[manet] Fwd: Tsvart early review of draft-ietf-manet-dlep-credit-flow-control-09

Lou Berger <lberger@labn.net> Tue, 22 March 2022 14:06 UTC

Return-Path: <lberger@labn.net>
X-Original-To: manet@ietfa.amsl.com
Delivered-To: manet@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 1A8353A18D2; Tue, 22 Mar 2022 07:06:21 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -1.81
X-Spam-Level:
X-Spam-Status: No, score=-1.81 tagged_above=-999 required=5 tests=[BAD_CREDIT=0.1, BAYES_00=-1.9, DKIM_SIGNED=0.1, DKIM_VALID=-0.1, SPF_PASS=-0.001, T_SCC_BODY_TEXT_LINE=-0.01, URIBL_BLOCKED=0.001] autolearn=ham autolearn_force=no
Authentication-Results: ietfa.amsl.com (amavisd-new); dkim=pass (1024-bit key) header.d=labn.onmicrosoft.com
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id r89uvQiAy5kb; Tue, 22 Mar 2022 07:06:13 -0700 (PDT)
Received: from NAM10-MW2-obe.outbound.protection.outlook.com (mail-mw2nam10on2072f.outbound.protection.outlook.com [IPv6:2a01:111:f400:7e89::72f]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id ED2513A161E; Tue, 22 Mar 2022 07:05:52 -0700 (PDT)
ARC-Seal: i=1; a=rsa-sha256; s=arcselector9901; d=microsoft.com; cv=none; b=DA2pzyEy/weAtW0SDMpKlZner+hl/vPJBi6jdk6zcofUbcBkQvImOAKfMED/ABx5TP6B6pitJtF8rlB6A+ehAkIddM+ATTEDDdy5y2YVqN78xkbOYikD7hufEI80wsLfFSwuEQyc2ZNFedkpqR2ay8XV3ESFE1r3yZozLF1Q1keEcZxMvxycLwk3EMRNoWOj6KNB838R/GtiapoFslxEie3ZNLX2PZFIJO4PSty/mtMgLEL0CyZA1Z8deafB/8GFvG61o5BG2hHEjPpQqAZwd7Hai4tMZ4VzYADad7OUMldO8Y27Sb0XnjbEWhFOpCJTgbKsT/3VS0lki/8FBGKxiQ==
ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=microsoft.com; s=arcselector9901; h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-AntiSpam-MessageData-ChunkCount:X-MS-Exchange-AntiSpam-MessageData-0:X-MS-Exchange-AntiSpam-MessageData-1; bh=JkbTEytK9A/kXhHj/W+mAj37I3iKbY7Lpd6FWORmmh0=; b=BChLG9jUdlvZ2574IQaUp4/0PSfoMzr8S3AQTPGNIgKNQ3rnky4V0xgJE33Y8afZ/Z5lFDvGRtccjlYhMm8aV96iGGFCVK40qIGoG8im2uiPbXLCQ/kW5WlyjjmH5OPrdOGhcNXsXNQrFbfgCLDomS1Ms6EwFva4SItDblkVqAsofOJuP2WkshKBkYwduDr4M79dTlQYlpx5i1tzjKIG/b/EUVsxAbIHDoF5IFiD1r8HfP0f29vi0xjnCwLbyeUOXb+13jg6rr/IyX7ePB65MXZ2SHfRdGhnm7HT0ov9J4VxIHAPxjOme43LQYZpHLOFxc3jRxCL8Rn/gewzGHWuoQ==
ARC-Authentication-Results: i=1; mx.microsoft.com 1; spf=pass smtp.mailfrom=labn.net; dmarc=pass action=none header.from=labn.net; dkim=pass header.d=labn.net; arc=none
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=labn.onmicrosoft.com; s=selector2-labn-onmicrosoft-com; h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-SenderADCheck; bh=JkbTEytK9A/kXhHj/W+mAj37I3iKbY7Lpd6FWORmmh0=; b=G3ItncjNhTiwC1yC2WkLkjVsttZsGq2Ux4m9fsB8eUdQzaA4D3820VpHuGdBKkQIc1z+ZKXz75LjpPjus88OBNC7RMJwu3KAwZ7YNiZPp3QIOB2ZJXFONYQBDzjgoumugL0BfzU9L7DDRnRZwnCm+lTdyGD/852Onf7Nwf6amCE=
