Re: [dtn] Backwards compatibility between 'classic' ipn and ipn+

Rick Taylor <rick@tropicalstormsoftware.com> Sun, 20 November 2022 10:22 UTC

Return-Path: <rick@tropicalstormsoftware.com>
X-Original-To: dtn@ietfa.amsl.com
Delivered-To: dtn@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 16D0FC14F72C for <dtn@ietfa.amsl.com>; Sun, 20 Nov 2022 02:22:21 -0800 (PST)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -6.897
X-Spam-Level:
X-Spam-Status: No, score=-6.897 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, RCVD_IN_DNSWL_HI=-5, RCVD_IN_ZEN_BLOCKED_OPENDNS=0.001, SPF_HELO_NONE=0.001, SPF_PASS=-0.001, URIBL_DBL_BLOCKED_OPENDNS=0.001, URIBL_ZEN_BLOCKED_OPENDNS=0.001] autolearn=ham autolearn_force=no
Received: from mail.ietf.org ([50.223.129.194]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id yVit9FjZ-oiV for <dtn@ietfa.amsl.com>; Sun, 20 Nov 2022 02:22:17 -0800 (PST)
Received: from mail.tropicalstormsoftware.com (mail.tropicalstormsoftware.com [188.94.42.120]) (using TLSv1 with cipher ECDHE-RSA-AES256-SHA (256/256 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id 0E9AEC14F6E7 for <dtn@ietf.org>; Sun, 20 Nov 2022 02:22:16 -0800 (PST)
Received: from tss-server1.home.tropicalstormsoftware.com ([fe80::48e4:acbb:6065:8168]) by tss-server1.home.tropicalstormsoftware.com ([fe80::48e4:acbb:6065:8168%16]) with mapi id 14.03.0513.000; Sun, 20 Nov 2022 10:22:14 +0000
From: Rick Taylor <rick@tropicalstormsoftware.com>
To: "scott@solarnetone.org" <scott@solarnetone.org>
CC: "dtn@ietf.org" <dtn@ietf.org>
Thread-Topic: [dtn] Backwards compatibility between 'classic' ipn and ipn+
Thread-Index: Adj79vVE7Ok34sCGRtm91ZD3wwkBlAAxS3QAAAIQuWA=
Date: Sun, 20 Nov 2022 10:22:13 +0000
Message-ID: <38A5475DE83986499AEACD2CFAFC3F98025B7A77DC@tss-server1.home.tropicalstormsoftware.com>
References: <38A5475DE83986499AEACD2CFAFC3F98025B7A7290@tss-server1.home.tropicalstormsoftware.com> <8b03439-5f9-52f7-ada2-d2705a38da99@solarnetone.org>
In-Reply-To: <8b03439-5f9-52f7-ada2-d2705a38da99@solarnetone.org>
Accept-Language: en-GB, en-US
Content-Language: en-US
X-MS-Has-Attach:
X-MS-TNEF-Correlator:
x-originating-ip: [2a02:1648:4000:120:e137:40d5:c660:ec61]
Content-Type: text/plain; charset="utf-8"
Content-Transfer-Encoding: base64
MIME-Version: 1.0
Archived-At: <https://mailarchive.ietf.org/arch/msg/dtn/b4HlJSz19a7oeINUMGVZ-e8Smv4>
Subject: Re: [dtn] Backwards compatibility between 'classic' ipn and ipn+
X-BeenThere: dtn@ietf.org
X-Mailman-Version: 2.1.39
Precedence: list
List-Id: "Delay Tolerant Networking \(DTN\) discussion list at the IETF." <dtn.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/dtn>, <mailto:dtn-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/dtn/>
List-Post: <mailto:dtn@ietf.org>
List-Help: <mailto:dtn-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/dtn>, <mailto:dtn-request@ietf.org?subject=subscribe>
X-List-Received-Date: Sun, 20 Nov 2022 10:22:21 -0000

Hi Scott,

Can you please explain your assertion: "... existing DTNs become non-interoperable over time with anyone implementing your version of the scheme..." as I don't believe it to be true.  If it is true, then I certainly wouldn't support continued work on this topic.

