Re: [icnrg] Review of draft-irtf-icnrg-icnping

Spyridon Mastorakis <smastorakis@unomaha.edu> Fri, 26 August 2022 02:44 UTC

Return-Path: <prvs=523705693a=smastorakis@unomaha.edu>
X-Original-To: icnrg@ietfa.amsl.com
Delivered-To: icnrg@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 1EDDAC1522C9 for <icnrg@ietfa.amsl.com>; Thu, 25 Aug 2022 19:44:24 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -2.103
X-Spam-Level:
X-Spam-Status: No, score=-2.103 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, DKIM_SIGNED=0.1, DKIM_VALID=-0.1, DKIM_VALID_AU=-0.1, DKIM_VALID_EF=-0.1, HTML_MESSAGE=0.001, RCVD_IN_ZEN_BLOCKED_OPENDNS=0.001, SPF_HELO_NONE=0.001, SPF_NONE=0.001, T_SCC_BODY_TEXT_LINE=-0.01, URIBL_BLOCKED=0.001, URIBL_DBL_BLOCKED_OPENDNS=0.001, URIBL_ZEN_BLOCKED_OPENDNS=0.001] autolearn=ham autolearn_force=no
Authentication-Results: ietfa.amsl.com (amavisd-new); dkim=pass (2048-bit key) header.d=unomaha.edu header.b=FEQhO19R; dkim=pass (1024-bit key) header.d=unomaha.edu header.b=TxBfiRNC
Received: from mail.ietf.org ([50.223.129.194]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id A_SnWVIVXroS for <icnrg@ietfa.amsl.com>; Thu, 25 Aug 2022 19:44:19 -0700 (PDT)
Received: from mx0b-00246402.pphosted.com (mx0b-00246402.pphosted.com [148.163.143.147]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id 6A152C1524DE for <icnrg@irtf.org>; Thu, 25 Aug 2022 19:44:16 -0700 (PDT)
Received: from pps.filterd (m0136271.ppops.net [127.0.0.1]) by mx0a-00246402.pphosted.com (8.17.1.5/8.17.1.5) with ESMTP id 27Q1RwYg008937; Thu, 25 Aug 2022 21:44:09 -0500
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=unomaha.edu; h=from : to : cc : subject : date : message-id : references : in-reply-to : content-type : mime-version; s=pppod; bh=WQ1zDywWGa05K7HuAvJ3SjKXa7UKyHzPMgpc6bI4p+A=; b=FEQhO19R4ugQbwhkj8WETY7OACClGCP1V6JoMvGb25v+NTuD3hGtd2eUWyAJdIKww/y4 cw25TBEXm0+uVRGMdv+1XP/rplm9Ukks5Eg7LeA9oRMujJfC47Q+tIWc/U/9mbJWjr8O FntBwhB4Q8ZvPvwBDWv0YOXB+9szSYJoLNJEOzVDDDBiagZ/cFo45N2MD6IDZi7R+AUG SIRBvg+S/5oZ7Jk8swy2Nbqk6vwCjhyinwFf5YHM0MXHPjHSwg9zBk1BNNDNQ88d1nuP 3eFvgoqSE3hML/SikwuE3atdbik47WQe8Fdb1gF7F9f+S/5dM3rpxlHUPzaRuA8vuxxo eQ==
Received: from nam10-dm6-obe.outbound.protection.outlook.com (mail-dm6nam10lp2107.outbound.protection.outlook.com [104.47.58.107]) by mx0a-00246402.pphosted.com (PPS) with ESMTPS id 3j6mhd84s3-1 (version=TLSv1.2 cipher=ECDHE-RSA-AES256-GCM-SHA384 bits=256 verify=NOT); Thu, 25 Aug 2022 21:44:09 -0500
ARC-Seal: i=1; a=rsa-sha256; s=arcselector9901; d=microsoft.com; cv=none; b=MWcOPV+sM76w4SRXjoyaqW+70b6QT6Y03X1bhXEJC26z8O3SOsSS4N47IeoRHhDr+879/9TEqJ+rrRMF/wsZJyVJ7R6mMX9sXGQ5iY7RcC/6FcVa7EWtKpSdk7WQtrvb93YQYtVebP50w5Nou9SWaykZMIsKXdN/nGENnd4YMTiZzBHt7V2RG7LqAZ0QtnPehPRtObJQtmdeUcVbFAa7TIrdocts4dL8lnESrBQwrjLeJVRgeKdTaClRb2aGn6DYalF+8bfyoc+AgT3ywGdCcDXDgydxz6TCoMSlV0rrjV5N2FZjaR6pq2iC9C84VOEcUi8n/3yvCUFQy1DiDLX50A==
ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=microsoft.com; s=arcselector9901; h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-AntiSpam-MessageData-ChunkCount:X-MS-Exchange-AntiSpam-MessageData-0:X-MS-Exchange-AntiSpam-MessageData-1; bh=WQ1zDywWGa05K7HuAvJ3SjKXa7UKyHzPMgpc6bI4p+A=; b=LJlzCc6N+XFhLihXA8Rz06cELeTo9v1Ah2FGJgq+A4wRPzyYDAAgJKpfepYfhxBIQy/w/kXBbvyJt4Dfj+jOY/xxN3pY4gdw7D8KEAmp52HXat/wsvCjEC08atupajH/8XLLYytMe/riEKjtSPkB31VunCYelk7zd5ktzfQV8JrcLEaXZDt//LvRunmTuVjrKJlay0vJ+YSxdsxX6fLe2npdsqbb3HDoWJ9dgB6kiwu+14VW03+etXoapzVQue9VlVOJenWtaqNd5R/pV8RxyabXPVFOnSksk8z4G/WT6xDFhd8cDntddG145uM4d6QBaOHis0XvtoMucl4R76JlQw==
ARC-Authentication-Results: i=1; mx.microsoft.com 1; spf=pass smtp.mailfrom=unomaha.edu; dmarc=pass action=none header.from=unomaha.edu; dkim=pass header.d=unomaha.edu; arc=none
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=unomaha.edu; s=selector2; h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-SenderADCheck; bh=WQ1zDywWGa05K7HuAvJ3SjKXa7UKyHzPMgpc6bI4p+A=; b=TxBfiRNCgcAa4ipwG8dBM5cUu+/yVZBSnhXf6Suedz+Rm6X4XHNzkZyhxyqzieFhEHJxeQePNWtvRGmLLUUSp3/ntkWgPSmkWzr6+BuRarcCcCl8QL6mabS7k+s97S4qXhDEo8X9TyNdnNZyI1VhrcLCb4mr/188ctzohmDcz20=
Received: from BYAPR07MB5960.namprd07.prod.outlook.com (2603:10b6:a03:134::10) by DS7PR07MB8288.namprd07.prod.outlook.com (2603:10b6:5:38f::18) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id 15.20.5525.10; Fri, 26 Aug 2022 02:44:06 +0000
Received: from BYAPR07MB5960.namprd07.prod.outlook.com ([fe80::f8cb:b6bb:675b:7081]) by BYAPR07MB5960.namprd07.prod.outlook.com ([fe80::f8cb:b6bb:675b:7081%5]) with mapi id 15.20.5546.022; Fri, 26 Aug 2022 02:44:06 +0000
From: Spyridon Mastorakis <smastorakis@unomaha.edu>
To: Colin Perkins <csp@csperkins.org>
CC: Christopher Wood <caw@heapingbits.net>, "icnrg@irtf.org" <icnrg@irtf.org>
Thread-Topic: [icnrg] Review of draft-irtf-icnrg-icnping
Thread-Index: AQHYgMb6jyQ/YU2rPk2IGS9xSdbx+q1peBiAgD2NIoCAGY94gIAAVSmA
Date: Fri, 26 Aug 2022 02:44:06 +0000
Message-ID: <7D75BAF5-0D65-4BA8-A2F1-1FE4C3C28737@unomaha.edu>
References: <1812AB7B-6C51-4D4F-AF19-8DC3FC1ABA9D@heapingbits.net> <E0C479EC-7818-4453-966B-4B14A30E53D8@unomaha.edu> <48253DA5-9DCE-4542-948F-671E1C70985E@csperkins.org> <6F147DBA-A4F5-464C-9BF9-21971B8ED4D8@csperkins.org>
In-Reply-To: <6F147DBA-A4F5-464C-9BF9-21971B8ED4D8@csperkins.org>
Accept-Language: en-US
Content-Language: en-US
X-MS-Has-Attach:
X-MS-TNEF-Correlator:
x-mailer: Apple Mail (2.3696.120.41.1.1)
x-ms-publictraffictype: Email
x-ms-office365-filtering-correlation-id: 7683c168-0220-4cd2-ab12-08da870cd873
x-ms-traffictypediagnostic: DS7PR07MB8288:EE_
x-ms-exchange-senderadcheck: 1
x-ms-exchange-antispam-relay: 0
x-microsoft-antispam: BCL:0;
