Re: [dtn] [EXT] Re: I-D Action: draft-ietf-dtn-ipn-update-04.txt

Erik Kline <ek.ietf@gmail.com> Mon, 29 May 2023 23:57 UTC

Return-Path: <ek.ietf@gmail.com>
X-Original-To: dtn@ietfa.amsl.com
Delivered-To: dtn@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 548CCC14CEFA for <dtn@ietfa.amsl.com>; Mon, 29 May 2023 16:57:25 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -2.095
X-Spam-Level:
X-Spam-Status: No, score=-2.095 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, DKIM_SIGNED=0.1, DKIM_VALID=-0.1, DKIM_VALID_AU=-0.1, DKIM_VALID_EF=-0.1, FREEMAIL_FROM=0.001, HTML_MESSAGE=0.001, RCVD_IN_DNSWL_NONE=-0.0001, RCVD_IN_ZEN_BLOCKED_OPENDNS=0.001, SPF_HELO_NONE=0.001, SPF_PASS=-0.001, URIBL_DBL_BLOCKED_OPENDNS=0.001, URIBL_ZEN_BLOCKED_OPENDNS=0.001] autolearn=ham autolearn_force=no
Authentication-Results: ietfa.amsl.com (amavisd-new); dkim=pass (2048-bit key) header.d=gmail.com
Received: from mail.ietf.org ([50.223.129.194]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id 0d6yH7DusXE8 for <dtn@ietfa.amsl.com>; Mon, 29 May 2023 16:57:21 -0700 (PDT)
Received: from mail-ua1-x935.google.com (mail-ua1-x935.google.com [IPv6:2607:f8b0:4864:20::935]) (using TLSv1.3 with cipher TLS_AES_128_GCM_SHA256 (128/128 bits) key-exchange X25519 server-signature RSA-PSS (2048 bits) server-digest SHA256) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id 207EAC14CEF9 for <dtn@ietf.org>; Mon, 29 May 2023 16:57:21 -0700 (PDT)
Received: by mail-ua1-x935.google.com with SMTP id a1e0cc1a2514c-78676ca8435so3578921241.1 for <dtn@ietf.org>; Mon, 29 May 2023 16:57:21 -0700 (PDT)
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=gmail.com; s=20221208; t=1685404640; x=1687996640; h=cc:to:subject:message-id:date:from:in-reply-to:references :mime-version:from:to:cc:subject:date:message-id:reply-to; bh=gCSmOGrYWfL4i3Zh5snrhNkzBbnTmxnpKhFrUFqQqbg=; b=NFUliSQyTaCt90EfXzNWc8nM07wYXfEOdbD2ZNSfrpfybA87CX/EeBLsOR9sCMT89r Eerq/ZHQGxvf6UN6m5JEnEvr4mzG4Ggvwpq3EEvNcgwgdwCzhgMQnRzG4+bm7auS2+hz zdzwGVTLCvxB5ODLCXfvgYfvNjmEwkchvzzzhdDN2S2HHHUYsuYF4l0BLxwSzUOAiUgN OQGc33gn/XUKlUE26w5gNW6kZw0/x/i69Q87CIB9fPosQGDTqefJI7JU1AU1cLTOFEed 6lych3h81aPAujug2OTlnWu4aKKtWVvxgMdZi7Q2oGhf1JqMWL44SbZ6I1DAvUZ/qZwr zqsQ==
