Re: [manet] Problems not reports (was Re: AODVv2 implementation)

Christopher Dearlove <christopher.dearlove@gmail.com> Sun, 28 January 2024 23:56 UTC

Return-Path: <christopher.dearlove@gmail.com>
X-Original-To: manet@ietfa.amsl.com
Delivered-To: manet@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id DACC1C14F602 for <manet@ietfa.amsl.com>; Sun, 28 Jan 2024 15:56:57 -0800 (PST)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -7.104
X-Spam-Level:
X-Spam-Status: No, score=-7.104 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, DKIM_SIGNED=0.1, DKIM_VALID=-0.1, DKIM_VALID_AU=-0.1, DKIM_VALID_EF=-0.1, FREEMAIL_FROM=0.001, HTML_MESSAGE=0.001, RCVD_IN_DNSWL_HI=-5, RCVD_IN_ZEN_BLOCKED_OPENDNS=0.001, SPF_HELO_NONE=0.001, SPF_PASS=-0.001, T_SCC_BODY_TEXT_LINE=-0.01, URIBL_BLOCKED=0.001, URIBL_DBL_BLOCKED_OPENDNS=0.001, URIBL_ZEN_BLOCKED_OPENDNS=0.001] autolearn=ham autolearn_force=no
Authentication-Results: ietfa.amsl.com (amavisd-new); dkim=pass (2048-bit key) header.d=gmail.com
Received: from mail.ietf.org ([50.223.129.194]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id aB8EenNHD_C2 for <manet@ietfa.amsl.com>; Sun, 28 Jan 2024 15:56:53 -0800 (PST)
Received: from mail-lf1-x130.google.com (mail-lf1-x130.google.com [IPv6:2a00:1450:4864:20::130]) (using TLSv1.3 with cipher TLS_AES_128_GCM_SHA256 (128/128 bits) key-exchange X25519 server-signature RSA-PSS (2048 bits) server-digest SHA256) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id 42CB7C14F5FF for <manet@ietf.org>; Sun, 28 Jan 2024 15:56:53 -0800 (PST)
Received: by mail-lf1-x130.google.com with SMTP id 2adb3069b0e04-50eabbc3dccso2481551e87.2 for <manet@ietf.org>; Sun, 28 Jan 2024 15:56:53 -0800 (PST)
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=gmail.com; s=20230601; t=1706486211; x=1707091011; darn=ietf.org; h=references:to:cc:in-reply-to:date:subject:mime-version:message-id :from:from:to:cc:subject:date:message-id:reply-to; bh=2jXkIJY/Wvv5Aq0VsFsrtvJ7ejAg0tFfHQwfqptIo00=; b=R8kJsH0AHaECDZQPErhXw/cXhJcjBnqAnvIyyAuvF72R4BwbjH3uPX2nlvT4IGCwAX pwLOq0S8lFvQ0A42q4NIhZrNNSkjI2/kZI9qi8rF7iDu08cXkDrfqth4C+0GhLvMu1MS /FUaE0SDOTTvm8LSI0UTHpinmVCsOQXQQkyPb4v+G7ZxLfekUtgRvWqMyLYeLbXBemyW nIARiFbG9wNWzwNAhSQrWoXD2nt6TADWB5V4tWxHv5tB0A97n0rjpmSKfQeafPoNZ7m0 fQNib6QAQpn4KlPrEO+x3pAJcImkZ/42u5D+kFBPJrybb3wdnrxDWUFWAhRZsQhxPMeE MRcA==
X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20230601; t=1706486211; x=1707091011; h=references:to:cc:in-reply-to:date:subject:mime-version:message-id :from:x-gm-message-state:from:to:cc:subject:date:message-id:reply-to; bh=2jXkIJY/Wvv5Aq0VsFsrtvJ7ejAg0tFfHQwfqptIo00=; b=Gun5oXyErTzrQIlRsoLvJPt1oqHvU9zR18pQpGVA2Xnx0m3/7BawRv/T9Zpx5Zs0cf 4nAe1i3we/aEtexFxwLlZCoQYd0IchipnloXhJ9xaMIjKzeYspzT+KikxU9b5QbZacEq zQju1O+xE27ni9wrOdCdc811ATkQZ6aguRgZ85vrHdg/33nXd9WpUBTyMT24VwyN/K3J HyvGETtmZrHtCBNSFK6axo9BNhZmxzKAYWYkEX57K2gl6DbIdix964uTlpmhyM+p5Md7 SmJYrC5I879aEXTa+dwuXJNzlBi7ASkwifPrDSFGkPtsxze/S3mdTzyywJzzT4v4mbOZ 3GIA==
X-Gm-Message-State: AOJu0Yzz/vBFWIEfG9zDggZ8le1zm4owyiDVlQYJCF8PkGWNYKU3xFZX CR9KnIODGv46pH2iY19rIgglKVC4ZAZ043BSwPf7cEyPFwyYAzXP
X-Google-Smtp-Source: AGHT+IEVm1xUdltWxusNxQaZoV97Kwa2pJuNTcR2FokPJs/aKQq4qSS++I9QQvl8/dEEcTH6Wc6Fkg==
X-Received: by 2002:a05:6512:401c:b0:50e:7bc5:20d8 with SMTP id br28-20020a056512401c00b0050e7bc520d8mr2775554lfb.4.1706486211062; Sun, 28 Jan 2024 15:56:51 -0800 (PST)
Received: from smtpclient.apple (82-132-224-7.dab.02.net. [82.132.224.7]) by smtp.gmail.com with ESMTPSA id p2-20020a17090628c200b00a311092d2f8sm3291423ejd.169.2024.01.28.15.56.49 (version=TLS1_2 cipher=ECDHE-ECDSA-AES128-GCM-SHA256 bits=128/128); Sun, 28 Jan 2024 15:56:50 -0800 (PST)
From: Christopher Dearlove <christopher.dearlove@gmail.com>
Message-Id: <9F72CC69-3746-4574-AE4F-E79024CFAA61@gmail.com>
Content-Type: multipart/alternative; boundary="Apple-Mail=_203CAC43-CC70-4256-BD8C-E47809386991"
Mime-Version: 1.0 (Mac OS X Mail 16.0 \(3774.300.61.1.2\))
Date: Sun, 28 Jan 2024 23:56:38 +0000
In-Reply-To: <CADnDZ8_31gC5MEziOGGa0EPA+77KcRahgquwrY++FvgVRmVJuA@mail.gmail.com>
Cc: Donald Eastlake <d3e3e3@gmail.com>, "manet@ietf.org" <manet@ietf.org>, Juliusz Chroboczek <jch@irif.fr>
To: Abdussalam Baryun <abdussalambaryun@gmail.com>
References: <PH7PR14MB5368D3F677021CAFA04831F4BBB1A@PH7PR14MB5368.namprd14.prod.outlook.com> <740cf920-605d-4376-9db5-4409794bedb0@computer.org> <CAGnRvur98cmOqrB6b7Q=VsfvrBEY9goWn-zrXWM49mCj-+7zPw@mail.gmail.com> <7334e18e-d2aa-4f99-b79c-869b7ee1c836@computer.org> <87h6l9oqdk.wl-jch@irif.fr> <CAGnRvur17OvFogQnJspv=2ezuE41LQkgj5fEv5mJRGG9iYxZDw@mail.gmail.com> <CAL95ndJoFOay1Spin5vMfZV5KMHO5DkG7KhyHNo6KuAC3vm74w@mail.gmail.com> <875y1mgc9g.wl-jch@irif.fr> <CAGnRvurA7rg1R74-S4OgmFBE-3dqtgurF2=dGqYo69WMn6ynyA@mail.gmail.com> <B7D07985-DE8C-4B50-81FB-2CA00161CD4B@nrl.navy.mil> <CAF4+nEHJzC4wo4+Ht-PynovdLBsSAMLCycrf4aL0KUABndXm9Q@mail.gmail.com> <CADnDZ8_31gC5MEziOGGa0EPA+77KcRahgquwrY++FvgVRmVJuA@mail.gmail.com>
X-Mailer: Apple Mail (2.3774.300.61.1.2)
Archived-At: <https://mailarchive.ietf.org/arch/msg/manet/96UUEalUcxccNEzlXhZ832aseUI>
Subject: Re: [manet] Problems not reports (was Re: AODVv2 implementation)
X-BeenThere: manet@ietf.org
X-Mailman-Version: 2.1.39
Precedence: list
List-Id: Mobile Ad-hoc Networks <manet.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/manet>, <mailto:manet-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/manet/>
List-Post: <mailto:manet@ietf.org>
List-Help: <mailto:manet-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/manet>, <mailto:manet-request@ietf.org?subject=subscribe>
X-List-Received-Date: Sun, 28 Jan 2024 23:56:58 -0000