Cheers,

Rick

> -----Original Message-----
> From: scott@solarnetone.org [mailto:scott@solarnetone.org]
> Sent: 20 November 2022 08:43
> To: Rick Taylor
> Cc: dtn@ietf.org
> Subject: Re: [dtn] Backwards compatibility between 'classic' ipn and ipn+
> 
> Hi Everyone,
> 
> On Sat, 19 Nov 2022, Rick Taylor wrote:
> 
> >
> > Hi All,
> >
> >
> >
> > As I read RFC9171, it is very clear about the behaviour of a BPA that
> > receives a bundle with an EID it does not recognise:  Section 6.1.1 states
> > that a bundle status report of type 6 “No known route to destination from
> > here” should be sent to the ReportTo EID.  Conceivably a status report of
> > type 5 “Destination endpoint ID unavailable” could be used, but I have
> > always read that as “App is here, but not live” rather than “I dunno how to
> > forward that”.
> >
> >
> >
> > With the proposed updates to ipn, this behaviour remains unchanged, and
> > hence there would be no impact to an existing, interoperable DTN.
> >
> 
> 
> Your definition of "no impact" is puzzling as existing DTNs become
> non-interoperable over time with anyone implementing your version of the
> scheme.  I think this creates a splinternet whereby existing networks, if
> left unmodified, wind up being able to communicate only with null or
> original authority named nodes, but effectively remain disconnected from
> the new nodes with authority numbers.  This results in the eventual
> disconnection of existing resource holders.  The draft would marginalize
> the utility of my (and other's) naming resources, by relegating them to
> BPv6 use only, and would make communication with Nodes named with these
> resources fail in networks named with your new specification for naming
> resources.
> 
> Your draft appears to say that CBHE Node IDs were designed for BPv6 only,
> yet they have already been widely implemented with BPv7. I would tend to
> side with running code here as proof of intent.
> 
> I read the draft to outlaw the practice of deploying multiple Node Ids in
> a single node. This is a practice I have found both useful and effective
> in active deployment, and continue to use, as demonstrated at IETF 115.
> To require an individual application instance to be deployed per NodeID
> winds up wasting processor, memory, and power.  All of these should be
> conserved where possible, both in space and terrestrially.
> 
> The terrestrial Internet has benefited from an open philosophy.  Something
> along the lines of "if you are capable, and you are willing, you are
> welcome according to published and specified rules." is the accepted
> barrier of entry.  It would be quite a shame if we were to lose that
> inclusivity, just as we are progressing forward into the solar system.
> 
> > One of the major reasons for avoiding a new ‘ipn+’ scheme, is that would
> > require a new set of BPSec profiles to be implemented for asserting Node
> > identity for PKI, and that would be a major blocker to adoption.
> 
> Can anyone point me to a reference to what a "BPSec profile" is, in
> context of the relevant RFCs?  I have read, and searched digitally, lest I
> missed it, for the word "profile" in both of the most recent RFCs relating
> to BPSec. I fail to find a single instance.  Is this something that is
> implementation specific?
> 
> I do find reference to 'profile', and often (in the title and page
> headers, mostly) in a draft Ed put forward that expired in 2016:
> 
> https://datatracker.ietf.org/doc/html/draft-birrane-dtn-bpsec-suiteb-profile-
> 00
> 
> Ed, can you shed some light on this?  I understand the cryptography end.
> 
> This document has "None" for IANA considerations.  Similarly, there are no
> other documents referenced from this document which have relevant IANA
> considerations, or which, indeed, make any mention of naming schemes in
> relation to BPSec.  The only "profile" referenced in any of these
> documents is the "NSA Suite B Profile" specification for cryptographic
> algorithm selection.  I fail to see a conflict here.  What relationship
> does Bundle Protocol URI Scheme Types have with BPSec Security Context
> Identifiers, or the undocumented "BPSec profiles" that the former would
> have a dependency on the latter?
> 
> Enjoy,
> Scott
> 
> >
> >
> > Cheers,
> >
> >
> >
> > Rick
> >
> >
> >