[ipwave] rereview of draft-ietf-ipwave-ipv6-over-80211ocb-45

"Pascal Thubert (pthubert)" <pthubert@cisco.com> Mon, 27 May 2019 11:58 UTC

Return-Path: <pthubert@cisco.com>
X-Original-To: its@ietfa.amsl.com
Delivered-To: its@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id CAC0512027D for <its@ietfa.amsl.com>; Mon, 27 May 2019 04:58:39 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -14.5
X-Spam-Level:
X-Spam-Status: No, score=-14.5 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, DKIM_SIGNED=0.1, DKIM_VALID=-0.1, DKIM_VALID_AU=-0.1, HTML_MESSAGE=0.001, RCVD_IN_DNSWL_HI=-5, SPF_PASS=-0.001, USER_IN_DEF_DKIM_WL=-7.5] autolearn=ham autolearn_force=no
Authentication-Results: ietfa.amsl.com (amavisd-new); dkim=pass (1024-bit key) header.d=cisco.com header.b=VVXqfC+F; dkim=pass (1024-bit key) header.d=cisco.onmicrosoft.com header.b=eO1LpuUi
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id MdHO5cCnmrux for <its@ietfa.amsl.com>; Mon, 27 May 2019 04:58:35 -0700 (PDT)
Received: from rcdn-iport-2.cisco.com (rcdn-iport-2.cisco.com [173.37.86.73]) (using TLSv1.2 with cipher DHE-RSA-SEED-SHA (128/128 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id 54B1A120264 for <its@ietf.org>; Mon, 27 May 2019 04:58:35 -0700 (PDT)
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/simple; d=cisco.com; i=@cisco.com; l=81727; q=dns/txt; s=iport; t=1558958315; x=1560167915; h=from:to:subject:date:message-id:mime-version; bh=2ehxy/sBX3DrzoPLctYC7pSV6WY3ADJCTuvnXEruX5o=; b=VVXqfC+F3XFKPPRm3C5x4M/Wxz+qHfTiItQj995D2wxyxJJWe+vatU+H sNIgU40tlUnF3MM+UmUfovwTs2nhMWNnWZlsFOtcDoA6ZhcbAQTKlakgP Y7nVDXBPYJ4fRn6acYMjdsKqxJuNIGyYQkhw2Le88d6HzCz8gBsYNnduq Q=;
IronPort-PHdr: 9a23:9gkRBh2XBTBdoq74smDT+zVfbzU7u7jyIg8e44YmjLQLaKm44pD+JxKGt+51ggrPWoPWo7JfhuzavrqoeFRI4I3J8RVgOIdJSwdDjMwXmwI6B8vQEVH7MfTndTASF8VZX1gj9Ha+YgBY
X-IronPort-Anti-Spam-Filtered: true
X-IronPort-Anti-Spam-Result: A0DDEgDTz+tc/5tdJa1lgheBDy8kBSUCA2lVIAQLKIdaA455kjSCcoRcgS4UgRADVAkBAQEMAQEtAgEBhEACglUjNAkOAQMBAQQBAQIBBG0cAQuFYwgTEwEBOBEBGiYBPxcPAQQbEweDAYEdTQMdAQKcPwKBOIhfgiCCeQEBBYR7GIIPCYE0iQqCSReBQD+BEAFGgU5+hEYEOgyDLoImi0SHK4gljUMJAoINiCSCWIF/hjWCH4ZmjUSMbpMOgmoCBAIEBQIOAQEFgU84gVdwFTuCbIIbF4ECAQKCSIpTcoEpjTYBAQ
X-IronPort-AV: E=Sophos;i="5.60,519,1549929600"; d="scan'208,217";a="568354170"
Received: from rcdn-core-4.cisco.com ([173.37.93.155]) by rcdn-iport-2.cisco.com with ESMTP/TLS/DHE-RSA-SEED-SHA; 27 May 2019 11:58:33 +0000
Received: from xch-rcd-011.cisco.com (xch-rcd-011.cisco.com [173.37.102.21]) by rcdn-core-4.cisco.com (8.15.2/8.15.2) with ESMTPS id x4RBwXTO032608 (version=TLSv1.2 cipher=AES256-SHA bits=256 verify=FAIL) for <its@ietf.org>; Mon, 27 May 2019 11:58:33 GMT
Received: from xhs-rtp-002.cisco.com (64.101.210.229) by XCH-RCD-011.cisco.com (173.37.102.21) with Microsoft SMTP Server (TLS) id 15.0.1473.3; Mon, 27 May 2019 06:58:32 -0500
Received: from xhs-rtp-003.cisco.com (64.101.210.230) by xhs-rtp-002.cisco.com (64.101.210.229) with Microsoft SMTP Server (TLS) id 15.0.1473.3; Mon, 27 May 2019 07:58:31 -0400
Received: from NAM04-BN3-obe.outbound.protection.outlook.com (64.101.32.56) by xhs-rtp-003.cisco.com (64.101.210.230) with Microsoft SMTP Server (TLS) id 15.0.1473.3 via Frontend Transport; Mon, 27 May 2019 07:58:31 -0400
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=cisco.onmicrosoft.com; s=selector2-cisco-onmicrosoft-com; h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-SenderADCheck; bh=u1b3MUXtoejv0LETrQOYkh0q0WLXem2fiL8ixHxRhSM=; b=eO1LpuUi4KOSPu7/YEEoiO2ZWiF7izVW5DcYXtNVgmaTLW31iE5c8lFH1QJgTMXeRUOk2mhkW8UxobcTNfIs0YZfPTsM6E5NTuKfFbpNMDZ87gKx+AX2H5sp06YdVdZ/IhIJamVRBbqgidUg4wyPteuNTMBDu713Klg0JX9bt7o=
Received: from MN2PR11MB3565.namprd11.prod.outlook.com (20.178.250.159) by MN2PR11MB3742.namprd11.prod.outlook.com (20.178.254.79) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id 15.20.1922.15; Mon, 27 May 2019 11:58:30 +0000
Received: from MN2PR11MB3565.namprd11.prod.outlook.com ([fe80::7cc2:b440:8820:f0fc]) by MN2PR11MB3565.namprd11.prod.outlook.com ([fe80::7cc2:b440:8820:f0fc%7]) with mapi id 15.20.1922.021; Mon, 27 May 2019 11:58:30 +0000