Authentication-Results: dkim=none (message not signed) header.d=none;dmarc=none action=none header.from=labn.net;
Received: from SJ0PR14MB4792.namprd14.prod.outlook.com (2603:10b6:a03:379::24) by MWHPR14MB1344.namprd14.prod.outlook.com (2603:10b6:300:8c::19) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id 15.20.5081.18; Tue, 22 Mar 2022 14:05:48 +0000
Received: from SJ0PR14MB4792.namprd14.prod.outlook.com ([fe80::fdb9:89e9:e1a8:c1d9]) by SJ0PR14MB4792.namprd14.prod.outlook.com ([fe80::fdb9:89e9:e1a8:c1d9%4]) with mapi id 15.20.5081.023; Tue, 22 Mar 2022 14:05:48 +0000
Message-ID: <18399f51-73d3-25e6-c8e7-1acb7d30aace@labn.net>
Date: Tue, 22 Mar 2022 10:05:47 -0400
User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:91.0) Gecko/20100101 Thunderbird/91.7.0
Content-Language: en-US
References: <5d1bf77b-6391-65b2-8ca2-57d6736b0439@labn.net>
To: David Black <david.black@dell.com>, tsv-art@ietf.org
Cc: MANET IETF <manet@ietf.org>
From: Lou Berger <lberger@labn.net>
In-Reply-To: <5d1bf77b-6391-65b2-8ca2-57d6736b0439@labn.net>
X-Forwarded-Message-Id: <5d1bf77b-6391-65b2-8ca2-57d6736b0439@labn.net>
Content-Type: text/plain; charset="UTF-8"; format="flowed"
Content-Transfer-Encoding: 8bit
X-ClientProxiedBy: CH2PR15CA0020.namprd15.prod.outlook.com (2603:10b6:610:51::30) To SJ0PR14MB4792.namprd14.prod.outlook.com (2603:10b6:a03:379::24)
MIME-Version: 1.0
X-MS-PublicTrafficType: Email
X-MS-Office365-Filtering-Correlation-Id: ae028bd0-f7a4-4ac5-a1ed-08da0c0d10bd
X-MS-TrafficTypeDiagnostic: MWHPR14MB1344:EE_
X-Microsoft-Antispam-PRVS: <MWHPR14MB13441972C91539C6C3F0270EC3179@MWHPR14MB1344.namprd14.prod.outlook.com>
X-MS-Exchange-SenderADCheck: 1
X-MS-Exchange-AntiSpam-Relay: 0
X-Microsoft-Antispam: BCL:0;
X-Microsoft-Antispam-Message-Info: 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
X-Forefront-Antispam-Report: CIP:255.255.255.255; CTRY:; LANG:en; SCL:1; SRV:; IPV:NLI; SFV:NSPM; H:SJ0PR14MB4792.namprd14.prod.outlook.com; PTR:; CAT:NONE; SFS:(13230001)(39830400003)(366004)(376002)(136003)(396003)(346002)(30864003)(8936002)(6486002)(53546011)(52116002)(5660300002)(66476007)(66946007)(86362001)(8676002)(31696002)(4326008)(38100700002)(66556008)(38350700002)(6512007)(508600001)(2906002)(6506007)(36756003)(66574015)(31686004)(83380400001)(186003)(26005)(316002)(2616005)(43740500002)(45980500001); DIR:OUT; SFP:1102;
X-MS-Exchange-AntiSpam-MessageData-ChunkCount: 1
