[tsvwg] Re: [EXTERNAL] Re: [gwhiteCL/NQBdraft] Should traffic protection be mandatory to implement? (Issue #48)

"Black, David" <David.Black@dell.com> Wed, 24 July 2024 15:45 UTC

Return-Path: <prvs=193501744b=david.black@dell.com>
X-Original-To: tsvwg@ietfa.amsl.com
Delivered-To: tsvwg@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id E5ACDC169406; Wed, 24 Jul 2024 08:45:26 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -2.255
X-Spam-Level:
X-Spam-Status: No, score=-2.255 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, DKIMWL_WL_HIGH=-0.148, DKIM_SIGNED=0.1, DKIM_VALID=-0.1, DKIM_VALID_AU=-0.1, DKIM_VALID_EF=-0.1, HTML_MESSAGE=0.001, RCVD_IN_MSPIKE_H2=-0.001, RCVD_IN_ZEN_BLOCKED_OPENDNS=0.001, SPF_HELO_NONE=0.001, SPF_NONE=0.001, T_SCC_BODY_TEXT_LINE=-0.01] autolearn=ham autolearn_force=no
Authentication-Results: ietfa.amsl.com (amavisd-new); dkim=pass (2048-bit key) header.d=dell.com
Received: from mail.ietf.org ([50.223.129.194]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id 5s6whSGZ3veU; Wed, 24 Jul 2024 08:45:26 -0700 (PDT)
Received: from mx0b-00154904.pphosted.com (mx0b-00154904.pphosted.com [148.163.137.20]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id 13F44C1516EB; Wed, 24 Jul 2024 08:45:25 -0700 (PDT)
Received: from pps.filterd (m0170396.ppops.net [127.0.0.1]) by mx0b-00154904.pphosted.com (8.18.1.2/8.18.1.2) with ESMTP id 46OEQHAc006984; Wed, 24 Jul 2024 11:45:22 -0400
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=dell.com; h=from :to:cc:subject:date:message-id:references:in-reply-to :content-type:mime-version; s=smtpout1; bh=A9M6RIraxcEnjuF7DKMSf Cg9ThXaUlGz9/BsKMCD0eg=; b=YQvCVvCRxvnczGRdZP4dukbRmWDSlsPOo320Q J3BJZo1S6L8wvX7dEYowPUV40iPRHPZueCfzlvk1WNeXfQJkFUPY/MZ4F7qN3Mt8 fYBtYg4V2+V5sJyjeBKawDcWeNM7v5tKBq3WLWMm+zXb/kauItRCGv7AyBzr3WEV 6wFDuJlVscwA+J6+PPcbxjIXGStahVaEy+m+PO2gTqvJhG+YoXE3VOnP8sgbO4lV s5tOQWxLkapU2ub0oxz+3B1B+djzs/RwJJ7dUjBjvytbjUcjsac0HqqDGxJddBz5 jjGEQsLhdWxvnIWrBVb62StMP9NfJODVAFvenrCPcNGrbPwfg==
Received: from mx0b-00154901.pphosted.com (mx0b-00154901.pphosted.com [67.231.157.37]) by mx0b-00154904.pphosted.com (PPS) with ESMTPS id 40juc0r13r-1 (version=TLSv1.2 cipher=ECDHE-RSA-AES256-GCM-SHA384 bits=256 verify=NOT); Wed, 24 Jul 2024 11:45:22 -0400 (EDT)
Received: from pps.filterd (m0144102.ppops.net [127.0.0.1]) by mx0b-00154901.pphosted.com (8.17.1.19/8.17.1.19) with ESMTP id 46OFgmM4008898; Wed, 24 Jul 2024 11:45:21 -0400
Received: from nam11-co1-obe.outbound.protection.outlook.com (mail-co1nam11lp2168.outbound.protection.outlook.com [104.47.56.168]) by mx0b-00154901.pphosted.com (PPS) with ESMTPS id 40jsx01w1q-1 (version=TLSv1.2 cipher=ECDHE-RSA-AES256-GCM-SHA384 bits=256 verify=OK); Wed, 24 Jul 2024 11:45:21 -0400
ARC-Seal: i=1; a=rsa-sha256; s=arcselector10001; d=microsoft.com; cv=none; b=EKloPphYozkuedY9j9FufxgcQGivdl7uWowVurkvmjdY0/GACu6JAMjeFAYEbEPFf+eCuMmoa6ENuyXx1afk7BCMpgAVHSbMLrhiobY3C57DcW5OMZGgC7KObTOaEFE6Rr0VqAzG6778Pc5zTr38hwHcBrX2oOXaGoaMNUYrtFT1nv/+Yqc4AUoIM9DI/KutAuGESwcBHkTmiSbTgv37WpfA71JcfhtjJ3+EqOZCVsx0SXJrYzu1Rf/fwFXR4f9hRKiUOjB3QbuBb71g0s7xhTPX+mEO1RPsQv3+uAzuTrUpuA9q13q6L/Eh8POplO5KuTUq1ycTRWjjls5SWm4inw==
ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=microsoft.com; s=arcselector10001; h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-AntiSpam-MessageData-ChunkCount:X-MS-Exchange-AntiSpam-MessageData-0:X-MS-Exchange-AntiSpam-MessageData-1; bh=A9M6RIraxcEnjuF7DKMSfCg9ThXaUlGz9/BsKMCD0eg=; b=QavvukvU0AOiZ8LCWc7xSdb1PM7YNGyNVOlUBYMJx37Tl8f03bmVCE7mmXFjiKviJ644+MOF3WfZ5qDoAeL2RL0eF8zhPcT4SQzFaUXuvYyxpM907aeRU0gaJ72yBZc5jFTQgCkvu30ISFq25DbBoD5mVHJ7dINKx9tNHY0Fp4PJ2lCSzUziBAdAlZcD/Ky/GKQN3wgrFY+F9BJu2IXQoIQI73gDXPWuo1Y4O1VPSCyGYb1r5MBETEewgyFwCD4W0FIdY93K1D7q0Q90JLYPCE8Zjj2K/yJJjsCiEScdoa9UpkdgIfze++VNwIj8Q18H2WI5tKK3Ef9c4a4U5fyS9g==
ARC-Authentication-Results: i=1; mx.microsoft.com 1; spf=pass smtp.mailfrom=dell.com; dmarc=pass action=none header.from=dell.com; dkim=pass header.d=dell.com; arc=none
Received: from MN2PR19MB4045.namprd19.prod.outlook.com (2603:10b6:208:1e4::9) by PH8PR19MB6974.namprd19.prod.outlook.com (2603:10b6:510:22a::16) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id 15.20.7762.29; Wed, 24 Jul 2024 15:45:15 +0000
Received: from MN2PR19MB4045.namprd19.prod.outlook.com ([fe80::656e:ea92:20c8:471e]) by MN2PR19MB4045.namprd19.prod.outlook.com ([fe80::656e:ea92:20c8:471e%3]) with mapi id 15.20.7784.017; Wed, 24 Jul 2024 15:45:15 +0000
From: "Black, David" <David.Black@dell.com>
To: "Livingood, Jason" <jason_livingood@comcast.com>, "Black, David" <David.Black=40dell.com@dmarc.ietf.org>, "Overcash, Michael (CCI-Atlanta)" <michael.overcash@cox.com>, gwhiteCL/NQBdraft <reply+AB2VULW2XRH6MPK23ABRZQOEVLRFREVBNHHI5USV5Y@reply.github.com>, gwhiteCL/NQBdraft <NQBdraft@noreply.github.com>
Thread-Topic: [tsvwg] Re: [EXTERNAL] Re: [gwhiteCL/NQBdraft] Should traffic protection be mandatory to implement? (Issue #48)
Thread-Index: AQHa3d2XqeYzEwFBzECN6MSZGXvJALIGA8Jw
Date: Wed, 24 Jul 2024 15:45:15 +0000
Message-ID: <MN2PR19MB4045D937AF1494C11D8218E083AA2@MN2PR19MB4045.namprd19.prod.outlook.com>
References: <gwhiteCL/NQBdraft/issues/48@github.com> <gwhiteCL/NQBdraft/issues/48/2244060936@github.com> <MN2PR19MB404591B9BAA1AEED7BBB900983A92@MN2PR19MB4045.namprd19.prod.outlook.com> <LV2PR01MB7622B7EA53C95951987C9B0B9FA92@LV2PR01MB7622.prod.exchangelabs.com> <MN2PR19MB4045E01E9923873F4A0BBD4883AA2@MN2PR19MB4045.namprd19.prod.outlook.com> <6F90E433-3EC7-4A07-851B-8DEDE30061D7@comcast.com>
In-Reply-To: <6F90E433-3EC7-4A07-851B-8DEDE30061D7@comcast.com>
Accept-Language: en-US
Content-Language: en-US
X-MS-Has-Attach:
X-MS-TNEF-Correlator:
msip_labels: MSIP_Label_dad3be33-4108-4738-9e07-d8656a181486_ActionId=dc085fbd-ef1b-4368-adba-a856a5ad6fe3;MSIP_Label_dad3be33-4108-4738-9e07-d8656a181486_ContentBits=0;MSIP_Label_dad3be33-4108-4738-9e07-d8656a181486_Enabled=true;MSIP_Label_dad3be33-4108-4738-9e07-d8656a181486_Method=Privileged;MSIP_Label_dad3be33-4108-4738-9e07-d8656a181486_Name=Public No Visual Label;MSIP_Label_dad3be33-4108-4738-9e07-d8656a181486_SetDate=2024-07-24T00:19:09Z;MSIP_Label_dad3be33-4108-4738-9e07-d8656a181486_SiteId=945c199a-83a2-4e80-9f8c-5a91be5752dd;
x-ms-publictraffictype: Email
x-ms-traffictypediagnostic: MN2PR19MB4045:EE_|PH8PR19MB6974:EE_
x-ms-office365-filtering-correlation-id: 9ac93b85-5975-4d77-9b73-08dcabf79cb8
x-exotenant: 2khUwGVqB6N9v58KS13ncyUmMJd8q4
x-ms-exchange-senderadcheck: 1
x-ms-exchange-antispam-relay: 0
x-microsoft-antispam: BCL:0;ARA:13230040|1800799024|366016|376014|38070700018;