x-microsoft-antispam-message-info: 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
x-forefront-antispam-report: CIP:255.255.255.255; CTRY:; LANG:en; SCL:1; SRV:; IPV:NLI; SFV:NSPM; H:BYAPR07MB5960.namprd07.prod.outlook.com; PTR:; CAT:NONE; SFS:(13230016)(4636009)(396003)(366004)(376002)(346002)(39860400002)(136003)(786003)(6916009)(75432002)(83380400001)(53546011)(5660300002)(966005)(6486002)(2906002)(54906003)(8936002)(86362001)(33656002)(2616005)(41320700001)(186003)(36756003)(8676002)(4326008)(91956017)(38070700005)(122000001)(316002)(71200400001)(26005)(478600001)(6512007)(6506007)(41300700001)(64756008)(66476007)(66946007)(66446008)(166002)(66556008)(76116006)(38100700002)(45980500001); DIR:OUT; SFP:1101;
x-ms-exchange-antispam-messagedata-chunkcount: 1
x-ms-exchange-antispam-messagedata-0: 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
Content-Type: multipart/alternative; boundary="_000_7D75BAF50D654BA8A2F11FE4C3C28737unomahaedu_"
MIME-Version: 1.0
X-OriginatorOrg: unomaha.edu
X-MS-Exchange-CrossTenant-AuthAs: Internal
X-MS-Exchange-CrossTenant-AuthSource: BYAPR07MB5960.namprd07.prod.outlook.com
X-MS-Exchange-CrossTenant-Network-Message-Id: 7683c168-0220-4cd2-ab12-08da870cd873
X-MS-Exchange-CrossTenant-originalarrivaltime: 26 Aug 2022 02:44:06.6850 (UTC)
X-MS-Exchange-CrossTenant-fromentityheader: Hosted
X-MS-Exchange-CrossTenant-id: f1f4be86-d048-47e8-aa26-15b01dcdb13d
X-MS-Exchange-CrossTenant-mailboxtype: HOSTED
X-MS-Exchange-CrossTenant-userprincipalname: U1m4HGH5xpLF/3SDog71WT7T3Q17IFSTG9hJktvtZVAK8pGP7o4hmVJQwAL/Jwk2EUQ62lP012IGoXFoUfmHwA==
X-MS-Exchange-Transport-CrossTenantHeadersStamped: DS7PR07MB8288
X-Proofpoint-ORIG-GUID: FrAintqzJvnhm0XFrDKNsQYKrbAYKB2Y
X-Proofpoint-GUID: FrAintqzJvnhm0XFrDKNsQYKrbAYKB2Y
X-Proofpoint-Spam-Details: rule=outbound_notspam policy=outbound score=0 lowpriorityscore=0 mlxscore=0 impostorscore=0 mlxlogscore=999 malwarescore=0 priorityscore=1501 suspectscore=0 clxscore=1015 adultscore=0 bulkscore=0 spamscore=0 phishscore=0 classifier=spam adjust=0 reason=mlx scancount=1 engine=8.12.0-2207270000 definitions=main-2208260008
Archived-At: <https://mailarchive.ietf.org/arch/msg/icnrg/c4qhyCk17pOWhcfKm3-Ccsft0Iw>
Subject: Re: [icnrg] Review of draft-irtf-icnrg-icnping
X-BeenThere: icnrg@irtf.org
X-Mailman-Version: 2.1.39
Precedence: list
List-Id: Information-Centric Networking research group discussion list <icnrg.irtf.org>
List-Unsubscribe: <https://www.irtf.org/mailman/options/icnrg>, <mailto:icnrg-request@irtf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/icnrg/>
List-Post: <mailto:icnrg@irtf.org>
List-Help: <mailto:icnrg-request@irtf.org?subject=help>
List-Subscribe: <https://www.irtf.org/mailman/listinfo/icnrg>, <mailto:icnrg-request@irtf.org?subject=subscribe>
X-List-Received-Date: Fri, 26 Aug 2022 02:44:24 -0000

