Re: [Last-Call] Opsdir last call review of draft-ietf-quic-manageability-14

[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]

 



Hi Al, Lucas, all,

I think I’ve distilled down this thread into two PRs: https://github.com/quicwg/ops-drafts/pull/466 on “recommendation” language generally, and https://github.com/quicwg/ops-drafts/pull/467 rephrasing recommendations not to switch on version into an analysis of the tradeoffs (thanks Lucas for your help with these!). Please have a look and let me know whether those resolve this discussion.

Thanks, cheers,

Brian

On 28 Mar 2022, at 16:46, MORTON JR., AL <acmorton@xxxxxxx> wrote:

Hi Lucas, 
There seems to be a persistent indent at the points where I replied, so look for acm2.
Al
 
From: Lucas Pardue <lucaspardue.24.7@xxxxxxxxx> 
Sent: Friday, March 25, 2022 11:59 AM
To: MORTON JR., AL <acmorton@xxxxxxx>
Cc: Gorry Fairhurst <gorry@xxxxxxxxxxxxxx>; Brian Trammell (IETF) <ietf@xxxxxxxxxxx>; ops-dir@xxxxxxxx; Paul Vixie <paul@xxxxxxxxxxx>; last-call@xxxxxxxx; draft-ietf-quic-manageability.all@xxxxxxxx; Mirja Kuehlewind <mirja.kuehlewind@xxxxxxxxxxxx>; QUIC WG <quic@xxxxxxxx>
Subject: Re: Opsdir last call review of draft-ietf-quic-manageability-14
 
Hey Al,
 
Response in line

 

On Fri, 25 Mar 2022, 16:26 MORTON JR., AL, <acmorton@xxxxxxx> wrote:
Hi Lucas, response below.
 
From: Lucas Pardue <lucaspardue.24.7@xxxxxxxxx> 
Sent: Wednesday, March 23, 2022 8:02 PM
To: MORTON JR., AL <acmorton@xxxxxxx>
Cc: Gorry Fairhurst <gorry@xxxxxxxxxxxxxx>; Brian Trammell (IETF) <ietf@xxxxxxxxxxx>; ops-dir@xxxxxxxx; Paul Vixie <paul@xxxxxxxxxxx>; last-call@xxxxxxxx; draft-ietf-quic-manageability.all@xxxxxxxx; Mirja Kuehlewind <mirja.kuehlewind@xxxxxxxxxxxx>; QUIC WG <quic@xxxxxxxx>
Subject: Re: Opsdir last call review of draft-ietf-quic-manageability-14
 
Hi,
 

Responses in line (from a chair that's been quietly observing)

