Re: [tsvwg] draft diffserv-intercon: Handling of a scavenger class / CS1

Mikael Abrahamsson <swmike@swm.pp.se> Mon, 29 June 2015 07:37 UTC

Return-Path: <swmike@swm.pp.se>
X-Original-To: tsvwg@ietfa.amsl.com
Delivered-To: tsvwg@ietfa.amsl.com
Received: from localhost (ietfa.amsl.com [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 383EB1A6FBC for <tsvwg@ietfa.amsl.com>; Mon, 29 Jun 2015 00:37:52 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: 1.039
X-Spam-Level: *
X-Spam-Status: No, score=1.039 tagged_above=-999 required=5 tests=[BAYES_50=0.8, DKIM_SIGNED=0.1, DKIM_VALID=-0.1, DKIM_VALID_AU=-0.1, HELO_EQ_SE=0.35, SPF_PASS=-0.001, T_RP_MATCHES_RCVD=-0.01] autolearn=no
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id AaYUUBE7PUwt for <tsvwg@ietfa.amsl.com>; Mon, 29 Jun 2015 00:37:50 -0700 (PDT)
Received: from uplift.swm.pp.se (ipv6.swm.pp.se [IPv6:2a00:801::f]) (using TLSv1.2 with cipher AECDH-AES256-SHA (256/256 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id 0E4A91A6F7B for <tsvwg@ietf.org>; Mon, 29 Jun 2015 00:37:50 -0700 (PDT)
Received: by uplift.swm.pp.se (Postfix, from userid 501) id AEEE7A1; Mon, 29 Jun 2015 09:37:47 +0200 (CEST)
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/simple; d=swm.pp.se; s=mail; t=1435563467; bh=DPwRHT1rz7eIr0wGYKdP8WZfOowiC1v4YoT24qBh02c=; h=Date:From:To:cc:Subject:In-Reply-To:References:From; b=yFjBAWS8arRVudbdCJgpJwd7d3iafgUVmEUDYn/871GX9LA6FSSTlf/sWkjz8Hqdf /j4JZM/F2bhO9QVeOl7spKHQI3M1i14eTvbaYOmTcyIWL8DcfMEI8qfuCnFqdx9oLh ZQNfFY8WX5RUqEKZjgOUee04K/ifwKHcfgP5PsTw=
Received: from localhost (localhost [127.0.0.1]) by uplift.swm.pp.se (Postfix) with ESMTP id A562A9F; Mon, 29 Jun 2015 09:37:47 +0200 (CEST)
Date: Mon, 29 Jun 2015 09:37:47 +0200
From: Mikael Abrahamsson <swmike@swm.pp.se>
To: Ruediger.Geib@telekom.de
In-Reply-To: <CA7A7C64CC4ADB458B74477EA99DF6F505290F2DFB@HE111643.EMEA1.CDS.T-INTERNAL.COM>
Message-ID: <alpine.DEB.2.02.1506290904460.9487@uplift.swm.pp.se>
References: <CA7A7C64CC4ADB458B74477EA99DF6F50513613DD9@HE111643.EMEA1.CDS.T-INTERNAL.COM> <alpine.DEB.2.02.1505291422130.9487@uplift.swm.pp.se> <5568CF68.9020406@gmail.com> <alpine.DEB.2.02.1505292256170.9487@uplift.swm.pp.se> <CA7A7C64CC4ADB458B74477EA99DF6F505136148FE@HE111643.EMEA1.CDS.T-INTERNAL.COM> <CE03DB3D7B45C245BCA0D243277949360B3798B8@MX104CL02.corp.emc.com> <5580C588.9070008@gmail.com> <538a059f43eb8a2c2bd42453de21d6f2.squirrel@erg.abdn.ac.uk> <alpine.DEB.2.02.1506260829330.9487@uplift.swm.pp.se> <CA7A7C64CC4ADB458B74477EA99DF6F505290F292B@HE111643.EMEA1.CDS.T-INTERNAL.COM> <alpine.DEB.2.02.1506261011340.9487@uplift.swm.pp.se> <CA7A7C64CC4ADB458B74477EA99DF6F505290F2B1C@HE111643.EMEA1.CDS.T-INTERNAL.COM> <alpine.DEB.2.02.1506261438350.9487@uplift.swm.pp.se> <CA7A7C64CC4ADB458B74477EA99DF6F505290F2DFB@HE111643.EMEA1.CDS.T-INTERNAL.COM>
User-Agent: Alpine 2.02 (DEB 1266 2009-07-14)
Organization: People's Front Against WWW
MIME-Version: 1.0
Content-Type: TEXT/PLAIN; format="flowed"; charset="US-ASCII"
Archived-At: <http://mailarchive.ietf.org/arch/msg/tsvwg/5bsUxyeS43xfTwQLQJxM3FLwRSQ>
Cc: tsvwg@ietf.org
Subject: Re: [tsvwg] draft diffserv-intercon: Handling of a scavenger class / CS1
X-BeenThere: tsvwg@ietf.org
X-Mailman-Version: 2.1.15
Precedence: list
List-Id: Transport Area Working Group <tsvwg.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/tsvwg>, <mailto:tsvwg-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/tsvwg/>
List-Post: <mailto:tsvwg@ietf.org>
List-Help: <mailto:tsvwg-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/tsvwg>, <mailto:tsvwg-request@ietf.org?subject=subscribe>
X-List-Received-Date: Mon, 29 Jun 2015 07:37:52 -0000

