Re: [dtn] Convergence Layer Adapter - Endpoint IDs (CLA-EID)

Brian Sipos <BSipos@rkf-eng.com> Mon, 09 December 2019 01:36 UTC

Return-Path: <BSipos@rkf-eng.com>
X-Original-To: dtn@ietfa.amsl.com
Delivered-To: dtn@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 7C8BC1200CD for <dtn@ietfa.amsl.com>; Sun, 8 Dec 2019 17:36:01 -0800 (PST)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -1.9
X-Spam-Level:
X-Spam-Status: No, score=-1.9 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, DKIM_SIGNED=0.1, DKIM_VALID=-0.1, HTML_MESSAGE=0.001, RCVD_IN_DNSWL_NONE=-0.0001, SPF_PASS=-0.001] autolearn=ham autolearn_force=no
Authentication-Results: ietfa.amsl.com (amavisd-new); dkim=pass (1024-bit key) header.d=rkfeng.onmicrosoft.com
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id K8RmhS8_MKaE for <dtn@ietfa.amsl.com>; Sun, 8 Dec 2019 17:35:58 -0800 (PST)
Received: from NAM12-BN8-obe.outbound.protection.outlook.com (mail-bn8nam12on2077.outbound.protection.outlook.com [40.107.237.77]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id 14A341200CC for <dtn@ietf.org>; Sun, 8 Dec 2019 17:35:58 -0800 (PST)
ARC-Seal: i=1; a=rsa-sha256; s=arcselector9901; d=microsoft.com; cv=none; b=Ymbj8PON03u3G2UUAXsxaoAPa5uNRqoyngvKIEZU62K4/VHZYG6IEQDOnBVpbZx1FfK3TYuLfasnSqFg/H5/tvAMJKZtVXMT/i6ntIZgYcAIiGNR4OB+bpEte4ki8zwq+JAq820m4GjtU1hC/Ld94bBXsBzLO5gVYdYYQlBzjA4T/EoACR+EMJbzfuJ2IQPs3cmSsEhSF7Cr9UGhJiKWVxsxTAWudWEOQ8duf/pMQH+LtuvmOjC3Dx59lf6qJGIIi21JgUpqKYwd/7DOvTBM2pZDlJci7en/tPiN5alHYVaaIslapcxBsx6+r79cPRsY585+Ahcq7+4v3aLV4FGbfQ==
ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=microsoft.com; s=arcselector9901; h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-SenderADCheck; bh=/n9bscFpArCsMXDLsEGKZKsi4GqgGpv7dvPKrq0Ltkc=; b=A1eBVWFPR4FtgUD9LWwQhstg1jXRInXOycmKwSz4JeFT7+rBkaQpwJHI7cIt7Ts7oALNTkBH8dWftNlRCLF+2IwQM8KSUKIu0MkguqSBdlxAXD692qg80UtEsV9vQjUcVyOxYMh7Q5hyGodaB1r8/OrsFKSysAVc4zIFwqgctygF0iBGDGHVsCWe2boKKzggv3LuELR0erUMNZfT+wB2MjKG+K8CRDHtADQsqwDxPIlcRapRlvG356nlrW/lE5EEAFvF0S0qZo/hGVv6CmSDPKFjgCG3GScruDx4a7oDTSnnrHNFU7aUVHiLc0xhLPssnUfVkF1hzm92tKewW3amgg==
ARC-Authentication-Results: i=1; mx.microsoft.com 1; spf=pass smtp.mailfrom=rkf-eng.com; dmarc=pass action=none header.from=rkf-eng.com; dkim=pass header.d=rkf-eng.com; arc=none
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=rkfeng.onmicrosoft.com; s=selector2-rkfeng-onmicrosoft-com; h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-SenderADCheck; bh=/n9bscFpArCsMXDLsEGKZKsi4GqgGpv7dvPKrq0Ltkc=; b=PG+kZtJ7bIZnSqo/Ju+1fsVRjjMwDHXGF81k5vZOHbU2W6dSLgX+wT4EcWgiyG/ST+iuNlrTYCI9WGvxzXTrtvZssRWo+KPME3cQZvykMPERx2IvHZWbFo6EigqrTXeL8U8lLcKykVE/yC4FFMdmgBMNSeTXC0QAGTIqayTSh8Q=
Received: from MN2PR13MB3520.namprd13.prod.outlook.com (10.255.238.221) by MN2PR13MB2959.namprd13.prod.outlook.com (20.179.149.213) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id 15.20.2538.10; Mon, 9 Dec 2019 01:35:54 +0000
Received: from MN2PR13MB3520.namprd13.prod.outlook.com ([fe80::5048:62dd:60d9:94b9]) by MN2PR13MB3520.namprd13.prod.outlook.com ([fe80::5048:62dd:60d9:94b9%7]) with mapi id 15.20.2538.012; Mon, 9 Dec 2019 01:35:54 +0000
From: Brian Sipos <BSipos@rkf-eng.com>
To: Loiseau lucien <loiseau.lucien@gmail.com>
CC: "dtn@ietf.org" <dtn@ietf.org>
Thread-Topic: [dtn] Convergence Layer Adapter - Endpoint IDs (CLA-EID)
Thread-Index: AQHVqO7NEXBX/7bO8E2F/196E5IzQKenBgkbgAddvACAAqY3tg==
Date: Mon, 09 Dec 2019 01:35:54 +0000
Message-ID: <MN2PR13MB3520612E9F4078300A2B0C299F580@MN2PR13MB3520.namprd13.prod.outlook.com>
