Re: [tsvwg] Dual-Q Polcing

Sebastian Moeller <moeller0@gmx.de> Wed, 27 May 2020 08:58 UTC

Return-Path: <moeller0@gmx.de>
X-Original-To: tsvwg@ietfa.amsl.com
Delivered-To: tsvwg@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 5C5DE3A0BB6 for <tsvwg@ietfa.amsl.com>; Wed, 27 May 2020 01:58:50 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -1.649
X-Spam-Level:
X-Spam-Status: No, score=-1.649 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, DKIM_SIGNED=0.1, DKIM_VALID=-0.1, FREEMAIL_ENVFROM_END_DIGIT=0.25, FREEMAIL_FROM=0.001, RCVD_IN_MSPIKE_H2=-0.001, SPF_HELO_NONE=0.001, SPF_PASS=-0.001, URIBL_BLOCKED=0.001] autolearn=no autolearn_force=no
Authentication-Results: ietfa.amsl.com (amavisd-new); dkim=pass (1024-bit key) header.d=gmx.net
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id gUBWowI0mK5r for <tsvwg@ietfa.amsl.com>; Wed, 27 May 2020 01:58:47 -0700 (PDT)
Received: from mout.gmx.net (mout.gmx.net [212.227.15.19]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id DA02D3A0BB3 for <tsvwg@ietf.org>; Wed, 27 May 2020 01:58:46 -0700 (PDT)
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/simple; d=gmx.net; s=badeba3b8450; t=1590569921; bh=mhsdpkX1qhgo3C2bd3cGlQSuZzPWQ8mzm6uJvmL2BKk=; h=X-UI-Sender-Class:Subject:From:In-Reply-To:Date:Cc:References:To; b=NHQJl0MRi4urJV+6yaH2tthPoP0M8jz8BsdYKo9l3ErOohAoNhSGwY27oCMDgYtw8 qvj+1VAzETfzJ6RWT7OwPRg/S7Jg/9PfsvfQ+1x/AanguUp99Lo9X6SAcQ13nVpzJp x0QdW9Bo+cTIfJD3SPrUZjjyDXUadEAHVDtXJf44=
X-UI-Sender-Class: 01bb95c1-4bf8-414a-932a-4f6e2808ef9c
Received: from [172.16.10.214] ([134.76.241.253]) by mail.gmx.com (mrgmx005 [212.227.17.190]) with ESMTPSA (Nemesis) id 1Mw9UE-1imBJV0ljY-00s5rh; Wed, 27 May 2020 10:58:41 +0200
Content-Type: text/plain; charset="us-ascii"
Mime-Version: 1.0 (Mac OS X Mail 12.4 \(3445.104.14\))
From: Sebastian Moeller <moeller0@gmx.de>
In-Reply-To: <1df40b13-2024-7528-b074-c112940d5e69@erg.abdn.ac.uk>
Date: Wed, 27 May 2020 10:58:39 +0200
Cc: tsvwg IETF list <tsvwg@ietf.org>
Content-Transfer-Encoding: quoted-printable
Message-Id: <0A4BA88A-2D30-4DB2-982A-E40B546848C1@gmx.de>
References: <dbc71da6-70f1-7369-1d2d-f08fb3b08b69@erg.abdn.ac.uk> <21483444.sDhFMENYeD@linux-9daj> <a85600da-e69f-9190-7ca1-d23a7e7246f9@bobbriscoe.net> <3267993.nvHYsSR2bi@linux-9daj> <dd8e3896-2951-537f-e3d1-9954c93348dd@bobbriscoe.net> <67CBAA42-BD37-4A19-B650-68F511FC244A@gmx.de> <af3e6272-c04d-9e81-763c-e690ed521749@bobbriscoe.net> <1565A7C1-1DF1-4C6A-AC37-14331AC87508@gmail.com> <25e34532-5a33-3ca1-5cba-b7f857874ced@erg.abdn.ac.uk> <2605AA63-8225-4585-AA7B-49ACBF3B07EB@gmx.de> <259b9730-58ba-c2f1-6318-3c4717aa6b7e@erg.abdn.ac.uk> <9B51C652-D734-4EF8-BAFF-690A475AD83E@gmx.de> <e944f4ec-afe8-7842-57d0-5ef86be2d18c@erg.abdn.ac.uk> <7B15F964-8BEC-4E20-AE1F-A97F2B98FF92@gmx.de> <fcfdb230-eba9-3605-2a20-682ab6c19463@erg.abdn.ac.uk> <61F585DE-C67A-4AE8-9FCE-878D3C335B3F@gmx.de> <1df40b13-2024-7528-b074-c112940d5e69@erg.abdn.ac.uk>
