Re: [Tsv-art] Tsvart early review of draft-ietf-manet-dlep-credit-flow-control-09

"Black, David" <David.Black@dell.com> Wed, 23 March 2022 00:13 UTC

Return-Path: <David.Black@dell.com>
X-Original-To: tsv-art@ietfa.amsl.com
Delivered-To: tsv-art@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id C66903A14E3; Tue, 22 Mar 2022 17:13:46 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -0.81
X-Spam-Level:
X-Spam-Status: No, score=-0.81 tagged_above=-999 required=5 tests=[BAD_CREDIT=0.1, BAYES_00=-1.9, DKIMWL_WL_HIGH=-0.001, DKIM_SIGNED=0.1, DKIM_VALID=-0.1, DKIM_VALID_AU=-0.1, DKIM_VALID_EF=-0.1, RCVD_IN_MSPIKE_H4=0.001, RCVD_IN_MSPIKE_WL=0.001, SPF_HELO_NONE=0.001, SPF_PASS=-0.001, THIS_AD=1.198, T_SCC_BODY_TEXT_LINE=-0.01, URIBL_BLOCKED=0.001] autolearn=no autolearn_force=no
Authentication-Results: ietfa.amsl.com (amavisd-new); dkim=pass (2048-bit key) header.d=dell.com
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id jzzLfz3A-MB1; Tue, 22 Mar 2022 17:13:42 -0700 (PDT)
Received: from mx0a-00154904.pphosted.com (mx0a-00154904.pphosted.com [148.163.133.20]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id 0443C3A14E4; Tue, 22 Mar 2022 17:13:40 -0700 (PDT)
Received: from pps.filterd (m0170392.ppops.net [127.0.0.1]) by mx0a-00154904.pphosted.com (8.16.1.2/8.16.1.2) with ESMTP id 22MLjMto012203; Tue, 22 Mar 2022 20:13:38 -0400
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=dell.com; h=from : to : cc : subject : date : message-id : references : in-reply-to : content-type : content-transfer-encoding : mime-version; s=smtpout1; bh=JIBBrAoqnvYACp6t3NYUI6w+EA2hOYaBAXd8IFlcJhY=; b=WG4dZEzQ7vm+UYXxL6qr4zuQkI5azdWs1NZ1DOgz2C03I1P6CWn5W/Lz8gSMsxokT3RC 9fi029+GLYslPuOmI7YErCZEPppQDb7uTaWivv6+JrgZ/KW1/hsF1xFhOH0ZCwCBgxbH GuLrHEQzAyQjwsGRTcMwgCnaVh/udImSeSjjHaC3wufouI7AuG7HbXpXJixC+xNTaKN+ Y3giy6l40WkD8fzVuOt77Ugknav/nE3HCWFx6uXWiNPmO/HikiMstReHBifcuMX0hrwA +EZeyvX8RJnpSqgNCqLCND9ABuPpgJmQSboKPfyoqERX4TYF3oBwzHtdpFKVx/I2ZGQk Pg==
Received: from mx0b-00154901.pphosted.com (mx0b-00154901.pphosted.com [67.231.157.37]) by mx0a-00154904.pphosted.com (PPS) with ESMTPS id 3ewabdy9qc-1 (version=TLSv1.2 cipher=ECDHE-RSA-AES256-GCM-SHA384 bits=256 verify=NOT); Tue, 22 Mar 2022 20:13:37 -0400
Received: from pps.filterd (m0144103.ppops.net [127.0.0.1]) by mx0b-00154901.pphosted.com (8.16.0.43/8.16.0.43) with SMTP id 22N0C521143287; Tue, 22 Mar 2022 20:13:36 -0400
Received: from nam10-bn7-obe.outbound.protection.outlook.com (mail-bn7nam10lp2108.outbound.protection.outlook.com [104.47.70.108]) by mx0b-00154901.pphosted.com with ESMTP id 3eyme9uneh-1 (version=TLSv1.2 cipher=ECDHE-RSA-AES256-GCM-SHA384 bits=256 verify=OK); Tue, 22 Mar 2022 20:13:36 -0400
ARC-Seal: i=1; a=rsa-sha256; s=arcselector9901; d=microsoft.com; cv=none; b=H80yAI2MP07mIGiM6n8ohvPaRLXp9F9K2gcezPjqEge9YYA7rrwkOq9YSb9w4EjKg4eVwy2V7Ah51jFdze6cizKxpI+g7cvH4xxP7UREvTvfNjXLIVloPLQXP13wlDw9LYQR4cJrIybtzrMPWzbfEJVEUJM1AzuFmq553T4cAfrbeqvg0olfxMxHhnWrJoqSV+MVr9ExqYWzjn/8Qiy138GkSpa30bMyLKkW2crtkqqi9t+jMPzImmcOtMLZ5EJxwqKBkI4p/8wI5c/nr11/ol+idrqNZ/O+fgcVyt2LUWCasg5Nm4rNTy5rR2JEO+14JvEu47kytnCuoYgYN/c1BQ==
ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=microsoft.com; s=arcselector9901; h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-AntiSpam-MessageData-ChunkCount:X-MS-Exchange-AntiSpam-MessageData-0:X-MS-Exchange-AntiSpam-MessageData-1; bh=JIBBrAoqnvYACp6t3NYUI6w+EA2hOYaBAXd8IFlcJhY=; b=F+pqU3ZtbLZ+s0OrqtiIa+LEp6kc5XRX2srBppw/UcFZHPvtDLmc1x/5bETy8y2Z0AztVt0S39kvIrrR0oKm/8SdQOaS2lc32hx9uj+cs/vbS3PCXSonvXqnXBs45TjBOJuQQZZZUNbAFaKKBCESEx4oBt3NHDT4v3jYZpVwoAu/onCjEQl94Xzj+SV+wYhgqP3DNgAnts/ypfxJHvOGdk/+o0b0ym7wEfSk1lUebyp/eISXI9F1Xi+Z9aAudl8iHBcLz7Lfodubl871MxVPO9rw/jnQtyapEMsem/MUpNbc35N9h22lQBgXJrxtki3Qi0AymlqltvWioMY7XR1M6w==
ARC-Authentication-Results: i=1; mx.microsoft.com 1; spf=pass smtp.mailfrom=dell.com; dmarc=pass action=none header.from=dell.com; dkim=pass header.d=dell.com; arc=none
Received: from MN2PR19MB4045.namprd19.prod.outlook.com (2603:10b6:208:1e4::9) by SN4PR19MB5376.namprd19.prod.outlook.com (2603:10b6:806:207::12) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id 15.20.5102.17; Wed, 23 Mar 2022 00:13:34 +0000
Received: from MN2PR19MB4045.namprd19.prod.outlook.com ([fe80::3177:e9af:ba4d:4914]) by MN2PR19MB4045.namprd19.prod.outlook.com ([fe80::3177:e9af:ba4d:4914%9]) with mapi id 15.20.5102.016; Wed, 23 Mar 2022 00:13:33 +0000
From: "Black, David" <David.Black@dell.com>
To: Lou Berger <lberger@labn.net>, "tsv-art@ietf.org" <tsv-art@ietf.org>
CC: MANET IETF <manet@ietf.org>, "Black, David" <David.Black@dell.com>
Thread-Topic: Tsvart early review of draft-ietf-manet-dlep-credit-flow-control-09
Thread-Index: AQHYPfXxdZzerdqXS0SnT9vNYLnce6zL9L8g
Date: Wed, 23 Mar 2022 00:13:33 +0000
Message-ID: <MN2PR19MB4045DE0B35B5349A686465F183189@MN2PR19MB4045.namprd19.prod.outlook.com>
References: <5d1bf77b-6391-65b2-8ca2-57d6736b0439@labn.net> <18399f51-73d3-25e6-c8e7-1acb7d30aace@labn.net>
In-Reply-To: <18399f51-73d3-25e6-c8e7-1acb7d30aace@labn.net>
Accept-Language: en-US
Content-Language: en-US
X-MS-Has-Attach:
X-MS-TNEF-Correlator:
msip_labels: MSIP_Label_dad3be33-4108-4738-9e07-d8656a181486_Enabled=true; MSIP_Label_dad3be33-4108-4738-9e07-d8656a181486_SetDate=2022-03-22T22:01:14Z; MSIP_Label_dad3be33-4108-4738-9e07-d8656a181486_Method=Privileged; MSIP_Label_dad3be33-4108-4738-9e07-d8656a181486_Name=Public No Visual Label; MSIP_Label_dad3be33-4108-4738-9e07-d8656a181486_SiteId=945c199a-83a2-4e80-9f8c-5a91be5752dd; MSIP_Label_dad3be33-4108-4738-9e07-d8656a181486_ActionId=1d3505e6-906b-442a-ad70-7bf2c8534edf; MSIP_Label_dad3be33-4108-4738-9e07-d8656a181486_ContentBits=0
x-ms-publictraffictype: Email
x-ms-office365-filtering-correlation-id: fb26c007-32b9-4e34-7dab-08da0c61f7f8
x-ms-traffictypediagnostic: SN4PR19MB5376:EE_
x-microsoft-antispam-prvs: <SN4PR19MB5376B44492C77A046862338383189@SN4PR19MB5376.namprd19.prod.outlook.com>
x-exotenant: 2khUwGVqB6N9v58KS13ncyUmMJd8q4
x-ms-exchange-senderadcheck: 1
x-ms-exchange-antispam-relay: 0
x-microsoft-antispam: BCL:0;
x-microsoft-antispam-message-info: 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