References: <CANoKrvY2RMm447-OXzKWr5ngVFwpgXw-LbH0PU6LiYDxQUdYDA@mail.gmail.com> <MN2PR13MB3520794027C9E2B33D8CB0A49F430@MN2PR13MB3520.namprd13.prod.outlook.com>, <CANoKrvY_A5b-FmMC+n4p+pOjjG5qgQdi=Co199sRL_+2nBCwfA@mail.gmail.com>
In-Reply-To: <CANoKrvY_A5b-FmMC+n4p+pOjjG5qgQdi=Co199sRL_+2nBCwfA@mail.gmail.com>
Accept-Language: en-US
Content-Language: en-US
X-MS-Has-Attach:
X-MS-TNEF-Correlator:
authentication-results: spf=none (sender IP is ) smtp.mailfrom=BSipos@rkf-eng.com;
x-originating-ip: [67.108.126.82]
x-ms-publictraffictype: Email
x-ms-office365-filtering-correlation-id: fd618ff9-0181-4999-010c-08d77c482202
x-ms-traffictypediagnostic: MN2PR13MB2959:
x-microsoft-antispam-prvs: <MN2PR13MB29599AEBE1304296E15F31BA9F580@MN2PR13MB2959.namprd13.prod.outlook.com>
x-ms-oob-tlc-oobclassifiers: OLM:10000;
x-forefront-prvs: 02462830BE
x-forefront-antispam-report: SFV:NSPM; SFS:(10009020)(346002)(136003)(396003)(366004)(39830400003)(376002)(199004)(189003)(53754006)(26005)(53546011)(6506007)(186003)(19627405001)(5660300002)(102836004)(76176011)(7696005)(99286004)(80792005)(33656002)(66446008)(71200400001)(71190400001)(5070765005)(52536014)(4326008)(64756008)(66556008)(66946007)(66476007)(76116006)(9686003)(54896002)(966005)(74316002)(8936002)(55016002)(229853002)(2906002)(316002)(86362001)(6916009)(8676002)(81156014)(508600001)(81166006); DIR:OUT; SFP:1101; SCL:1; SRVR:MN2PR13MB2959; H:MN2PR13MB3520.namprd13.prod.outlook.com; FPR:; SPF:None; LANG:en; PTR:InfoNoRecords; A:1; MX:1;
received-spf: None (protection.outlook.com: rkf-eng.com does not designate permitted sender hosts)
x-ms-exchange-senderadcheck: 1
x-microsoft-antispam: BCL:0;
x-microsoft-antispam-message-info: EASdAtZrvVGa4a+RySGFFPc9oWOokIavcNJfoKaMk8xxvfHueJJ/dD48zSv659CIRSeTXWNqCaPSP6vffMxLxveh1YJhyZN92+wyXiqJIM8+Hg5TVw5bttMJhOTGcKWB1VxbJcyBdME70aqAsRNcnXlsKL6BjOTXx9YqaEldhKpwGTaxNe1Lr9eI+C7LrpJFa1Y+FwT0TmR5uIQodbdXvcm5mIOirTfvmFmrjeqo+hrLaVWvi3ev4xnROQN38xOZx/a7wjGaQZ879MBd/xYZA0R5VYmPv2u5/D09aAC5xfZJA7gri7kCZ+KFzklRuSjbp8pV6j5kiJK5mKW/CxOYSF4wH7MxhE0aCjiJ6uExI84alY6DLlGHFS1DalophrJOUUgs3KilD8mRew4PDRPdNfuNGT5CRH9Lv2/RVFF5nsQjRfYh9EFr1HkZkHCPovQ4QXvDsURAK3O3s7faV0/D1ZaLnPb/Oajq8OScpmH1QPUSyXC4G2ikTO/ABLWXqOmQnuj8xapeJAXl6Jg/uOkPLwc8fJq6XQfE4QsB3V93Q8A=
x-ms-exchange-transport-forked: True
Content-Type: multipart/alternative; boundary="_000_MN2PR13MB3520612E9F4078300A2B0C299F580MN2PR13MB3520namp_"
MIME-Version: 1.0
X-OriginatorOrg: rkf-eng.com
X-MS-Exchange-CrossTenant-Network-Message-Id: fd618ff9-0181-4999-010c-08d77c482202
X-MS-Exchange-CrossTenant-originalarrivaltime: 09 Dec 2019 01:35:54.3642 (UTC)
X-MS-Exchange-CrossTenant-fromentityheader: Hosted
X-MS-Exchange-CrossTenant-id: 4ed8b15b-911f-42bc-8524-d89148858535
X-MS-Exchange-CrossTenant-mailboxtype: HOSTED
X-MS-Exchange-CrossTenant-userprincipalname: RmNHb8PCdOL1S1luyarpU6kED5PpSJBdido3ULINU+p22TGOgVORcIe4mCDs7gNM4do5FBe0fxbayLXEaCsxtA==
X-MS-Exchange-Transport-CrossTenantHeadersStamped: MN2PR13MB2959
Archived-At: <https://mailarchive.ietf.org/arch/msg/dtn/_0MNwVfmfh41EdYdrQAGNMFnyZc>
Subject: Re: [dtn] Convergence Layer Adapter - Endpoint IDs (CLA-EID)
X-BeenThere: dtn@ietf.org
X-Mailman-Version: 2.1.29
Precedence: list
List-Id: "Delay Tolerant Networking \(DTN\) discussion list at the IETF." <dtn.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/dtn>, <mailto:dtn-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/dtn/>
List-Post: <mailto:dtn@ietf.org>
List-Help: <mailto:dtn-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/dtn>, <mailto:dtn-request@ietf.org?subject=subscribe>
X-List-Received-Date: Mon, 09 Dec 2019 01:36:01 -0000

