Re: [dtn] Backwards compatibility between 'classic' ipn and ipn+

scott@solarnetone.org Mon, 21 November 2022 00:41 UTC

Return-Path: <scott@solarnetone.org>
X-Original-To: dtn@ietfa.amsl.com
Delivered-To: dtn@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 03397C14CF07 for <dtn@ietfa.amsl.com>; Sun, 20 Nov 2022 16:41:25 -0800 (PST)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -1.897
X-Spam-Level:
X-Spam-Status: No, score=-1.897 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, RCVD_IN_ZEN_BLOCKED_OPENDNS=0.001, SPF_HELO_NONE=0.001, SPF_PASS=-0.001, URIBL_DBL_BLOCKED_OPENDNS=0.001, URIBL_ZEN_BLOCKED_OPENDNS=0.001] autolearn=ham autolearn_force=no
Received: from mail.ietf.org ([50.223.129.194]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id yfhzM2kHxEDO for <dtn@ietfa.amsl.com>; Sun, 20 Nov 2022 16:41:20 -0800 (PST)
Received: from www.solarnetone.org (solarnetone.org [IPv6:2602:fdf2:bee:feed::a1a]) (using TLSv1.3 with cipher TLS_AES_256_GCM_SHA384 (256/256 bits) key-exchange ECDHE (P-256) server-signature RSA-PSS (2048 bits) server-digest SHA256) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id 8321EC14CEEC for <dtn@ietf.org>; Sun, 20 Nov 2022 16:41:17 -0800 (PST)
Received: from scott (helo=localhost) by www.solarnetone.org with local-esmtp (Exim 4.94.2) (envelope-from <scott@solarnetone.org>) id 1owus6-00034c-Jg; Sun, 20 Nov 2022 19:41:14 -0500
Date: Sun, 20 Nov 2022 19:41:14 -0500
From: scott@solarnetone.org
To: Rick Taylor <rick@tropicalstormsoftware.com>
cc: "dtn@ietf.org" <dtn@ietf.org>
In-Reply-To: <38A5475DE83986499AEACD2CFAFC3F98025B7A77DC@tss-server1.home.tropicalstormsoftware.com>
Message-ID: <5624142-cbb2-82d4-6d9c-6ed052ce162@solarnetone.org>
References: <38A5475DE83986499AEACD2CFAFC3F98025B7A7290@tss-server1.home.tropicalstormsoftware.com> <8b03439-5f9-52f7-ada2-d2705a38da99@solarnetone.org> <38A5475DE83986499AEACD2CFAFC3F98025B7A77DC@tss-server1.home.tropicalstormsoftware.com>
MIME-Version: 1.0
Content-Type: multipart/mixed; BOUNDARY="-2112414640-156579849-1668990677=:7946"
Content-ID: <d43c732a-6087-2c2b-39ae-ffa64b6e779d@solarnetone.org>
Archived-At: <https://mailarchive.ietf.org/arch/msg/dtn/ASTkiaDvivfY6vqjIZ8UnBW76nQ>
Subject: Re: [dtn] Backwards compatibility between 'classic' ipn and ipn+
X-BeenThere: dtn@ietf.org
X-Mailman-Version: 2.1.39
Precedence: list
List-Id: "Delay Tolerant Networking \(DTN\) discussion list at the IETF." <dtn.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/dtn>, <mailto:dtn-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/dtn/>
List-Post: <mailto:dtn@ietf.org>
List-Help: <mailto:dtn-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/dtn>, <mailto:dtn-request@ietf.org?subject=subscribe>
X-List-Received-Date: Mon, 21 Nov 2022 00:41:25 -0000

Hi Rick,

On Sun, 20 Nov 2022, Rick Taylor wrote:

> Hi Scott,
>
> Can you please explain your assertion: "... existing DTNs become 
> non-interoperable over time with anyone implementing your version of the 
> scheme..." as I don't believe it to be true.  If it is true, then I 
> certainly wouldn't support continued work on this topic.

Sure, but you have to tell me what a "BPsec profile" is first :)

I think Scott B. and Jorge have made this point pretty well already, but I 
will offer a hypothetical example:

Lets imagine a hypothetical sensornet for collection of environmental data 
that deploys BPv7, using CBHE Node Ids in the ipn naming scheme to name 
its constituent hosts.  The sensor nodes are remote, perhaps even mobile, 
as in the case of a network which tracks the territorial boundaries of a 
certain species of porpoise, for example.  This network segment can 
reasonably fall within the intersection set of the Vinn diagram with sets 
including a) not reasonably field upgradable, b) uses BPv7, and c) uses 
CBHE Node IDs.

These sensors log their GPS data, all day long, and when they are in range 
of one of the base station network devices, they dump their data in 
bundles to it, per spec.  These base station nodes, in turn, wait for a 
satellite (perhaps even a cubesat) to pass over, at which point they dump 
the data to the satellite.  The base stations are necessarily remote as 
well, although perhaps they have remotely upgradable firmware, if you are 
comfortable with flashing firmware over an intermittent circuit; I can 
speak from experience that this practice is harrowing to carry out and 
fraught with peril.  The satellite component can also pretty easily be 
classified as "not field servicable," despite the fact that we could, in 
fact, match orbit with it and monkey around, if necessary.  The satellite 
is probably sophisticated enough that there is a reliable method to 
upgrade the relevant firmware, because the cost of deploying a satellite 
is somewhat more than deploying a remote sensornet base station.

