Re: [tsvwg] Network feedback and security (was: New Version Notification for draft-huang-tsvwg-transport-challenges-00.txt)

Sebastian Moeller <moeller0@gmx.de> Thu, 19 October 2023 14:57 UTC

Return-Path: <moeller0@gmx.de>
X-Original-To: tsvwg@ietfa.amsl.com
Delivered-To: tsvwg@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 46108C180DC8 for <tsvwg@ietfa.amsl.com>; Thu, 19 Oct 2023 07:57:33 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -6.856
X-Spam-Level:
X-Spam-Status: No, score=-6.856 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, DKIM_SIGNED=0.1, DKIM_VALID=-0.1, DKIM_VALID_AU=-0.1, DKIM_VALID_EF=-0.1, FREEMAIL_ENVFROM_END_DIGIT=0.25, FREEMAIL_FROM=0.001, RCVD_IN_DNSWL_HI=-5, RCVD_IN_MSPIKE_H2=-0.001, RCVD_IN_ZEN_BLOCKED_OPENDNS=0.001, SPF_HELO_NONE=0.001, SPF_PASS=-0.001, T_SCC_BODY_TEXT_LINE=-0.01, URIBL_BLOCKED=0.001, URIBL_DBL_BLOCKED_OPENDNS=0.001, URIBL_ZEN_BLOCKED_OPENDNS=0.001] autolearn=ham autolearn_force=no
Authentication-Results: ietfa.amsl.com (amavisd-new); dkim=pass (2048-bit key) header.d=gmx.de
Received: from mail.ietf.org ([50.223.129.194]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id M-LexEOpD0t7 for <tsvwg@ietfa.amsl.com>; Thu, 19 Oct 2023 07:57:28 -0700 (PDT)
Received: from mout.gmx.net (mout.gmx.net [212.227.15.18]) (using TLSv1.3 with cipher TLS_AES_256_GCM_SHA384 (256/256 bits) key-exchange ECDHE (P-256) server-signature RSA-PSS (2048 bits) server-digest SHA256) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id 7943AC180DC4 for <tsvwg@ietf.org>; Thu, 19 Oct 2023 07:56:51 -0700 (PDT)
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/simple; d=gmx.de; s=s31663417; t=1697727405; x=1698332205; i=moeller0@gmx.de; bh=gfEQE50Th5QKxi04uWP456Hp5G3Q8irchKP2OIyfhgA=; h=X-UI-Sender-Class:Subject:From:In-Reply-To:Date:Cc:References: To; b=PVpwWbp2Tk6GVeQI8gEEAGXgkHViA4VQBaxGAjnVVVEzbqi2Z25dH4zpB/WznzVR n0LfSVwogsjLXOYFq6haEdSJ073AkDRjvJLjtZGqTdT1wlAAkD+j8c84Wm6ai8DKu pIYLgTdg9HMvew4iWCBOu6T+I+y09RfsfGBRAPpVYR6jyyqeEN3/VyShTBpIifHOl ZHPCTUqfh7y2ugSCVxMea4VXxzV2zPo1VyFnz0V5wPXYSQgAnzWSJb+Etf/v7TN9L NYRwg54+DN2Nb0PEcnXolehRt0una8qplg13QCejLWnGcycSe1Ej1DY7iT07ilBsC PavW1U4R+o0n2J8jbA==
X-UI-Sender-Class: 724b4f7f-cbec-4199-ad4e-598c01a50d3a
Received: from smtpclient.apple ([134.76.241.253]) by mail.gmx.net (mrgmx004 [212.227.17.190]) with ESMTPSA (Nemesis) id 1MQMyZ-1r6MVZ4APx-00MORD; Thu, 19 Oct 2023 16:56:45 +0200
Content-Type: text/plain; charset="utf-8"
Mime-Version: 1.0 (Mac OS X Mail 16.0 \(3696.120.41.1.4\))
From: Sebastian Moeller <moeller0@gmx.de>
In-Reply-To: <CALx6S34-Pawq+4Eng=5hmk9gPTz=DVxowb52gZi+_8tY1Gw+Lg@mail.gmail.com>
Date: Thu, 19 Oct 2023 16:56:43 +0200
Cc: Christian Huitema <huitema@huitema.net>, "tsvwg@ietf.org" <tsvwg@ietf.org>, Ingemar Johansson S <ingemar.s.johansson@ericsson.com>, Ruediger.Geib@telekom.de
