RE: Opsdir last call review of draft-ietf-quic-manageability-14

"MORTON JR., AL" <acmorton@att.com> Sun, 27 February 2022 18:50 UTC

Return-Path: <acmorton@att.com>
X-Original-To: quic@ietfa.amsl.com
Delivered-To: quic@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 74AB03A0D38; Sun, 27 Feb 2022 10:50:38 -0800 (PST)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -1.906
X-Spam-Level:
X-Spam-Status: No, score=-1.906 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, DKIM_SIGNED=0.1, DKIM_VALID=-0.1, RCVD_IN_DNSWL_BLOCKED=0.001, RCVD_IN_MSPIKE_H5=0.001, RCVD_IN_MSPIKE_WL=0.001, SPF_HELO_NONE=0.001, SPF_PASS=-0.001, T_SCC_BODY_TEXT_LINE=-0.01, URIBL_BLOCKED=0.001] autolearn=ham autolearn_force=no
Authentication-Results: ietfa.amsl.com (amavisd-new); dkim=pass (1024-bit key) header.d=att.onmicrosoft.com
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id SSLFTkkbY_So; Sun, 27 Feb 2022 10:50:33 -0800 (PST)
Received: from mx0b-00191d01.pphosted.com (mx0b-00191d01.pphosted.com [67.231.157.136]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id 5C7D73A0AAC; Sun, 27 Feb 2022 10:50:33 -0800 (PST)
Received: from pps.filterd (m0288870.ppops.net [127.0.0.1]) by m0288870.ppops.net-00191d01. (8.17.1.5/8.17.1.5) with ESMTP id 21REG2dr031158; Sun, 27 Feb 2022 13:50:30 -0500
Received: from alpi155.enaf.aldc.att.com (sbcsmtp7.sbc.com [144.160.229.24]) by m0288870.ppops.net-00191d01. (PPS) with ESMTPS id 3eg27up8w6-1 (version=TLSv1.2 cipher=ECDHE-RSA-AES256-GCM-SHA384 bits=256 verify=NOT); Sun, 27 Feb 2022 13:50:29 -0500
Received: from enaf.aldc.att.com (localhost [127.0.0.1]) by alpi155.enaf.aldc.att.com (8.14.5/8.14.5) with ESMTP id 21RIoSYi000461; Sun, 27 Feb 2022 13:50:29 -0500
Received: from zlp27129.vci.att.com (zlp27129.vci.att.com [135.66.87.42]) by alpi155.enaf.aldc.att.com (8.14.5/8.14.5) with ESMTP id 21RIoNCf000310 (version=TLSv1/SSLv3 cipher=DHE-RSA-AES256-GCM-SHA384 bits=256 verify=NO); Sun, 27 Feb 2022 13:50:23 -0500
Received: from zlp27129.vci.att.com (zlp27129.vci.att.com [127.0.0.1]) by zlp27129.vci.att.com (Service) with ESMTP id 0C5CE4039466; Sun, 27 Feb 2022 18:50:23 +0000 (GMT)
Received: from MISOUT7MSGEX2CB.ITServices.sbc.com (unknown [135.66.184.206]) by zlp27129.vci.att.com (Service) with ESMTP id CB9E240393F3; Sun, 27 Feb 2022 18:50:22 +0000 (GMT)
Received: from MISOUT7MSGED1AB.ITServices.sbc.com (135.66.184.208) by MISOUT7MSGEX2CB.ITServices.sbc.com (135.66.184.206) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256) id 15.1.2375.18; Sun, 27 Feb 2022 13:49:42 -0500
Received: from MISOUT7MSGETA02.tmg.ad.att.com (144.160.12.220) by MISOUT7MSGED1AB.ITServices.sbc.com (135.66.184.208) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256) id 15.1.2375.18 via Frontend Transport; Sun, 27 Feb 2022 13:49:42 -0500
Received: from NAM10-DM6-obe.outbound.protection.outlook.com (104.47.58.108) by edgeso2.exch.att.com (144.160.12.220) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id 15.1.2375.18; Sun, 27 Feb 2022 13:49:41 -0500
