[tsvwg] Re: [EXTERNAL] Re: [gwhiteCL/NQBdraft] Should traffic protection be mandatory to implement? (Issue #48)
Greg White <g.white@CableLabs.com> Wed, 24 July 2024 17:46 UTC
Return-Path: <g.white@CableLabs.com>
X-Original-To: tsvwg@ietfa.amsl.com
Delivered-To: tsvwg@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 39883C1E6418 for <tsvwg@ietfa.amsl.com>; Wed, 24 Jul 2024 10:46:21 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -2.107
X-Spam-Level:
X-Spam-Status: No, score=-2.107 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, DKIM_SIGNED=0.1, DKIM_VALID=-0.1, DKIM_VALID_AU=-0.1, DKIM_VALID_EF=-0.1, HTML_MESSAGE=0.001, RCVD_IN_DNSWL_NONE=-0.0001, RCVD_IN_MSPIKE_H2=-0.001, RCVD_IN_ZEN_BLOCKED_OPENDNS=0.001, SPF_PASS=-0.001, T_SCC_BODY_TEXT_LINE=-0.01, URIBL_BLOCKED=0.001, URIBL_DBL_BLOCKED_OPENDNS=0.001, URIBL_ZEN_BLOCKED_OPENDNS=0.001] autolearn=unavailable autolearn_force=no
Authentication-Results: ietfa.amsl.com (amavisd-new); dkim=pass (2048-bit key) header.d=cablelabs.com
Received: from mail.ietf.org ([50.223.129.194]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id 4TmP7N8iToan for <tsvwg@ietfa.amsl.com>; Wed, 24 Jul 2024 10:46:17 -0700 (PDT)
Received: from NAM10-BN7-obe.outbound.protection.outlook.com (mail-bn7nam10on2128.outbound.protection.outlook.com [40.107.92.128]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id 19EA3C1E6428 for <tsvwg@ietf.org>; Wed, 24 Jul 2024 10:46:16 -0700 (PDT)
ARC-Seal: i=1; a=rsa-sha256; s=arcselector10001; d=microsoft.com; cv=none; b=kYEBhl9R8wYGjqTCmOHaLkWlD4H1Ult+csoTXYcU70JHdR1KSYTLWGxgn5ssWWL3mfzxaSgkTgEPvgtRp8Or26O7JDUxoiwn7eatQ1OhnoyKUZYQHjU/y8Gj5FRnfK3UUqBSCGjU1sy1P0OFh6lBu7KKuPMAuFzuFMiGsJQ7U3uonCudNMMQwto3Qz9i9gK/3fZXLxVjW6dtZre7cwK47D9RXnrTLG3cSb2QDu/pvqc6oTwV0zqugjpjSr0DMgAgNyw5agsh50dPPDkqLdm01knXZBg0gLb39mGVkHVZYalhVSnL6X8ybNvB13ayYs0FjU2aheb0VfP0pBFZs8v/OA==
ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=microsoft.com; s=arcselector10001; h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-AntiSpam-MessageData-ChunkCount:X-MS-Exchange-AntiSpam-MessageData-0:X-MS-Exchange-AntiSpam-MessageData-1; bh=B03qxOkpucZ4Vi+NBlyYji/S8Au5F5DrbYrn/0X9MDo=; b=CGYUkdVlI/lMElBJ3WpJo+1Z2ftOywaYMsV5IwFfB3aseI5N8RnsHbBiTRpTp1eNCXLntflU7HNdAijAJxBEugJjqHIHx1TGlnc+Lf3RBfYPT9CjwmJwSk/wYLpB8AXREmlgp9oyxSOgSQLJTT7Q375a9x+8atLOtkFTwjHsTvUrKufpY0jQGASgzUJAUUQQgpBFYKJv2nMzepIAPuCu7jCpByQlGy8JDPmCYAgnRYMmtMSfOF+Y4ha9ScwQR44nFPXCUn7qjj/nzUGH99K0I2OOMvbikGalHmwGwwsazdvQhNipjSb+9jGXjESdZGTHitR4xuLkYWKRNdivlO/xNw==
ARC-Authentication-Results: i=1; mx.microsoft.com 1; spf=pass smtp.mailfrom=cablelabs.com; dmarc=pass action=none header.from=cablelabs.com; dkim=pass header.d=cablelabs.com; arc=none
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=cablelabs.com; s=selector2; h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-SenderADCheck; bh=B03qxOkpucZ4Vi+NBlyYji/S8Au5F5DrbYrn/0X9MDo=; b=gUo8UDiIL1fP9WaW+Ej+jvxGm2fJNhytkk2CWquqSvgi89Hzp8R8gL9A/pEcUe+TIb9x6/ZzP0RdG9r8SPjl48L7QUoaREvW29+A0hjyP2Gdk2mhrRIr6SCMXr//FxVrZAUrNKTxMdUy362YqLijxO1IyrlDKhGBhSeB+fKwL+UdbXRMv9UrL7kMdLN3f5kt4SVGCL+FRFp/ZbARhwMk1Yd6gt7QGLqyMYlchTAgF/QjG+QbIutWfzT9uuTZmRwN0/ypbawuZtIZKIRhlpxoaDay5Ylu2v0+VAX8IEiu7xStqo2BaY2zyV2Mdg5AozVaOspjJhNWOxaU6SZgjLKDXA==
