Re: [tsvwg] Dual-Q Polcing

Gorry Fairhurst <gorry@erg.abdn.ac.uk> Mon, 25 May 2020 10:22 UTC

Return-Path: <gorry@erg.abdn.ac.uk>
X-Original-To: tsvwg@ietfa.amsl.com
Delivered-To: tsvwg@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 8E8763A0A43 for <tsvwg@ietfa.amsl.com>; Mon, 25 May 2020 03:22:55 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -1.897
X-Spam-Level:
X-Spam-Status: No, score=-1.897 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, SPF_HELO_NONE=0.001, SPF_NONE=0.001, URIBL_BLOCKED=0.001] autolearn=ham autolearn_force=no
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id XIoyg5Gia8gF for <tsvwg@ietfa.amsl.com>; Mon, 25 May 2020 03:22:52 -0700 (PDT)
Received: from pegasus.erg.abdn.ac.uk (pegasus.erg.abdn.ac.uk [137.50.19.135]) by ietfa.amsl.com (Postfix) with ESMTP id 977DE3A0B04 for <tsvwg@ietf.org>; Mon, 25 May 2020 03:22:51 -0700 (PDT)
Received: from GF-MacBook-Pro.lan (fgrpf.plus.com [212.159.18.54]) by pegasus.erg.abdn.ac.uk (Postfix) with ESMTPSA id DB1011B00263; Mon, 25 May 2020 11:22:47 +0100 (BST)
To: Sebastian Moeller <moeller0@gmx.de>
Cc: tsvwg IETF list <tsvwg@ietf.org>
References: <dbc71da6-70f1-7369-1d2d-f08fb3b08b69@erg.abdn.ac.uk> <21483444.sDhFMENYeD@linux-9daj> <a85600da-e69f-9190-7ca1-d23a7e7246f9@bobbriscoe.net> <3267993.nvHYsSR2bi@linux-9daj> <dd8e3896-2951-537f-e3d1-9954c93348dd@bobbriscoe.net> <67CBAA42-BD37-4A19-B650-68F511FC244A@gmx.de> <af3e6272-c04d-9e81-763c-e690ed521749@bobbriscoe.net> <1565A7C1-1DF1-4C6A-AC37-14331AC87508@gmail.com> <25e34532-5a33-3ca1-5cba-b7f857874ced@erg.abdn.ac.uk> <2605AA63-8225-4585-AA7B-49ACBF3B07EB@gmx.de> <259b9730-58ba-c2f1-6318-3c4717aa6b7e@erg.abdn.ac.uk> <9B51C652-D734-4EF8-BAFF-690A475AD83E@gmx.de> <e944f4ec-afe8-7842-57d0-5ef86be2d18c@erg.abdn.ac.uk> <7B15F964-8BEC-4E20-AE1F-A97F2B98FF92@gmx.de> <fcfdb230-eba9-3605-2a20-682ab6c19463@erg.abdn.ac.uk> <61F585DE-C67A-4AE8-9FCE-878D3C335B3F@gmx.de>
From: Gorry Fairhurst <gorry@erg.abdn.ac.uk>
Message-ID: <1df40b13-2024-7528-b074-c112940d5e69@erg.abdn.ac.uk>
Date: Mon, 25 May 2020 11:22:47 +0100
User-Agent: Mozilla/5.0 (Macintosh; Intel Mac OS X 10.13; rv:68.0) Gecko/20100101 Thunderbird/68.8.0
MIME-Version: 1.0
In-Reply-To: <61F585DE-C67A-4AE8-9FCE-878D3C335B3F@gmx.de>
Content-Type: text/plain; charset="utf-8"; format="flowed"
Content-Transfer-Encoding: 7bit
Content-Language: en-GB
Archived-At: <https://mailarchive.ietf.org/arch/msg/tsvwg/-yCUmYX84DR6WFrqseDUjhh2wfk>
Subject: Re: [tsvwg] Dual-Q Polcing
X-BeenThere: tsvwg@ietf.org
X-Mailman-Version: 2.1.29
Precedence: list
List-Id: Transport Area Working Group <tsvwg.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/tsvwg>, <mailto:tsvwg-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/tsvwg/>
List-Post: <mailto:tsvwg@ietf.org>
List-Help: <mailto:tsvwg-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/tsvwg>, <mailto:tsvwg-request@ietf.org?subject=subscribe>
X-List-Received-Date: Mon, 25 May 2020 10:22:56 -0000

See below, I'll try to explain how I hope this can focus on the documents.