ARC-Seal: i=1; a=rsa-sha256; s=arcselector9901; d=microsoft.com; cv=none; b=IdvYFEkf6FYlGy27kn9ZFK8soqbhujDXcyOJKiYfRVO91eKFD+tdA00xUOJdAyQd/N6Xe8KRR+41+65/KcwJMutrHRU/+fVIHtPNAgvvyiOu141NOFY2FLPDjXDkk3A7pgRhrEnBpKrZSD9wNCT+bDRFqvqdNyErlGqcVPXzpmBXvGn6mHXDD9Snif0GmYvjMEkFtGSk9JdY836IWWT45tKU2QmnNvL/lKfDXTiI+QkINL73Zw/etbXs5oJA0dylsDfP8SQeUb1bx0uEIHrisjrTmVpB3hAE9BgO8FcfEedS8xGjh2luTYOAMZLTm7O4B8YJyvg5qyoCio5zQE8TgA==
ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=microsoft.com; s=arcselector9901; h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-AntiSpam-MessageData-ChunkCount:X-MS-Exchange-AntiSpam-MessageData-0:X-MS-Exchange-AntiSpam-MessageData-1; bh=mshpDrKkEU6FxuZotYlvh4UkUh9Ltw9qRTcpNzwT+qo=; b=JFMrXqd+mC9TFSzzi3saHbksywDAtT3qTDUXBewXl2/NThk1t6ZjKlBlNPPO0c8Ebz8GFavvWyLP0tOWBwkhNbebbnyhJSvKYXrDR8lcEWioa1La18l/b9beHYqnNyawtP8axQwpIYcDcxJxIBNpDYnzq1geQb0bp2/Jz3iGFBx1b32/PtfEqFzSfGdPPM4dqG8b7NQ5u8+TrS/2jGLa4Kb3pm/cI7x+mjH4sWJQOtlv8IsKBw46EfYIY+zHr1GgapgIrjr0IuFHAv+EutnS1JfwLAF0w5WNl1GP+CNDvv5cC7WBdPz8sD+E7ipAjt7IR94WpcBnWOyvuJ4ur0HmEQ==
ARC-Authentication-Results: i=1; mx.microsoft.com 1; spf=pass smtp.mailfrom=att.com; dmarc=pass action=none header.from=att.com; dkim=pass header.d=att.com; arc=none
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=att.onmicrosoft.com; s=selector2-att-onmicrosoft-com; h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-SenderADCheck; bh=mshpDrKkEU6FxuZotYlvh4UkUh9Ltw9qRTcpNzwT+qo=; b=V9/FDmaDxZfMR8oxj+Et04el1TddiJqXF5htQIuK8HVZxiSsF9ypLw/zfPQPMRge8d+HEjrsRm05pL9QIl54+biVek5z8AKNBbDwIY8ymj0qNljabuGSzjsKpNhQ1OoTeW9fhcfAV5OBMegIJjjI1mrfVeJh65jigY9K8qg1t5A=
Received: from CH0PR02MB7980.namprd02.prod.outlook.com (2603:10b6:610:105::17) by BN8PR02MB6433.namprd02.prod.outlook.com (2603:10b6:408:ad::10) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id 15.20.5017.24; Sun, 27 Feb 2022 18:49:40 +0000
Received: from CH0PR02MB7980.namprd02.prod.outlook.com ([fe80::cd34:2582:613:215b]) by CH0PR02MB7980.namprd02.prod.outlook.com ([fe80::cd34:2582:613:215b%5]) with mapi id 15.20.5017.026; Sun, 27 Feb 2022 18:49:40 +0000
From: "MORTON JR., AL" <acmorton@att.com>
To: Mirja Kuehlewind <mirja.kuehlewind@ericsson.com>
CC: "last-call@ietf.org" <last-call@ietf.org>, "draft-ietf-quic-manageability.all@ietf.org" <draft-ietf-quic-manageability.all@ietf.org>, "quic@ietf.org" <quic@ietf.org>, "ops-dir@ietf.org" <ops-dir@ietf.org>
Subject: RE: Opsdir last call review of draft-ietf-quic-manageability-14
Thread-Topic: Opsdir last call review of draft-ietf-quic-manageability-14
Thread-Index: AdggNpsvC4XiX/liSmSPxtbxuobGvgG9Sw6AATXYhEA=
Date: Sun, 27 Feb 2022 18:49:40 +0000
Message-ID: <CH0PR02MB79803C4AF8ED0F28A5F81D30D3009@CH0PR02MB7980.namprd02.prod.outlook.com>
References: <CH0PR02MB7980CA04E5EADBF6D25AD8F2D3319@CH0PR02MB7980.namprd02.prod.outlook.com> <D82872C2-4C79-45AB-92F1-9F27B324ADE0@ericsson.com>
In-Reply-To: <D82872C2-4C79-45AB-92F1-9F27B324ADE0@ericsson.com>
Accept-Language: en-US
Content-Language: en-US
X-MS-Has-Attach:
X-MS-TNEF-Correlator:
x-ms-publictraffictype: Email
x-ms-office365-filtering-correlation-id: fc3fba37-0f70-4d55-a80b-08d9fa21e933
x-ms-traffictypediagnostic: BN8PR02MB6433:EE_
