Re: [tsvwg] Advance notice on request to poll TSVWG for adoption of draft-kaippallimalil-tsvwg-media-hdr-wireless-03

Sebastian Moeller <moeller0@gmx.de> Sat, 28 October 2023 17:02 UTC

Return-Path: <moeller0@gmx.de>
X-Original-To: tsvwg@ietfa.amsl.com
Delivered-To: tsvwg@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 11A9EC151080 for <tsvwg@ietfa.amsl.com>; Sat, 28 Oct 2023 10:02:21 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -2.557
X-Spam-Level:
X-Spam-Status: No, score=-2.557 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, DKIM_SIGNED=0.1, DKIM_VALID=-0.1, DKIM_VALID_AU=-0.1, DKIM_VALID_EF=-0.1, FREEMAIL_ENVFROM_END_DIGIT=0.25, FREEMAIL_FROM=0.001, RCVD_IN_DNSWL_LOW=-0.7, RCVD_IN_MSPIKE_H2=-0.001, RCVD_IN_ZEN_BLOCKED_OPENDNS=0.001, SPF_HELO_NONE=0.001, SPF_PASS=-0.001, T_SCC_BODY_TEXT_LINE=-0.01, URIBL_DBL_BLOCKED_OPENDNS=0.001, URIBL_ZEN_BLOCKED_OPENDNS=0.001] autolearn=ham autolearn_force=no
Authentication-Results: ietfa.amsl.com (amavisd-new); dkim=pass (2048-bit key) header.d=gmx.de
Received: from mail.ietf.org ([50.223.129.194]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id CjHvzm5hsjGU for <tsvwg@ietfa.amsl.com>; Sat, 28 Oct 2023 10:02:16 -0700 (PDT)
Received: from mout.gmx.net (mout.gmx.net [212.227.15.18]) (using TLSv1.3 with cipher TLS_AES_256_GCM_SHA384 (256/256 bits) key-exchange ECDHE (P-256) server-signature RSA-PSS (2048 bits) server-digest SHA256) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id 4587FC15107E for <tsvwg@ietf.org>; Sat, 28 Oct 2023 10:02:16 -0700 (PDT)
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/simple; d=gmx.de; s=s31663417; t=1698512533; x=1699117333; i=moeller0@gmx.de; bh=LZ0JuRBRyEFRMp+JD1vIO28Hnw5I7Qz6CwHCaGZI0Ak=; h=X-UI-Sender-Class:Subject:From:In-Reply-To:Date:Cc:References: To; b=nuOjvv3LKq+te/TyOAyrjPcTaLHQOrDNPY5NxK2u/EgOZQUzY/Sa2MrJbpTR8dyK r4J4ByaxBx5IYMr0OwMkW1XYtGE+vnBdb3lXD7ZSoz1hWwefLNsZ9sIA4hhL9U2rn V6XoG93+MZuSheVv1EU/gAKtZhAdw7n3rmBt1ew5nQNABFHWxNN5HZ34OE3zbL8dl F5ESNo0PKPnondBCPU5EqdFhDjpdBKX50VJwWeWOyWt3fZQ2x7/q+9yk9lCRgM6wH AJWsuvuHs8G7/WOX5Ww+BTqLYM4TfqGnIyEk05nAWSYR4+7vdpfs7kVwlJo92FNpN 0dizfi5mMQ52i6VELw==
X-UI-Sender-Class: 724b4f7f-cbec-4199-ad4e-598c01a50d3a
Received: from smtpclient.apple ([77.8.107.184]) by mail.gmx.net (mrgmx004 [212.227.17.190]) with ESMTPSA (Nemesis) id 1MCbIn-1qoDzi2jhL-009iMX; Sat, 28 Oct 2023 19:02:13 +0200
Content-Type: text/plain; charset="utf-8"
Mime-Version: 1.0 (Mac OS X Mail 16.0 \(3696.120.41.1.4\))
From: Sebastian Moeller <moeller0@gmx.de>
In-Reply-To: <CALx6S36G3s6UjfLXoxdotGoJaaQgXDhBCTVJi=j8=NhQQDUMWw@mail.gmail.com>
Date: Sat, 28 Oct 2023 19:02:12 +0200
Cc: "touch@strayalpha.com" <touch@strayalpha.com>, tsvwg <tsvwg@ietf.org>
