Re: [ipwave] Intdir early review of draft-ietf-ipwave-ipv6-over-80211ocb-34

"Pascal Thubert (pthubert)" <pthubert@cisco.com> Tue, 09 April 2019 00:04 UTC

Return-Path: <pthubert@cisco.com>
X-Original-To: its@ietfa.amsl.com
Delivered-To: its@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 04A3212037B for <its@ietfa.amsl.com>; Mon, 8 Apr 2019 17:04:47 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -14.499
X-Spam-Level:
X-Spam-Status: No, score=-14.499 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, DKIM_SIGNED=0.1, DKIM_VALID=-0.1, DKIM_VALID_AU=-0.1, HTML_MESSAGE=0.001, RCVD_IN_DNSWL_HI=-5, SPF_PASS=-0.001, URIBL_BLOCKED=0.001, USER_IN_DEF_DKIM_WL=-7.5] autolearn=ham autolearn_force=no
Authentication-Results: ietfa.amsl.com (amavisd-new); dkim=pass (1024-bit key) header.d=cisco.com header.b=B7q0okSI; dkim=pass (1024-bit key) header.d=cisco.onmicrosoft.com header.b=GT1LkOB+
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id dEW-drLVV-7c for <its@ietfa.amsl.com>; Mon, 8 Apr 2019 17:04:41 -0700 (PDT)
Received: from rcdn-iport-1.cisco.com (rcdn-iport-1.cisco.com [173.37.86.72]) (using TLSv1.2 with cipher DHE-RSA-SEED-SHA (128/128 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id 26561120297 for <its@ietf.org>; Mon, 8 Apr 2019 17:04:41 -0700 (PDT)
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/simple; d=cisco.com; i=@cisco.com; l=45117; q=dns/txt; s=iport; t=1554768281; x=1555977881; h=from:to:cc:subject:date:message-id:references: in-reply-to:mime-version; bh=blJGXovpVjH4ul2fbZ2YrW2mDCC3zlQkFAMy2gwZ2qA=; b=B7q0okSIqNhceFMnDVrMBuolV0JvcXpdXIfMA7ZM2Bpk/kXBUnJqD540 lCHhn7eLD49Qvmjjj47WThVTqpeqrWDInJTAezaYt7R5BwPcn2Q6MAjRZ 5vZPcZwNKCIcao8sSO1Em7PllxEzgxeZuw9l+0PeqgN2S7QYJZZgabzKx I=;
IronPort-PHdr: 9a23:Lb/vhh8Qdw3exf9uRHGN82YQeigqvan1NQcJ650hzqhDabmn44+8ZR7E/fs4iljPUM2b8P9Ch+fM+4HYEW0bqdfk0jgZdYBUERoMiMEYhQslVdaZCVDxIeT2Ryc7B89FElRi+iLzPA==
X-IronPort-Anti-Spam-Filtered: true
X-IronPort-Anti-Spam-Result: A0AcAAAh4Ktc/5tdJa1lGQEBAQEBAQEBAQEBAQcBAQEBAQGBUQQBAQEBAQsBgQ4vKScDaFQgBAsnCoQEg0cDhFKKVoJXiTiNYIEuFIEQA1QOAQEjCYRAAheFTiI0CQ0BAQMBAQkBAgECbRwMhUoBAQEEGgkdAQEwBwEPAgEIEQQBASEBBgMCAgIfERQJCAIEDgUbgwcBgRFMAxQBAQIMojoCihRxgS+CeQEBBYUBDQuCDAMFgTABhF6EHoJKF4FAP4ERJx+CTD6CGkcBAQOBJk8WCYJUMYImijwSEoI2hC6HYIsVgRo2CQKIAYQegXmCJYNEGoIFg06CSAWHR4Ecg1mKfYZ4gUSJPIJcAgQCBAUCDgEBBYFPOIFWcBVlAYINATOCCoEkAQKCSIUUhT9ygSiOJQGBHwEB
X-IronPort-AV: E=Sophos;i="5.60,327,1549929600"; d="scan'208,217";a="544607900"
Received: from rcdn-core-4.cisco.com ([173.37.93.155]) by rcdn-iport-1.cisco.com with ESMTP/TLS/DHE-RSA-SEED-SHA; 09 Apr 2019 00:04:38 +0000
Received: from XCH-ALN-001.cisco.com (xch-aln-001.cisco.com [173.36.7.11]) by rcdn-core-4.cisco.com (8.15.2/8.15.2) with ESMTPS id x3904c2P029438 (version=TLSv1.2 cipher=AES256-SHA bits=256 verify=FAIL); Tue, 9 Apr 2019 00:04:38 GMT