x-forefront-antispam-report: CIP:255.255.255.255; CTRY:; LANG:en; SCL:1; SRV:; IPV:NLI; SFV:NSPM; H:MN2PR19MB4045.namprd19.prod.outlook.com; PTR:; CAT:NONE; SFS:(13230001)(4636009)(366004)(2906002)(107886003)(52536014)(33656002)(26005)(30864003)(66574015)(5660300002)(186003)(8936002)(8676002)(4326008)(66556008)(66476007)(66446008)(64756008)(66946007)(6506007)(7696005)(9686003)(83380400001)(76116006)(53546011)(82960400001)(122000001)(55016003)(71200400001)(38100700002)(54906003)(86362001)(786003)(316002)(38070700005)(508600001)(110136005)(559001)(579004); DIR:OUT; SFP:1101;
x-ms-exchange-antispam-messagedata-chunkcount: 1
x-ms-exchange-antispam-messagedata-0: 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
Content-Type: text/plain; charset="utf-8"
Content-Transfer-Encoding: base64
MIME-Version: 1.0
X-OriginatorOrg: Dell.com
X-MS-Exchange-CrossTenant-AuthAs: Internal
X-MS-Exchange-CrossTenant-AuthSource: MN2PR19MB4045.namprd19.prod.outlook.com
X-MS-Exchange-CrossTenant-Network-Message-Id: fb26c007-32b9-4e34-7dab-08da0c61f7f8
X-MS-Exchange-CrossTenant-originalarrivaltime: 23 Mar 2022 00:13:33.6715 (UTC)
X-MS-Exchange-CrossTenant-fromentityheader: Hosted
X-MS-Exchange-CrossTenant-id: 945c199a-83a2-4e80-9f8c-5a91be5752dd
X-MS-Exchange-CrossTenant-mailboxtype: HOSTED
X-MS-Exchange-CrossTenant-userprincipalname: Ava8djonvY5fj3JOK3jVyS+V7jy+xY4OuOR1ED1jm+cgV3hLaJmOQyhh4axb1im/urGQcQeB6tn77ayUcX3sbg==
X-MS-Exchange-Transport-CrossTenantHeadersStamped: SN4PR19MB5376
X-Proofpoint-Virus-Version: vendor=fsecure engine=2.50.10434:6.0.425, 18.0.850 definitions=2022-03-22_08:2022-03-22, 2022-03-22 signatures=0
X-Proofpoint-Spam-Details: rule=outbound_notspam policy=outbound score=0 bulkscore=0 lowpriorityscore=0 mlxscore=0 phishscore=0 mlxlogscore=999 malwarescore=0 priorityscore=1501 suspectscore=0 impostorscore=0 clxscore=1011 spamscore=0 adultscore=0 classifier=spam adjust=0 reason=mlx scancount=1 engine=8.12.0-2202240000 definitions=main-2203230000
X-Proofpoint-GUID: UqdoEKMbY30FYDaJ8qNraebrNts1eDQP
X-Proofpoint-ORIG-GUID: UqdoEKMbY30FYDaJ8qNraebrNts1eDQP
X-Proofpoint-Spam-Details: rule=notspam policy=default score=0 spamscore=0 mlxlogscore=999 adultscore=0 phishscore=0 bulkscore=0 suspectscore=0 malwarescore=0 mlxscore=0 classifier=spam adjust=0 reason=mlx scancount=1 engine=8.12.0-2202240000 definitions=main-2203230000
Archived-At: <https://mailarchive.ietf.org/arch/msg/tsv-art/QBWhNXoTjUaagTRxP41ntS0eNlQ>
Subject: Re: [Tsv-art] Tsvart early review of draft-ietf-manet-dlep-credit-flow-control-09
X-BeenThere: tsv-art@ietf.org
X-Mailman-Version: 2.1.29
Precedence: list
List-Id: Transport Area Review Team <tsv-art.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/tsv-art>, <mailto:tsv-art-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/tsv-art/>
List-Post: <mailto:tsv-art@ietf.org>
List-Help: <mailto:tsv-art-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/tsv-art>, <mailto:tsv-art-request@ietf.org?subject=subscribe>
X-List-Received-Date: Wed, 23 Mar 2022 00:13:47 -0000

