Re: [tsvwg] Some comments on NQB (part 2)

"Black, David" <David.Black@dell.com> Wed, 04 May 2022 20:08 UTC

Return-Path: <David.Black@dell.com>
X-Original-To: tsvwg@ietfa.amsl.com
Delivered-To: tsvwg@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 6E671C15949F for <tsvwg@ietfa.amsl.com>; Wed, 4 May 2022 13:08:11 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -2.669
X-Spam-Level:
X-Spam-Status: No, score=-2.669 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, DKIMWL_WL_HIGH=-0.575, DKIM_SIGNED=0.1, DKIM_VALID=-0.1, DKIM_VALID_AU=-0.1, DKIM_VALID_EF=-0.1, RCVD_IN_ZEN_BLOCKED_OPENDNS=0.001, SPF_HELO_NONE=0.001, SPF_NONE=0.001, URIBL_BLOCKED=0.001, URIBL_DBL_BLOCKED_OPENDNS=0.001, URIBL_ZEN_BLOCKED_OPENDNS=0.001] autolearn=ham autolearn_force=no
Authentication-Results: ietfa.amsl.com (amavisd-new); dkim=pass (2048-bit key) header.d=dell.com
Received: from mail.ietf.org ([50.223.129.194]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id JO_QS4YzdNhk for <tsvwg@ietfa.amsl.com>; Wed, 4 May 2022 13:08:07 -0700 (PDT)
Received: from mx0a-00154904.pphosted.com (mx0a-00154904.pphosted.com [148.163.133.20]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id B4E1CC159527 for <tsvwg@ietf.org>; Wed, 4 May 2022 13:08:06 -0700 (PDT)
Received: from pps.filterd (m0170393.ppops.net [127.0.0.1]) by mx0a-00154904.pphosted.com (8.17.1.5/8.17.1.5) with ESMTP id 244FeHJl023929; Wed, 4 May 2022 16:08:05 -0400
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=dell.com; h=from : to : cc : subject : date : message-id : references : in-reply-to : content-type : content-transfer-encoding : mime-version; s=smtpout1; bh=92WS7o31295NT600H6CaXl2BuP9hBsisjFnGQPC46JU=; b=kASKznPvvuXQLlJfJNd73Qx96broaoz5sdKD4qPUfHrtW0Lf6NmDJ3kcZvr8eFFOai7q 27ChC4153Dj5KDBmjWQpi3jM48kfHTsIBKfRcrRzk/hYGVDV4Fcc1H8wJbcN6k2c4ImH fC1ruVNC8m/3x6/PH/eU3IZkcOJHdLVaxmkoEJNd+fhkp3YPk976wOAvcy2m1M3wiZXF ZjhiWHj8DFD6M1y1na1w9YdI6AMCLKlJigf9na24lwLZV1Y1MTP5LihxeOwwbqO7e3Vo EtHeCJbY8Sh+dhI6tkU6EdhWM2cUDrY4gHQAkbhoOALVTHy9R6dM4U2+XZlpjkGAhfFk Fw==
Received: from mx0a-00154901.pphosted.com (mx0a-00154901.pphosted.com [67.231.149.39]) by mx0a-00154904.pphosted.com (PPS) with ESMTPS id 3fs0ej7nrd-1 (version=TLSv1.2 cipher=ECDHE-RSA-AES256-GCM-SHA384 bits=256 verify=NOT); Wed, 04 May 2022 16:08:05 -0400
Received: from pps.filterd (m0142699.ppops.net [127.0.0.1]) by mx0a-00154901.pphosted.com (8.17.1.5/8.17.1.5) with ESMTP id 244JvN8B005300; Wed, 4 May 2022 16:08:04 -0400
Received: from nam10-mw2-obe.outbound.protection.outlook.com (mail-mw2nam10lp2101.outbound.protection.outlook.com [104.47.55.101]) by mx0a-00154901.pphosted.com (PPS) with ESMTPS id 3fu4xfqysh-1 (version=TLSv1.2 cipher=ECDHE-RSA-AES256-GCM-SHA384 bits=256 verify=OK); Wed, 04 May 2022 16:08:04 -0400
ARC-Seal: i=1; a=rsa-sha256; s=arcselector9901; d=microsoft.com; cv=none; b=mXQDhDZ6e5A0KMLJLWR7JaWqb72+I2ivjBUl8+cz0jR2A1bK4+NZ8lS7rIIZOT9qlE11EMHTprX8jI4X1B5Q2HxaI8jy6uqSz5Y5RRP+K9ux5fb80HMcKKkjQJtAbh44Ru+UFbPL9srztjIyvpYo5+xTldSeg3q8WJH9P1MkIfqjhvVSzVV++mCkqg/CgVQ1tHaPb5MtxsAKnnyhUxaoX4eSITBlCXu59nvPgbO9q4xWLtbjKb97RT9DTo86zSy1aVNmuzaXLRZ0xVKCHCtbNTq+cbugQcmjHSMYQXUFfhpovLIGxEPnYuFSy2PYmTqwqqhu8gpoi/dHu1p/jbOSBA==
ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=microsoft.com; s=arcselector9901; h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-AntiSpam-MessageData-ChunkCount:X-MS-Exchange-AntiSpam-MessageData-0:X-MS-Exchange-AntiSpam-MessageData-1; bh=92WS7o31295NT600H6CaXl2BuP9hBsisjFnGQPC46JU=; b=OzzWDAczHopLA8mFV5koKhwLAWB84R0374wuA/ICyKzzgmB0bGZxuRXqzvvLxcxfiWaww7PJ8Gm7pTLFjuh/lIhIYhmXixlwHmGXj95/532TGG3RIgogTg7FDzmXaR7bf9ro5KJAYoxU/68J66i03SgV4nryyCNfYAxznCS+xckX9PzIl5thix4XqI6tOxljMbTU8vK4Exy0Ag5Excu6q6YeeGeR8EPM5NXoAraYd9/n/UatOFHMrN+FX0KWoAozq1zoe+dcUuL9/Hc9qzXrZ6AFsILzEl+MXc+Z7ucpPW/dbqG2Dave7s+il9zQ5bz+9T/luJBqqd9geIGOH0ZplA==
ARC-Authentication-Results: i=1; mx.microsoft.com 1; spf=pass smtp.mailfrom=dell.com; dmarc=pass action=none header.from=dell.com; dkim=pass header.d=dell.com; arc=none
Received: from MN2PR19MB4045.namprd19.prod.outlook.com (2603:10b6:208:1e4::9) by BY5PR19MB3907.namprd19.prod.outlook.com (2603:10b6:a03:227::18) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id 15.20.5206.25; Wed, 4 May 2022 20:08:02 +0000
Received: from MN2PR19MB4045.namprd19.prod.outlook.com ([fe80::c07f:6d8:1371:85bc]) by MN2PR19MB4045.namprd19.prod.outlook.com ([fe80::c07f:6d8:1371:85bc%3]) with mapi id 15.20.5206.025; Wed, 4 May 2022 20:08:02 +0000
From: "Black, David" <David.Black@dell.com>
To: Greg White <g.white@CableLabs.com>
CC: "tsvwg@ietf.org" <tsvwg@ietf.org>, "Black, David" <David.Black@dell.com>
Thread-Topic: [tsvwg] Some comments on NQB (part 2)
Thread-Index: AQHYOv2g76R1fsbm70G9qV1tmCc7x6zgWMcAgAAXLACAAirvgIABBIgAgB7akoCAA7qoAIAArBcAgACphoCAB9pCQA==
Date: Wed, 04 May 2022 20:08:02 +0000
Message-ID: <MN2PR19MB404577C0E090C6C84ED128B583C39@MN2PR19MB4045.namprd19.prod.outlook.com>
References: <7590fa6c-0d03-16d8-f809-125a1b6c8aad@erg.abdn.ac.uk> <9F7895D0-F66F-4916-B021-5AAE90FCE8A4@cablelabs.com> <7F88F10A-6666-4CF0-A50F-F38BA1FD2FF0@gmx.de> <bec2628d-9fdd-1a88-4737-f857a1c4d7a8@erg.abdn.ac.uk> <1EF1A386-602A-441C-B9F9-6EAA5DE5CA1D@cablelabs.com> <BE1P281MB15247E15FC2BC06FB712E2E99CFB9@BE1P281MB1524.DEUP281.PROD.OUTLOOK.COM> <ADEAF485-DE50-47EC-8927-140313DC99C7@cablelabs.com> <BE1P281MB152446D0ACD70B33A9BBBA679CFC9@BE1P281MB1524.DEUP281.PROD.OUTLOOK.COM> <963D2F69-64C5-417F-ACA9-BE74E59046BC@cablelabs.com>
In-Reply-To: <963D2F69-64C5-417F-ACA9-BE74E59046BC@cablelabs.com>
Accept-Language: en-US
Content-Language: en-US
X-MS-Has-Attach:
X-MS-TNEF-Correlator:
msip_labels: MSIP_Label_dad3be33-4108-4738-9e07-d8656a181486_Enabled=true; MSIP_Label_dad3be33-4108-4738-9e07-d8656a181486_SetDate=2022-05-04T19:29:21Z; MSIP_Label_dad3be33-4108-4738-9e07-d8656a181486_Method=Privileged; MSIP_Label_dad3be33-4108-4738-9e07-d8656a181486_Name=Public No Visual Label; MSIP_Label_dad3be33-4108-4738-9e07-d8656a181486_SiteId=945c199a-83a2-4e80-9f8c-5a91be5752dd; MSIP_Label_dad3be33-4108-4738-9e07-d8656a181486_ActionId=307399e9-924b-42c2-88d8-573bdc9e1aa7; MSIP_Label_dad3be33-4108-4738-9e07-d8656a181486_ContentBits=0
x-ms-publictraffictype: Email
x-ms-office365-filtering-correlation-id: 8a63ba51-7189-4ef3-57ba-08da2e09cb06
x-ms-traffictypediagnostic: BY5PR19MB3907:EE_
x-microsoft-antispam-prvs: <BY5PR19MB39071F1E59F42BD76C1AB89583C39@BY5PR19MB3907.namprd19.prod.outlook.com>
