10.1.198.145]) by dggemi759-chm.china.huawei.com ([10.1.198.145]) with mapi id 15.01.2106.013; Fri, 19 Mar 2021 22:20:56 +0800
From: Jiayihao <jiayihao@huawei.com>
To: "draft-per-app-networking-considerations@ietf.org" <draft-per-app-networking-considerations@ietf.org>, int-area <int-area@ietf.org>
Thread-Topic: Re: [Int-area] Per-Application Networking Considerations
Thread-Index: AdccyuUwJiKI0lenSGuPGorzYVQP2Q==
Date: Fri, 19 Mar 2021 14:20:56 +0000
Message-ID: <f54346e4d5f24aeeabc78cb0b6bbf3a6@huawei.com>
Accept-Language: en-US
Content-Language: zh-CN
X-MS-Has-Attach:
X-MS-TNEF-Correlator:
x-originating-ip: [10.45.172.128]
Content-Type: multipart/alternative; boundary="_000_f54346e4d5f24aeeabc78cb0b6bbf3a6huaweicom_"
MIME-Version: 1.0
X-CFilter-Loop: Reflected
Archived-At: <https://mailarchive.ietf.org/arch/msg/int-area/ZPoyK4jK3kOtnHcS1ZH8CfyVss4>
Subject: Re: [Int-area] Per-Application Networking Considerations
X-BeenThere: int-area@ietf.org
X-Mailman-Version: 2.1.29
Precedence: list
List-Id: IETF Internet Area Mailing List <int-area.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/int-area>, <mailto:int-area-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/int-area/>
List-Post: <mailto:int-area@ietf.org>
List-Help: <mailto:int-area-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/int-area>, <mailto:int-area-request@ietf.org?subject=subscribe>
X-List-Received-Date: Fri, 19 Mar 2021 14:21:12 -0000

Hi Tommy, Lorenzo,

Thanks for the work and thinking on this, and I'd like to share my concerns on this work after go through the draft.

1. This draft is obviously relate to the topic of network neutrality.

There are 2 main motivation to involve cross layer optimization, one is for research purpose like congestion control, while another is for SLA / revenue. My understanding is that this draft cares the later one. Due to the network neutrality consideration, Internet wide SLA, like such offered by ISP, are really sensitive because of the IETF consensus - RFC 7258. Although network neutrality is a significant working direction, I reckon that requirements or consequence can be much different in some vertical/specific network scenario, like airplane entertainment network as you mentioned in this draft. I think thus differences come to several reason: users are physically restricted by 1) the way they access the network,  2)  the applications they can get from this network, 3) all the applications are offered by the same provider as the network access...

I think a good choice for the work next is to find out these specific network scenarios, and I think this could help us know more about network neutrality and cross layer optimization outsides the scope of the "internet" (since there might be a stereotype that Internet represent all network scenarios)

2. in the Internet area, cross layer optimization mains the SLA works at the price of a certain privacy.

Actually the thing is no matter how course the identifier granularity is, once you put it in layer 3, the sender inevitably sacrifice privacy. In the big data area, any information you ever show up can be used to trace your real world behavior. There are vast of research paper related to this. For example, an research paper call "Your Privilege Gives Your Privacy Away: An Analysis of a Home Security Camera Service" published in INFOCOM2020 say that: only the traffic itself, even it is all encrypted, can reveal users real life behavior. Since IoT camera will automatically upload the video into the server (the IP of the server is publicly known), and the upload strategy is based on the motion in users house. Thus, ISP can easily figure out the users get up time, bed time, stay at home or not, just based on the traffic from the camera. Remember that IP itself indicates not only network locator, but also identifier.

For this, even we do nothing about cross layer optimization, we always have privacy issue about IP address we use, and traffic we send. And this is the motivation for Tor, ODoH draft, Oblivious HTTP draft, right?

3. Trust anchor are shift to the network.

If mechanisms like APN6 works, there must be some add-on mechanism to prevent Identifier(token or things like that) spoofing. If there is, such anti-spoofing mechanism only work if the device, OS, APP, or users set the trust anchor on networks for cryptography authentication. However, such assumption is not align with the principle of IP, especially in the Internet area. And this is the motivation from HTTP to HTTP`S` EVERYWHERE, right?

4. There should be considerations on implementation reality.

RFC 8980 talks a really interesting topic: deployment reality V.S. protocol design. In reality, there are a lot of standards are well designed but not deployed in real world, and vice versa.  For Internet area, the factors of deployment reality are just related to network neutrality.

Followed by RFC 8980, end-to-end principle is again been revisited and seriously considered by IAB. draft-arkko-path-signals-information-00 and draft-arkko-farrell-arch-model-t-redux-01 have a lot of concerns on this. I think talking with Jari Arkko can help move forward this I-D.

Again thanks for the work. I'd like to help and talk more if you like. : )

Thanks,
Yihao Jia