Re: [6tisch] MSF adapts to traffic only for secured packets

"Pascal Thubert (pthubert)" <pthubert@cisco.com> Thu, 12 December 2019 17:04 UTC

Return-Path: <pthubert@cisco.com>
X-Original-To: 6tisch@ietfa.amsl.com
Delivered-To: 6tisch@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 3B355120A18 for <6tisch@ietfa.amsl.com>; Thu, 12 Dec 2019 09:04:17 -0800 (PST)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -14.499
X-Spam-Level:
X-Spam-Status: No, score=-14.499 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, DKIM_SIGNED=0.1, DKIM_VALID=-0.1, DKIM_VALID_AU=-0.1, HTML_MESSAGE=0.001, RCVD_IN_DNSWL_HI=-5, SPF_PASS=-0.001, URIBL_BLOCKED=0.001, USER_IN_DEF_DKIM_WL=-7.5] autolearn=ham autolearn_force=no
Authentication-Results: ietfa.amsl.com (amavisd-new); dkim=pass (1024-bit key) header.d=cisco.com header.b=OqL2eajq; dkim=pass (1024-bit key) header.d=cisco.onmicrosoft.com header.b=ESxcq8hh
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id mQIvYEe7vQK4 for <6tisch@ietfa.amsl.com>; Thu, 12 Dec 2019 09:04:13 -0800 (PST)
Received: from alln-iport-4.cisco.com (alln-iport-4.cisco.com [173.37.142.91]) (using TLSv1.2 with cipher DHE-RSA-SEED-SHA (128/128 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id 462F21209F0 for <6tisch@ietf.org>; Thu, 12 Dec 2019 09:04:13 -0800 (PST)
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/simple; d=cisco.com; i=@cisco.com; l=69832; q=dns/txt; s=iport; t=1576170253; x=1577379853; h=from:to:subject:date:message-id:references:in-reply-to: mime-version; bh=K776wfNkoLng47CFwL9RK2PkeLU/FMcL+3VGNGwlwNk=; b=OqL2eajq/Go5RgvcbFsz4mvaKxq3q4kkp7nWSBwcouqgpDobPdFDx4UL aKskHIGCNYDf7es5cjqWk9zVhlP1YVqVGxzPdvKM6n7ULaqVnr+SgL4Ro JBRhPtqpdU2u3JkcAQr4wSXtC6aNkkBYiQ3g5wQxrcvkX2kS2yId1XsNS U=;
IronPort-PHdr: 9a23:YSXa5RbHoN7mPfThlRe/ka3/LSx94ef9IxIV55w7irlHbqWk+dH4MVfC4el20gabRp3VvvRDjeee87vtX2AN+96giDgDa9QNMn1NksAKh0olCc+BB1f8KavycywnFslYSHdu/mqwNg5eH8OtL1A=
X-IronPort-Anti-Spam-Filtered: true
X-IronPort-Anti-Spam-Result: A0DjDwAqcvJd/51dJa1lHAEBAQEBBwEBEQEEBAEBgX6BHC8pJwVsWCAECyqEA4NGA4sKToIRiVuOK4FCgRADVAkBAQEMAQEjCgIBAYMKgTYCF4FzJDgTAgMNAQEEAQEBAgEFBG2FNwyFXgEBAQEDEggJChMBAQclBgYPAgEGAhEBAwEBARULAQYDAgICHxEUAwYIAgQBEggBGUQXgiaBeU0DLgECDJJtkGQCgTiIYXWBMoJ+AQEFhQcNC4IXCYE2hRyEM4JJGoFBP4ERR4FOfj6CG0kBAQOBGxIBCwEGAQMeFRYJCYJRMoIsjRoggnSFVIlXjldDCoIwhySJWliEPoJCMJdPjkuBRocGghePWgIEAgQFAg4BAQWBaSJncXAVO4JsCUcRFI98JIEnAQeCRIUUhT90gSiMLwEOF4E8XwEB
X-IronPort-AV: E=Sophos;i="5.69,306,1571702400"; d="scan'208,217";a="381695862"
