Re: [tsvwg] draft-ietf-tsvwg-nqb, more questions

Sebastian Moeller <moeller0@gmx.de> Thu, 07 November 2019 23:12 UTC

Return-Path: <moeller0@gmx.de>
X-Original-To: tsvwg@ietfa.amsl.com
Delivered-To: tsvwg@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 289751200B1 for <tsvwg@ietfa.amsl.com>; Thu, 7 Nov 2019 15:12:10 -0800 (PST)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -2.348
X-Spam-Level:
X-Spam-Status: No, score=-2.348 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, DKIM_SIGNED=0.1, DKIM_VALID=-0.1, FREEMAIL_ENVFROM_END_DIGIT=0.25, FREEMAIL_FROM=0.001, RCVD_IN_DNSWL_LOW=-0.7, SPF_HELO_NONE=0.001, SPF_PASS=-0.001, URIBL_BLOCKED=0.001] autolearn=ham autolearn_force=no
Authentication-Results: ietfa.amsl.com (amavisd-new); dkim=pass (1024-bit key) header.d=gmx.net
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id zCLaKLnpGzjW for <tsvwg@ietfa.amsl.com>; Thu, 7 Nov 2019 15:12:04 -0800 (PST)
Received: from mout.gmx.net (mout.gmx.net [212.227.17.22]) (using TLSv1.2 with cipher ECDHE-RSA-AES128-GCM-SHA256 (128/128 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id CCACE12002F for <tsvwg@ietf.org>; Thu, 7 Nov 2019 15:12:03 -0800 (PST)
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/simple; d=gmx.net; s=badeba3b8450; t=1573168316; bh=wYetto/gswQtZBBFXlckDVCuWtIobdr2OKYYkMEoG9Y=; h=X-UI-Sender-Class:Subject:From:In-Reply-To:Date:Cc:References:To; b=R7KsAlwJ9HUHHnRERQCuB/hu6MGZrX4lhuGt48BPGQ8GtXfBkxU/VWgCIuu7ipdxt toTGLQD4St6OI0Px9XZJbT6nhyVj0smdcu8IYQH+2F5JqudNnEYrG0GtNCDfrTRg2l btKoqTjPQv7O3Xq8G3tq3vfUXio9Rt+jyVvks79w=
X-UI-Sender-Class: 01bb95c1-4bf8-414a-932a-4f6e2808ef9c
Received: from hms-beagle2.lan ([77.6.79.205]) by mail.gmx.com (mrgmx105 [212.227.17.168]) with ESMTPSA (Nemesis) id 1M4b1y-1iSIiA05KQ-001lV8; Fri, 08 Nov 2019 00:11:56 +0100
Content-Type: text/plain; charset="utf-8"
Mime-Version: 1.0 (Mac OS X Mail 12.4 \(3445.104.11\))
From: Sebastian Moeller <moeller0@gmx.de>
In-Reply-To: <28A4C4A8-91C6-4C3F-8563-F862A7247833@cablelabs.com>
Date: Fri, 08 Nov 2019 00:11:50 +0100
Cc: tsvwg IETF list <tsvwg@ietf.org>
Content-Transfer-Encoding: quoted-printable
Message-Id: <084B4D20-5A54-45EE-9519-469BC860C088@gmx.de>
References: <90ED003C-CC25-4ED4-90D8-BA572E39D852@gmx.de> <AC0FF00A-9AA7-4582-8F96-1E4E27AEB8D8@cablelabs.com> <20DE8A61-AD71-4C60-A90E-1CCB22E3C6BE@gmx.de> <FA5AC140-F5AA-410B-8067-1B042868049A@cablelabs.com> <CCE580A4-4075-4E2D-9392-DB35389F289B@gmx.de> <28A4C4A8-91C6-4C3F-8563-F862A7247833@cablelabs.com>