x-microsoft-antispam-message-info: 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
x-forefront-antispam-report: CIP:255.255.255.255;CTRY:;LANG:en;SCL:1;SRV:;IPV:NLI;SFV:NSPM;H:MN2PR19MB4045.namprd19.prod.outlook.com;PTR:;CAT:NONE;SFS:(13230040)(1800799024)(366016)(376014)(38070700018);DIR:OUT;SFP:1101;
x-ms-exchange-antispam-messagedata-chunkcount: 1
x-ms-exchange-antispam-messagedata-0: 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
Content-Type: multipart/alternative; boundary="_000_MN2PR19MB4045D937AF1494C11D8218E083AA2MN2PR19MB4045namp_"
MIME-Version: 1.0
X-OriginatorOrg: Dell.com
X-MS-Exchange-CrossTenant-AuthAs: Internal
X-MS-Exchange-CrossTenant-AuthSource: MN2PR19MB4045.namprd19.prod.outlook.com
X-MS-Exchange-CrossTenant-Network-Message-Id: 9ac93b85-5975-4d77-9b73-08dcabf79cb8
X-MS-Exchange-CrossTenant-originalarrivaltime: 24 Jul 2024 15:45:15.4083 (UTC)
X-MS-Exchange-CrossTenant-fromentityheader: Hosted
X-MS-Exchange-CrossTenant-id: 945c199a-83a2-4e80-9f8c-5a91be5752dd
X-MS-Exchange-CrossTenant-mailboxtype: HOSTED
X-MS-Exchange-CrossTenant-userprincipalname: xq19mugt5kywDdJpDNGymyL0Q8hV6gimHOFrokK+IMUQJOtqMDTxrCX0YcAzx4hhp1QXnvvZena4nqH2tP1IiA==
X-MS-Exchange-Transport-CrossTenantHeadersStamped: PH8PR19MB6974
X-Proofpoint-Virus-Version: vendor=baseguard engine=ICAP:2.0.293,Aquarius:18.0.1039,Hydra:6.0.680,FMLib:17.12.28.16 definitions=2024-07-24_15,2024-07-24_01,2024-05-17_01
X-Proofpoint-Spam-Details: rule=outbound_notspam policy=outbound score=0 lowpriorityscore=0 suspectscore=0 adultscore=0 bulkscore=0 spamscore=0 impostorscore=0 mlxlogscore=999 priorityscore=1501 malwarescore=0 clxscore=1011 mlxscore=0 phishscore=0 classifier=spam adjust=0 reason=mlx scancount=1 engine=8.12.0-2407110000 definitions=main-2407240114
X-Proofpoint-GUID: HHincXkYfV-icKW_70KzFXQXZxZPx2L5
X-Proofpoint-ORIG-GUID: HHincXkYfV-icKW_70KzFXQXZxZPx2L5
X-Proofpoint-Spam-Details: rule=notspam policy=default score=0 lowpriorityscore=0 mlxlogscore=999 adultscore=0 impostorscore=0 suspectscore=0 bulkscore=0 priorityscore=1501 clxscore=1015 mlxscore=0 spamscore=0 malwarescore=0 phishscore=0 classifier=spam adjust=0 reason=mlx scancount=1 engine=8.19.0-2407110000 definitions=main-2407240114
Message-ID-Hash: YZMRZNBP7QNNPXF4XRPKDEZCIR42424B
X-Message-ID-Hash: YZMRZNBP7QNNPXF4XRPKDEZCIR42424B
X-MailFrom: prvs=193501744b=david.black@dell.com
X-Mailman-Rule-Misses: dmarc-mitigation; no-senders; approved; emergency; loop; banned-address; member-moderation; header-match-tsvwg.ietf.org-0; nonmember-moderation; administrivia; implicit-dest; max-recipients; max-size; news-moderation; no-subject; digests; suspicious-header
CC: tsvwg IETF list <tsvwg@ietf.org>, "Black, David" <David.Black@dell.com>
X-Mailman-Version: 3.3.9rc4
Precedence: list
Subject: [tsvwg] Re: [EXTERNAL] Re: [gwhiteCL/NQBdraft] Should traffic protection be mandatory to implement? (Issue #48)
List-Id: Transport Area Working Group <tsvwg.ietf.org>
Archived-At: <https://mailarchive.ietf.org/arch/msg/tsvwg/id76aPidGb6bts5ZSoqQeec07A0>
List-Archive: <https://mailarchive.ietf.org/arch/browse/tsvwg>
List-Help: <mailto:tsvwg-request@ietf.org?subject=help>
List-Owner: <mailto:tsvwg-owner@ietf.org>
List-Post: <mailto:tsvwg@ietf.org>
List-Subscribe: <mailto:tsvwg-join@ietf.org>
List-Unsubscribe: <mailto:tsvwg-leave@ietf.org>