Hi Colin,

Thank you for checking in. I think I can revise the draft. Once Dave pushes out the updated version of the path steering draft, we will also update the ping draft.

Thanks,
Spyros

On Aug 25, 2022, at 4:39 PM, Colin Perkins <csp@csperkins.org<mailto:csp@csperkins.org>> wrote:

Non-NU Email

Hi,

Can I check if you have what you need to progress with the updates to this draft, or if you still need input/confirmation from Chris?

Colin




On 9 Aug 2022, at 16:19, Colin Perkins wrote:

Spyros – thank you!

Chris – could you please check if the following would address your concerns?

Thanks,
Colin


On 1 Jul 2022, at 12:22, Spyridon Mastorakis wrote:

Hi Chris,

Thank you very much for your feedback! Please see my response to each of your comments inline. If you agree with my responses, I can go ahead and update the draft.

Please let me know.

Thank you again!
Spyros

On Jun 15, 2022, at 9:48 AM, Christopher Wood <caw@heapingbits.net<mailto:caw@heapingbits.net>> wrote:

Non-NU Email

Overall, I found the document very well structured and written. It's clear a lot of work has gone into it. I mainly have questions on the semantics of the ping protocol, especially around how forwarders handle echo requests and responses. Sorry in advance if I misunderstood anything!

Section 3:

 *  Test whether a specific named object is cached in some on-path CS,
    and, if so, return the administrative name of the corresponding
    forwarder.

What would be an example of an administrative name in this case? And is this name also a valid prefix for content objects? (This is clarified almost immediately after this bullet, but it wasn't first clear when read on its own.) I assume this is the case since one might want to obtain various diagnostic information about the CS in question, so adding a use case for this information might be helpful.

An example of a content object name in a CS could be something like "/funny-video/_seq=1” (i.e., a segment of a video) and the administrative name of a forwarder that has cached this object could be something like "/my-ISP/forwarder1”.


Section 3:

 *  Perform some simple network performance measurements.

What sort of measurements? As outlined earlier in this section, the path an interest and content object might take can vary widely, so it's not immediately clear what sort of measurements would be useful for a client to obtain. Elaborating on that here might be helpful.

Such measurements could include RTT and loss rate.


Section 3:

 In order to provide stable and reliable diagnostics, it is desirable
 that the packet encoding of a ping echo request enable the forwarders
 to distinguish a ping from a normal Interest, while also allowing for
 forwarding behavior to be as similar as possible to that of an
 Interest packet.

I'm not sure this has been justified. It would be possible for the ping encoding to match that of a "normal" interest, right? If the purpose of distinguishing is to allow forwarders to alter forwarding behavior, e.g., by not aggregating PIT entries, then couldn't clients force this by appending random name components to their ping interests (or something)? Note that I don't disagree with the outcome -- I just don't know if "desirable" is the right word here.


It is desirable in the sense that a ping echo request may need to be handled in a different way than regular Interests, not only in terms of not aggregating PIT entries. For example, if a forwarder has cached the content object that is “pinged” by a client, then the forwarder will need to generate an echo reply for this echo request and send it back to the client.

Section 3:

 It is also important, in the case of ping echo requests for the same
 name from different sources to have a mechanism to avoid those
 requests being aggregated in the PIT.  To this end, we need some
 encoding in the ping echo requests to make each request for a common
 name unique, hence avoiding PIT aggregation and further enabling the
 exact match of a response with a particular ping packet.

This seems like it would enable PIT DoS attacks, which is probably something that warrants discussion in the security considerations.


I agree. Happy to add some discussion in the security considerations section.

