Re: [core] FW: New Version Notification for draft-fz-core-coap-pm-00.txt

Thomas Fossati <tho.ietf@gmail.com> Tue, 09 November 2021 17:56 UTC

Return-Path: <tho.ietf@gmail.com>
X-Original-To: core@ietfa.amsl.com
Delivered-To: core@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id C239E3A0EC7 for <core@ietfa.amsl.com>; Tue, 9 Nov 2021 09:56:25 -0800 (PST)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -2.098
X-Spam-Level:
X-Spam-Status: No, score=-2.098 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, DKIM_SIGNED=0.1, DKIM_VALID=-0.1, DKIM_VALID_AU=-0.1, DKIM_VALID_EF=-0.1, FREEMAIL_FROM=0.001, SPF_HELO_NONE=0.001, SPF_PASS=-0.001, URIBL_BLOCKED=0.001] autolearn=ham autolearn_force=no
Authentication-Results: ietfa.amsl.com (amavisd-new); dkim=pass (2048-bit key) header.d=gmail.com
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id RlBj-98krzNi for <core@ietfa.amsl.com>; Tue, 9 Nov 2021 09:56:23 -0800 (PST)
Received: from mail-lj1-x234.google.com (mail-lj1-x234.google.com [IPv6:2a00:1450:4864:20::234]) (using TLSv1.2 with cipher ECDHE-RSA-AES128-GCM-SHA256 (128/128 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id 3013B3A0EC4 for <core@ietf.org>; Tue, 9 Nov 2021 09:56:23 -0800 (PST)
Received: by mail-lj1-x234.google.com with SMTP id 1so137910ljv.2 for <core@ietf.org>; Tue, 09 Nov 2021 09:56:23 -0800 (PST)
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=gmail.com; s=20210112; h=mime-version:references:in-reply-to:from:date:message-id:subject:to :cc:content-transfer-encoding; bh=GE6TASG9xOGKFZd9X0N5cvzyLEo/iDmcY+wXc2lIX4o=; b=eRNiO8m1G07bkZuAH6UHTZ5FvQVp9eHLeGSLgtez6eSVDPcHg6b65VsKE53cyDPSaj SxWCdxtu4K1YRA5dYxH68sH2Aary18JLH1nEmQYrMhxTVc7oYaIbSdt5f9mTqTVQgr6Q +Ls2vavAglzn8ysnuSfzrEFcsGBBPKg3Xw+tj0ZWhFlNBSeOHphTfORz0vUBH3CeLZ80 MiUvgzdZJBlR6oYQo43Pq5HWgf13gA4Vpj30Odz0yQE4y9dFTGe53gW+ukk0H7po/+yG ucz82ECvPihU3xB55efEUxVAeNdlAfSPjBC0z/r7lmSWiCrwu29CDTGnd0xYY+B2Ld1W M4yA==
X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20210112; h=x-gm-message-state:mime-version:references:in-reply-to:from:date :message-id:subject:to:cc:content-transfer-encoding; bh=GE6TASG9xOGKFZd9X0N5cvzyLEo/iDmcY+wXc2lIX4o=; b=g8TndgTZc+GFqwTM1nJyVaRKrzrTHsdG7dDrLudprhCM5Hhxu2/TQ0o3XVGS9rO8UM On2lJvdHzfLwRaqtqxR9LAh2PBKxOhNwmPyeAozP5GpN3W/kiAgQTqRHytkY1fRqbES4 bIZAAhRvRRH1IsaL2mxdE8Xc78vPMUyZ14Gp8ueDAkN7aS2Gjg0PpwJ5+qH9sL5j9wYk uLK7w3cZHvo6rghzS23VwjklZB5QA3pIf4WB9j0dW+a5TioeSGDArqRPJIUP/V6/Fr/i m6qvJ41DGL+A+5ayl9EJDQche1MW0IRQFL78cRpvu3q3BwR4gK9tbNcjEGBEBDJ5Lvkr lTqQ==
X-Gm-Message-State: AOAM532ZQtHoLSvlEoMMxBsv3sAInda2lck2Y8hm7xRWifaGRvmDHOOY N+yEL0AwrC2oQDUtDc1HDSl3blDdjsAe2tSMVyE=
X-Google-Smtp-Source: ABdhPJyVN8aiwi6GX9eYWMVL+se/FrB3w3DPPKBVrxhbJhaEFXRfxbUJl4M9/IsQfQg8etAzZwx8UtXyYPzwl3YdcUQ=
X-Received: by 2002:a2e:b88b:: with SMTP id r11mr9423960ljp.474.1636480581018; Tue, 09 Nov 2021 09:56:21 -0800 (PST)
MIME-Version: 1.0
References: <163491881526.20431.3603752246262277164@ietfa.amsl.com> <f3f016757c5a47298ac4147ff00e6e8e@huawei.com> <YYgC3Y4YopABpkJX@hephaistos.amsuess.com> <33b733997e454534a7155b839b657a74@huawei.com> <YYqrxb+2557zrXqQ@hephaistos.amsuess.com>
In-Reply-To: <YYqrxb+2557zrXqQ@hephaistos.amsuess.com>
From: Thomas Fossati <tho.ietf@gmail.com>
Date: Tue, 09 Nov 2021 17:56:10 +0000
Message-ID: <CAObGJnPRq0qXekJWUX7BRsQpWdhMKpM3=jtCWp9-9ZW48cf36w@mail.gmail.com>
To: Christian Amsüss <christian@amsuess.com>
Cc: Giuseppe Fioccola <giuseppe.fioccola@huawei.com>, Mauro Cociglio <mauro.cociglio@telecomitalia.it>, Massimo Nilo <massimo.nilo@telecomitalia.it>, "core@ietf.org" <core@ietf.org>, Fabio Bulgarella <fabio.bulgarella@guest.telecomitalia.it>
Content-Type: text/plain; charset="UTF-8"
Content-Transfer-Encoding: quoted-printable
Archived-At: <https://mailarchive.ietf.org/arch/msg/core/CqBaXcASEjPEuRjSK3Lhp1-T_q8>
Subject: Re: [core] FW: New Version Notification for draft-fz-core-coap-pm-00.txt
X-BeenThere: core@ietf.org
X-Mailman-Version: 2.1.29
Precedence: list
List-Id: "Constrained RESTful Environments \(CoRE\) Working Group list" <core.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/core>, <mailto:core-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/core/>
List-Post: <mailto:core@ietf.org>
List-Help: <mailto:core-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/core>, <mailto:core-request@ietf.org?subject=subscribe>
X-List-Received-Date: Tue, 09 Nov 2021 17:56:26 -0000

