Re: [6lowapp] [6lowpan] SNMP optimizations

"Rene Struik" <rstruik@certicom.com> Thu, 19 November 2009 13:40 UTC

Return-Path: <rstruik@certicom.com>
X-Original-To: 6lowapp@core3.amsl.com
Delivered-To: 6lowapp@core3.amsl.com
Received: from localhost (localhost [127.0.0.1]) by core3.amsl.com (Postfix) with ESMTP id 79D063A6B2E; Thu, 19 Nov 2009 05:40:40 -0800 (PST)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -5.203
X-Spam-Level:
X-Spam-Status: No, score=-5.203 tagged_above=-999 required=5 tests=[BAYES_00=-2.599, MIME_QP_LONG_LINE=1.396, RCVD_IN_DNSWL_MED=-4]
Received: from mail.ietf.org ([64.170.98.32]) by localhost (core3.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id rulYNc9ZloVN; Thu, 19 Nov 2009 05:40:39 -0800 (PST)
Received: from mhs03ykf.rim.net (mhs03ykf.rim.net [216.9.243.80]) by core3.amsl.com (Postfix) with ESMTP id D61B13A6816; Thu, 19 Nov 2009 05:40:38 -0800 (PST)
X-AuditID: 0a401fcb-b7b71ae000002562-42-4b054ad2924c
Received: from XCH39YKF.rim.net ( [10.64.31.40]) by mhs03ykf.rim.net (RIM Mail) with SMTP id D3.8B.09570.2DA450B4; Thu, 19 Nov 2009 08:40:35 -0500 (EST)
Received: from XCH57YKF.rim.net ([10.64.31.54]) by XCH39YKF.rim.net with Microsoft SMTPSVC(6.0.3790.3959); Thu, 19 Nov 2009 08:40:34 -0500
x-mimeole: Produced By Microsoft Exchange V6.5
Content-class: urn:content-classes:message
MIME-Version: 1.0
Content-Type: text/plain; charset="us-ascii"
content-transfer-encoding: quoted-printable
Date: Thu, 19 Nov 2009 08:40:12 -0500
Message-ID: <7E1DF37F1F42AB4E877E492C308E6AC4025EA8A4@XCH57YKF.rim.net>
In-Reply-To: <20091118235822.GB7886@elstar.local>
X-MS-Has-Attach:
X-MS-TNEF-Correlator:
Thread-Topic: [6lowpan] SNMP optimizations
Thread-Index: AcpoqwfI1nGPctU3TdC+bUXVaDY1KQAcdwxw
References: <25c114b90911181310ue4eb67dkcdf83cd944a1632b@mail.gmail.com> <20091118235822.GB7886@elstar.local>
From: "Rene Struik" <rstruik@certicom.com>
To: "Juergen Schoenwaelder" <j.schoenwaelder@jacobs-university.de>
X-OriginalArrivalTime: 19 Nov 2009 13:40:34.0684 (UTC) FILETIME=[DED353C0:01CA691D]
X-Brightmail-Tracker: AAAAAwAAAZERyCBQEctxlg==
Cc: roll@ietf.org, 6lowpan <6lowpan@ietf.org>, 6lowapp@ietf.org
Subject: Re: [6lowapp] [6lowpan] SNMP optimizations
X-BeenThere: 6lowapp@ietf.org
X-Mailman-Version: 2.1.9
Precedence: list
List-Id: Application protocols for constrained nodes and networks <6lowapp.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/listinfo/6lowapp>, <mailto:6lowapp-request@ietf.org?subject=unsubscribe>
List-Archive: <http://www.ietf.org/mail-archive/web/6lowapp>
List-Post: <mailto:6lowapp@ietf.org>
List-Help: <mailto:6lowapp-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/6lowapp>, <mailto:6lowapp-request@ietf.org?subject=subscribe>
X-List-Received-Date: Thu, 19 Nov 2009 13:40:40 -0000

Hi Juergen:

I submitted a 6lowapp draft on security considerations precisely because
one needs a description of the problem space and make sure it is not
"forgotten". 

I do understand that people may wish and use some functionality that is
already out there, but question is whether it supports the desired
security functionality over the lifecycle of the system. 

Could you recommend an overview paper on SNMP that would make it easy to
see what the supposed security features are suitable to sensor-type
applications and how these are delivered (mechanisms, communication
overhead, etc.). This should make it easier to provide a more
quantitative assessment.