Section 3:

 Note that ICN ping is a protocol that estimates the perceived RTT
 based on a single request-reply exchange. A measurement application
 is needed to make proper use of this protocol to explore multiple
 paths and compute various statistics, such as the variance, average,
 maximum and minimum RTT values as well as loss rates.

This probably belongs in the introduction as one of the main features of the protocol, especially since this protocol is just a building block for higher-level measurement and diagnostic tools.


Sure. Happy to add that to the introduction as well.

Section 4.1:

 The name consists of the
 prefix that we would like to ping appended with a nonce typed name
 component as its last component.

Presumably this is a randomly generated nonce, so it would be useful to say that. It also doesn't appear to have any encoding requirements (base64 string? hex string? something else?), which seems appropriate given its purpose, but that might also be good to note.

I agree with you. A base64 string should work for this purpose. Happy to add appropriate clarifications.


Section 4.1:

 As described below, the nonce is ignored for CS checking.

This seems somewhat confusing, since the echo responise has a TTL of 0, effectively invalidating the CS. I concluded that the nonce is used for CS checking, but nothing will ever match because the TTL of any response is 0. Is that not correct?


Echo replies have a TTL value of 0. However, if a content object that has already been cached in the CS of a forwarder is “pinged”, then this object could have any TTL value and that’s the case where we could have a CS hit (essentially determining that the “pinged” object is in the CS of a forwarder). In other words:

- We do not want to retrieve cached echo replies (e.g., when we send multiple ping requests in the same way as IP ping works today).
- We would like to be able to determine if a “pinged” content object is cached by a forwarder. The content object may have any TTL value.

Section 6:

 *  The echo request's base name exactly matches the name of a
    content-object residing in the forwarder's CS (unless the ping
    client application has chosen not to receive replies due to CS
    hits as specified in Appendix A).

I thought this could not happen since echo content objects have a TTL of 0. I'm probably misunderstanding something, so clarification here would be helpful to me.

This refers again to the case of “pinging” a specific content object as I mentioned in my response above. In this case, we would like to determine if a specific content object has been cached by a forwarder. If that’s the case, the forwarder would create an echo reply and include its administrative prefix in it. The reply will be sent back to the client. This reply will have a TTL value of 0.

Section 8:

This section has some good material, but I think it's probably worth noting the implications of being able to probe the network. Examples of malicious behavior might be, for example, abusing the privileged forwarding behavior for echo requests to attack a specific forwarder. (Being able to traverse different paths using path labels might exacerbate this problem.)

Another example might be the ICN equivalent of port knocking, where the attacker tries to discover certain forwarder implementations and for the purpose of exploiting those vulnerabilities, somehow. Basically, the ICN ping protocol provides much more verbose information to clients than the IP equivalent, and noting the delta between the two -- and what one can do with that delta -- seems useful for experimenters.

That sounds good. Happy to add some discussion in Section 8.


Hope this helps.

Best,
Chris
_______________________________________________
icnrg mailing list
icnrg@irtf.org<mailto:icnrg@irtf.org>
https://urldefense.com/v3/__https://www.irtf.org/mailman/listinfo/icnrg__;!!PvXuogZ4sRB2p-tU!CXdT5m5NVkbH9ski1HW5TSOyglp-LjBn_3V1IEjpv63P7smQM5XqV4XqD_FAs09mSvyy_1DiGAOrIfpHqTw$

_______________________________________________
icnrg mailing list
icnrg@irtf.org<mailto:icnrg@irtf.org>
https://urldefense.com/v3/__https://www.irtf.org/mailman/listinfo/icnrg__;!!PvXuogZ4sRB2p-tU!C1DxOlSHA6-T8akDLXgVttVQHKN1P4e1Fb7DzaFILUTkdIXiImSxY6l6FM1xzqNu-pz9PVp0pQdf7z8WEw$

_______________________________________________
icnrg mailing list
icnrg@irtf.org<mailto:icnrg@irtf.org>
https://urldefense.com/v3/__https://www.irtf.org/mailman/listinfo/icnrg__;!!PvXuogZ4sRB2p-tU!C1DxOlSHA6-T8akDLXgVttVQHKN1P4e1Fb7DzaFILUTkdIXiImSxY6l6FM1xzqNu-pz9PVp0pQdf7z8WEw$