Re: [dtn-interest] DTN architecture issues for handling Huge Content Objects

Eric Travis <eric.dot.travis@gmail.com> Sat, 08 December 2012 06:44 UTC

Return-Path: <eric.dot.travis@gmail.com>
X-Original-To: dtn-interest@ietfa.amsl.com
Delivered-To: dtn-interest@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 6B48B21F8576 for <dtn-interest@ietfa.amsl.com>; Fri, 7 Dec 2012 22:44:12 -0800 (PST)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -3.598
X-Spam-Level:
X-Spam-Status: No, score=-3.598 tagged_above=-999 required=5 tests=[BAYES_00=-2.599, HTML_MESSAGE=0.001, RCVD_IN_DNSWL_LOW=-1]
Received: from mail.ietf.org ([64.170.98.30]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id FHkp9BE7rYY2 for <dtn-interest@ietfa.amsl.com>; Fri, 7 Dec 2012 22:44:11 -0800 (PST)
Received: from mail-wg0-f52.google.com (mail-wg0-f52.google.com [74.125.82.52]) by ietfa.amsl.com (Postfix) with ESMTP id 1D5E321F85A6 for <dtn-interest@irtf.org>; Fri, 7 Dec 2012 22:44:10 -0800 (PST)
Received: by mail-wg0-f52.google.com with SMTP id 12so766318wgh.19 for <dtn-interest@irtf.org>; Fri, 07 Dec 2012 22:44:10 -0800 (PST)
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=gmail.com; s=20120113; h=mime-version:in-reply-to:references:date:message-id:subject:from:to :content-type; bh=Z8Ym2pzoBE/+FkNXvIZNjYxQLB3ti4BV05iDaFahz6M=; b=V+D8bgRH4hbkNAYcCEgwNSqtiJu7ZsJyK9CNAsKEBurUvguBLZy20kVkhw2V73ib4a jQYTLrv8yeXwwjHI6Iowr2JarzEoGRvcjOtZzxYHqKj0rexxKCtSQkv9jN2zpwptM8Pm dinyrPpR/WNla8s1F/DQy8yPIv+I0XgW09mRnsAzz2x6JARNkTTgozHa0gM+cf6HMXbD U4WC2ro57vLdJPByt+iNCJgYiBM3mNindeVYI78SZ5mvIMyECQyYMzbMAUkUDHkugboy A+HDKwJuTT5Vgy2WZaFY4r5suDpeUJEPUp2agIv5BOWdKuKJe9uzSv32dl272+O6cDwQ 9tjg==
MIME-Version: 1.0
Received: by 10.180.93.69 with SMTP id cs5mr2011415wib.3.1354949049864; Fri, 07 Dec 2012 22:44:09 -0800 (PST)
Received: by 10.194.137.129 with HTTP; Fri, 7 Dec 2012 22:44:09 -0800 (PST)
In-Reply-To: <CCE7D50B.D86E%william.d.ivancic@nasa.gov>
References: <CAKovV0zcsYT5eNZMHtZxJqcPYE7ObCUP-r=o7WbreLJZX=1KiA@mail.gmail.com> <CCE7D50B.D86E%william.d.ivancic@nasa.gov>
Date: Sat, 08 Dec 2012 01:44:09 -0500
Message-ID: <CAKovV0zg51JJKOrd0BG5hbQU93D4DawOAivauo_ZZgsKg8ej6g@mail.gmail.com>
From: Eric Travis <eric.dot.travis@gmail.com>
To: william.d.ivancic@nasa.gov, dtn-interest@irtf.org
Content-Type: multipart/alternative; boundary="f46d043892c7ce52f104d051a8ca"
Subject: Re: [dtn-interest] DTN architecture issues for handling Huge Content Objects
X-BeenThere: dtn-interest@irtf.org
X-Mailman-Version: 2.1.12
Precedence: list
List-Id: "The Delay-Tolerant Networking Research Group \(DTNRG\) - Announce." <dtn-interest.irtf.org>
List-Unsubscribe: <https://www.irtf.org/mailman/options/dtn-interest>, <mailto:dtn-interest-request@irtf.org?subject=unsubscribe>
List-Archive: <http://www.irtf.org/mail-archive/web/dtn-interest>
List-Post: <mailto:dtn-interest@irtf.org>
List-Help: <mailto:dtn-interest-request@irtf.org?subject=help>
List-Subscribe: <https://www.irtf.org/mailman/listinfo/dtn-interest>, <mailto:dtn-interest-request@irtf.org?subject=subscribe>
X-List-Received-Date: Sat, 08 Dec 2012 06:44:12 -0000

Will,

I think you might have misinterpreted my query as "why" rather than the
intended "how"...



> * If you could clarify - where do you believe the responsibility (and
> more importantly, the mechanisms) reside to authenticate the source of the
> bundle? (And by "source", do you mean what is in the bundle header or the
> node that is currently attempting to hand-off the bundle to you?)
>
> *
>
> What is in the Bundle Header, What entity sourced the data?  That is why
> something like BBNs idea of adding FEC in the middle will likely not work
> in resource protected system.  Multi-hop  store and forward systems are
> different than connected systems.  One should have the capability to
> protect your resources.
>


My intent was not to question the need/value of protecting the resources, I
was merely wondering *how* you wanted to achieve that in a bundle-protocol
based DTN.  I'm not seeing how to authenticate the bundle source in a
timely manner within environments that do necessarily provide timely
communications.

The "timely" is important because you will be storing the bundle at least
as long as it takes to authenticate the bundle source...

My understanding was/is that the intent is to the authenticate at every
intermediate node, I ruled out something involving "pre-shared secrets",
key-management systems or certificate authorities - hence my curiosity in
how to do this.  It's a really cool problem.

If the intent was to accept bundles only from trusted/authenticated
neighbors then I believe I can understand the intended approach.

*
> *
>>
>> * The protection of the local *resources* supporting bundle operation is
>> *not* the responsibility of the bundle protocol.  Replace "bundle protocol"
>> with another comparable DTN protocol and it still applies.*
>>
> *
> *

It is the responsibility of the policy engine that resides that must make a
> determination on what resources are allocated and how.  Failure to do so
> opens up the system for very simple and effective DOS attacks.  I simply
> deplete your resources.
>
>
Again, no disagreement in principle, but *that* policy engine is *not*
something to be made integral to the bundle protocol - it is something that
is exercised *prior* to submitting something to the bundle protocol
handling - or even better, prior to committing resources to receiving the
bundle.

This seems like functionality that is best placed in the CLA...

*

*
>
> * The issue of resource allocation is a separate area (and to me), far
> more complex one.  Peering agreements between mythical bundle operators
> would likely be interesting...  Even within a single operational network,
> the service policies are likely to vary on a node-by-node basis - the well
> connected bundle nodes having a differing demands on local resources than
> the more sparsely connected nodes.*
>
*
*

Yes indeed. But not really a separate issue.  Failure to recognize and
> address this up front is the same old story.  Adding security as an
> afterthought tends to no work very well.  Lots of things break.
>

OK - I can see your reasoning behind the coupling and you are preaching to
the faithful regarding security.  But the role that the bundle protocol
should play in securing the system is limited to ensuring the integrity of
the bundles.  Securing the resources of the nodes hosting the bundle
protocol belongs to some other component of the system.


Think of this as a firewall.  Storage systems on wireless platforms are a
> much different beast than a router in a connected network.  The latter has
> short-term storage for buffering.  The former can store information for a
> long long time and also has to receive and transmit, both which use power.
>

I see the reasoning to be absolutely consistent with the deployment of a
firewall.  A firewall exercises policies prior to the protocol processing.