Lou,

Thanks for the comprehensive response.  I'm copying and replying to only the items that merit further attention - any item not responded to is ok with me.

>> -- [1] -- Number of Documents
[...]
>> I strongly suggest folding the DA credit extension draft into the traffic
>> classification draft, as the resulting two-draft structure will be easier to
>>  explain, and more importantly, should be easier for implementers to understand.
>
> This was the decision of the WG made a long time ago. I defer to the 
> chairs on this.

I would ask the WG to revisit this decision based on the surprisingly short length
of the DA credit extension draft (about a page of actual protocol specification
plus one addition to an IANA registry).

>> -- [2] -- Flow Match Criteria
>>
>> The Traffic Classification draft does not explain how traffic classification is
>> actually performed, i.e., how the applicable FID is determined for a packet,
>> particularly when more than one FID is possible.
[...]
> 
> It took me a bit to decide how to address this (valid) comment. I 
> propose the following change to 
> draft-ietf-manet-dlep-traffic-classification-06:
>
> At the end of section 2.3.1, I propose adding the following text:
>
>          If a packet matches both a DSCP Field Value,see Section 2.2.
>          and a Priority Field value, the DSCP
>          associated TID MUST take precedence.

That's headed in the right direction, but more work is needed on a
couple of aspects.

The above text does not cover situations where 0 DSCPs and/or 0 PCPs
are used in a FID, and does not mention the VLAN identifier.  Suggestion:

	If a packet matches both a DiffServ Traffic Classification
	Sub-Data Item (see Section 2.2), e.g., DSCP match, and
	an Ethernet Traffic Classification Sub-Data Item (see Section
	2.3), e.g., PCP match, then the TID with which the DiffServ
	Traffic Classification Sub-Data Item is associated MUST
	take precedence.

In addition, I think there's an implicit assumption that TIDs do not
overlap, perhaps because they are associated with non-overlapping
destinations.  Under that assumption, the same packet could not match
FIDs under more than one TID.  If that's correct, that assumption needs
to be explicitly stated (or referred to in the base DLEP spec?).  If that's
not correct, then an additional precedence rule is needed, e.g., lowest
numbered TID takes precedence.

>> -- [3] -- Router MAY ignore flow control
>>
>> The Management Considerations section in both the traffic classification and DA
>> credit extension drafts contains this text:
>>
>>     When modem-provided credit window information exceeds the capabilities of a
>>     router, the router MAY use a subset of the provided credit windows.
>>
>> In other words, the router MAY ignore any credit windows that exceed the
>> routers capabilities ... which in practice could amount to "MAY ignore any
>> credit windows that the router implementer views as inconvenient" ... with the
>> router proceeding to overrun the corresponding modem queues.  That doesn't seem
> right, so if this is intended, some serious rationale/explanation ought to be
>> provided.
>
> I personally have no objection to MUST, but perhaps a SHOULD is the 
> right answer given that there is an alternative defined.

This isn't about MUST/SHOULD/MAY - it's about queue overrun which isn't supposed to
happen and can't be addressed via just a keyword change.  Suppose a router ignores the
17th modem credit window, *and* proceeds to overrun the corresponding modem
queue.  That overrun is an undesirable failure mode.

Would it be reasonable for a router that ignores at least one credit window to be
prohibited from sending traffic that does not match any credit window (or that
could match an ignored credit window)?  That would address the overrun problem.

Suggestion - at the end of Section 2.1 in the flow control draft, add a sentence that
begins with:

	If a router is unable to associate a credit window with traffic to be
	sent a modem, then ...

>> -- [4] -- Association Not Well-Specified
[...]
> Okay I'll try to improve the language in section 2 to cover (I) and (II)

Better, but still hard to follow.    Suggestion:
   
OLD
  The TID provides the information to
   support router traffic classification, based on the FIDs contained in
   the TID, see [I-D.ietf-manet-dlep-traffic-classification].  As
   defined, each credit window has a corresponding FID.
NEW
  The TID provides the information to
   support router traffic classification, based on the FIDs contained in
   the TID, see [I-D.ietf-manet-dlep-traffic-classification].  As
   defined, each credit window has a corresponding FID, so traffic is
   mapped to a credit window by locating a matching FID that
   is contained in the TID that is associated with the traffic's destination.

