Re: Grips in the Wire Image for In-Network State (was Re: Privacy holes (was Re: Getting to consensus on packet number encryption))

Spencer Dawkins at IETF <spencerdawkins.ietf@gmail.com> Fri, 06 April 2018 14:02 UTC

Return-Path: <spencerdawkins.ietf@gmail.com>
X-Original-To: quic@ietfa.amsl.com
Delivered-To: quic@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 3A3401201FA for <quic@ietfa.amsl.com>; Fri, 6 Apr 2018 07:02:08 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: 0.001
X-Spam-Level:
X-Spam-Status: No, score=0.001 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, DKIM_SIGNED=0.1, DKIM_VALID=-0.1, DKIM_VALID_AU=-0.1, FREEMAIL_FROM=0.001, GB_MUTUALBENEFIT=2, HTML_MESSAGE=0.001, RCVD_IN_DNSWL_NONE=-0.0001, SPF_PASS=-0.001] autolearn=no autolearn_force=no
Authentication-Results: ietfa.amsl.com (amavisd-new); dkim=pass (2048-bit key) header.d=gmail.com
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id BiX8JUpUGyYj for <quic@ietfa.amsl.com>; Fri, 6 Apr 2018 07:02:06 -0700 (PDT)
Received: from mail-yb0-x229.google.com (mail-yb0-x229.google.com [IPv6:2607:f8b0:4002:c09::229]) (using TLSv1.2 with cipher ECDHE-RSA-AES128-GCM-SHA256 (128/128 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id 24E611200FC for <quic@ietf.org>; Fri, 6 Apr 2018 07:02:06 -0700 (PDT)
Received: by mail-yb0-x229.google.com with SMTP id k199-v6so409106ybk.12 for <quic@ietf.org>; Fri, 06 Apr 2018 07:02:06 -0700 (PDT)
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=gmail.com; s=20161025; h=mime-version:in-reply-to:references:from:date:message-id:subject:to :cc; bh=FPWSYCZXnWkQkQT5LOmb/1U07uELRYZRroh7+CtaiWU=; b=LRblPIuDuNpNS5zR23zI7XosX6HKnhQUSFGcX4LZ/VQuclBj0k1jk0S5XCPg8gBkWg pVrNDhkJWMtKda+COc5//iaowXvJk7hHxJVddMwiqxqK8IqbS0/YEwYpDRXCQb54KLlW 0zEGAveOECnU5z6zz8+qYdhz1FVQnZ+rkrI0MHjxcYazuZYEjCKV3L9HG3qCAh9KeFeS aIaAok87qFQ+RisSj4qQyTqeeOxKkaW60dyX/RJwJmsTOxMzb/j3xmE0Y2iQQ5niAao1 uz8p0gJtX+KcV/JPg1LznnZJEYFlrllOk1QcBD0rB0MbPRX2HiZX1ijr0D5wjEvAu1J0 6uyA==
X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20161025; h=x-gm-message-state:mime-version:in-reply-to:references:from:date :message-id:subject:to:cc; bh=FPWSYCZXnWkQkQT5LOmb/1U07uELRYZRroh7+CtaiWU=; b=tykg/H2Ur5gMXVWKXyisRSekf/hVcUkq0p7nScjR6YwBtxxHbKLwPMo3n13oah/zo0 NLae7bx+XwLmGfqs9H8Km6mvtkFEoqqFXyGuLrSjYvY0uhzhNK6qd65zw3TMfIiEmgH7 t73u/z95pPFy5HUfOeOlbi7os3fTwb3Ibw9NSEYL3cHKP7s9w0N8XzcaFzEOZnUbPReQ Mk4lN4VKmk1nS9qzFG9H7KqJxHPIiC1A9Ka4QKSoyMdm2X13PrZDJUnDueSf90MZWxBK HfN9M8H1k3vI7rg7OAm52KxXukR7Bkr+ouHEp12KFcxPioOBjFprlgAAfz8IfY8v2JC1 nx/A==
X-Gm-Message-State: ALQs6tAzmz6MF23AGfF/wM5cOCp/I3XA+LQQrJbNaEN1X3BYFzTKdviA suvf3nm2Prp7JZKcmRwYCp/DRRdpW3DM0W2zOvg=
X-Google-Smtp-Source: AIpwx4/bCfy+tdAytzqD9Y7sjjNJ0bkFtNz829XEGKcqHDpwJd6sjzAfbdN9BSGFRRCJMmrWCZu4sTJxL7g9cyx+9Fc=
X-Received: by 2002:a25:1a42:: with SMTP id a63-v6mr15267657yba.235.1523023324671; Fri, 06 Apr 2018 07:02:04 -0700 (PDT)
MIME-Version: 1.0
Received: by 2002:a25:e757:0:0:0:0:0 with HTTP; Fri, 6 Apr 2018 07:02:04 -0700 (PDT)