x-exotenant: 2khUwGVqB6N9v58KS13ncyUmMJd8q4
x-ms-exchange-senderadcheck: 1
x-ms-exchange-antispam-relay: 0
x-microsoft-antispam: BCL:0;
x-microsoft-antispam-message-info: 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
x-forefront-antispam-report: CIP:255.255.255.255; CTRY:; LANG:en; SCL:1; SRV:; IPV:NLI; SFV:NSPM; H:MN2PR19MB4045.namprd19.prod.outlook.com; PTR:; CAT:NONE; SFS:(13230001)(4636009)(366004)(71200400001)(66574015)(186003)(9686003)(55016003)(54906003)(26005)(86362001)(4326008)(6916009)(83380400001)(8676002)(66946007)(66446008)(66556008)(107886003)(66476007)(64756008)(76116006)(786003)(316002)(5660300002)(33656002)(38070700005)(38100700002)(53546011)(966005)(122000001)(52536014)(6506007)(8936002)(508600001)(30864003)(2906002)(7696005)(82960400001); DIR:OUT; SFP:1101;
x-ms-exchange-antispam-messagedata-chunkcount: 1
x-ms-exchange-antispam-messagedata-0: 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
Content-Type: text/plain; charset="utf-8"
Content-Transfer-Encoding: base64
MIME-Version: 1.0
X-OriginatorOrg: Dell.com
X-MS-Exchange-CrossTenant-AuthAs: Internal
X-MS-Exchange-CrossTenant-AuthSource: MN2PR19MB4045.namprd19.prod.outlook.com
X-MS-Exchange-CrossTenant-Network-Message-Id: 8a63ba51-7189-4ef3-57ba-08da2e09cb06
X-MS-Exchange-CrossTenant-originalarrivaltime: 04 May 2022 20:08:02.1651 (UTC)
X-MS-Exchange-CrossTenant-fromentityheader: Hosted
X-MS-Exchange-CrossTenant-id: 945c199a-83a2-4e80-9f8c-5a91be5752dd
X-MS-Exchange-CrossTenant-mailboxtype: HOSTED
X-MS-Exchange-CrossTenant-userprincipalname: QuvT/Vh9BUFp4sSWN53KZHbTRxoz4+fvUZZYvckNZwK1ZQbLSQYkJrV/SQmH9eTScopbmuHH2soSuQYOmWsEjg==
X-MS-Exchange-Transport-CrossTenantHeadersStamped: BY5PR19MB3907
X-Proofpoint-Virus-Version: vendor=baseguard engine=ICAP:2.0.205,Aquarius:18.0.858,Hydra:6.0.486,FMLib:17.11.64.514 definitions=2022-05-04_05,2022-05-04_02,2022-02-23_01
X-Proofpoint-Spam-Details: rule=outbound_notspam policy=outbound score=0 mlxscore=0 malwarescore=0 bulkscore=0 phishscore=0 spamscore=0 clxscore=1011 impostorscore=0 priorityscore=1501 lowpriorityscore=0 adultscore=0 suspectscore=0 mlxlogscore=999 classifier=spam adjust=0 reason=mlx scancount=1 engine=8.12.0-2202240000 definitions=main-2205040118
X-Proofpoint-GUID: rEGQDA4HKNFrANa3GTXDTSSd1GEJpEdV
X-Proofpoint-ORIG-GUID: rEGQDA4HKNFrANa3GTXDTSSd1GEJpEdV
X-Proofpoint-Spam-Details: rule=notspam policy=default score=0 adultscore=0 mlxlogscore=999 malwarescore=0 spamscore=0 mlxscore=0 suspectscore=0 phishscore=0 bulkscore=0 classifier=spam adjust=0 reason=mlx scancount=1 engine=8.12.0-2202240000 definitions=main-2205040118
Archived-At: <https://mailarchive.ietf.org/arch/msg/tsvwg/XpinTj8sioW9008H6QqvBz5HIPE>
Subject: Re: [tsvwg] Some comments on NQB (part 2)
X-BeenThere: tsvwg@ietf.org
X-Mailman-Version: 2.1.34
Precedence: list
List-Id: Transport Area Working Group <tsvwg.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/tsvwg>, <mailto:tsvwg-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/tsvwg/>
List-Post: <mailto:tsvwg@ietf.org>
List-Help: <mailto:tsvwg-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/tsvwg>, <mailto:tsvwg-request@ietf.org?subject=subscribe>
X-List-Received-Date: Wed, 04 May 2022 20:08:11 -0000