> > -- [5] -- Initialization vs. in-flight traffic
> >
> > The Credit Window Initialization data item appears to be intended to establish
> > common state for a Credit Window (e.g., size, number of credits) across the
> > router and modem ... but ... that data item appears to be allowed to be sent
> > while there's traffic in flight.  The result would be that the modem would
> > count in-flight traffic against the initialized Credit Window, but the router
> > would not.   The resulting inconsistency deserves discussion - it may be
> > acceptable if the amount of traffic in flight is miniscule by comparison to
> > both the Credit Window size and initial credit balance.
>
> This is the purpose of the credit window status DI.  

That does not solve the problem if the amount of traffic in flight between router
and the modem is a significant fraction of the credit window size.  E.g., suppose we
have a very slow modem with a 1kbyte queue and there could be 512 bytes in flight
between router and modem.  If the Credit Window Status arrives with 512 bytes in
flight behind it, and the modem immediately does a Credit Window Initialization to 1k,
the router can then send another 1k for a total of 1.5k which overruns the 1k modem
queue by 50% (oops).

I expect the reaction to that example to be along the lines of: That can't happen
because of <A>, <B> and <C>.  If so, then <A>, <B> and <C> need to be clearly stated
in the draft (e.g., <A> might be " the amount of traffic in flight is miniscule by
comparison to both the Credit Window size and initial credit balance").

> -- [6] -- Security Considerations
[...]
> How about:
> 
>      This document introduces credit window control and flow mechanisms
>      to DLEP.  These mechanisms expose vulnerabilities similar to
>      existing DLEP messages, e.g., Destination UP or Down message
>      injection attacks. The security mechanisms documented in <xref
>      target="RFC8175"/> can be applied equally to the mechanism defined
>      in this document.

Second sentence would be better if the example were specific to this draft, perhaps:

        These mechanisms expose vulnerabilities analogous to vulnerabilities
        exposed by existing DLEP messages, e.g., an injected message resizes
        a credit window to a tiny value causing denial of service.

>> [C] Data item usage:  It's not clear which data items are required, allowed or
>> prohibited in which DLEP messages.
[...]
> Unexpected DIs in messages is defined by the base spec -- and yes, it's 
> an error.  

I suggest adding a version of that sentence to both drafts that define DIs -
the flow control draft and the traffic classification draft.

> > [D] Uninitialized window: The second sentence of Section 2.3.1 in the flow
> > control draft begins with:
> >
> >     This Data Item SHOULD be included in any Session Initialization Response
> >     Message that also ...
> >
> > What happens if that SHOULD is not adhered to?  Please explain.
> 
> There's a MAY immediately following.  Other places in the document 
> describe that use of an FID/credit window in a message before it is 
> defined/initialized are treated as errors.

That MAY doesn't appear to help.  I suggest starting the sentence with:

   In order to avoid errors caused by use of undefined FIDs or uninitialized
   credit windows, this Data Item SHOULD be included ...

>> [E] Credit Window Size: In Section 2.3.1 of the flow control draft (Credit
>> Window Initialization), what happens if the Credit Value exceeds the Credit
>> Window Size?
> Okay will add a sentence.

Nit to fix in new sentence ...

   If the resulting Credit Value results in the credit
   window exceeding the represented Credit Window Max Size, the Credit
   Window Size is used as the new credit window size.

In last line - s/Window Size/Window Max Size/

Thanks, --David

-----Original Message-----
From: Lou Berger <lberger@labn.net> 
Sent: Tuesday, March 22, 2022 10:06 AM
To: Black, David; tsv-art@ietf.org
Cc: MANET IETF
Subject: Fwd: Tsvart early review of draft-ietf-manet-dlep-credit-flow-control-09


[EXTERNAL EMAIL] 


This is a resend as it seems the first message didn't make it to David 
or the archive.

-------- Forwarded Message --------
Subject: Re: Tsvart early review of 
draft-ietf-manet-dlep-credit-flow-control-09
Date: Thu, 24 Feb 2022 07:18:55 -0500
From: Lou Berger <lberger@labn.net>
To: David Black <david.black@dell.com>, tsv-art@ietf.org
CC: draft-ietf-manet-dlep-credit-flow-control.all@ietf.org, manet@ietf.org

David,

Please see (overdue) responses in-line below.

