Minutes IETF120: maprg: Wed 16:30
minutes-120-maprg-202407241630-01
| Meeting Minutes | Measurement and Analysis for Protocols (maprg) RG | |
|---|---|---|
| Date and time | 2024-07-24 16:30 | |
| Title | Minutes IETF120: maprg: Wed 16:30 | |
| State | Active | |
| Other versions | markdown | |
| Last updated | 2024-08-30 |
maprg at IETF 120
Overview and Status - Mirja/Dave (5 min)
The introduction slides include some highlights of TMA'24 (June 23, 24
2024)
for IETF partipants, e.g., focusing on DNS, BGP, and L4S.
Heads-Up/ANRW talk: HTTP/3’s Extensible Prioritization Scheme in the Wild - Joris Herbots (5 mins) (in-person)
No questions/comments. See related paper (link in slides).
Peaking Beyond the Best Route: An Extensive Dataset for Looking Glasses - Pascal Hennen (15 mins) (remote)
- Wes Hardaker: How large is the collected data volume? How many
bytes?
Pascal Hennen: Roughly 2GB (for the most recent one), compressed
quite a lot.
Testing Protocols in Simulated Network Conditions - Tommy Pauly (10 mins) (in-person)
- Matt Mathis: How much work did you do to compare the simulations to
real measurements? - Tommy Pauly: used measurements to build profiles. We don't need to
have every single network represented, we just need to explore the
space so that we don't have a blindspot. -
Matt Mathis: (concurs)
-
Lorenzo Colitti: With proxies and VPNs, when we're using UDP,
session timeouts are short in some networks, so if all traffic is on
these proxies, we can never get rid of TCP. It would be nice to know
if the simulated environments can simulate that , and if we know how
low those timeouts are (based on real data). Keeping TCP around
forever means we can't use proxies foreverything; some things need
long-lived TCP connections outside the proxy. -
Tommy Pauly: Good point.
-
Stuart Cheshire: (comment about background motivation for such
simulations) Back more than 10 years, Apple developed AppleTV using
only wired ethernet in the office, and near time to ship, it was
discovered it didn't work in home environments. -
Chris Seal: Characteristics between 3G vs. 4G/5G are dramatically
different, can we break out "cell" to individual technologies. -
Tommy Pauly: sure.
-
Kouhei Ueno: How is the packet path simulated here?
- Tommy Pauly: I don't remember the details for the dummynet
implementation, but it's a great thing to discuss.
Watching Stars in Pixels: The Interplay of Traffic Shaping and YouTube Streaming QoE over GEO Satellite Networks - Jiamo Liu (15 mins) (remote)
-
Lorenzo Colliti: similar small network that freezes. Closes and
re-establishes TCP connections, so each ends back up in cold start.
YouTube probably reuses TCP connections, but even if you close them
you get worse. I don't know how to solve them, but blocking QUIC
just gets complaints about it. Presenting it is a first step to
getting people to understand that the quality of experience is not
great. -
Gorry Fairhurst: have you looked at talk about QUIC over high-BDP
paths? -
Jae Chung : In a long RTT high-BDP network, we see slow start being
a huge problem. Trying to optimize slow start performance, that's
the research direction we're heading in. Have a talk in CCWG on
this, do come attend if interested. See also SCONEPRO BOF. -
Ben Schwartz: Solution to this was increasing the BDP by removing
the bandwidth limiter. It was the traffic shaper that made it behave
badly. Knowing how the traffic shaper was working might help. If
simulating a low throughput network, policers made things extra
weird. Pay close attention to the behavior of the shaper/policer. -
Matt Mathis: There's complexity around anticipating content, an
experiment that might be useful would be to run this on a synthetic
network where you can control the parameters, see if there are
delays where behavior changes, as there may be timers in the
protocols that should be adaptive, and give that feedback to
implementors.
A First Look At NAT64 Deployment In-The-Wild - Amanda Hsuan (15 mins) (remote)
- Jen Linkova: Deploying v6 only network in a large enterprise. DNS64
is not strictly required for clients using NAT64. Clients using
CLAT, you can give them the prefix via other means, should be
decoupled. You measured public resolvers, you may need a different
resolver for DNS64. Broken configuration if public resolver gives
DNS64 answer in general because it might cause delays. How do you
know if clients are using NAT64? -
Amanda: With atlas probes we tried to request a AAAA record for
domains and look at responses, means client is using DNS64 but
doesn't guarantee that it's using NAT64. -
Stuart Cheshire: When studying this be very careful to separate
NAT64 from DNS64. NAT64 is broadly a good idea while DNS64 is
broadly not. When this was first created, you put in a NAT64 gw and
then put in a DNS64 hack that make it work. Compared to all the
services, there aren't that many different clients. It's better to
do this locally in the client (see RFC 8880). DNS64 is a problem for
DNSSEC. If you're [...]. Whole model assumes DNS64 and NAT64 are
managed by the same entity. Clients can get the NAT64 prefix a range
of ways. Thread only supports IPv6, so only Thread network is IPv67.
Thread networks are required to do NAT64 but not DNS64 and have to
do their own synthesis. Be careful to separate DNS64 and NAT64 as
they are different problems with different deployments. -
Ben Schwartz: Hundreds of millions of people whose internet
connectivity depends entirely on NAT64, interesting they don't show
up here. Conclusion is the RIPE probes are missing some important
huge chunks of the space and are going to give us misleading
results. Interesting to think about how we could get to that
information. Might be possible to come up with packets that would
work end-to-end but fail NAT64. -
Lorenzo Colitti: Reason you won't find lots of DNS64 in public
resolvers is that the config of DNS64 is tied tightly to the NAT64,
as resolver and NAT need to agree on prefix to use. Also don't have
lots of RIPE Atlas probes in mobile network environmnets. You
wouldn't expect to find DNS64 in public networks. -
Robert Kisteleki: (I work for RIPE and am somewhat involved in
ATLAS) I would love to have ATLAS probes in every network, but
that's not going to happen. We're not really present in mobile
networks, where you might observe this behavior more often. I would
caution extrapolating results, as the system is not designed to do
that.
Preparing to Detect IPv6 Attacks on Your IoT Devices - Phil Roberts (15 mins) (remote)
(Presenter lost network connectivity part way through)
(Leslie Daigle picking up presenting)
- Wes Hardaker: Thank you, it's not easy to get something like this
out there. Would be nice to see more.
Understanding anomalies using a baseline dataset comparison - Wes Hardaker (10 mins) (in-person)
- Laurent Ciavaglia: Thanks, looks very nice. Do you have to tag where
the problem is? Do you put any kind of rules or anything? Just
statistics? - Wes: Correct, no rules, just TCP filters if you want.
Field Experiments on Post-Quantum DNSSEC - Peter Thomassen/Jason Goertzen (15 mins) (in-person)
- Ben Schwartz: Really cool to see a running demo of PQ in DNSSEC. For
public resolver, what alg IDs were you using since they don't exist. - Answer: used 17-22 since wanted to look normal
- Ben: correct me if I'm wrong since only thing that matters is size,
since opaque bytes for things in the chain - Answer: size is why seeing failures
- Ben: As a DNS developer, curve of failure rate vs signature size is
the really interesting thing, and the shape of that curve would be
really interesting to see. - Answer: with (falcon?) were staying under the MTU, but going over
that greatly increased the error rate.