Received: from MWHPR0601MB3657.namprd06.prod.outlook.com (2603:10b6:301:7c::23) by PH0PR06MB7706.namprd06.prod.outlook.com (2603:10b6:510:e6::19) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id 15.20.7784.14; Wed, 24 Jul 2024 17:46:14 +0000
Received: from MWHPR0601MB3657.namprd06.prod.outlook.com ([fe80::5c72:2ea6:2bca:4b44]) by MWHPR0601MB3657.namprd06.prod.outlook.com ([fe80::5c72:2ea6:2bca:4b44%5]) with mapi id 15.20.7784.013; Wed, 24 Jul 2024 17:46:14 +0000
From: Greg White <g.white@CableLabs.com>
To: "Black, David" <David.Black=40dell.com@dmarc.ietf.org>, "Livingood, Jason" <jason_livingood@comcast.com>, "Overcash, Michael (CCI-Atlanta)" <michael.overcash@cox.com>, gwhiteCL/NQBdraft <reply+AB2VULW2XRH6MPK23ABRZQOEVLRFREVBNHHI5USV5Y@reply.github.com>, gwhiteCL/NQBdraft <NQBdraft@noreply.github.com>
Thread-Topic: [tsvwg] Re: [EXTERNAL] Re: [gwhiteCL/NQBdraft] Should traffic protection be mandatory to implement? (Issue #48)
Thread-Index: AQHa3JwfOJAPnnLUJEmQXstKT2fKJLIEXDAwgABbGACAAEtNcIAAifgAgAB7LoD//53DAIAAeasA///HUIA=
Date: Wed, 24 Jul 2024 17:46:14 +0000
Message-ID: <BB46A9CC-5D74-41B2-99F9-3A2697B1E3D2@CableLabs.com>
References: <gwhiteCL/NQBdraft/issues/48@github.com> <gwhiteCL/NQBdraft/issues/48/2244060936@github.com> <MN2PR19MB404591B9BAA1AEED7BBB900983A92@MN2PR19MB4045.namprd19.prod.outlook.com> <LV2PR01MB7622B7EA53C95951987C9B0B9FA92@LV2PR01MB7622.prod.exchangelabs.com> <MN2PR19MB4045E01E9923873F4A0BBD4883AA2@MN2PR19MB4045.namprd19.prod.outlook.com> <6F90E433-3EC7-4A07-851B-8DEDE30061D7@comcast.com> <MN2PR19MB4045D937AF1494C11D8218E083AA2@MN2PR19MB4045.namprd19.prod.outlook.com> <F8D37F2E-206C-414F-A25A-24FF32C607C3@comcast.com> <MN2PR19MB40457246F85DE00DE26D8B3883AA2@MN2PR19MB4045.namprd19.prod.outlook.com>
In-Reply-To: <MN2PR19MB40457246F85DE00DE26D8B3883AA2@MN2PR19MB4045.namprd19.prod.outlook.com>
Accept-Language: en-US
Content-Language: en-US
X-MS-Has-Attach:
X-MS-TNEF-Correlator:
user-agent: Microsoft-MacOutlook/16.87.24071426
msip_labels: MSIP_Label_dad3be33-4108-4738-9e07-d8656a181486_ActionId=dc085fbd-ef1b-4368-adba-a856a5ad6fe3; MSIP_Label_dad3be33-4108-4738-9e07-d8656a181486_ContentBits=0; MSIP_Label_dad3be33-4108-4738-9e07-d8656a181486_Enabled=true; MSIP_Label_dad3be33-4108-4738-9e07-d8656a181486_Method=Privileged; MSIP_Label_dad3be33-4108-4738-9e07-d8656a181486_Name=Public No Visual Label; MSIP_Label_dad3be33-4108-4738-9e07-d8656a181486_SetDate=2024-07-24T00:19:09Z; MSIP_Label_dad3be33-4108-4738-9e07-d8656a181486_SiteId=945c199a-83a2-4e80-9f8c-5a91be5752dd;
authentication-results: dkim=none (message not signed) header.d=none;dmarc=none action=none header.from=CableLabs.com;
x-ms-publictraffictype: Email
x-ms-traffictypediagnostic: MWHPR0601MB3657:EE_|PH0PR06MB7706:EE_