x-microsoft-antispam-prvs: <BN8PR02MB6433E59F139C25D47CA3CD28D3009@BN8PR02MB6433.namprd02.prod.outlook.com>
x-ms-exchange-senderadcheck: 1
x-ms-exchange-antispam-relay: 0
x-microsoft-antispam: BCL:0;
x-microsoft-antispam-message-info: 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
x-forefront-antispam-report: CIP:255.255.255.255; CTRY:; LANG:en; SCL:1; SRV:; IPV:NLI; SFV:NSPM; H:CH0PR02MB7980.namprd02.prod.outlook.com; PTR:; CAT:NONE; SFS:(13230001)(4636009)(366004)(8936002)(38100700002)(8676002)(66476007)(66446008)(83380400001)(76116006)(55016003)(64756008)(4326008)(66946007)(82202003)(6916009)(30864003)(54906003)(66574015)(2906002)(26005)(316002)(186003)(122000001)(38070700005)(66556008)(86362001)(508600001)(52536014)(5660300002)(82960400001)(9686003)(53546011)(966005)(7696005)(6506007)(71200400001)(33656002)(579004); DIR:OUT; SFP:1101;
x-ms-exchange-antispam-messagedata-chunkcount: 1
x-ms-exchange-antispam-messagedata-0: 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
Content-Type: text/plain; charset="utf-8"
Content-Transfer-Encoding: base64
MIME-Version: 1.0
X-MS-Exchange-CrossTenant-AuthAs: Internal
X-MS-Exchange-CrossTenant-AuthSource: CH0PR02MB7980.namprd02.prod.outlook.com
X-MS-Exchange-CrossTenant-Network-Message-Id: fc3fba37-0f70-4d55-a80b-08d9fa21e933
X-MS-Exchange-CrossTenant-originalarrivaltime: 27 Feb 2022 18:49:40.2352 (UTC)
X-MS-Exchange-CrossTenant-fromentityheader: Hosted
X-MS-Exchange-CrossTenant-id: e741d71c-c6b6-47b0-803c-0f3b32b07556
X-MS-Exchange-CrossTenant-mailboxtype: HOSTED
X-MS-Exchange-CrossTenant-userprincipalname: h+957al8bRMvJawCxGBNklXZRAcjvMyySoF5mRkiO1t4dcykgo7CcD1AkIrWKziC
X-MS-Exchange-Transport-CrossTenantHeadersStamped: BN8PR02MB6433
X-OriginatorOrg: att.com
X-TM-SNTS-SMTP: B843A723CCFCAC724CC28BF99E71B83DB2544C295DD748905B2107F07213FFEB2
X-Proofpoint-GUID: AlEjXPEXWQ3uk-iu4pItUWfi6JirAuB-
X-Proofpoint-ORIG-GUID: AlEjXPEXWQ3uk-iu4pItUWfi6JirAuB-
X-Proofpoint-Virus-Version: vendor=baseguard engine=ICAP:2.0.205,Aquarius:18.0.816,Hydra:6.0.425,FMLib:17.11.64.514 definitions=2022-02-27_08,2022-02-26_01,2022-02-23_01
X-Proofpoint-Spam-Details: rule=outbound_policy_notspam policy=outbound_policy score=0 bulkscore=0 clxscore=1011 spamscore=0 impostorscore=0 mlxscore=0 priorityscore=1501 adultscore=0 mlxlogscore=999 suspectscore=0 phishscore=0 malwarescore=0 lowpriorityscore=0 classifier=spam adjust=0 reason=mlx scancount=1 engine=8.12.0-2201110000 definitions=main-2202270130
Archived-At: <https://mailarchive.ietf.org/arch/msg/quic/xwEKClx-fnC9k9E40dt5i_ViyUs>
X-BeenThere: quic@ietf.org
X-Mailman-Version: 2.1.29
Precedence: list
List-Id: Main mailing list of the IETF QUIC working group <quic.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/quic>, <mailto:quic-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/quic/>
List-Post: <mailto:quic@ietf.org>
List-Help: <mailto:quic-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/quic>, <mailto:quic-request@ietf.org?subject=subscribe>
X-List-Received-Date: Sun, 27 Feb 2022 18:50:39 -0000

Hi Mirja,

Thanks for the fallback terminology clean-up and other text suggestions.