Content-Transfer-Encoding: quoted-printable
Message-Id: <978FCA81-FCE9-48CA-B4C5-86631DC03106@gmx.de>
References: <8c04c73ed6424da7a8c0a560ba673f63@huawei.com> <AM8PR07MB8137064565A08222EF49D6FFC2D6A@AM8PR07MB8137.eurprd07.prod.outlook.com> <FR2P281MB152725788020368B2BB483A39CD6A@FR2P281MB1527.DEUP281.PROD.OUTLOOK.COM> <2A095262-F757-4995-9A30-38E915E92021@gmx.de> <FR2P281MB15270FF6D523A75427CDE6419CD6A@FR2P281MB1527.DEUP281.PROD.OUTLOOK.COM> <7B7D6B62-F78E-4400-81EB-31DFB8445E17@gmx.de> <2c4d3b5f-8b4d-e427-8095-6de26f91f543@huitema.net> <AM8PR07MB81375DF357842B489143C12DC2D4A@AM8PR07MB8137.eurprd07.prod.outlook.com> <3D78AEBB-9475-4C5C-9E33-B639C50BEAE5@gmx.de> <CALx6S34-Pawq+4Eng=5hmk9gPTz=DVxowb52gZi+_8tY1Gw+Lg@mail.gmail.com>
To: Tom Herbert <tom@herbertland.com>
X-Mailer: Apple Mail (2.3696.120.41.1.4)
X-Provags-ID: V03:K1:/ufhgMrxojksyHAD3KZSw6VsZAJgZ4IjWQlzgiZD/Tp6klx9mJT sJALBH+didRDkRIWPJEEyAYNO+uBRVMFxij/ii/LWYk402/aI1FBJ74TlBb+lZfP9U7opNX 6puncEStBGy2wjT4TiewB7UizPpDuCZgHWwJhtRzyMOmTib2fQgyyXyBsDINbPYMGW8fLxV uBCP+CGd1vBeGAhzT10Cg==
UI-OutboundReport: notjunk:1;M01:P0:JTmA9a5RoLQ=;pB686IUiidykQknL2nXyhciK/9F fdGwKNe7aXzU0yQLDgV+78612udh1IF4NUOIyQg9xisL1SK0uj2JnAYoYd+c5CNnjlKs7ZLgG nHvNYNPcMCxqgXcsSAXUwsi21aTF8AEO6SVYFsiBgFJPAalbZZab7yXwjI/PE3tLu0aFMmoI/ QXI7rOQKr3q270GsU6AAYp6DzvQApqH4L7upTa8boMLzna5cHLmDpEJLdvqLA/CmwwuyAdjTw CKz7pf0Hg3GClnI+TrvoaCgUJK1x2QTFenIO2RunYnwx+JjQG91IQz8cS89F7kGI7zSZWamyW 8wwUb4Ac27VzQXi5ziGIzgaAbXecsyqKzQPvsEdRBS7zGpEknxYezxGEftYWomLqIscbk8Vo7 XVHKMC/Vuv052kW5Orda+KyqUT5y5D+5RQudAABxYNXQvlpZwQ/S4M296q+YgeGsS9pTyj/KK wbRYf357/zCP85uHG5ktLx9z7iHJ/RaHXfpvQcsGPge87Scyi8HwsCqnDaiPpNG+kek0CvUQi nk6WAaxeWqlHlhr85SFoXt2FTCx03Kz+DcZH0mR7JLIxsxy+lkoNVwb/rzJNGfZU6zf831BDl bttRdPnLFwS6qCPBHTPKTln2/4iQ3hr+v6egLXVzBCmM0vFl5OmpKGK1bCPlKql72SkiN7GS2 oIKjMfpvYOt9Ua7+F3mj/CdRaS62HoszGDFvTtShVxkSbXz6w+EncDqAQkjNrFH/p6PbE4NhQ et80E2hyvD0Le8iogfJlipO2U5Bl34P6PsYTXQANXmP76ktqm61CbYM+++8Al/TwOSwQKmxVL A0etWEnNWICZMTTFLlCyct/qQeXbudVW7g3yAFt9bN7AjXreaBwXbe2B6QlaVbgk2Kejd+yCd Rt9kLW6XIhQyZ/7/SUQpjHzpwXoQf7G9PbiPwkb5ZP/+XnQnmxgkbrmCIZXWlklNAQzjHpPoz dxi4jG/81AV3hSdNq1wHli18J1E=
Archived-At: <https://mailarchive.ietf.org/arch/msg/tsvwg/gqoEDkL0WtZW8APNLbnEWUrhErE>
Subject: Re: [tsvwg] Network feedback and security (was: New Version Notification for draft-huang-tsvwg-transport-challenges-00.txt)
X-BeenThere: tsvwg@ietf.org
X-Mailman-Version: 2.1.39
Precedence: list
List-Id: Transport Area Working Group <tsvwg.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/tsvwg>, <mailto:tsvwg-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/tsvwg/>
List-Post: <mailto:tsvwg@ietf.org>
List-Help: <mailto:tsvwg-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/tsvwg>, <mailto:tsvwg-request@ietf.org?subject=subscribe>
X-List-Received-Date: Thu, 19 Oct 2023 14:57:33 -0000

