[icnrg] contrace-03 draft update

Hitoshi Asaeda <asaeda@ieee.org> Tue, 04 July 2017 05:57 UTC

Return-Path: <asaeda@ieee.org>
X-Original-To: icnrg@ietfa.amsl.com
Delivered-To: icnrg@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id D5113129466 for <icnrg@ietfa.amsl.com>; Mon, 3 Jul 2017 22:57:28 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -1.901
X-Spam-Level:
X-Spam-Status: No, score=-1.901 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, DKIM_SIGNED=0.1, DKIM_VALID=-0.1, RCVD_IN_DNSWL_NONE=-0.0001, SPF_PASS=-0.001] autolearn=ham autolearn_force=no
Authentication-Results: ietfa.amsl.com (amavisd-new); dkim=pass (2048-bit key) header.d=ieee-org.20150623.gappssmtp.com
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id lvZWZP0LyNnq for <icnrg@ietfa.amsl.com>; Mon, 3 Jul 2017 22:57:27 -0700 (PDT)
Received: from mail-pg0-x233.google.com (mail-pg0-x233.google.com [IPv6:2607:f8b0:400e:c05::233]) (using TLSv1.2 with cipher ECDHE-RSA-AES128-GCM-SHA256 (128/128 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id E4A76127599 for <icnrg@irtf.org>; Mon, 3 Jul 2017 22:57:26 -0700 (PDT)
Received: by mail-pg0-x233.google.com with SMTP id t186so105459120pgb.1 for <icnrg@irtf.org>; Mon, 03 Jul 2017 22:57:26 -0700 (PDT)
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=ieee-org.20150623.gappssmtp.com; s=20150623; h=from:content-transfer-encoding:subject:message-id:date:to :mime-version; bh=I7MIAp55Cg7Of5x22IWeQXGzeZqwR4kQCKLToBHjD64=; b=PaxV2lkuZ46RX2/h7SBvtYNcBf64yy9AastnHv7aaoPaskdnsIhsqCVoP9QpuGTUUo JxX45C8YLwJuW3y27u6XZpJ55UZPn2K99eRwSrsvJhr2vWdDMfIx28wqq6w8jfRc2gY/ tf3wNjzgQCle12GQmxJVo/vtLgfeS9HcMtrRU+Egm9ZYDYiyz3PL3BZIxgR/5yaRQZzn 8YMDqPikxsSKuEIHxulEAfJG+GkaQKIkeZGciyreKwBUnYee+vYT7cLjAjzHb1nuJKkU K393nkwQZ/AZrLEPH14gqgK7eHSO711b9anTFaV2ZJj/hMCBXlm7lPDYwyLA7R8HOkoo 67gw==
X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20161025; h=x-gm-message-state:from:content-transfer-encoding:subject :message-id:date:to:mime-version; bh=I7MIAp55Cg7Of5x22IWeQXGzeZqwR4kQCKLToBHjD64=; b=PVAeAbwIFai1EYUymd7XXN8N9Un1YbPXw4UbMl9x6RdTAvfnMblwZvKorNOUPR0SOD q4KFOqQp8d5jlAWd/Pv8darWXxRqqw3THk/dl196vpXJ3MUofs4FxDR1jxx4c7RZ/s7x 13JKukgzaSdcKBSGSiidsm6KTXQE3hcDNbZUetnS4R08CB8hRaiPXryJcUyrBGiEQ5Ss 4enPRKCRrsNF+aMP+SVatnYd2c3Z0gdfEbt5Z4FaGAmykVokwcigGlSHNYYsz1NcB8E1 Z2XeX3gSVfd1+geZFUnRepRn3GQ0jkVpVyNM1EAsI9lNiSihlDopuW4z1pUA7jW9b8On NmWA==
X-Gm-Message-State: AIVw111+weKuLjsxrwDjZaNodvFjl0OdeYgEHnOAuHMhmQ7eNGmrvnHX eR+qLOqt0kBUW+kqjWcLqA==
X-Received: by 10.99.54.138 with SMTP id d132mr14122464pga.156.1499147845849; Mon, 03 Jul 2017 22:57:25 -0700 (PDT)
Received: from ?IPv6:2001:200:e103:1000:842f:aef5:86c5:9da6? ([2001:200:e103:1000:842f:aef5:86c5:9da6]) by smtp.gmail.com with ESMTPSA id 10sm37553806pfj.61.2017.07.03.22.57.24 for <icnrg@irtf.org> (version=TLS1 cipher=ECDHE-RSA-AES128-SHA bits=128/128); Mon, 03 Jul 2017 22:57:25 -0700 (PDT)
From: Hitoshi Asaeda <asaeda@ieee.org>
Content-Type: text/plain; charset="utf-8"
Content-Transfer-Encoding: quoted-printable
Message-Id: <BC6ED74A-334E-42F1-A84C-7ADC6AF90A6D@ieee.org>
Date: Tue, 04 Jul 2017 14:57:22 +0900
To: icnrg <icnrg@irtf.org>
Mime-Version: 1.0 (Mac OS X Mail 9.3 \(3124\))
X-Mailer: Apple Mail (2.3124)
Archived-At: <https://mailarchive.ietf.org/arch/msg/icnrg/bS5GxPzrSZPdQW0t-i2kTo1_2hc>
Subject: [icnrg] contrace-03 draft update
X-BeenThere: icnrg@irtf.org
X-Mailman-Version: 2.1.22
Precedence: list
List-Id: Information-Centric Networking research group discussion list <icnrg.irtf.org>
List-Unsubscribe: <https://www.irtf.org/mailman/options/icnrg>, <mailto:icnrg-request@irtf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/icnrg/>
List-Post: <mailto:icnrg@irtf.org>
List-Help: <mailto:icnrg-request@irtf.org?subject=help>
List-Subscribe: <https://www.irtf.org/mailman/listinfo/icnrg>, <mailto:icnrg-request@irtf.org?subject=subscribe>
X-List-Received-Date: Tue, 04 Jul 2017 05:57:29 -0000