Received: from xhs-rcd-003.cisco.com (173.37.227.248) by XCH-ALN-001.cisco.com (173.36.7.11) with Microsoft SMTP Server (TLS) id 15.0.1473.3; Mon, 8 Apr 2019 19:04:37 -0500
Received: from xhs-aln-002.cisco.com (173.37.135.119) by xhs-rcd-003.cisco.com (173.37.227.248) with Microsoft SMTP Server (TLS) id 15.0.1473.3; Mon, 8 Apr 2019 19:04:36 -0500
Received: from NAM04-SN1-obe.outbound.protection.outlook.com (173.37.151.57) by xhs-aln-002.cisco.com (173.37.135.119) with Microsoft SMTP Server (TLS) id 15.0.1473.3 via Frontend Transport; Mon, 8 Apr 2019 19:04:36 -0500
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=cisco.onmicrosoft.com; s=selector1-cisco-com; h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-SenderADCheck; bh=blJGXovpVjH4ul2fbZ2YrW2mDCC3zlQkFAMy2gwZ2qA=; b=GT1LkOB+9kQyYV7xIuhzkMDqwK91Q1gy39Llpf8wlpVTVCxWfOYn0VBobV87CCEB/SQjVx1Gl3H7Ifm/XThsf7+MGX3IOox4+tveoWC/KK14iaFJR7Wxt1R7v5skhA9FfxrLSdjd1rlssLnEz7KE0I/G9cQtztgkg44IigVIuJw=
Received: from MN2PR11MB3565.namprd11.prod.outlook.com (20.178.250.159) by MN2PR11MB3808.namprd11.prod.outlook.com (20.178.254.27) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id 15.20.1771.21; Tue, 9 Apr 2019 00:04:35 +0000
Received: from MN2PR11MB3565.namprd11.prod.outlook.com ([fe80::8cde:9e01:ad20:d10e]) by MN2PR11MB3565.namprd11.prod.outlook.com ([fe80::8cde:9e01:ad20:d10e%6]) with mapi id 15.20.1771.021; Tue, 9 Apr 2019 00:04:35 +0000
From: "Pascal Thubert (pthubert)" <pthubert@cisco.com>
To: CARLOS JESUS BERNARDOS CANO <cjbc@it.uc3m.es>
CC: Alexandre Petrescu <alexandre.petrescu@gmail.com>, "its@ietf.org" <its@ietf.org>, "int-ads@tools.ietf.org" <int-ads@tools.ietf.org>, "Stanley, Dorothy" <dorothy.stanley@hpe.com>
Thread-Topic: Intdir early review of draft-ietf-ipwave-ipv6-over-80211ocb-34
Thread-Index: AQHU5U4SPOcIZ52P4EC65h2BrzII1KYg13kjgAzd3iCABPt4gIAAVDZK
Date: Tue, 09 Apr 2019 00:04:35 +0000
Message-ID: <F4BC9027-35E0-4ADB-845A-15B5DD27C069@cisco.com>
References: <155169869045.5118.3508360720339540639@ietfa.amsl.com> <9d5c8168-a915-358e-d7eb-0362cad96d81@gmail.com> <27AE185B-1D95-4DCD-8C76-AECE90E46802@cisco.com> <MN2PR11MB35651C4D8957516CF034BFADD8510@MN2PR11MB3565.namprd11.prod.outlook.com>, <CALypLp9SuURGJ4f8FBzZg1WQOo9B4xsB8Y4uGW+Jtfm2b=8Sww@mail.gmail.com>
In-Reply-To: <CALypLp9SuURGJ4f8FBzZg1WQOo9B4xsB8Y4uGW+Jtfm2b=8Sww@mail.gmail.com>
Accept-Language: fr-FR, en-US
Content-Language: fr-FR
X-MS-Has-Attach:
X-MS-TNEF-Correlator:
authentication-results: spf=none (sender IP is ) smtp.mailfrom=pthubert@cisco.com;
x-originating-ip: [101.230.0.195]
x-ms-publictraffictype: Email
x-ms-office365-filtering-correlation-id: ef176313-0ac0-4246-c2b5-08d6bc7ef360
x-microsoft-antispam: BCL:0; PCL:0; RULEID:(2390118)(7020095)(4652040)(8989299)(5600139)(711020)(4605104)(4534185)(4627221)(201703031133081)(201702281549075)(8990200)(2017052603328)(7193020); SRVR:MN2PR11MB3808;
x-ms-traffictypediagnostic: MN2PR11MB3808:
x-ms-exchange-purlcount: 3
