Re: [6lo] Roman Danyliw's Discuss on draft-ietf-6lo-use-cases-14: (with DISCUSS and COMMENT)

Yong-Geun Hong <yonggeun.hong@gmail.com> Thu, 02 February 2023 15:26 UTC

Return-Path: <yonggeun.hong@gmail.com>
X-Original-To: 6lo@ietfa.amsl.com
Delivered-To: 6lo@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 44886C14F75F; Thu, 2 Feb 2023 07:26:42 -0800 (PST)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -2.095
X-Spam-Level:
X-Spam-Status: No, score=-2.095 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, DKIM_SIGNED=0.1, DKIM_VALID=-0.1, DKIM_VALID_AU=-0.1, DKIM_VALID_EF=-0.1, FREEMAIL_FROM=0.001, HTML_MESSAGE=0.001, RCVD_IN_DNSWL_NONE=-0.0001, RCVD_IN_ZEN_BLOCKED_OPENDNS=0.001, SPF_HELO_NONE=0.001, SPF_PASS=-0.001, URIBL_DBL_BLOCKED_OPENDNS=0.001, URIBL_ZEN_BLOCKED_OPENDNS=0.001] autolearn=ham autolearn_force=no
Authentication-Results: ietfa.amsl.com (amavisd-new); dkim=pass (2048-bit key) header.d=gmail.com
Received: from mail.ietf.org ([50.223.129.194]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id k6avmCAr7YUv; Thu, 2 Feb 2023 07:26:40 -0800 (PST)
Received: from mail-lj1-x234.google.com (mail-lj1-x234.google.com [IPv6:2a00:1450:4864:20::234]) (using TLSv1.3 with cipher TLS_AES_128_GCM_SHA256 (128/128 bits) key-exchange X25519 server-signature RSA-PSS (2048 bits) server-digest SHA256) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id D4F32C14EAA3; Thu, 2 Feb 2023 07:26:39 -0800 (PST)
Received: by mail-lj1-x234.google.com with SMTP id d8so2230634ljq.9; Thu, 02 Feb 2023 07:26:39 -0800 (PST)
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=gmail.com; s=20210112; h=cc:to:subject:message-id:date:from:in-reply-to:references :mime-version:from:to:cc:subject:date:message-id:reply-to; bh=x7ad1JI7xNVasVAvxaLA8eV7TzRoeEagdt5yfTr/fqw=; b=KmmYuw5KQFe4HEjkmZi0Qt/a4pSQL9hJTNwqPqbLrnwu3um3AIsfPyuC7JxpZspL/y X/+S5aQhM0aRDqp6BGnxqjUUtH8QENmUZgjRJ1k39rumSvKuHQS/swgrUU+W1DJR8SzT dka5AChLLhTj9kJo5YbvvBhhzuWfPAZuYqXMls3YgPIHLq51RMBNvXQ2CfCYgdCmJQWB EJrz6Doif66HyE+25ZeQ7hnbxtViRzpK0GNf7+1ZaJPmiEIR86oZRSEizpkfw2TyUbyS IL8Mz4FNuzE5rMt4o4dljR5szi326zKkyS71hwaTJnaIgH8rGOkiNw3Qaq659cqSb4Kw 7S8w==