Received: from rcdn-core-6.cisco.com ([173.37.93.157]) by alln-iport-4.cisco.com with ESMTP/TLS/DHE-RSA-SEED-SHA; 12 Dec 2019 17:04:11 +0000
Received: from XCH-ALN-002.cisco.com (xch-aln-002.cisco.com [173.36.7.12]) by rcdn-core-6.cisco.com (8.15.2/8.15.2) with ESMTPS id xBCH4B6A005736 (version=TLSv1.2 cipher=AES256-SHA bits=256 verify=FAIL); Thu, 12 Dec 2019 17:04:11 GMT
Received: from xhs-rcd-002.cisco.com (173.37.227.247) by XCH-ALN-002.cisco.com (173.36.7.12) with Microsoft SMTP Server (TLS) id 15.0.1473.3; Thu, 12 Dec 2019 11:04:10 -0600
Received: from xhs-rcd-003.cisco.com (173.37.227.248) by xhs-rcd-002.cisco.com (173.37.227.247) with Microsoft SMTP Server (TLS) id 15.0.1473.3; Thu, 12 Dec 2019 11:04:09 -0600
Received: from NAM10-DM6-obe.outbound.protection.outlook.com (72.163.14.9) by xhs-rcd-003.cisco.com (173.37.227.248) with Microsoft SMTP Server (TLS) id 15.0.1473.3 via Frontend Transport; Thu, 12 Dec 2019 11:04:09 -0600
ARC-Seal: i=1; a=rsa-sha256; s=arcselector9901; d=microsoft.com; cv=none; b=Gb6F2pI0w1s7ouPcw3/Hg4sFjpq9B2v2P1gne5ps8iYXVTUAN9JphubzoVnG+nYSNJWpJCjCnIeTtrYDal2sMKPOhBAVgw2pxOcd/8llw0bF9A2DA2+HON6fhu8Ebc14GZ4RqiN9BKswszGE0FAJvSEmhzzdCUUpkgYXgxmw/kHnr10VGnW1U5g8ZIrbBxBpuqKW2lBzKy0Pj3+Qt0qJ14rmbW4tWO2hOTAy4G7W5YXfkUhVm3TJWcDe5gp478eDDzgJMImRqKPr6z8DdYDkcC6lmyeYyCFw4fAoPMM4YeNP1Iby0aor98MGKmD3m8tTZhfLkpBRDri/UceJYrCWVQ==
ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=microsoft.com; s=arcselector9901; h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-SenderADCheck; bh=K776wfNkoLng47CFwL9RK2PkeLU/FMcL+3VGNGwlwNk=; b=f9NdF3W3wf/TUZNU4qZXtC4eUKuEuuPYo6rHXY0c0GvOejZq88+ciLHJOETYUNDn0WN8rIqGFDt3FwQaVrcZ7ovNYKa51rYQQoZ25os10w1gnOv82PlsbRpchAbrhQHx3RcDTgn6uEtjEqzt4+Jpfx6hYjtFo5/+nDeDIYgha0qi18yZCVViqx7JX6y6OCICZOzjlQiUX6C3ObuB0vlLZbYeNbtqhBtZfNa776l9il5xcVfME/JxRpoKjKyH9Dd2xI2GrAN3vV7jgiDu6r0QzAjbVN/qRwbBxEh5fY6c8Cnj/ZzteDfN/Lm2yykg6FOvOWAbr8Q/HfFX05aktLgPfw==
ARC-Authentication-Results: i=1; mx.microsoft.com 1; spf=pass smtp.mailfrom=cisco.com; dmarc=pass action=none header.from=cisco.com; dkim=pass header.d=cisco.com; arc=none
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=cisco.onmicrosoft.com; s=selector2-cisco-onmicrosoft-com; h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-SenderADCheck; bh=K776wfNkoLng47CFwL9RK2PkeLU/FMcL+3VGNGwlwNk=; b=ESxcq8hhgw9O+fdH5dz0sbTQPC2XxZKtM/rpzlaD3Yuo0IM/3s6AXWrq1APwjoG1iqxrbNC+bzOekgBh0rZQrZ/Fy0MBP6udnkxTFRP/paK7inRnFLTIzS6uvncOxjtrVgEkoo1qUBGeH0CYE9jPRhKN/SKGGQPUcedbMrah8tE=
