Re: [Taps] Robert Wilton's Yes on draft-ietf-taps-interface-22: (with COMMENT)

Michael Welzl <michawe@ifi.uio.no> Wed, 06 September 2023 18:35 UTC

Return-Path: <michawe@ifi.uio.no>
X-Original-To: taps@ietfa.amsl.com
Delivered-To: taps@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 71DD8C151988; Wed, 6 Sep 2023 11:35:50 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -7.007
X-Spam-Level:
X-Spam-Status: No, score=-7.007 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, DKIM_SIGNED=0.1, DKIM_VALID=-0.1, DKIM_VALID_AU=-0.1, HTML_MESSAGE=0.001, RCVD_IN_DNSWL_HI=-5, RCVD_IN_ZEN_BLOCKED_OPENDNS=0.001, SPF_PASS=-0.001, T_SCC_BODY_TEXT_LINE=-0.01, URIBL_DBL_BLOCKED_OPENDNS=0.001, URIBL_ZEN_BLOCKED_OPENDNS=0.001] autolearn=unavailable autolearn_force=no
Authentication-Results: ietfa.amsl.com (amavisd-new); dkim=pass (2048-bit key) header.d=ifi.uio.no
Received: from mail.ietf.org ([50.223.129.194]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id spIhNmsSGbLl; Wed, 6 Sep 2023 11:35:46 -0700 (PDT)
Received: from mail-out02.uio.no (mail-out02.uio.no [IPv6:2001:700:100:8210::71]) (using TLSv1.3 with cipher TLS_AES_256_GCM_SHA384 (256/256 bits) key-exchange X25519 server-signature RSA-PSS (2048 bits) server-digest SHA256) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id 6AD27C1522DA; Wed, 6 Sep 2023 11:35:44 -0700 (PDT)
DKIM-Signature: v=1; a=rsa-sha256; q=dns/txt; c=relaxed/relaxed; d=ifi.uio.no; s=key2103; h=References:To:Cc:In-Reply-To:Date:Subject:Mime-Version: Content-Type:Message-Id:From:Sender:Reply-To:Content-Transfer-Encoding: Content-ID:Content-Description:Resent-Date:Resent-From:Resent-Sender: Resent-To:Resent-Cc:Resent-Message-ID:List-Id:List-Help:List-Unsubscribe: List-Subscribe:List-Post:List-Owner:List-Archive; bh=50KM70MKcatv+M/Pru9dUo+gs/cYW/TxxjTqs0SQSAc=; b=00Ktfk2BVr5BqVsOgc6tIdsILT NJiCTK44zegmiZhyWdhA1pAS5xm6W3k5AK/y6/ZP1Evjgx/slahw0c03IUuanjPaOo3Mvw7DUPmLx kbsKbO1ePlyuONfuEFcC3YO21dR7i57JbdaUO9SWOQuU8JK8g03QJywa3b0YRVwhb4lSmchiw03gR 0T9whZm4VakqhAFu2bn1UxA7m+yoRGAexqHuI3lBfB9WhQPtYz97x7fZ4q35uasooQ5VIx+mwXj1I DzKrmiQbahUBtYMWPDJq6ukjSGpsWFo8Fdih9dZS0mmCJ77jSRmKcrFG+UlROCSvzdv5rQ6Xdzu7i jcIW1C9w==;
Received: from mail-mx04.uio.no ([129.240.10.25]) by mail-out02.uio.no with esmtps (TLS1.2) tls TLS_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384 (Exim 4.96) (envelope-from <michawe@ifi.uio.no>) id 1qdxNG-005IQk-0M; Wed, 06 Sep 2023 20:35:34 +0200