Content-Transfer-Encoding: quoted-printable
Message-Id: <0FDD72C9-C568-4ECC-8BA0-530CCE7DEA7B@gmx.de>
References: <CAKKJt-cr7e5pUR=zxaO35Tjn2d=oM-xBvpdyGop+xaLOG-_U9g@mail.gmail.com> <CALx6S34__pK8tTM08fzTAxx=_dAM4MsEwH1-RL7eXGrCdtnR1Q@mail.gmail.com> <7E9754EA-9A11-49F6-A3F2-3F5E630CEBA6@strayalpha.com> <SN4PR13MB5311CF46AF56025360252C3AE8DCA@SN4PR13MB5311.namprd13.prod.outlook.com> <CALx6S378sTLPzis3=qB07OvojjbCTV8St21-31_oZzsUNZ-5vA@mail.gmail.com> <3D728108-E440-4625-BC4F-F1D134C1BD63@gmx.de> <CALx6S36G3s6UjfLXoxdotGoJaaQgXDhBCTVJi=j8=NhQQDUMWw@mail.gmail.com>
To: Tom Herbert <tom@herbertland.com>
X-Mailer: Apple Mail (2.3696.120.41.1.4)
X-Provags-ID: V03:K1:1oGkY/NcoGZwC9UuH+6c8Ss3/L0JZ9+Rr8o9Uh8hhyIoXcRWf59 gQqKyKEFiW37hiXkMEKG2GRsYgyUVOFLoPuzOhED4KtPsjMETxI8vYoWj+4rzFjCUxcceT+ EjU45xEEDRZyhyQ+fXpp/aKlrxq32aiXDE7y+dADsESLOy2u08SMF6Rx+IqPE49q7zSZkBM 3PSuvL/2xTIg8IS9qj+dQ==
UI-OutboundReport: notjunk:1;M01:P0:NorcRiONYPY=;kMfQXvPZCUdshBZqqVbXYCJWT90 flUqyq/X7lkMrRuMr3295BiCXWvLT53rYruLeNgydmfPHnmBiI3nRUCccQzrWcswT2ZF3ckxk JMzhot8L3JcPwxfih7CjuJyjb5oPB6QQx4g5teKpZ7ZiPiCMLrydLeoII4w+eW047WcCSyFvu 5yU4z0p4+KE2LIJVrT1lDgGjz88gd8IsouZIMEWXuhZyPqncgEllSkibD8ctK+a+X100MmsYF Dfy5+9QgqEUrdANbjSa2WJg/X47Uz2mTxRfonJM/VVeUuv7B5YcUr6ggOsR+jDyn7FNP4BzJI Lpf18DP+Xv0KGAWQbAwnAS+oGcu/y37mt5lfSMayW0fDU+7f3iP+NL7qQiJjPitOn04PeXvnW BbKh4icjPakT7+nC1l1VKhG9YvUhWBj64CJ3YLE3JwrQeafwYiM/DZoOKpzLjkALR5GooO5qd O78Xl6UJ5by3m85EKK97O3zZLM2220wy8TtDKKhHn9i1kdcnP2Oq85gZBydQhwKtXKAacpw8S nuKANxxicWs1UtXGXSFMn+AFEeqiosBE4+yPaPvBjYYCdmAIYfTj5ZyEcGz0s0/E9YagTr+xT pS4V2p1Z3G4iYGi0EPuH0v629B+OZvsrDq7xr1RgZV1/ApNBwSZ3Uav8mtvz14PiUjUXadyaZ /rWycEVuOq+cCmoZcsf5yeP09BvcRO+R7pCrx4TzAoMRSJZpBKuAOh7w7ZL0riQAHV/0n/oXl cVu1O+EX9KLTR1Ivlvel6ODSIjCcLsHydT1mcCfljskCAYUh07lzvY8lwsswaTXaKsIB5IpsO 0D0gP4VQoR+ZajNilHN1I5rMky4trJWbkA2Hu89Q4HxSD2Sc3P8qnCK38iomjZcb7yw8PwdhC FwTS8cI5y/G2aWqubuUiKo6AL5v9+JiT1llMua2Or2JMBtP3+6cVjdThEzUStk2T8J+661EwY 5kHY8SlS1QJhFDFTvJaByGhmKOQ=
Archived-At: <https://mailarchive.ietf.org/arch/msg/tsvwg/4I6ZiH3LQ_w1MQxFLJVodLCqdyY>
Subject: Re: [tsvwg] Advance notice on request to poll TSVWG for adoption of draft-kaippallimalil-tsvwg-media-hdr-wireless-03
X-BeenThere: tsvwg@ietf.org
X-Mailman-Version: 2.1.39
Precedence: list
List-Id: Transport Area Working Group <tsvwg.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/tsvwg>, <mailto:tsvwg-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/tsvwg/>
List-Post: <mailto:tsvwg@ietf.org>
List-Help: <mailto:tsvwg-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/tsvwg>, <mailto:tsvwg-request@ietf.org?subject=subscribe>
X-List-Received-Date: Sat, 28 Oct 2023 17:02:21 -0000

Hi Tom,

thanks, see [SM2] below for a minor point.