To: Greg White <g.white@CableLabs.com>
X-Mailer: Apple Mail (2.3445.104.11)
X-Provags-ID: V03:K1:RXKGIwwUVWJmYNuluwROmxinQW4W2/GXPEH5bNOxozHXL/sFrtQ DFO0+Eenms1JuXLmzXgRz/xAjwVMtWYo4q0Ga5X5eIwGnb7VsQEjJJJ1EO2YJ/L8NnCTPs1 C3XGZSTdg4m18YyIDbkC4sULB+5xhDc2CGhFW8nkHap9o0OMs0KLwuDAUOeWOfriztkAq9t g8vHNZz7ZGUar7SkVHiWA==
X-UI-Out-Filterresults: notjunk:1;V03:K0:KdKFRX2Mq20=:CgqhfMKKYXJZJZH8VHvRn2 49myyAyGC5ziBOe6GH2Sw1ovJuHNCDXuEEnjEobRnYXsar9V/GM2FS25QgbPeG23swSKqaPkW isbvnhl5+GJaqlX8dX2YPBaxHd817XOVmPWHzw484C2bAuarIwVGmJZWTCBoEgHs1uu6KQWho GAzHm/8weqgoQR3D29WKAydZy2joOg1tKPwHpxWDYdPprv8Lzs8G9ADu+BGJiIdv91MPcmvEI G7LdYw5Y6L7IDa92B0qhPPjQSd1MMQbPDCmR/I5qgp9/FXGiHnH0Hwjbo2uXNssoyq1duzV7v 0oHSlvFPIGe5zRtQzxzIGp2fC6UMpk4urFnmaUvLZLjLxi5qnmMnaeTFCVmmTg5y7Z/dJGTn4 sc1QSciYGozbrPIjDWdDX2YYXzx1vKsDCXyaHXFxLKBdbQs6EXKWfNlxxVnI5M86Ce9Jf352U CQs0mYrK0f8QxX4SgzN74Oiu28f7BF6pYZJ36OmKPCejol8SYMNSsU/DMkmTCfblt6BV/YNf4 mUbZ8IO/w80YPscCsfAheuW2b9eGJ8YOpsi/cxqw54Vk2asxAu33PUM5dgHvvvT+il/2tryqe RdQS3khA1QJDSqAHU44/7Hb+x+joJ/0Ba4LRPR6J7WCyn6wZxxsyYyfos23AEsCpD0QXufmDG hqIMiQQKBQTZRCN0G9RnczVkn4PxPSq+nthJmmGHDsAjgj2EWMuCZpi9maPZSYV7FfWqUctSl 7NkNcM4BhBN35tVIYqfBleoNzRqRAXqrqdeGbd0E9T9BU7WZm6uHH3onH/1rzkM8EmmDTKSXL 48Zpl8wT/jwkqYV1znOEXoQ8mQrVXrtAjP6qlESMsw1UBO0oQk2I2wpuNzh5LRV/L2+232P6M 4RpSj+BKZYO2vN51oySaOugk0KRfM9QS8zMaWJpMzP/KRtZKJDZ7mQL5adjRscdGLgZFokYBF mVqdxm0z6BebS+ZzStBakkYKJYSRFeAQwR8gh03B8tI5JIEHXginNCXprln4A6YRou+cxWdN4 rfrZ87RGtZflAxBw1CzKT1mjuOrGhkMHMn99tWUrodS2DJUr9lhMuJGumDf7wIihBjcAJ831d AqcO0pS09EGU9aocmA1bkmAff36Nwxwd15q8M3fnmNmDkApc6yApm38oty9Wca8//KRvCO0FL yiYi6Es2fNERV34t7dS+M4XBpEHazgIHaKEb0TYcEEf9woJei97QPtFHb1sGqCBnPRDUaDq5j PHCLp9ZqVCXawLOi5RmcTHY+lAXYOmmJ0mQRTsg==
Archived-At: <https://mailarchive.ietf.org/arch/msg/tsvwg/8u4_Z4dHF8roLKEGd1DAV5elucQ>
Subject: Re: [tsvwg] draft-ietf-tsvwg-nqb, more questions
X-BeenThere: tsvwg@ietf.org
X-Mailman-Version: 2.1.29
Precedence: list
List-Id: Transport Area Working Group <tsvwg.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/tsvwg>, <mailto:tsvwg-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/tsvwg/>
List-Post: <mailto:tsvwg@ietf.org>
List-Help: <mailto:tsvwg-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/tsvwg>, <mailto:tsvwg-request@ietf.org?subject=subscribe>
X-List-Received-Date: Thu, 07 Nov 2019 23:12:10 -0000

