Re: [6lo] Iotdir last call review of draft-ietf-6lo-fragment-recovery-07

"Pascal Thubert (pthubert)" <pthubert@cisco.com> Thu, 28 November 2019 10:49 UTC

Return-Path: <pthubert@cisco.com>
X-Original-To: 6lo@ietfa.amsl.com
Delivered-To: 6lo@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id E2CB31201E3; Thu, 28 Nov 2019 02:49:46 -0800 (PST)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -14.5
X-Spam-Level:
X-Spam-Status: No, score=-14.5 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, DKIM_SIGNED=0.1, DKIM_VALID=-0.1, DKIM_VALID_AU=-0.1, RCVD_IN_DNSWL_HI=-5, SPF_PASS=-0.001, URIBL_BLOCKED=0.001, USER_IN_DEF_DKIM_WL=-7.5] autolearn=ham autolearn_force=no
Authentication-Results: ietfa.amsl.com (amavisd-new); dkim=pass (1024-bit key) header.d=cisco.com header.b=AU+KLI2l; dkim=pass (1024-bit key) header.d=cisco.onmicrosoft.com header.b=gp9y8d6/
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id 7hvs97iGwoe4; Thu, 28 Nov 2019 02:49:44 -0800 (PST)
Received: from rcdn-iport-5.cisco.com (rcdn-iport-5.cisco.com [173.37.86.76]) (using TLSv1.2 with cipher DHE-RSA-SEED-SHA (128/128 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id E50951200F7; Thu, 28 Nov 2019 02:49:42 -0800 (PST)
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/simple; d=cisco.com; i=@cisco.com; l=11040; q=dns/txt; s=iport; t=1574938183; x=1576147783; h=from:to:cc:subject:date:message-id:references: in-reply-to:content-transfer-encoding:mime-version; bh=B6pMUg15ICUQU3qON33s9vi3/kELKubtL2Yucoo1nUw=; b=AU+KLI2lscWtxGX9JrkOMDceVSU/2ls9g9Bb0QbwV6dwGv/hzrV61yzu S+pp0P10UTVpSy/rwZlofJequIycS0PWuKbxBPSXU4+tIM4gJexFOpzBr rEdquXDmAhmyRnFL7xkhOY2FPz2TxPlkSkXravur9shLW45kz5C1OY53x E=;
IronPort-PHdr: 9a23:ZtvZABw1IeHNUjXXCy+N+z0EezQntrPoPwUc9psgjfdUf7+++4j5YhWN/u1j2VnOW4iTq+lJjebbqejBYSQB+t7A1RJKa5lQT1kAgMQSkRYnBZudFU3mJvPwcwQxHd9JUxlu+HToeUU=
X-IronPort-Anti-Spam-Filtered: true
X-IronPort-Anti-Spam-Result: A0CwAAAipd9d/4UNJK1mGgEBAQEBAQEBAQMBAQEBEQEBAQICAQEBAYF+gUskBScFbFggBAsqCoQhg0YDimuCX5gEgUKBEANUCQEBAQwBASMKAgEBhEACF4FtJDgTAgMNAQEEAQEBAgEFBG2FNwyFUgEBAQECARIREQwBATcBBAsCAQgSCAImAgICMBUCDgIEAQ0NGoMBgkYDDiABAgELpxwCgTiIYHWBMoJ+AQEFhSUYghcDBoEOKIUbhnsagUE/gRFHgkw+gmQCAYEuDg4agw4ygiyNBgWDD4gLlh0Kgi6VdIJBh22EP4Z4hD6OSpoXAgQCBAUCDgEBBYFpIoFYcBWDJ1ARFIpsCQMXgQQBAgeCQoUUhT90AYEnjheBMAGBDwEB
X-IronPort-AV: E=Sophos;i="5.69,253,1571702400"; d="scan'208";a="445619370"
Received: from alln-core-11.cisco.com ([173.36.13.133]) by rcdn-iport-5.cisco.com with ESMTP/TLS/DHE-RSA-SEED-SHA; 28 Nov 2019 10:49:41 +0000
Received: from XCH-RCD-002.cisco.com (xch-rcd-002.cisco.com [173.37.102.12]) by alln-core-11.cisco.com (8.15.2/8.15.2) with ESMTPS id xASAnfuw004146 (version=TLSv1.2 cipher=AES256-SHA bits=256 verify=FAIL); Thu, 28 Nov 2019 10:49:41 GMT
Received: from xhs-rcd-002.cisco.com (173.37.227.247) by XCH-RCD-002.cisco.com (173.37.102.12) with Microsoft SMTP Server (TLS) id 15.0.1473.3; Thu, 28 Nov 2019 04:49:40 -0600
Received: from xhs-aln-001.cisco.com (173.37.135.118) by xhs-rcd-002.cisco.com (173.37.227.247) with Microsoft SMTP Server (TLS) id 15.0.1473.3; Thu, 28 Nov 2019 04:49:39 -0600