It would great to pass along one or two facts about QUIC to operators in the areas I commented on below [acm]. I think you can make your points about the version field without specifying operator policy, and about fallback uncertainties by sticking to the facts. 

Thanks again,
Al

> -----Original Message-----
> From: Mirja Kuehlewind <mirja.kuehlewind@ericsson.com>
> Sent: Monday, February 21, 2022 8:03 AM
> To: MORTON JR., AL <acmorton@att.com>
> Cc: last-call@ietf.org; draft-ietf-quic-manageability.all@ietf.org;
> quic@ietf.org; ops-dir@ietf.org
> Subject: Re: Opsdir last call review of draft-ietf-quic-manageability-14
> 
> Hi Al,
> 
> see below again marked with [MK].
> 
> On 12.02.22, 20:05, "MORTON JR., AL" <acmorton@att.com> wrote:
> 
>     Hi Mirja, Thanks for your replies.
> 
>     I replied below: some concerns with assumptions about operators in a doc
> for operators, and TCP-f-something (use a single term) is still unresolved...
> 
>     Al
>     >
>     >     2.4.  The QUIC Handshake
>     >
>     >     ...
>     >
>     >        Client                                    Server
>     >          |                                          |
>     >          +----Client Initial----------------------->|
>     >          +----(zero or more 0RTT)------------------>|
>     >          |                                          |
>     >          |<-----------------------Server Initial----+
>     >          |<---------(1RTT encrypted data starts)----+
>     >          |                                          |
>     >          +----Client Completion-------------------->|
>     >          +----(1RTT encrypted data starts)--------->|
>     >          |                                          |
>     >          |<--------------------Server Completion----+
>     >          |                                          |
>     >
>     >        Figure 1: General communication pattern visible in the QUIC
> handshake
>     >
>     >        As shown here, the client can send 0-RTT data as soon as it has
> sent
>     >        its Client Hello, and the server can send 1-RTT data as soon as
> it
>     >        has sent its Server Hello.  The Client Completion flight contains
> at
>     >        least one Handshake packet and could also include an Initial
> packet.
>     >        QUIC packets in separate contexts during the handshake can be
>     >        coalesced (see Section 2.2) in order to reduce the number of UDP
>     >        datagrams sent during the handshake.  QUIC packets can be lost
> and
>     >        reordered, so packets within a flight might not be sent close in
>     >        time, though the sequence of the flights will not change, because
> one
>     >        flight depends upon the peer's previous flight.
>     >
>     >     [acm]
>     >     It's great to add some Not-Sunny-Day info in the description,
> thanks!
>     >     But can you add a little more?  For example:
>     >     Is it possible that network reordering can cause the handshake to
> fail?
>     >     What rerodering extent (yes, that's a metric) would be required to
> cause
>     >     failure or unnecessary retransmission? Lost packets would result in
> time-outs
>     >     and retransmission, so what are the default time-outs? Is there a
> paper where
>     >     some/all of the above have been investigated, that you could
> reference to save
>     >     some work?
>     >
>     > [MK] I don't think I have a good answer to these questions. However, I
> don't
>     > think these questions are necessarily QUIC specific. Reordering in
> itself is
>     > not a problem for the QUIC handshake, however, if some packets are also
>     > delayed a lot and therefore detected as loss, it might get the handshake
> to
>     > fail. How long you keep state to wait for delayed packets in mostly
>     > implementation specific, however, as I said this is also not a unique
> problem
>     > to the QUIC handshake.
>     [acm]
>     You've partly answered the questions above, and with help from Gorry and
> Martin's replies let me suggest the following (mostly stuff I didn't know
> about QUIC yet):
> 
>     Whether packet reordering affects/can be observed on the handshake depends
> on the timeout period (which varies, but might be 10s or 30s in common cases),
> the constraints implemented in a server (whether to take on arbitrary state
> based on the first packet), and the extent of reordering incurred on the path.