Hi Greg,


> On Nov 7, 2019, at 23:44, Greg White <g.white@CableLabs.com> wrote:
> 
> Sebastian,
> 
> I agree that this isn't rocket science.  In the existing WiFi systems that we're discussing, there are 16 DSCPs that get mapped to AC_VI, and 16 DSCPs that get mapped to AC_VO.   No one polices any of them in residential WiFi networks!  There is nothing that prevents anyone from writing an application today that sends bulk traffic marked as CS7 (a value that the IETF considers to be reserved).  

	[SM] Sure, but thanks to ISP often bleaching DSCPs there currently is very little in and outgoing traffic that actually maps to anything but AC_BE, you propose to change that in a major way, with your attempt at making NQB end to end (with one end potentially being in a close data center with an SLA allowing for NQB survival). Just because no one has massively abused this so far, is NOT a justification to do so now.


> 
> I believe that the reason that RFC 8325 simply wrings its hands over this issue, as opposed to solving it, is that A) it is a *really* hard problem to solve in an unmanaged network, and B) while it is certainly a problem in theory, there is no evidence that it is a real problem in practice.

	[SM] The problem is that there is simply no data, and interpreting this as there is no problem is neither solid science nor engineering. If you have measurements showing that this is no problem with the expected traffic rates with the NQB marking, please feel free to post them to the list or as PM.

>  
> 
> Blocking the IETF from assigning NQB the 0x2A value does *nothing* to prevent an application from using 0x2A (or any of the other 31 code points that you are concerned about) for *any* purpose that the application developer sees fit, it does *nothing* to prevent a network operator from using 0x2A for NQB traffic, and it does *nothing* to help solve the main issue that you are concerned about.

	[SM] It will keep one expected major source of DSCP marked traffic on a sane(r) policy. Most users and applications do not bother paying with dscps so the current amount of abuse is limited (and if I configure my internal skype and ssh applications to even use AC_VO I can control their activity and usage much better than I can traffic rushing in from the internet). Sure I can re-map 0x2A to a sane value on ingress to my network, but that is not going to help that much if my neighbors do not do this, and their APs start hogging all tx_ops on the shared channel.

> 
> If you want to solve this problem, my suggestion is that you start a new draft proposing a technology that will holistically protect WiFi networks from all potential DSCP abuses. 

	[SM] First rule of holes, put the shovel away when you find yourself inside one. Here, I am not concerned so much in fixing all wifi AC abuse and more in giving my best to avoid this unfortunate and undesirable condition getting worse.