On 11/19/2021 12:02 PM, David Black via Datatracker wrote:
> Reviewer: David Black
> Review result: On the Right Track
>
> TSVART Review of:
>
>          DLEP Credit-Based Flow Control Messages and Data Items
>                  draft-ietf-manet-dlep-credit-flow-control-09
>          DLEP DiffServ Aware Credit Window Extension
>                  draft-ietf-manet-dlep-da-credit-extension-12
>          DLEP Traffic Classification Data Item
>                  draft-ietf-manet-dlep-traffic-classification-06
>
> Reviewer: David L. Black <david.black@dell.com>
> Date: November 19, 2021
>
> This is a combined review of all three drafts.
>
> These three drafts specify a flow control mechanism between a "router" and a
> "modem" in the sending direction (router to modem) to prevent overrun of
> buffers in the "modem".  The mechanism is designed to provide flow control for
> multiple queues in the "modem" that are independently protected, with the
> "modem" in control of how much data the router is allowed to send - to a first
> approximation, there is a separate instance of flow control, called a Credit
> Window, for each queue.  Both Diffserv (DSCP) and Ethernet Priority (PCP)
> values can be used to classify traffic to determine which flow control instance
> (Credit Window) applies to each packet being sent to the "modem" by the
> "router".
>
> Each of the drafts is reasonably well written, but there are some difficulties
> in understanding the combination of the three drafts, which have to be used
> together in order to implement this flow control mechanism. That's one of a
> number of issues that deserve attention.
>
> ****** Major Issues:
>
> -- [1] -- Number of Documents
>
> I understand and see the merit in specifying the flow control mechanism
> (-credit-flow-control draft) independently of traffic classification
> (-traffic-classification draft).  In contrast, I do not see a strong rationale
> for the separate DA credit extension draft (-da-credit-extension), which has
> very little content (about a page of actual protocol specification plus one
> addition to an IANA registry).
>
> I strongly suggest folding the DA credit extension draft into the traffic
> classification draft, as the resulting two-draft structure will be easier to
> explain, and more importantly, should be easier for implementers to understand.

This was the decision of the WG made a long time ago. I defer to the 
chairs on this.

> -- [2] -- Flow Match Criteria
>
> The Traffic Classification draft does not explain how traffic classification is
> actually performed, i.e., how the applicable FID is determined for a packet,
> particularly when more than one FID is possible. For example, suppose a packet
> carries a DSCP that matches FID 5 and a PCP that matches FID 7 - does that
> packet consume FID 5 credits or FID 7 credits?  If the router and modem make
> different decisions, the result may be undesirable.  This example is within the
> same TID - the situation appears to be worse across TIDs for the same
> destination, because the same match criteria could appear in multiple TIDs,
> e.g., same DSCP could match different FIDs under different TIDs.  Clarity is
> needed here so that the router and modem agree on which FID's credits are
> consumed by each packet, and on a related note, the DA credit extension draft
> does not prohibit use of Ethernet traffic classification - perhaps it should.

It took me a bit to decide how to address this (valid) comment. I 
propose the following change to 
draft-ietf-manet-dlep-traffic-classification-06:

At the end of section 2.3.1, I propose adding the following text:

          If a packet matches both a DSCP Field Value,see Section 2.2.
          and a Priority Field value, the DSCP
          associated TID MUST take precedence.

> -- [3] -- Router MAY ignore flow control
>
> The Management Considerations section in both the traffic classification and DA
> credit extension drafts contains this text:
>
>     When modem-provided credit window information exceeds the capabilities of a
>     router, the router MAY use a subset of the provided credit windows.
>
> In other words, the router MAY ignore any credit windows that exceed the
> routers capabilities ... which in practice could amount to "MAY ignore any
> credit windows that the router implementer views as inconvenient" ... with the
> router proceeding to overrun the corresponding modem queues.  That doesn't seem
> right, so if this is intended, some serious rationale/explanation ought to be
> provided.

I personally have no objection to MUST, but perhaps a SHOULD is the 
right answer given that there is an alternative defined.


> -- [4] -- Association Not Well-Specified
>
> The overall association structure is that flow control instances are identified
> by FIDs which are associated with TIDs which are associated with destinations.
> That structure is described towards the end of Section 2 of the flow control
> draft, but the details of how it is done are mostly missing - the flow control
> draft ought to state that:
>
>          i) FIDs are associated with TIDs via traffic classification information
>          specified in the traffic classification draft. ii) TIDs (and their
>          associated FIDs) are associated with destinations via use of the Credit
>          Window Association data item in DLEP Destination Up and Destination
>          Update messages.
>
> The first item (i) can be mostly inferred from the last few paragraphs in
> section 2 of the flow control draft (and needs to be more explicit), but the
> second item (ii) is missing because the flow control draft does not specify how
> to determine the "destination" with which a TID is associated by a Credit
> Window Association data item (in a DLEP Destination Up or Destination Update)
> message.  I would expect that the destination is a relatively obvious field in
> those messages, but the draft needs to specify that field.  This should be easy
> to fix, although it made the drafts much more difficult to understand.

