Re: [tsvwg] Some comments on NQB (part 2)

Greg White <g.white@CableLabs.com> Thu, 05 May 2022 21:01 UTC

Return-Path: <g.white@CableLabs.com>
X-Original-To: tsvwg@ietfa.amsl.com
Delivered-To: tsvwg@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 6451FC1594BC for <tsvwg@ietfa.amsl.com>; Thu, 5 May 2022 14:01:00 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -2.097
X-Spam-Level:
X-Spam-Status: No, score=-2.097 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, DKIM_SIGNED=0.1, DKIM_VALID=-0.1, DKIM_VALID_AU=-0.1, DKIM_VALID_EF=-0.1, RCVD_IN_ZEN_BLOCKED_OPENDNS=0.001, SPF_PASS=-0.001, URIBL_BLOCKED=0.001, URIBL_DBL_BLOCKED_OPENDNS=0.001, URIBL_ZEN_BLOCKED_OPENDNS=0.001] autolearn=ham autolearn_force=no
Authentication-Results: ietfa.amsl.com (amavisd-new); dkim=pass (2048-bit key) header.d=cablelabs.com
Received: from mail.ietf.org ([50.223.129.194]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id Ur0GxkmZEx4I for <tsvwg@ietfa.amsl.com>; Thu, 5 May 2022 14:00:56 -0700 (PDT)
Received: from NAM12-BN8-obe.outbound.protection.outlook.com (mail-bn8nam12on20726.outbound.protection.outlook.com [IPv6:2a01:111:f400:fe5b::726]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id 06586C1594B5 for <tsvwg@ietf.org>; Thu, 5 May 2022 14:00:55 -0700 (PDT)
ARC-Seal: i=1; a=rsa-sha256; s=arcselector9901; d=microsoft.com; cv=none; b=BrkgZDxfwrMc9EBw7Cu8WNQw/+RKgwfkzwXsfkKmWehVv94cvFLgIpGYV+I89sz+dATg7RKri+lObt2dT/QLwvTQJ8z5ZrPhPBzaqPsAxl+LehtC8kco7uvEjmiop/Kbqa1dSMZAnV7O6c7oD/yi9hpvC2tDKwp6zTVq5PhoZh7hvTDjgDMRCKf0hP+RB4rLYnYZ1it2FjVT66LC0RFJeJYc0wmBjmI8jOYFcibLlibBka0sqR2Ntlpm3vz1HxhJro79mK6fP18GBrtEXX2O4hdhi8ipyIPPSn6JoclWDto/o+InSC10MwUMY3AF3RnkdgbkOPM+mp6tNFwJmDPciQ==
ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=microsoft.com; s=arcselector9901; h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-AntiSpam-MessageData-ChunkCount:X-MS-Exchange-AntiSpam-MessageData-0:X-MS-Exchange-AntiSpam-MessageData-1; bh=6f/yVghOYFsrkuCWOt7J7E1l0tju3mxrRb5u8Gi87U4=; b=bfGqOoL3eblFgbDAJxBfKb0wTTa0gkHX2mBLCcER1FaRmKnoR7C+dMssJ6HyNxF9yDJapIumSracIcrcmGdB7xcuvn6s2d0ArrGSGbRvxmXOYEXE+Kz3jUQoUCAHIBb4686qrzaVjejiyk1PGOzcWl5JK8IJAf+WqAYSzy9sjqkiwKnjoMwgnV4XeC+XZ91JOF8vX8KKluoQRGbRfBwBPHX7haHTyMj4ei95hPOEc1dDgifE0HBT39g8ymg+7zs45CPtBsCCe9+Bwwfoveokp+tmB533/UUTCTJMSdQ6cC5IVuGba0E/NWPt2qWg5PwAU5FbRigq6vhl7U+WbOcH+g==
ARC-Authentication-Results: i=1; mx.microsoft.com 1; spf=pass smtp.mailfrom=cablelabs.com; dmarc=pass action=none header.from=cablelabs.com; dkim=pass header.d=cablelabs.com; arc=none