x-microsoft-antispam-prvs: <MN2PR11MB3808FBE911832475C4C900D5D82D0@MN2PR11MB3808.namprd11.prod.outlook.com>
x-forefront-prvs: 000227DA0C
x-forefront-antispam-report: SFV:NSPM; SFS:(10009020)(39860400002)(346002)(376002)(136003)(366004)(396003)(51914003)(199004)(189003)(105586002)(6246003)(30864003)(14454004)(6916009)(5070765005)(99286004)(83716004)(71200400001)(106356001)(71190400001)(966005)(316002)(66574012)(54906003)(6116002)(7736002)(606006)(517774005)(3846002)(478600001)(82746002)(97736004)(81156014)(6506007)(86362001)(53546011)(102836004)(8936002)(76176011)(36756003)(186003)(486006)(4326008)(26005)(93886005)(53936002)(2906002)(25786009)(8676002)(476003)(68736007)(33656002)(2616005)(5660300002)(229853002)(236005)(5024004)(6306002)(256004)(14444005)(6436002)(66066001)(446003)(6486002)(6512007)(11346002)(54896002)(81166006)(244885003); DIR:OUT; SFP:1101; SCL:1; SRVR:MN2PR11MB3808; H:MN2PR11MB3565.namprd11.prod.outlook.com; FPR:; SPF:None; LANG:en; PTR:InfoNoRecords; A:1; MX:1;
received-spf: None (protection.outlook.com: cisco.com does not designate permitted sender hosts)
x-ms-exchange-senderadcheck: 1
x-microsoft-antispam-message-info: 9ObNxMi2uRVJndmzbR/1kAbMvbwb0YycuJSMt3BGP1y2rM+l1uTon5/EqefTTCOSv4Z9PFxYzvfbp2XaFf+LJXPDA1ORfyB6bpJHF03i6pksKI3VFvdMzLpl89atzKMf4XIOAeqjo0N++F2RHR9tdXGeG3L3I7syTF5IgiV3JDjv1TwFzboOlMvfqeDqyfQ6eJ0eavR32rCkzR8oLTknhlKIcIL6v2dvcHCE1DpcBZzkULZBH87Qw5bANlsJ6EJFt6Wz9wDKog2kgC1SAF6p/tbMIOt5b/aFiD1DWtdTzhMm7pwbcYjgmVwAyPz8Of3O0kPdPeCt4FP4cXBdaRSVxtodsJSMbMsEs4POXAf1B5aWPrRyU9QLmHQ57q4qeF9cSC6z1yndC+po8/5+wmkCmOXhvWtQWXx1yUTIJGZa8rk=
Content-Type: multipart/alternative; boundary="_000_F4BC902735E04ADB845A15B5DD27C069ciscocom_"
MIME-Version: 1.0
X-MS-Exchange-CrossTenant-Network-Message-Id: ef176313-0ac0-4246-c2b5-08d6bc7ef360
X-MS-Exchange-CrossTenant-originalarrivaltime: 09 Apr 2019 00:04:35.3849 (UTC)
X-MS-Exchange-CrossTenant-fromentityheader: Hosted
X-MS-Exchange-CrossTenant-id: 5ae1af62-9505-4097-a69a-c1553ef7840e
X-MS-Exchange-CrossTenant-mailboxtype: HOSTED
X-MS-Exchange-Transport-CrossTenantHeadersStamped: MN2PR11MB3808
X-OriginatorOrg: cisco.com
X-Outbound-SMTP-Client: 173.36.7.11, xch-aln-001.cisco.com
X-Outbound-Node: rcdn-core-4.cisco.com
Archived-At: <https://mailarchive.ietf.org/arch/msg/its/NKn5FOg71C-qdFMQnQ2hAA9UfEI>
Subject: Re: [ipwave] Intdir early review of draft-ietf-ipwave-ipv6-over-80211ocb-34
X-BeenThere: its@ietf.org
X-Mailman-Version: 2.1.29
Precedence: list
List-Id: IPWAVE - IP Wireless Access in Vehicular Environments WG at IETF <its.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/its>, <mailto:its-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/its/>
List-Post: <mailto:its@ietf.org>
List-Help: <mailto:its-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/its>, <mailto:its-request@ietf.org?subject=subscribe>
X-List-Received-Date: Tue, 09 Apr 2019 00:04:54 -0000