X-MS-Exchange-AntiSpam-MessageData-0: jDu6FHSNmb3nuUbE0LItf87KySlTE41Od/Xm719cYcn8v1zulXPp86OPxMjBKp9PV5wRjAXnIzIFWZ2OC8ydOihWnh6OXtyGFL7BsUti4Gl3xQX/orghlaZ+bl4QUci42rTr0gNcXU5VaqfAe6630gv5wbY70/l+93rOCP3H15/o0jV2gglm+lqPP0aVzV246mfpyHW+vgnauUiKi3nHWSM2l7YzNQneP6Pq456WBJEQv16dZPVZXGU4bqenbe88gQOKAlYfIvutOR1841yw21dfTurEqyWmxxydVP3mQnBUo7pjNjuS5brPpSw+OJWdUwYmlblEtCTRrIjuMFPzrWTrbyhdWReRzCfJfnmPS3ctE03NEVzpkFUCOutK/vgOpr67lrG8WU6NVvcjypXFX+E65Q9LPY/SNBO1rkkIr9y9J20nikCpYp2ntjPHp87uCuXqEHkuJLhGrvBRbV/ZZwf1N6EIPRrm5uHABL1p1i+kclwpl84xT9P4X/15s5R/EvHj965qQkGxPRtBkMNy9nmGYyODfUdyV6KnMBKpAVA1IvpAX+g68ro829zyvu0eCXTPCGeDe/FG+i56DvXv+9vV2IaCWNjoOxAR1emtZU4m9BSHZkE3cKtzr1czt5GR8fMuau+CBPZJL4qMz9IlnZWB01A4jJ1Kc9UEkzQb6qz5ha9FdCAoZntVXZ/w1RUNdgAqm4h/RsKLzrxsOv0oNYEAZ3BeE+Dc5d1dIJTRkgxNeYyhwdWnj4YrWK26uXIBjj6+hUiECm/9YXjChvmHsMvYrQAdO/+4UoN7ZjRicGfSs117UMk81Fm243xpb0YsO48xjtLssa8GR2Ll7BwDUxoIIV3hEpXRzw3L/zv+5/T7ylDyQ+uadR5RNG6k1voge8PpYFkgWVZyqxcgWj4Ahb9fccsaUPWbkBncDImeNxtE2Mk7Elt2RaU9CmFGn4c5cZko5cic9kYgwLpnDk/2llWaNinxJkx5RdYeyf1SBest0l/JFcf4GeaueWt7xpp/0WiMdTI23GgaCTVi1l4wSsyn9v9VaUZCxhf1kqxq5bYmqZnarhSCjSHEAwHzSdY7JVVHofeA4EdJNphhhql+OWuqBCwxPdgT47UAd8INli80yORkDUpzk//MCMeku8gYLPSOF+J0ZDk++wJ4r48kx8uu9l6AvtbeU791o/ElY4tgOV+FKLVTUZmaXGp5e7iSaJ2KaBqOlM11Zgc5c2r0r/QeCpyXAV+4tx8Swp7qHEcl2vKxy3qLVp72H8NJR0KjyeTiXC5RZNQHKC5c+0R9tbSqIVnMRPjDKq03NIJTSChBDl6j/exudE1zqQBtb+kdn2cQ1cwjDjwlxFVJfsoa10Pu0ZLVc4NN0nIxZAqJ0Y8xtKVeVPgK9tyCo6i6xtk3IFp1z7d2T3T8ZdrzBHQ5ZM8vbInXzxYnE+5gqCqP8EIyFnvcLrYL5sguGLRGzyt2
X-OriginatorOrg: labn.net
X-MS-Exchange-CrossTenant-Network-Message-Id: ae028bd0-f7a4-4ac5-a1ed-08da0c0d10bd
X-MS-Exchange-CrossTenant-AuthSource: SJ0PR14MB4792.namprd14.prod.outlook.com
X-MS-Exchange-CrossTenant-AuthAs: Internal
X-MS-Exchange-CrossTenant-OriginalArrivalTime: 22 Mar 2022 14:05:48.2723 (UTC)
X-MS-Exchange-CrossTenant-FromEntityHeader: Hosted
X-MS-Exchange-CrossTenant-Id: eb60ac54-2184-4344-9b60-40c8b2b72561
X-MS-Exchange-CrossTenant-MailboxType: HOSTED
X-MS-Exchange-CrossTenant-UserPrincipalName: GLqsd+9kMtHHJLXM40EB0iQyJUabxLV0rj1Jd4eHCiS0vEz+Dh/RNmOdEne4J/XHRUAl9wIlM5NMXizrmBX0ig==
X-MS-Exchange-Transport-CrossTenantHeadersStamped: MWHPR14MB1344
Archived-At: <https://mailarchive.ietf.org/arch/msg/manet/7hc83LPEA66i2WyLOab8k9OSzYc>
Subject: [manet] Fwd: Tsvart early review of draft-ietf-manet-dlep-credit-flow-control-09
X-BeenThere: manet@ietf.org
X-Mailman-Version: 2.1.29
Precedence: list
List-Id: Mobile Ad-hoc Networks <manet.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/manet>, <mailto:manet-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/manet/>
List-Post: <mailto:manet@ietf.org>
List-Help: <mailto:manet-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/manet>, <mailto:manet-request@ietf.org?subject=subscribe>
X-List-Received-Date: Tue, 22 Mar 2022 14:06:24 -0000