X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20221208; t=1685404640; x=1687996640; h=cc:to:subject:message-id:date:from:in-reply-to:references :mime-version:x-gm-message-state:from:to:cc:subject:date:message-id :reply-to; bh=gCSmOGrYWfL4i3Zh5snrhNkzBbnTmxnpKhFrUFqQqbg=; b=Rux7DjlDCOIi93OXaJGZ/tZ6RGpybnS2Hzw+oYrMMwF25ACAAiU8DR41yp0hWw8W7g vWUR/YaJlFpjw2IeVcMmWPHjBIhZvwdAAMvgHSQ0Wd85rIo6+ZgAyXp59f2VLw/wPpxv n4wbOYGQiCWzcBL+ztsGYpG0TNjNStlvUpxAp6m+JRxfwRDjTQk5p8CRZlkPWGd1d6YX Lzhvo08m8vI4qQ7xZbAWQw/1Sy2PD77uOWVSctC8nfZeTqGuy74O+YzAsji3lsJsvSgP 1b+ursEbE/2BCB2CeF5W+6LKYBSXS7UZb5xtKvXavobr/9gD9f8lm/Z/z2t7QQIQkZrE Na5g==
X-Gm-Message-State: AC+VfDwV/AY62tn38b+JEelvAXYBOtem2BuRut18i74wnxsdKcqVvVOR Gt9pFOKeZm/zMnq4I++wAX1vrzCbX7o1hVi9jhw=
X-Google-Smtp-Source: ACHHUZ6EiMpzgO2jkwe3lTxJFnskzpzi5q2TKf6LsiW/bilClxx+SOLZ/KBdsITkut16WRR+ixpj3+rLP/VmBDC2hz8=
X-Received: by 2002:a1f:6094:0:b0:440:4946:fac with SMTP id u142-20020a1f6094000000b0044049460facmr208616vkb.4.1685404639834; Mon, 29 May 2023 16:57:19 -0700 (PDT)
MIME-Version: 1.0
References: <168388138334.52727.1302529136727870884@ietfa.amsl.com> <db311e72-12a8-778f-bce1-19f2172f6fc3@tropicalstormsoftware.com> <DB7PR07MB3995E6F0ECCC3CE14BE0FDFB9F789@DB7PR07MB3995.eurprd07.prod.outlook.com> <7dc18f79d3444cc498ff4191f6dc7ddf@jhuapl.edu> <c79f48d5-8229-b438-a681-692ea9f5c106@gmail.com> <CAMGpriUUqtu0hhx-KbubGd7VVkP1isKMAf_EQfrZdWd2+2nq2Q@mail.gmail.com> <82b31d8bd8054fa5b5a3efbd24dc6ab5@jhuapl.edu>
In-Reply-To: <82b31d8bd8054fa5b5a3efbd24dc6ab5@jhuapl.edu>
From: Erik Kline <ek.ietf@gmail.com>
Date: Mon, 29 May 2023 16:57:08 -0700
Message-ID: <CAMGpriWkMhibWmBb_LPO4i7M0t9qfOT52pVfOCppg8ArY5nM4A@mail.gmail.com>
To: "Birrane, Edward J." <Edward.Birrane@jhuapl.edu>
Cc: Oscar Garcia <oscargarciacomtron@gmail.com>, Zaheduzzaman Sarker <zaheduzzaman.sarker@ericsson.com>, Rick Taylor <rick@tropicalstormsoftware.com>, "dtn@ietf.org" <dtn@ietf.org>
Content-Type: multipart/alternative; boundary="000000000000dc373105fcddd845"
Archived-At: <https://mailarchive.ietf.org/arch/msg/dtn/VpIr0DhrWQZd0IuCbkG3SYOoRt8>
Subject: Re: [dtn] [EXT] Re: I-D Action: draft-ietf-dtn-ipn-update-04.txt
X-BeenThere: dtn@ietf.org
X-Mailman-Version: 2.1.39
Precedence: list
List-Id: "Delay Tolerant Networking \(DTN\) discussion list at the IETF." <dtn.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/dtn>, <mailto:dtn-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/dtn/>
List-Post: <mailto:dtn@ietf.org>
List-Help: <mailto:dtn-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/dtn>, <mailto:dtn-request@ietf.org?subject=subscribe>
X-List-Received-Date: Mon, 29 May 2023 23:57:25 -0000