From: "Pascal Thubert (pthubert)" <pthubert@cisco.com>
To: "its@ietf.org" <its@ietf.org>
Thread-Topic: rereview of draft-ietf-ipwave-ipv6-over-80211ocb-45
Thread-Index: AdUUe0SaHTyHh4gZRL6iyK8ToobGXQ==
Date: Mon, 27 May 2019 11:58:24 +0000
Deferred-Delivery: Mon, 27 May 2019 11:57:46 +0000
Message-ID: <MN2PR11MB3565835AA0C2813F6E093278D81D0@MN2PR11MB3565.namprd11.prod.outlook.com>
Accept-Language: fr-FR, en-US
Content-Language: en-US
X-MS-Has-Attach:
X-MS-TNEF-Correlator:
authentication-results: spf=none (sender IP is ) smtp.mailfrom=pthubert@cisco.com;
x-originating-ip: [2001:420:c0c0:1001::112]
x-ms-publictraffictype: Email
x-ms-office365-filtering-correlation-id: a1e213b2-1d74-4991-8e3f-08d6e29aa2a6
x-microsoft-antispam: BCL:0; PCL:0; RULEID:(2390118)(7020095)(4652040)(8989299)(5600148)(711020)(4605104)(1401327)(4534185)(4627221)(201703031133081)(201702281549075)(8990200)(2017052603328)(7193020); SRVR:MN2PR11MB3742;
x-ms-traffictypediagnostic: MN2PR11MB3742:
x-ms-exchange-purlcount: 2
x-microsoft-antispam-prvs: <MN2PR11MB3742152372F2A00EC297EBADD81D0@MN2PR11MB3742.namprd11.prod.outlook.com>
x-ms-oob-tlc-oobclassifiers: OLM:10000;
x-forefront-prvs: 0050CEFE70
x-forefront-antispam-report: SFV:NSPM; SFS:(10009020)(136003)(39860400002)(396003)(346002)(366004)(376002)(189003)(199004)(6306002)(54896002)(53946003)(33656002)(9686003)(30864003)(66476007)(316002)(5640700003)(71200400001)(6666004)(46003)(486006)(6436002)(64756008)(68736007)(55016002)(86362001)(476003)(71190400001)(52536014)(2351001)(66446008)(66556008)(66946007)(6916009)(2501003)(81156014)(25786009)(186003)(53936002)(256004)(14444005)(73956011)(14454004)(74316002)(7696005)(8676002)(81166006)(1730700003)(7736002)(790700001)(5660300002)(6116002)(99286004)(478600001)(8936002)(76116006)(6506007)(2906002)(102836004)(569006); DIR:OUT; SFP:1101; SCL:1; SRVR:MN2PR11MB3742; H:MN2PR11MB3565.namprd11.prod.outlook.com; FPR:; SPF:None; LANG:en; PTR:InfoNoRecords; MX:1; A:1;
received-spf: None (protection.outlook.com: cisco.com does not designate permitted sender hosts)
x-ms-exchange-senderadcheck: 1
x-microsoft-antispam-message-info: mA7ZhRW2hHpXLrNLVms6u7kf9tr1n13FHX9rkDnnmJVhUHMWx8SwXHMcxIpM//olrCt/BIaS917m/Sth5AHQ/F4O9VBtO00EUxGANP5oJP7p7mFSFQXzXRARJmMPqiHUDJooMcWgvEsvOOeN35PinFR07Gsqxc3VohMSCQna28jn25MonDt0wzZD1bMRBt9DK9ib4Pkjwzz9xPvwttXadznkcWWLmPyzDFJTcbpar1bRWdZ7FfNzqMrphVsfhxJg9jq6vzlMnHm6LEc5yI++7iB3/nj9uNtzti6NCJml8pe1ATNgNova719iReaEiwvVEtwuOu89SfhPKDDVQPi4ELUsM8F463o1ZF0i1dfHojqwHZ70pZa1eNzFKHHoF1GxmJGlcFsvA/uZk/vTu2Oyw7ZHrd9FXzZheai1E+CrJvA=
Content-Type: multipart/alternative; boundary="_000_MN2PR11MB3565835AA0C2813F6E093278D81D0MN2PR11MB3565namp_"
MIME-Version: 1.0
X-MS-Exchange-CrossTenant-Network-Message-Id: a1e213b2-1d74-4991-8e3f-08d6e29aa2a6
X-MS-Exchange-CrossTenant-originalarrivaltime: 27 May 2019 11:58:29.9889 (UTC)
X-MS-Exchange-CrossTenant-fromentityheader: Hosted
X-MS-Exchange-CrossTenant-id: 5ae1af62-9505-4097-a69a-c1553ef7840e
X-MS-Exchange-CrossTenant-mailboxtype: HOSTED
X-MS-Exchange-CrossTenant-userprincipalname: pthubert@cisco.com
X-MS-Exchange-Transport-CrossTenantHeadersStamped: MN2PR11MB3742
X-OriginatorOrg: cisco.com
X-Outbound-SMTP-Client: 173.37.102.21, xch-rcd-011.cisco.com
X-Outbound-Node: rcdn-core-4.cisco.com
Archived-At: <https://mailarchive.ietf.org/arch/msg/its/Z9Syhx6aN-YuCUPUNRaXBc-E3-c>
Subject: [ipwave] rereview of draft-ietf-ipwave-ipv6-over-80211ocb-45
X-BeenThere: its@ietf.org
X-Mailman-Version: 2.1.29
Precedence: list
List-Id: IPWAVE - IP Wireless Access in Vehicular Environments WG at IETF <its.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/its>, <mailto:its-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/its/>
List-Post: <mailto:its@ietf.org>
List-Help: <mailto:its-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/its>, <mailto:its-request@ietf.org?subject=subscribe>
X-List-Received-Date: Mon, 27 May 2019 11:58:44 -0000

