Re: [dtn] [EXT] Re: I-D Action: draft-ietf-dtn-ipn-update-04.txt

"Birrane, Edward J." <Edward.Birrane@jhuapl.edu> Mon, 29 May 2023 16:08 UTC

Return-Path: <Edward.Birrane@jhuapl.edu>
X-Original-To: dtn@ietfa.amsl.com
Delivered-To: dtn@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id E08CEC14CE4C for <dtn@ietfa.amsl.com>; Mon, 29 May 2023 09:08:16 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -4.396
X-Spam-Level:
X-Spam-Status: No, score=-4.396 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, DKIM_SIGNED=0.1, DKIM_VALID=-0.1, DKIM_VALID_AU=-0.1, DKIM_VALID_EF=-0.1, HTML_MESSAGE=0.001, RCVD_IN_DNSWL_MED=-2.3, RCVD_IN_ZEN_BLOCKED_OPENDNS=0.001, SPF_PASS=-0.001, URIBL_BLOCKED=0.001, URIBL_DBL_BLOCKED_OPENDNS=0.001, URIBL_ZEN_BLOCKED_OPENDNS=0.001] autolearn=ham autolearn_force=no
Authentication-Results: ietfa.amsl.com (amavisd-new); dkim=pass (2048-bit key) header.d=jhuapl.edu
Received: from mail.ietf.org ([50.223.129.194]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id Jt_ENPWpv6P1 for <dtn@ietfa.amsl.com>; Mon, 29 May 2023 09:08:12 -0700 (PDT)
Received: from aplegw01.jhuapl.edu (aplegw01.jhuapl.edu [128.244.251.168]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id 4B663C14CE42 for <dtn@ietf.org>; Mon, 29 May 2023 09:08:11 -0700 (PDT)
Received: from pps.filterd (aplegw01.jhuapl.edu [127.0.0.1]) by aplegw01.jhuapl.edu (8.17.1.19/8.17.1.19) with ESMTP id 34TG6625004334; Mon, 29 May 2023 12:08:07 -0400
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=jhuapl.edu; h=from : to : cc : subject : date : message-id : references : in-reply-to : content-type : mime-version; s=JHUAPLDec2018; bh=tcEv2deISc+Tk/hAqwDWEi8C5Iy5SyJnsOtAYkxo3d0=; b=KIabZOsxZPiOmJBZDomgf/H/AKNgjT+p7K+AjFcZOikJV4KdG/PyqtW4JW3yOTekgquY 1zwoalKT1FLGvFepSJ+kgzG1TNsEn51nopBDUUp5uOlYRpsKtEVOv9NSwWyeVtYfXBcU vVOZitWkWNtIR9XzOo9b6iC5pultPtyYeIE2yenv2yKjv/1T5Pl183yjR8ahBHgk+SBp r0hAv66XK7/dZbc7GPS5X5+2UUukhf/G1b6qU6rZ4YDQJNuLwZqpD7adzgUyd13NbuKh L2yERcT85foTIfQZTIFZlHAwOcnO5C4b5JrtQUf31m0TEarfz3t8H9K1Cls+FKcVNYsI 0A==
Received: from aplex21.dom1.jhuapl.edu (aplex21.dom1.jhuapl.edu [10.114.162.6]) by aplegw01.jhuapl.edu (PPS) with ESMTPS id 3quaw81emb-1 (version=TLSv1.2 cipher=ECDHE-RSA-AES256-GCM-SHA384 bits=256 verify=NOT); Mon, 29 May 2023 12:08:07 -0400
Received: from APLEX21.dom1.jhuapl.edu (10.114.162.6) by APLEX21.dom1.jhuapl.edu (10.114.162.6) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id 15.2.1118.26; Mon, 29 May 2023 12:08:07 -0400
Received: from APLEX21.dom1.jhuapl.edu ([fe80::20d7:9545:f01e:9b2]) by APLEX21.dom1.jhuapl.edu ([fe80::20d7:9545:f01e:9b2%5]) with mapi id 15.02.1118.026; Mon, 29 May 2023 12:08:07 -0400
From: "Birrane, Edward J." <Edward.Birrane@jhuapl.edu>
To: Erik Kline <ek.ietf@gmail.com>, Oscar Garcia <oscargarciacomtron@gmail.com>
CC: Zaheduzzaman Sarker <zaheduzzaman.sarker@ericsson.com>, Rick Taylor <rick@tropicalstormsoftware.com>, "dtn@ietf.org" <dtn@ietf.org>
Thread-Topic: [EXT] Re: [dtn] I-D Action: draft-ietf-dtn-ipn-update-04.txt
Thread-Index: AQHZhK8wWCSqjInjdEOSZtFyenSnm69bO8WAgAOWmLCAAFEKgIAAsqUAgBGndkA=
Date: Mon, 29 May 2023 16:08:06 +0000
Message-ID: <82b31d8bd8054fa5b5a3efbd24dc6ab5@jhuapl.edu>
References: <168388138334.52727.1302529136727870884@ietfa.amsl.com> <db311e72-12a8-778f-bce1-19f2172f6fc3@tropicalstormsoftware.com> <DB7PR07MB3995E6F0ECCC3CE14BE0FDFB9F789@DB7PR07MB3995.eurprd07.prod.outlook.com> <7dc18f79d3444cc498ff4191f6dc7ddf@jhuapl.edu> <c79f48d5-8229-b438-a681-692ea9f5c106@gmail.com> <CAMGpriUUqtu0hhx-KbubGd7VVkP1isKMAf_EQfrZdWd2+2nq2Q@mail.gmail.com>
In-Reply-To: <CAMGpriUUqtu0hhx-KbubGd7VVkP1isKMAf_EQfrZdWd2+2nq2Q@mail.gmail.com>
Accept-Language: en-US
Content-Language: en-US
X-MS-Has-Attach:
X-MS-TNEF-Correlator:
x-originating-ip: [10.114.162.19]
Content-Type: multipart/alternative; boundary="_000_82b31d8bd8054fa5b5a3efbd24dc6ab5jhuapledu_"
MIME-Version: 1.0
X-CrossPremisesHeadersFilteredBySendConnector: APLEX21.dom1.jhuapl.edu
X-OrganizationHeadersPreserved: APLEX21.dom1.jhuapl.edu
X-Proofpoint-Virus-Version: vendor=baseguard engine=ICAP:2.0.254,Aquarius:18.0.957,Hydra:6.0.573,FMLib:17.11.176.26 definitions=2023-05-29_10,2023-05-29_01,2023-05-22_02
Archived-At: <https://mailarchive.ietf.org/arch/msg/dtn/FtyoXhNnHDyeOlqLHIFYAdJMh8k>
Subject: Re: [dtn] [EXT] Re: I-D Action: draft-ietf-dtn-ipn-update-04.txt
X-BeenThere: dtn@ietf.org
X-Mailman-Version: 2.1.39
Precedence: list
List-Id: "Delay Tolerant Networking \(DTN\) discussion list at the IETF." <dtn.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/dtn>, <mailto:dtn-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/dtn/>
List-Post: <mailto:dtn@ietf.org>
List-Help: <mailto:dtn-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/dtn>, <mailto:dtn-request@ietf.org?subject=subscribe>
X-List-Received-Date: Mon, 29 May 2023 16:08:17 -0000

