Re: [icnrg] BoF Proposal - Forwarding Using Names - FUN BOF

Stephen Farrell <stephen.farrell@cs.tcd.ie> Wed, 25 May 2016 21:18 UTC

Return-Path: <stephen.farrell@cs.tcd.ie>
X-Original-To: icnrg@ietfa.amsl.com
Delivered-To: icnrg@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 5B5D212DD94 for <icnrg@ietfa.amsl.com>; Wed, 25 May 2016 14:18:40 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -5.727
X-Spam-Level:
X-Spam-Status: No, score=-5.727 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, DKIM_SIGNED=0.1, DKIM_VALID=-0.1, DKIM_VALID_AU=-0.1, RCVD_IN_DNSWL_MED=-2.3, RP_MATCHES_RCVD=-1.426, SPF_PASS=-0.001] autolearn=ham autolearn_force=no
Authentication-Results: ietfa.amsl.com (amavisd-new); dkim=pass (1024-bit key) header.d=cs.tcd.ie
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id wupn633dxHg7 for <icnrg@ietfa.amsl.com>; Wed, 25 May 2016 14:18:38 -0700 (PDT)
Received: from mercury.scss.tcd.ie (mercury.scss.tcd.ie [134.226.56.6]) (using TLSv1.2 with cipher AECDH-AES256-SHA (256/256 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id A74BB12D109 for <icnrg@irtf.org>; Wed, 25 May 2016 14:18:37 -0700 (PDT)
Received: from localhost (localhost [127.0.0.1]) by mercury.scss.tcd.ie (Postfix) with ESMTP id 929D8BE58; Wed, 25 May 2016 22:18:35 +0100 (IST)
X-Virus-Scanned: Debian amavisd-new at scss.tcd.ie
Received: from mercury.scss.tcd.ie ([127.0.0.1]) by localhost (mercury.scss.tcd.ie [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id cZHmTTJNaz6q; Wed, 25 May 2016 22:18:33 +0100 (IST)
Received: from [10.87.48.210] (95-45-153-252-dynamic.agg2.phb.bdt-fng.eircom.net [95.45.153.252]) by mercury.scss.tcd.ie (Postfix) with ESMTPSA id 3E3ABBE39; Wed, 25 May 2016 22:18:33 +0100 (IST)
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/simple; d=cs.tcd.ie; s=mail; t=1464211113; bh=HhtSw5ORQ8vqGy4x8c3VIYBuNf7aT21r8qApDhkbcJY=; h=Subject:To:References:Cc:From:Date:In-Reply-To:From; b=1OixJmXu0rUdKFNHTRbB0z8epCOiYeRGTCNi9URWIw71FA8fbp6gFLRmqhVLmB9ZA fNpzAxxQTmsQN2/TDFG1s+fMpmHCMi8A1DTl39E69Y5LjYsRuBCvpCTqC5sK6Wf0HX aryW7JclXtVRBRWjO4+G61boRgFY5ba29YGVUnNA=
To: Ignacio Solis <isolis@igso.net>
References: <CAE5oOSNNR1c6PSh2CeudqkPFJUkWwE+rhMw1Xd-T+h2aTJpw8g@mail.gmail.com> <1r5o02.o7r0me.rtlq22-qmf@mercury.scss.tcd.ie> <CAE5oOSNLAEjwwWsFUXoi5SBWenYSeYfm7abTi2HWtosv+KmP5A@mail.gmail.com>
From: Stephen Farrell <stephen.farrell@cs.tcd.ie>
Openpgp: id=D66EA7906F0B897FB2E97D582F3C8736805F8DA2; url=
Message-ID: <574616A8.9090007@cs.tcd.ie>
Date: Wed, 25 May 2016 22:18:32 +0100
User-Agent: Mozilla/5.0 (X11; Linux x86_64; rv:38.0) Gecko/20100101 Thunderbird/38.8.0
MIME-Version: 1.0
In-Reply-To: <CAE5oOSNLAEjwwWsFUXoi5SBWenYSeYfm7abTi2HWtosv+KmP5A@mail.gmail.com>
Content-Type: multipart/signed; protocol="application/pkcs7-signature"; micalg="sha-256"; boundary="------------ms040407090802010706010503"
Archived-At: <http://mailarchive.ietf.org/arch/msg/icnrg/OxuuZwmj8Im0jywq--s7-ADsrEU>
Cc: icnrg@irtf.org
Subject: Re: [icnrg] BoF Proposal - Forwarding Using Names - FUN BOF
X-BeenThere: icnrg@irtf.org
X-Mailman-Version: 2.1.17
Precedence: list
List-Id: Information-Centric Networking research group discussion list <icnrg.irtf.org>
List-Unsubscribe: <https://www.irtf.org/mailman/options/icnrg>, <mailto:icnrg-request@irtf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/icnrg/>
List-Post: <mailto:icnrg@irtf.org>
List-Help: <mailto:icnrg-request@irtf.org?subject=help>
List-Subscribe: <https://www.irtf.org/mailman/listinfo/icnrg>, <mailto:icnrg-request@irtf.org?subject=subscribe>
X-List-Received-Date: Wed, 25 May 2016 21:18:40 -0000

