Re: [tsvwg] Warren Kumari's Discuss on draft-ietf-tsvwg-le-phb-09: (with DISCUSS and COMMENT)

"BRUNGARD, DEBORAH A" <db3546@att.com> Sat, 23 February 2019 16:33 UTC

Return-Path: <db3546@att.com>
X-Original-To: tsvwg@ietfa.amsl.com
Delivered-To: tsvwg@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id D719B1288BD; Sat, 23 Feb 2019 08:33:04 -0800 (PST)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -2.601
X-Spam-Level:
X-Spam-Status: No, score=-2.601 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, RCVD_IN_DNSWL_LOW=-0.7, RCVD_IN_MSPIKE_H2=-0.001, SPF_PASS=-0.001, URIBL_BLOCKED=0.001] autolearn=ham autolearn_force=no
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id eevBj8RfVsa2; Sat, 23 Feb 2019 08:33:02 -0800 (PST)
Received: from mx0a-00191d01.pphosted.com (mx0a-00191d01.pphosted.com [67.231.149.140]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id 416A8128766; Sat, 23 Feb 2019 08:33:02 -0800 (PST)
Received: from pps.filterd (m0049295.ppops.net [127.0.0.1]) by m0049295.ppops.net-00191d01. (8.16.0.27/8.16.0.27) with SMTP id x1NGPBuH046168; Sat, 23 Feb 2019 11:33:01 -0500
Received: from alpi155.enaf.aldc.att.com (sbcsmtp7.sbc.com [144.160.229.24]) by m0049295.ppops.net-00191d01. with ESMTP id 2qu31bemvq-1 (version=TLSv1.2 cipher=ECDHE-RSA-AES256-GCM-SHA384 bits=256 verify=NOT); Sat, 23 Feb 2019 11:33:01 -0500
Received: from enaf.aldc.att.com (localhost [127.0.0.1]) by alpi155.enaf.aldc.att.com (8.14.5/8.14.5) with ESMTP id x1NGX01F027273; Sat, 23 Feb 2019 11:33:00 -0500
Received: from zlp27127.vci.att.com (zlp27127.vci.att.com [135.66.87.31]) by alpi155.enaf.aldc.att.com (8.14.5/8.14.5) with ESMTP id x1NGWpTD027076; Sat, 23 Feb 2019 11:32:55 -0500
Received: from zlp27127.vci.att.com (zlp27127.vci.att.com [127.0.0.1]) by zlp27127.vci.att.com (Service) with ESMTP id 1D67F4048B45; Sat, 23 Feb 2019 16:32:51 +0000 (GMT)
Received: from MISOUT7MSGHUBAF.ITServices.sbc.com (unknown [130.9.129.150]) by zlp27127.vci.att.com (Service) with ESMTPS id F40974048B4A; Sat, 23 Feb 2019 16:32:50 +0000 (GMT)
Received: from MISOUT7MSGUSRDE.ITServices.sbc.com ([169.254.5.22]) by MISOUT7MSGHUBAF.ITServices.sbc.com ([130.9.129.150]) with mapi id 14.03.0435.000; Sat, 23 Feb 2019 11:32:50 -0500
From: "BRUNGARD, DEBORAH A" <db3546@att.com>
To: Roland Bless <roland.bless@kit.edu>, Warren Kumari <warren@kumari.net>, The IESG <iesg@ietf.org>
CC: "tsvwg-chairs@ietf.org" <tsvwg-chairs@ietf.org>, "tsvwg@ietf.org" <tsvwg@ietf.org>
Thread-Topic: [tsvwg] Warren Kumari's Discuss on draft-ietf-tsvwg-le-phb-09: (with DISCUSS and COMMENT)
Thread-Index: AQHUyUAEdpZJCyHpGU+YgDrombg8eqXqrsuAgAFHxbCAAaD+gP//+xoQ
Date: Sat, 23 Feb 2019 16:32:49 +0000
Message-ID: <F64C10EAA68C8044B33656FA214632C89EF7B8F6@MISOUT7MSGUSRDE.ITServices.sbc.com>
References: <155068297765.31474.15865784466149137006.idtracker@ietfa.amsl.com> <72b082d6-6d8b-5b3d-ee5e-52e5a333aacd@kit.edu> <F64C10EAA68C8044B33656FA214632C89EF79DEE@MISOUT7MSGUSRDE.ITServices.sbc.com> <f38b43e8-d300-f44f-1f84-f7652e4f36e2@kit.edu>
In-Reply-To: <f38b43e8-d300-f44f-1f84-f7652e4f36e2@kit.edu>
Accept-Language: en-US
Content-Language: en-US
X-MS-Has-Attach:
X-MS-TNEF-Correlator:
x-originating-ip: [135.70.216.9]
Content-Type: text/plain; charset="utf-8"
Content-Transfer-Encoding: base64
MIME-Version: 1.0
X-Proofpoint-Virus-Version: vendor=fsecure engine=2.50.10434:, , definitions=2019-02-23_10:, , signatures=0
X-Proofpoint-Spam-Details: rule=outbound_policy_notspam policy=outbound_policy score=0 priorityscore=1501 malwarescore=0 suspectscore=0 phishscore=0 bulkscore=0 spamscore=0 clxscore=1015 lowpriorityscore=0 mlxscore=0 impostorscore=0 mlxlogscore=999 adultscore=0 classifier=spam adjust=0 reason=mlx scancount=1 engine=8.0.1-1810050000 definitions=main-1902230125
Archived-At: <https://mailarchive.ietf.org/arch/msg/tsvwg/pSFJAqrsO0MWVbrH6qekLHpe6yI>
Subject: Re: [tsvwg] Warren Kumari's Discuss on draft-ietf-tsvwg-le-phb-09: (with DISCUSS and COMMENT)
X-BeenThere: tsvwg@ietf.org
X-Mailman-Version: 2.1.29
Precedence: list
List-Id: Transport Area Working Group <tsvwg.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/tsvwg>, <mailto:tsvwg-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/tsvwg/>
List-Post: <mailto:tsvwg@ietf.org>
List-Help: <mailto:tsvwg-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/tsvwg>, <mailto:tsvwg-request@ietf.org?subject=subscribe>
X-List-Received-Date: Sat, 23 Feb 2019 16:33:05 -0000