Best regards, Rene

-----Original Message-----
From: 6lowpan-bounces@ietf.org [mailto:6lowpan-bounces@ietf.org] On
Behalf Of Juergen Schoenwaelder
Sent: Wednesday, November 18, 2009 6:58 PM
To: Ulrich Herberg
Cc: manet@ietf.org; 6lowpan; roll@ietf.org
Subject: Re: [6lowpan] SNMP optimizations

On Wed, Nov 18, 2009 at 10:10:23PM +0100, Ulrich Herberg wrote:

[... we should restrict this to one mailing list...]

> However, it is unclear whether the code footprint of SNMP
> implementations can fit into the memory of small devices. From
> discussions with several persons from the MANET WG, I conclude that
> for MANET the same problem exists. (and I think for ROLL, too?)
> 
> I have several questions that came to my mind about this topic:
> 
> - First of all, to which WG does this issue belong to? Or is it -- as
> I suppose -- a common problem for the three working groups addressed
> in this mail?

I don't know.

> - Is this really an issue? Are there implementations of SNMP (maybe
> not open-source) that can be run on very small devices such as
> considered in 6lowpan/ROLL/MANET? Is there any experimental (or
> theoretical) analysis whether SNMP (or any other standardized
> management protocol) can run on these devices?

The question is under specified. What is a "very small device" and how
much can a "very small device" devote to SNMP? And what is SNMP? The
SNMPv3 specs are pretty modular. One of the more important questions
is how you deal with security - the security code has the potential to
be bigger than the rest of the SNMP engine. And it boils down to the
question of how many MIB objects you support and to what extend you
hardwire things. Remember that SNMP is a child of the late 80s and
early versions were sometimes embedded into devices that could not
afford TCP. Of course, the 80s version of SNMP did not care much about
security...

> - If SNMP cannot be used for small devices, how can we manage and
> monitor these devices then? (e.g. using proxies, different message
> formats such as proposed in 6lowapp, etc.). Do we need a different
> lightweight protocol for management?

Again, the big question is how to deal with the security aspect. SNMP
originally was lightweight because there was no security. It took the
IETF many years to find a workable security solution and even today
people are working on utilizing transport layer security protocols
within SNMP (see ISMS working group).

>  - Can we provide SNMP not only on a single device, but for a whole
> network? That might need an aggregator device that runs full SNMP and
> collects the data from the low power devices. This would imply to
> monitor statistics of a whole network (e.g. number of links, average
> throughput, average path-length, etc.)

Sure, there are ways of doing this. For read-only objects, this is
relatively easy - it can get a bit messy if you have read-write
objects. Whether this direction is worthwhile to explore depends on
how you solve the security issues and whether a dependency on a
"gateway" is desirable in the first place.

>  - What kind of objects should be provided in a MIB running on a
> MANET/6lowpan/ROLL device? This might be specific to the routing
> protocol, but there can be commonalities.

In general, the IETF tends to break MIB modules down along protocol
functions. Following this approach, a ROLL MIB module would report
data about the ROLL routing protocol. A 6LoWPAN MIB would report data
about the 6LoWPAN layer, that is for example the list of supported
6LoWPAN protocol features and counters for 6LoWPAN processing failures
(e.g. reassembly failures) that help to trouble shoot 6LoWPAN issues.
I would hope that some IPv6 MIB objects apply as well and then there
should ideally be an IEEE 802.15.4 MIB module for this particular
radio technology. I do not think there is much overlap if things get
structured well. This, however, might be difficult to achieve if work
is spread over several WGs.

/js

-- 
Juergen Schoenwaelder           Jacobs University Bremen gGmbH
Phone: +49 421 200 3587         Campus Ring 1, 28759 Bremen, Germany
Fax:   +49 421 200 3103         <http://www.jacobs-university.de/>
_______________________________________________
6lowpan mailing list
6lowpan@ietf.org
https://www.ietf.org/mailman/listinfo/6lowpan

---------------------------------------------------------------------
This transmission (including any attachments) may contain confidential information, privileged material (including material protected by the solicitor-client or other applicable privileges), or constitute non-public information. Any use of this information by anyone other than the intended recipient is prohibited. If you have received this transmission in error, please immediately reply to the sender and delete this information from your system. Use, dissemination, distribution, or reproduction of this transmission by unintended recipients is not authorized and may be unlawful.