Received: from MN2PR11MB3565.namprd11.prod.outlook.com (20.178.250.159) by MN2PR11MB4189.namprd11.prod.outlook.com (20.179.150.161) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id 15.20.2516.14; Thu, 12 Dec 2019 17:04:08 +0000
Received: from MN2PR11MB3565.namprd11.prod.outlook.com ([fe80::3037:66f1:dc79:b564]) by MN2PR11MB3565.namprd11.prod.outlook.com ([fe80::3037:66f1:dc79:b564%7]) with mapi id 15.20.2538.016; Thu, 12 Dec 2019 17:04:08 +0000
From: "Pascal Thubert (pthubert)" <pthubert@cisco.com>
To: Tengfei Chang <tengfei.chang@gmail.com>, 6tisch <6tisch@ietf.org>
Thread-Topic: [6tisch] MSF adapts to traffic only for secured packets
Thread-Index: AQHVq4eZrJKqi5A/BEWNlP7phaDTaaervyzQgAkTNU+AAD6iAIAAEo+AgAAPRwCAAWgegIAADhiAgAAEu/CAABQjmoAAAnJg
Date: Thu, 12 Dec 2019 17:04:03 +0000
Deferred-Delivery: Thu, 12 Dec 2019 17:03:03 +0000
Message-ID: <MN2PR11MB3565D5A4DC157BECB84771E4D8550@MN2PR11MB3565.namprd11.prod.outlook.com>
References: <CAAdgstRGHyRKoMLBhRih8yHwDvf-DTp42ZTEBmBP57FSgt8MyA@mail.gmail.com> <MN2PR11MB35652B278DB4225DAAE30956D85C0@MN2PR11MB3565.namprd11.prod.outlook.com> <CAAdgstQG7nkXr7tKffdChftjd8JDG4LvyOqepFsQ8eqZqHt0Aw@mail.gmail.com> <812b5502-9703-b99d-196b-3c983fdc0d5e@inria.fr> <CAAdgstRB86SUFaMXqCzwggh6gy6Jx6uof3W5kDb3imMGZ85r6A@mail.gmail.com> <C91BE829-44B4-479E-8835-2494D49B1FCD@inria.fr> <CAAdgstRG-HOaWhYxwqjfhzK_9atW8J0WqJzqxnaC09CqTrV-kg@mail.gmail.com> <698e8842-db8e-4470-7682-0662043ac004@inria.fr> <1ADB480A-EE66-4349-B0B8-1D0061525ED4@inria.fr> <4e131204-be7e-077a-62d8-22e4e29aeb97@inria.fr> <CAAdgstR6C6hROzfksTnPosxZUpGPbfB0WcVJUpyXfbmZhWBhRQ@mail.gmail.com> <C2BE4117-CBFE-40F1-8B78-F1E90EAD1B59@inria.fr> <MN2PR11MB35650A829035EBD8C167D682D8550@MN2PR11MB3565.namprd11.prod.outlook.com> <CAAdgstQzdHszkxzTXNZ4fRVjHX6cHUKJ3VTFHyjg6LjYWiB3NQ@mail.gmail.com> <e7c4b715-2537-7e33-cd77-ae9525e525dd@inria.fr> <CAAdgstQzww-z-TE8_jR_Y1kh1SbreDan2s0bBYBHMGtBkttKzg@mail.gmail.com> <CAAdgstRn-5i8TzvQY+VSofqXmDLkcR5F94_jK9fX7Un8g6siEA@mail.gmail.com>
In-Reply-To: <CAAdgstRn-5i8TzvQY+VSofqXmDLkcR5F94_jK9fX7Un8g6siEA@mail.gmail.com>
Accept-Language: fr-FR, en-US
Content-Language: en-US
X-MS-Has-Attach:
X-MS-TNEF-Correlator:
authentication-results: spf=none (sender IP is ) smtp.mailfrom=pthubert@cisco.com;
x-originating-ip: [2001:420:c0c0:1006::22a]
x-ms-publictraffictype: Email
x-ms-office365-filtering-correlation-id: 525a68bd-723c-424d-a12c-08d77f254d40
x-ms-traffictypediagnostic: MN2PR11MB4189:
x-microsoft-antispam-prvs: <MN2PR11MB41893AF26771A63CE1836EA7D8550@MN2PR11MB4189.namprd11.prod.outlook.com>