Erik,

  (With chair hat off…)

  I agree that we should avoid an *over-reliance* on reserved, well-known service identifiers. Polluting a space with niche services doesn’t seem to help anyone.

 However, I think we should allow for the *existence* of reserved, well-known service identifiers, for three reasons:

First -- service identifiers are logical identifiers (not ports or PIDs). For example, I could have a BPA which supports the “ABC” service and every time a new remote node uses that service the local BPA would spawn a new local process to handle that particular service for that particular remote node. Even if I wind up spawning 5..10…20 local processes to communicate with 5..10…20 remote nodes, I would expect the service identifier for all of them to remain the service identifier for service “ABC” because services are logical identifiers. The “demux” on the local node IMO is handled by the local node itself.  Certainly private-use service identifiers don’t need to behave that way, but well-known services identifiers could (and probably should).

Second – Waypoint nodes may want to understand well-known service traffic. I could imagine local policy on a waypoint BPA enforcing QoS or QoP as a function of well-known services. Such as “all network management traffic needs to be signed” or “all file transfer traffic needs to be encrypted”.  If service identifiers are *all* private use and, thus, likely only known to source and destinations, we remove any practical analysis by waypoint nodes.

Third – If we presume that we must do service discovery for all services, then every participating BPA would need a mapping of every other BPA’s custom identifier for service “ABC” or otherwise presume that service discovery can be done “on demand” round-trip (which does not sound DTN-like). I think we should avoid (relatively) large, per-node mappings of custom identifiers (and worrying about them changing?) for well-known services.

I propose something of a middle ground – we have a 64 bit space here, after all:


1.       All one-byte encoded service identifiers be private use.

2.       Most two-byte encoded service identifiers be private use, but keep a small carve out (32?) for well-known services.

3.       Most three-byte encoded service identifiers be private use, but keep a small range (1024? 2048?) for well-known services. Maybe another range for unassigned?

4.       Most 4 byte and above now could just be unassigned.

Then focus discussion on what should/should not be a well-known service. My hope is that well-known doesn’t mean 100% adoption but, rather, likely adoption for some threshold use, yet to be defined.

Thoughts?