x-ms-office365-filtering-correlation-id: 90c6a8fd-31f1-4fab-eca0-08dcac088349
x-ms-exchange-senderadcheck: 1
x-ms-exchange-antispam-relay: 0
x-microsoft-antispam: BCL:0;ARA:13230040|376014|1800799024|366016|38070700018;
x-microsoft-antispam-message-info: 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
x-forefront-antispam-report: CIP:255.255.255.255;CTRY:;LANG:en;SCL:1;SRV:;IPV:NLI;SFV:NSPM;H:MWHPR0601MB3657.namprd06.prod.outlook.com;PTR:;CAT:NONE;SFS:(13230040)(376014)(1800799024)(366016)(38070700018);DIR:OUT;SFP:1102;
x-ms-exchange-antispam-messagedata-chunkcount: 1
x-ms-exchange-antispam-messagedata-0: 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
Content-Type: multipart/alternative; boundary="_000_BB46A9CC5D7441B299F93A2697B1E3D2CableLabscom_"
MIME-Version: 1.0
X-OriginatorOrg: cablelabs.com
X-MS-Exchange-CrossTenant-AuthAs: Internal
X-MS-Exchange-CrossTenant-AuthSource: MWHPR0601MB3657.namprd06.prod.outlook.com
X-MS-Exchange-CrossTenant-Network-Message-Id: 90c6a8fd-31f1-4fab-eca0-08dcac088349
X-MS-Exchange-CrossTenant-originalarrivaltime: 24 Jul 2024 17:46:14.1714 (UTC)
X-MS-Exchange-CrossTenant-fromentityheader: Hosted
X-MS-Exchange-CrossTenant-id: ce4fbcd1-1d81-4af0-ad0b-2998c441e160
X-MS-Exchange-CrossTenant-mailboxtype: HOSTED
X-MS-Exchange-CrossTenant-userprincipalname: yYC1jzTL2r3AOsLIeEWNfP39aGqwjJEu2/Is2Znc7AiPtxDMVk/QhpyNEPRBXpNGAVarQHtXrnqiVJtNKs5ZWg==
X-MS-Exchange-Transport-CrossTenantHeadersStamped: PH0PR06MB7706
Message-ID-Hash: OYFOPZPLDPXXMNXBTI4NCMNOEVLYN2RB
X-Message-ID-Hash: OYFOPZPLDPXXMNXBTI4NCMNOEVLYN2RB
X-MailFrom: g.white@CableLabs.com
X-Mailman-Rule-Misses: dmarc-mitigation; no-senders; approved; emergency; loop; banned-address; member-moderation; header-match-tsvwg.ietf.org-0; nonmember-moderation; administrivia; implicit-dest; max-recipients; max-size; news-moderation; no-subject; digests; suspicious-header
CC: tsvwg IETF list <tsvwg@ietf.org>, "Black, David" <David.Black@dell.com>
X-Mailman-Version: 3.3.9rc4
Precedence: list
Subject: [tsvwg] Re: [EXTERNAL] Re: [gwhiteCL/NQBdraft] Should traffic protection be mandatory to implement? (Issue #48)
List-Id: Transport Area Working Group <tsvwg.ietf.org>
Archived-At: <https://mailarchive.ietf.org/arch/msg/tsvwg/kDJ95yRctSn-s5r0u6s8omLuoNM>
List-Archive: <https://mailarchive.ietf.org/arch/browse/tsvwg>
List-Help: <mailto:tsvwg-request@ietf.org?subject=help>
List-Owner: <mailto:tsvwg-owner@ietf.org>
List-Post: <mailto:tsvwg@ietf.org>
List-Subscribe: <mailto:tsvwg-join@ietf.org>
List-Unsubscribe: <mailto:tsvwg-leave@ietf.org>