> On Oct 28, 2023, at 18:50, Tom Herbert <tom@herbertland.com> wrote:
> 
> On Sat, Oct 28, 2023 at 9:18 AM Sebastian Moeller <moeller0@gmx.de> wrote:
>> 
>> Hi Tom,
>> 
>> please, see [SM] below.
>> 
>>> On Oct 28, 2023, at 17:26, Tom Herbert <tom=40herbertland.com@dmarc.ietf.org> wrote:
>>> 
>>> On Fri, Oct 27, 2023 at 4:35 PM Kaippallimalil John
>>> <john.kaippallimalil@futurewei.com> wrote:
>>>> 
>>>> Hi Tom, Joe,
>>>> 
>>>> 
>>>> 
>>>> With regard to the concerns from Tom and Joe, the behavior needed is outlined in slide 3 of: https://datatracker.ietf.org/meeting/118/materials/slides-118-tsvwg-sessa-92-media-header-extensions-for-wireless-networks
>>>> 
>>>> 
>>>> 
>>>> IPv6 HBP does not currently provide the capability needed:
>>>> 
>>>> IPv6 HBH (MED in this case) is provisioned in the “Application Provider” (AP) domain. And the service provided in the same domain (AP domain in this case)
>>>> But that is not what we want. MED is inserted by AP domain, and read in the wireless provider domain.
>>> 
>>> Hi John,
>>> 
>>> Can you clarify what "inserted" means in this context? (the word has
>>> confusingly been used in different contexts). For instance, there are
>>> three uses I know of:
>>> 
>>> 1) A packet was created by a hosts with the data ("inserted" probably
>>> isn't the best term for this)
>>> 2) A packet is encapsulated inflight and the data is attached to the
>>> outer headers
>>> 3) The data is inserted into a packet while it's inflight with (no
>>> encapsulation)
>>> 
>>> #1 and #2 are generally acceptable (technically, in both cases a host
>>> is creating the packets so HBH options or UDP options can be set in
>>> the packet safely). #3 is a bit more controversial, but there have
>>> been proposals for this like inserting a segment routing header in
>>> packets in flight.
>>> 
>>> Please also clarify the processing of the wireless node.
>>> 
>>> 1) Is the wireless always the destination endpoint of UDP
>>> encapsulation? If so then it would be appropriate for it to process
>>> UDP options in the encapsulation since it's the destination of the
>>> encapsulated packet
>>> 2) Does the wireless node is inspect the UDP options in flight as an
>>> anonymous router in the path that forwards packets and isn't the
>>> destination of the packet? In that case, I think using UDP Options is
>>> problematic (or putting the information into the UDP payload like SPUD
>>> proposed)
>>> 
>>>> The data in MED is sent per packet and
>>> 
>>> FAST allows data to be changed on a per packet basis for flow. If the
>>> modifiable variant of the FAST HBH option is used then intermediate
>>> nodes can change the data inflight.
>>> 
>>>> Every router on path is going to read/process the IPv6 HBH option. This is also not what is intended.
>>> 
>>> RFC8200 has relaxed the requirements of RFC2460 so that routers may or
>>> may not process Hop-by-Hop OPtions. draft-ietf-6man-hbh-processing and
>>> draft-ietf-6man-eh-limits make further clarifications to make HBH
>>> practical.
>>> 
>>>> Only the wireless router acting on behalf on the client, with explicit provisioning (session setup, policy in figure) needs to read.
>>> 
>>> That's the same expectation we have in FAST. Only an ingress router
>>> into a network is expected to process a ticket in HBH options.
>>> 
>>>> 
>>>> 
>>>> 
>>>> The difference will be more obvious when (if) we need to consider encrypted metadata.
>>> 
>>> FAST allows for the signal to be encrypted.
>>> 
>>>> 
>>>> (PS: In this draft, we don’t see the need to encrypt the metadata as the signals are purely advisory and does not leak content or user information.)
>>> 
>>> Maybe, but for a proposed standard you'll need a strong justification
>>> if that's the answer :-).
>>> 
>>>> 
>>>> However, if we decided that encryption was needed:
>>>> 
>>>> With FAST/ IPv6 HBH, the key management is for the Application Domain (AP) to read, not the wireless domain. (otherwise involves complex multi-domain key agreements).
>>> 