> Reordering having sufficient extent might inferred as packet loss, as with any
> protocol.
> 
> [Mk] Okay I ended up with the following:
> 
> "Handshake packets can arrive out-of-order without impacting the handshake as
> long as the reordering did not cause extensive delays which would be consider
> as loss by either side. If QUIC packets get lost or reordered, packets
> belonging
> to the same flight might not be observed in close in time, though the sequence
> of the flights will not change, because one flight depends upon the peer's
> previous flight."
> 
> [Mk] Does that work?
> 
> [MK] See also: https://urldefense.com/v3/__https://github.com/quicwg/ops-
> drafts/pull/458/files__;!!BhdT!jhSx83YqoVthpH2tB3oiivf7HPOhFDpLtxuPvRpfshchNQL
> nnC-HGSULZeODPj6SGXmzIGgVEiIrCIQg5OBu0NjH$
> 
[acm] I see that there was additional editing since you wrote last Monday, so I made a comment and suggestions on GitHub.
> 
> 
>     >
>     > [MK] Further, this section in the draft really only explains what you
> have to
>     > expect when you see QUIC traffic as a passive obverser. The reason why
> we
>     > mention loss and reorder in this section, is really just to say, if you
> e.g.
>     > want to detect the QUIC handshake as a passive on-path observer, you
> should
>     > not expect it to always look exactly like this (as here might be
> reordering or
>     > loss earlier in the network between the client and your observation
> point).
>     [acm]
>     But "you should not expect it to always look exactly like this" is always
> part of the passive observation game. Next step, heuristics.
> 
> [Mk] Yes, that's true.
> 
>     >
>     >     ...
>     >
>     >     2.8.  Version Negotiation and Greasing
>     >
>     >     ...
>     >        QUIC is expected to evolve rapidly, so new versions, both
>     >        experimental and IETF standard versions, will be deployed on the
>     >        Internet more often than with traditional Internet- and
> transport-
>     >        layer protocols.  Using a particular version number to recognize
>     >        valid QUIC traffic is likely to persistently miss a fraction of
> QUIC
>     >        flows and completely fail in the near future, and is therefore
> not
>     >        recommended.
>     >     [acm] Where "valid traffic" is the focus, I agree, let it flow.
>     >     But the Operator's focus may instead be "admissible traffic", where
>     >     experimental traffic is not wanted or allowed. IOW, only traffic
> that is
>     >     understood to conform to <RFC list> shall pass, because "Active
> Attacks are
>     >     also Pervasive", to put a different spin on 7258. [acm] See also the
> comment in
>     >     3.4.1.
>     >
>     > [MK] This is not about experimentation.
>     [acm]
>     OK, let's just say unexpected traffic.
> 
>     > The expectation is that QUIC versions
>     > will change often, e.g. we already have a draft for a new version
> adopted in
>     > the group and there might be another RFC some time this year. So if you
>     > "manually" have to allow for new versions in all your equipment that
> will
>     > delay deployment of new versions (or even hinder them because there is
> always
>     > one box that doesn't get updated). Therefore we strongly recommend to
> not use
>     > the version to filter QUIC traffic. Is that not clear enough in the
> text?
>     >
>     >        In addition, due to the speed of evolution of the
>     >        protocol, devices that attempt to distinguish QUIC traffic from
> non-
>     >        QUIC traffic for purposes of network admission control should
> admit
>     >        all QUIC traffic regardless of version.
>     [acm]
>     I think it is clear, and at the same time, it is aspirational for many
> networks.
>     This sentence informs, but then strays into policy.
> 
>     Maybe this will work:
>           ...devices that attempt to distinguish QUIC traffic from non-
>            QUIC traffic for purposes of network admission control should not
> rely
>            on the version field alone.
> 
> [MK] I think your proposal is not correct because the whole point is that you
> really should not use the version field _at all_. I know that people will
> still do that, but I think we should at least spell it out clearly here that
> this is problematic and hinders evolution.
[acm] 
Evolution is what happens when a succeeding RFC is approved.
Experimentation is the many months between approvals.

	...devices that attempt to distinguish QUIC traffic from non-
     QUIC traffic for purposes of network admission control 
*** should admit all QUIC traffic regardless of version.***
The last phrase attempts to define operator policy. 
