Re: [coman] Device Classes?

Andy Bierman <andy@yumaworks.com> Sat, 05 April 2014 00:16 UTC

Return-Path: <andy@yumaworks.com>
X-Original-To: coman@ietfa.amsl.com
Delivered-To: coman@ietfa.amsl.com
Received: from localhost (ietfa.amsl.com [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 80CBC1A034D for <coman@ietfa.amsl.com>; Fri, 4 Apr 2014 17:16:57 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -1.978
X-Spam-Level:
X-Spam-Status: No, score=-1.978 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, FM_FORGED_GMAIL=0.622, HTML_MESSAGE=0.001, RCVD_IN_DNSWL_LOW=-0.7, SPF_PASS=-0.001] autolearn=ham
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id uvr4OWkZ1VxB for <coman@ietfa.amsl.com>; Fri, 4 Apr 2014 17:16:53 -0700 (PDT)
Received: from mail-qc0-f178.google.com (mail-qc0-f178.google.com [209.85.216.178]) by ietfa.amsl.com (Postfix) with ESMTP id EF01F1A0336 for <coman@ietf.org>; Fri, 4 Apr 2014 17:16:48 -0700 (PDT)
Received: by mail-qc0-f178.google.com with SMTP id i8so4208964qcq.23 for <coman@ietf.org>; Fri, 04 Apr 2014 17:16:44 -0700 (PDT)
X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20130820; h=x-gm-message-state:mime-version:in-reply-to:references:date :message-id:subject:from:to:cc:content-type; bh=Qy8UJIE7Fsi3ohBuOT7MCHM2hcvNu1oMoMjvdQ0EBVA=; b=ECYeCU2hd7k6zxl+4xBaFinBoeWBkEZG6hCPuYXL0uW5PjL/hc75qrTqwFKFaMlQkz 1WxAmkqkhit6gsZu2oXmRpWoWuCTlHk22ZQDNPwrd2XaQKSMvRqIhW76LAAw/Jxolby5 MA7LreBoFY/TBi0xcBalgjat/1CoD860NzBSy+eogxZMuhd3Zl/OgORgqp8vNmxyMQp+ 9vkMRCR+GzOmU/nz8r3w/zYzlZf1tGzXydAPnat5vegBRRoIPlzrIfTDADNFbMGF2lxI FE+lsbIVznGL5BKmNKYe8lZ9vM0l2Xb2MAd4EPbXUVIILeo6TdjhWiNNN6BkeoM+MhUa YRzw==
X-Gm-Message-State: ALoCoQkifoB4iJ3JO4wK4r5pIy1nSwW5H+8mnCvo0gbtO+I65tm4dJ27afuZl3GpygYuyIXYxhBO
MIME-Version: 1.0
X-Received: by 10.140.17.81 with SMTP id 75mr17289713qgc.35.1396657003916; Fri, 04 Apr 2014 17:16:43 -0700 (PDT)
Received: by 10.140.41.134 with HTTP; Fri, 4 Apr 2014 17:16:43 -0700 (PDT)
In-Reply-To: <B443FF47-FCF4-4FD7-96C9-07686D75D690@tzi.org>
References: <533BBFB7.2000100@gmx.net> <893C4FAC-437D-4140-9832-A9ABA2D1518A@tzi.org> <533E75A9.5080003@gmx.net> <8D653B3C-E678-4A66-9798-978950977694@tzi.org> <533E9864.4060806@gmx.net> <EBDEF2B4-32C3-4B41-9CAF-C1A836CC6D7B@tzi.org> <533E9B6B.1080602@gmx.net> <B443FF47-FCF4-4FD7-96C9-07686D75D690@tzi.org>
Date: Fri, 04 Apr 2014 17:16:43 -0700
Message-ID: <CABCOCHQRki5grLuTeQX3QRCnUxe14M0UueKN8=eFdO9K-rWLeQ@mail.gmail.com>
From: Andy Bierman <andy@yumaworks.com>
To: Carsten Bormann <cabo@tzi.org>
Content-Type: multipart/alternative; boundary="001a11c0f5f6979d8004f6408c1e"
Archived-At: http://mailarchive.ietf.org/arch/msg/coman/bphdJB7PlQ1GwlNlbi2jfvH8-NE
Cc: "coman@ietf.org" <coman@ietf.org>, Hannes Tschofenig <hannes.tschofenig@gmx.net>
Subject: Re: [coman] Device Classes?
X-BeenThere: coman@ietf.org
X-Mailman-Version: 2.1.15
Precedence: list
List-Id: Management of Constrained Networks and Devices <coman.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/coman>, <mailto:coman-request@ietf.org?subject=unsubscribe>
List-Archive: <http://www.ietf.org/mail-archive/web/coman/>
List-Post: <mailto:coman@ietf.org>
List-Help: <mailto:coman-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/coman>, <mailto:coman-request@ietf.org?subject=subscribe>
X-List-Received-Date: Sat, 05 Apr 2014 00:16:57 -0000