On Mon, May 29, 2023 at 9:08 AM Birrane, Edward J. <
Edward.Birrane@jhuapl.edu> wrote:

> Erik,
>
>
>
>   (With chair hat off…)
>
>
>
>   I agree that we should avoid an **over-reliance** on reserved,
> well-known service identifiers. Polluting a space with niche services
> doesn’t seem to help anyone.
>
>
>
>  However, I think we should allow for the **existence** of reserved,
> well-known service identifiers, for three reasons:
>
>
>
> First -- service identifiers are logical identifiers (not ports or PIDs).
> For example, I could have a BPA which supports the “ABC” service and every
> time a new remote node uses that service the local BPA would spawn a new
> local process to handle that particular service for that particular remote
> node. Even if I wind up spawning 5..10…20 local processes to communicate
> with 5..10…20 remote nodes, I would expect the service identifier for all
> of them to remain the service identifier for service “ABC” because services
> are logical identifiers. The “demux” on the local node IMO is handled by
> the local node itself.  Certainly private-use service identifiers don’t
> need to behave that way, but well-known services identifiers could (and
> probably should).
>

Agreed, 100%.

Second – Waypoint nodes may want to understand well-known service traffic.
> I could imagine local policy on a waypoint BPA enforcing QoS or QoP as a
> function of well-known services. Such as “all network management traffic
> needs to be signed” or “all file transfer traffic needs to be encrypted”.
> If service identifiers are **all** private use and, thus, likely only
> known to source and destinations, we remove any practical analysis by
> waypoint nodes.
>

I definitely agree that a strict private-use-only approach would greatly
increase the amount of state information that would need to be synchronized.

In my earlier attempted explanation, the waypoints would have to have been
part of the "domain" in which node+service number mappings were shared (and
therefore "well-known" to those within the domain).

Third – If we presume that we must do service discovery for all services,
> then every participating BPA would need a mapping of every other BPA’s
> custom identifier for service “ABC” or otherwise presume that service
> discovery can be done “on demand” round-trip (which does not sound
> DTN-like). I think we should avoid (relatively) large, per-node mappings of
> custom identifiers (and worrying about them changing?) for well-known
> services.
>

Agreed that dynamic resolution is antithetical to general DTN usage.
(Someone could, of course, devise such a system, but its usefulness would
clearly be restricted.)

I know I was somehow extraordinarily unclear before: I never expected a
dynamic resolution mechanism in ordinary usage.  Rather I had imagined
_something_ in the control plane distributing the necessary configuration
information to applications within a cooperating domain.

I propose something of a middle ground – we have a 64 bit space here, after
> all:
>
>
>
> 1.       All one-byte encoded service identifiers be private use.
>
> 2.       Most two-byte encoded service identifiers be private use, but
> keep a small carve out (32?) for well-known services.
>
> 3.       Most three-byte encoded service identifiers be private use, but
> keep a small range (1024? 2048?) for well-known services. Maybe another
> range for unassigned?
>
> 4.       Most 4 byte and above now could just be unassigned.
>
>
>
> Then focus discussion on what should/should not be a well-known service.
> My hope is that well-known doesn’t mean 100% adoption but, rather, likely
> adoption for some threshold use, yet to be defined.
>
>
>
> Thoughts?
>

I have no intention of adhering to any excessively dogmatic position; I
just wanted to understand better how a set of "node.service"
destination EIDs was distributed/provisioned to applications.

All, or some combination, of these schemes seems very reasonable to me.