Received: from NAM02-CY1-obe.outbound.protection.outlook.com (173.37.151.57) by xhs-aln-001.cisco.com (173.37.135.118) with Microsoft SMTP Server (TLS) id 15.0.1473.3 via Frontend Transport; Thu, 28 Nov 2019 04:49:39 -0600
ARC-Seal: i=1; a=rsa-sha256; s=arcselector9901; d=microsoft.com; cv=none; b=KtzP+F0qXMObBFYikgeGVUk5Gwi/GrG01m3mE5naaMwVz7uRCumLshPW1awSBfeIAiQHXuwLfRGguUOJgvuUusyPKLtgz59Ye5ZNpS7WoRQ89H1HngFPn5vuIBTEemOTUGPIoQdOUhsEAc/eudmcJDBKPmlZJM9FaPsNmtiuGw/GatokY1XfTvPWa78AC8DK3pMMqFOX2Ujk/HjbYdJKAJpTnDPkZZtKrtQj2lYgVcPV8gmftYNRc+sHeuwAZV/hMFa6qSWXoZVNBx8sn2B9eorjhamw04A33YGPx8wHtPoTtaT9ieEtVBNTFNMK2nEmz4YTiP4Kax8UKTXETyAxcw==
ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=microsoft.com; s=arcselector9901; h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-SenderADCheck; bh=B6pMUg15ICUQU3qON33s9vi3/kELKubtL2Yucoo1nUw=; b=KYCtfhJEryzrcLmFRRuBIkpcFSnSTieYIHwMLZ4HuvDRkIemf6wteAjFFltqXO0i2orgQFmjuCkSyt5kcywMblM7EIJmlMMnbrijMzOYtjmZiqV2siYoi38Y5Z+eqrDEbqni1GU3QcAmYz466X4OAI3YSjK35nxLSDCkfYMgCzYlAEBPjTf3ZdKj4AsZtlQblYg4rSaT5tZoordsDyD4jk+KoJTduhB1tYwVEsWJvvFVfgEgC8NzcBUZJ/iGA3CgHQjcPQaS6nKAbKLdeKk1efwO3rWhrBY9SyfbxusBVFtvrqX6K63KsFwilPKx+wwJPAmfaFK03x7yG7Ib+y7U3Q==
ARC-Authentication-Results: i=1; mx.microsoft.com 1; spf=pass smtp.mailfrom=cisco.com; dmarc=pass action=none header.from=cisco.com; dkim=pass header.d=cisco.com; arc=none
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=cisco.onmicrosoft.com; s=selector2-cisco-onmicrosoft-com; h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-SenderADCheck; bh=B6pMUg15ICUQU3qON33s9vi3/kELKubtL2Yucoo1nUw=; b=gp9y8d6/6YZRs1Tn8Ga8Jht1ao73rdesce7ePVOMX6J9FyvctM/4MzcmC6A7hXkh3ZkqAU6UJGsDxXqZO8sNT22/ZDRw2KPAdrJvBkvCjRNbYOFbYAKiF2D/TPJywAvGdKWCY3KSVrZIMErnk5oPomjIAb3vM2wHjP4aE2huBCI=
Received: from MN2PR11MB3565.namprd11.prod.outlook.com (20.178.250.159) by MN2PR11MB3696.namprd11.prod.outlook.com (20.178.253.151) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id 15.20.2474.16; Thu, 28 Nov 2019 10:49:38 +0000
Received: from MN2PR11MB3565.namprd11.prod.outlook.com ([fe80::3037:66f1:dc79:b564]) by MN2PR11MB3565.namprd11.prod.outlook.com ([fe80::3037:66f1:dc79:b564%7]) with mapi id 15.20.2495.014; Thu, 28 Nov 2019 10:49:38 +0000
From: "Pascal Thubert (pthubert)" <pthubert@cisco.com>
To: Erik Nordmark <nordmark@sonic.net>, "Iot-dir@ietf.org" <Iot-dir@ietf.org>
CC: "last-call@ietf.org" <last-call@ietf.org>, "draft-ietf-6lo-fragment-recovery.all@ietf.org" <draft-ietf-6lo-fragment-recovery.all@ietf.org>, "6lo@ietf.org" <6lo@ietf.org>
Thread-Topic: Iotdir last call review of draft-ietf-6lo-fragment-recovery-07
Thread-Index: AQHVpYUbKFv64/Va/UKUkRlCJCkYJaegFZzg
Date: Thu, 28 Nov 2019 10:49:11 +0000
Deferred-Delivery: Thu, 28 Nov 2019 10:48:19 +0000
Message-ID: <MN2PR11MB3565ADE3A295F12B6496A61CD8470@MN2PR11MB3565.namprd11.prod.outlook.com>
References: <157490190471.21976.4374446442156394748@ietfa.amsl.com>
In-Reply-To: <157490190471.21976.4374446442156394748@ietfa.amsl.com>
Accept-Language: fr-FR, en-US
Content-Language: en-US
X-MS-Has-Attach:
X-MS-TNEF-Correlator:
authentication-results: spf=none (sender IP is ) smtp.mailfrom=pthubert@cisco.com;
x-originating-ip: [91.69.164.91]
x-ms-publictraffictype: Email
x-ms-office365-filtering-correlation-id: 33b34504-ae46-4899-e6c4-08d773f0aaa0