Don't do that. 
The version field exists. It's specified in a standard. 
If you simply say, 
"The version field will change in the future." no one will be surprised. 

> 
>     >
>     >     [acm] I was hoping to see a description of fallback to TCP (I see
> that fallback
>     >     is mentioned briefly at the end of section 4.2., and later, fail
> over and
>     >     failover. pick one...)
>     >
>     >     How can Network Operators observe when a QUIC setup has failed, and
> the
>     >     corresponding TCP fallback connection(s) succeeded?
>     >
>     > [MK] There is no unified way how and if fallback is implemented.
> However, why
>     > do you think a network operator would need that information?
>     [acm]
>     To affirm that their admission policy is working properly, for one reason.
> 
> [MK] However, there is really no guarantee that all QUIC will have a fallback.
> Without further knowledge about what higher layer service the QUIC transport
> carries, I don't think you can make any assumption about fallback. If you want
> to support evolution, you need to support QUIC and not rely on any potentially
> fallbacks.
[acm] 
I chose example carefully: the operator wants to support QUIC, but has reports that QUIC setup is failing and needs to make measurements to gather symptoms & info. Experience will indicate the circumstances where QUIC setup failure is accompanied by fallback, and other possibilities. Repeated experiences become heuristics for passive observation.
No assumptions necessary.  
Has QUIC setup failed if the exchanges in Figure 1 are incomplete? 
I think there might be a yes or no answer...
If no, then the passive observation procedure will mostly be governed by heuristics.
> 
>     >
>     >     Is there a reference available with this info, to save effort here?
>     >
>     > [MK] As I said this is rather implementation specific, so I would say
> no.
>     >
>     >     ...
>     >
>     >     3.4.1.  Extracting Server Name Indication (SNI) Information
>     >
>     >     ...
>     >
>     >        Note that proprietary QUIC versions, that have been deployed
> before
>     >        standardization, might not set the first bit in a QUIC long
> header
>     >        packet to 1.  However, it is expected that these versions will
>     >        gradually disappear over time.
>     >     [acm]
>     >     And some networks may prefer not to admit experimental traffic. The
> goal of the
>     >     experiment may be problematic for the network operator and/or their
>     >     subscribers. I think this is legitimate operator behavior, and worth
> a few more
>     >     words in the draft.
>     >
>     > [MK] To be honest I don't understand this point. How would an operator
> even
>     > know if an experiment would be problematic or no? QUIC is fully
> encrypted.
>     > Versioning is only one extension mechanism. So basically even if you see
> the
>     > same version number, the QUIC behind that could behave very differently
>     > depending on which extensions are used and because of the encryption,
> there is
>     > no chance for the operator to know about this. Is this not clear in the
>     > document? Do we need to state this more clearly?
>     [acm]
>     First, let's say s/experimental/unexpected/ or s/experimental/proprietary/
>     Then, I'm responding to your reply more than the paragraph in the draft
> now:
>     Network operators are also end users, and often act on their subscriber's
> behalf. Observations are not strictly limited to mid-points, where encryption
> is present.
>     Harboring old notions of what operators cannot do will not sit well with
> your audience...
> 
>     So, (in the paragraph above) you've informed operators that some
> proprietary QUIC versions remain in use as of this writing.
>     But traffic that doesn't conform *might* be considered nefarious. That's
> all. It's a message for everyone involved.
> 
> [MK] I think the point is actually rather that we want to say here: if you
> don't support these old versions that will not be a problem in the near
> future.
[acm] 
Ok, say that in the draft, please.

> 
>     >
>     >     ...
>     >
>     >     3.8.1.  Measuring Initial RTT
>     >
>     >     ...
>     >
>     >        Handshake RTT can be measured by adding the client-to-observer
> and
>     >        observer-to-server RTT components together.  This measurement
>     >        necessarily includes any transport- and application-layer delay
> at
>     >        both endpoints.
>     >     [acm] suggest s/any/all/
>     >
>     > [MK] Done!
>     >
>     >     3.8.2.  Using the Spin Bit for Passive RTT Measurement
>     >
>     >     ...
>     >
>     >        Note that this measurement, as with passive RTT measurement for
> TCP,
>     >        includes any transport protocol delay (e.g., delayed sending of
>     >     [acm] suggest s/any/all/
>     >
>     > [MK] Done!
