Re: [6lo] [6tisch] Thomas' review of draft-thubert-6lo-forwarding-fragments-04

Tero Kivinen <kivinen@iki.fi> Tue, 11 April 2017 14:31 UTC

Return-Path: <kivinen@iki.fi>
X-Original-To: 6lo@ietfa.amsl.com
Delivered-To: 6lo@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 1193612922E for <6lo@ietfa.amsl.com>; Tue, 11 Apr 2017 07:31:09 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -1.12
X-Spam-Level:
X-Spam-Status: No, score=-1.12 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, SPF_NEUTRAL=0.779, URIBL_BLOCKED=0.001] autolearn=no autolearn_force=no
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id kjAcTbxL_xBO for <6lo@ietfa.amsl.com>; Tue, 11 Apr 2017 07:31:08 -0700 (PDT)
Received: from mail.kivinen.iki.fi (fireball.acr.fi [83.145.195.1]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id 5F60A126C23 for <6lo@ietf.org>; Tue, 11 Apr 2017 07:31:08 -0700 (PDT)
Received: from fireball.acr.fi (localhost [127.0.0.1]) by mail.kivinen.iki.fi (8.15.2/8.15.2) with ESMTPS id v3BEV11g026752 (version=TLSv1.2 cipher=ECDHE-RSA-AES256-GCM-SHA384 bits=256 verify=NO); Tue, 11 Apr 2017 17:31:01 +0300 (EEST)
Received: (from kivinen@localhost) by fireball.acr.fi (8.15.2/8.14.8/Submit) id v3BEV0h6022588; Tue, 11 Apr 2017 17:31:00 +0300 (EEST)
MIME-Version: 1.0
Content-Type: text/plain; charset="utf-8"
Content-Transfer-Encoding: quoted-printable
Message-ID: <22764.59556.152613.433845@fireball.acr.fi>
Date: Tue, 11 Apr 2017 17:31:00 +0300
From: Tero Kivinen <kivinen@iki.fi>
To: PWK <pat.kinney@kinneyconsultingllc.com>
Cc: Thubert Pascal <pthubert@cisco.com>, Ralph Droms <rdroms.ietf@gmail.com>, Carsten Bormann <cabo@tzi.org>, Palattella Maria Rita <6tisch@ietf.org>, Thomas Watteyne <thomas.watteyne@inria.fr>, "6lo@ietf.org" <6lo@ietf.org>
In-Reply-To: <E9F92EB9-473F-4532-AE16-0E7EA4A3798E@kinneyconsultingllc.com>
References: <CADJ9OA9AX6N+-pciaCxyO-oWNft2fwKf8OXSn71VDi+tdXHoKw@mail.gmail.com> <4A946964-5BE9-449F-B9F1-798A3FB56B30@tzi.org> <7520BB3A-B30B-4E0B-8C84-600893C19E4A@gmail.com> <2323795c367f4aa88b178c1710187ad6@XCH-RCD-001.cisco.com> <22758.13790.469557.896809@fireball.acr.fi> <8C7F867A-B669-4681-9FD7-FCF85E675DAD@kinneyconsultingllc.com> <22758.22825.803918.100803@fireball.acr.fi> <956EDC0E-3671-4230-BF74-5C962437FD1C@kinneyconsultingllc.com> <22759.24711.77992.225193@fireball.acr.fi> <E9F92EB9-473F-4532-AE16-0E7EA4A3798E@kinneyconsultingllc.com>
X-Mailer: VM 8.2.0b under 25.1.1 (x86_64--netbsd)
X-Edit-Time: 20 min
X-Total-Time: 101 min
Archived-At: <https://mailarchive.ietf.org/arch/msg/6lo/btQnvGwekWJ2wqoTzFAptCz-JDM>
Subject: Re: [6lo] [6tisch] Thomas' review of draft-thubert-6lo-forwarding-fragments-04
X-BeenThere: 6lo@ietf.org
X-Mailman-Version: 2.1.22
Precedence: list
List-Id: "Mailing list for the 6lo WG for Internet Area issues in IPv6 over constrained node networks." <6lo.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/6lo>, <mailto:6lo-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/6lo/>
List-Post: <mailto:6lo@ietf.org>
List-Help: <mailto:6lo-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/6lo>, <mailto:6lo-request@ietf.org?subject=subscribe>
X-List-Received-Date: Tue, 11 Apr 2017 14:31:10 -0000

PWK writes:
> Tero; I understand your scenario, and I also believe that all WAN/LAN/PAN
> wireless networks should always use security.  