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=cablelabs.com; s=selector2; h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-SenderADCheck; bh=6f/yVghOYFsrkuCWOt7J7E1l0tju3mxrRb5u8Gi87U4=; b=htNba0sYLSxsiAtpzmabpW4E2HBiFNZCgg6AgfFimfgemhsYqdmC+MCnelSZ/UKYfUa70fXg23yK9GxehIJqaeF5NeFbJ1Tvg59FnTLeSWPRdFZwC8JOOoPseAq/Wosj0iSSGfI+fqQQ6LsnDMjsUV9RqVrm/bmL2fstmEf+APL+6Id1/kT5nusklYLSJyVXxcUiBYpNoYTllzioBd+/mCfFhxRZs1duKLTQjN+79ojnZaymRCrKw/PKCY+fA/aMimzykettOU75dq8qsrL8IXATdTi6o8+8UUQ6LZWUMW14Gu9p7T/snDfFoMY3jomtadj+kuFtME5h33DF8NGQIw==
Received: from SJ0PR06MB7861.namprd06.prod.outlook.com (2603:10b6:a03:38c::19) by CO6PR06MB7457.namprd06.prod.outlook.com (2603:10b6:303:a0::8) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id 15.20.5206.24; Thu, 5 May 2022 21:00:50 +0000
Received: from SJ0PR06MB7861.namprd06.prod.outlook.com ([fe80::6d2b:ef23:97c8:bf83]) by SJ0PR06MB7861.namprd06.prod.outlook.com ([fe80::6d2b:ef23:97c8:bf83%3]) with mapi id 15.20.5206.013; Thu, 5 May 2022 21:00:50 +0000
From: Greg White <g.white@CableLabs.com>
To: "Black, David" <David.Black@dell.com>
CC: "tsvwg@ietf.org" <tsvwg@ietf.org>
Thread-Topic: [tsvwg] Some comments on NQB (part 2)
Thread-Index: AQHYOv2guL2r9PMjBEKpUGc1kp2Jxqzf9DIAgAB7wQCAAirvgIAAn/KAgB80JLCAA2EXAIAA8XUggABkJwCACEmqAIABPH+A
Date: Thu, 05 May 2022 21:00:50 +0000
Message-ID: <B3595C96-CDF8-4AC3-A86B-BA8F575ADFD9@cablelabs.com>
References: <7590fa6c-0d03-16d8-f809-125a1b6c8aad@erg.abdn.ac.uk> <9F7895D0-F66F-4916-B021-5AAE90FCE8A4@cablelabs.com> <7F88F10A-6666-4CF0-A50F-F38BA1FD2FF0@gmx.de> <bec2628d-9fdd-1a88-4737-f857a1c4d7a8@erg.abdn.ac.uk> <1EF1A386-602A-441C-B9F9-6EAA5DE5CA1D@cablelabs.com> <BE1P281MB15247E15FC2BC06FB712E2E99CFB9@BE1P281MB1524.DEUP281.PROD.OUTLOOK.COM> <ADEAF485-DE50-47EC-8927-140313DC99C7@cablelabs.com> <BE1P281MB152446D0ACD70B33A9BBBA679CFC9@BE1P281MB1524.DEUP281.PROD.OUTLOOK.COM> <963D2F69-64C5-417F-ACA9-BE74E59046BC@cablelabs.com> <MN2PR19MB404577C0E090C6C84ED128B583C39@MN2PR19MB4045.namprd19.prod.outlook.com>
In-Reply-To: <MN2PR19MB404577C0E090C6C84ED128B583C39@MN2PR19MB4045.namprd19.prod.outlook.com>
Accept-Language: en-US
Content-Language: en-US
X-MS-Has-Attach:
X-MS-TNEF-Correlator:
user-agent: Microsoft-MacOutlook/16.44.20121301
msip_labels: MSIP_Label_dad3be33-4108-4738-9e07-d8656a181486_Enabled=true; MSIP_Label_dad3be33-4108-4738-9e07-d8656a181486_SetDate=2022-05-04T19:29:21Z; MSIP_Label_dad3be33-4108-4738-9e07-d8656a181486_Method=Privileged; MSIP_Label_dad3be33-4108-4738-9e07-d8656a181486_Name=Public No Visual Label; MSIP_Label_dad3be33-4108-4738-9e07-d8656a181486_SiteId=945c199a-83a2-4e80-9f8c-5a91be5752dd; MSIP_Label_dad3be33-4108-4738-9e07-d8656a181486_ActionId=307399e9-924b-42c2-88d8-573bdc9e1aa7; MSIP_Label_dad3be33-4108-4738-9e07-d8656a181486_ContentBits=0