Hi Roland,

On your comment: 
"In former times P2P file sharing traffic was throttled by some ISPs without telling the users. The danger is that the same thing happens with remarking traffic as LE, so IMHO the user should be informed at least that traffic is downgraded. Maybe consent is too strong, so I propose to delete "consent", but stay with "without knowledge of the user" or I will rephrase it accordingly. However, it's still a SHOULD NOT only."

I can not comment on what some ISPs do and what is in their service contracts. I am fine with this as a "SHOULD NOT". I am not fine with saying anything about what a service operator needs to do regarding a service contract. IETF hasn't in the past made these statements (btw - ITU-T does not touch this either). Hint: I don't think pointing to this RFC will help you.

As Brian suggested, just keep the first part of the sentence.

Thanks!
Deborah


-----Original Message-----
From: Roland Bless <roland.bless@kit.edu> 
Sent: Saturday, February 23, 2019 6:30 AM
To: BRUNGARD, DEBORAH A <db3546@att.com>; Warren Kumari <warren@kumari.net>; The IESG <iesg@ietf.org>
Cc: tsvwg-chairs@ietf.org; tsvwg@ietf.org
Subject: Re: [tsvwg] Warren Kumari's Discuss on draft-ietf-tsvwg-le-phb-09: (with DISCUSS and COMMENT)

Hi Deborah,

On 22.02.19 at 18:14 BRUNGARD, DEBORAH A wrote:
>> The main idea is that applications/users decide what traffic should go to the "background", i.e., which packet are marked as LE (end-to-end argument as hint: the >network lacks usually the application knowledge).
> 
> I'll take the opportunity to jump in here😊
> 
> This was my comment, I was confused, as there's a couple of places in this document which infer much more than previous RFCs on what a "user" can do vs. what a network operator can do. In my comment, I noted the sentence:

Sorry, for causing confusion :-)
I was trying to answer the IESG comments one by one and didn't arrive at yours yet, so I also jump in.

