[core] Request-Token (in draft-ietf-core-new-block-06 and draft-ietf-core-echo-request-tag-11)

Lauri Piikivi <Lauri.Piikivi@pelion.com> Wed, 20 January 2021 09:35 UTC

Return-Path: <Lauri.Piikivi@pelion.com>
X-Original-To: core@ietfa.amsl.com
Delivered-To: core@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 0DBB43A0DC9 for <core@ietfa.amsl.com>; Wed, 20 Jan 2021 01:35:06 -0800 (PST)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -1.899
X-Spam-Level:
X-Spam-Status: No, score=-1.899 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, DKIM_SIGNED=0.1, DKIM_VALID=-0.1, HTML_MESSAGE=0.001, RCVD_IN_MSPIKE_H2=-0.001, SPF_PASS=-0.001, UNPARSEABLE_RELAY=0.001, URIBL_BLOCKED=0.001] autolearn=ham autolearn_force=no
Authentication-Results: ietfa.amsl.com (amavisd-new); dkim=pass (1024-bit key) header.d=armh.onmicrosoft.com header.b=RkW1X0QC; dkim=pass (1024-bit key) header.d=armh.onmicrosoft.com header.b=RkW1X0QC
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id 7Yv1QpwOaiTN for <core@ietfa.amsl.com>; Wed, 20 Jan 2021 01:35:03 -0800 (PST)
Received: from EUR04-DB3-obe.outbound.protection.outlook.com (mail-eopbgr60083.outbound.protection.outlook.com [40.107.6.83]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id 6064B3A0DBD for <core@ietf.org>; Wed, 20 Jan 2021 01:35:03 -0800 (PST)
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=armh.onmicrosoft.com; s=selector2-armh-onmicrosoft-com; h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-SenderADCheck; bh=Nrmy4KQN/O11Y+OrjDpC2nUlRITM/zwSZMA6MNmDO9I=; b=RkW1X0QCJDahJ2rpL89Z45XqeKOyHCvzlCsQApEC7N+6v3/AbGZ5REKsneppWEpPtJi3KPv0Xq8bmoqkOqg74was2GMiZbhidFK7u0nm2QyTjBaD4KhSLpZW+TV8bTgMki7fHZznTtApeC+9lED0uDCPhdUW32c1YJXTxj6EqC0=
Received: from AS8PR04CA0067.eurprd04.prod.outlook.com (2603:10a6:20b:313::12) by VI1PR08MB3904.eurprd08.prod.outlook.com (2603:10a6:803:c0::33) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id 15.20.3763.9; Wed, 20 Jan 2021 09:34:58 +0000
Received: from AM5EUR03FT052.eop-EUR03.prod.protection.outlook.com (2603:10a6:20b:313:cafe::d8) by AS8PR04CA0067.outlook.office365.com (2603:10a6:20b:313::12) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id 15.20.3784.12 via Frontend Transport; Wed, 20 Jan 2021 09:34:58 +0000
X-MS-Exchange-Authentication-Results: spf=fail (sender IP is 63.35.35.123) smtp.mailfrom=pelion.com; ietf.org; dkim=pass (signature was verified) header.d=armh.onmicrosoft.com;ietf.org; dmarc=none action=none header.from=pelion.com;
Received-SPF: Fail (protection.outlook.com: domain of pelion.com does not designate 63.35.35.123 as permitted sender) receiver=protection.outlook.com; client-ip=63.35.35.123; helo=64aa7808-outbound-1.mta.getcheckrecipient.com;
Received: from 64aa7808-outbound-1.mta.getcheckrecipient.com (63.35.35.123) by AM5EUR03FT052.mail.protection.outlook.com (10.152.17.161) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id 15.20.3784.11 via Frontend Transport; Wed, 20 Jan 2021 09:34:57 +0000
Received: ("Tessian outbound 28c96a6c9d2e:v71"); Wed, 20 Jan 2021 09:34:57 +0000
X-CheckRecipientChecked: true
X-CR-MTA-CID: a2d8914ad15752ee
X-CR-MTA-TID: 64aa7808
Received: from d2a2c867d2bd.1 by 64aa7808-outbound-1.mta.getcheckrecipient.com id D6777FD5-396C-46AA-801E-6EECF0B9477A.1; Wed, 20 Jan 2021 09:34:52 +0000
Received: from EUR05-AM6-obe.outbound.protection.outlook.com by 64aa7808-outbound-1.mta.getcheckrecipient.com with ESMTPS id d2a2c867d2bd.1 (version=TLSv1.2 cipher=ECDHE-RSA-AES256-GCM-SHA384); Wed, 20 Jan 2021 09:34:52 +0000