Hello Carlos

I think we’re a bit stuck.

 I spent really a long time explaining why RFC 4861 does not cut it by itself. No magic will make that happen. I tried to help by indicating a version of ND that was designed for radios and to my best knowledge will work here. I understand that people will not trust that on “face value” but I do not understand that people prefer something that was designed before the concept of a radio link was even considered and is known not to work.

In any fashion I cannot support a doc that lets the outside of the IETF believe that RFC 4861 is suited for OCB. RFC 4861 survives on BSS thanks to the association process that provides a signal for DNA and emulates an Ethernet broadcast domain. Nothing like that on OCB.

Best can do is send the doc back to the WG till it can provide a satisfactory solution to ND.

Regards,

Pascal

Le 9 avr. 2019 à 03:04, CARLOS JESUS BERNARDOS CANO <cjbc@it.uc3m.es<mailto:cjbc@it.uc3m.es>> a écrit :

Hi Pascal, all,

Sorry to jump late into this discussion.

Thanks for the provided text.

I think it contains good parts that I'd recommend authors to consider incorporating into the draft. I see you are already discussing about that and I hope the WG reaches an agreement on how to modify current text.

I have some comments from my side:

- I tend to agree with Alex in that I'd skip the RECOMMENDED part of the text (referring to RFC 8505). I agree that some pieces of RFC 8505 could be adapted to be used in OCB, but I think using RECOMMENDED with further analysis within the WG is too much. I'd rather prefer that RFC 8505 is referenced in the draft as a solution that could be used as starting point to enhance ND over OCB (but we have agreed already in the WG that ND enhacements are outside the scope of current draft).

- I see good points in Pascal's text, but probably need some language fixing, as it might lead to some questions as the Alex has pointed out.

- I'd appreciate if we all acknowledge here all the work Alex (and the rest of the authors) have been doing so far, as well as Pascal's help. Please, try to keep the discussion positive. That _always_ helps.

Thanks,

Carlos

On Fri, Apr 5, 2019 at 5:09 PM Pascal Thubert (pthubert) <pthubert@cisco.com<mailto:pthubert@cisco.com>> wrote:
Dear all;

As promised I put together some words on using IPv6 ND and then RFC 8505 for OCB. Please find attached early text. This could become a section 4.7.
Note that RFC 8505 enables a DAD operation for both link local and global addresses, the associated global prefix being owned by either a car or a RSU. RSUs connected to the internet can advertise a default router preference to indicate they are willing to relay packets for global addresses.
The attached text impacts other sections in particular the discussion on global addresses which is somehow avoided in the current draft and could be reintroduced.

