Re: [ippm] Alissa Cooper's Discuss on draft-ietf-ippm-2679-bis-04: (with DISCUSS and COMMENT)

"MORTON, ALFRED C (AL)" <acmorton@att.com> Wed, 19 August 2015 03:07 UTC

Return-Path: <acmorton@att.com>
X-Original-To: ippm@ietfa.amsl.com
Delivered-To: ippm@ietfa.amsl.com
Received: from localhost (ietfa.amsl.com [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 7971B1AC40B; Tue, 18 Aug 2015 20:07:11 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -4.211
X-Spam-Level:
X-Spam-Status: No, score=-4.211 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, RCVD_IN_DNSWL_MED=-2.3, SPF_HELO_PASS=-0.001, T_RP_MATCHES_RCVD=-0.01] autolearn=ham
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id rZ7Af4XYIse9; Tue, 18 Aug 2015 20:07:09 -0700 (PDT)
Received: from mail-pink.research.att.com (mail-pink.research.att.com [204.178.8.22]) by ietfa.amsl.com (Postfix) with ESMTP id 836ED1AC410; Tue, 18 Aug 2015 20:07:09 -0700 (PDT)
Received: from mail-azure.research.att.com (unknown [135.207.255.18]) by mail-pink.research.att.com (Postfix) with ESMTP id 295C7D8169; Tue, 18 Aug 2015 23:31:44 -0400 (EDT)
Received: from exchange.research.att.com (njfpsrvexg0.research.att.com [135.207.240.40]) by mail-azure.research.att.com (Postfix) with ESMTP id DEEC3E0695; Tue, 18 Aug 2015 23:07:05 -0400 (EDT)
Received: from NJFPSRVEXG0.research.att.com ([fe80::108a:1006:9f54:fd90]) by NJFPSRVEXG0.research.att.com ([fe80::108a:1006:9f54:fd90%25]) with mapi; Tue, 18 Aug 2015 23:07:05 -0400
From: "MORTON, ALFRED C (AL)" <acmorton@att.com>
To: Alissa Cooper <alissa@cooperw.in>, The IESG <iesg@ietf.org>
Date: Tue, 18 Aug 2015 23:07:03 -0400
Thread-Topic: [ippm] Alissa Cooper's Discuss on draft-ietf-ippm-2679-bis-04: (with DISCUSS and COMMENT)
Thread-Index: AdDZ6iWA9QZSzjuLTbuqawN22/TxhgAOmZqA
Message-ID: <4AF73AA205019A4C8A1DDD32C034631D09A003DCBE@NJFPSRVEXG0.research.att.com>
References: <20150818191431.10251.89743.idtracker@ietfa.amsl.com>
In-Reply-To: <20150818191431.10251.89743.idtracker@ietfa.amsl.com>
Accept-Language: en-US
Content-Language: en-US
X-MS-Has-Attach:
X-MS-TNEF-Correlator:
acceptlanguage: en-US
Content-Type: text/plain; charset="us-ascii"
Content-Transfer-Encoding: quoted-printable
MIME-Version: 1.0
Archived-At: <http://mailarchive.ietf.org/arch/msg/ippm/OKJeFAthA76ys-zRgGUu2wnvzks>
Cc: Bill Cerveny <ietf@wjcerveny.com>, "ippm-chairs@ietf.org" <ippm-chairs@ietf.org>, "draft-ietf-ippm-2679-bis@ietf.org" <draft-ietf-ippm-2679-bis@ietf.org>, "ippm@ietf.org" <ippm@ietf.org>
Subject: Re: [ippm] Alissa Cooper's Discuss on draft-ietf-ippm-2679-bis-04: (with DISCUSS and COMMENT)
X-BeenThere: ippm@ietf.org
X-Mailman-Version: 2.1.15
Precedence: list
List-Id: IETF IP Performance Metrics Working Group <ippm.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/ippm>, <mailto:ippm-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/ippm/>
List-Post: <mailto:ippm@ietf.org>
List-Help: <mailto:ippm-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/ippm>, <mailto:ippm-request@ietf.org?subject=subscribe>
X-List-Received-Date: Wed, 19 Aug 2015 03:07:11 -0000