X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20210112; h=cc:to:subject:message-id:date:from:in-reply-to:references :mime-version:x-gm-message-state:from:to:cc:subject:date:message-id :reply-to; bh=x7ad1JI7xNVasVAvxaLA8eV7TzRoeEagdt5yfTr/fqw=; b=r6xwXqepktWN/FZsKcwvgCOHrdiUqHIBquo797RxE2LPSEgtiHnt8omj9bv71Gf6qE Iq8nqODggicBNyTpzH7QnkO5R9db+P2l91Yhq+xO3PcVTEgionG8DPQuP5z4p8Bioozb 202q1BM1dR5eYmhJWhdyE6yK0+j2GpWLhSYftTXCigiDxTOrz/WCx9CmORjLzsrmIa/m LU+P5JdLMrJAZPBRohD2XcrPHbp0ibbvPhf9Uj28vfyEo9HEv89yAGdKIIFyZlb1UWjn 2w63zk83gUDbofHyhY5R3H+ag/f64R0cQdY/MxJn/eZQ4r6o/10qcJLpnJzAxx95Z/bD acgQ==
X-Gm-Message-State: AO0yUKUrNYEHzYbAAnS09tVqb+lzBlTLXr7RsHe040fw0XyzIV8C1csL d5PvorGwxeUFmEFOL/eU900edmCdMeDG/T0VzRU=
X-Google-Smtp-Source: AK7set/qYX4c3+GM1PsgjPDV+iMB6g508+T5pLOcijWKVZFzhI/q/jP+ZPaNzbSmcGlHCqRx1QZLGANELQYISO5zBk0=
X-Received: by 2002:a2e:9256:0:b0:290:7e51:5f9e with SMTP id v22-20020a2e9256000000b002907e515f9emr1077494ljg.105.1675351597611; Thu, 02 Feb 2023 07:26:37 -0800 (PST)
MIME-Version: 1.0
References: <167097330864.46451.16737695388174276673@ietfa.amsl.com> <CAMGpriU_ON6k2J7ZVyq=vuLGv+q_RRS14EDC3Xamk9KtcXJfoA@mail.gmail.com>
In-Reply-To: <CAMGpriU_ON6k2J7ZVyq=vuLGv+q_RRS14EDC3Xamk9KtcXJfoA@mail.gmail.com>
From: Yong-Geun Hong <yonggeun.hong@gmail.com>
Date: Fri, 03 Feb 2023 00:26:26 +0900
Message-ID: <CACt2foGnHcut54yua8WKpSGQEeAZKJ42HvK2bMEB-qR8QUTF0w@mail.gmail.com>
To: Erik Kline <ek.ietf@gmail.com>
Cc: Roman Danyliw <rdd@cert.org>, The IESG <iesg@ietf.org>, draft-ietf-6lo-use-cases@ietf.org, 6lo-chairs@ietf.org, 6lo@ietf.org, shwetha.bhandari@gmail.com
Content-Type: multipart/alternative; boundary="000000000000d97d0605f3b9308b"
Archived-At: <https://mailarchive.ietf.org/arch/msg/6lo/YWM4G92PEhVMDXlUKA8UK8KMzH8>
Subject: Re: [6lo] Roman Danyliw's Discuss on draft-ietf-6lo-use-cases-14: (with DISCUSS and COMMENT)
X-BeenThere: 6lo@ietf.org
X-Mailman-Version: 2.1.39
Precedence: list
List-Id: "Mailing list for the 6lo WG for Internet Area issues in IPv6 over constrained node networks." <6lo.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/6lo>, <mailto:6lo-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/6lo/>
List-Post: <mailto:6lo@ietf.org>
List-Help: <mailto:6lo-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/6lo>, <mailto:6lo-request@ietf.org?subject=subscribe>
X-List-Received-Date: Thu, 02 Feb 2023 15:26:42 -0000