On Wed, 23 Mar 2022, 21:38 MORTON JR., AL, <acmorton@xxxxxxx> wrote:
goto end
> -----Original Message-----
> From: Gorry Fairhurst <gorry@xxxxxxxxxxxxxx>
> Sent: Wednesday, March 23, 2022 6:27 AM
> To: Brian Trammell (IETF) <ietf@xxxxxxxxxxx>; MORTON JR., AL
> <acmorton@xxxxxxx>
> Cc: ops-dir@xxxxxxxx; Paul Vixie <paul@xxxxxxxxxxx>; last-call@xxxxxxxx;
> draft-ietf-quic-manageability.all@xxxxxxxx; Mirja Kuehlewind
> <mirja.kuehlewind@xxxxxxxxxxxx>; quic@xxxxxxxx
> Subject: Re: Opsdir last call review of draft-ietf-quic-manageability-14
> 
> On 23/03/2022 11:00, Brian Trammell (IETF) wrote:
> > Hi Al,
> >
> > (Snipping a bit of context)
> >
> >> On 22 Mar 2022, at 20:51, MORTON JR., AL <acmorton@xxxxxxx> wrote:
> >>
> >>>> In other words, the set of wire image features that can cause
> >>>> differential treatment in an operator's network is equal to the set of
> >>>> wire image features that are freely observable by that operator.
> >>> see above. there are many reasons a network operator would look at her
> >>> packets in order to diagnose problems not of her making.
> >>>
> >>> --
> >>> P Vixie
> >> [acm]
> >>
> >> I think Paul is on the right track with this last sentence. There are
> several limiting assumptions in this thread about operator activities:
> >>
> >> + mid-path observations are only one of many ways to contribute to network
> management. Launching QUIC connections from hosts under operator control is
> another. Successful QUIC analysis seems to require different methods than with
> TCP, and that's fine.
> > This is entirely missing; indeed, the document treats active measurement
> techniques (which I think are quite promising for management of encrypted
> transports) as implicitly out of scope. I’m not sure it makes sense to expand
> the scope of this doc (intended as a user’s guide to the wire image) in last
> call, but perhaps we should add text to make this scope explicit.
> >
> >> + the "operator that wants to support QUIC" case seems to be an unexpected
> role (so far). It would be useful to embrace this case in the manageability
> draft, IMO.
> > The disconnect in this thread, I think, is related to how large we think the
> set of useful passive measurement actions requiring access to data not in the
> wire image is. I think that most of these tasks are things we think are useful
> with analogy to TCP, because we are *so used* to debugging TCP dynamics that
> we have unseen biases toward doing things that way. Indeed, I think the actual
> set tends toward empty, in part due to the (theoretical, perhaps tautological,
> but not at all meant as a straw man dismissal, apologies as it came off as
> such) analysis that the wire image you can see to troubleshoot is the same
> wire image your devices can see to break things.
[acm] 
The context of this point is only 10 lines away, but it seems it was quickly overlooked.
The "operator that wants to support QUIC" doesn't want to break things. More below.


> >
> > It would be interesting to dig into specifics to see how wrong I am. I’m not
> sure that’s in scope *this* document, though.
> >
> > Thanks, cheers,
> >
> > Brian
> 
> If it helps: One possible way to deal with could be to describe the
> scope within the QUIC WG for this document, and then note that there are
> other operations-related considerations around the sort of transport
> header confidentiality provided by QUIC and reference RFC 9065 as a list
> of some considerations in this space.
> 
> Trying to be helpful,
> 
> Gorry
> 

[acm] 
Multiple points here, thanks for continuing the discussion, friends. I'll try to be brief:

+ The scope limit that Brian is proposing PR#464 stops too short IMO, so:
        This document also focuses solely on network management
        practices that interact with traffic on the wire; replacement of
        troubleshooting based on observation with active measurement techniques, for
        example, is therefore out of scope.
ADD something like:
       Augmentation of passive observation using active measurement techniques, and simple 
       heuristics for management with observations at lower layers is for further study.
       <plus cite Gorry and Colin's RFC 9094, section 2.4 at least)
 
RFC 9094 seems like a typo, unless there's something about QUIC and switched optical networks I don't know
:-)
 
Regardless, speculating how people might choose to combine information about QUIC and other stuff doesn't strike me as super useful. We should just accept that it is given that the Internet and its management evolves. People can try to evolve that how they want given the things we do take the time to define.
 

+ The sentence above the PR#464 proposal:  

        This document therefore does not make any specific
        recommendations as to which practices should or should not be applied; 
        for each practice, it describes what is and is not possible with the 
     QUIC transport protocol as defined.

This might be pointing the way home for the "don't specify policy" objection/discussion.
Brian, you indicated that this text:
    ...purposes of network admission control should not rely on the version number
    field. Instead it is recommended to admit all QUIC traffic regardless...
is only a recommendation.

But the scope says your memo is not making recommendations on practices.
Network admission control is enforcement of policy. 

But it sounds like a version number is one of the few wire image features that the protocol designers deliberately revealed,  so when Section 4 of RFC 8558 recommends: 

   o  Anything exposed to the path should be done with the intent that
      it be used by the network elements on the path. ...

So, w.r.t. the wire image, the set of features that might support management "tends toward empty" but it's not zero and what's exposed might well be used by observers.
 