Received: from [185.176.244.75] (helo=smtpclient.apple) by mail-mx04.uio.no with esmtpsa (TLS1.2:ECDHE-ECDSA-AES256-GCM-SHA384:256) user michawe (Exim 4.96) (envelope-from <michawe@ifi.uio.no>) id 1qdxND-0002F8-0g; Wed, 06 Sep 2023 20:35:33 +0200
From: Michael Welzl <michawe@ifi.uio.no>
Message-Id: <78477B84-F7C6-4A17-B2EC-E246B2EC8125@ifi.uio.no>
Content-Type: multipart/alternative; boundary="Apple-Mail=_78472532-84CE-4643-A8DF-6C1C632AF9BC"
Mime-Version: 1.0 (Mac OS X Mail 16.0 \(3696.120.41.1.1\))
Date: Wed, 06 Sep 2023 20:35:12 +0200
In-Reply-To: <CABKfq-btqtAWySmTw_3bZMi2=EnShfUe+cQt-8=g00tagCsr4w@mail.gmail.com>
Cc: Zaheduzzaman Sarker <zahed.sarker.ietf@gmail.com>, "Devon H. O'Dell" <dhobsd=40google.com@dmarc.ietf.org>, Robert Wilton <rwilton@cisco.com>, The IESG <iesg@ietf.org>, draft-ietf-taps-interface@ietf.org, taps-chairs@ietf.org, taps@ietf.org, anna.brunstrom@kau.se
To: "Devon H. O'Dell" <dhobsd@google.com>
References: <169400859112.20072.5328867108981284361@ietfa.amsl.com> <CABKfq-ZEBZ1wbL+gY4yZ7QAHokD2BfYoBYmZnyr73guD+dJ_cQ@mail.gmail.com> <CAEh=tce6Yx_tsEp48u=JY7ocpX+v-MGyAwPPkZjKvirSCa=4QA@mail.gmail.com> <CABKfq-btqtAWySmTw_3bZMi2=EnShfUe+cQt-8=g00tagCsr4w@mail.gmail.com>
X-Mailer: Apple Mail (2.3696.120.41.1.1)
X-UiO-SPF-Received: Received-SPF: neutral (mail-mx04.uio.no: 185.176.244.75 is neither permitted nor denied by domain of ifi.uio.no) client-ip=185.176.244.75; envelope-from=michawe@ifi.uio.no; helo=smtpclient.apple;
X-UiO-Spam-info: not spam, SpamAssassin (score=-4.9, required=5.0, autolearn=disabled, AWL=0.079, HTML_MESSAGE=0.001, UIO_MAIL_IS_INTERNAL=-5)
X-UiO-Scanned: 47401B1DC3820B3881FDE69C76AC8D81705BA881
X-UiOonly: 9CF74324F9552E3B55D062ECA7F06B952EBCB07A
Archived-At: <https://mailarchive.ietf.org/arch/msg/taps/nllOBdKZIBGqy-oipoo7iAlllF8>
Subject: Re: [Taps] Robert Wilton's Yes on draft-ietf-taps-interface-22: (with COMMENT)
X-BeenThere: taps@ietf.org
X-Mailman-Version: 2.1.39
Precedence: list
List-Id: "IETF Transport Services \(TAPS\) Working Group" <taps.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/taps>, <mailto:taps-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/taps/>
List-Post: <mailto:taps@ietf.org>
List-Help: <mailto:taps-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/taps>, <mailto:taps-request@ietf.org?subject=subscribe>
X-List-Received-Date: Wed, 06 Sep 2023 18:35:50 -0000