This is a resend as it seems the first message didn't make it to David 
or the archive.

-------- Forwarded Message --------
Subject: Re: Tsvart early review of 
draft-ietf-manet-dlep-credit-flow-control-09
Date: Thu, 24 Feb 2022 07:18:55 -0500
From: Lou Berger <lberger@labn.net>
To: David Black <david.black@dell.com>, tsv-art@ietf.org
CC: draft-ietf-manet-dlep-credit-flow-control.all@ietf.org, manet@ietf.org

David,

Please see (overdue) responses in-line below.

On 11/19/2021 12:02 PM, David Black via Datatracker wrote:
> Reviewer: David Black
> Review result: On the Right Track
>
> TSVART Review of:
>
>          DLEP Credit-Based Flow Control Messages and Data Items
>                  draft-ietf-manet-dlep-credit-flow-control-09
>          DLEP DiffServ Aware Credit Window Extension
>                  draft-ietf-manet-dlep-da-credit-extension-12
>          DLEP Traffic Classification Data Item
>                  draft-ietf-manet-dlep-traffic-classification-06
>
> Reviewer: David L. Black <david.black@dell.com>
> Date: November 19, 2021
>
> This is a combined review of all three drafts.
>
> These three drafts specify a flow control mechanism between a "router" and a
> "modem" in the sending direction (router to modem) to prevent overrun of
> buffers in the "modem".  The mechanism is designed to provide flow control for
> multiple queues in the "modem" that are independently protected, with the
> "modem" in control of how much data the router is allowed to send - to a first
> approximation, there is a separate instance of flow control, called a Credit
> Window, for each queue.  Both Diffserv (DSCP) and Ethernet Priority (PCP)
> values can be used to classify traffic to determine which flow control instance
> (Credit Window) applies to each packet being sent to the "modem" by the
> "router".
>
> Each of the drafts is reasonably well written, but there are some difficulties
> in understanding the combination of the three drafts, which have to be used
> together in order to implement this flow control mechanism. That's one of a
> number of issues that deserve attention.
>
> ****** Major Issues:
>
> -- [1] -- Number of Documents
>
> I understand and see the merit in specifying the flow control mechanism
> (-credit-flow-control draft) independently of traffic classification
> (-traffic-classification draft).  In contrast, I do not see a strong rationale
> for the separate DA credit extension draft (-da-credit-extension), which has
> very little content (about a page of actual protocol specification plus one
> addition to an IANA registry).
>
> I strongly suggest folding the DA credit extension draft into the traffic
> classification draft, as the resulting two-draft structure will be easier to
> explain, and more importantly, should be easier for implementers to understand.

This was the decision of the WG made a long time ago. I defer to the 
chairs on this.