>>> Just like UDP Options, FAST and IPv6 HBH are just carriers of
>>> information. There's no semantics enforced on the content. So any data
>>> that is carried in UDP Options could just as easily be in HBH options.
>>> The difference is about who is permitted to process the information:
>>> UDP Options can only be processed by the destination, HBH options can
>>> be processed by any, all, one, or no nodes in the path.
>> 
>>        [SM] Unless the respective layer's data is encrypted, intermediate nodes obviously can look into packets at every level they desire, and since they do not need to ask for permission there is really nothing stopping them...
> 
> Hi Sebastian,
> 
> Yes, that is what motivates us to encrypt as much as the packet as
> possible (like TLS encrypts transport payload, QUIC encrypts the
> transport header). The interesting thing about host to network
> signaling is that we want at least some intermediate nodes to access
> and process the data, but not necessarily all of them. Finding a
> solution to this is one of the interesting challenges of host to
> network signaling.
> 
>> (we do have a work-around, that might or might not work with UDP options, namely encrypting the IP packet's payload, or to be kinder to ECMP). Given that fact, it seems academic to claim there is a practical difference in usability of UDP options and IPv6 HBH.
> 
> I think there are material differences. UDP Options only work with
> UDP, UDP options are in protocol trailers which would be problematic
> to support in router hardware data path, and there's no distinction
> between transport layer options and network layer options (i.e. last
> thing we want is for some router to burn cycles parsing and skip over
> a bunch of transport layer options to find the network layer options
> they're interested in).
> 
>> Personally I think that HBH are a better path forward, as I have higher hopes in IPv4 being delegated into the background faster compared to IPv6 versus TCP compared to UDP (and I do not consider tunneling TCP in UDP an elegant solution if all we are after are host/network communications, but that is subjective).
> 
> That's my opinion as well :-)
> 
>> 
>> 
>>> 
>>>> With MED, the client to Wireless-CP/Policy signaling can install the MED keys in a simple manner (in 3GPP domain, that would just be small extensions)
>>> 
>>> That's independent of the information carrier, so the same
>>> infrastructure will work just as easily with HBH options.
>>> 
>>>> 
>>>> 
>>>> 
>>>> But just to be clear, in the draft, the metadata (MED) and its handling is completely separated from the container/transport (UDP options).
>>> 
>>> Exactly, that's why HBH options can be substituted for UDP options in
>>> the design with no semantic differences in the content.
>>> 
>>> 
>>>> 
>>>> If IPv6 HBH  or other transport can evolve to support this kind of handling needed, then the draft can be updated to use MED and that (other) transport.
>>>> 
>>>> The key aspect in the draft is the metadata (MED) and how it should be processed on path.
>>> 
>>> Yes, I like those aspects, and the sentiment that a draft like this
>>> should focus on the semantics and processing of the data aligns with
>>> my view. This draft  is a good use case of host to network signaling,
>>> but there are others like draft-reddy-tsvwg-explcit-signal (which also
>>> proposes to use UDP options as the carrier) and draft-ravi-ippm-csig
>>> (which proposes using L2 to carry the signal).
>> 
>>        [SM] I believe CSIG is conceptually different from the others as L2 seems targeted there purposefully, no?
> 
> I don't see that it's conceptually different. The data in CSIG is
> being sent end-to-end and is processed by intermediate nodes. IMO,
> that seems to fit the definition of a network layer protocol. Also,
> CSIG seems like a form of enhanced ECN with just more bits, and ECN is
> conveyed in network layer protocols and not link layer-- so I think
> ECN is a precedent that end-to-end congestion signaling belongs in the
> network layer.