Hiya,

On 25/05/16 21:14, Ignacio Solis wrote:
> The comment wasn't because we don't need more work in security (novel,
> current or ancient), it was because the idea was for that work to remain at
> ICNRG.   I personally don't have a strong objection to bringing it in as
> long as ADs are ok with that.

Personally speaking, I would have a problem with an IETF WG
being formed on the basis that an IRTF RG was still needed
to figure out the answers to basic security questions.

> 
> If we're all on the same page about the BoF I'm happy to figure out the
> details about the proposed charter and then clean things up at the BoF.

So I'm kinda in two minds about this.

We have IETF BCPs (e.g. BCP61, BCP188) that basically call for strong
security to be well-defined for IETF standards track protocols. I don't
see that we have any currently well-defined schemes for e2e or transport
security for ICN, that adhere to ICN principles. (For all but a few
services such as name-data integrity I mean.)

So an IETF WG would either seem to require a) defining how to do ICN
security for ICN by falling back to host based security (as current
proposals do), which seems to call into question the idea of WG, or
else b) solve what seems to me to be the very hard problem of security
for ICN, done in a way that makes sense in an ICN.

I'd like to see (b) happen but that might take a long time. However,
doing (a) can also be significantly time consuming - talk to folks
about the history of the roll WG on this topic for example. Not having
a real answer and punting on that over and over was what happened
there and still hasn't resulted in a satisfactory outcome (from my
POV anyway).

There were similar issues with LISP as well I think, though there
were also other things going on there. In that case, the attempt
wasn't to punt, but to first develop experimental IETF track RFCs,
(which I guess made sense to someone at the time;-) but given that
there's an RG, I'm not sure another route to producing experimental
RFCs is very useful.

So my overall initial reaction is that this'd be a fine proposal if
the ICN-security solutions were much better developed. Absent that,
this part of the work is liable to be quite tricky, and could be
time consuming and lead to nasty blockages later in the IETF
process. (*)

In any case, I think this is about much more than wordsmithing.

Cheers,
S.

(*) In case anyone considers the above some kind of personal
threat, see [1] :-) I'd be fairly sure that most SEC ADs would be
of the same mind though.