Dear all

In the interest of non-blocking please find a rereview based on the current draft (45)

Abstract

   In order to transmit IPv6 packets on IEEE 802.11 networks running
   outside the context of a basic service set (OCB, earlier "802.11p")
   there is a need to define a few parameters such as the supported
   Maximum Transmission Unit size on the 802.11-OCB link, the header
   format preceding the IPv6 header, the Type value within it, and
   others.  This document describes how IPv6 (including addressing and
   basic ND) can be used to communicate among nodes in range of one
   another over IEEE 802.11-OCB.  Optimizations and usage of IPv6 over
   more complex scenarios is not covered and is subject of future work.



?  This does not reflect the draft as its stands; a real world summary would be that the draft

?  "provides methods and settings, and describes limitations, for using IPv6 over OCB with minimal change to existing stacks"

?  Which is what the draft does, and that's OK with me

?  Any attempts to say that this is *the* way to do IPv6 over OCB is doomed; it would simply mean the WG is over when it just started.

1.  Introduction

<snip>

   The IPv6 network layer operates on 802.11-OCB in the same manner as
   operating on Ethernet, but there are two kinds of exceptions:

   o  Exceptions due to different operation of IPv6 network layer on
      802.11 than on Ethernet.  To satisfy these exceptions, this
      document describes an Ethernet Adaptation Layer between Ethernet
      headers and 802.11 headers.  The Ethernet Adaptation Layer is
      described Section 4.2.1.  The operation of IP on Ethernet is
      described in [RFC1042], [RFC2464] .


