[Anima-bootstrap] IoT and scope of bootstrap

Michael Richardson <mcr+ietf@sandelman.ca> Wed, 25 November 2015 14:54 UTC

Return-Path: <mcr@sandelman.ca>
X-Original-To: anima-bootstrap@ietfa.amsl.com
Delivered-To: anima-bootstrap@ietfa.amsl.com
Received: from localhost (ietfa.amsl.com [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 980B41A6FE5 for <anima-bootstrap@ietfa.amsl.com>; Wed, 25 Nov 2015 06:54:49 -0800 (PST)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -0.587
X-Spam-Level:
X-Spam-Status: No, score=-0.587 tagged_above=-999 required=5 tests=[BAYES_40=-0.001, RP_MATCHES_RCVD=-0.585, SPF_PASS=-0.001] autolearn=ham
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id GtcyLQnAG9M8 for <anima-bootstrap@ietfa.amsl.com>; Wed, 25 Nov 2015 06:54:47 -0800 (PST)
Received: from tuna.sandelman.ca (tuna.sandelman.ca [IPv6:2607:f0b0:f:3:216:3eff:fe7c:d1f3]) (using TLSv1.2 with cipher AECDH-AES256-SHA (256/256 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id BCF9E1AC3A7 for <anima-bootstrap@ietf.org>; Wed, 25 Nov 2015 06:54:46 -0800 (PST)
Received: from sandelman.ca (obiwan.sandelman.ca [IPv6:2607:f0b0:f:2::247]) by tuna.sandelman.ca (Postfix) with ESMTP id 378D52009E for <anima-bootstrap@ietf.org>; Wed, 25 Nov 2015 09:59:33 -0500 (EST)
Received: by sandelman.ca (Postfix, from userid 179) id 6EFFD63753; Wed, 25 Nov 2015 09:54:45 -0500 (EST)
Received: from sandelman.ca (localhost [127.0.0.1]) by sandelman.ca (Postfix) with ESMTP id 5CE12636C4 for <anima-bootstrap@ietf.org>; Wed, 25 Nov 2015 09:54:45 -0500 (EST)
From: Michael Richardson <mcr+ietf@sandelman.ca>
To: anima-bootstrap <anima-bootstrap@ietf.org>
X-Attribution: mcr
X-Mailer: MH-E 8.6; nmh 1.3-dev; GNU Emacs 24.4.2
X-Face: $\n1pF)h^`}$H>Hk{L"x@)JS7<%Az}5RyS@k9X%29-lHB$Ti.V>2bi.~ehC0; <'$9xN5Ub# z!G,p`nR&p7Fz@^UXIn156S8.~^@MJ*mMsD7=QFeq%AL4m<nPbLgmtKK-5dC@#:k
MIME-Version: 1.0
Content-Type: multipart/signed; boundary="=-=-="; micalg="pgp-sha1"; protocol="application/pgp-signature"
Date: Wed, 25 Nov 2015 09:54:45 -0500
Message-ID: <13717.1448463285@sandelman.ca>
Sender: mcr@sandelman.ca
Archived-At: <http://mailarchive.ietf.org/arch/msg/anima-bootstrap/831kj-foSYHNtNl5FCUmPGdS2_k>
Subject: [Anima-bootstrap] IoT and scope of bootstrap
X-BeenThere: anima-bootstrap@ietf.org
X-Mailman-Version: 2.1.15
Precedence: list
List-Id: Mailing list for the bootstrap design team of the ANIMA WG <anima-bootstrap.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/anima-bootstrap>, <mailto:anima-bootstrap-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/anima-bootstrap/>
List-Post: <mailto:anima-bootstrap@ietf.org>
List-Help: <mailto:anima-bootstrap-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/anima-bootstrap>, <mailto:anima-bootstrap-request@ietf.org?subject=subscribe>
X-List-Received-Date: Wed, 25 Nov 2015 14:54:49 -0000

I wrote some text this morning to clarify how IoT is included/excluded.
see: https://github.com/ietf-roll/anima-bootstrap/commits/master
(maybe would have been cleaner had I made it a pull request).

I also added a note about ACE, which I'll put in another email.


+      <section title="Scope of solution">
+        <t>
+          Questions have been posed as to whether this solution is suitable
+          in general for Internet of Things (IoT) networks.  In general the
+          answer is no, but the terminology of <xref target="RFC7228" /> is
+          best used to describe the boundaries.
+        </t>
+        <t>
+          The entire solution described in this document is aimed in general
+          at non-constrained (i.e. class 2+) devices  operating on a
+          non-Challenged network.
+          The entire solution described here is not intended to be useable
as-is
+          by constrained devices operating on challenged networks (such as
+          802.15.4 LLNs).
+        </t>
+        <t>
+          In many target applications, the systems
+          involved are large router platforms with multi-gigabit
+          inter-connections, mounted in controlled access data centers.  But
+          this solution is not exclusive to the large, it is intended to
+          scale to thousands of devices located in hostile environments,
such
+          as ISP provided CPE devices which are drop-shipped to the end
user.
+          The situation where an order is fulfilled from distributed
+          warehouse from a common stock and shipped directly to the target
+          location at the request of the domain owner is explicitely
+          supported.  That stock ("SKU") could be provided to a number of
+          potential domain owners, and the eventual domain owner will not
+          know a-priori which device will go to which location.
+        </t>
+        <t>
+          Specifically, there are protocol aspects described here which
might
+          result in congestion collapse or energy-exhaustion of intermediate
+          battery powered routers in an LLN.  Those types of networks SHOULD
+          NOT use this solution.
+        </t>
+        <t>
+          The imprint protocol described here could, however, be used by
+          non-energy constrained devices joining a non-constrained network
+          (for instance, smart light bulbs are usually mains powered, and
+          speak 802.11).  It could also be used by non-constrained devices
+          across a non-energy constrained, but challenged network (such as
+          802.15.4).
+        </t>
+        <t>
+          Some aspects are in scope for constrained devices on challenged
+          networks: the certificate contents, and the process by which the
+          four questions above are resolved is in scope.  It is simply the
+          actual on-the-wire imprint protocol which is likely inappropriate.
+        </t>
+      </section>



--
Michael Richardson <mcr+IETF@sandelman.ca>, Sandelman Software Works
 -= IPv6 IoT consulting =-