Okay I'll try to improve the language in section 2 to cover (I) and (II)


>
> -- [5] -- Initialization vs. in-flight traffic
>
> The Credit Window Initialization data item appears to be intended to establish
> common state for a Credit Window (e.g., size, number of credits) across the
> router and modem ... but ... that data item appears to be allowed to be sent
> while there's traffic in flight.  The result would be that the modem would
> count in-flight traffic against the initialized Credit Window, but the router
> would not.   The resulting inconsistency deserves discussion - it may be
> acceptable if the amount of traffic in flight is miniscule by comparison to
> both the Credit Window size and initial credit balance.

This is the purpose of the credit window status DI.  The current text says:

          Once the credit window is identified, the modem SHOULD check the
          received Current Credit Window Size field value against the outstanding credit
          window's available credits at the time the most recent Credit Window
          Initialization or Grant Data Item associated with the indicated FID
          was sent.  If the values significantly differ, i.e., greater than can
          be accounted for based on observed data frames, then the modem SHOULD
          send a Credit Window Initialization Data Item to reset the associated
          credit window size to the modem's current view of the available
          credits.  As defined above, Credit Window Initialization Data Items are
          sent in Session Update Messages.  When multiple Data Items need to be
          sent, they SHOULD be combined into a single message when possible.
          Alternatively, and also in cases where there are small differences,
          the modem MAY adjust the values sent in Credit Window Grant Data Items
          to account for the reported Credit Window.

is this insufficient? if so, can you suggest some alternate wording.


> -- [6] -- Security Considerations
>
> Although this is a Transport review, I found a security issue that would be
> better dealt with now before the security directorate points it out ;-) - the
> security considerations sections in each of the 3 drafts claims that adding
> credit window control and flow functionality to DLEP does not introduce any new
> security considerations (vulnerabilities). That's a nice try, but it's
> incorrect.
>
> These drafts specify a new resource (credits in a credit window) that is
> subject to resource exhaustion attacks that could cause denial-of-service.  For
> example, suppose an attacker injects a Credit Window Initialization data item
> that contains almost no credits and/or specifies a ridiculously tiny Window
> (Max) Size.  I expect that the protocol contains mechanisms to counter this and
> related attacks on credit resources (e.g., if something looks wrong, the modem
> reinitializes the Credit Window), but the current text incorrectly asserts the
> non-existence of such attacks.  These sorts of attacks definitely exist - I am
> aware of a (subsequently fixed) resource exhaustion problem in another
> credit-based flow control mechanism caused by an unanticipated environmental
> "attack" on signal integrity of credit exchange messages, resulting in message
> discard and credit loss.

How about:

       This document introduces credit window control and flow mechanisms
      to DLEP.  These mechanisms expose vulnerabilities similar to
      existing DLEP messages, e.g., Destination UP or Down message
      injection attacks. The security mechanisms documented in <xref
      target="RFC8175"/> can be applied equally to the mechanism defined
      in this document.

> ***** Minor Issues:
>
> [A] Packets consume credits: Section 2 of the flow control draft needs to say
> somewhere early in the section that each packet that a router sends consumes a
> credit for each octet in the packet.  This is to be found at the end of the
> second paragraph in Section 2.1, but ought to be stated much earlier, e.g., at
> the end of second paragraph in Section 2.
okay
>
> [B] Bidirectional messages: Both the Credit Control Message and its response
> can be sent in both directions (i.e., by both modems and routers).  Has the
> possibility of using different message types in each direction been considered?
>   That might help out people who have to read packet traces/dumps.  NOTE: "Yes,
> that was carefully considered and the WG decided not to do that." is a fine
> response.
It was discussed, and the current approach was selected by the WG.
> [C] Data item usage:  It's not clear which data items are required, allowed or
> prohibited in which DLEP messages.  It appears that any data item MAY be used
> in any DLEP message, which is surely not what was intended.  Both the flow
> control and traffic classification drafts ought to spell out these details,
> including what happens when  the rules are violated, e.g., data item shows up
> in a message where it's not supposed to be used - is the data item ignored or
> does it cause an error?

Unexpected DIs in messages is defined by the base spec -- and yes, it's 
an error.  These drafts don't modify that behavior.


>
> [D] Uninitialized window: The second sentence of Section 2.3.1 in the flow
> control draft begins with:
>
>     This Data Item SHOULD be included in any Session Initialization Response
>     Message that also ...
>
> What happens if that SHOULD is not adhered to?  Please explain.

There's a may immediately following.  Other places in the document 
describe that use of an FID/credit window in a message before it is 
defined/initialized are treated as errors.

