Skip to main content

Minutes IETF101: tsvwg
minutes-101-tsvwg-00

The information below is for an old version of the document.
Meeting Minutes Transport and Services Working Group (tsvwg) WG Snapshot
Date and time 2018-03-22 18:10
Title Minutes IETF101: tsvwg
State Active
Other versions plain text
Last updated 2018-04-02

minutes-101-tsvwg-00
DRAFT - to be checked against audio archive.

IETF 101, TSVWG Meeting Minutes
Chairs: Gorry Fairhurst, David Black, and Wes Eddy.

Thanks to Richard Scheffenegger and Paul Congdon for assistance in taking notes.

1550-1750  Afternoon Session II

1. Chairs Update:

  Status of published RFCs since Singapore include; 8260, 8261, 8311 and 8325.
  Two drafts are expected to be submitted to IESG.  These include SCTP errata
  and DSCP IANA process changes.  We expect 5 drafts to go to WGLC.  There are
  7 other WG drafts that are in progress; SCTP NAT, a set of L4S, UDP options,
  Tunnel congestion feedback and Datagram PLPMTUD.  There will be 2 related
  drafts discussed that are on the TSVWG agenda.  There are 3 drafts not on the
  TSVWG agenda.  In the INTAREA WG there are 3 drafts that are related; tunnel
  MTU, fragmentation and SOCS v6.

  Milestone updates and review of WG Progress: Feedback on
  draft-ietf-tsvwg-tunnel-congestion-feedback Update on ecn-encap-guidelines

  SCTP NAT draft should be ready for WGLC at/after the Montreal meeting, so
  October is a good new milestone date for it.  Confirmed by Michael Tuexen.

  Tunnel Congestion Feedback - Bob Briscoe reported that Donnald Eastlake and
  Andy Malis have become interested in using this for Service Function Chaining
  (SFC). They were pointed to this for load balancing across service functions,
  and want to help.

2. Announcements and Heads-Up

2.1 Liaisons

2.2 Other Drafts Related to TSVWG
    draft-olteanu-intarea-socks-6 (For info - Please discuss on INTAREA list)
    draft-saldana-tsvwg-simplemux (For info - Please discuss on TSVWG list)
    draft-herbert-fast (For info - Please discuss on TSVWG list)
    draft-han-tsvwg-cc (For info - Please discuss on TSVWG list)

3. Transport and Network

3.1 Gorry Fairhurst: IANA Action for DSCP Pools
    draft-ietf-tsvwg-iana-dscp-registry (In WGLC)

Spencer Dawkins (as AD):
  (regarding discussion about shortening the name of the draft)
  The current name is meaningful, it is ok.

Roland Bless:
  Replace last part with "requires IANA actionÓ.

Bob Briscoe:
  When you say there will not be any negative impact, is there no private
  use of this pool of DCSPs?
Gorry Fairhurst (as author):
  The purpose of publishing this is to ensure people know the change.
  I donÕt think existing use is harmful, but there is a change, people
  using local use DSCPs should already be aware that they may be
  used by others.

Spencer Dawkins:
  If those networks using the local DSCP, don't they shoot themselves
  in the foot when DSCPs are moved to standard?
Gorry Fairhurst (as author):
  They should not if they adhere to diffserv specs.
David Black:
  Diffserv behaves best with perfect configuration at the diffserv perimeter.
Spencer Dawkins:
  I look forward to shepherd writeup, that should call attention to
  any possible impacts.
Roland Bless:
  Should not be a big issue, as there was a indication these DSCPs (xxxx01)
  were ready marked as possible use for future standards action.
  Local remapping is always possible.

3.2 Roland Bless: Lower Effort PHB
    draft-ietf-tsvwg-le-phb

David Black:
  (Asks for any final feedback on the decision to allocate the DSCP).
   I see no objection to use of codepoint 000001 as the recommendation
   here for the LE PHB (to be confirmed on list).
Bob Briscoe:
  Text current says:
  With respect to the use of LE traffic by different styles of congestion
  control. The text says you don't want to harm people, you shouldn't
  harm others traffic.
  I think this text should  describe what happens if there would be harm.
Gorry Fairhurst (from the floor):
  I prefer an approach that says SHOULD use a less than best effort
  congestion control (e.g., LEDBAT) and explain why this is really desirable.
  That is, if you donÕt, there may  be unwanted or unexpected interaction
  with other traffic. That would be better guidance. I (personally)
  would be reluctant to use MUST, but really IÕd like to see people do this.
David Black:
  From an operator perspective SHOULD vs MUST irrelevant, an operator
  has to defend the service regardless of RFC.
Bob Briscoe:
  The text just doesn't make sense in the current wording, whether LE traffic
   is going to do harm should be written clearly.
David Black:
  The operator concern is not for a singular flow, but for the aggregate.
Gorry Fairhurst:
  Bob, please send example text to list, to help find better wording
  Bob will send text about whether use of a less than best effort transport
  (e.g. LEDBAT) ought to be a MUST or SHOULD requirement for use of the LE PHB,
  and David will comment on this.