>     >
>     >     ...
>     >
>     >        Since the spin bit logic at each endpoint considers only samples
> from
>     >        packets that advance the largest packet number, signal generation
>     >        itself is resistant to reordering.  However, reordering can cause
>     >        problems at an observer by causing spurious edge detection and
>     >        therefore inaccurate (i.e., lower) RTT estimates, if reordering
>     >        occurs across a spin-bit flip in the stream.
>     >     [acm] thanks for mentioning this!
>     >
>     >     ...
>     >
>     >        Raw RTT samples generated using these techniques can be processed
> in
>     >        various ways to generate useful network performance metrics.  A
>     >        simple linear smoothing or moving minimum filter can be applied
> to
>     >        the stream of RTT samples to get a more stable estimate of
>     >        application-experienced RTT.  RTT samples measured from the spin
> bit
>     >        can also be used to generate RTT distribution information,
> including
>     >        minimum RTT (which approximates network RTT over longer time
> windows)
>     >        and RTT variance (which approximates jitter as seen by the
>     >        application).
>     >     [acm]   (let's avoid the clocky term "jitter", and clarify)
>     >     Suggest: (which over-estimates one-way packet delay variance as seen
> by an
>     >     application end-point).
>     >
>     > [MK] Done!
>     >
>     >     4.  Specific Network Management Tasks
>     >     ...
>     >
>     >     4.2.  Stateful Treatment of QUIC Traffic
>     >
>     >        Stateful treatment of QUIC traffic (e.g., at a firewall or NAT
>     >        middlebox) is possible through QUIC traffic and version
>     >        identification (Section 3.1) and observation of the handshake for
>     >        connection confirmation (Section 3.2).  The lack of any visible
> end-
>     >        of-flow signal (Section 3.6) means that this state must be purged
>     >        either through timers or through least-recently-used eviction,
>     >        depending on application requirements.
>     >     [acm] Comment: It suddenly struck me that this might be similar to
> the scenario
>     >     that dkg frequently cited during QUIC development: His ISP would
> terminate idle
>     >     TCP connections after many hours. See the citation of RFC5382 below.
> Don't
>     >     expect QUIC connections to stay-up forever! The next Purge will
> occur in 3, 2,
>     >     1, ...
>     >
>     > [MK] QUIC has the connection ID mainly because time-outs for UDP are
> often
>     > short. So I think this is a known problem. Or is there anything you
> think we
>     > should add to this document?
>     [acm]
>     You've made the recommendation below, I was just making a "*Comment*"
>     >
>     >        While QUIC has no clear network-visible end-of-flow signal and
>     >        therefore does require timer-based state removal, the QUIC
> handshake
>     >        indicates confirmation by both ends of a valid bidirectional
>     >        transmission.  As soon as the handshake completed, timers should
> be
>     >        set long enough to also allow for short idle time during a valid
>     >        transmission.
>     >
>     >        [RFC4787] requires a network state timeout that is not less than
> 2
>     >        minutes for most UDP traffic.  However, in practice, a QUIC
> endpoint
>     >        can experience lower timeouts, in the range of 30 to 60 seconds
>     >        [QUIC-TIMEOUT].
>     >
>     >        In contrast, [RFC5382] recommends a state timeout of more than 2
>     >        hours for TCP, given that TCP is a connection-oriented protocol
> with
>     >        well- defined closure semantics.  Even though QUIC has explicitly
>     >        been designed to tolerate NAT rebindings, decreasing the NAT
> timeout
>     >        is not recommended, as it may negatively impact application
>     >        performance or incentivize endpoints to send very frequent keep-
> alive
>     >        packets.
>     >
>     >        The recommendation is therefore that, even when lower state
> timeouts
>     >        are used for other UDP traffic, a state timeout of at least two
>     >        minutes ought to be used for QUIC traffic.
>     >     [acm]
>     >     2 minutes, not hours. got it.
>     >
>     >     ...
>     >
>     >     4.5.  Filtering Behavior
>     >
>     >        [RFC4787] describes possible packet filtering behaviors that
> relate
>     >        to NATs but is often also used is other scenarios where packet
>     >        filtering is desired.  Though the guidance there holds, a
>     >        particularly unwise behavior admits a handful of UDP packets and
> then
>     >        makes a decision to whether or not filter later packets in the
> same
>     >        connection.  QUIC applications are encouraged to fail over to TCP
> if
>     >     [acm]
>     >     is "fail over" or "fallback" the preferred term?