authentication-results: dkim=none (message not signed) header.d=none;dmarc=none action=none header.from=CableLabs.com;
x-ms-publictraffictype: Email
x-ms-office365-filtering-correlation-id: c0157ce6-5249-4020-0ff1-08da2eda55e4
x-ms-traffictypediagnostic: CO6PR06MB7457:EE_
x-microsoft-antispam-prvs: <CO6PR06MB7457A0DF88C0EEF3AA75CF6DEEC29@CO6PR06MB7457.namprd06.prod.outlook.com>
x-ms-exchange-senderadcheck: 1
x-ms-exchange-antispam-relay: 0
x-microsoft-antispam: BCL:0;
x-microsoft-antispam-message-info: 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
x-forefront-antispam-report: CIP:255.255.255.255; CTRY:; LANG:en; SCL:1; SRV:; IPV:NLI; SFV:NSPM; H:SJ0PR06MB7861.namprd06.prod.outlook.com; PTR:; CAT:NONE; SFS:(13230001)(366004)(6506007)(26005)(53546011)(2616005)(83380400001)(33656002)(30864003)(6512007)(66574015)(186003)(36756003)(66476007)(66556008)(66446008)(86362001)(6486002)(966005)(71200400001)(508600001)(64756008)(8936002)(2906002)(316002)(38070700005)(38100700002)(6916009)(122000001)(66946007)(76116006)(4326008)(8676002)(91956017)(5660300002)(45980500001)(85282002); DIR:OUT; SFP:1102;
x-ms-exchange-antispam-messagedata-chunkcount: 1
x-ms-exchange-antispam-messagedata-0: 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
Content-Type: text/plain; charset="utf-8"
Content-ID: <89E943229E87904090C99FA795D68701@namprd06.prod.outlook.com>
Content-Transfer-Encoding: base64
MIME-Version: 1.0
X-OriginatorOrg: cablelabs.com
X-MS-Exchange-CrossTenant-AuthAs: Internal
X-MS-Exchange-CrossTenant-AuthSource: SJ0PR06MB7861.namprd06.prod.outlook.com
X-MS-Exchange-CrossTenant-Network-Message-Id: c0157ce6-5249-4020-0ff1-08da2eda55e4
X-MS-Exchange-CrossTenant-originalarrivaltime: 05 May 2022 21:00:50.4791 (UTC)
X-MS-Exchange-CrossTenant-fromentityheader: Hosted
X-MS-Exchange-CrossTenant-id: ce4fbcd1-1d81-4af0-ad0b-2998c441e160
X-MS-Exchange-CrossTenant-mailboxtype: HOSTED
X-MS-Exchange-CrossTenant-userprincipalname: DqhHcIf99kDHylnnPuJZMDEeCJmJsYu+dXPlXUciAfqCSdB4YCZ6jsC1cVmoSz7DVpVPXwXkIqx4qkcPBXjXIg==
X-MS-Exchange-Transport-CrossTenantHeadersStamped: CO6PR06MB7457
Archived-At: <https://mailarchive.ietf.org/arch/msg/tsvwg/lrBDBunJDkLzCvZxjtX_m_StC_Y>
Subject: Re: [tsvwg] Some comments on NQB (part 2)
X-BeenThere: tsvwg@ietf.org
X-Mailman-Version: 2.1.34
Precedence: list
List-Id: Transport Area Working Group <tsvwg.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/tsvwg>, <mailto:tsvwg-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/tsvwg/>
List-Post: <mailto:tsvwg@ietf.org>
List-Help: <mailto:tsvwg-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/tsvwg>, <mailto:tsvwg-request@ietf.org?subject=subscribe>
X-List-Received-Date: Thu, 05 May 2022 21:01:00 -0000

