[dtn] Update of DTN IPND

Brian Sipos <BSipos@rkf-eng.com> Mon, 09 December 2019 01:38 UTC

Return-Path: <BSipos@rkf-eng.com>
X-Original-To: dtn@ietfa.amsl.com
Delivered-To: dtn@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 6D6341200CC for <dtn@ietfa.amsl.com>; Sun, 8 Dec 2019 17:38:10 -0800 (PST)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -1.9
X-Spam-Level:
X-Spam-Status: No, score=-1.9 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, DKIM_SIGNED=0.1, DKIM_VALID=-0.1, HTML_MESSAGE=0.001, RCVD_IN_DNSWL_NONE=-0.0001, SPF_PASS=-0.001] autolearn=ham autolearn_force=no
Authentication-Results: ietfa.amsl.com (amavisd-new); dkim=pass (1024-bit key) header.d=rkfeng.onmicrosoft.com
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id b9PRTZ29jVcv for <dtn@ietfa.amsl.com>; Sun, 8 Dec 2019 17:38:08 -0800 (PST)
Received: from NAM12-BN8-obe.outbound.protection.outlook.com (mail-bn8nam12on2065.outbound.protection.outlook.com [40.107.237.65]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id 428DA12007C for <dtn@ietf.org>; Sun, 8 Dec 2019 17:38:08 -0800 (PST)
ARC-Seal: i=1; a=rsa-sha256; s=arcselector9901; d=microsoft.com; cv=none; b=ZfAV+5E9B2PyxGHEXSwDMzdWeEdpEjQ1ypsl9iPN6sBAmyoyWBz1u0S37o6D88qM86VPpABgAjlKIHlrWtm+yVI7xUjEwRGMSSHTTrVhHuodvaCpzRMYzaEoIHxFuFGeQcqcoLe1ydz79GqltHQunOTxxNLJMatDGgI9aXieBEVvplhR5LFhJvqfaiF0kLSPwNBmgL8LxPbDDHk2AoLC33Ch3nS/qCTZ0kslDv44bnEtzJ1MLtgm+nT7IwjfwHlWfPGOxDG7ECklCwwMzn9aZAxB3SdJLfa1AfL9D9CX7LrvlmtS9uRQnsXtIDsstIkSe6HIi6OB4MZzxL3exeE27w==
ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=microsoft.com; s=arcselector9901; h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-SenderADCheck; bh=kfYprrelTtEKPDsJjCw28eAWxoDSa97KHg/5nASzipc=; b=QNr2kFnE0kaEAZlm7g25eeM9gOqWQj91Ok5v3Jozdh7B+V4zoGG/dUQS0aRrc3DWxtbhi69o3s+v3rPlSo+ipUDXiQuQVwDMF9Ct7gUgRsiB3E/dS+JsvbzlXR5b1O0ey/OIcZPBRuuPnvTU3Gd+7LO/rOVPav6yH/UnFG8JFfZRDZcAZphSy250fmxbX8iT9ehxgbzIJ2JRWlDXgOoKpoMvK/jnhgzaHHuI893dO3gvpNJR523PoWxPfpCqeBcbRx8UrHO6fQ7EEv3L+ctNUb+ZjBRxC4yfgAwvfTn50SiYrWYrlD/DNhSBkV6cHFuhLGDE+fZ/gkq12eFCDG4WxA==
ARC-Authentication-Results: i=1; mx.microsoft.com 1; spf=pass smtp.mailfrom=rkf-eng.com; dmarc=pass action=none header.from=rkf-eng.com; dkim=pass header.d=rkf-eng.com; arc=none
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=rkfeng.onmicrosoft.com; s=selector2-rkfeng-onmicrosoft-com; h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-SenderADCheck; bh=kfYprrelTtEKPDsJjCw28eAWxoDSa97KHg/5nASzipc=; b=h8c7SZeqsLJpDkOIcAvwbjr1xVuEE/vXFGfvuzVPtsYbRk6i3feG7qR3U2U00ZaABSB8k9MJUh2nZCrY0c8uEek0FtUdFxv5o3WFfJ09JunfMkmlGipDcM2+zi6O1gwFVyMZ8mwmfhmHknnVl9kzJ/erz4DM3UsTuouVLx8/ods=
Received: from MN2PR13MB3520.namprd13.prod.outlook.com (10.255.238.221) by MN2PR13MB2959.namprd13.prod.outlook.com (20.179.149.213) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id 15.20.2538.10; Mon, 9 Dec 2019 01:38:06 +0000
Received: from MN2PR13MB3520.namprd13.prod.outlook.com ([fe80::5048:62dd:60d9:94b9]) by MN2PR13MB3520.namprd13.prod.outlook.com ([fe80::5048:62dd:60d9:94b9%7]) with mapi id 15.20.2538.012; Mon, 9 Dec 2019 01:38:06 +0000
From: Brian Sipos <BSipos@rkf-eng.com>
To: "dtn@ietf.org" <dtn@ietf.org>
Thread-Topic: Update of DTN IPND
Thread-Index: AQHVrDsiW3OMEHRkSUSwWcJcZLSGQg==
Date: Mon, 09 Dec 2019 01:38:06 +0000