ARC-Seal: i=1; a=rsa-sha256; s=arcselector9901; d=microsoft.com; cv=none; b=RUpv1CYfwyA9dPlzJOcfa6OA9M6aozg61yudMUuL8EzpRoj1h2Uc2SPBUxfohkgUl16IKJAVwNjmSl99QNF2Ls9jJW/AO5IZhkB9Torh63PCKktZhzlsWEGlVtUhvokQGC3Tgfry9c3pcdxYBNHl5hKj/zZh6AU50MWDG2EHFKXNeFCVZue67vGK8iy+70v/9pCUSBYYS4+4bCTf7LJDIW6VMtrefGdxIi8opK/C1xQe3NmsP58Zr1RBGkqHW9OIrdVwXojb2GO0EZX2uvUaUVLo2KqszMoiIpXsXDYLogX3fTjFaKZ0/HEBPUis9ZKIoEGXoYU9SNLqZ/nESoJQEA==
ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=microsoft.com; s=arcselector9901; h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-SenderADCheck; bh=Nrmy4KQN/O11Y+OrjDpC2nUlRITM/zwSZMA6MNmDO9I=; b=SFS4Zsd4mrFJiD+AgxTdTHFR0JQIwKb6t+tseuEKHZhD39rD8C19oMmOFVEuEi0Z4RqDvMWtXw+eeH1LOYk6hLdvJaM6SZ5GUvmBuOUxrDgKueCxAUvKaGuRv81bVwMKVOvTp5g0fWzd7wDiAsfdeK2vWHXQB+TfqwkdU7y7hS9944ygSKhTBKvAkOiKIEwmFp79/vflSlLm0bddqHlaZfXThA6HvNPtly4VkapBm1hI3hdv5lh7HfWCNsxwYjhwBnhCQKlStM/EIzWHBFZ+NoCC7wyEkF4F8J4hpY1poJJqkgtJ0LvywDRpugYlYwSi5ta3xRsV0sX8rRAAJnK2Kw==
ARC-Authentication-Results: i=1; mx.microsoft.com 1; spf=pass smtp.mailfrom=pelion.com; dmarc=pass action=none header.from=pelion.com; dkim=pass header.d=pelion.com; arc=none
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=armh.onmicrosoft.com; s=selector2-armh-onmicrosoft-com; h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-SenderADCheck; bh=Nrmy4KQN/O11Y+OrjDpC2nUlRITM/zwSZMA6MNmDO9I=; b=RkW1X0QCJDahJ2rpL89Z45XqeKOyHCvzlCsQApEC7N+6v3/AbGZ5REKsneppWEpPtJi3KPv0Xq8bmoqkOqg74was2GMiZbhidFK7u0nm2QyTjBaD4KhSLpZW+TV8bTgMki7fHZznTtApeC+9lED0uDCPhdUW32c1YJXTxj6EqC0=
Received: from HE1PR08MB2825.eurprd08.prod.outlook.com (2603:10a6:7:35::21) by HE1PR0802MB2249.eurprd08.prod.outlook.com (2603:10a6:3:c2::11) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id 15.20.3763.9; Wed, 20 Jan 2021 09:34:50 +0000
Received: from HE1PR08MB2825.eurprd08.prod.outlook.com ([fe80::e552:4f51:ab4c:eb44]) by HE1PR08MB2825.eurprd08.prod.outlook.com ([fe80::e552:4f51:ab4c:eb44%5]) with mapi id 15.20.3763.014; Wed, 20 Jan 2021 09:34:50 +0000
From: Lauri Piikivi <Lauri.Piikivi@pelion.com>
To: "core@ietf.org" <core@ietf.org>
Thread-Topic: Request-Token (in draft-ietf-core-new-block-06 and draft-ietf-core-echo-request-tag-11)
Thread-Index: AQHW7w+AXy8B2TA/Tky41ga77K+Dlw==
Date: Wed, 20 Jan 2021 09:34:50 +0000
Message-ID: <B57FD1F8-80A2-4B53-96A5-DBD1489F0692@arm.com>
Accept-Language: en-US
Content-Language: en-US
X-MS-Has-Attach:
X-MS-TNEF-Correlator:
x-mailer: Apple Mail (2.3608.120.23.2.4)
Authentication-Results-Original: ietf.org; dkim=none (message not signed) header.d=none;ietf.org; dmarc=none action=none header.from=pelion.com;
x-originating-ip: [2001:14ba:14fc:f700:6d68:ed2c:42b8:74c7]
x-ms-publictraffictype: Email
X-MS-Office365-Filtering-HT: Tenant
X-MS-Office365-Filtering-Correlation-Id: ea375a7a-f7f3-4d46-a341-08d8bd26a6b0
x-ms-traffictypediagnostic: HE1PR0802MB2249:|VI1PR08MB3904:
X-Microsoft-Antispam-PRVS: <VI1PR08MB390451377EE0DC2E24A40C9B84A20@VI1PR08MB3904.eurprd08.prod.outlook.com>
x-checkrecipientrouted: true
nodisclaimer: true
x-ms-oob-tlc-oobclassifiers: OLM:9508;OLM:10000;
X-MS-Exchange-SenderADCheck: 1
X-Microsoft-Antispam-Untrusted: BCL:0;
X-Microsoft-Antispam-Message-Info-Original: 1wSl88XANvAMsJDvkZ/XOTgKaDuDXrAKTdljTneQrBUB/eIup1xT4BFDObYTn2oUmp69QMHAdiQK/QSwAAh0nXJk3B8xtS+eOQiVkTA/HiIlRCkvKsZ+4wAMTSb408QduLjKjlIiLGvIFj8KpePh56USIqJUS73qAgkK5HRgU/7213YFbRrLNLTk5eVjpmSVDzBxSCyp2omXLz+fIDEipEKakXL2apjT9HwaNr4GLB6U7xddaPOEmLcuvhUte4gcd0pY7mtUCS2G0Y/Xo2Z/rPbuuTFUrSC2xFMwFmrKhuRBJuhk+fVklCJhNAMkbNn0gYZ0nFjte/bLJWhYKuAMJv/9IE/UrIiMkYjs64lsBQGu9Tbo0cR8vHX9Cpe4D8/ELEjO5qfzPQNBmYpjlaX7qgsHKPsMWVMtSYnx7n1v0TvwjC35fe5XBSlzPtEJkvv6GTjHGN7yWyVShuuNTWAuJQ==