?  This should be out of scope and inherited from IPv6 over WiFi. If the draft does not exist then let us do one, at 6MAN.

?  The introduction should clatify the scope, which appears to be do with what existing stacks can do and (sometimes) see what's missing.

<snap>


3.  Communication Scenarios where IEEE 802.11-OCB Links are Used

   The IEEE 802.11-OCB Networks are used for vehicular communications,
   as 'Wireless Access in Vehicular Environments'.  The IP communication
   scenarios for these environments have been described in several
   documents;


?  Do not point on docs that you do not refer.

?  Pls rephrase to use the below and be done.


in particular, we refer the reader to
   [I-D.ietf-ipwave-vehicular-networking], that lists some scenarios and
   requirements for IP in Intelligent Transportation Systems.

   The link model is the following: STA --- 802.11-OCB --- STA.  In
   vehicular networks, STAs can be IP-RSUs and/or IP-OBUs.  While
   802.11-OCB is clearly specified, and the use of IPv6 over such link
   is not radically new, the operating environment (vehicular networks)
   brings in new perspectives.


?  This text fails to indicate is the link model is P2P though is seems implied. The draft does not have the means to use OCB as transit so the best is to indicate that all links are assumed to be P2P and that there can be multiple links on one radio interface.

4.  IPv6 over 802.11-OCB

4.1.  Maximum Transmission Unit (MTU)

   The default MTU for IP packets on 802.11-OCB MUST be 1500 octets.  It
   is the same value as IPv6 packets on Ethernet links, as specified in
   [RFC2464].




?  The draft already says that it inherits from Ethernet.

?  The 1500 is just one parameter in a number of parameters and behaviors.

?  Maybe just say that the default MTU is inherited from RFC2464 and is 1500.


<snip>

4.2.  Frame Format

   IP packets MUST be transmitted over 802.11-OCB media as QoS Data
   frames whose format is specified in IEEE 802.11(TM) -2016
   [IEEE-802.11-2016].

?  Useless. Why force a version (2016)? We should refer to IEEE dateless specs if we can.

?  By default it will mean current, which is OK here.

?  Better say that this spec deals with IPv6 packets transmitted over OCB, and that OCB is defined in IEEE std 802.11 spec.

   The IPv6 packet transmitted on 802.11-OCB MUST be immediately
   preceded by a Logical Link Control (LLC) header and an 802.11 header.


?  Not an IETF problem. You may indicate this informationally, saying

?  "IPv6 packet transmitted on 802.11-OCB are immediately preceded by a Logical Link Control (LLC) header and an 802.11 header."



   In the LLC header, and in accordance with the EtherType Protocol
   Discrimination (EPD, see Appendix E), the value of the Type field
   MUST be set to 0x86DD (IPv6).  In the 802.11 header, the value of the
   Subtype sub-field in the Frame Control field MUST be set to 8 (i.e.
   'QoS Data'); the value of the Traffic Identifier (TID) sub-field of
   the QoS Control field of the 802.11 header MUST be set to binary 001
   (i.e.  User Priority 'Background', QoS Access Category 'AC_BK').


?  Are we sure of that, don't we map QoS from ToS bits as usual with 11e?

   To simplify the Application Programming Interface (API) between the
   operating system and the 802.11-OCB media, device drivers MAY
   implement an Ethernet Adaptation Layer that translates Ethernet II
   frames to the 802.11 format and vice versa.  An Ethernet Adaptation
   Layer is described in Section 4.2.1.


?  Do not call that an adaptation layer. The may refers to using an Ethernet stack and then a translation from Ethernet Frames to 802.11 frames as specified by IEEE.

4.2.1.  Ethernet Adaptation Layer


?  The whole section should go. This is IEEE world.

4.3.  Link-Local Addresses

   There are several types of IPv6 addresses [RFC4291], [RFC4193], that
   MAY be assigned to an 802.11-OCB interface.  Among these types of
   addresses only the IPv6 link-local addresses MAY be formed using an
   EUI-64 identifier, in particular during transition time.

   If the IPv6 link-local address is formed using an EUI-64 identifier,
   then the mechanism of forming that address is the same mechanism as
   used to form an IPv6 link-local address on Ethernet links.  This
   mechanism is described in section 5 of [RFC2464].