So, sensornet (not upgradable), base stations (maybe upgradable), 
satellite (probably upgradable).  The satellite, once it has collected the 
data, sends it along through the IPN network, until it hits a 
groundstation, where the bundles are now carried over IP, until they reach 
the researchers operating the sensornet, who are very happy when they 
reliably get their data.

What happens when the IPN network that the data passes through implements 
a non-identical naming scheme to the one implemented on the sensor nodes? 
Those nodes recognize the additional authority field as corrupted data, as 
Scott B indicated. The bundles don't make it through.

What happens when those researchers don't have a core competency in delay 
tolerant networks(because they are studying porpoise), and suddenly, 
their data stops showing up?  They are no longer happy.

This example use case shows that it is non-trivial, and sometimes 
impossible, to update software/firmware on devices in the field.
Imagine chasing down all those porpoise on a jet ski, laptop, screwdriver, 
and USB cable in hand, ready to upgrade those sensor nodes.

ScottJ

>
> Cheers,
>
> Rick
>
>> -----Original Message-----
>> From: scott@solarnetone.org [mailto:scott@solarnetone.org]
>> Sent: 20 November 2022 08:43
>> To: Rick Taylor
>> Cc: dtn@ietf.org
>> Subject: Re: [dtn] Backwards compatibility between 'classic' ipn and ipn+
>>
>> Hi Everyone,
>>
>> On Sat, 19 Nov 2022, Rick Taylor wrote:
>>
>>>
>>> Hi All,
>>>
>>>
>>>
>>> As I read RFC9171, it is very clear about the behaviour of a BPA that
>>> receives a bundle with an EID it does not recognise:  Section 6.1.1 states
>>> that a bundle status report of type 6 “No known route to destination from
>>> here” should be sent to the ReportTo EID.  Conceivably a status report of
>>> type 5 “Destination endpoint ID unavailable” could be used, but I have
>>> always read that as “App is here, but not live” rather than “I dunno how to
>>> forward that”.
>>>
>>>
>>>
>>> With the proposed updates to ipn, this behaviour remains unchanged, and
>>> hence there would be no impact to an existing, interoperable DTN.
>>>
>>
>>
>> Your definition of "no impact" is puzzling as existing DTNs become
>> non-interoperable over time with anyone implementing your version of the
>> scheme.  I think this creates a splinternet whereby existing networks, if
>> left unmodified, wind up being able to communicate only with null or
>> original authority named nodes, but effectively remain disconnected from
>> the new nodes with authority numbers.  This results in the eventual
>> disconnection of existing resource holders.  The draft would marginalize
>> the utility of my (and other's) naming resources, by relegating them to
>> BPv6 use only, and would make communication with Nodes named with these
>> resources fail in networks named with your new specification for naming
>> resources.
>>
>> Your draft appears to say that CBHE Node IDs were designed for BPv6 only,
>> yet they have already been widely implemented with BPv7. I would tend to
>> side with running code here as proof of intent.
>>
>> I read the draft to outlaw the practice of deploying multiple Node Ids in
>> a single node. This is a practice I have found both useful and effective
>> in active deployment, and continue to use, as demonstrated at IETF 115.
>> To require an individual application instance to be deployed per NodeID
>> winds up wasting processor, memory, and power.  All of these should be
>> conserved where possible, both in space and terrestrially.
>>
>> The terrestrial Internet has benefited from an open philosophy.  Something
>> along the lines of "if you are capable, and you are willing, you are
>> welcome according to published and specified rules." is the accepted
>> barrier of entry.  It would be quite a shame if we were to lose that
>> inclusivity, just as we are progressing forward into the solar system.
>>
>>> One of the major reasons for avoiding a new ‘ipn+’ scheme, is that would
>>> require a new set of BPSec profiles to be implemented for asserting Node
>>> identity for PKI, and that would be a major blocker to adoption.
>>
>> Can anyone point me to a reference to what a "BPSec profile" is, in
>> context of the relevant RFCs?  I have read, and searched digitally, lest I
>> missed it, for the word "profile" in both of the most recent RFCs relating
>> to BPSec. I fail to find a single instance.  Is this something that is
>> implementation specific?
>>
>> I do find reference to 'profile', and often (in the title and page
>> headers, mostly) in a draft Ed put forward that expired in 2016:
>>
>> https://datatracker.ietf.org/doc/html/draft-birrane-dtn-bpsec-suiteb-profile-
>> 00
>>
>> Ed, can you shed some light on this?  I understand the cryptography end.
>>
>> This document has "None" for IANA considerations.  Similarly, there are no
>> other documents referenced from this document which have relevant IANA
>> considerations, or which, indeed, make any mention of naming schemes in
>> relation to BPSec.  The only "profile" referenced in any of these
>> documents is the "NSA Suite B Profile" specification for cryptographic
>> algorithm selection.  I fail to see a conflict here.  What relationship
>> does Bundle Protocol URI Scheme Types have with BPSec Security Context
>> Identifiers, or the undocumented "BPSec profiles" that the former would
>> have a dependency on the latter?
>>
>> Enjoy,
>> Scott
>>
>>>
>>>
>>> Cheers,
>>>
>>>
>>>
>>> Rick
>>>
>>>
>>>
>