To: Gorry Fairhurst <gorry@erg.abdn.ac.uk>
X-Mailer: Apple Mail (2.3445.104.14)
X-Provags-ID: V03:K1:jHuSAN/spf1/RF+8ngwxKFmdDMnJTc+apbX8Y+ONhwwCPWx6BL2 osGvbKcZnqaghvdy5FP3gSwa0oOLlrRGtRbQAJJg8M2j5q77LzsG1M80oNETbdFOVZerOa6 4dG9Kvoku7kpxCf/N54WnDr1bYxDAbLaIpKnlsVz8pv9DzFJ5iXYwgNvdih918xG/6csXHu 4zRUGD9meg9HxaNEU1Tww==
X-UI-Out-Filterresults: notjunk:1;V03:K0:lTkwsniXeHc=:j5ieqd3Br2nq3VSaStRf9v Uq5WTa+rhUMYoXQQpRJJSuAyNEzorqSz7IDLcQtSV+U296qIymFQfR7zSMmt2UZgIoU7HB7KZ kJSLj9INxtlahdUxpI4F+X2uhMFZJOgnx5q8Ok0+lga4+oSFMnGQ7c8opbutWbRGnOoJulfi3 Hni55HrT18eb0Y5yyvlWaifnFo47hR/BjaYa6+Qax67MMBGk9MLsclLiGLG2DKuAohBzVyGZ5 2BvIhnC9jA+WRIlYYk02JO8Mddbsowq7wosLtbsEKwOWtYtzF1/+0tfz+IVyxWH3XsOWcv2Tr UfQoGyuKqi+TreVGrJSiD/XlWa8BFSJV7GJ5cnKIZk3Qyf1XZqBpRRkm5Ver3Et/3htvaoIA3 ibTfSX3BM/djrLDOgG4/QCL0OUBKLOauXLfJj95UnH6XH9Yuq8hyR3SWEQo70XHw2CabZijy+ Vqh8my/p9MI3/GFHKK2aI/gDc8WWODqyVdiREK0p2zR6jH7BrLGkKL0rd6G9YbzBc823LkTOk 0jykZVtXzCJczUDPFmK6fKiPaz7LEgqPiWU6Nf1AGy3tc6t32Zp3vkP/qSQqrrECOa1Fvshae lWRxEIn7mADNA5rZOXlUc8cOYMI/UIijg0A+xrnueDvnrrlVQlQ/0Ml1R/0ZSr/tds9iie6EG spuquTn65XE6IctJsRo6I7gM216AP1fVDzkVQF5Uk5s5LUXRcyclEDkgc004HU2jAf3BbXGgy zEbJPt+1EQZvcY7s/3XtMusmuNb4vNCLKP0Cfw/OoPr0wrnFQ0PNYM70xKd15k++EZecrFgKo yWJueheW0rs/4oCbBgkssWo5alXWShlSzK/Y90yolvgsCxqhkJ8if2IZpMNDv5hcWq1Ykfxn6 ojTQHqfHNqITBgQ8hqYIorc0+bO7jMku9n97JqiGMrVSOXuZSTIRlQGE+D3a0KYenGcPRLQvU siSuBMUk279jamv1nJjJMbH4HEYiIEi7VD5K13iBtzsH9bV9EKLqz+aI4oMBdfqCfiz7wUOkA paYwi2YBLbPcF3BB+jnvStFXlB76ubfRlwAfgKoEUuRAbkJny4xjFDNLPx/MhAkXYzsKkpQ8K e3hWFndj+8qUYMbwVXu8DSU1IaRpE2iT6dyvHHdgU/tHnj65IZnhyJM1StD7CXl+K77LjVqTh DlK+GbuISaCz7t+teMLGC+mKJjoOP2QVwtvdso4gdvjB+4m95B1+vsXUuyqlnLOk3uAWlagdO r6it65GrFrqnwlBUJ
Archived-At: <https://mailarchive.ietf.org/arch/msg/tsvwg/Spj9ptIRNFOS6bDmvWZpntlgHe0>
Subject: Re: [tsvwg] Dual-Q Polcing
X-BeenThere: tsvwg@ietf.org
X-Mailman-Version: 2.1.29
Precedence: list
List-Id: Transport Area Working Group <tsvwg.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/tsvwg>, <mailto:tsvwg-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/tsvwg/>
List-Post: <mailto:tsvwg@ietf.org>
List-Help: <mailto:tsvwg-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/tsvwg>, <mailto:tsvwg-request@ietf.org?subject=subscribe>
X-List-Received-Date: Wed, 27 May 2020 08:58:50 -0000