> -- [2] -- Flow Match Criteria
>
> The Traffic Classification draft does not explain how traffic classification is
> actually performed, i.e., how the applicable FID is determined for a packet,
> particularly when more than one FID is possible. For example, suppose a packet
> carries a DSCP that matches FID 5 and a PCP that matches FID 7 - does that
> packet consume FID 5 credits or FID 7 credits?  If the router and modem make
> different decisions, the result may be undesirable.  This example is within the
> same TID - the situation appears to be worse across TIDs for the same
> destination, because the same match criteria could appear in multiple TIDs,
> e.g., same DSCP could match different FIDs under different TIDs.  Clarity is
> needed here so that the router and modem agree on which FID's credits are
> consumed by each packet, and on a related note, the DA credit extension draft
> does not prohibit use of Ethernet traffic classification - perhaps it should.

It took me a bit to decide how to address this (valid) comment. I 
propose the following change to 
draft-ietf-manet-dlep-traffic-classification-06:

At the end of section 2.3.1, I propose adding the following text:

          If a packet matches both a DSCP Field Value,see Section 2.2.
          and a Priority Field value, the DSCP
          associated TID MUST take precedence.

> -- [3] -- Router MAY ignore flow control
>
> The Management Considerations section in both the traffic classification and DA
> credit extension drafts contains this text:
>
>     When modem-provided credit window information exceeds the capabilities of a
>     router, the router MAY use a subset of the provided credit windows.
>
> In other words, the router MAY ignore any credit windows that exceed the
> routers capabilities ... which in practice could amount to "MAY ignore any
> credit windows that the router implementer views as inconvenient" ... with the
> router proceeding to overrun the corresponding modem queues.  That doesn't seem
> right, so if this is intended, some serious rationale/explanation ought to be
> provided.

I personally have no objection to MUST, but perhaps a SHOULD is the 
right answer given that there is an alternative defined.


> -- [4] -- Association Not Well-Specified
>
> The overall association structure is that flow control instances are identified
> by FIDs which are associated with TIDs which are associated with destinations.
> That structure is described towards the end of Section 2 of the flow control
> draft, but the details of how it is done are mostly missing - the flow control
> draft ought to state that:
>
>          i) FIDs are associated with TIDs via traffic classification information
>          specified in the traffic classification draft. ii) TIDs (and their
>          associated FIDs) are associated with destinations via use of the Credit
>          Window Association data item in DLEP Destination Up and Destination
>          Update messages.
>
> The first item (i) can be mostly inferred from the last few paragraphs in
> section 2 of the flow control draft (and needs to be more explicit), but the
> second item (ii) is missing because the flow control draft does not specify how
> to determine the "destination" with which a TID is associated by a Credit
> Window Association data item (in a DLEP Destination Up or Destination Update)
> message.  I would expect that the destination is a relatively obvious field in
> those messages, but the draft needs to specify that field.  This should be easy
> to fix, although it made the drafts much more difficult to understand.

Okay I'll try to improve the language in section 2 to cover (I) and (II)


>
> -- [5] -- Initialization vs. in-flight traffic
>
> The Credit Window Initialization data item appears to be intended to establish
> common state for a Credit Window (e.g., size, number of credits) across the
> router and modem ... but ... that data item appears to be allowed to be sent
> while there's traffic in flight.  The result would be that the modem would
> count in-flight traffic against the initialized Credit Window, but the router
> would not.   The resulting inconsistency deserves discussion - it may be
> acceptable if the amount of traffic in flight is miniscule by comparison to
> both the Credit Window size and initial credit balance.

This is the purpose of the credit window status DI.  The current text says:

          Once the credit window is identified, the modem SHOULD check the
          received Current Credit Window Size field value against the 
outstanding credit
          window's available credits at the time the most recent Credit 
Window
          Initialization or Grant Data Item associated with the 
indicated FID
          was sent.  If the values significantly differ, i.e., greater 
than can
          be accounted for based on observed data frames, then the modem 
SHOULD
          send a Credit Window Initialization Data Item to reset the 
associated
          credit window size to the modem's current view of the available
          credits.  As defined above, Credit Window Initialization Data 
Items are
          sent in Session Update Messages.  When multiple Data Items 
need to be
          sent, they SHOULD be combined into a single message when possible.
          Alternatively, and also in cases where there are small 
differences,
          the modem MAY adjust the values sent in Credit Window Grant 
Data Items
          to account for the reported Credit Window.

is this insufficient? if so, can you suggest some alternate wording.