Tunneling:
David Black:
  Recommend not updating the document about 802.11 mapping, it is pretty
  clear this new DSCP maps on WiFi.
Roland Bless:
  The ID with guidance on WebRTC (in RFC-Ed queue) needs to be updated. This
  ID discussed CS1 and that advice will become obsolete.

Spencer Dawkins (as AD):
  Updating a draft in the RFC Editor queue, is possible to change to the
  new recommended DSCP.
  I will drop note to RFC Editor, and ask how best to do this.
Gorry Fairhurst:
  The Chairs should let WEBRTC people know of the consensus here.
  We will let the IETF and W3C RTCWEB/WEBRTC groups know
  and recommended the DSCP change.

3.3 Anais Finzi: Priority Switching Scheduler
    draft-finzi-priority-switching-scheduler

(After discussion with the authors this is headed to the Independent Submission
Editor, with inputs from TSVWG.)

The scheduled talk did not occur in Singapore.  The hoal is to make the AF Class
more predictable.  This scheme changes the priority of the traffic based on
credit thresholds.

Roland Bless:
  Is EF not impacted? Not quite sure about that conclusion.
  EF has definition of an error term.
Anais Finzi:
  In our simulations we didn't see any impact.
  The maximum impact is at the maximum frame size.
Roland Bless:
  I will check the paper, thanks.
David Black:
  Roland volunteered as a reviewer of draft.
Ruediger Geib:
  This proposal would remove the req'd policer on the EF class.
  Would this conflict with RFC3246?
(unknown):
  Ao far, the IETF did not specify any schedulers.
  My question is: Is this standard track?
David Black:
  No. This is heading for an Independent Submission.
Ruediger Geib:
  I am not sure if I want to have that scheduler on a 100G link.
  I can review the draft/paper, but I'm not an expert on scheduling.
Roland Bless:
  Early to configure? To set these 3 parameters...
  Paper shows how to translate the current config into the corresponding
  set of settings in PSS. This can be simplified by removing some, but not
  optimal.

Roland Bless and Ruediger Geib agreed to review the draft, and David will
send an announcement to the list requesting other reviews.

3.4 Datagram Path Layer Path MTU Discovery
  Tom Jones  : Datagram PLPMTUD

David Black:
  Have you looked at the draft in INTAREA on PTB signals?
Tom:
  Yes, we have read and sent a few comments, this does not conflict.

Michael Tuexen:
   SCTP can do verification, not just on the 5-tuple.

Matt Mathis:
  I will read this draft. The impact of authenticating messages
  from the network is much broader than just PMTUD. It is good
  to check if there are new solutions. In the absence of authentication
  I agree that messages are just advisory. You have to be able to be
  able to tolerate bad cases.
Gorry Fairhurst:
  What about bad information in a PTB message?
  Are you saying there can be an advertised link MTU much smaller than
  the actual path MTIU?
Matt Mathis:
  There were DOS attacks trying to reduce the PMTU.
  We also did see cases where the two MTU bytes were swapped.
  ??? Jumbo discovery, buffer nic

Magnus Westerlund:
  It is very important to make this robust.
  I will review this draft.
Michael Tuexen:
  When working with SCTP we found a middlebox that just gave
  some random number, instead of the VTAG.
Eric (Akamai):
  We have been running into a wide range of MTU issues.
  This is a nice optimization. How does it interact with load balancers?
  This is important work.
Tom:
  The method only takes PTB as advisory, we plan in the next revision
  to add a probe method to verify if the actual PMTU is larger than the
  advertised link MTU.
Gorry Fairhurst (as author):
  Please tell us about these issues.
  Load balancing (i.e., use of more than one PMTU) was one motivation
  for making it robust - we want to get this part right. For this, we
  need some tales of what actually happens in the wild - please talk to us?