X-Forefront-Antispam-Report-Untrusted: CIP:255.255.255.255; CTRY:; LANG:en; SCL:1; SRV:; IPV:NLI; SFV:NSPM; H:HE1PR08MB2825.eurprd08.prod.outlook.com; PTR:; CAT:NONE; SFS:(4636009)(376002)(396003)(346002)(39850400004)(366004)(136003)(66446008)(71200400001)(8936002)(6916009)(83380400001)(76116006)(8676002)(66476007)(66946007)(64756008)(5660300002)(33656002)(66556008)(2906002)(478600001)(36756003)(316002)(86362001)(9686003)(6486002)(186003)(6506007)(166002)(6512007); DIR:OUT; SFP:1101;
x-ms-exchange-antispam-messagedata: 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
x-ms-exchange-transport-forked: True
Content-Type: multipart/alternative; boundary="_000_B57FD1F880A24B5396A5DBD1489F0692armcom_"
MIME-Version: 1.0
X-MS-Exchange-Transport-CrossTenantHeadersStamped: HE1PR0802MB2249
Original-Authentication-Results: ietf.org; dkim=none (message not signed) header.d=none;ietf.org; dmarc=none action=none header.from=pelion.com;
X-EOPAttributedMessage: 0
X-MS-Exchange-Transport-CrossTenantHeadersStripped: AM5EUR03FT052.eop-EUR03.prod.protection.outlook.com
X-MS-Office365-Filtering-Correlation-Id-Prvs: f5aed1d3-1f3d-4de2-7fc2-08d8bd26a298
X-Microsoft-Antispam: BCL:0;
X-Microsoft-Antispam-Message-Info: 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
X-Forefront-Antispam-Report: CIP:63.35.35.123; CTRY:IE; LANG:en; SCL:1; SRV:; IPV:CAL; SFV:NSPM; H:64aa7808-outbound-1.mta.getcheckrecipient.com; PTR:ec2-63-35-35-123.eu-west-1.compute.amazonaws.com; CAT:NONE; SFS:(4636009)(346002)(396003)(376002)(39850400004)(136003)(46966006)(6486002)(166002)(82310400003)(82740400003)(70586007)(316002)(33964004)(2906002)(83380400001)(8676002)(81166007)(33656002)(6512007)(336012)(478600001)(8936002)(356005)(6916009)(6506007)(5660300002)(186003)(36756003)(86362001)(47076005)(26005)(45080400002)(70206006)(9686003); DIR:OUT; SFP:1101;
X-OriginatorOrg: pelion.com
X-MS-Exchange-CrossTenant-OriginalArrivalTime: 20 Jan 2021 09:34:57.5166 (UTC)
X-MS-Exchange-CrossTenant-Network-Message-Id: ea375a7a-f7f3-4d46-a341-08d8bd26a6b0
X-MS-Exchange-CrossTenant-Id: f34e5979-57d9-4aaa-ad4d-b122a662184d
X-MS-Exchange-CrossTenant-OriginalAttributedTenantConnectingIp: TenantId=f34e5979-57d9-4aaa-ad4d-b122a662184d; Ip=[63.35.35.123]; Helo=[64aa7808-outbound-1.mta.getcheckrecipient.com]
X-MS-Exchange-CrossTenant-AuthSource: AM5EUR03FT052.eop-EUR03.prod.protection.outlook.com
X-MS-Exchange-CrossTenant-AuthAs: Anonymous
X-MS-Exchange-CrossTenant-FromEntityHeader: HybridOnPrem
X-MS-Exchange-Transport-CrossTenantHeadersStamped: VI1PR08MB3904
Archived-At: <https://mailarchive.ietf.org/arch/msg/core/ZTG_dUiqtpdF3R0ojra8z-E3Jl8>
X-Mailman-Approved-At: Wed, 20 Jan 2021 01:43:26 -0800
Subject: [core] Request-Token (in draft-ietf-core-new-block-06 and draft-ietf-core-echo-request-tag-11)
X-BeenThere: core@ietf.org
X-Mailman-Version: 2.1.29
Precedence: list
List-Id: "Constrained RESTful Environments \(CoRE\) Working Group list" <core.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/core>, <mailto:core-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/core/>
List-Post: <mailto:core@ietf.org>
List-Help: <mailto:core-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/core>, <mailto:core-request@ietf.org?subject=subscribe>
X-List-Received-Date: Wed, 20 Jan 2021 09:36:40 -0000