?  Not really useful since it just repeats inheritance from Ethernet but appears correct

4.4.  Stateless Autoconfiguration

   There are several types of IPv6 addresses [RFC4291], [RFC4193], that
   MAY be assigned to an 802.11-OCB interface.  This section describes
   the formation of Interface Identifiers for IPv6 addresses of type
   'Global' or 'Unique Local'.  For Interface Identifiers for IPv6
   address of type 'Link-Local' see Section 4.3.


?  Not really interesting. More important is to say that autoconf is defined in RFC 4862 and that is missing.

   The Interface Identifier for an 802.11-OCB interface is formed using
   the same rules as the Interface Identifier for an Ethernet interface;


?  Again repeated inheritance. I'd remove it.

?  The rest of the section seems useful as a rephrasing of our best practices for use by WAVE people.

   <snip>



4.5.  Address Mapping


?  Again repeated inheritance. I'd remove it.

4.5.1.  Address Mapping -- Unicast

   The procedure for mapping IPv6 unicast addresses into Ethernet link-
   layer addresses is described in [RFC4861].


?  This is repeating RFC 2464 but not at its best. Better says that this draft is scoped for AR and DAD per RFC 4861.

4.5.2.  Address Mapping -- Multicast

<Snap>
                                             These issues may be
   exacerbated in OCB mode.  Solutions for these problems SHOULD
   consider the OCB mode of operation.


?  Wrong. It is the other way around. IPv6 over OCB SHOULD consider the solutions that have been brought to this problem, which is RFC 8505.

?  Since this spec does not do it I'd suggest rephrasing like
                                                                            "These issues may be
   exacerbated in OCB mode.  Future improvement to this specification
   SHOULD consider solutions for these problems."

?

4.6.  Subnet Structure

   A subnet is formed by the external 802.11-OCB interfaces of vehicles
   that are in close range (not by their in-vehicle interfaces).  A
   Prefix List conceptual data structure ([RFC4861] section 5.1) is
   maintained for each 802.11-OCB interface.


?  This is about physical properties and this is describing a link.

?  A subnet is a logical structure that we build as we like and that can be multihop if we like

?  Actually we do in a number of deployed cases

   The subnet structure on which the Neighbor Discovery protocol (ND) on
   OCB works ok is a single-link subnet; the status of ND operation on a
   subnet that covers multiple OCB links that repeat the signal at PHY
   layer, or the messages at MAC layer, is unknown.


?  Not just single link: either P2p or transit. And transit is achieved when everyone is within every one else's range. Which is a very special arrangement.

?  I'd rephrase to

?     An IPv6 subnet on which Neighbor Discovery protocol (ND) can be used

?     can be mapped on an OCB network iff all nodes share a single broadcast

?     Domain, which is generally the case for P2P OCB links;

?     the status of ND operation on a subnet that covers multiple OCB links

?     That are not fully overlapping (NBMA) is not in scope.

?


  <snip>


   The baseline Neighbor Discovery protocol (ND) [RFC4861] MUST be used
   over 802.11-OCB links.


?  MUST +> MAY. Say the scope of this doc only considers ND but neither RFC 8505 nor IPWAVE drafts.

Transmitting ND packets may prove to have
   some performance issues.  These issues may be exacerbated in OCB
   mode.  Solutions for these problems SHOULD consider the OCB mode of
   operation.  The best of current knowledge indicates the kinds of
   issues that may arise with ND in OCB mode; they are described in
   Appendix J.



?  Remove or turn it the other way around like future solutions to OCB should consider solutions for avoiding broadcast.

?  Again solutions exist, it is this spec that does not consider them.

   Protocols like Mobile IPv6 [RFC6275] and DNAv6 [RFC6059], which
   depend on timely movement detection, might need additional tuning
   work to handle the lack of link-layer notifications during handover.
   This is for further study.



?  I can agree with that but is all should be in the problem statement draft not this.



5.  Security Considerations

   <snip>

   The potential attack vectors are: MAC address spoofing, IP address
   and session hijacking, and privacy violation Section 5.1.


?  Refer to SAVI and draft 6lo ap ND

?

   Within the IPsec Security Architecture [RFC4301], the IPsec AH and
   ESP headers [RFC4302] and [RFC4303] respectively, its multicast
   extensions [RFC5374], HTTPS [RFC2818] and SeND [RFC3971] protocols
   can be used to protect communications.  Further, the assistance of
   proper Public Key Infrastructure (PKI) protocols [RFC4210] is
   necessary to establish credentials.  $



?  Remove, all well known in the art and not specific to OCB

   <snip>

5.1.  Privacy Considerations

   <snap>

5.3.  Pseudonym Handling

   <snip>


All the best,

Pascal