x-ms-traffictypediagnostic: MN2PR11MB3696:
x-ms-exchange-purlcount: 1
x-microsoft-antispam-prvs: <MN2PR11MB369630DE7D24DF03C4519B81D8470@MN2PR11MB3696.namprd11.prod.outlook.com>
x-ms-oob-tlc-oobclassifiers: OLM:10000;
x-forefront-prvs: 0235CBE7D0
x-forefront-antispam-report: SFV:NSPM; SFS:(10009020)(4636009)(346002)(366004)(376002)(136003)(396003)(39860400002)(189003)(199004)(966005)(66476007)(66556008)(54906003)(71200400001)(3846002)(25786009)(74316002)(7696005)(6666004)(26005)(8676002)(6506007)(6246003)(478600001)(71190400001)(7736002)(102836004)(64756008)(76176011)(186003)(55016002)(305945005)(9686003)(4326008)(110136005)(2906002)(5660300002)(81156014)(8936002)(256004)(33656002)(6306002)(561944003)(81166006)(66946007)(76116006)(66446008)(99286004)(11346002)(52536014)(14444005)(446003)(14454004)(316002)(229853002)(6436002)(66066001)(2501003)(6116002)(86362001); DIR:OUT; SFP:1101; SCL:1; SRVR:MN2PR11MB3696; H:MN2PR11MB3565.namprd11.prod.outlook.com; FPR:; SPF:None; LANG:en; PTR:InfoNoRecords; MX:1; A:1;
received-spf: None (protection.outlook.com: cisco.com does not designate permitted sender hosts)
x-ms-exchange-senderadcheck: 1
x-microsoft-antispam: BCL:0;
x-microsoft-antispam-message-info: LJlcvRsrmJZi0CaAP1QPWkzeS0OviFxan6DlKVSSSOnw7K6ab0o96cotY23/7AblQBBJcUvIEUu/M89xRnrGry6BbOa5+BUcopTyKLdoJQiEm9cL3649mfuj5rJmt14zQcwsplQ8jzOVTWmueZc93s+R1oYfZTCVZRSYgg+9HRKk54GOGOPgbAMdNSOyx6YB0LdDjC3nVt6Tz8OIzVW25EjnvgtSttOynuboJqz4U9qXH802wpmkuVDrWosG4Ff9QwrsWK98QXkWv0fccKGvV5tMYEtdDxSi2OZ8e1suMaCoII06FJ94xDk6s1jjedBsQeb9sK9W4ANAg++rzH9NDt9HruYb5E8nl6iECAhVsE+xKREJlJTR2Ekpkmapsa416JrmDb2n83p8XkDv4qcD5rJgLLKRKiS0K1EKBhnxXOFKF4DDC0I/BWSPaVo2DD/rLr/59gxK1C3RrGwUjcyBWG75ujmgD077wwCbIfpoDIw=
x-ms-exchange-transport-forked: True
Content-Type: text/plain; charset="utf-8"
Content-Transfer-Encoding: base64
MIME-Version: 1.0
X-MS-Exchange-CrossTenant-Network-Message-Id: 33b34504-ae46-4899-e6c4-08d773f0aaa0
X-MS-Exchange-CrossTenant-originalarrivaltime: 28 Nov 2019 10:49:38.6392 (UTC)
X-MS-Exchange-CrossTenant-fromentityheader: Hosted
X-MS-Exchange-CrossTenant-id: 5ae1af62-9505-4097-a69a-c1553ef7840e
X-MS-Exchange-CrossTenant-mailboxtype: HOSTED
X-MS-Exchange-CrossTenant-userprincipalname: jiZ9y35yxjOIGtOXiLe9FnUn3P49hFLs/C3RTWKrxGZA3Mvw03lIMiTI9KuTRC8Vj+BootiIdn1dPgkI90IqNQ==
X-MS-Exchange-Transport-CrossTenantHeadersStamped: MN2PR11MB3696
X-OriginatorOrg: cisco.com
X-Outbound-SMTP-Client: 173.37.102.12, xch-rcd-002.cisco.com
X-Outbound-Node: alln-core-11.cisco.com
Archived-At: <https://mailarchive.ietf.org/arch/msg/6lo/Ibn5TLwoXfiKt-F37XEIzPhi70I>
Subject: Re: [6lo] Iotdir last call review of draft-ietf-6lo-fragment-recovery-07
X-BeenThere: 6lo@ietf.org
X-Mailman-Version: 2.1.29
Precedence: list
List-Id: "Mailing list for the 6lo WG for Internet Area issues in IPv6 over constrained node networks." <6lo.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/6lo>, <mailto:6lo-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/6lo/>
List-Post: <mailto:6lo@ietf.org>
List-Help: <mailto:6lo-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/6lo>, <mailto:6lo-request@ietf.org?subject=subscribe>
X-List-Received-Date: Thu, 28 Nov 2019 10:49:47 -0000