[1] https://www.ietf.org/mail-archive/web/saag/current/msg07057.html


> 
> Nacho
> 
> On Wed, May 25, 2016 at 12:54 PM, <stephen.farrell@cs.tcd.ie> wrote:
> 
>>
>>
>> On Wed May 25 18:47:32 2016 GMT+0100, Ignacio Solis wrote:
>>> Forwarding Using Names - FUN BOF
>>>
>>> The work in ICN protocols has advanced to the point where we need to
>>> consider the creation of a Working Group. For this reason we would like
>> to
>>> request a Forwarding Using Names BoF (FUN BoF) to be scheduled for the
>>> Berlin meeting. The FUN BoF would be used to gauge the level of interest
>>> from the community, define the scope of a potential WG, determine what
>>> items from ICNRG we’re going to carry over and in what form, discuss a
>>> possible charter and talk about where and how this work fits in the IETF.
>>>
>>> For this purpose I would like to present a draft charter and agenda.
>>> Feedback is requested and welcome.
>>>
>>>
>>> ======================
>>>
>>> Proposed agenda for the FUN BoF:
>>>
>>> 1) Objective and agenda bashing
>>> 2) Problem statement
>>> 3) State of current documents and technology
>>> 3a) draft-irtf-icnrg-ccnxsemantics-02
>>> 3b) draft-irtf-icnrg-ccnxmessages-02
>>> 3c) draft-mosko-icnrg-ccnxurischeme-01
>>> 3d) draft-tschudin-icnrg-flic-00
>>> 3e) draft-wood-icnrg-ccnxoverudp.txt
>>> 3f) others?
>>> 4) Scoping
>>> 5) Charter discussion
>>> 6) Next steps
>>>
>>> Proposed WG Charter:
>>> Name:
>>>  Forwarding Using Names Working Group (FUNWG)
>>>
>>> Chairs:
>>>  TBD
>>>
>>> Area:
>>>  Transport/Internet (?)
>>>
>>> AD:
>>>  ?
>>>
>>> Description of WG:
>>>
>>> The purpose of the Forwarding Using Names Working Group (FUNWG) is to
>>> specify protocols and mechanisms for forwarding packets using names.
>>> Network nodes produce or request packets based on names (explicit or
>>> implicit). Networks that use named pieces of content as the main
>>> communication abstraction have been labeled as Information Centric
>>> Networks. As the name implies, this Working Group specifically focuses on
>>> using names to forward packets; that is, layer 3.
>>>
>>> Forwarding packets using names is the cornerstone of the predominant ICN
>>> approaches and has been the focus of most academic and industrial
>> research.
>>> The CCN and NDN protocols use a request-response object protocol to
>> provide
>>> an adaptable, resilient and secure communication environment that doesn’t
>>> suffer from some of the drawbacks introduced by the IP/TCP/HTTP/TLS
>>> combination.
>>>
>>> Work on ICN started in 2007 at PARC with the creation of CCN. In 2009 the
>>> NDN project was formed using CCN as a base. At the same time a number of
>>> European projects (NetINF, Pursuit) also started evaluating different ICN
>>> techniques. The NetINF project for example produced “Naming Things with
>>> Hashes” [RFC 6920]. In 2012 the IRTF chartered a Research Group to do
>> work
>>> on ICN, the ICNRG. The community consensus settled on the CCN approach
>> with
>>> most ICNRG work and discussions revolving around it.
>>>
>>> The CCN protocol is a request-response protocol made up of 2 core network
>>> messages; Interests and ContentObjects. Interests request content by
>> name.
>>> ContentObjects are named pieces of content. Forwarders us the name in the
>>> messages to determine where to forward them. Interests follow a FIB doing
>>> prefix matching on the name. ContentObjects follow the reverse path.
>>>
>>> Forwarding packets using names has a number of implications, specifically
>>> it allows the network to name each piece of data. Once you can name each
>>> piece of data and request the data by name you can get a number of
>> benefits
>>> including object-based security, decoupling of producer and sender,
>>> improved flow control, native indirection, caching, etc.
>>>
>>> Work items for this Working Group
>>> - Define a set of coherent core protocols that communicate by forwarding
>>> using names.
>>> - Define a set of transport protocols built on top of the core protocols
>>> that communicate at the level of application data units.
>>> - Define a set of overlay protocols to transport named objects over UDP
>> and
>>> Ethernet.
>>>
>>> There are some areas that while very related, are out of scope for this
>>> Working Group.
>>> These include routing, key distribution, novel security techniques, etc.
>>
>> Sorry but that last puzzles me. If there are no current ICN
>> confidentiality services, how can novel ones be out of scope?
>>
>> Ta,
>> S.
>>
>>>
>>> Expected documents:
>>> 9 months - core protocol
>>> 15 months - transport protocol
>>> 6 months - overlay protocol (xxx-over-UDP, xxx-over-IP)
>>> 9 months - native protocol (xxx-over-Ethernet, ??)
>>>
>>> --
>>> Nacho - Ignacio Solis - isolis@igso.net
>>>
>>
> 
> 
> 
> 
> 
> _______________________________________________
> icnrg mailing list
> icnrg@irtf.org
> https://www.irtf.org/mailman/listinfo/icnrg
>