Lucien,
Agreed that CLA IDs are a more general topic than the IP-network-specific uses in IPND.

My reason for mentioning it was from the perspective of an IPND being able to have both: a size-optimized representation of common CLAs (for example UDP CL of RFC7122<https://www.iana.org/go/rfc7122> with IPv6 address) as well as a more generic "here is a CLA ID that this node is providing". However, I'm not sure if there is so much value in pushing up decoding/using the CLA ID to a higher layer than at the IPND layer. The CLA ID still at some point has to be decoded and used by an agent to transfer bundles.
________________________________
From: Loiseau lucien <loiseau.lucien@gmail.com>
Sent: Saturday, December 7, 2019 03:46
To: Brian Sipos <BSipos@rkf-eng.com>
Cc: dtn@ietf.org <dtn@ietf.org>
Subject: Re: [dtn] Convergence Layer Adapter - Endpoint IDs (CLA-EID)

Hi Brian,

thanks for pointing out the IPND draft. Though related, I believe that CLA-EID does address a slightly different issue than peer or service discovery. My proposition is a general formalization for CLA Identifiers, how it should be encoded (string, integer or both) within the context a peer discovery protocol is another issue. Also the IPND draft seems to be limited to IP discovery only where as a CLA-EID can be used to describe a Bluetooth or a USB stick interface (this is very relevant for the context of DTN use case I am working on). CLA-EID is not about how to exchange identifier information, this draft is to agree on:

  1.  how a CLA-EID should be constructed, the proposition is cla:<CLA-NAME>:<CLA-SPECIFIC-PART> and should be automatically derivable from the cla interface without any exchange of packet (because the same identifier could be used to trigger and open such interface).
  2.  what a CLA service MUST expose: an ingress and egress CLA-EID when relevant.