Hi Gorry,


> On May 25, 2020, at 12:22, Gorry Fairhurst <gorry@erg.abdn.ac.uk> wrote:
> 
> See below, I'll try to explain how I hope this can focus on the documents.

	[SM] Sure, I just want to note that I see the lack of properly assessing and addressing the security questions, not an issue about the wording of a few specific paragraphs, but rather a systematic decision that permeates the whole dratfs. Hence fixing these will not result in just a few changes to the security considerations section IMHO. Sure we can discuss these specifically, but I do not believe that we will be able to remedy that whole rather cavalier approach to security there.


> 
> On 25/05/2020 11:00, Sebastian Moeller wrote:
>> Hi Gory,
>> 
>> more below in-line.
>> 
>> 
>>> On May 25, 2020, at 11:02, Gorry Fairhurst <gorry@erg.abdn.ac.uk> wrote:
>>> 
>>> See below.
>>> 
>>> On 25/05/2020 09:54, Sebastian Moeller wrote:
>>>> Hi Gorry,
>>>> 
>>>> 
>>>>> On May 25, 2020, at 10:39, Gorry Fairhurst <gorry@erg.abdn.ac.uk> wrote:
>>>>> 
>>>>> So, this was your comment in Dual-Q:
>>>>> 
>>>>> On 25/05/2020 09:13, Sebastian Moeller wrote:
>>>>>> https://tools.ietf.org/html/draft-ietf-tsvwg-aqm-dualq-coupled-11#page-21
>>>>>> :
>>>>>> "Where the interests of users or flows might conflict, it could be
>>>>>>    necessary to police traffic to isolate any harm to the performance of
>>>>>>    individual flows.  However it is hard to avoid unintended side-
>>>>>>    effects with policing, and in a trusted environment policing is not
>>>>>>    necessary."
>>>>>> 
>>>>> The general security considerations across section 4 seems reasonable to me.
>>>>> 
>>>>> Did you have issues with that text wrt security considerations?
>>>> 	[SM] Yes, certainly I have issues with that. The use of the subjunctive "could" indicates a purely hypothetical concern, or rather that this issue was not actually tackled empirically, yet.
>>> I don't read "could" that way. I read this as this could-be-needed, interprettting this as a non-RFC2119 version of "MAY".
>> 	[SM] Which boils down to the same more or less, IMHO.
> Not really, this document is proposed as an AQM Spec. To me, traffic management, scheduling, etc belong in a draft about architecture or operations.

	[SM] I disagree, I cited two closely related sections from both the dual queue coupled AQM and the L4S arch drafts, that both display the same cavalier approach to safety ("could be necessary", "it is hoped..."). I consider it essential to align all L4S drafts with reality.

> So, a conversation needs to focus on the appropriate document and a specific section.

	[SM] Let's focus on the big picture first, please. I do not intend to go on a quixotic quest against wind-mills, if the consensus in the WG is that none of these changes I argue for are necessary in the first place. (I will keep speaking my mind, but I will not embark of detailed text exegesis if I perceive this to be a fools errand).


>> Point being instead of attempts at measuring realistic traffic scenarios (like e.g. flows using different initial window sizes as some CDN's are known to use, see https://www.comsys.rwth-aachen.de/fileadmin/papers/2019/2019-rueth-iwtnsm.pdf), all that is offered is a hope. I certainly also hope that this will not become an issue, but IMHO that does not take tho onus from the designers/developers of a solution to test under realistic adversarial traffic conditions, before simply relaying on hope. Why is that view even contentious?
>> 	Is everybody else convinced that L4S offers a sufficiently safe design and was tested with the to be expected level of adversarial traffic patterns to confirm the design's safety in the real-world?
>> 
>> Best Regards
>> 	Sebastian
> 
> I do like data - that is good.