x-ms-oob-tlc-oobclassifiers: OLM:6108;
x-forefront-prvs: 0249EFCB0B
x-forefront-antispam-report: SFV:NSPM; SFS:(10009020)(396003)(136003)(366004)(346002)(39860400002)(376002)(51914003)(52314003)(189003)(199004)(71200400001)(64756008)(7696005)(66556008)(86362001)(66446008)(52536014)(478600001)(6666004)(966005)(110136005)(9686003)(316002)(8676002)(567974003)(30864003)(66574012)(2906002)(55016002)(81156014)(76116006)(6506007)(53546011)(66476007)(5660300002)(186003)(8936002)(66946007)(81166006)(33656002); DIR:OUT; SFP:1101; SCL:1; SRVR:MN2PR11MB4189; H:MN2PR11MB3565.namprd11.prod.outlook.com; FPR:; SPF:None; LANG:en; PTR:InfoNoRecords; MX:1; A:1;
received-spf: None (protection.outlook.com: cisco.com does not designate permitted sender hosts)
x-ms-exchange-senderadcheck: 1
x-microsoft-antispam: BCL:0;
x-microsoft-antispam-message-info: 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
x-ms-exchange-transport-forked: True
Content-Type: multipart/alternative; boundary="_000_MN2PR11MB3565D5A4DC157BECB84771E4D8550MN2PR11MB3565namp_"
MIME-Version: 1.0
X-MS-Exchange-CrossTenant-Network-Message-Id: 525a68bd-723c-424d-a12c-08d77f254d40
X-MS-Exchange-CrossTenant-originalarrivaltime: 12 Dec 2019 17:04:08.0814 (UTC)
X-MS-Exchange-CrossTenant-fromentityheader: Hosted
X-MS-Exchange-CrossTenant-id: 5ae1af62-9505-4097-a69a-c1553ef7840e
X-MS-Exchange-CrossTenant-mailboxtype: HOSTED
X-MS-Exchange-CrossTenant-userprincipalname: fPwpkuRonKP2Nrwp6rU/QP5F3MTcKaIRwbEXSls9AYnbd9ErAPYlJY/dTV1GOsjzWW6FXeaA39CVZcj4gr5M0g==
X-MS-Exchange-Transport-CrossTenantHeadersStamped: MN2PR11MB4189
X-OriginatorOrg: cisco.com
X-Outbound-SMTP-Client: 173.36.7.12, xch-aln-002.cisco.com
X-Outbound-Node: rcdn-core-6.cisco.com
Archived-At: <https://mailarchive.ietf.org/arch/msg/6tisch/zzoRZ_IYaDHvvE7gpuNOvc3ZAMw>
Subject: Re: [6tisch] MSF adapts to traffic only for secured packets
X-BeenThere: 6tisch@ietf.org
X-Mailman-Version: 2.1.29
Precedence: list
List-Id: "Discuss link layer model for Deterministic IPv6 over the TSCH mode of IEEE 802.15.4e, and impacts on RPL and 6LoWPAN such as resource allocation" <6tisch.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/6tisch>, <mailto:6tisch-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/6tisch/>
List-Post: <mailto:6tisch@ietf.org>
List-Help: <mailto:6tisch-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/6tisch>, <mailto:6tisch-request@ietf.org?subject=subscribe>
X-List-Received-Date: Thu, 12 Dec 2019 17:04:17 -0000