???
David Black:
  How does this work relate to the transport work in QUIC?
Spencer Dawkins (as AD):
  I hope we can make progress on using this in QUIC, although the starting
  point may be for QUIC to pick a PMTU number at first and just fallback
  if this fails to be supported by the path.
  We know PMTU using ICMP is broken. Anything that is doing this better
   seems like a good thing.
Lars Eggert (as QUIC Chair):
  Most current QUIC implementations do something very simple,
  a basic test/fallback. Having a functional PMTUD is not strictly required.
  If this scheme is not too complex, some implementers might try this.
  After we do a v1 of the QUIC spec, we will do v1.1 shortly after.
  This might go into v1.1 or v2.
David (shows the state machine).
Gorry Fairhurst (as author): Actually the full algorithm has many states
  but once we have this, we can profile a simpler algorithm for
  applications that do not need this.
Tom Jones:
  There are two parts needed: First we need some small paragraphs in this
  TSVWG ID to describe requirements and features of each protocol.
  This should be straightforward for the use of QUIC, there is some text
  there already. Review by a QUIC subject matter expert would be great.
  This would make sure nothing is inconsistent is in this draft.
  - We can also help with the actual text for how to implement this
  in a QUIC transport - and that could be in a QUIC WG draft.
David Black:
  I would like QUIC to be upwards compatible with this.

Michael A:
  Talking of Jumbo frames, my conclusion, is we all need this.
  Network operators should support PMTUD, but they often do not.
  TCP still works if network gear is in properly configured.
  Should this become a BCP? Saying we ought to do this?
David Black:
  Plausible with much more experience. Qualitative useful, so
  that the BCP is correct.
Michael A:
  I also want some telemetry, something that tells me this has gone
  active, to help me for troubleshooting.
Tom: An entry in the syslog?
Michael A: Yes that sort of thing.
Spencer Dawkins:
  A BCP - implies more running code, more experience is right.
Eric Akamai:
  There is currently a risk that we don't get to a state that is good and so
  the endpoint remains in a very bad state - just like clamping MSS low
  enough that it is bound to work, but way smaller than optimal.
  If we do not add this as a default, then jumbo frames are never going to
  happen.

Michael A:
  I am most interested in making this work, and logging the event.
  I don't want to give a bad experience to customers when probes failing
  and impact their traffic. I do want Blackhole detection.
Michael Tuexen:
  There are differences when using PLPMTUD with TCP. TCP uses probe packets
  that carry user data, this changes retransmission and the CC state. The TCP
  PLPMTUD is much more complex. In contrast, this datagram version here has
  the assumption this is done without using user data, so probe loss is not
  something that impacts CC or retransmission/repair logic.

??? Timescale ???

3.5 Bob Briscoe: ECN transport
    draft-ietf-tsvwg-rfc6040update-shim

(This draft is now ready for WGLC, and will be WGLCÕed with the second encaps
draft)

Tom Herbert:
  Are there any IETF shims that got it right?
  All have their own issues. If you do it when you first design it,
  it is easy.
Bob (points to table slide).
Philip Eardley:
  Let's make this a management problem. My view ECN is an inter-operator thing.

3.6 Bob Briscoe: ECN & L4S
    draft-ietf-tsvwg-ecn-l4s-id
    draft-ietf-tsvwg-l4s-arch
    draft-ietf-tsvwg-aqm-dualq

(Bob presented slides on L4S. No comments or questions from the WG).
(Bob presented a new individual draft on diffuser and L4S.)
  There were no comments or questions from the WG. This draft would be
  discussed in Montreal, to see if there was interest in this work.

4. Other presentations / New Work

4.1 Paul Congdon: Congestion Isolation in IEEE 802.1

Paul outlined proposed work in IEEE 802 on providing layer 2 congestion support
to switches and the possible interactions with other methods.
The IEEE will be making a possible decision in July.

??? Missing feedback ???

Michael A:
  How does this relate to routers?
  How often is the xon/xoff transition?
Paul : This is casically propagation time, and a threshold.
Michael A:
  Can the hardware actually scale to high speed links and support back to back
  frames of the order of 1 microsec?
  Is is feasible to xon/xoff of 10-12 packets?
Paul:
  We think hardware can provide solutions.
Pat Thaler:
  When the xoff is received, there might not be a packet to be sent.
  Most implmenetations set xoff to maximum and count on xon.
  Send xoff on high thresh, and watermark at low threshold send xon.
Pat:
  That is not the way it's generally deployed.
Bob Briscoe:
  What is the trust model?
Paul:
  This targets a single admin domain, probably a data centre. One administrator.
  Have you considered virtual queues, instead of thresholds for triggering?
  A virtual queue slows you down before you have to buffer. I know
  Broadcom/CISCO chipsets can utilise this.

Sowmini Varadhan:
  We don't like PFC, ECN mostly works. If E2E ECN works, this is not that
  important.
Mirja Kuehlewind:
  Congestion comes up if multiple flows share the same queue.
  How does the switch get to the bad flow?
Paul:
  Same way as an ECN mark for the offending flows.
  Probabilistically the signal should reach the correct source.
Richard:
  Is there granularity of flow detection, can other flows also get stuck into
  the same congested queue?
Paul:
  Yes, we are aware of this.