Hi Christian, Giuseppe, Mauro, Massimo, Fabio,

On Tue, Nov 9, 2021 at 5:11 PM Christian Amsüss <christian@amsuess.com> wrote:
>
> Hello Giuseppe,
>
> On Mon, Nov 08, 2021 at 08:50:49AM +0000, Giuseppe Fioccola wrote:
> > [GF]: The derived values (RTT, losses) can be useful for an operator
> > or an enterprise that is managing a constrained, low-power and lossy
> > network. As IoT and M2M keep growing, a mechanism to measure the
> > performance can become useful to meet the operational requirements.
> > Also, it should be a simple mechanism to be developed on constrained
> > nodes.
>
> OK, so this sounds more like a "characterization" (to demonstrate
> meeting some requirements?) than "feeding these values into the protocol
> again", is that correct? Or is concrete action to be taken based on
> these? (If so, I'd imagine it would need to be more fine-grained than
> across all involved proxies).
>
> > [GF]: The intermediaries or on-path observers could also be network
> > gateway or probes, that can see deep into application and read the
> > measurements. This information can be used to monitor the network in
> > order to check the operational performance and to employ further
> > network optimization. The measurements can be end-to-end between
> > Client and Server or can be split. If CoAP Proxies are used, the
> > measurements can be done between the Proxies or between the Proxy and
> > the Client. The Server can distinguish the source client, for example
> > by using additional flow information such as the IP addresses. It
> > could also possible to bundle different clients if they are mixed. I
> > think we have to clarify the different scenarios in the next version
> > of the draft.
>
> Let me illustrate what I mean here by describing a use case like those
> I'd expect to see it around this document (not necessarily in a document
> update -- OK if that helps, but for initial steps this thread may
> suffice):
>
> 1 -- 2 -- 3 -- 4 -(Internet)- 5
>
> 1. Devices: Sensors with 6LoWPAN connectivity, operated by A.
> 2. Gateway: Proxy (eg. running on a cellular-to-6lowpan router) shipped
>    with the sensors and operated by A.
> 3. Uplink: provided by B.
> 4. Probe: passive monitoring device operated by B.
> 5. Backend: Data center operated by A.
>
> If this protocol is run between 1 and 5 (across intermediaries), the
> values read at 4 would be total round-trip times over the 6LoPAN, the
> cellular network and the remaining Internet. I wouldn't know what to do
> with those values; given that 2 is acting as a proxy, they are not the
> relevant parameters to tune their CoAP stack, and wouldn't tell anyone
> where to add capacity.
>
> (Moreover, data at 4 would look like garbage -- different clients at 1
> would send uncoordinated PM values, and at 4 the clients are not
> distinguishable any more by design).
>
> If, to set up a similar but different scenario, 4 was also a CoAP proxy,
> the PM option were hop-by-hop, and the protocol would be performed
> between 2 and 4, then this would result in a characterization of the
> cellular uplink, and (in my vastly oversimplifying imagination) might be
> used to place additional cell towers there.
>
> The operator situation here does raise an additional concern: If 2 is
> operated by A and 4 by B, wouldn't this be prone to A forcing B to take
> action (for example) by maliciously flipping the square bit every 62nd
> message, giving B the impression that there is message loss? I'm not
> asking for security considerations here at this point (I would later,
> and privacy on top of that), more about the assumptions underlying this
> work.


Yep, it looks like the ideal scenario is one where the new CoAP
options are clear-text and integrity protected end-to-end by OSCORE.
Then A and/or B can put their measurement boxes (or functions) in one
or more places to break down the different RTT contributions where it
makes sense (e.g., at the ingress/egress of their respective network
segments).  If we can't assume integrity protection we'd need to take
cheating inventives, trust relationships and all those things into
consideration, which tend to make the analysis much more complicated.

cheers!

>
> BR
> Christian
>
> --
> To use raw power is to make yourself infinitely vulnerable to greater powers.
>   -- Bene Gesserit axiom
> _______________________________________________
> core mailing list
> core@ietf.org
> https://www.ietf.org/mailman/listinfo/core


-- 
Thomas