<WG_Chair_Hat=OFF>
With apologies for resurrecting some topics that have been more or less settled in the past, I am still bothered by the recommendation of two default DSCPs for NQB.

The question that I can't satisfactorily answer is: If NQB traffic is supposed to be carried as a peer to Default traffic, why are we instructing end systems to use DSCP 45 for originated NQB traffic on all networks?

The answers to that question seem to boil down to (with apologies for the crass bluntness) necessity of allowing the Legacy WiFi "tail" to wag the Internet QoS "dog".

Would someone (Greg?) provide a reminder of what is it about legacy WiFi that requires this approach, please ...
</WG_Chair_Hat>

Thanks, --David

-----Original Message-----
From: tsvwg <tsvwg-bounces@ietf.org> On Behalf Of Greg White
Sent: Friday, April 29, 2022 3:34 PM
To: Ruediger.Geib@telekom.de
Cc: tsvwg@ietf.org
Subject: Re: [tsvwg] Some comments on NQB (part 2)


[EXTERNAL EMAIL] 

Thanks Ruediger.

Glad to hear that we are converging, though it wasn't clear to me which version of the new text you preferred.  For now, I'll stick with the version that I'd sent on April 4, but let me know if I've misunderstood you.
Hopefully others find this text change acceptable.  

N.B. I don't have any issue with your bigger picture idea, but it is beyond the scope of the NQB draft.   So, if you want to pursue documenting it in an RFC, it probably should be proposed separately.  

So, for the NQB draft, are folks ok with replacing:

To support NQB, networks MUST preserve a DSCP marking distinction between NQB traffic and Default traffic when forwarding via an interconnect from or to another network. 
To facilitate the default treatment of NQB traffic in backbones and core networks discussed in the previous section (where IP Precedence may be deployed), networks that support NQB SHOULD NOT use the value 45 for NQB at network interconnects unless that usage is explicitly documented in the TCA (Traffic Conditioning Agreement, see [RFC2475]) for that interconnection. 
Rather, networks SHOULD remap NQB traffic to DSCP 5 prior to interconnection, unless agreed otherwise between the interconnecting partners. 
To be clear, interconnecting networks are not precluded from negotiating (via an SLA, TCA, or some other agreement) a different DSCP to use to signal NQB across an interconnect. 
Additionally, the fact that this PHB is intended for end-to-end usage does not preclude networks from mapping the NQB DSCP to a value other than 45 or 5 for internal usage, as long as the appropriate NQB DSCP is restored when forwarding to another network.
 