Message-ID: <MN2PR13MB352098A92A483E46FC7963A69F5F0@MN2PR13MB3520.namprd13.prod.outlook.com>
Accept-Language: en-US
Content-Language: en-US
X-MS-Has-Attach:
X-MS-TNEF-Correlator:
authentication-results: spf=none (sender IP is ) smtp.mailfrom=BSipos@rkf-eng.com;
x-originating-ip: [67.108.126.82]
x-ms-publictraffictype: Email
x-ms-office365-filtering-correlation-id: a7f7bd7d-f4d0-41a8-386f-08d77c4870d3
x-ms-traffictypediagnostic: MN2PR13MB2959:
x-microsoft-antispam-prvs: <MN2PR13MB2959F30C4362C893857067A09F580@MN2PR13MB2959.namprd13.prod.outlook.com>
x-ms-oob-tlc-oobclassifiers: OLM:9508;
x-forefront-prvs: 02462830BE
x-forefront-antispam-report: SFV:NSPM; SFS:(10009020)(346002)(136003)(396003)(366004)(39830400003)(376002)(199004)(189003)(26005)(6506007)(186003)(19627405001)(5660300002)(102836004)(7696005)(99286004)(80792005)(3480700005)(33656002)(66446008)(71200400001)(71190400001)(52536014)(64756008)(66556008)(66946007)(66476007)(76116006)(9686003)(54896002)(5640700003)(966005)(74316002)(8936002)(55016002)(2906002)(15650500001)(316002)(86362001)(6916009)(8676002)(81156014)(1730700003)(508600001)(81166006); DIR:OUT; SFP:1101; SCL:1; SRVR:MN2PR13MB2959; H:MN2PR13MB3520.namprd13.prod.outlook.com; FPR:; SPF:None; LANG:en; PTR:InfoNoRecords; A:1; MX:1;
received-spf: None (protection.outlook.com: rkf-eng.com does not designate permitted sender hosts)
x-ms-exchange-senderadcheck: 1
x-microsoft-antispam: BCL:0;
x-microsoft-antispam-message-info: j1A0qnj8PHjHxbC1xHoBUoSzUOYdZL97gr3Aabge5D5/D+iJIsC9T7ZNEZEQktM6WrGCSfJw+wPdXxP4ynChjCcuEklQk+w/GDWY76q7ePxUJE3RrSwNmwtQZYyqIcHdWFQSvHb2/16xX7GXTcca4j244DS5+AnDog7+MK6MMhEWK+LLkjFRTYqGBRoWoLn63FdUqMfzZdvZ57B03bP/f6jYTW0XMd7dypOW3YZakqT+68WqIJJgqWFbm7onlv0Oz79J0ceg0X9rcP375gmQbYZ0m5V8CWpD8+EiBRVK7sJhuGsvDpabrd4h4VQ6/xFjHv01VUfNy8CH3R1IeH2Y6ZB4EuhQKT4ty4c0GC+PPE6QT08YNifRuMcG3DnPCoPBqF43kuB3nSlnj2a5EdPp6//5xGZnPIsdrZ9HMCrX3/CvzgihlXarbAMGZ8XEupoEg5l2vfMuoQc3e4Scu9YLfq4Ne7XP31URy4alVmRQWIQ=
x-ms-exchange-transport-forked: True
Content-Type: multipart/alternative; boundary="_000_MN2PR13MB352098A92A483E46FC7963A69F5F0MN2PR13MB3520namp_"
MIME-Version: 1.0
X-OriginatorOrg: rkf-eng.com
X-MS-Exchange-CrossTenant-Network-Message-Id: a7f7bd7d-f4d0-41a8-386f-08d77c4870d3
X-MS-Exchange-CrossTenant-originalarrivaltime: 09 Dec 2019 01:38:06.7315 (UTC)
X-MS-Exchange-CrossTenant-fromentityheader: Hosted
X-MS-Exchange-CrossTenant-id: 4ed8b15b-911f-42bc-8524-d89148858535
X-MS-Exchange-CrossTenant-mailboxtype: HOSTED
X-MS-Exchange-CrossTenant-userprincipalname: mvabLQhpWeP9DJHVhkr8zJJ04mLDJCnedAoiukZ9AOyb3jBr+OwncyM+kZu9qeqAwGo3Ad1WxWAVoPrUwsSefg==
X-MS-Exchange-Transport-CrossTenantHeadersStamped: MN2PR13MB2959
Archived-At: <https://mailarchive.ietf.org/arch/msg/dtn/Pi59dSVQ0L8QYVkdgh5kcQkrrI0>
Subject: [dtn] Update of DTN IPND
X-BeenThere: dtn@ietf.org
X-Mailman-Version: 2.1.29
Precedence: list
List-Id: "Delay Tolerant Networking \(DTN\) discussion list at the IETF." <dtn.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/dtn>, <mailto:dtn-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/dtn/>
List-Post: <mailto:dtn@ietf.org>
List-Help: <mailto:dtn-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/dtn>, <mailto:dtn-request@ietf.org?subject=subscribe>
X-List-Received-Date: Mon, 09 Dec 2019 01:38:11 -0000