On 25/05/2020 11:00, Sebastian Moeller wrote:
> Hi Gory,
>
> more below in-line.
>
>
>> On May 25, 2020, at 11:02, Gorry Fairhurst <gorry@erg.abdn.ac.uk> wrote:
>>
>> See below.
>>
>> On 25/05/2020 09:54, Sebastian Moeller wrote:
>>> Hi Gorry,
>>>
>>>
>>>> On May 25, 2020, at 10:39, Gorry Fairhurst <gorry@erg.abdn.ac.uk> wrote:
>>>>
>>>> So, this was your comment in Dual-Q:
>>>>
>>>> On 25/05/2020 09:13, Sebastian Moeller wrote:
>>>>> https://tools.ietf.org/html/draft-ietf-tsvwg-aqm-dualq-coupled-11#page-21
>>>>> :
>>>>> "Where the interests of users or flows might conflict, it could be
>>>>>     necessary to police traffic to isolate any harm to the performance of
>>>>>     individual flows.  However it is hard to avoid unintended side-
>>>>>     effects with policing, and in a trusted environment policing is not
>>>>>     necessary."
>>>>>
>>>> The general security considerations across section 4 seems reasonable to me.
>>>>
>>>> Did you have issues with that text wrt security considerations?
>>> 	[SM] Yes, certainly I have issues with that. The use of the subjunctive "could" indicates a purely hypothetical concern, or rather that this issue was not actually tackled empirically, yet.
>> I don't read "could" that way. I read this as this could-be-needed, interprettting this as a non-RFC2119 version of "MAY".
> 	[SM] Which boils down to the same more or less, IMHO.
Not really, this document is proposed as an AQM Spec. To me, traffic 
management, scheduling, etc belong in a draft about architecture or 
operations. So, a conversation needs to focus on the appropriate 
document and a specific section.
> Point being instead of attempts at measuring realistic traffic scenarios (like e.g. flows using different initial window sizes as some CDN's are known to use, see https://www.comsys.rwth-aachen.de/fileadmin/papers/2019/2019-rueth-iwtnsm.pdf), all that is offered is a hope. I certainly also hope that this will not become an issue, but IMHO that does not take tho onus from the designers/developers of a solution to test under realistic adversarial traffic conditions, before simply relaying on hope. Why is that view even contentious?
> 	Is everybody else convinced that L4S offers a sufficiently safe design and was tested with the to be expected level of adversarial traffic patterns to confirm the design's safety in the real-world?
>
> Best Regards
> 	Sebastian

I do like data - that is good.

But, my email is urghing you to separate the pieces.

If for instance, one was to consider traffic unresponsive to ECN 
signals, then this is a particular case of non-conformant traffic - we 
all see non-conformant traffic in networks for various reasons and need 
to have tools and methods to deal with that - what a network decides to 
actually use will depend on many things. For example, it wouldn't be 
wise to suggest a scheduling-based approach eliminates all the problems 
- in some parts of the network this has always been the case, in other 
places it is not a useful technique. similarly circuit-breaker methods 
have their place, as likely does a policer.

Anyway, what I am suggesting is decide on a topic, relate this to a 
particular topic and a particular draft.

Gorry

>>> Now, Bob argues* that experimental roll-out is required to test that hypothesis but at the same time fights nail and tooth to even add a MUST implement for his intended counter-measure against such a failure mode, the queue protection. As is this is safety-by-wishful-thinking, and that IMHO is not a solid basis for any IETF condoned experiment or standard.
>>> 	Initially the L4S argument was, abusing L4S signaling is self-defeating and hence will not happen, due to lack of incentives to do so. As far as I understand that position was retracted (or at least not publicly repeated on the list) based on the discussion, but it has not been replaced with anything else explaining why safety mechanisms can and/or should stay optional, besides hopes and wishes.
>> I'll let the document editor decide if they wish to respond about whether they think more is needed in this section of the DualQ-draft.
>>
>>> Best Regards
>>> 	Sebastian
>>>
>>>
>>> *) Bob: "I can understand that many operators will be cautious with a new approach, which is why I agreed to design per-flow QProt for Low Latency DOCSIS, even though I do not believe it will eventually prove necessary. That, to me, is one of the open questions that only an Internet-wide experiment can answer, so please refrain from giving your opinion again - we have all heard it many times already."
>>>
>>> Note again, Bob's position is based on "believe" instead of hard cold numbers.
>>>
>>>> Gorry
>> Gorry