A nit Tengfei :

« before it is  passed to MSF. “
Would be
“before it is passed to the 6top sublayer where MSF can observe it.” Or something similar?

Otherwise, all good!

Pascal

From: 6tisch <6tisch-bounces@ietf.org> On Behalf Of Tengfei Chang
Sent: jeudi 12 décembre 2019 17:51
To: 6tisch <6tisch@ietf.org>
Subject: Re: [6tisch] MSF adapts to traffic only for secured packets

All,

The following is our internal discuss about this issue.

We will add the following text in "Security Consideration " section in MSF-09:

   MSF adapts to traffics containing packets from IP layer.  It is
   possible that the IP packet has a non-zero DSCP (Diffserv Code Point
   [RFC2597]) value in its IPv6 header.  The decision whether to hand
   over that packet to MAC layer to transmit or to drop that packet
   belongs to the upper layer and is out of scope of MSF.  As long as
   the decision is made to hand over to MAC layer to transmit, MSF will
   take that packet into account when adapting to traffic.

   Note that non-zero DSCP value may imply that the traffic is
   originated at unauthenticated pledges, referring to
   [I-D.ietf-6tisch-minimal-security].  The implementation at IPv6 layer
   SHOULD ensure that this join traffic is rate-limited before it is
   passed to MSF.  In case there is no rate limit for join traffic,
   intermediate nodes in the 6TiSCH network may be prone to a resource
   exhaustion attack, with the attacker injecting unauthenticated
   traffic from the network edge.  The assumption is that the rate
   limiting function is aware of the available bandwidth in the 6top L3
   bundle(s) towards a next hop, not directly from MSF, but from an
   interaction with the 6top sublayer that manages ultimately the
   bundles under MSF's guidance.  How this rate limit is set is out of
   scope of MSF.




On Thu, Dec 12, 2019 at 5:26 PM Tengfei Chang <tengfei.chang@gmail.com<mailto:tengfei.chang@gmail.com>> wrote:
Thanks for the confirmation Yatch!

I will forward our discuss back to the mailing list for information.



On Thu, Dec 12, 2019 at 5:22 PM Yasuyuki Tanaka <yasuyuki.tanaka@inria.fr<mailto:yasuyuki.tanaka@inria.fr>> wrote:
Thank you, all.

The proposed text looks very good to me. It resolves my concerns.