	[SM] That leaves me puzzled. Given the absolute lack of testing under realistic conditions that will be encountered at the ISP customer edge (including, bi-directionally saturating loads, asymmetric links, multi-hop paths across countries/oceans (where multiple nodes will add to latency and jitter), ... ), I fail to understand how we actually continue with text details, while the proof that the core promises actually are deliverable in the real-world is still missing? Rearranging the deck chairs of a certain ship of the White Star Line comes to mind.


> 
> But, my email is urghing you to separate the pieces.

	[SM] Divide et impera, eh? ;)

> 
> If for instance, one was to consider traffic unresponsive to ECN signals, then this is a particular case of non-conformant traffic - we all see non-conformant traffic in networks for various reasons and need to have tools and methods to deal with that - what a network decides to actually use will depend on many things.

	[SM] We need to address the fact that L4S will make this issue more urgent, until now ECN is mostly an "also ran" so playing games with ECN will have little ROI, once the DOCSIS-edge is switched to L4S that value equation changes massively (and to their credit CableLabs created and mandated? the queue protection system to avoid this easy to predict pitfall).


> For example, it wouldn't be wise to suggest a scheduling-based approach eliminates all the problems

	[SM] +1; but in reality eleminating "all problems" typically is not feasible, but concluding from a perfect solution is not possible/desirable, that no solution is just as good, seems a bit counter-intuitive.


> - in some parts of the network this has always been the case, in other places it is not a useful technique. similarly circuit-breaker methods have their place, as likely does a policer.

	[SM] Gorry, please help understand, how a circuit breaker is going to help against the new class of attacks made possible by the L4S core design: non-paced bursts of ECT(1)-marked packets, that over a multi-dozends of millisecond window average out to below capacity rate, yet repeatedly drive the dualQ AQM into overload protection? This completely takes L4S, low-latency and low-loss promises off the table, yet is really hard to detect from just monitoring the incoming and outgoing aggregate traffic levels.
	Now, it s well possible that I misunderstand what a circuit breaker is and how sensitive it can be while still staying useful, but I can not help to think that the interactions between the promosed components have not yet been carefully thought through, let alone tested.

> 
> Anyway, what I am suggesting is decide on a topic, relate this to a particular topic and a particular draft.

	[SM] QUESTION: We have been promised a less enthusiastic worded version of these drafts, are these forth-coming? I would like to avoid spending time with a soon to be replaced version. (Not that I expect that the result of my text exegesis will actually flow back into the drafts, Bob has made it abundantly clear, that he emphatically does not share my risk assessments).

Best Regards
	Sebastian


> 
> Gorry
> 
>>>> Now, Bob argues* that experimental roll-out is required to test that hypothesis but at the same time fights nail and tooth to even add a MUST implement for his intended counter-measure against such a failure mode, the queue protection. As is this is safety-by-wishful-thinking, and that IMHO is not a solid basis for any IETF condoned experiment or standard.
>>>> 	Initially the L4S argument was, abusing L4S signaling is self-defeating and hence will not happen, due to lack of incentives to do so. As far as I understand that position was retracted (or at least not publicly repeated on the list) based on the discussion, but it has not been replaced with anything else explaining why safety mechanisms can and/or should stay optional, besides hopes and wishes.
>>> I'll let the document editor decide if they wish to respond about whether they think more is needed in this section of the DualQ-draft.
>>> 
>>>> Best Regards
>>>> 	Sebastian
>>>> 
>>>> 
>>>> *) Bob: "I can understand that many operators will be cautious with a new approach, which is why I agreed to design per-flow QProt for Low Latency DOCSIS, even though I do not believe it will eventually prove necessary. That, to me, is one of the open questions that only an Internet-wide experiment can answer, so please refrain from giving your opinion again - we have all heard it many times already."
>>>> 
>>>> Note again, Bob's position is based on "believe" instead of hard cold numbers.
>>>> 
>>>>> Gorry
>>> Gorry