David, I think you are missing the point. In links that today provide a single, deep-buffered queue for best-effort Default traffic, there may or may not exist protection mechanisms that prevent individual application instances (or individual users) from consuming too much bandwidth, or causing too much delay, or causing too much packet loss to the detriment of other application instances (or other users). These mechanisms might be good to have in place in certain cases, but they aren’t always necessary (and they certainly aren’t mandated by the IETF). NQB doesn’t change this. -Greg From: "Black, David" <David.Black=40dell.com@dmarc.ietf.org> Date: Wednesday, July 24, 2024 at 10:09 AM To: Jason Livingood <jason_livingood@comcast.com>, "Black, David" <David.Black=40dell.com@dmarc.ietf.org>, "Overcash, Michael (CCI-Atlanta)" <michael.overcash@cox.com>, gwhiteCL/NQBdraft <reply+AB2VULW2XRH6MPK23ABRZQOEVLRFREVBNHHI5USV5Y@reply.github.com>, gwhiteCL/NQBdraft <NQBdraft@noreply.github.com> Cc: tsvwg IETF list <tsvwg@ietf.org>, David Black <David.Black@dell.com> Subject: [tsvwg] Re: [EXTERNAL] Re: [gwhiteCL/NQBdraft] Should traffic protection be mandatory to implement? (Issue #48) > [JL] First hop access gear would typically still have per user/device/home flow boundaries Would it be reasonable to specify those boundaries in a bit more detail and limit usage of this PHB to equipment that enforces such boundaries? If that were to be done, then ... > [JL] In any case, the user/device/home cannot exceed the bandwidth they have been provisioned. ... would be a fine "abuser can only shoot itself in the foot" conclusion to most of the security concerns because the boundaries prevent damage to others. Thanks, --David From: Livingood, Jason <jason_livingood@comcast.com> Sent: Wednesday, July 24, 2024 12:54 PM To: Black, David <David.Black@dell.com>; Black, David <David.Black=40dell.com@dmarc.ietf.org>; Overcash, Michael (CCI-Atlanta) <michael.overcash@cox.com>; gwhiteCL/NQBdraft <reply+AB2VULW2XRH6MPK23ABRZQOEVLRFREVBNHHI5USV5Y@reply.github.com>; gwhiteCL/NQBdraft <NQBdraft@noreply.github.com> Cc: tsvwg IETF list <tsvwg@ietf.org> Subject: Re: [tsvwg] Re: [EXTERNAL] Re: [gwhiteCL/NQBdraft] Should traffic protection be mandatory to implement? (Issue #48) [EXTERNAL EMAIL] > A better example would be an NQB queue in ISP access network equipment a few hops away from the subscriber where the traffic in the NQB queue is from multiple users. [JL] First hop access gear would typically still have per user/device/home flow boundaries – for example limiting home-1 to 300 Mbps per their service tier and home-2 to 1 Gbps, home-3 to 500 Mbps, and so on. Those users cannot exceed their service plan limits and take bandwidth from other users. If they consistently have high utilization that causes congestion at the aggregation point, the capacity monitoring systems would automatically trigger a normal capacity augmentation process. The second hop, just after that access aggregator would typically have extraordinary capacity and never experience congestion unless there was something extraordinary like one or more fiber cuts in a regional network. [JL] In any case, the user/device/home cannot exceed the bandwidth they have been provisioned. And if they do use a lot of their provisioned bandwidth, that seems fine – as it is what they have paid for.
