Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

Sect 4.7: Also an MF-Classifier for QoS? #181

Closed
gorryfair opened this issue Feb 4, 2021 · 11 comments
Closed

Sect 4.7: Also an MF-Classifier for QoS? #181

gorryfair opened this issue Feb 4, 2021 · 11 comments

Comments

@gorryfair
Copy link
Contributor

Sect 4.7: Speaks about QoS

The section mentions QoS and DSCPs, but one other operational point with traffic that uses any encrypted transport is that there is an often lack of detail in classifier information for on-path devices to provide a useful MF classifier for QoS. At least within some organisations, MF-Classifiers can be used to set QoS markings for traffic, which become impossible when using encryption - see sect 2.2.2 of draft-ietf-tsvwg-transport-encrypt-18.

@gorryfair gorryfair changed the title Sect 4.7: Also nMF-Classifier for QoS? Sect 4.7: Also an MF-Classifier for QoS? Feb 4, 2021
@mirjak
Copy link
Contributor

mirjak commented Feb 12, 2021

That seems like a bit to much info for this draft.

@gorryfair
Copy link
Contributor Author

So my point, was to be clear this also applies to in-network classifiers. Here is something brief:

/A QUIC connection limits the fields that can be observed by an MF-Classifier. Such a device needs to be configured so that any marking and conditioning is consistently performed on all packets forming the QUIC connection./

After the sentence on endpoint marking: /Therefore it is not recommended to use different DiffServ Code Points (DSCPs).../

You could cite the ID above if you need more details.

@mirjak
Copy link
Contributor

mirjak commented Feb 16, 2021

Isn't this already covered by the first sentence of this section

"It is expected that any QoS handling in the network [...] is applied on a per flow-basis (and not per-packet) and as such that all packets belonging to the same QUIC connection get uniform treatment."

?

@gorryfair
Copy link
Contributor Author

I don't think so - we should explain both the case for the source endpoint, and the devices on-path that classify and manage the DSCP (etc) for QoS. They are different actors - MF classifiers and conditioning is often based on packet fields, or failing that heuristics about flows.

@mirjak
Copy link
Contributor

mirjak commented Feb 17, 2021

Text on setting DSCP is the applicability statement, sec 10. This part in manageability is only about network handling.

@gorryfair
Copy link
Contributor Author

Wait... that's a really odd split for this topic. I can see that applicability statement sect 10 says something helpful for the app - I don't argue with what that specific text says.

However, there's a non-trivial set of other devices and functions in the network that forward based on DSCPs; set DSCPs (such as classifiers); police their usage; condition to a PHB; etc. - the "guidance" in section 4.7 seems to suggest "leave this traffic alone" - and this current guidance isn't great help to network operators who are trying to balance traffic against service classes.

@mirjak
Copy link
Contributor

mirjak commented Feb 17, 2021

Yes, there are devices that set DSCP but I don't think there is any QUIC-specific advice we can give here. Or what other advise are you thinking of?

@gorryfair
Copy link
Contributor Author

So my observation was that several people came to the Mic in IETF meetings and noted that deployed classifiers did not see port information or other fields that they would expect to use in classification, and as such the traffic might/would get mapped to a default service. That might have unexpected results if the network traffic becomes mainly QUIC and is something to think about. I'm not asking to "detail-in" on this, simply to call-out the side-effect of making the traffic harder to classify.

@mirjak
Copy link
Contributor

mirjak commented Feb 17, 2021

But QUIC is on top of UDP which has ports...? Or which other field are we talking about?

britram added a commit that referenced this issue Mar 24, 2021
Fixes #183. Fixes #181 

This PR replaces #222, which no longer merges due to major changes to the NAT and Connection ID text.
@mirjak
Copy link
Contributor

mirjak commented Apr 9, 2021

@gorryfair ?

@gorryfair
Copy link
Contributor Author

OK, let's close: I guess the information is elsewhere.

@mirjak mirjak closed this as completed Apr 9, 2021
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Projects
None yet
Development

No branches or pull requests

2 participants