Hi,

My 2 cents below - but note, I’m an individual who wasn’t even a chair, so this is just an “outside” opinion:


> On Sep 6, 2023, at 5:59 PM, Devon H. O'Dell <dhobsd@google.com> wrote:
> 
> On Wed, Sep 6, 2023 at 11:02 AM Zaheduzzaman Sarker
> <zahed.sarker.ietf@gmail.com <mailto:zahed.sarker.ietf@gmail.com>> wrote:
>> On Wed, Sep 6, 2023 at 4:29 PM Devon H. O'Dell <dhobsd=40google.com@dmarc.ietf.org> wrote:
>>> 
>>> On Wed, Sep 6, 2023 at 9:56 AM Robert Wilton via Datatracker
>>> <noreply@ietf.org> wrote:
>>>> ----------------------------------------------------------------------
>>>> COMMENT:
>>>> ----------------------------------------------------------------------
>>>> 
>>>> Hi,
>>>> 
>>>> Moderate level comments:
>>>> 
>>>> (1) As per the architecture doc, I think that it is great that you are defining
>>>> a new transport API.  I note that this API doesn't really include any standard
>>>> APIs or structures to monitor the state of the transport sessions for a given
>>>> application (i.e., API user).  E.g., how many connections are currently open,
>>>> total number of connections (since library was initialized), number of errored
>>>> transport connections, drops, mtu issues, flow rates, etc.  I think that with
>>>> some of the changes to the Internet architecture (e.g., QUIC to cite one
>>>> obvious example), it reduces the ability for network operators to monitor and
>>>> debug network issues between applications.  A potential corollary of this is
>>>> that a lot more debug and diagnostics information will need to be made
>>>> available to applications in a common way to allow application support staff,
>>>> and users of those applications to better understand where in the network
>>>> issues and failures are happening.  It would seem unreasonable for me to hold a
>>>> discuss on this document for what might be a lot of work and discussion that
>>>> could take a long time to resolve but I hope that the authors and WG will
>>>> consider whether there is further useful future work required in additional
>>>> RFCs.
>>> 
>>> Thanks for bringing this up. It's indeed a huge subject and I agree
>>> that it's a topic for additional publications. I had intended to
>>> discuss this in the interim in May, but I was unfortunately unable to
>>> attend last-minute. I see the observability space as related to
>>> configuration / discoverability / policy topics.
>> 
>> 
>> You have rightly identified this as a "huge subject" and it will need more work on technical gap analysis, security analysis and involvement from other expertise areas before we can take on the work and publish them. This, to me, goes beyond the transport services defined as in the TAPS and current TAPS charter scope. It would also need broader IETF discussion to understand views.
>> 
>>> 
>>> 
>>> It appears in the minutes of that meeting[1] that Zahed still prefers
>>> to close the WG. I'm still very much interested in exploring this
>>> space. What's the best path forward on this topic?
>> 
>> 
>> I think we should have a separate discussion on the topics you are interested in to find out what is the best way forward, rather tie it only to TAPS. I will be more than happy to discuss with you about it and I think Rob and others can also help to figure out the right things do here.
> 
> Sounds good.
> 
> FWIW, I think there's quite a lot of value in limiting the scope to TAPS:
> 
> 1. Observability in the broader scope is largely covered by SNMP.
> 2. Trying to solve for this in underlying systems will only yield the
> aggregate resource usage of the Transport Services implementation and
> the results of its choices.
> 3. I think there's great value (especially in the debugging domain)
> for application and network stack programmers to have well-defined
> ways to observe and manage their systems.
> 4. Increasing the scope outside of TAPS requires influencing too many
> mature systems with specific solutions.
> 
> If one wanted to go about solving the observability issue using SNMP,
> though one might define a MIB, having a defined means to query the
> implementation would help that effort. Without guidance of how to peer
> in, implementations will diverge in this regard. It would be
> unfortunate if people became skilled in specific TAPS implementations
> due to external factors like environment debugging support.
> 
> I agree this is outside the scope of the current charter, but I think
> these issues are in the spirit of what the WG wanted to achieve. Happy
> to move the discussion if it's better held elsewhere!


From what I gathered, the issue wasn’t so much “would it make sense for the TAPS WG to do this” but also “do we have enough people here who would move this along”.
As much as I personally like to see your interest, if I were a chair, I wouldn’t consider keeping a group open because *one* person says they’d want to continue some work…

I very much agree that it would be useful to document / specify these things, but that goes for more things - e.g., the policy manager… a host should have a policy system, as implementations do. Nobody volunteered to specify it, but we all agreed it would be useful. Another thing that would be useful: more protocol mappings (see the open issues with label “mappings” in our github). The TAPS documents, as they stand, will “work” without these things - this just means that people are free to implement their own policy manager without guidance, and there’s won’t be conformity in what kind of monitoring information is being offered (indeed that’s pretty hard to spec, considering that the system is meant to be flexible, even supporting protocols that might not yet exist…). Some written guidance would nevertheless be useful, no doubt, and I hope that volunteers such as yourself can find a home for them somewhere in the IETF.

Cheers,
Michael