Hi folks,

The revised Contrace draft is up.
https://tools.ietf.org/html/draft-asaeda-icnrg-contrace-03

This revision mainly includes the following changes based on the comments given in the previous meeting and the mailing list.

1. Default behavior for discovering multipath routes

We change the default behavior for discovering multi path routes from “ignoring the strategy and discovering all potential paths” to “following the strategy and discovering the actual path(s)”.

   Contrace supports multipath forwarding.  The Request messages can be
   forwarded to multiple neighbor routers.  Some router may have
   strategy for multipath forwarding; when it sends Interest messages to
   multiple neighbor routers, it may delay or prioritize to send the
   message to the upstream routers.  The Contrace Request, as the
   default, complies with such strategy; a Contrace user could trace the
   actual forwarding path based on the strategy.  On the other hand,
   there may be the case that a Contrace user wants to discover all
   potential forwarding paths based on routers' FIBs.  If a Contrace
   user invokes a Contrace Request with the force flag value (i.e.,
   "%x08" bit as seen in Figure 10), the forwarding strategy will be
   ignored and the router sends Requests to multiple upstream routers
   simultaneously, and the Contrace user could trace the all potential
   forwarding paths.

2. Contrace Reply Timeout

We describe pros./cons. for setting longer and shorter Contrace Reply Timeout value as follows;

   Routers can configure the Contrace Reply Timeout (Section 8.1), which
   is the allowable timeout value to keep the PIT entry.  If routers
   configure the longer timeout value, there may be an attractive attack
   vector against PIT memory.  Moreover, especially when the force
   option (Section 5.2) is specified for the Contrace Request, a number
   of Reply messages may come back and cause a response storm.  (See
   Section 10.7 for rate limiting to avoid the storm).  In order to
   avoid DoS attacks, routers may configure the shorter timeout value
   than the user-configured Contrace timeout value.  However, if it is
   too short, the Request may be timed out and the Contrace user does
   not receive the all Replies and only retrieves the partial path
   information (i.e., information about part of the tree).

   There may be the way to allow for incremental exploration (i.e., to
   explore the part of the tree the previous operation did not explore),
   whereas discussing such mechanism is out of scope of this document.

Thank you for your comments.

Regards,
--
Hitoshi Asaeda