With [notes in square brackets added to help those trying to compare against the above]:

To support NQB, networks MUST preserve a DSCP marking distinction between NQB traffic and Default traffic when forwarding via an interconnect from or to another network.    [no change]
Networks that support NQB SHOULD support the ability to re-mark NQB traffic prior to such an interconnection.    [new recommendation]
It is RECOMMENDED that interconnecting networks negotiate the use of the DSCP value 45 to indicate NQB traffic across their interconnections (thus avoiding the need to re-mark traffic), however, local DSCP usage by either network could require the use of a different value.   [new recommendation]
To be clear, interconnecting networks are not precluded from negotiating (via an SLA, TCA, or some other agreement) a different DSCP than 45 to use to mark NQB traffic across an interconnect.  [only editorial change]
In situations where negotiation of a DSCP between interconnection partners is infeasible, networks that support NQB SHOULD NOT use the value 45 for NQB at network interconnects, but rather SHOULD re-mark NQB traffic to DSCP 5 prior to interconnection.  [limited the applicability of this recommendation]
This is intended to facilitate the default treatment of NQB traffic in backbones and core networks discussed in the previous section (where it is possible that IP Precedence may still be deployed).  [only editorial change]
Additionally, the fact that this PHB is intended for end-to-end usage does not preclude networks from mapping the NQB DSCP to a value other than 45 or 5 for internal usage, as long as the appropriate NQB DSCP is restored when forwarding to another network.  [no change]


In addition to Ruediger, I'd like to specifically hear from David Black and Gorry, since two of the original sentences came from David, and Gorry was the OP raising a concern about those sentences.


-Greg



On 4/29/22, 3:27 AM, "Ruediger.Geib@telekom.de" <Ruediger.Geib@telekom.de> wrote:

    Hi Greg,

    Thanks. My bigger picture: RFC 8100 is intended to support interconnection policies like:

    If DSCP in range <0-7>      # with a negotiated SLA, different ranges may apply for different backbone PHBs and Codepoint rewrites...
        then PHB=default

    To me, no SLA negotiation is necessary if forwarding expected by a backbone is "default". In addition, I prefer the interconnection QoS policy to be as simple as possible, if no QoS SLA is negotiated:

    (PHB=default)
    If DSCP in range <8-63> 
        set DSCP=000 000

    I appreciate your suggested text which allows that; no DSCP 45 traffic should be received at interconnections without negotiated QoS SLA, if the above is deployed. If DiffServ Standards were changed to support the above, 8 DSCP are available for PHBs whose differentiating support is most useful and can be decided upon at the access. I think that would be beneficial for
    - Lower Effort PHB
    - L4S / NQB (I think, any DSCP can be rewritten at access and may be at a home gateway, and if a standard proposes a value like 45, the better).

    What I suggest to avoid at interconnection (and will not deploy, where I'm in charge) is (e.g.):

    If <InterconnectionPartnerX> then
        If DSCP <a> 
            then PHB=default
        If DSCP <b> 
            then PHB=default AND set DSCP=000 001
        If DSCP <c> 
            then PHB=EF
        If DSCP <d> 
            then PHB=AF4 AND set DSCP=001 010
        If DSCP <e> 
            then PHB=AF4 AND set DSCP=001 100
        If DSCP <f> 
            then PHB=default AND set DSCP=000 101
          ....
        If <no match>
            then PHB=default AND set DSCP=000 000

    Rather than individual per interconnection partner combined with per DSCP policies at interconnection, I'm looking for simplistic, easily comprehensible and to the extent possible generic Behaviour Aggregate classification. That holds for (range based DSCP) remarking at interconnection too.