Hi David,

Much of the answer to your question can be found in Section 8.3 of the draft (https://www.ietf.org/archive/id/draft-ietf-tsvwg-nqb-10.html#section-8.3) along with my post to the TSVWG mailing list in February (https://mailarchive.ietf.org/arch/msg/tsvwg/fBcm6eUfv9egmlo-TX8N3OAFM_A/).  Please have a look at those.

In response to your blunt statement, I think that the vast majority of Internet users and application developers would be confused by it, and think that you have it exactly backward.  For them, Internet QoS is pure fiction.  From their perspective, there has never been such a thing as Internet QoS and it is unlikely that there ever will be.  I've tried to describe my view as to the reasons for this in Section 3.2 of the draft (https://www.ietf.org/archive/id/draft-ietf-tsvwg-nqb-10.html#section-3.2).   On the other hand, there are hundreds of millions of Wi-Fi networks around the world that implement WMM using the default DSCP-to-UP mapping.  The QoS treatment in these networks is real, and these networks carry a tremendous amount of traffic for applications used every day by billions of people. Moreover, my experience (and I think this view is shared by others), is that the most common sources of quality degradation (loss, latency, jitter) for Internet users are at the edge (Wi-Fi and access) rather than the core. So, it's imperative that the solution solves for Wi-Fi. The characterization of these networks as "legacy WiFi" makes it sound as if we're talking about older gear that will soon be replaced by gear that would allow the use of some other DSCP (e.g. 5) to achieve the desired outcome. This is not true.  Most brand new Wi-Fi 6 gear available for purchase today implements the same default mapping.  For the future, the WFA has recently begun to recommend that Wi-Fi devices use the mapping in RFC8325, but it is unclear how quickly that will get adopted, implemented, and deployed, and furthermore it is unclear whether the WFA means RFC8325 "as published" or RFC8325 "with updates" (RFC8622 already updates it, and NQB is proposed to).    Regardless of which interpretation manufacturers take, it doesn't create a preference for the value 5. 

This "issue" of re-marking DSCPs is to me a necessary component of trying to (today) enable a truly end-to-end PHB across the Internet. The majority of Internet networks, operating systems, and applications that I'm familiar with do not implement the IETF standardized PHBs and Service Classes, nor do they follow the recommended DSCP assignments from the IANA registry. The likelihood of finding an end-to-end path that has consistent DSCP interpretation is probably fairly close to zero in my view (even the "default" DSCP of 0 doesn't mean default treatment in some major ISP networks!).  And, as Jason indicated, the majority of traffic to access networks flows over direct interconnect links anyway, where DSCP usage can be coordinated and managed.

So, for me the critical part of the DSCP assignment for NQB is to provide guidance to application and OS developers that will enable interoperation with the established (and largely unmanaged) practices at the edge.  What happens in the core will almost certainly involve some level of DSCP re-marking and communication between interconnecting networks, regardless of which DSCP we pick.  If we can provide recommendations in the draft that make it easier for interconnecting networks (and perhaps limit the amount of re-marking needed), then we absolutely should do it (and for that some seem to prefer 45 because it aligns with usage at the edge, others 5 because they prefer IP precedence), but we can't let *that* "tail" wag the dog.
 
-Greg
 

On 5/4/22, 2:08 PM, "Black, David" <David.Black@dell.com> wrote:

    <WG_Chair_Hat=OFF>
    With apologies for resurrecting some topics that have been more or less settled in the past, I am still bothered by the recommendation of two default DSCPs for NQB.

    The question that I can't satisfactorily answer is: If NQB traffic is supposed to be carried as a peer to Default traffic, why are we instructing end systems to use DSCP 45 for originated NQB traffic on all networks?

    The answers to that question seem to boil down to (with apologies for the crass bluntness) necessity of allowing the Legacy WiFi "tail" to wag the Internet QoS "dog".

    Would someone (Greg?) provide a reminder of what is it about legacy WiFi that requires this approach, please ...
    </WG_Chair_Hat>

    Thanks, --David

    -----Original Message-----
    From: tsvwg <tsvwg-bounces@ietf.org> On Behalf Of Greg White
    Sent: Friday, April 29, 2022 3:34 PM
    To: Ruediger.Geib@telekom.de
    Cc: tsvwg@ietf.org
    Subject: Re: [tsvwg] Some comments on NQB (part 2)


    [EXTERNAL EMAIL] 

    Thanks Ruediger.

    Glad to hear that we are converging, though it wasn't clear to me which version of the new text you preferred.  For now, I'll stick with the version that I'd sent on April 4, but let me know if I've misunderstood you.
    Hopefully others find this text change acceptable.  

    N.B. I don't have any issue with your bigger picture idea, but it is beyond the scope of the NQB draft.   So, if you want to pursue documenting it in an RFC, it probably should be proposed separately.  