> "However, non-LE traffic (e.g., BE traffic) SHOULD NOT be remarked to 
> LE on a regular basis without consent or knowledge of the user."
> 
> I scanned other RFCs, I don't see this requirement that an operator needs to have the consent/knowledge of the user before remarking? Suggest simply dropping the "without consent..." from the sentence.

Your impression is probably right that this is not really consistent, because some of the text stems from RFC 3662 and some was added within this I-D.
At the time of RFC 3662, the view was probably more toward: LE is mainly a tool for network operators.
Yes, it is, but it's also a different question _who_ is actually deciding what traffic is classified as LE. In the light of net neutrality debates, it would be fair if the user classifies its traffic as LE if it is eligible and I find it reasonable that providers should be transparent: if they use LE as tool and downgrade users' traffic, they should say so, e.g., inform the user that they downgrade under certain conditions.

In former times P2P file sharing traffic was throttled by some ISPs without telling the users. The danger is that the same thing happens with remarking traffic as LE, so IMHO the user should be informed at least that traffic is downgraded. Maybe consent is too strong, so I propose to delete "consent", but stay with "without knowledge of the user" or I will rephrase it accordingly. However, it's still a SHOULD NOT only.

> And the sentence in the abstract "Ideally, applications mark their packets as LE traffic, since they know the urgency of flows." You answered Warren "The main idea is that applications/users decide what traffic should go to the "background", i.e., which packet are marked as LE (end-to-end argument..". This is very confusing as it contradicts other RFCs where marking/re-markings are tools for a network operator. 

Besides the net-neutrality argument, the e2e argument is another good reason to only let user decide, what should go into this class. The user cannot harm the network this way, so there is no reason for the Diffserv domain to distrust this marking coming from the end-system.
For other Diffserv PHBs this IS different, because they are elevated services (i.e., better than best-effort): a Diffserv domain should either do the initial marking or at least apply policing at the ingress boundary nodes - otherwise QoS guarantees may be at risk; here the markings from end-systems cannot be trusted at least policing is required that may include re-marking. So for the EF PHB for example, admission control and policing are essential.

> It directly contradicts RFC8325/section 5.4:
> "An alternative option to mapping is for the administrator to treat the wireless edge as the edge of the Diffserv domain and explicitly set (or reset) DSCP markings in the upstream direction according to administrative policy.  This option is RECOMMENDED over mapping, as this typically is the most secure solution because the network administrator directly enforces the Diffserv policy across the IP network (versus an application developer and/or the developer of the operating system of the wireless endpoint device, who may be functioning completely independently of the network administrator)."

Yes, that's exactly what I explained in the preceding text above:
normally a Diffserv domain must strictly protect its network at the boundary.

> I recognize this RFC maintains "no harm" saying "There is no incentive for DS domains to distrust this initial marking, because letting LE traffic enter a DS domain causes no harm.  Thus, any policing such as limiting the rate of LE traffic is not necessary at the DS boundary." I'm a bit nervous on that assumption, I think most operators would agree with Warren's title, "hysterical raisins"😊 Can IETF really maintain (this is PS), "no worries"?

Maybe I don't get the point. Under the assumption that this LE traffic would have been injected as normal default BE traffic otherwise, I don't see any negative consequences for the provider. It is a different thing if the user would refrain from injecting this traffic, because he/she wants to really only transmit this as background/scavenger traffic.
But compared to the alternative that this traffic would traverse the domain as BE traffic otherwise, I would confirm the "no worries"
property.