Best,
Yatch

On 12/12/2019 6:01 AM, Tengfei Chang wrote:
> Cool!  Thanks for the additional info! Integrated as well!
>
> On Thu, Dec 12, 2019 at 4:55 PM Pascal Thubert (pthubert)
> <pthubert@cisco.com<mailto:pthubert@cisco.com> <mailto:pthubert@cisco.com<mailto:pthubert@cisco.com>>> wrote:
>
>     Hello again
>
>
>      > Note that non-zero DSCP value may imply that the traffic is
>     originated at unauthenticated pledges, see {{minimal-security}}.
>      > The implementation at IPv6 layer SHOULD ensure that this join
>     traffic is rate-limited before it is passed to MSF.
>      > In case there is no rate limit for join traffic, intermediate
>     nodes in the 6TiSCH network may be prone to a resource exhaustion
>     attack, with the attacker injecting unauthenticated traffic from the
>     network edge.
>      > How this rate limit is set is out of scope of MSF.
>
>     This would be a nice addition to the security section : )
>
>     Note that the upper layer can only do load control if it is aware of
>     the amount of bandwidth that the current bundles provide. 6top
>     knows. So either 6top does the whole rate limiting, or there is an
>     interface between the IP layer and 6top, that is not described, even
>     in the architecture.
>
>     The idea was to describe all this in
>     https://tools.ietf.org/html/draft-wang-6tisch-6top-sublayer but that
>     will probably not happen anytime soon.
>
>     So maybe complementing Malisa's text as follows:
>
>     ."
>     Note that non-zero DSCP value may imply that the traffic is
>     originated at unauthenticated pledges, see {{minimal-security}}.
>     The implementation at IPv6 layer SHOULD ensure that this join
>     traffic is rate-limited before it is passed to MSF.
>     In case there is no rate limit for join traffic, intermediate nodes
>     in the 6TiSCH network may be prone to a resource exhaustion attack,
>     with the attacker injecting unauthenticated traffic from the network
>     edge.
>     The assumption is that the rate limiting function is aware of the
>     available bandwidth in the 6top L3 bundle(s) towards a next hop, not
>     directly from MSF, but from an interaction with the 6top sublayer
>     that manages ultimately the bundles under MSF's guidance. How this
>     rate limit is set is out of scope of MSF.
>     "
>
>     Pascal
>
>
>     On Wed, Dec 11, 2019 at 6:03 PM Yasuyuki Tanaka
>     <mailto:yasuyuki.tanaka@inria.fr<mailto:yasuyuki.tanaka@inria.fr> <mailto:yasuyuki.tanaka@inria.fr<mailto:yasuyuki.tanaka@inria.fr>>>
>     wrote:
>     Thanks, Malisa,
>
>     First of all,
>
>       > 1) MSF not allocating cells in response to AF43 traffic
>
>     I think it's a layer violation as I mentioned in previous emails in
>     other expressions. So, I'm trying to avoid to do this. MSF, part of L2,
>     shouldn't do anything based on contents in the MAC payload field of a
>     frame in process.
>
>      > Under the assumption that application traffic is given higher
>     priority than join AF43, is this not solved with the two above? Do I
>     miss some other issue you raised?
>
>     You may be able to solve the issue by that, although prioritizing
>     traffic is not a job of a scheduling function.
>
>      > Are you  considering to set the maximum link capacity (i.e. total
>     number of cells) between two neighbors? This is a function of the
>     application traffic and the acceptable “untrusted” traffic, where
>     you only know the latter in advance through the admin policy. IMO,
>     this risks to introduce application drops as well if not properly
>     configured..
>
>     If we have the maximum link capacity to a neighbor, we can avoid
>     resource exhaustion. But the link could be occupied by acceptable
>     "untrusted" traffic, which can cause application packet drops. To
>     prevent that, rate limit for AF43 packets at L3 should be aligned
>     with ,
>     less than, the maximum link capacity configured to MSF.
>
>     Yes, if it's not configured properly, you may have undesirable network
>     performance. But, it's only a matter of configuration.
>
>      > The normative keyword in minimal-security is a SHOULD. If we have
>     a good reason not to follow that, we can explain in MSF why it is
>     the case...
>
>     Thanks; yes I'm aware of that. Having the concern about the layer
>     violation thing, I'm not a fan of the section itself. I think now you
>     know that. :-) Considering the stage of the CoJP draft, I DON'T suggest
>     any change to Section 6.1.1.
>
>     Best,
>     Yatch
>