Hello Erik

Many thanks for your in-depth review!

Let's see below:

> Section 4.3 seems to silently assume that all fragments of a datagram go
> through the same intermediate hops. This should at a minimum be made
> explicit.

This is in fact inherited from the parent https://www.ietf.org/id/draft-ietf-6lo-minimal-fragment-05.html 

Minimal says:
   "The routing decision is made
   on the first fragment, which has all the IPv6 routing information.
   The first fragment is forwarded immediately and a state is stored to
   enable forwarding the next fragments along the same path."
A lot other things are inherited as well.

Suggestion is to make a small paragraph that summarizes it in the intro and point at minimal.
What about:

"

   [I-D.ietf-6lo-minimal-fragment] specifies the general behavior that
   all FF techniques including this specification follow, and presents
   the associated caveats.  In particular, the routing information is
   fully indicated in the first fragment, which is always forwarded
   first.  A state is formed and used to forward all the next fragments
   along the same path.  The datagram_tag is locally significant to the
   Layer-2 source of the packet and is swapped at each hop.

"

> But does the intended deployments satisfy such an assumption?

Note that the term "path" is really vague. Thinking RAW for a minute, you'll see that as long as the first fragment flows a RAW diverse path, then the following fragments can use any subset of that path. 
I can add a section like

"
6.4.  Applying Recoverable Fragmentation along a Diverse Path

   The text above can be read with the assumption of a serial path
   between a source and a destination.  Section 4.5.3 of the "6TiSCH
   Architecture" [I-D.ietf-6tisch-architecture] defines the concept of a
   Track that can be a complex path between a source and a destination
   with Packet ARQ, Replication, Elimination and Overhearing (PAREO)
   along the Track.  This specification can be used along any subset of
   the complex Track where the first fragment is flooded.  The last
   RFRAG Acknowledgment is flooded on that same subset in the reverse
   direction.  Intermediate RFRAG Acknowledgments can be flooded on any
   sub-subset of that reverse subset that reach back to the source.
"

> Drawing in section 5.1 shows an 8 byte datagram_tag but the text says it is 16
> bits. That's inconsitent.

Fixed. The format changed and I missed this.

> 
> I'd like to understand the issues and protection against reuse of the
> datagram_tag. Since this is rewritten on each hop and the hops can be routers
> forwarding at high rate, even 16 bits can cycle very quickly.