In-Reply-To: <EA680436-F12F-45DE-BBBF-091D46DE2431@trammell.ch>
References: <7fd34142-2e14-e383-1f65-bc3ca657576c@huitema.net> <BBB8D1DE-25F8-4F3D-B274-C317848DE872@akamai.com> <CAN1APdd=47b2eXkvMg+Q_+P254xo4vo-Tu-YQu6XoUGMByO_eQ@mail.gmail.com> <CAKcm_gMpz4MpdmrHLtC8MvTf5uO9LjD915jM-i2LfpKY384O2w@mail.gmail.com> <HE1PR0702MB3611A67E764EE1C7D1644FAD84AD0@HE1PR0702MB3611.eurprd07.prod.outlook.com> <d8e35569-e939-4064-9ec4-2cccfba2f341@huitema.net> <CACpbDccqKoF-Y1poHMN2cLOK9GOuvtMTPsF-QEen3b30kUo9bg@mail.gmail.com> <CAKcm_gNffwpraF-H2LQBF33vUhYFx0bi_UXJ3N14k4Xj4NmWUw@mail.gmail.com> <40C1F6FE-2B2C-469F-8F98-66329703ED50@mnot.net> <21C36B57-6AE2-40EF-9549-7196D7FA9B45@tik.ee.ethz.ch> <B176FC07-887D-4135-B01E-FE8B4986A5EE@mnot.net> <CAKcm_gOCeocLyrYpOS7Ud332xdz3xHSH0psPN8T6BGRjoL9ptQ@mail.gmail.com> <CY4PR21MB0630FA0EDD343396AD414641B6A40@CY4PR21MB0630.namprd21.prod.outlook.com> <CAN1APde13JTzCvKFFvMd183Fka6QGD1kGBjsa9fcoLrYeA2hsA@mail.gmail.com> <CY4PR21MB0630C0FD4FBECBFEC3C863BBB6A40@CY4PR21MB0630.namprd21.prod.outlook.com> <759C5BE4-DE4C-4A82-929C-B03234B88A37@huitema.net> <CAJGwveB=qs+J2iBQRs3d5jdGuP9yBWoAgv0t3mwD=Wrf6Q5g8g@mail.gmail.com> <F395D018-FFCA-405F-BBD5-1313C6F6DAF9@huitema.net> <CABkgnnWAgGJaKs8teKTURiNDRA61fRhN6pxYQuD1MbkPDqasKQ@mail.gmail.com> <2F06334E-C3DF-4034-A6A4-AF383505D930@trammell.ch> <CABkgnnX1=h4qx+3YjXj=ZME5ihZbJ2rqE8zeT4j84dJj0ZfZGg@mail.gmail.com> <29F2FB1B-3A82-4E60-A4A5-70AC36CEEC54@trammell.ch> <CANatvzzoAK0SRrLOfz6HecbsE3oevWWkzJcfhceuqECF0VL=MA@mail.gmail.com> <FFEC6258-4B0F-473F-BAF6-28C655EE6DAF@trammell.ch> <CABkgnnVPUhp0f6-ZBV6CpZ8QJk_cwf7SWzOCtTD5FsNNvtnkjw@mail.gmail.com> <EA680436-F12F-45DE-BBBF-091D46DE2431@trammell.ch>
From: Spencer Dawkins at IETF <spencerdawkins.ietf@gmail.com>
Date: Fri, 06 Apr 2018 09:02:04 -0500
Message-ID: <CAKKJt-etrzMP42W6Kxo378OuP6vqFGDJG-uY=CPEfWtwnXumfw@mail.gmail.com>
Subject: Re: Grips in the Wire Image for In-Network State (was Re: Privacy holes (was Re: Getting to consensus on packet number encryption))
To: "Brian Trammell (IETF)" <ietf@trammell.ch>
Cc: Martin Thomson <martin.thomson@gmail.com>, Mirja Kühlewind <mirja.kuehlewind@tik.ee.ethz.ch>, QUIC WG <quic@ietf.org>, Christian Huitema <huitema@huitema.net>, Frederick Kautz <fkautz@alumni.cmu.edu>, Kazuho Oku <kazuhooku@gmail.com>
Content-Type: multipart/alternative; boundary="00000000000040726305692e805f"
Archived-At: <https://mailarchive.ietf.org/arch/msg/quic/Y_ASJlVUXorKJvsE3TStZFjrXEw>
X-BeenThere: quic@ietf.org
X-Mailman-Version: 2.1.22
Precedence: list
List-Id: Main mailing list of the IETF QUIC working group <quic.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/quic>, <mailto:quic-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/quic/>
List-Post: <mailto:quic@ietf.org>
List-Help: <mailto:quic-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/quic>, <mailto:quic-request@ietf.org?subject=subscribe>
X-List-Received-Date: Fri, 06 Apr 2018 14:02:08 -0000