Dear Erik.

Thanks for your reminder.

As you mentioned, we are preparing the draft update.

Before the next meeting or ASAP, we will update the draft and submit.

Best regards.

Yong-Geun.

2023년 2월 1일 (수) 오후 3:49, Erik Kline <ek.ietf@gmail.com>님이 작성:

> Thank you, Roman, for the review.
>
> Authors: I believe we're waiting for someone to produce one or more
> updates that collectively address the comments provided.
>
> Thanks,
> -ek
>
>
> On Tue, Dec 13, 2022 at 3:15 PM Roman Danyliw via Datatracker
> <noreply@ietf.org> wrote:
> >
> > Roman Danyliw has entered the following ballot position for
> > draft-ietf-6lo-use-cases-14: Discuss
> >
> > When responding, please keep the subject line intact and reply to all
> > email addresses included in the To and CC lines. (Feel free to cut this
> > introductory paragraph, however.)
> >
> >
> > Please refer to
> https://www.ietf.org/about/groups/iesg/statements/handling-ballot-positions/
> > for more information about how to handle DISCUSS and COMMENT positions.
> >
> >
> > The document, along with other ballot positions, can be found here:
> > https://datatracker.ietf.org/doc/draft-ietf-6lo-use-cases/
> >
> >
> >
> > ----------------------------------------------------------------------
> > DISCUSS:
> > ----------------------------------------------------------------------
> >
> > Section 3
> >
> > Security and Encryption: Though 6LoWPAN basic specifications do
> >       not address security at the network layer, the assumption is that
> >       L2 security must be present.  In addition, application-level
> >       security is highly desirable.  The working groups [IETF_ace] and
> >       [IETF_core] should be consulted for application and transport
> >       level security.  The 6lo working group has worked on address
> >       authentication [RFC8928] and secure bootstrapping is also being
> >       discussed in the IETF.  However, there may be other security
> >       mechanisms available in a deployment through other standards such
> >       as hardware-level security or certificates for the initial booting
> >       process.  Encryption is important if the implementation can afford
> >       it.
> >
> > With the exception of authentication and secure bootstrapping, this text
> is
> > vague on what security properties are to be considered.  Likewise, saying
> > “encryption” is not informative as it can help provide specific (but
> unnamed)
> > security properties.  What is intended is not clear.  Specifically:
> >
> > -- What is the “L2 security” that “must be present” specifically?  What
> > properties are being addressed (e.g., confidentiality?  Authenticity?)
> >
> > -- What is “application-level security” that is “desirable”?
> >
> > -- “Affordability” on what dimension per the supporting encryption?  Is
> that a
> > notional budget for the application, power/battery, etc?
> >
> >
> > ----------------------------------------------------------------------
> > COMMENT:
> > ----------------------------------------------------------------------
> >
> > Thank you to Robert Sparks for the SECDIR review.
> >
> > ** Section 1.
> >
> >    Running IPv6 on constrained node networks presents challenges, due to
> >    the characteristics of these networks such as small packet size, low
> >    power, low bandwidth, low cost,
> >
> > Why is “lost cost” a challenge to running IPv6 on a constrained
> network?  It
> > seems like a desirable property.
> >
> > ** Section 2.  Editorial. Inconsistent descriptions of the protocols:
> >
> > -- Data rate: not mentioned in Section 2.2.
> > -- Range: not mentioned in Sections 2.1, 2.2, 2.3, 2.5
> >
> > ** Section 2.2.  Editorial. Could references to Bluetooth 4.0, 4.1, and
> IPSP
> > please be provided.
> >
> > ** Section 2.3.  Editorial. Please provide a reference to DECT-ULE.
> >
> > ** Section 2.5.
> >    NFC technology enables simple and safe two-way interactions between
> >    electronic devices
> >
> > Are the other protocols in Section 2.* not “simple” or “safe”?
> >
> > ** Section 2.7
> >
> >    The following table shows the dominant parameters of each
> >    use case corresponding to the 6lo link layer technology.
> >
> > Is NFC “dominantly” only used in “health-care services”?  Is there a
> basis for
> > that assertion.
> >
> > ** Section 3.
> >      ... L2-address-derived IPv6 addresses are
> >
> >      specified in [RFC4944], but there exist implications for privacy.
> >
> > Explicitly state those privacy implications.
> >
> > ** Section 4.2.  Section 4.* is titled “deployment scenarios”.  Section
> 4.1,
> > 4.3, and 4.4 explicitly state where they are deployed.  This section
> described
> > Thread, but omits describing the envisioned deployment.
> >
> > ** Section 4.2.  Editorial. The term “future-proof designs” seems like
> > marketing.
> >
> > ** Section 4.* and 5.*.  Editorial. I don’t understand the difference
> between a
> > “deployment scenario” and a “6lo use case”.
> >
> > ** Section 5.1.
> >
> >    Security support is required, especially for safety-
> >    related communication.
> >
> > What is a “security support”?  Is “security” not desirable in the other
> use
> > cases such as Section 5.2 - 5.4
> >
> >
> >
>