>
>     On 12/11/2019 6:09 AM, Mališa Vučinić wrote:
>      > Yatch,
>      >
>      > What I don’t understand is how the combination of
>      >
>      > 1) MSF not allocating cells in response to AF43 traffic
>      > 2) keeping AF43 in a separate buffer from application/network
>     traffic, or having dedicated number of slots to AF43 in the same buffer,
>      >
>      > has issues we previously discussed. My understanding is that you
>     worry about the application traffic being dropped due to AF43
>     traffic being present in the same buffer and occupying cells but not
>     causing allocations. Under the assumption that application traffic
>     is given higher priority than join AF43, is this not solved with the
>     two above? Do I miss some other issue you raised?
>      >
>      > p.s. yes, we are trying to avoid resource exhaustion where the
>     attacker injects join requests into the network causing higher power
>     consumption on intermediate nodes.
>      >
>      > Some remarks on your proposal below.
>      >
>      > Mališa
>      >
>      >> On 11 Dec 2019, at 16:02, Yasuyuki Tanaka
>     <mailto:yasuyuki.tanaka@inria.fr<mailto:yasuyuki.tanaka@inria.fr> <mailto:yasuyuki.tanaka@inria.fr<mailto:yasuyuki.tanaka@inria.fr>>>
>     wrote:
>      >>
>      >> Hi Tengfei, Malisa,
>      >>
>      >>> To resolve the issue Yatch mentioned in the thread,
>      >>
>      >> My opinion is, to allow allocations by *acceptable* amount of
>     untrusted traffic. This won't need any modification on MSF, TSCH,
>     and even L3, while keeping application requirements..
>      >>
>      >> L3 enforces traffic controls to ensure untrusted traffic keeps
>     below the limit configured by adminimistrative policy. This is a
>     common practice in IP networks, I believe.
>      >>
>      >>> Malisa pointed out we should states that the buffers for trust
>     traffic
>      >>> and untrusted traffic should be separated.
>      >>
>      >> This doesn't solve the issue. Suppose a case when NumCellsUsed
>     is 74.9999...% and we're going to send one single untrusted packet
>     stored in the buffer for such packets, the untrusted packet will
>     cause NumCellsUsed to exceed LIM_NUMCELLSUSED_HIGH (75%), and will
>     trigger an additional allocation.
>      >>
>      >> Here is one of Pascal's ideas:
>      >>
>      >>> You can have different thresholds based on AF to trigger the
>     allocation.
>      >>
>      >> It sounds like, this idea allows additional allocations by AF43
>     traffic to some extent?
>      >>
>      >> Anyway, as he mentioned,
>      >>
>      >>> This only pushes the problem a bit though.
>      >>
>      >> It does.
>      >>
>      >>> You can have a turbo mode during network startup ... But that
>     is not in scope for MSF.
>      >>
>      >> Regarding "turbo mode" in Pascal's email, it is out of the scope
>     of MSF, and could be difficult to implement in a right way since
>     there is no explicit timing of the end of network "bootstrap".
>      >>
>      >> As you may notice, if we don't allow any allocation by
>     "untrusted" traffic at all, this would give another DoS window to
>     attackers.
>      >>
>      >> What the CoJP draft is trying to resolve is, resource exhaustion
>     attacks by join request packets?
>      >
>      >> If MSF has the upper limit of scheduled cells, it won't allocate
>     cells by untrusted traffic endlessly. Of course, the upper limit
>     should be configured with consideration for application requirements
>     and acceptable "untrusted" traffic.
>      >>
>      >> So, with an assumption L3 controls traffic of AF43 packets, my
>     opinion ends up to be:
>      >>
>      >> - 1. allow allocations by "untrusted" traffic
>      >> - 2. set the upper limit of (TX/RX) cells scheduled with an
>     selected parent
>      >
>      > I don’t understand point 2. Are you  considering to set the
>     maximum link capacity (i.e. total number of cells) between two
>     neighbors? This is a function of the application traffic and the
>     acceptable “untrusted” traffic, where you only know the latter in
>     advance through the admin policy. IMO, this risks to introduce
>     application drops as well if not properly configured..
>      >
>      >>
>      >> I'm sorry for raising this at this stage of the CoJP draft... I
>     didn't notice Section 6.1.1 of
>     draft-ietf-6tisch-minimal-security-14. Section 6.1.1 is very
>     constraining. I remember we had a related discussion on this matter
>     last summer, regarding MSF autonomous cell allocation. Then, I