- [tsvwg] Re: [gwhiteCL/NQBdraft] Should traffic pr… Black, David
- [tsvwg] Re: [EXTERNAL] Re: [gwhiteCL/NQBdraft] Sh… Overcash, Michael (CCI-Atlanta)
- [tsvwg] Re: [EXTERNAL] Re: [gwhiteCL/NQBdraft] Sh… Greg White
- [tsvwg] Re: [EXTERNAL] Re: [gwhiteCL/NQBdraft] Sh… Black, David
- [tsvwg] Re: [EXTERNAL] Re: [gwhiteCL/NQBdraft] Sh… Black, David
- [tsvwg] Re: [EXTERNAL] Re: [gwhiteCL/NQBdraft] Sh… Livingood, Jason
- [tsvwg] Re: [EXTERNAL] Re: [gwhiteCL/NQBdraft] Sh… Black, David
- [tsvwg] Re: [EXTERNAL] Re: [gwhiteCL/NQBdraft] Sh… Livingood, Jason
- [tsvwg] Re: [EXTERNAL] Re: [gwhiteCL/NQBdraft] Sh… Livingood, Jason
- [tsvwg] Re: [EXTERNAL] Re: [gwhiteCL/NQBdraft] Sh… Sebastian Moeller
- [tsvwg] Re: [EXTERNAL] Re: [gwhiteCL/NQBdraft] Sh… Black, David
- [tsvwg] Re: [EXTERNAL] Re: [gwhiteCL/NQBdraft] Sh… Overcash, Michael (CCI-Atlanta)
- [tsvwg] Re: [EXTERNAL] Re: [gwhiteCL/NQBdraft] Sh… Livingood, Jason
- [tsvwg] Re: [EXTERNAL] Re: [gwhiteCL/NQBdraft] Sh… Black, David
- [tsvwg] Re: [EXTERNAL] Re: [gwhiteCL/NQBdraft] Sh… Greg White
- [tsvwg] Re: [EXTERNAL] Re: [gwhiteCL/NQBdraft] Sh… Black, David
- [tsvwg] Re: [EXTERNAL] Re: [gwhiteCL/NQBdraft] Sh… Sebastian Moeller
- [tsvwg] Re: [EXTERNAL] Re: [gwhiteCL/NQBdraft] Sh… Sebastian Moeller
- [tsvwg] Re: [EXTERNAL] Re: [gwhiteCL/NQBdraft] Sh… Sebastian Moeller
- [tsvwg] Re: [EXTERNAL] Re: [gwhiteCL/NQBdraft] Sh… Livingood, Jason
- [tsvwg] Re: [EXTERNAL] Re: [gwhiteCL/NQBdraft] Sh… Sebastian Moeller
- [tsvwg] Re: [EXTERNAL] Re: [gwhiteCL/NQBdraft] Sh… Greg White
- [tsvwg] Re: [EXTERNAL] Re: [gwhiteCL/NQBdraft] Sh… Jonathan Morton
- [tsvwg] Re: [EXTERNAL] Re: [gwhiteCL/NQBdraft] Sh… Overcash, Michael (CCI-Atlanta)
- [tsvwg] Re: [EXTERNAL] Re: [gwhiteCL/NQBdraft] Sh… Livingood, Jason
- [tsvwg] Re: [EXTERNAL] Re: [gwhiteCL/NQBdraft] Sh… Black, David
- [tsvwg] Re: [EXTERNAL] Re: [gwhiteCL/NQBdraft] Sh… Sebastian Moeller
- [tsvwg] Re: [EXTERNAL] Re: [gwhiteCL/NQBdraft] Sh… Sebastian Moeller