Hi Alissa,
Thanks for your review, replies below.
Al

> -----Original Message-----
> From: ippm [mailto:ippm-bounces@ietf.org] On Behalf Of Alissa Cooper
...
> Subject: [ippm] Alissa Cooper's Discuss on draft-ietf-ippm-2679-bis-04:
> (with DISCUSS and COMMENT)
> 
> Alissa Cooper has entered the following ballot position for
> draft-ietf-ippm-2679-bis-04: Discuss
> 
...
> 
> ----------------------------------------------------------------------
> DISCUSS:
> ----------------------------------------------------------------------
> 
> I am confused about the last sentence in this methodology step in
> Section
> 3.6:
> 
> "+ At the Src host, select Src and Dst IP addresses, and form a test
>    packet of Type-P with these addresses.  Any 'padding' portion of the
>    packet needed only to make the test packet a given size should be
>    filled with randomized bits to avoid a situation in which the
>    measured delay is lower than it would otherwise be due to compression
>    techniques along the path.  Note that use of transport layer
>    encryption will counteract the deployment of network-based analysis
>    and may reduce the adoption of network-based payload optimizations
>    like compression."
> 
> I don't understand what is implied about the relationship between
> transport layer encryption and one-way delay measurements. I thought the
> metric defined in this document was generally used for end-to-end
> measurement of delay, so I don't understand what "network-based
> analysis" has to do with this methodology step. 
[ACM] 
The methodology calls for a random payload in an attempt to measure
the delay on an a path without effects of network-based compression 
(if it is present).

> Is the implication that if the
> measurement packet is encrypted at the transport layer that delay will
> change? 
[ACM] 
No, not if the methodology recommendation of a random payload is followed.

On the other hand, if end-to-end encryption of user traffic becomes 
commonplace, then network-based compression will see less deployment
because it has little benefit, and the recommendation for random 
payload will be unnecessary. That's the implication.

> If that is true, isn't the metric itself agnostic to that
> consideration -- that is, couldn't that be precisely what the person
> doing the measurements wants to measure? I could quibble with the
> conclusions of the note itself (e.g., increased transport layer
> encryption may change but not necessarily reduce network-based
> "analysis"
> of various sorts), but mainly I do not understand how it relates to the
> specification of the metric.
> 
> Unfortunately the rationale given in Section 1 ("Added text recognizing
> the impending deployment of transport layer encryption in section 3.6")
> does not clarify this either. What impending deployment is this
> referencing?
[ACM] 
Ironically, I added the last sentence above during review of this draft,
after addressing your comment on what is now RFC 7312,
which says:

3.1.2.  Test Packet Payload Content Optimization

   The aim for efficient network resource use has resulted in deployment
   of server-only or client-server lossless or lossy payload compression
   techniques on some links or paths.  These optimizers attempt to
   compress high-volume traffic in order to reduce network load.  Files
   are analyzed by application-layer parsers, and parts (like comments)
   might be dropped.  Although typically acting on HTTP or JPEG files,
   compression might affect measurement packets, too.  In particular,
   measurement packets are qualified for efficient compression when they
   use standard plain-text payload.  We note that use of transport-layer
   encryption will counteract the deployment of network-based analysis
   and may reduce the adoption of payload optimizations, however.

I'll try to clarify the text in section 3.6, but feel free to make a
suggestion yourself.

> 
> 
> ----------------------------------------------------------------------
> COMMENT:
> ----------------------------------------------------------------------
> 
> >From Section 6:
> 
> "The privacy concerns of network measurement are limited by the active
>    measurements described in this memo.  Unlike passive measurements,
>    there can be no release of existing user data."
> 
> I realize this is text from RFC 2679, but I think it would be good to
> update it to reflect what has been learned since the publication of that
> document. The mere fact that a host is involved in conducting
> measurements could well be considered privacy-sensitive in some
> contexts.
> And a collection of measurements about a host, even active measurements,
> could leak information about the host's connectivity/availability/etc.
> if not appropriately safeguarded. I don't think this changes the
> protocol requirements for this document, but I do think the text above
> should note these aspects (perhaps similar to how it's done in
> <https://tools.ietf.org/html/draft-ietf-lmap-framework-14#section-8.3>).
> It's not quite correct to say there can be no release of existing user
> data.
> 
[ACM]
I'll replace the sentence above with the privacy paragraph from 
section 6 of RFC 7312, including the reference to the LMAP Framework.
http://tools.ietf.org/html/rfc7312#section-6