    So, for the NQB draft, are folks ok with replacing:

    To support NQB, networks MUST preserve a DSCP marking distinction between NQB traffic and Default traffic when forwarding via an interconnect from or to another network. 
    To facilitate the default treatment of NQB traffic in backbones and core networks discussed in the previous section (where IP Precedence may be deployed), networks that support NQB SHOULD NOT use the value 45 for NQB at network interconnects unless that usage is explicitly documented in the TCA (Traffic Conditioning Agreement, see [RFC2475]) for that interconnection. 
    Rather, networks SHOULD remap NQB traffic to DSCP 5 prior to interconnection, unless agreed otherwise between the interconnecting partners. 
    To be clear, interconnecting networks are not precluded from negotiating (via an SLA, TCA, or some other agreement) a different DSCP to use to signal NQB across an interconnect. 
    Additionally, the fact that this PHB is intended for end-to-end usage does not preclude networks from mapping the NQB DSCP to a value other than 45 or 5 for internal usage, as long as the appropriate NQB DSCP is restored when forwarding to another network.


    With [notes in square brackets added to help those trying to compare against the above]:

    To support NQB, networks MUST preserve a DSCP marking distinction between NQB traffic and Default traffic when forwarding via an interconnect from or to another network.    [no change]
    Networks that support NQB SHOULD support the ability to re-mark NQB traffic prior to such an interconnection.    [new recommendation]
    It is RECOMMENDED that interconnecting networks negotiate the use of the DSCP value 45 to indicate NQB traffic across their interconnections (thus avoiding the need to re-mark traffic), however, local DSCP usage by either network could require the use of a different value.   [new recommendation]
    To be clear, interconnecting networks are not precluded from negotiating (via an SLA, TCA, or some other agreement) a different DSCP than 45 to use to mark NQB traffic across an interconnect.  [only editorial change]
    In situations where negotiation of a DSCP between interconnection partners is infeasible, networks that support NQB SHOULD NOT use the value 45 for NQB at network interconnects, but rather SHOULD re-mark NQB traffic to DSCP 5 prior to interconnection.  [limited the applicability of this recommendation]
    This is intended to facilitate the default treatment of NQB traffic in backbones and core networks discussed in the previous section (where it is possible that IP Precedence may still be deployed).  [only editorial change]
    Additionally, the fact that this PHB is intended for end-to-end usage does not preclude networks from mapping the NQB DSCP to a value other than 45 or 5 for internal usage, as long as the appropriate NQB DSCP is restored when forwarding to another network.  [no change]


    In addition to Ruediger, I'd like to specifically hear from David Black and Gorry, since two of the original sentences came from David, and Gorry was the OP raising a concern about those sentences.


    -Greg



    On 4/29/22, 3:27 AM, "Ruediger.Geib@telekom.de" <Ruediger.Geib@telekom.de> wrote:

        Hi Greg,

        Thanks. My bigger picture: RFC 8100 is intended to support interconnection policies like:

        If DSCP in range <0-7>      # with a negotiated SLA, different ranges may apply for different backbone PHBs and Codepoint rewrites...
            then PHB=default

        To me, no SLA negotiation is necessary if forwarding expected by a backbone is "default". In addition, I prefer the interconnection QoS policy to be as simple as possible, if no QoS SLA is negotiated:

        (PHB=default)
        If DSCP in range <8-63> 
            set DSCP=000 000

        I appreciate your suggested text which allows that; no DSCP 45 traffic should be received at interconnections without negotiated QoS SLA, if the above is deployed. If DiffServ Standards were changed to support the above, 8 DSCP are available for PHBs whose differentiating support is most useful and can be decided upon at the access. I think that would be beneficial for
        - Lower Effort PHB
        - L4S / NQB (I think, any DSCP can be rewritten at access and may be at a home gateway, and if a standard proposes a value like 45, the better).

        What I suggest to avoid at interconnection (and will not deploy, where I'm in charge) is (e.g.):

        If <InterconnectionPartnerX> then
            If DSCP <a> 
                then PHB=default
            If DSCP <b> 
                then PHB=default AND set DSCP=000 001
            If DSCP <c> 
                then PHB=EF
            If DSCP <d> 
                then PHB=AF4 AND set DSCP=001 010
            If DSCP <e> 
                then PHB=AF4 AND set DSCP=001 100
            If DSCP <f> 
                then PHB=default AND set DSCP=000 101
              ....
            If <no match>
                then PHB=default AND set DSCP=000 000

        Rather than individual per interconnection partner combined with per DSCP policies at interconnection, I'm looking for simplistic, easily comprehensible and to the extent possible generic Behaviour Aggregate classification. That holds for (range based DSCP) remarking at interconnection too.