Agree, but looking at the current usage that does not seem to be true,
and looking at things like issues found while making revision there
are not that many implementor who have implemented security, as they
would have noticed those issues if they actually would have
implemented them. Or they just implemented something, and didn't
really care that the specification was not specifying things exatly... 

> But to further analyze your scenario, since 802.15.4 LP-WAN is star
> topology based, in your example A<=>B would be one network and C<=>D
> would be another network.

Section 5.5 Network topologies of 802.15.4-2015 do say that IEEE
802.15.4 LR-WPAN operates in either of two topologies: the star
topology or the peer-to-peer topology.

So 802.15.4 is not only star topology...

Also this is still issue with star topology, as two nodes might send
fragments to the coordinator at the same time, and as TID is allocated
by the sender only, and coordinator does not have ability to reject
incoming FSCD IE. When the coordinator parses that FSCD IE it has most
likely already sent an Ack back to the frame, and if the TID it got in
the FSCD IE is overlapping with some other fragment exchange it has
already going on, there is nothing it can do. Even if it parses the
FSCD IE before sending the ACK, it is supposed to send ACK back
because it did receive the frame properly. 

> Prior to staring they would have looked to see if there were other
> networks set up on the channel, therefore one would have used
> another channel (as you noted).

Not really. They would look for free enough channel. If there is not
too much traffic on the channel they try when forming the network,
they can pick that channel. And some other networks could also end up
using the same channel. And there might even be some TSCH or similar
channel hopping networks using the same channel. 

> By the way, the scenario you choose is similar to two networks
> choosing the same PAN ID and allocating the same short addresses to
> nodes that are in range of both networks.

PAN ID conflicts are handled by the 802.15.4 using the PAN ID Conflict
notification command, which will cause the one of PANs to renumber to
use some other PAN ID. The PAN does not necessarely move to the other
channel, it can still stay on the same channel. 

> Secondly, your scenario assumes that they both send the Fragment Sequence
> Context Description at almost the same time, which is very unlikely for two
> networks so close together.

They do not need start at the same time, it is enough if one of them
is faster, and passes the other. I.e., A starts ending frames, but is
very slow and can only send one frame every 500 ms, and it has 20
frames to send, so total time of sending the fragment will be 10
seconds. C is must faster and can send back to back frames, meaning
it can send frames every 10 ms or so, so it can finish its 20 frame
transaction in 200 ms. If the C starts its transaction while A is
doing its fragment transaction, then both B and D will receive those
frame, and B will reject the frames having the fragment number smaller
than what A has already sent, but after C passes A it will accept rest
of the fragments from the C.

> If they were “out-of-sync” then B or D would have
> received a fragment out of sync, so if Frak policy zero was in use, reception
> of an out-of-order fragment would have resulted in termination of the
> transaction. The other two policies would have resulted in a condition where B
> or D would have received a fragment out of sequence that was already correctly
> received, so it would have discarded that fragment, while the other would have
> received a fragment number ahead of its time and would have accepted it.  
> 
> Finally, for the last case, I will also propose a text change in the next
> revision that when the frame is reassembled, the standard policy of checking
> the FCS and sending ACKs is used.

That might help somewhat, but I think there is too much issues with
the current LECIM fragmentation with the fact that it does not have
addressing fields, that fixing it is not really worth of the effort.
It is better to pick the fragmentation from the 802.15.9 and use that
instead. 
-- 
kivinen@iki.fi