All,
As was requested at the last IETF to scope new work for the WG, I'd like to make some time to update the IPND protocol [1] to a Proposed Standard level.

The issues I see with the last draft of IPND are:

  *   The beacon uses a custom type-length-value (TLV) encoding. In my opinion this should be superseded by a CBOR encoding. This would just make diagnosing the protocol simpler without any change in encoded beacon sizes.
  *   There is looseness in the CLAs identified by IPND beacons. This means a proper registry of CLAs types, their parameters, and normative references to RFCs.
  *   There is looseness in the bloom filter specification/parameterization. The protocol should provide concrete definitions for at least one neighborhood filter. The current draft is both too vague to implement as-is but also assumes a specific structure and type of bloom filter. It seems like a better practice to treat this more like ciphersuites are treated in other protocols where each combination of parameters gets a Type ID and the encoding is type-specific. So the initial spec can include one concrete definition of a parameterized bloom filter but the spec leaves open to even other types of filters (cuckoo or more advanced).
  *   There is no provision for security of IPND beacons. I think a limited profile of COSE [2] would allow some turnkey mechanisms for signing or encrypting IPND beacons. This would be optional in the same way as TLS is optional in TCPCLv4 and BPsec in BPv7.

[1] https://tools.ietf.org/html/draft-irtf-dtnrg-ipnd-03
[2] https://tools.ietf.org/html/rfc8152