Hi Tom,


> On Oct 19, 2023, at 16:41, Tom Herbert <tom@herbertland.com> wrote:
> 
> On Thu, Oct 19, 2023 at 12:28 AM Sebastian Moeller <moeller0@gmx.de> wrote:
>> 
>> Hi Ingemar,
>> 
>> On 19 October 2023 07:19:40 CEST, Ingemar Johansson S <ingemar.s.johansson@ericsson.com> wrote:
>>> Hi
>>> 
>>> I have followed this discussi a bit. I focus only on the congestion indication and the discussion around the multi-bit congestion signaling.
>>> 
>>> L4S is just recently standardized and we have just starated to get the community onboard to implement and evaluate it on a larger scale.
>>> We should give it some time and get more data before we jump on the next big thing.
>>> 
>>> It is of course possible for IETF to start working on the next big thing with multi-bit congestion indication. But as I see it, we currently have more than enough tasks on the table with L4S.
>> 
>> [SM] Respectfully, that task is clearly on the proponents of L4S and IMHO should have been done before granting RFC status. L4S already hindered one higher resolution ECN approach (SCE) without actual evidence of superiority, let's leave it at that one victim please.
>> In my opinion L4S is too little too late, as we already know multi-bit per packet information is superior, so we arguably should focus on that.
> 
> Sebastian,
> 
> There's a fundamental problem with mulit-bit per packet information:
> there's no place in packets to put the data that will work across the
> Internet! (other than the eight bit TOS/Priority field).

	[SM2] Yes, I agree. The most fitting place would be in the IP header, but there we are out of (re-)usable bits...


> The correct
> mechanism for network to hosts signaling is Hop-by-Hop options but
> those currently see a 99% drop rate.

	[SM] Again I agree, for IPv6 any of the extension headers would seems the next best place. It should be one that exists along the full path, and is visible by the end points, if Hop-byHop fits that bill, great. Or not so great, 1% passage is sobering even for a glass half full kind of person.


> There are proposed alternatives
> like putting information in transport payload, TCP and now UDP
> options, overloading flow label or IPv6 addresses; but all of these
> have drawbacks that will preclude widescale deployment (these are
> discussed in section 5 of draft-herbert-host2netsig).

	[SM] Yes deployment of any of these including IP6 extension headers is going to be an uphill battle, as the network will only gain little by this, so deployment likely will start in environments where "little" already is worth it, and that I agree is likely not the wider internet. But darn it, it would be great if having to access a service over a congested link that would result in lowish throughput but with acceptable latency, as compared t today's low throughput and high latency and jitter. That might be a way of pitching this, if this allows more graceful operation at/close to saturation this might be interesting for infrastructure folks ()

> Since network to
> host signaling modifies data in flight limits the solution space even
> more, for instance it might be okay for a switch to read a transport
> payload like QUIC spin bit, but writing data in the transport payload
> risks systematic data corruption.

