[lp-wan] Limiting fragment retries in ACK on Error (Re: I-D Action: draft-ietf-lpwan-ipv6-static-context-hc-05.txt)

"Carles Gomez Montenegro" <carlesgo@entel.upc.edu> Mon, 07 August 2017 15:09 UTC

Return-Path: <carlesgo@entel.upc.edu>
X-Original-To: lp-wan@ietfa.amsl.com
Delivered-To: lp-wan@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id C84AF129B25 for <lp-wan@ietfa.amsl.com>; Mon, 7 Aug 2017 08:09:40 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -4.2
X-Spam-Level:
X-Spam-Status: No, score=-4.2 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, RCVD_IN_DNSWL_MED=-2.3] autolearn=ham autolearn_force=no
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id w4nMA-u-_AmI for <lp-wan@ietfa.amsl.com>; Mon, 7 Aug 2017 08:09:38 -0700 (PDT)
Received: from violet.upc.es (violet.upc.es [147.83.2.51]) (using TLSv1.2 with cipher ECDHE-RSA-AES128-GCM-SHA256 (128/128 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id 4BFC6131EA2 for <lp-wan@ietf.org>; Mon, 7 Aug 2017 08:09:22 -0700 (PDT)
Received: from entelserver.upc.edu (entelserver.upc.es [147.83.39.4]) by violet.upc.es (8.14.4/8.14.4/Debian-4.1ubuntu1) with ESMTP id v77F9JvC034077; Mon, 7 Aug 2017 17:09:19 +0200
Received: from webmail.entel.upc.edu (webmail.entel.upc.edu [147.83.39.6]) by entelserver.upc.edu (Postfix) with ESMTP id B43EA1D53C1; Mon, 7 Aug 2017 17:09:18 +0200 (CEST)
Received: from 79.153.232.194 by webmail.entel.upc.edu with HTTP; Mon, 7 Aug 2017 17:09:19 +0200
Message-ID: <d4ede12a0b68e323cb40eb78299adde0.squirrel@webmail.entel.upc.edu>
In-Reply-To: <21934_1499791502_5965008D_21934_319_2_D58AC998.46382%dominique.barthel@orange.com>
References: <149892867732.532.13514525150008761783@ietfa.amsl.com> <18126_1499245891_595CAD43_18126_64_1_D58186B6.457FB%dominique.barthel@orange.com> <081c78ebcec02853bf5c92d5742b4cd1.squirrel@webmail.entel.upc.edu> <21934_1499791502_5965008D_21934_319_2_D58AC998.46382%dominique.barthel@orange.com>
Date: Mon, 07 Aug 2017 17:09:19 +0200
From: Carles Gomez Montenegro <carlesgo@entel.upc.edu>
To: "lp-wan@ietf.org" <lp-wan@ietf.org>
Cc: dominique.barthel@orange.com
User-Agent: SquirrelMail/1.4.21-1.fc14
MIME-Version: 1.0
Content-Type: text/plain; charset="iso-8859-1"
Content-Transfer-Encoding: 8bit
X-Priority: 3 (Normal)
Importance: Normal
X-Virus-Scanned: clamav-milter 0.99.2 at violet
X-Virus-Status: Clean
X-Greylist: ACL matched, not delayed by milter-greylist-4.3.9 (violet.upc.es [147.83.2.51]); Mon, 07 Aug 2017 17:09:19 +0200 (CEST)
Archived-At: <https://mailarchive.ietf.org/arch/msg/lp-wan/bvssbJlcEFrm7HYj3bSUYP9ZWmg>
Subject: [lp-wan] Limiting fragment retries in ACK on Error (Re: I-D Action: draft-ietf-lpwan-ipv6-static-context-hc-05.txt)
X-BeenThere: lp-wan@ietf.org
X-Mailman-Version: 2.1.22
Precedence: list
List-Id: "Low-Power Wide Area Networking \(LP-WAN\), also known as LPWA or Low-Rate WAN \(LR-WAN\)" <lp-wan.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/lp-wan>, <mailto:lp-wan-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/lp-wan/>
List-Post: <mailto:lp-wan@ietf.org>
List-Help: <mailto:lp-wan-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/lp-wan>, <mailto:lp-wan-request@ietf.org?subject=subscribe>
X-List-Received-Date: Mon, 07 Aug 2017 15:09:41 -0000

Dear LPWANners,

This is a heads-up on the discussion item that was remaining after
Dominique's review of SCHC fragmentation.

Our exchange on this topic was as follows:

>>> * Section 9.2: MAX_FRAG_RETRIES is described for the Window mode - ACK
>>> "always". For completeness, the same text should be repeated for the
>>> Window mode - ACK on error.
>>
>>I think your proposal is one possible approach.
>>
>>Another approach, which is the current one in the draft (and may need to
>>be discussed) is that in "ACK on error", the maximum number of
>>retransmission rounds will be controlled by the receiver by means of
>>MAX_ACKS_PER_WINDOW, while the sender will retransmit any fragments
>>reported to be lost in an ACK. Otherwise, in some situations, the
>> receiver
>>may unnecessarily send ACKs while the sender will not reply (with
>> fragment
>>retries) to those if it has reached its maximum number of retries. The
>>receiver does not necessarily know the MAX_FRAG_RETRIES value of the
>>sender.
>>
>>Thoughts?
>
> I understand how it works if every node is nice and plays by the rule.
> But I picture myself implementing the sender code and writing the "repeat
> until" loop where the exit condition is totally under the control of
> the other node.
> That makes me shiver.
> Isn't this an avenue for a DOS attack, with a node handing its energy and
> radio bandwidth over to another node?
> I'm sure implementers will want to add a local stop condition to this
> loop anyway.
> But maybe it does not belong to the protocol specification.
> What do others think?

A question we may consider is:

- Should MAX_FRAG_RETRIES be defined as well in Window mode - ACK on
error, or should the maximum number of fragment retries (in ACK on error)
be handled only at the implementation level and not defined in the SCHC
specification?

Please let us know your thoughts!

Thanks,

Carles