	[SM2] My take is that CSIG aims at signaling from L2-devices like ethernet switches, so it seems not out of place to me to have these only operate on L2 headers... This is a bit like why I prefer HBH over UDP options, L3 headers seem to be the natural place for devices that operate on layer 3 (this might put too much emphasis on the layering though).
	I might misunderstand the proposal though, and I agree this signal needs to be transmitted ultimately to the sender application higher up in the network stack.

Regards
	Sebastian

P.S.: I removed the CC to John, as his mail server permanently rejects my mails.


> 
> Tom
> 
>> 
>> 
>>> With the potential
>>> benefits of collaboration between applications or hosts and the
>>> network, I believe we are going to see even more proposals. In host to
>>> network signaling, there are two parts: the carrier of the signal, and
>>> the content of the signal.
>> 
>>        [SM] I would rather call that the "format" of the signal, aka the form valid messages are to employ, the content of a signal to me describes the values in individual instances, no?
>> 
>> 
>>> IMO, if we define a common generic and
>>> extensible carrier for host to network signaling, then the various
>>> proposals in the area could focus on the semantics and processing of
>>> the content and not worry so much about the carrier protocol.
>> 
>>        [SM] +1; that seems like great plan.
>> 
>> Sebastian
>> 
>> 
>> 
>>> 
>>> Tom
>>> 
>>> 
>>> 
>>> 
>>>> 
>>>> 
>>>> 
>>>> Regards,
>>>> 
>>>> John
>>>> 
>>>> 
>>>> 
>>>> 
>>>> 
>>>> From: tsvwg <tsvwg-bounces@ietf.org> On Behalf Of touch@strayalpha.com
>>>> Sent: Friday, October 27, 2023 5:44 PM
>>>> To: Tom Herbert <tom=40herbertland.com@dmarc.ietf.org>
>>>> Cc: tsvwg <tsvwg@ietf.org>
>>>> Subject: Re: [tsvwg] Advance notice on request to poll TSVWG for adoption of draft-kaippallimalil-tsvwg-media-hdr-wireless-03
>>>> 
>>>> 
>>>> 
>>>> +1 ;-)
>>>> 
>>>> —
>>>> 
>>>> Dr. Joe Touch, temporal epistemologist
>>>> 
>>>> www.strayalpha.com
>>>> 
>>>> 
>>>> 
>>>> On Oct 27, 2023, at 2:55 PM, Tom Herbert <tom=40herbertland.com@dmarc.ietf.org> wrote:
>>>> 
>>>> 
>>>> 
>>>> On Fri, Oct 27, 2023 at 2:26 PM Spencer Dawkins at IETF
>>>> <spencerdawkins.ietf@gmail.com> wrote:
>>>> 
>>>> 
>>>> Dear TSVWG,
>>>> 
>>>> We have requested a slot during the IETF 118 meeting to propose that the co-chairs poll the working group for adoption of https://datatracker.ietf.org/doc/draft-kaippallimalil-tsvwg-media-hdr-wireless/, as a basis for further work.
>>>> 
>>>> The chairs have given us a 15-minute slot during the Thursday TSVWG session.
>>>> 
>>>> Face-to-face meeting time is precious, so we thought it would be helpful if we invited people to look over the draft, and let us know if you see significant impediments to adopting this draft. That would reduce the time we need in the meeting itself.
>>>> 
>>>> 
>>>> Hi Spencer,
>>>> 
>>>> I believe that the use of UDP Options to carry information that is
>>>> processed by intermediate nodes is a significant impediment to
>>>> adoption.
>>>> 
>>>> 
>>>> From the draft: "The Wireless Node is responsible for forwarding
>>>> 
>>>> packets to the Client over the Wireless Network.  The Wireless Node
>>>> inspects metadata but does not alter the UDP option."
>>>> 
>>>> There was discussion on the list and I believe that there is general
>>>> consensus that UDP Options are neither designed nor intended to carry
>>>> network layer information like this. They are for carrying End-to-End
>>>> transport layer information.
>>>> 
>>>> IMO the proper alternative for carrying network layer information is
>>>> Hop-by-Hop Options like in FAST
>>>> (https://www.ietf.org/archive/id/draft-herbert-fast-04.txt).
>>>> 
>>>> Tom
>>>> 
>>>> 
>>>> 
>>>> 
>>>> 
>>>> 
>>>> 
>>>> As a reminder,
>>>> 
>>>> This draft has been presented at IETF 116, 117 and now 118
>>>> We had considerable discussion at previous IETF meetings and on the TSVWG mailing list
>>>> That feedback has been uniformly helpful, and we've taken it into consideration in the -03 update.
>>>> Adoption has been discussed previously at IETF 117
>>>> 
>>>> The updated draft (-03) is described in slides that are uploaded at https://datatracker.ietf.org/doc/draft-kaippallimalil-tsvwg-media-hdr-wireless/
>>>> 
>>>> A diff from version -02, discussed at IETF 117, is here: https://datatracker.ietf.org/doc/draft-kaippallimalil-tsvwg-media-hdr-wireless/
>>>> 
>>>> Please feel free to follow up on this mailing list, or privately with the document authors.
>>>> 
>>>> Best,
>>>> 
>>>> Spencer