	[SM] Well, all handling of packets involved reading and writing memory already, and also changes in header fields is performed routinely, TTL/Hop limit come to mind, as does NATP... so there is ample precedence even if we exclude ECN, no?


> I agree that multi-bit data should facilitate more precise congestion
> control with faster reaction time, but I also think we need that more
> in the data center than over the Internet and the problem of defining
> a multi-bit packet field for the data is solvable in a limited domain.

	[SM] I respectfully disagree, I do not run a data center, but I do run a home network and use the internet, I think this is a case where all domains would profit. Realistically though I expect this to come to fruition in limited domains/data centers first. Would be sad if it would stay there however.


> 
> Tom
> 
>> 
>> Regards
>>         Sebastian
>> 
>> 
>>> 
>>> /Ingemar
>>> 
>>> 
>>>> -----Original Message-----
>>>> From: tsvwg <tsvwg-bounces@ietf.org> On Behalf Of Christian Huitema
>>>> Sent: Tuesday, 17 October 2023 17:28
>>>> To: Sebastian Moeller <moeller0@gmx.de>; Ruediger.Geib@telekom.de
>>>> Cc: tsvwg@ietf.org
>>>> Subject: [tsvwg] Network feedback and security (was: New Version
>>>> Notification for draft-huang-tsvwg-transport-challenges-00.txt)
>>>> 
>>>> 
>>>> On 10/17/2023 3:17 AM, Sebastian Moeller wrote:
>>>>> Personally, ever since I read Arslan, Serhat, and Nick McKeown.
>>>> ‘Switches Know the Exact Amount of Congestion’. In Proceedings of the
>>>> 2019 Workshop on Buffer Sizing, 1–6, 2019. I came to the prediction that
>>>> something like max(bufferoccupancy) over a network path in either
>>>> predicted sojourntime or percentual buffer filling could really improve
>>>> congestion control if included in all packets. That paper and follow ups
>>>> on that idea are to my quite convincing. I see no real security concern
>>>> as the network node adding this information might as well have dropped
>>>> the packet if it wanted to harm that flow, so little increase in attack
>>>> surface in that direction. What I hope something like this might allow
>>>> is a gentler exist from slow start (assuming one can measure and compare
>>>> the dynamics of the congestion indicator with those of the slow-starting
>>>> flow to predict when to exist slow start without first having to dump ~2
>>>> too much data into the network in one RTT). The network could indirectly
>>>> profit if end-points use this information to better reign in congestion
>>>> pro-actively, but that clearly is not guaranteed, especially over the
>>>> open internet.
>>>> 
>>>> Yes, network feedback is useful. You mention "max(bufferoccupancy) over
>>>> a network path" as a signal, but I would argue that ECN is pretty much a
>>>> 1 bit version of exactly that. So your argument is really for "more ECN
>>>> bits". That's plausible, but the whole "L4S/Prague" effort seems to
>>>> indicate that 1 bit is enough, because you can observe that bit on many
>>>> consecutive packets. The conservative side of me would say we should
>>>> first deploy the 1 bit version, and then study whether we really need
>>>> many more bits.
>>>> 
>>>> The "gentler exit from slow start" issue is largely addressed by
>>>> Hystart, which uses the variations of the RTT as a signal. And yes,
>>>> Hystart can be improved by also monitoring the ECN bits, not just the
>>>> RTT.
>>>> 
>>>> But there are in fact security concerns. We already know about ICMP
>>>> attacks in which attackers spoof the network feedback and inject fake
>>>> ICMP packets, for example to disrupt PMTU discovery. "Man on the side"
>>>> attackers can easily send a second copy of a packet with modified header
>>>> bits and race it to the destination. If transports accept that copy as
>>>> genuine, they will heed the faked congestion signals and the attacker
>>>> will succeed in disrupting the connection.
>>>> 
>>>> -- Christian Huitema
>> 
>> --
>> Sent from my Android device with K-9 Mail. Please excuse my brevity.
>>