Comments welcome : )

Pascal

From: Pascal Thubert (pthubert)
Sent: jeudi 28 mars 2019 11:29
To: Alexandre Petrescu <alexandre.petrescu@gmail.com<mailto:alexandre.petrescu@gmail.com>>
Cc: its@ietf.org<mailto:its@ietf.org>
Subject: Re: Intdir early review of draft-ietf-ipwave-ipv6-over-80211ocb-34

Yes Alex. Also as an offer to help...

Regards,

Pascal

Le 28 mars 2019 à 11:08, Alexandre Petrescu <alexandre.petrescu@gmail.com<mailto:alexandre.petrescu@gmail.com>> a écrit :

Pascal,

Should we treat these two reviews (iotdir and intdir reviews) as just one?

The contents appear to me to be the same.

Alex
Le 04/03/2019 à 12:24, Pascal Thubert a écrit :

Reviewer: Pascal Thubert

Review result: Not Ready



Reviewer: Pascal Thubert

Review result: Not ready. Need to clarify IEEE relationship, IOW which SDO

defines the use of L2 fields, what this spec enforces vs. recognizes as being

used that way based on IEEE work. The use of IPv6 ND requires a lot more

thoughts, recommendation to use 6LoWPAN ND. The definition of a subnet is

unclear. It seems that RSUs would have prefixes but that is not discussed.



I am an assigned INT and IOT directorates reviewer for <

draft-ietf-ipwave-ipv6-over-80211ocb-34 >. These comments were written

primarily for the benefit of the Internet Area Directors. Document editors and

shepherd(s) should treat these comments just like they would treat comments

from any other IETF contributors and resolve them along with any other Last

Call comments that have been received. For more details on the INT Directorate,

see https://datatracker.ietf.org/group/intdir/about/



Majors issues

-----------------



“



o  Exceptions due to different operation of IPv6 network layer on

      802.11 than on Ethernet.



“

Is this doc scoped to OCB or 802.11 in general? Is there an expectation that an

implementer of IPv6 over Wi-Fi refers to this doc? Spelled as above, it seems

that you are defining the LLC. Figure 1 shows the proposed adaptation layer as

IEEE LLC work. Who defines those fields, IETF or IEEE, or mixed? Who defines

their use? If this spec defines a new LLC header (vs. how to use an IEEE field)

 then it should be very clear, and the newly defined fields should be isolated

from IEEE fields.



"

   The IPv6 packet transmitted on 802.11-OCB MUST be immediately

   preceded by a Logical Link Control (LLC) header and an 802.11 header.



"

Is there anything new or specific to OCB vs. classical 802.11 operations?

If/when this is echoing the IEEE specs then this text should not use uppercase

but say something like: 'Per IEEE Std 802.11, the IPv6 packet transmitted on

802.11-OCB is immediately  preceded by a Logical Link Control (LLC) header and

an 802.11 header ...'



different things? Why define both?



"   An 'adaptation' layer is inserted between a MAC layer and the

   Networking layer.  This is used to transform some parameters between

   their form expected by the IP stack and the form provided by the MAC

   layer.

"

Is this different from what an AP does when it bridges Wi-Fi to Ethernet? Is

this IETF business?



"

   The Receiver and Transmitter Address fields in the 802.11 header MUST

   contain the same values as the Destination and the Source Address

   fields in the Ethernet II Header, respectively.

"

Same,  this is IEEE game isn't it?



"



Solutions for these problems SHOULD

   consider the OCB mode of operation.

"

This is not specific enough to be actionable. I suggest to remove this sentence.

It would be of interest for the people defining those solutions to understand

the specific needs of OCB vs. Wi Fi, but I do not see text about that.



"



The method of forming IIDs

   described in section 4 of [RFC2464] MAY be used during transition

   time.

"

Contradicts section 4.3 that says

"

Among these types of

   addresses only the IPv6 link-local addresses MAY be formed using an

   EUI-64 identifier.