Best regards,
 Roland

> -----Original Message-----
> From: iesg <iesg-bounces@ietf.org> On Behalf Of Bless, Roland (TM)
> Sent: Thursday, February 21, 2019 10:04 AM
> To: Warren Kumari <warren@kumari.net>; The IESG <iesg@ietf.org>
> Cc: David Black <david.black@dell.com>; tsvwg-chairs@ietf.org; 
> tsvwg@ietf.org
> Subject: Re: Warren Kumari's Discuss on draft-ietf-tsvwg-le-phb-09: 
> (with DISCUSS and COMMENT)
> 
> Hi Warren,
> 
> Am 20.02.19 um 18:16 schrieb Warren Kumari:
>> ---------------------------------------------------------------------
>> -
>> DISCUSS:
>> ---------------------------------------------------------------------
>> -
>>
>> I believe that this should be trivial DISCUSS to address, but I 
>> thought it important enough to warrant it. I'm OK with basically 
>> whatever you answer, I just wanted to make sure this had been seen and considered.
>>
>> "An LE PHB SHOULD NOT be used for a customer’s "normal Internet"
>>    traffic nor should packets be "downgraded" to the LE PHB instead of
>>    being dropped, particularly when the packets are unauthorized
>>    traffic.  "
> 
> This was actually directly copied from RFC 3662.
> 
>> Great, sounds good to me -- but in the USA at least, there is are 
>> many cell phone plans which are "unlimited", but after some amount of 
>> traffic (e.g 22GB) your connection gets throttled to a lower data 
>> rate. Is this traffic still 'a customer's "normal Internet" traffic"?
>> Is it appropriate (whatever that means) to downgrade this traffic to 
>> the LE PHB? I understand not wanting to touch this issue with  a 10 
>> foot pole (and I don't know what the right answer is!), but you *did* 
>> open this can of worms by talking about what classification user traffic should have.
>>
>> Note: I'm happy to clear my DISCUSS no matter what the answer is, I 
>> just want to make sure it has been considered / discussed.
> 
> The main idea is that applications/users decide what traffic should go to the "background", i.e., which packet are marked as LE (end-to-end argument as hint: the network lacks usually the application knowledge).
> Operators must have good reasons to deliberately downgrade users' normal traffic. In case of throttled traffic, this would still be considered as being normal BE traffic. One case for downgrading BE traffic could be non-admitted multicast replication traffic as described in RFC 3754.
> 
>> ---------------------------------------------------------------------
>> -
>> COMMENT:
>> ---------------------------------------------------------------------
>> -
>>
>> Major:
>> "Some network providers keep link utilization below 50% to ensure 
>> that all traffic is forwarded without loss after rerouting caused by 
>> a link failure (cf.Section 6 of [RFC3439]).  LE marked traffic can 
>> utilize the normally unused capacity and will be preempted 
>> automatically in case of link failure when 100% of the link capacity 
>> is required for all other traffic. " Yup - very true. But I think it 
>> needs to be mentioned that the provider will need to upgrade their 
>> monitoring / management system so that they can see the traffic lass. 
>> If they monitoring circuit utilization using e.g interface counters 
>> (and not by traffic class), a link may have 1% "real" traffic and 90% 
>> LE traffic, and it will look like it it 91% "full". I don't have any 
>> suggested text to address this (and this is just a comment, so "well, 
>> duh, they should know that anyway!" is a fine
>> answer.)
> 
> Thanks for the hint, valid point, but indeed: if they use Diffserv, they should also monitor the resource shares for each PHB individually.
> 
>> Nits:
>> "A main problem is that multicast" -- I'm not sure you can say "A 
>> main" - main implies singular.; I'd suggest "The main" or "A major".
> 
> Right.
> 
>> "However,using the Lower Effort PHB for multicast requires to pay 
>> special" -- "requires paying"...
> 
> Done.
> 
> Regards
>  Roland
>