Sebastian



> 
> Greg
> 
> 
> 
> 
> On 11/7/19, 3:00 PM, "Sebastian Moeller" <moeller0@gmx.de> wrote:
> 
>    Greg,
> 
>> On Nov 7, 2019, at 22:11, Greg White <g.white@CableLabs.com> wrote:
>> 
>> Sebastian,
>> 
>> In the interest of moving this forward and not going in circles,
> 
>    	[SM] My impression is not that we going in circles, it is a rather slow road to understanding and accepting the properties and limitations of wifi's unfortunate prioritization scheme in conjunction with your intended use of the NQB dscp. Me shutting up, would not change the underlaying facts that need to be considered here if the issue is to be solved.
> 
> 
>> I think you summarized your position as: "To be explicit, I do not object on principle to using AC_VI or even AC_VO as long as this does not eat significantly into the tx_ops for AC_BE, the current draft improves  in that direction. Would it be possible to make this point even stronger?"  
>> 
>> In my view, as long as the applications that we're recommending to be marked NQB are no more bandwidth intensive than video conferencing (the applications that the IETF already recommends be marked with a DSCP that maps to AC_VI), then we have achieved what is needed.  Do you agree?
> 
>    	To state the obvious, "no more bandwidth intensive than video conferencing" is virtually meaningless as it will give very little guidance on acceptable either single flow nor aggregate NQB traffic share or absolute bandwidth (yes rfc8325 is also pretty silent on this, but "look mum, the other guys are doing it too" is not the best of defenses IMHO). I realize that this is an issue for you as you explicitly target NQB as requiring no prioritization or rate-limiting, I get that; but I believe that on wifi since you effectively propose to use a prioritization system you really really should require rate-limiting. 
> 
>    rfc8325, section 8.2:
>    "The wireless LAN presents a unique DoS attack vector, as endpoint
>       devices contend for the shared media on a completely egalitarian
>       basis with the network (as represented by the AP).  This means that
>       any wireless client could potentially monopolize the air by sending
>       packets marked to preferred UP values (i.e., UP values 4-7) in the
>       upstream direction.  Similarly, airtime could be monopolized if
>       excessive amounts of downstream traffic were marked/mapped to these
>       same preferred UP values.  As such, the ability to mark/map to these
>       preferred UP values (of UP 4-7) should be controlled.
> 
>       If such marking/mapping were not controlled, then, for example, a
>       malicious user could cause WLAN DoS by flooding traffic marked CS7
>       DSCP downstream.  This codepoint would map by default (as described
>       in Section 2.3) to UP 7 and would be assigned to the Voice Access
>       Category (AC_VO).  Such a flood could cause Denial-of-Service to not
>       only wireless voice applications, but also to all other traffic
>       classes.  Similarly, an uninformed application developer may request
>       all traffic from his/her application be marked CS7 or CS6, thinking
>       this would achieve the best overall servicing of their application
>       traffic, while not realizing that such a marking (if honored by the
>       client operating system) could cause not only WLAN DoS, but also IP
>       network instability, as the traffic marked CS7 or CS6 finds its way
>       into queues intended for servicing (relatively low-bandwidth) network
>       control protocols, potentially starving legitimate network control
>       protocols in the process."
> 
>    To me this clearly indicates that the achievable wifi rate betwnn AP and each station needs to be taken into account when considering which fraction of > AC_BE traffic is acceptable. So very much incompatible with your goal of having endpoints set the NQB dscp based on their own best assessment of traffic type without some sanitization at the AP level (only the AP will have a reasonable chance of predicting immediate achievable rates with some confidence, neither endpoints nor intermediate low latency queue enabled AQMs have sufficient knowledge to judge what traffic rate is acceptable for AC_VI). I consider it to be quite unfortunate that rfc8325 has no references to research on real-world data on the consequences of actually following through with its recommendations, nor that it has robust recommendations of recommended maximal fractions of the achievable rate each AC should be constrained to.
> 
>    All of this is not really rocket science, and the obvious solution, following both the principle of least surprise and a "first, do no harm" maxim is to select the NQB dscp such that the unfortunate default DSCP to AC mappings keep NQB marked traffic in the AC_BE queue, UNLESS the AP is NQB-aware in which case the AP should be mandated to at least reliably avoid starvation of ACs.