> [E] Credit Window Size: In Section 2.3.1 of the flow control draft (Credit
> Window Initialization), what happens if the Credit Value exceeds the Credit
> Window Size?
Okay will add a sentence.
> I also strongly suggest renaming Credit Window Size to Credit Window Max Size
> or something similar to avoid possible confusion of this concept with current
> credit balance (Credit Value)
Sure
>
> [F] TID association with destination:
>
> Section 2.3.2 of the flow control draft (Credit Window Association) says that a
> the traffic classification information associated with a TID "MUST be
> associated with the destination" - what does that mean?
>
> Specifically:
> - Does that traffic classification information replace any existing     traffic
> classification information, e.g., if the info associated with that TID has been
> updated since that TID was most recently associated with that destination? - Is
> there any limit on the number of TIDs or amount of traffic classification
> information that can be associated with a destination?  If so, what happens if
> that limit is exceeded? Also note that "the destination" is not currently
> defined, see [4] above.

I'll drop:

That clause, the next MUST is sufficient.

> [G] Bad Credit Window math: The next to last paragraph in Section 2.3.3 (Credit
> Window Grant) of the flow control draft contains this text about adding credit
> to a window:
>
>     If the increase results in a window overflow, i.e., the size of the credit
>     window after the increase is smaller than the original credit window size,
>     the Credit Window must be set to its maximum (0xFFFFFFFFFFFFFFFF).
>
> That's doubly wrong:
> - consider a window max size of 10, a current window size of 3 and an addition
> of 15 credits.  Overflow occurs, but the window size increases, as the new
> window size is 8. - The maximum size of the credit window may be considerably
> smaller than 0xFFFFFFFFFFFFFFFF.
>
> For the first item, just use the concept of overflow in modular arithmetic.
> For the second item, remove that all-F's constant and refer back to the Credit
> Window Initialization material for max size.
WFM
>
> This text is also an example of why [E] strongly suggests renaming Credit
> Window Size to Credit Window Max Size or somthing similar.
done
> [H] Amount of imprecision: Section 2.3.4 of the flow control draft discusses
> modem comparison of internal values with values received from the router, and
> contains this text:
>
>     If the values significantly differ, i.e., greater than can be  accounted for
>     based on observed data frames,
>
> That needs some guidance on what a significant difference is and how much of a
> "greater than" difference ought to trigger the consequences, accompanied by a
> warning against precise (== vs. !=) comparisons (e.g., courtesy of [5] above).
I believe we (once) discussed this ad concluded it could be 
implementation dependent.  If you feel strongly on this, can you propose 
some language that we can discuss in the WG?
> [I] Update means what?: The last paragraph of Section 2.1 of the traffic
> classification draft (Traffic Classification Data Item) contains:
>
>     the router MUST update the information using the values carried in the Data
>     Item.
>
> What does "update" mean, e.g., "replace", "merge"?
MUST replace.
>
> [J] Error behavior: Section 2.1.1 of the traffic classification draft leaves
> error behavior as a "go fish" exercise for the reader:
>
>     Any errors or inconsistencies encountered in parsing
>     Sub-Data Items are handled in the same fashion as any other Data
>     Item parsing error encountered in DLEP.
>
> That doesn't tell an implementer what to do - this needs to cite a reference
> that specifies the applicable error behavior.
I disagree, DLEP has defined error processing in the base spec. There 
has been discussion about changing that behavior in an update.  I don't 
think repeating what is in the base spec is a good idea, particularly in 
light of that potential update.
> [K] RFC 2474 CU field: Section 2.2 of the traffic classification draft defines
> the DS Field as an octet and reproduces the definition from RFC 2474 that
> includes the DSCP and CU fields.  Unfortunately, this does not reflect updates
> to RFC 2474 - those two bits are now the ECN Field, which may be non-zero.
>
> The fix for this is simple - use the 6 bit DSCP field from RFC 2474 and replace
> the CU field with two zero bits to produce an octet.
okay, changed to stat that DSCP comes from 2474 and the bits "MUST be zero"
>
> [L] 802.1Q DEI field: This has a similar problem to the CU field ... and a
> similar solution - replace the DEI field with a zero bit.
Done!
>
> ****** Nits:
>
> FID paragraph in section 2.3.5 of the flow control draft:
>          The FID also uniquely identifies a credit window
> s/identifies/indicates/ for consistency.
sure
>
> End of Section 2 of the traffic classification draft:
>          TID and FID values is a modem-local scope.
> s/is a/have/

Thank you!

I'll publish a matching update shortly.

Lou


>
>