This format is for LoWPANs. The assumption is that a node can hold only a few packets in memory. The FF allows to forward more than that but there's still a limit.
The datagram_tag is allocated by each node when it forwards a new fragment. I can add text that if all 256 are already in use the intermediate node needs to reject the next packet or abort an existing session in both directions.
Proposal: add the case explicitely in the following text that was mostly preexisting:

"

   The other way around, the receiver might need to abort the process of
   a fragmented packet for internal reasons, for instance if it is out
   of reassembly buffers, already uses all 256 possible values of the
   datagram_tag, or if it keeps receiving fragments beyond a reasonable
   time while it considers that this packet is already fully reassembled
   and was passed to the upper layer.  In that case, the receiver SHOULD
   indicate so to the sender with a NULL bitmap in a RFRAG
   Acknowledgment.  The RFRAG Acknowledgment is frowarded all the way
   back to the source of the packet and cleans up all resources on the
   way.  Upon an acknowledgment with a NULL bitmap, the sender endpoint
   MUST abort the transmission of the fragmented datagram with one
   exception: In the particular case of the first fragment, it MAY
   decide to retry via an alternate next hop instead.
"

Also in the security section:

"
The process of recovering fragments does not appear to create any
   opening for new threat compared to "Transmission of IPv6 Packets over
   IEEE 802.15.4 Networks" [RFC4944] beyond the change of size of the
   datagram_tag.  By reducing to 8 bits, the tag will wrap faster than
   with [RFC4944].  But for a constrained network where a node is
   expected to be able to hold only one or a few large packets in
   memory, 256 is still a large number.  Also, the acknowledgement
   mechanism allows ot clean up the state rapidly once the packet is
   fully transmitted or aborted.

"

> 
> The document should presumably specify how the receiver knows it has
> received all the fragments in 6.0; as I understand the sequence number can

Added:
"
   [I-D.ietf-6lo-minimal-fragment] indicates that the receiving endpoint
   stores "the actual packet data from the fragments received so far, in
   a form that makes it possible to detect when the whole packet has
   been received and can be processed or forwarded".  How this is
   computed in implementation specific but relies on receiving all the
   bytes up to the datagram_size indicated in the first fragment.  An
   implementation may receive overlapping fragments as the result of
   retries after an MTU change.
"

> not be used for this but instead the receiver needs to check that it has
> received every byte offset from zero to datagram_size at least once. (The
> refragmenting due to MTU changes makes this complex.) Question: If the
> receiver has already received from byte range once and receives a subset of
> that range again (due to a retransmission after MTU change) is the receiver
> supposed to do something to compare the content being the same for the
> repeated byte range?

Yes this could happen in theory. This has security implications. In particular rewriting data in the first fragment may alter the IP or transport headers. 
But then as discussed in the minimal fragment, the FF is not end to end and a firewall is expected to operate in the reassembled packet, so there's little value rewriting.
I modified the security section as follows:

"
8.  Security Considerations

   The considerations in the Security sections of [I-D.ietf-core-cocoa]
   and [I-D.ietf-6lo-minimal-fragment] apply equally to this
   specification.
"

To reflect the discussion on overlapping fragments therein.


> 
> Note that for IP fragmentation we have determined that overlapping
> fragments can be used to fool firewalls. I don't know to what extent that is an
> issue for this fragmentation. Perhaps that should be mentioned in the security
> considerations section?

Yes, I did that in the minimal and now inherit it by reference. My take is that in this case this is not such an issue since the fragmentation is not end to end and probably the firewall operates on the reassembled packet not the 6lowpan fragments.

> 
> Section 6.1.1 seems to make the assumption that a packet with sequence zero
> is only transmitted once, hence I don't understand how this will work when it
> is lost and then retransmitted by the sender.
> 

Suggestion to add at the end of 6.1.1:
"
   The first fragment may be received a second time, indicating that it
   did not reach the destination and was retried.  In that case, it
   SHOULD follow the same path as the first occurrence.  It is up to
   sending endpoint to abort a transmission and then retry it from
   scratch, which may build an entirely new path.

"

> Nits:
> Section 2.3 defines 5 terms but all of "LLN" are unused. I suggest the unused
> terms be removed to avoid any confusion. Yet other terms like "LSP" are not
> defined.
> 

All Fixed : )

I published 08 with the above proposals. Please let me know if that addresses the issues or if we need more work.

Again; many thanks Erik!

Pascal