> [JL] So “theft of service” in this use case would be some software on the home network trying to achieve high throughput on an upstream (outbound) basis to the internet?

That's an example, but it's neither the only one nor a particularly relevant one for this discussion.

A better example would be an NQB queue in ISP access network equipment a few hops away from the subscriber where the traffic in the NQB queue is from multiple users.

Thanks, --David

From: Livingood, Jason <jason_livingood@comcast.com>
Sent: Wednesday, July 24, 2024 11:24 AM
To: Black, David <David.Black=40dell.com@dmarc.ietf.org>; Overcash, Michael (CCI-Atlanta) <michael.overcash@cox.com>; gwhiteCL/NQBdraft <reply+AB2VULW2XRH6MPK23ABRZQOEVLRFREVBNHHI5USV5Y@reply.github.com>; gwhiteCL/NQBdraft <NQBdraft@noreply.github.com>
Cc: tsvwg IETF list <tsvwg@ietf.org>; Black, David <David.Black@dell.com>
Subject: Re: [tsvwg] Re: [EXTERNAL] Re: [gwhiteCL/NQBdraft] Should traffic protection be mandatory to implement? (Issue #48)


[EXTERNAL EMAIL]
>> I also don’t think it is necessary or helpful to try to solve for malicious actors here. Any malicious actor can fill up queues and crowd out other traffic simply by sending high rate UDP.
>> Shallow buffers are not uniquely vulnerable here.

> That's the wrong class of malicious actor.  Theft of service is a different attack (with different malicious actor behavior) from denial of service.  The draft's incentives framework is making strong claims that theft of service attempts are sufficiently counterproductive for the thief so as to make other countermeasures (e.g., traffic protection) unnecessary.  The fact that all the buffers, e.g., both best effort and NQB, can be overwhelmed by a sufficiently large denial of service attack has almost no relevance to that theft of service concern.

[JL] So “theft of service” in this use case would be some software on the home network trying to achieve high throughput on an upstream (outbound) basis to the internet? There are already ways that users can sort of do similar things – such as using their own home router and using QoS prioritization to advantage certain LAN clients (e.g., game console) and to give certain devices or users more bandwidth than others. This is the user making decisions for how to use their connection.

[JL] So ISTM there are parallels in this use case to what many customers do today. They are provided a certain bandwidth (and may have volumetric usage policies) – shouldn’t it be up the the user to decide how to use that? Wouldn’t the user just  be ‘stealing’ from themselves?