To my knowledge, nether QUIC v1 or the invariants (RFC 9000 and 8999 respectively) reference RFC 8558. So I would be very careful in inferring the what and how about the intention of the visible portions. The version is only carried in QUIC long packets and there are reasons for doing so that benefit QUIC. RFC 8999 goes so far as saying about the version field " This value can be used by endpoints to identify a QUIC version".
 
The space of definable versions is vast, and the possible behaviours between endpoints are large. Throw in also QUIC extensions that are not exposed in the wire image. These combine to limitless possibilities. Attempting predictions of behaviour based on version in a small part of the QUIC connection lifetime nets out as an insurmountable activity. What would observers hope to achieve? Use of version for any management is a game of whack-a-mole. 
 
Cheers
Lucas
[acm]
Given the case "operator that wants to support QUIC" we are discussing,
Whack-a-Mole is the worst-analogy-ever.
 
QUIC is for endpoints, so I don't really know what a operator that wants to support QUIC is supposed to do other than allow that traffic or try to an endpoint.
[acm2]
Try to *operate* an endpoint? Yes, exactly. If the operator sees the same symptoms as a user reported, then the trouble-shooting continue on that basis. This is virtually always the simplest first step: can we reproduce the issue? It’s easier than packet trace analysis.
 
For non-QUIC endpoints, conflating QUIC version fields with the behaviour of the QUIC protocol and/the QUIC connection flows is bad. There are too many variables, beyond the version, and within the encryption layer, that affect behavior. Under this context I'd stand by the analogy.
[acm2]
Sure, but the version field with a published specification might narrow the possibilities.
 
In the "operator that wants to support QUIC", no one holds a hammer and no one gets whacked.
 
But if you insist on this analogy, know that I lived on the New Jersey Shore for 65 years and spent a lot of time in arcades. I have friends and family who are absolute savants at Whack-a-Mole.
 
"don't specify policy" is a separate but overlapping issue.
Admission control is enforcement of policy. Don’t try to specify operator policy. Re-word the (wg consensus) statement concerning version numbers.
 
In that case, all I can suggest is to say fewer words. For exakple, converting the last para in section 2.8 to say only 
 
QUIC is expected to evolve rapidly, so new versions, both experimental and IETF standard versions, will be deployed on the Internet more often than with traditional Internet- and transport-layer protocols. Using a particular version number to recognize valid QUIC traffic is likely to persistently miss a fraction of QUIC flows and completely fail in the near future, and is therefore not recommended. Similarly, it is not recommended to use the version to distinguish QUIC traffic from non-QUIC traffic. Applying these suggestions could, for example, allow all QUIC traffic regardless of version, which in turn would support continious version-based evolution and avoid unnecessary delays for endpoints that wish to deploy new versions.
 
But I'm not sure if that actually addresses your point.
[acm2]
That’s mostly fine: the sentences with the phrase “not recommended” don’t follow (in IMO) the part of the scope that says:
 
        This document therefore does not make any specific
        recommendations as to which practices should or should not be applied; 
        for each practice, it describes what is and is not possible with the 
         QUIC transport protocol as defined.
 
and these could be re-worded as statements of fact/future direction.
 
The memo (scope) stops way-short of describing active management activities that have potential benefit, given the many intentional difficulties with passive observation that are present (with due respect to the management possibilities discussed in sections 3 and 4 of the memo). It would be good to summarize only the productive (passive) observations in a table or list for the intended audience.
The case "operator that wants to support QUIC" seems to have been under-represented during development (and it needs frequent reminders in this discussion).
And that’s one reason IETF has OPS-DIR Reviews.
 
We appreciate your review and feedback specially, and the wider IETF reviews in general. Thanks.
 
Cheers
Lucas

-- 
last-call mailing list
last-call@xxxxxxxx
https://www.ietf.org/mailman/listinfo/last-call

[Index of Archives]     [IETF Annoucements]     [IETF]     [IP Storage]     [Yosemite News]     [Linux SCTP]     [Linux Newbies]     [Mhonarc]     [Fedora Users]

  Powered by Linux