>    The amount of back and forth seems to indicate that this is not an outcome you consider desirable.
> 
> 
>    Sebastian
> 
>> 
>> -Greg
>> 
>> 
>> 
>> 
>> 
>> On 11/5/19, 1:58 AM, "Sebastian Moeller" <moeller0@gmx.de> wrote:
>> 
>>   Hi Greg,
>> 
>> 
>>> On Nov 5, 2019, at 01:28, Greg White <g.white@CableLabs.com> wrote:
>>> 
>>> Hi Sebastian,
>>> 
>>> Interoperability with existing WiFi equipment is an important aspect, since WiFi latency can be considerable. By default, many existing APs only support 4 priority queues, and thus it is not possible to meet all of the requirements of the NQB PHB (at least in this default configuration).
>> 
>>   	[SM] I agree the question is how to deal with that "impedance mismatch".
>> 
>>> Nonetheless, it is possible to utilize two of the four queues in order to meet some of the requirements, and thus provide some of the benefits of the NQB PHB.  
>> 
>>   	[SM] Unless you opt for selecting AC_BK for the NQB traffic, for most users the value of NQB will be mostly in the priority boost on wifi and the resulting air-time access advantage (which results in both lower latency and potentially higher bandwidth).
>> 
>>> With proper configuration and/or policies, this can be done safely.  
>> 
>>   	[SM] Sure, I am concerned about the status quo wich does not entail "proper configuration and/or policies", and hence I believe the NQB special treatment on WIFI should be opt-in and not "opt-out" (in quotes as most endusers will not be able to opt-out). For thid reaon I believe that the proposal to use a code point that by default is mapped to AC_BK is the only correct solution (as a bonus it seems that such a code point also has a better chance to survive transit over the internet). NQB-aware APs then simply treat that NQB-codepoint however they want. If for example a priority boost is desired such an AP can easily implement the required rate-limiting so that AC_BE traffic does not get starved out. In short, I fully agree that special treatment requires "proper configuration and/or policies" and the desirable strategy if that can not guaranteed should be "do no harm".
>> 
>>> The final SHOULD is intended to address your concern about prioritization (since it results in segregation without prioritization).
>> 
>>   	[SM] Ah, in that case the AP needs to be be NQB aware anyway, would it then not be better to use an appropriate scheduler/AQM in front of the AC_BE queue and keep all traffic in the same priority class? The disadvantage of setting AC_VI to the same EDCA values as AC_BE is then that applicatons that expect an airtime access boost from using AC_VI will not get it any more (not necessarily a deal-breaker but certainly unexpected enough to merit clear communication of that side-effect).
>> 
>>> Absent this requirement (or the ability to comply with it operationally), the operator would need to consider (and perhaps limit) which applications are allowed to be marked as NQB.  This aspect isn't discussed in the draft, but I will add it based on your input.
>> 
>>   	[SM] Great! I would guess the safest would be to have the NQB-aware scheduler in an AP apply some (proportional) rate-limiting if NQB traffic is getting preferential air-time access.
>> 
>>> 
>>> Network operators understand the value of segregating NQB traffic on WiFi links, and will almost certainly select a DSCP in practice that achieves that goal.  
>> 
>>   	[SM] That is exactly part of my concern with the default mapping to AC_VI approach, I expect that very quickly a lot of traffic will utilize the AC_VI queue potentially starving normal AC_BE traffic in the process.
>> 
>>> Assigning a different DSCP in this draft would do nothing to prevent them from doing so.
>> 
>>   	[SM] Sure, but is that really a good justification for proposing a DSCP with known side-effects? As far as I am concerned an RFC should propose sane defaults and hope for the best.
>> 
>>> Instead, what we need to do is clearly articulate how to make best use of the existing WiFi tools, and how to avoid conflicts. 
>> 
>>   	[SM] I believe the last two are mutually exclusive...
>> 
>>> 
>>> In existing RFCs, the IETF already recommends that video conferencing applications mark their traffic as either AF4x or CS4, all of which get mapped to AC_VI.  The remaining language in the NQB draft describes sparser flows than these.
>> 
>>   	[SM] as an implementer I read "relatively low data rates", without further guidance I have very little intuition what to use as reference. Could this be made more explicit? This is orthogonal to the question whether such a limit should be enforced in any way, here the question really is about getting a feel what is considered acceptable for NQB treatment.
>> 
>>> 
>>> Based on your comments, I attempted to remove all text that could be interpreted as recommending that high-data-rate traffic be marked NQB.  