> -- [6] -- Security Considerations
>
> Although this is a Transport review, I found a security issue that would be
> better dealt with now before the security directorate points it out ;-) - the
> security considerations sections in each of the 3 drafts claims that adding
> credit window control and flow functionality to DLEP does not introduce any new
> security considerations (vulnerabilities). That's a nice try, but it's
> incorrect.
>
> These drafts specify a new resource (credits in a credit window) that is
> subject to resource exhaustion attacks that could cause denial-of-service.  For
> example, suppose an attacker injects a Credit Window Initialization data item
> that contains almost no credits and/or specifies a ridiculously tiny Window
> (Max) Size.  I expect that the protocol contains mechanisms to counter this and
> related attacks on credit resources (e.g., if something looks wrong, the modem
> reinitializes the Credit Window), but the current text incorrectly asserts the
> non-existence of such attacks.  These sorts of attacks definitely exist - I am
> aware of a (subsequently fixed) resource exhaustion problem in another
> credit-based flow control mechanism caused by an unanticipated environmental
> "attack" on signal integrity of credit exchange messages, resulting in message
> discard and credit loss.

How about:

       This document introduces credit window control and flow mechanisms
      to DLEP.  These mechanisms expose vulnerabilities similar to
      existing DLEP messages, e.g., Destination UP or Down message
      injection attacks. The security mechanisms documented in <xref
      target="RFC8175"/> can be applied equally to the mechanism defined
      in this document.

> ***** Minor Issues:
>
> [A] Packets consume credits: Section 2 of the flow control draft needs to say
> somewhere early in the section that each packet that a router sends consumes a
> credit for each octet in the packet.  This is to be found at the end of the
> second paragraph in Section 2.1, but ought to be stated much earlier, e.g., at
> the end of second paragraph in Section 2.
okay
>
> [B] Bidirectional messages: Both the Credit Control Message and its response
> can be sent in both directions (i.e., by both modems and routers).  Has the
> possibility of using different message types in each direction been considered?
>   That might help out people who have to read packet traces/dumps.  NOTE: "Yes,
> that was carefully considered and the WG decided not to do that." is a fine
> response.
It was discussed, and the current approach was selected by the WG.
> [C] Data item usage:  It's not clear which data items are required, allowed or
> prohibited in which DLEP messages.  It appears that any data item MAY be used
> in any DLEP message, which is surely not what was intended.  Both the flow
> control and traffic classification drafts ought to spell out these details,
> including what happens when  the rules are violated, e.g., data item shows up
> in a message where it's not supposed to be used - is the data item ignored or
> does it cause an error?

Unexpected DIs in messages is defined by the base spec -- and yes, it's 
an error.  These drafts don't modify that behavior.


>
> [D] Uninitialized window: The second sentence of Section 2.3.1 in the flow
> control draft begins with:
>
>     This Data Item SHOULD be included in any Session Initialization Response
>     Message that also ...
>
> What happens if that SHOULD is not adhered to?  Please explain.

There's a may immediately following.  Other places in the document 
describe that use of an FID/credit window in a message before it is 
defined/initialized are treated as errors.

> [E] Credit Window Size: In Section 2.3.1 of the flow control draft (Credit
> Window Initialization), what happens if the Credit Value exceeds the Credit
> Window Size?
Okay will add a sentence.
> I also strongly suggest renaming Credit Window Size to Credit Window Max Size
> or something similar to avoid possible confusion of this concept with current
> credit balance (Credit Value)
Sure
>
> [F] TID association with destination:
>
> Section 2.3.2 of the flow control draft (Credit Window Association) says that a
> the traffic classification information associated with a TID "MUST be
> associated with the destination" - what does that mean?
>
> Specifically:
> - Does that traffic classification information replace any existing     traffic
> classification information, e.g., if the info associated with that TID has been
> updated since that TID was most recently associated with that destination? - Is
> there any limit on the number of TIDs or amount of traffic classification
> information that can be associated with a destination?  If so, what happens if
> that limit is exceeded? Also note that "the destination" is not currently
> defined, see [4] above.