On Mon, 29 Jun 2015, Ruediger.Geib@telekom.de wrote:

> I repeat that I've talked with my RIPE/NANOG colleagues to get feedback 
> - they came back only with one or two names with whom to discuss QoS 
> interconnection. And I never got any useful response (positive or 
> negative) from those.

This is the problem, that's not how to do this, the way to do this is to 
announce an idea on the nanog mailing list and see who might be 
interested.

As far as I read your document, it has nothing in it about how to 
incrementally get an Internet-wide scavenger class operationally deployed 
over time. To me it reads more like a document for business VPN 
Carriers-Carrier services style interconnect/interworking. It has no 
operational advice at all in it on how to deal with DDoS, how to configure 
access equipment, how to set up queuing strategies on different kinds of 
equipment, listing what equipment might do what, etc.

I suggested how to actually make this incrementally and widely deployable 
across the world, and that is to aim for a 000xxx style scavenger class. 
This seems to not work for some reason that is unclear to me, your 
document doesn't seem to be operational at all, it doesn't propose 
something that is operationally deployable on the wider Internet, so 
that's why I think we would need another document for this purpose. If 
that is not a goal we can agree on, then there is no need to write one.

So just to sum up: I'm sure your document is fine for what it intends to 
do, it just doesn't answer any of the concerns an IP network 
engineer/architect might have about implementing this on an Internet 
peering link where there is little or no control over what traffic will 
pass or what this traffic might do to the rest of their network. It 
suggests a way to do something with no operational analysis or risk 
mitigation at all.

The first thing that will pop into any good IP architects head nowadays 
will be "oh, what happens to my network when I get 200 gigabits/s of 64 
byte packets marked EF from that 5 million strong DDoS-drone network all 
across the world, aimed for my customer base?"

The answer to that is "I'll bleach DSCP it because that's the only way to 
handle it". So in order to get a scavenger class actually deployable, you 
have to come up with something that means they can relax the bleaching a 
little bit by some operators, but their infrastructure would still treat 
the traffic the same. You also have to take into account that a lot of 
core IP network equipment can't do DSCP mapping very well. This kind of 
functionality makes equipment more expensive and thus less likely to exist 
widely.

-- 
Mikael Abrahamsson email: swmike@swm.pp.se