Only when this brick is layed can a peer discovery protocol be built upon to exchange CLA-EID identifiers like IPND, or a new draft for bluetooth peer discovery using BLE beaconing for example, or a new draft for usb stick discovery using a specific file (for example `.BPV7INFO`).

Also it may be the topic of a different thread but since you ask the question, when I developed a BPv7 implementation [1] I found the serialization of EID to be very convoluted because it makes it hard to be generic. Since the RFC states that an EID is just an URI and no other constraint are given to it, it should just be it and be serialized as a string. Right now, there is two issues with how EID are serialized:

  1.  The scheme is encoded as a number which MUST require to be registered on IANA.
  2.  The SSP is schema-specific, for instance it is a cbor string for `dtn:` and a cbor array of cbor integer for `ipn`.

The problem is that if someone come up with its own schema that isn't yet registered on IANA, those bundle would be impossible to route because impossible to serialize. In a situation where an AA receive from its API a query to send a bundle to an unknown URI scheme (so it is a string), a sane process would be to either delete it or just pass it to some other more knowledgeable node (sort of a default route) but in this case event it would be impossible to do so because it wouldn't even know how to serialize it. So we would have to wait for IANA to approve the scheme and then update the code in all of bundle node, seems like a lot of unnecessary bureaucracy, why not just a string for encoding EIDs?

The above issue was also one of the purpose of formalizing CLA-EID, so that we can at least work generically with all CLA identifiers in a generic fashion.

[1] https://github.com/Marlinski/Terra


On Fri, Dec 6, 2019 at 9:42 PM Brian Sipos <BSipos@rkf-eng.com<mailto:BSipos@rkf-eng.com>> wrote:
Lucien,
I do see value in registration of CLA identifiers. One of the deficiencies I see with the IPND draft is that its notion of what is a CLA service [1] is quite ambiguous. It implies that "TCP" means "DTN TCPCL" and isn't exactly clear about what protocol version is used (all of the CLAs are cited from that draft as Informative References). It's a good notional start but I would love to take a crack at tightening up, modernizing, and security-enhancing the IPND protocol.

A question to the WG related to CLA identifiers is: do we want the CLA registry to be maintained as text (similar to the URN namespace registry) or using integer namespaces as IPND, BPv7, and BPv6/CBHE do, or as a combination of "text name" and "integer label" as COSE [2] does for its parameters.

[1] https://tools.ietf.org/html/draft-irtf-dtnrg-ipnd-03#section-2.6.3
[2] https://www.iana.org/assignments/cose/cose.xhtml#header-parameters
CBOR Object Signing and Encryption (COSE)<https://www.iana.org/assignments/cose/cose.xhtml#header-parameters>
CBOR Object Signing and Encryption (COSE) Created 2017-01-11 Last Updated 2019-08-20 Available Formats XML HTML Plain text. Registries included below. COSE Header Parameters
www.iana.org<http://www.iana.org>

CBOR Object Signing and Encryption (COSE)<https://www.iana.org/assignments/cose/>
CBOR Object Signing and Encryption (COSE) Created 2017-01-11 Last Updated 2019-08-20 Available Formats XML HTML Plain text. Registries included below. COSE Header Parameters
www.iana.org<http://www.iana.org>



________________________________
From: dtn <dtn-bounces@ietf.org<mailto:dtn-bounces@ietf.org>> on behalf of Loiseau lucien <loiseau.lucien@gmail.com<mailto:loiseau.lucien@gmail.com>>
Sent: Monday, December 2, 2019 03:59
To: dtn@ietf.org<mailto:dtn@ietf.org> <dtn@ietf.org<mailto:dtn@ietf.org>>
Subject: [dtn] Convergence Layer Adapter - Endpoint IDs (CLA-EID)

Hi all,

last year I wrote a draft regarding the introduction of an EID format that would be specific to convergence layer adapters that I called IID (Interface IDentier):

https://tools.ietf.org/html/draft-loiseau-dtn-cla-eid-00

The purpose was to have a generic EID format that would carry enough semantic so as to allow routing protocol and automatic connection scheduling to operate in a way that is not implementation specific. My use cases was the ability to maintain a link-local EID routing table as well as automatically initiating TCP connection for certain destination upon the reception of some bundles.

The draft expired in May but I would be happy to take your comments and submit a new one with a better wording, please have a look!

Best Regards,
Lucien Loiseau


--
--
Lucien Loiseau