I'll drop:

That clause, the next MUST is sufficient.

> [G] Bad Credit Window math: The next to last paragraph in Section 2.3.3 (Credit
> Window Grant) of the flow control draft contains this text about adding credit
> to a window:
>
>     If the increase results in a window overflow, i.e., the size of the credit
>     window after the increase is smaller than the original credit window size,
>     the Credit Window must be set to its maximum (0xFFFFFFFFFFFFFFFF).
>
> That's doubly wrong:
> - consider a window max size of 10, a current window size of 3 and an addition
> of 15 credits.  Overflow occurs, but the window size increases, as the new
> window size is 8. - The maximum size of the credit window may be considerably
> smaller than 0xFFFFFFFFFFFFFFFF.
>
> For the first item, just use the concept of overflow in modular arithmetic.
> For the second item, remove that all-F's constant and refer back to the Credit
> Window Initialization material for max size.
WFM
>
> This text is also an example of why [E] strongly suggests renaming Credit
> Window Size to Credit Window Max Size or somthing similar.
done
> [H] Amount of imprecision: Section 2.3.4 of the flow control draft discusses
> modem comparison of internal values with values received from the router, and
> contains this text:
>
>     If the values significantly differ, i.e., greater than can be  accounted for
>     based on observed data frames,
>
> That needs some guidance on what a significant difference is and how much of a
> "greater than" difference ought to trigger the consequences, accompanied by a
> warning against precise (== vs. !=) comparisons (e.g., courtesy of [5] above).
I believe we (once) discussed this ad concluded it could be 
implementation dependent.  If you feel strongly on this, can you propose 
some language that we can discuss in the WG?
> [I] Update means what?: The last paragraph of Section 2.1 of the traffic
> classification draft (Traffic Classification Data Item) contains:
>
>     the router MUST update the information using the values carried in the Data
>     Item.
>
> What does "update" mean, e.g., "replace", "merge"?
MUST replace.
>
> [J] Error behavior: Section 2.1.1 of the traffic classification draft leaves
> error behavior as a "go fish" exercise for the reader:
>
>     Any errors or inconsistencies encountered in parsing
>     Sub-Data Items are handled in the same fashion as any other Data
>     Item parsing error encountered in DLEP.
>
> That doesn't tell an implementer what to do - this needs to cite a reference
> that specifies the applicable error behavior.
I disagree, DLEP has defined error processing in the base spec. There 
has been discussion about changing that behavior in an update.  I don't 
think repeating what is in the base spec is a good idea, particularly in 
light of that potential update.
> [K] RFC 2474 CU field: Section 2.2 of the traffic classification draft defines
> the DS Field as an octet and reproduces the definition from RFC 2474 that
> includes the DSCP and CU fields.  Unfortunately, this does not reflect updates
> to RFC 2474 - those two bits are now the ECN Field, which may be non-zero.
>
> The fix for this is simple - use the 6 bit DSCP field from RFC 2474 and replace
> the CU field with two zero bits to produce an octet.
okay, changed to stat that DSCP comes from 2474 and the bits "MUST be zero"
>
> [L] 802.1Q DEI field: This has a similar problem to the CU field ... and a
> similar solution - replace the DEI field with a zero bit.
Done!
>
> ****** Nits:
>
> FID paragraph in section 2.3.5 of the flow control draft:
>          The FID also uniquely identifies a credit window
> s/identifies/indicates/ for consistency.
sure
>
> End of Section 2 of the traffic classification draft:
>          TID and FID values is a modem-local scope.
> s/is a/have/

Thank you!

I'll publish a matching update shortly.

Lou


>
>