"



"



This

   subnet MUST use at least the link-local prefix fe80::/10 and the

   interfaces MUST be assigned IPv6 addresses of type link-local.

"

If this is conforming IPv6 then the MUST is not needed.



"

   A subnet is formed by the external 802.11-OCB interfaces of vehicles

   that are in close range (not by their in-vehicle interfaces).

"

Is the definition transitive? Do we really get a subnet?

 A is close to  B who is close to C .... to Z, makes Paris one subnet! Are you

 talking about a link, rather?



"

   The Neighbor Discovery protocol (ND) [RFC4861] MUST be used over

   802.11-OCB links.

"



IPv6 ND is not suited for a non-broadcast network. How does DAD work?

Maybe you could consider RFC 6775 / RFC 8505 instead.



"

In the moment the MAC address is changed

   on an 802.11-OCB interface all the Interface Identifiers of IPv6

   addresses assigned to that interface MUST change.

"

Why is that? This is unexpected, and hopefully wrong.



Minor issues

---------------



"   OCB (outside the context of a basic service set - BSS): A mode of

   operation in which a STA is not a member of a BSS and does not

   utilize IEEE Std 802.11 authentication, association, or data

   confidentiality.



   802.11-OCB: mode specified in IEEE Std 802.11-2016 when the MIB

   attribute dot11OCBActivited is true.  Note: compliance with standards

   and regulations set in different countries when using the 5.9GHz

   frequency band is required.

"



Are these 2 different things?



"

Among these types of

 addresses only the IPv6 link-local addresses MAY be formed using an

  EUI-64 identifier.

"

This text should not be in a LL specific section since it deals with the other

addresses. Maybe rename the section to "addressing" or something?



"

   For privacy, the link-local address MAY be formed according to the

   mechanisms described in Section 5.2.

"

The MAY is not helpful. I suggest to remove the sentence that does not bring

value vs. 5.2



Could you make sections 4.3 and 4.5 contiguous?



"

If semantically

   opaque Interface Identifiers are needed, a potential method for

   generating semantically opaque Interface Identifiers with IPv6

   Stateless Address Autoconfiguration is given in [RFC7217].



   Semantically opaque Interface Identifiers, instead of meaningful

   Interface Identifiers derived from a valid and meaningful MAC address

   ([RFC2464], section 4), MAY be needed in order to avoid certain

   privacy risks.



...



   In order to avoid these risks, opaque Interface Identifiers MAY be

   formed according to rules described in [RFC7217].  These opaque

   Interface Identifiers are formed starting from identifiers different

   than the MAC addresses, and from cryptographically strong material.

   Thus, privacy sensitive information is absent from Interface IDs, and

   it is impossible to calculate the initial value from which the

   Interface ID was calculated.



"

Duplicate and mis ordered text, isn't it?



" For this reason, an attacker may realize many

   attacks on privacy.

"

Do we attack privacy? Maybe say that privacy is a real concern, and maybe move

that text to security section?



"

   The way Interface Identifiers are used MAY involve risks to privacy,

   as described in Section 5.1.

"

Also duplicate



Nits

------



"

   IP packets MUST be transmitted over 802.11-OCB media as QoS Data

   frames whose format is specified in IEEE Std 802.11.

"

Please add link to the reference



" the 802.11 hidden node"

Do not use 802.11 standalone (multiple occurrences).

=> "the IEEE Std. 802.11 [ ref ] hidden node", or just "the hidden terminal".



BCP 14 text:



Suggest to use this text:

“

   The key words "MUST", "MUST NOT", "REQUIRED", "SHALL", "SHALL NOT",

   "SHOULD", "SHOULD NOT", "RECOMMENDED", "NOT RECOMMENDED", "MAY", and

   "OPTIONAL" in this document are to be interpreted as described in

   https://tools.ietf.org/html/bcp14 https://tools.ietf.org/html/bcp14

   [https://tools.ietf.org/html/rfc2119][RFC8174] when, and only when, they

   appear in all capitals, as shown here.



“



All the best



Pascal