Many thanks!
-Erik

-Ed
>
>
>
> ---
> Edward J. Birrane, III, Ph.D. (he/him/his)
>
> Chief Engineer, Space Constellation Networking
>
> Supervisor, Embedded Applications Group
>
> Space Exploration Sector
>
> Johns Hopkins Applied Physics Laboratory
> (W) 443-778-7423 / (F) 443-228-3839
>
>
>
>
> *From:* Erik Kline <ek.ietf@gmail.com>
> *Sent:* Thursday, May 18, 2023 2:01 AM
> *To:* Oscar Garcia <oscargarciacomtron@gmail.com>
> *Cc:* Birrane, Edward J. <Edward.Birrane@jhuapl.edu>; Zaheduzzaman Sarker
> <zaheduzzaman.sarker@ericsson.com>; Rick Taylor <
> rick@tropicalstormsoftware.com>; dtn@ietf.org
> *Subject:* [EXT] Re: [dtn] I-D Action: draft-ietf-dtn-ipn-update-04.txt
>
>
>
> *APL external email warning: *Verify sender ek.ietf@gmail.com before
> clicking links or attachments
>
>
>
> I'd like to consider an argument for not having any reserved, well-known
> service numbers at all (other than zero for administrative endpoint
> purposes).
>
>
>
> Making assumptions about port numbers and their application meaning was
> useful when the resolution mechanisms available did not support returning
> the extra port number information (e.g. gethostname).  For various reasons
> things like SRV records did not exactly take off as a replacement that
> could give true port number flexibility.  Regardless, it's clear that today
> port 443 alone doesn't tell you anything about the application anymore.
> (Indeed, "ALPN is the new port number.")
>
>
>
> I personally think that well-known, reserved ports are a bit of a relic
> from the past that perhaps we don't need to carry forward.  I would suggest
> that the service number (and for that matter: the demux portion) should be
> something returned via a resolution mechanism (including "statically
> assigned" resolution) and there's likely very little value to having
> anything be reserved/well-known in the same way that port numbers were.
>
>
>
> 2 cents,
>
> -ek
>
>
>
>
>
> On Wed, May 17, 2023 at 12:22 PM Oscar Garcia <
> oscargarciacomtron@gmail.com> wrote:
>
> Ed,
> Great point about specific service numbers for common application services.
> I have been dealing with that for Medical Records for Space for some time.
> In a conference that I gave today on DTN, this was one of the points that
> was brought up in the Q&A.
> Making a parallel with TCP/IP ports, port 104 is reserved for exchanging
> radiology images in DICOM PACS on TCP/IP.
> Best,
> Oscar
>
> On 17/5/2023 15:44, Birrane, Edward J. wrote:
>
> Rick,
>
>
>
>   (Chair hat off)
>
>
>
>   Coming back from the CCSDS meeting last week, the one comment on the
> updated document was about the treatment of service numbers.
>
>
>
>   It is expected that service numbers in the IPN scheme identify some
> application service. For example, RFC9171 Section 4.2.5.1.2 states “… the
> EID's service number (a number that identifies some application
> service)…”.   Given that definition, missions will likely have their own
> application services for common operations like commanding and telemetry.
> Keeping the smaller numbered elements (0-23) as RFC required (or generally
> specification required) would be a burden because:
>
>
>
> 1.       Mission-specific services will not likely be traced to RFCs or
> public standards
>
> 2.       Mission-specific services would be frequently used in a
> constrained environment so small encodings would be appreciated.
>
>
>
>   Suggestion was to have an allocation of smaller numbers (and possibly
> larger numbers) be made “private use”  (
> https://www.rfc-editor.org/rfc/rfc8126.html#section-4.1) with, perhaps, a
> smaller section carved out for specification required.
>
>
>
> -Ed
>
>
>
>
>
> Edward J. Birrane, III, Ph.D. (he/him/his)
>
> Chief Engineer, Space Constellation Networking
>
> Supervisor, Embedded Applications Group
>
> Space Exploration Sector
>
> Johns Hopkins Applied Physics Laboratory
> (W) 443-778-7423 / (C) 443-690-8272
>
>
>
> *From:* dtn <dtn-bounces@ietf.org> <dtn-bounces@ietf.org> * On Behalf Of *Zaheduzzaman
> Sarker
> *Sent:* Monday, May 15, 2023 3:44 AM
> *To:* Rick Taylor <rick@tropicalstormsoftware.com>
> <rick@tropicalstormsoftware.com>; dtn@ietf.org
> *Subject:* [EXT] Re: [dtn] I-D Action: draft-ietf-dtn-ipn-update-04.txt
>
>
>
> *APL external email warning: *Verify sender dtn-bounces@ietf.org before
> clicking links or attachments
>
>
>
> Hi all,
>
>
>
> Lets continue the WGLC one more week (ending 19th May 15, 2023).
> Consensus call will be made after this week. If anyone has any question
> about this extension, please let me know.
>
>
>
> //Zahed
>
>
>
> On 2023-05-12, 10:53, "dtn" <dtn-bounces@ietf.org> wrote:
>
>
>
> Hi All,
>
> I have pushed out a new version -04 of the ipn update draft to fix a
> missing xref and address some of ScottJ's comments.
>
> Again, please have a quick read.
>
> Cheers,
>
> Rick
>
> _______________________________________________
> dtn mailing list
> dtn@ietf.org
> https://www.ietf.org/mailman/listinfo/dtn
>
>
>
> _______________________________________________
>
> dtn mailing list
>
> dtn@ietf.org
>
> https://www.ietf.org/mailman/listinfo/dtn
>
>
>
> _______________________________________________
> dtn mailing list
> dtn@ietf.org
> https://www.ietf.org/mailman/listinfo/dtn
>
>