Hi alls,

I read the new block with interest and started wondering about the request tag. Why do we need new tag, when we have the basic COAP token. Token is used to match request and response, and in doing that it does identify the request blocks and response blocks to be part of the same request and response.

In blocwise transfer 7959 , the message IDs change but token combines them together. Same seems usable in the new-block approach. It is the same request, so they should have the same token. RFC 7959 does not say a whole lot about tokens "As a general comment on tokens, there is no other mention of tokens in this document, as block-wise transfers handle tokens like any other CoAP exchange. As usual, the client is free to choose tokens for each exchange as it likes.” This could be clarified. My understanding is that the token is the same for all blocks of a request and response.  This is shown for example in the Figure 13 of 7959.

My wondering started from reading the  draft-ietf-core-new-block-06. It states then need for request tag, and in example 9.1.1  shows the basic tokens as different for the fragmented request. Is that an error? Should the basic tokens be the same? And if the tokens are the same, the request-tag seems unnecessary.

I did read the draft-ietf-core-echo-request-tag-11 to understand the request-token better, but I found the description a bit hard to follow. It says in in chp 3.2 that  "The Request-Tag is intended for use as a short-lived identifier for keeping apart distinct block-wise request operations on one resource from one client”

But on the wire there is already the token specified in 7252 chp 5.3.1 "A token is intended for use as a client-local identifier for  differentiating between concurrent requests (see Section 5.3<https://tools.ietf.org/html/rfc7252#section-5.3>)”.


I do not understand exactly what is meant by  "The block-wise functionality does not support the detection of interchanged blocks between different message bodies to the same resource having the same block number” in  tag-11 chp 3.1. Is the message body the payload?  If the requests come from same client, they must have different tokens, per rfc 7252.


Is there some problem in token that I fail to understand now — necessitating the request-token?


In similar vein, and as a use case where request token seems good, is the understanding correct that for block1 requests all the request options are duplicated in all the blocks? I could not find a clear statement, but once again the figures in 7959 show the URI for each block. The URI path and query options can be long, and take considerable space in each block.

Could request token be the identifier for request options, so that only 1st block would have full options and later ones only the the request tag?

Sincerely,
- Lauri

IMPORTANT NOTICE: The contents of this email and any attachments are confidential and may also be privileged. If you are not the intended recipient, please notify the sender immediately and do not disclose the contents to any other person, use it for any purpose, or store or copy the information in any medium. Thank you.