On Fri, Apr 4, 2014 at 6:49 AM, Carsten Bormann <cabo@tzi.org> wrote:

>
> On 04 Apr 2014, at 13:45, Hannes Tschofenig <hannes.tschofenig@gmx.net>
> wrote:
>
> > Hi Carsten.
> >
> >
> > On 04/04/2014 02:08 PM, Carsten Bormann wrote:
> >> On 04 Apr 2014, at 13:32, Hannes Tschofenig <hannes.tschofenig@gmx.net>
> wrote:
> >>
> >>> For me the software update mechanism is extremely important since it is
> >>> not just a way to replace the entire firmware but also to provision
> >>> certain protocol parameters.
> >>
> >> Provisioning protocol parameters is one CoAP PUT to the right resource.
>  Cf. OMA LWM2M.
> >> (They also do define a firmware update mechanism, but that seems to
> presume the device has space for a complete firmware image.)
> >
> > That is exactly the question I raised when it comes to network
> management.
> >
> > I don't understand what network management protocol add beyond what is
> > already there with CoAP.
>
> Assuming we continue to use the client-server model of network management,
> to use CoAP for this we need to define
>
> 1) What are the URIs that can be used for management?  How does the client
> learn them (combination of discovery, URI templates, HATEOAS)?
>
> 2) What are the representations being exchanged (data format, data
> modeling method).
>
>
RESTCONF addresses (1) and (2).
It replaces HATEOAS with YANG in order to be extensible,
modular, and predictable. The target use-case is programmatic
control.  HATEOAS seems more appropriate when human eyeballs and
brain power are part of the state machine.

IMO YANG would be a better long-term decision than SMIv2.
It may seem that features like custom operations are too
heavy-weight and over-kill for constrained networks, but it
could be just the opposite.  Custom operations allow expensive
generic operations to be condensed and 'packaged' to be as
small as possible.




> 3) What is the security model.
>
> There has been a strong argument that we should not start from scratch
> with (2) (and probably not entirely with (1) either), even if we are not
> using the other parts of existing management protocols.
>
> Proposals to address (1) and (2) are, for instance:
> http://tools.ietf.org/html/draft-vanderstok-core-comi-03
> http://www.tzi.de/~cabo/noms2014.pdf
>
> (My assumption is that ACE will be good enough to cover (3); we'll have to
> make sure the lessons learned from management security go into ACE.)
>
> > Of course, you could replace CoAP entirely with SNMP
>
> SNMP is a bit more specialized and will not fit all applications that CoAP
> is designed to cover.
> But, yes, SNMP has been used successfully as an application protocol in
> certain environments.
>
> >> If you want to do this the SEP2.0 way, you need EAP/PANA.
> >> (SEP2.0 is targeting class-2+, not class-1.)
> >
> > With devices that are in direct connection with each other you could
> > argue that there is no need for DTLS and alike since you will have to
> > deal with the pairing procedure at the lower layer. Many devices fall
> > into that category.
>
> (Defining single-hop security only is not very useful for the Internet of
> Things.)
>
> > If that's not the case I believe you cannot assume that no network
> > access authentication will be needed.
>
> Indeed, most wireless networks will need network access control.
> Maybe there are ways to authorize (!) access to a network that are more
> appropriate for the Internet of Things.
> But this is outside the scope of COMAN.
>
> Grüße, Carsten
>
>

Andy