1750-1810  Beverage Break

1810-1910  Afternoon Session III

5. Transport Protocols and Mechanisms

5.1 Vincent Roca: FEC drafts
    draft-ietf-tsvwg-fecframe-ext
    draft-ietf-tsvwg-rlc-fec-scheme

  (These drafts are now ready for WGLC, reviewers are needed.)
  There were no comments on the final drafts.

  The chairs will look for volunteer reviewers, and will cross-post
  review requests to the IRTF NWCRG.

??? Missing outcome ???

5.2 Joe Touch: UDP Options (pricy by Gorry Fairhurst)
    draft-ietf-tsvwg-udp-options

??? Missing feedback ???

Tom Jones:
  Is there going to be more text to explain the options?
No, this is the January draft; int-area might be the better audience. Joe needs
revise draft to include the presentation.

5.3 Tom Jones: UDP Options Implementation

??? Missing feedback ???

Gorry Fairhurst:
  Joe Touch is willing to look at different sizes of checksums, should the
  TSVWG think that is useful.
Tom Jones:
  A 16 bit checksum is one less line of code, less code  and standard algorithms
  are good.
Gorry Fairhurst: Please follow-up with Joe on the list.

5.4 Michael Tuexen: RFC4960 Errata
    draft-ietf-tsvwg-rfc4960-errata

  (This talk presents updated following WGLC.)

Gorry Fairhurst:
   You note a change to the CRC32c definition. This if often referred to by
   other groups. What changed?
Michael Tuexen:
   This change is to fix code typos by changing definition to make it compile
   on all platforms, it is not an algorithmic change to the CRC32c itself.

  There were no further comments from the room. People are encouraged
  to check the corrections and report any issues to the list.

  The current version can now continue or AD review and IESG LC.

5.5 Michael Tuexen: SCTP NAT
    draft-ietf-tsvwg-natsupp

 There were no comments in the room. The authors have noted the new milestone
 and expect to work on this ID for the Montreal IETF meeting.

5.6 Gorry Fairhurst/Colin Perkins: Impact of Transport Header Encryption
    draft-fairhurst-tsvwg-transport-encrypt

Matt Mathis:
  Are you interested in speculation about what might happen?
  Could we propose one generic transport-agnostic header, that indicates
  embedded OAM across multiple transports?
  This would be useful for debugging and a partial solution to some issues.

  There are also issues relating to equipment that the stakeholders
  do not wish to tell people about - this makes it tricky.
  It may seem that some tools are duplicated, or other ways can be used to
  measure the network path, but people do want to have multiple tools to
  check the answer to the same question. This is needed so they can
  be sure what is actually happening.
  In-band OAM might be interesting as one of these approaches.
Gorry Fairhurst:
  This seems like something that is already possible in some networks,
  (GTP) but I agree this is interesting to find out more about, please
  tell us about this as ID editors.
Matt Mathis:
  OK, I think we should look more at a generic instrumentation shim.
Hannes Tschofennig:
  How much feedback have you had from operators and equipment manufacturers?
  I worked with operations and insight was often very hard to come by.
  On a different topic, tools based on machine learning are possible
  but can be problematic, as even more data was required.
Gorry:
  We received good feedback from many operators off-list. A key problem is
  knowing who needs what operational information. Very often transport
  information is used by people to debug equipment/configuration issues - to
  understand anomalies/health etc, and organisations as a whole do not
  care about content, only specific people need this.
  We are looking still for more people to provide feedback
Hannes Tschofennig:
  DDOS mitigation techniques are important, some rely on machine learning.
  Some approaches suffer more from encryption than others.
Gorry Fairhurst:
  True.
Colin Perkins (author):
  Think this is a interesting discussion. It would be wonderful to have
  a measurement shim. We would be interesting to look at different approaches.

Brian Trammel:
  The IPPM WG did publish an instrumentation shim, for replacing timestamp
  and IP ID in IPv4 networks. This use is not applicable in public Internet.
  This can be better than passive TCP monitoring.
  Some discussions in QUIC will drive us on different designs in this space.
  As a framing document, this ID should be adopted.
Al Morton:
  This provides a good view of what encryption has changed from the transport
  side. This is a useful scope. When encryption has costs, adding shims
  definitely adds very real costs too. It would be useful to quantify the
  complexities that are added here. I am happy to read the next revision of the
  draft.

Question on adoption:
??? Chair ???

Brian Trammel:
  I have a suggestion, we should aim at consensus on this one.
  By scoping to the transport layer, we may get around this.
  Adoption now, or in Montreal: I'm happy with both.
Colin Perkins (author):
  Things are not going to get better. QUIC is going to be deployed,
  and is using these kind of headers.
  At this time the bits that are exposed in QUIC are still changing, it is not
  fully stabilized yet, we need to understand these tradeoffs.

??? Missing Chairs comments ???

End of meeting.