>> 
>>   	[SM] Thanks, as long as the aggregate NQB traffic is relative sparse compared to the available WiFi bandwidth (or the number of tx_ops) most of my WiFi concerns get less and less relevant. To be explicit, I do not object on principle to using AC_VI or even AC_VO as long as this does not eat significantly into the tx_ops for AC_BE, the current draft improves  in that direction. Would it be possible to make this point even stronger?
>> 
>>> It appears that I missed one instance (in the Introduction it gives "interactive voice and video" as an example). Aside from this (which I can correct), I think the draft currently recommends that NQB only be used for sparse traffic.  That said, the section where this guidance is intended to be given is still lacking in specificity, and poses some open questions that may need to be addressed in a subsequent revision.
>> 
>>   	[SM] Sounds great. Now this then cycles back to one of the other open topics, "enforcement". Ideally NQB-aware APs should monitor both queues and re-assign flows between them based on flow-behavior in relation to time-variant bandwidth experienced by that flow. 
>> 
>>   Best Regards
>>   	Sebastian
>> 
>>> 
>>> Best Regards,
>>> Greg
>>> 
>>> 
>>> On 11/4/19, 3:25 PM, "tsvwg on behalf of Sebastian Moeller" <tsvwg-bounces@ietf.org on behalf of moeller0@gmx.de> wrote:
>>> 
>>>  Regarding https://datatracker.ietf.org/doc/draft-ietf-tsvwg-nqb/?include_text=1
>>> 
>>>  7.3.  WiFi Networks
>>> 
>>>     WiFi networking equipment compliant with 802.11e generally supports
>>>     either four or eight transmit queues and four sets of associated EDCA
>>>     parameters (corresponding to the four WiFi Multimedia Access
>>>     Categories) that are used to enable differentiated media access
>>>     characteristics.  Implementations typically utilize the IP DSCP field
>>>     to select a transmit queue, but should be considered as Non-
>>>     Differentiated Services-Compliant Nodes as described in Section 4 of
>>>     [RFC2475].  As a result this document discusses interoperability with
>>>     WiFi networks, as opposed to PHB compliance.
>>> 
>>>     As discussed in [RFC8325], most existing implementations use a
>>>     default DSCP to User Priority mapping that utilizes the most
>>>     significant three bits of the DiffServ Field to select "User
>>>     Priority" which is then mapped to the four WMM Access Categories.  In
>>>     order to increase the likelihood that NQB traffic is provided a
>>>     separate queue from QB traffic in existing WiFi equipment, the 0x2A
>>>     codepoint is preferred for NQB.  This would map NQB to UP_5 which is
>>>     in the "Video" Access Category.
>>> 
>>>     Systems that utilize [RFC8325], SHOULD map the NQB codepoint to UP_5
>>>     in the "Video" Access Category.
>>> 
>>>     In order to preserve the incentives principle, WiFi systems SHOULD
>>>     configure the EDCA parameters for the Video Access Category to match
>>>     those of the Best Effort Access Category.
>>> 
>>> 
>>>  [SM] This last section is puzzling: if the wifi system configures AC_VI with EDCA parameters that match the AC_BE parameters, AC_VI ceases to be different from AC_BE, in that case picking a codepoint that automatically maps to CS0 and hence to AC_BE  seems much safer, simpler and straight forward to me. 
>>>  Especially since essentially none of the millions deployed WiFi APs out there will a) have this configured like proposed already and b) none of the consumer APs I know actually allow to easily adjust EDCA parameters at all. I guess I must be missing something and would be delighted to be shown why the proposed text is the right thing.
>>>  My take on this still is, if NQB traffic is sufficiently sparse using AC_VI can be justified, but without any rate limits this has the potential of being quite unfair to concurrent APs on the same channel (as well as the neighboring channels that overlap with the selected). 
>>>  I do not want to sound alarmist, but given the number of cable-ISP WiFi-APs (as indicated by a SSID containing the ISPs name) in my city, I believe making sure that those APs will not basically start hogging most airtime seems the prudent thing to do. If there are sufficient backstops in place (like rate limiting or automatic down-marking if the traffic is not sparse enough) to avoid the described situation, I am all for it.
>>> 
>>>  The text probably should also openly discuss that in WiFi/WMM the four available queues by design have different priorities, and by moving NQB out of the default AC_BE while leaving QB flows in there, this effectively runs against  the following text in the draft: "The NQB queue SHOULD be given equal priority compared to queue-building traffic of equivalent importance." (leaving alone the question how an AP or a station is supposed to measure importance)
>>> 
>>> 
>>>  Sebastian
>>> 
>>> 
>> 
>> 
>> 
> 
> 
>