        Regards,

        Ruediger





        -----Ursprüngliche Nachricht-----
        Von: Greg White <g.white@CableLabs.com> 
        Gesendet: Freitag, 29. April 2022 01:12
        An: Geib, Rüdiger <Ruediger.Geib@telekom.de>
        Cc: tsvwg@ietf.org
        Betreff: Re: [tsvwg] Some comments on NQB (part 2)

        Hi Ruediger,  

        Thanks for responding.   See my responses [GW] below.

        -Greg


        On 4/26/22, 8:14 AM, "Ruediger.Geib@telekom.de" <Ruediger.Geib@telekom.de> wrote:

            Greg,

            Sorry for the late response.

            <snip>

            You wrote:
            What I offered for consideration below was that the [DSCP] value 45 be recommended across interconnections in cases where the two interconnecting partners are NQB-aware and they negotiate DSCP markings.

            RG: To me, that's an additional concept. My take was, NQB doesn't require more than default transport in the backbone and at interconnection. If the later holds, negotiation of NQB is no issue to me, but an appropriately picked DSCP is important (it should unambiguously indicate "default forwarding" at interconnection).
            If a QoS SLA is negotiated, in principle any negotiated DSCP does (it is well known that I prefer RFC 8100 at wholesale and interconnection interfaces, as this simplifies deployment and operation).

        [GW] It seems to me that there isn't such a thing as a DSCP (other than possibly 0) that unambiguously indicates default forwarding at interconnection.  I quickly re-read RFC8100 and also don't see mention of it there (it refers to DSCP=0 as being default and seems to recommend that any traffic classified into the Default / Elastic Treatment Aggregate be re-marked to 0). As I understand it, the practice of aggregating traffic based on the IPP bits (top 3 bits) is not universal. If I'm right in that, then it seems that recommending NQB-aware networks re-mark NQB traffic to 5 and not use 45 at *all* interconnections might be unnecessary (and it was apparently concerning to some).  
        In my post on April 4: https://urldefense.com/v3/__https://mailarchive.ietf.org/arch/msg/tsvwg/PKTrfNdTCEXmwoovSkqec6cOJZc/__;!!LpKI!mzr4n4KDAty5Aq0a1tG2B89wGfRac3ylHv0FS_U75V-j47XXXS_4VgGjl_ncHFL_4IO4sSMU0X0akSepO1Y$ [mailarchive[.]ietf[.]org] in response to Gorry's concerns, I had suggested softening this to (paraphrasing here):
        - If negotiating a DSCP to use at interconnection, recommend 45, but the parties can negotiate whichever value they want.
        - If negotiation isn't possible, the sending network SHOULD NOT use 45, and instead SHOULD use 5. 
        What about this do you not like?  It seems to me that you're saying that you wouldn't negotiate a DSCP for NQB.  So, based on the proposed text, your interconnection partners SHOULD use 5. 
        Would it make you happier if the first statement were replaced with:
        - If negotiating a DSCP to use at interconnection, recommend the use of either 5 or 45, but the parties can negotiate whichever value they want.



            You wrote:
            The data from Ana Custura and Gorry indicates that, unless something changes in regards to bleaching of the upper 3 bits by some networks, any future assignments of the values 13, 21, 29, 37, 53, 61 would do well to keep in mind that any traffic so marked could end up being aggregated with NQB traffic.  That said, this sort of bleaching is non-compliant with the definition of the DSCP field, and is already problematic for EF, VA, and all of the CS codepoints (which aggregate in incompatible ways), so (as was commented in the last meeting) we may want to consider identifying the routers that continue to do this, and try to work with the associated network operators to change the behavior. 

            RG: I'd appreciate a concise reference for your claim "this sort of bleaching is non-compliant with the definition of the DSCP field".

        [GW] I probably didn't choose my words as carefully as I could have, and I made that statement (without doing the appropriate research) based on comments others had made.  RFC2474 Section 3 seems to imply to me that selectively bleaching certain bits of the field is not what was intended, but it does allow that "Nodes MAY rewrite the DS field as needed to provide a desired local or end-to-end service."  So, I don’t see any requirement statement that is violated. 


            RG: If you are interested, I can sketch examples where single sided changes were made to well  negotiated EF deployments and the interesting consequences caused by that. That's not what mean by "problematic for EF", it rather shows what happens if a QoS design isn't well agreed with all parties responsible for QoS aware network sections and policy points in an operational end-to-end production chain.

            Regards,

            Ruediger