Hi, Brian,

On Fri, Apr 6, 2018 at 7:54 AM, Brian Trammell (IETF) <ietf@trammell.ch>
wrote:

> hi Martin,
>
> > On 6 Apr 2018, at 12:55, Martin Thomson <martin.thomson@gmail.com>
> wrote:
> >
> > I don't know how to game this one out.
> >
> > If we're looking for mutual benefit, the best I can come up with is
> > that the middlebox knows about flow up/down, so it can extend timeouts
> > for most flows and endpoints thereby enjoy better chance of flow
> > liveness after longer periods of quiescence.  That would be something
> > like with TCP where you can expect timeouts to be in the order of
> > minutes or tens of minutes (30 minutes if you pick the right port
> > number) and not merely tens of seconds.
>
> Flow down in this case is way more useful than flow up.
>
> > The problem here is that you need enough of the middlebox population
> > to extend timeouts in the common case.  Tuning to specific networks is
> > difficult and time-consuming.  So endpoints would deploy this "grip"
> > without any expectation of reciprocation for potentially a very long
> > time.  That's in the order of the end-of-life cycle for home routers,
> > or an entire Internet era.
>
> We, as a community, are currently managing transitions that have taken
> that long. Insert your favorite IPv6 joke here, of course, but ECN comes to
> mind as well.
>
> > In the meantime, endpoints have to assume flow liveness based on the
> > Internet of today.  30s is the benchmark now, despite the wishful
> > "requirement" for 2 minutes in RFC 4787.
>
> "Flow liveness" is a path property, not a global one, a function of the
> minimum timeout of all connection-breaking state along the path. I suspect
> that endpoint pairs in a world ruled by UDP state timeout will end up
> widely deploy simple probing algorithms to discover it whether or not
> there's a simple way to signal that state can be disposed of early.
>
> This is really a separate issue, though -- the question about state
> disposal is disjoiny from how to keep flow start signaling from ossifying
> into an unintentional magic packet sequence you have to show the network.
> It makes sense to think about the "grippiness" of the protocol in terms of
> the eventual endpoint as well as management reqt's though.
>
> > Thus we end up with the tension between the documented wire image that
> > says that there is a "done" signal, and the actual wire image, which
> > has activity every 30 seconds.  Add genuine cases of migration,
> > crashes, stateless resets, and the other reasons that the "done"
> > signal doesn't appear and the timer has to come down.
> >
> > There might be benefits if everything comes together, but it's a long
> > game to play.
>
> I've been having some variant of this particular conversation for (checks
> watch) about four years now. ;)


Honestly, we should be checking a sundial.

If I'm understanding that the problem is what happens when signals are
unreliable and devices have to include workarounds that accommodate missed
signals, I THINK that's a conversation I overheard sometime around 2000, in
L2Triggers. I wasn't a participant in that conversation, but IIRC, the
reason that TRIGTRAN's scope was limited to first-hop routers in 2002 was
because of the problems L2Triggers had identified with signals coming from
routers that weren't locally attached, and we couldn't turn TRIGTRAN into
something useful even with that limitation.

The signals being discussed aren't the same signals, but the problems sound
very, very familiar.

Keeping in mind that I started Section 4 of
https://tools.ietf.org/html/draft-dawkins-panrg-what-not-to-do-00 with
TRIGTRAN, that's probably not an good sign ...

Do the right thing, of course.

Spencer