>     >     (using only one will help)
>     [acm]
>     Still need to pick-one here, and everywhere...
> 
>     Spencer and others had some replies/follow-up comments here.
> 
> [MK] We already did a PR for this as I mentioned at the beginning of the mail:
> https://urldefense.com/v3/__https://github.com/quicwg/ops-
> drafts/pull/457/files__;!!BhdT!jhSx83YqoVthpH2tB3oiivf7HPOhFDpLtxuPvRpfshchNQL
> nnC-HGSULZeODPj6SGXmzIGgVEiIrCIQg5C7fXZZI$
> 
> [MK] Thanks! Mirja
[acm] 
Great, thanks for that PR.
> 
>     >
>     >        early packets do not arrive at their destination
>     >        [QUIC-APPLICABILITY], as QUIC is based on UDP and there are known
>     >        blocks of UDP traffic (see Section 4.6).  Admitting a few packets
>     >        allows the QUIC endpoint to determine that the path accepts QUIC.
>     >        Sudden drops afterwards will result in slow and costly timeouts
>     >        before abandoning the connection.
>     >
>     >     4.6.  UDP Blocking, Throttling, and NAT Binding
>     >
>     >     ...
>     >        Further, if UDP traffic is desired to be throttled, it is
> recommended
>     >        to block individual QUIC flows entirely rather than dropping
> packets
>     >        indiscriminately.  When the handshake is blocked, QUIC-capable
>     >        applications may fail over to TCP.  However, blocking a random
>     >     [acm]
>     >     is "fail over" or "fallback" the preferred term?
>     >     (using only one will help)
>     >
>     >        fraction of QUIC packets across 4-tuples will allow many QUIC
>     >        handshakes to complete, preventing a TCP failover, but these
>     >     [acm] ... or "failover" preferred?
>     >
>     >        connections will suffer from severe packet loss (see also
>     >        Section 4.5).  Therefore, UDP throttling should be realized by
> per-
>     >        flow policing, as opposed to per-packet policing.  Note that this
>     >        per-flow policing should be stateless to avoid problems with
> stateful
>     >        treatment of QUIC flows (see Section 4.2), for example blocking a
>     >        portion of the space of values of a hash function over the
> addresses
>     >        and ports in the UDP datagram.  While QUIC endpoints are often
> able
>     >        to survive address changes, e.g. by NAT rebindings, blocking a
>     >        portion of the traffic based on 5-tuple hashing increases the
> risk of
>     >        black-holing an active connection when the address changes.
>     >     ...
>     >
>     >     4.8.  Quality of Service Handling and ECMP Routing
>     >
>     >        It is expected that any QoS handling in the network, e.g. based
> on
>     >        use of DiffServ Code Points (DSCPs) [RFC2475] as well as Equal-
> Cost
>     >        Multi-Path (ECMP) routing, is applied on a per flow-basis (and
> not
>     >        per-packet) and as such that all packets belonging to the same
> active
>     >        QUIC connection get uniform treatment.
>     >     [acm] Comment: so networks should continue their *extra* efforts for
> datagrams,
>     >     like maintaining order, while the datagram streams take away as much
> info as
>     >     they can. got it...
>     >
>     > [MK] I don't think networks should put in extra effort to reordering,
>     > especially as reordering usually causes delays. Actually QUIC, as well
> as TCP
>     > with certain extensions, can be quite robust to re-ordering but that's
>     > implementation specific, and therefore you never know as passive
> observer.
>     > The ask is rather, as you do today for TCP, to avoid reordering in the
> first
>     > place if possible, e.g. use the full 5-tuple for ECMP. So I think the
> ask is
>     > actually rather to keep thing running as they are right now, than doing
>     > anything special for QUIC. Again do we need to make that message more
> clear?
>     [acm]
>     Again, this was a "*Comment:*"
> 
>     Yes, there extra effort/complexity in the networks to avoid steady-state
> reordering. It would be better if new protocols (e.g., QUIC) were less
> sensitive to steady-state reordering, then networks could remove this form of
> complexity when all the sensitive protocols (and apps) have sunset. But that
> seems to be much farther out in time than most of us care about.
>     >
>     > [MK] Thanks again! Mirja
>     >
>     >
>     >     Done.
>     >
>     >
>     >
>