-Ed

---
Edward J. Birrane, III, Ph.D. (he/him/his)
Chief Engineer, Space Constellation Networking
Supervisor, Embedded Applications Group
Space Exploration Sector
Johns Hopkins Applied Physics Laboratory
(W) 443-778-7423 / (F) 443-228-3839


From: Erik Kline <ek.ietf@gmail.com>
Sent: Thursday, May 18, 2023 2:01 AM
To: Oscar Garcia <oscargarciacomtron@gmail.com>
Cc: Birrane, Edward J. <Edward.Birrane@jhuapl.edu>; Zaheduzzaman Sarker <zaheduzzaman.sarker@ericsson.com>; Rick Taylor <rick@tropicalstormsoftware.com>; dtn@ietf.org
Subject: [EXT] Re: [dtn] I-D Action: draft-ietf-dtn-ipn-update-04.txt

APL external email warning: Verify sender ek.ietf@gmail.com<mailto:ek.ietf@gmail.com> before clicking links or attachments



I'd like to consider an argument for not having any reserved, well-known service numbers at all (other than zero for administrative endpoint purposes).

Making assumptions about port numbers and their application meaning was useful when the resolution mechanisms available did not support returning the extra port number information (e.g. gethostname).  For various reasons things like SRV records did not exactly take off as a replacement that could give true port number flexibility.  Regardless, it's clear that today port 443 alone doesn't tell you anything about the application anymore.  (Indeed, "ALPN is the new port number.")

I personally think that well-known, reserved ports are a bit of a relic from the past that perhaps we don't need to carry forward.  I would suggest that the service number (and for that matter: the demux portion) should be something returned via a resolution mechanism (including "statically assigned" resolution) and there's likely very little value to having anything be reserved/well-known in the same way that port numbers were.

2 cents,
-ek


On Wed, May 17, 2023 at 12:22 PM Oscar Garcia <oscargarciacomtron@gmail.com<mailto:oscargarciacomtron@gmail.com>> wrote:
Ed,
Great point about specific service numbers for common application services.
I have been dealing with that for Medical Records for Space for some time.
In a conference that I gave today on DTN, this was one of the points that was brought up in the Q&A.
Making a parallel with TCP/IP ports, port 104 is reserved for exchanging radiology images in DICOM PACS on TCP/IP.
Best,
Oscar

On 17/5/2023 15:44, Birrane, Edward J. wrote:
Rick,

  (Chair hat off)

  Coming back from the CCSDS meeting last week, the one comment on the updated document was about the treatment of service numbers.

  It is expected that service numbers in the IPN scheme identify some application service. For example, RFC9171 Section 4.2.5.1.2 states “… the EID's service number (a number that identifies some application service)…”.   Given that definition, missions will likely have their own application services for common operations like commanding and telemetry. Keeping the smaller numbered elements (0-23) as RFC required (or generally specification required) would be a burden because:


1.       Mission-specific services will not likely be traced to RFCs or public standards

2.       Mission-specific services would be frequently used in a constrained environment so small encodings would be appreciated.

  Suggestion was to have an allocation of smaller numbers (and possibly larger numbers) be made “private use”  (https://www.rfc-editor.org/rfc/rfc8126.html#section-4.1) with, perhaps, a smaller section carved out for specification required.

-Ed


Edward J. Birrane, III, Ph.D. (he/him/his)
Chief Engineer, Space Constellation Networking
Supervisor, Embedded Applications Group
Space Exploration Sector
Johns Hopkins Applied Physics Laboratory
(W) 443-778-7423 / (C) 443-690-8272

From: dtn <dtn-bounces@ietf.org><mailto:dtn-bounces@ietf.org> On Behalf Of Zaheduzzaman Sarker
Sent: Monday, May 15, 2023 3:44 AM
To: Rick Taylor <rick@tropicalstormsoftware.com><mailto:rick@tropicalstormsoftware.com>; dtn@ietf.org<mailto:dtn@ietf.org>
Subject: [EXT] Re: [dtn] I-D Action: draft-ietf-dtn-ipn-update-04.txt

APL external email warning: Verify sender dtn-bounces@ietf.org<mailto:dtn-bounces@ietf.org> before clicking links or attachments



Hi all,

Lets continue the WGLC one more week (ending 19th May 15, 2023). Consensus call will be made after this week. If anyone has any question about this extension, please let me know.

//Zahed

On 2023-05-12, 10:53, "dtn" <dtn-bounces@ietf.org<mailto:dtn-bounces@ietf.org>> wrote:

Hi All,

I have pushed out a new version -04 of the ipn update draft to fix a
missing xref and address some of ScottJ's comments.

Again, please have a quick read.

Cheers,

Rick

_______________________________________________
dtn mailing list
dtn@ietf.org<mailto:dtn@ietf.org>
https://www.ietf.org/mailman/listinfo/dtn


_______________________________________________

dtn mailing list

dtn@ietf.org<mailto:dtn@ietf.org>

https://www.ietf.org/mailman/listinfo/dtn

_______________________________________________
dtn mailing list
dtn@ietf.org<mailto:dtn@ietf.org>
https://www.ietf.org/mailman/listinfo/dtn