    Regards,

    Ruediger





    -----Ursprüngliche Nachricht-----
    Von: Greg White <g.white@CableLabs.com> 
    Gesendet: Freitag, 29. April 2022 01:12
    An: Geib, Rüdiger <Ruediger.Geib@telekom.de>
    Cc: tsvwg@ietf.org
    Betreff: Re: [tsvwg] Some comments on NQB (part 2)

    Hi Ruediger,  

    Thanks for responding.   See my responses [GW] below.

    -Greg


    On 4/26/22, 8:14 AM, "Ruediger.Geib@telekom.de" <Ruediger.Geib@telekom.de> wrote:

        Greg,

        Sorry for the late response.

        <snip>

        You wrote:
        What I offered for consideration below was that the [DSCP] value 45 be recommended across interconnections in cases where the two interconnecting partners are NQB-aware and they negotiate DSCP markings.

        RG: To me, that's an additional concept. My take was, NQB doesn't require more than default transport in the backbone and at interconnection. If the later holds, negotiation of NQB is no issue to me, but an appropriately picked DSCP is important (it should unambiguously indicate "default forwarding" at interconnection).
        If a QoS SLA is negotiated, in principle any negotiated DSCP does (it is well known that I prefer RFC 8100 at wholesale and interconnection interfaces, as this simplifies deployment and operation).

    [GW] It seems to me that there isn't such a thing as a DSCP (other than possibly 0) that unambiguously indicates default forwarding at interconnection.  I quickly re-read RFC8100 and also don't see mention of it there (it refers to DSCP=0 as being default and seems to recommend that any traffic classified into the Default / Elastic Treatment Aggregate be re-marked to 0). As I understand it, the practice of aggregating traffic based on the IPP bits (top 3 bits) is not universal. If I'm right in that, then it seems that recommending NQB-aware networks re-mark NQB traffic to 5 and not use 45 at *all* interconnections might be unnecessary (and it was apparently concerning to some).  
    In my post on April 4: https://urldefense.com/v3/__https://mailarchive.ietf.org/arch/msg/tsvwg/PKTrfNdTCEXmwoovSkqec6cOJZc/__;!!LpKI!mzr4n4KDAty5Aq0a1tG2B89wGfRac3ylHv0FS_U75V-j47XXXS_4VgGjl_ncHFL_4IO4sSMU0X0akSepO1Y$ [mailarchive[.]ietf[.]org] in response to Gorry's concerns, I had suggested softening this to (paraphrasing here):
    - If negotiating a DSCP to use at interconnection, recommend 45, but the parties can negotiate whichever value they want.
    - If negotiation isn't possible, the sending network SHOULD NOT use 45, and instead SHOULD use 5. 
    What about this do you not like?  It seems to me that you're saying that you wouldn't negotiate a DSCP for NQB.  So, based on the proposed text, your interconnection partners SHOULD use 5. 
    Would it make you happier if the first statement were replaced with:
    - If negotiating a DSCP to use at interconnection, recommend the use of either 5 or 45, but the parties can negotiate whichever value they want.



        You wrote:
        The data from Ana Custura and Gorry indicates that, unless something changes in regards to bleaching of the upper 3 bits by some networks, any future assignments of the values 13, 21, 29, 37, 53, 61 would do well to keep in mind that any traffic so marked could end up being aggregated with NQB traffic.  That said, this sort of bleaching is non-compliant with the definition of the DSCP field, and is already problematic for EF, VA, and all of the CS codepoints (which aggregate in incompatible ways), so (as was commented in the last meeting) we may want to consider identifying the routers that continue to do this, and try to work with the associated network operators to change the behavior. 

        RG: I'd appreciate a concise reference for your claim "this sort of bleaching is non-compliant with the definition of the DSCP field".

    [GW] I probably didn't choose my words as carefully as I could have, and I made that statement (without doing the appropriate research) based on comments others had made.  RFC2474 Section 3 seems to imply to me that selectively bleaching certain bits of the field is not what was intended, but it does allow that "Nodes MAY rewrite the DS field as needed to provide a desired local or end-to-end service."  So, I don’t see any requirement statement that is violated. 


        RG: If you are interested, I can sketch examples where single sided changes were made to well  negotiated EF deployments and the interesting consequences caused by that. That's not what mean by "problematic for EF", it rather shows what happens if a QoS design isn't well agreed with all parties responsible for QoS aware network sections and policy points in an operational end-to-end production chain.

        Regards,

        Ruediger