>     thought, after the discussion, the text of MSf dind't have any issue
>     in handing AF43 packets. But, clearly, it isn't the case…
>      >
>      > The normative keyword in minimal-security is a SHOULD. If we have
>     a good reason not to follow that, we can explain in MSF why it is
>     the case...
>      >
>      >>
>      >> Best,
>      >> Yatch
>      >>
>      >> On 12/11/2019 1:17 AM, Tengfei Chang wrote:
>      >>> Hi Yatch, Pascal,
>      >>> Malisa and I have discussed personally on this topic and think
>     it's better to have an internal discussion on this.
>      >>> To resolve the issue Yatch mentioned in the thread, not
>     adapting the untrusted traffic could make the application traffic
>     being dropped because of limited bandwidth.
>      >>> Malisa pointed out we should states that the buffers for trust
>     traffic and untrusted traffic should be separated.
>      >>> So they won't effect each other. However, the pledge's join
>     traffic still have the same situation being dropped..
>      >>> What is your opinion to handle this issue in MSF?
>      >>> Tengfei
>      >>> On Fri, Dec 6, 2019 at 11:24 PM Yasuyuki Tanaka
>     <mailto:yasuyuki.tanaka@inria.fr<mailto:yasuyuki.tanaka@inria.fr> <mailto:yasuyuki.tanaka@inria.fr<mailto:yasuyuki.tanaka@inria.fr>>
>     <mailto:mailto<mailto:mailto> <mailto:mailto<mailto:mailto>>:yasuyuki.tanaka@inria.fr<mailto:yasuyuki.tanaka@inria.fr>
>     <mailto:yasuyuki.tanaka@inria.fr<mailto:yasuyuki.tanaka@inria.fr>>>> wrote:
>      >>>     Thank you, Tengfei..
>      >>>      > On Dec 6, 2019, at 22:49, Tengfei Chang
>     <mailto:tengfei.chang@gmail.com<mailto:tengfei.chang@gmail.com> <mailto:tengfei.chang@gmail.com<mailto:tengfei.chang@gmail.com>>
>      >>>     <mailto:mailto<mailto:mailto> <mailto:mailto<mailto:mailto>>:tengfei.chang@gmail.com<mailto:tengfei.chang@gmail.com>
>     <mailto:tengfei.chang@gmail.com<mailto:tengfei.chang@gmail.com>>>> wrote:
>      >>>      >
>      >>>      > Handling DSCP value will be a per-packet process. Can we
>     pass
>      >>>     DCSP value
>      >>>      > to the TSCH layer using the interface for transmission
>     defined by
>      >>>      > IEEE802.15.4? I don't think so.
>      >>>      >
>      >>>      > TC: Not sure this is a standard way to do so. For
>     implementing,
>      >>>     tut this value or a flag could have a default value.
>      >>>      > TC: If this value is not given, i.e. frame from IEEE802.15.4
>      >>>     layer, just use the default value.
>      >>>     What we would do are:
>      >>>     - 1. don't update NumCellsUsed for AF43 packets, otherwise
>     update them
>      >>>     - 2. don't update NumTX/NumTxAck for AF43 packets,
>     otherwise update them
>      >>>     The first one may cause undesirable deallocations. If a
>     node has
>      >>>     relayed join request continuously for a certain period of
>     time, the
>      >>>     computed cell utilization (NumCellsUsed / NumCellsElapsed) goes
>      >>>     down, then a negotiated TX cell will be deleted, even if the
>      >>>     negotiated TX cell was scheduled to handle application
>     traffic to
>      >>>     forward. This behavior may degrade end-to-end reliability.
>      >>>     The second one may prevent the node from monitoring link
>     PDRs on
>      >>>     scheduled cells correctly. This could affect the scheduling
>      >>>     collision detection.
>      >>>     Best,
>      >>>     Yatch
>      >>> --
>      >>> ——————————————————————————————————————
>      >>> Dr. Tengfei, Chang
>      >>> Postdoctoral Research Engineer, Inria
>      >>> http://www.tchang.org/ <http://www..tchang.org/<http://www.tchang.org/>>
>      >>> ——————————————————————————————————————
>      >
>
>
>
>     --
>     ——————————————————————————————————————
>
>     Dr. Tengfei, Chang
>     Postdoctoral Research Engineer, Inria
>
>     http://www.tchang.org/
>     ——————————————————————————————————————
>
>
>
> --
> ——————————————————————————————————————
>
> Dr. Tengfei, Chang
> Postdoctoral Research Engineer, Inria
>
> www.tchang.org/<http://www.tchang.org/> <http://www.tchang.org/>
> ——————————————————————————————————————


--
——————————————————————————————————————

Dr. Tengfei, Chang
Postdoctoral Research Engineer, Inria

www.tchang.org/<http://www.tchang.org/>
——————————————————————————————————————


--
——————————————————————————————————————

Dr. Tengfei, Chang
Postdoctoral Research Engineer, Inria

www.tchang.org/<http://www.tchang.org/>
——————————————————————————————————————