Technical issues with AODV (RTF 3561) have often been discussed on many occasions. They include not including tests for bidirectionalitry of links, lack of use of link metrics, and mutable messages and intermediate RREPs meaning that authentication (not in RFC3561, but it’s going to be needed)  is hard - specifically knowing what is authenticated by whom. That’s why a standard track approach would need to build on AODV, not just adopt it. And would need implementation. (And others have pointed out some other issues.)

> On 28 Jan 2024, at 22:47, Abdussalam Baryun <abdussalambaryun@gmail.com> wrote:
> 
> On Thu, Jan 25, 2024 at 8:07 AM Donald Eastlake <d3e3e3@gmail.com <mailto:d3e3e3@gmail.com>> wrote:
>> I think that further exploration of AODVv2 and any AODV implementation problems would be useful topics for the MNET WG and that we should consider adding that to the Charter.
> 
> IMHO, there are/was no problems reported by any participant within any IETF list or any IETF WG meeting regarding AODV (RFC3561) or any MANET experimental RFC. Please refer me to the problems so we can discuss them one by one on this WG list.
> 
> However, last MANET WG meeting there was input that implementing Multicast has many problems for MANET, which the input was without details. So we will need a report in this WG about what was those Multicast problems especially for our RFC6621, to help progress.
> 
> Best Regards,
> AB
>  
>> On Mon, Dec 4, 2023 at 8:42 AM Adamson, Robert B CIV USN NRL (5592) Washington DC (USA) <brian.adamson=40nrl.navy.mil@dmarc.ietf.org <mailto:40nrl.navy.mil@dmarc.ietf.org>> wrote:
>>> As Justin Dean mentioned, our nrlsmf code can act as tun/tap user-space forwarding engine (and works on Linux (including Android ... although newer Android policies have locked out use of some the the netlink APIs and I haven't tested that in a while), OSX/BSD, and even Windows with use of WinTAP (or whatever it's called).  We have done some stuff with that using our own forwarding tables or with the OS tables but not yet for AODV.  For AODV some sort of extra packet caching could be useful or do something similar with what we do with the Elastic Multicast implementation to flood until the "on demand" route is established.  Related to that the "nrlsmf" code has support for some hybrid policies that can be set related to flooding/forwarding such as token bucket limited forwarding rate until a route is established or flooding a small number (e.g, burst) of packets initially upon a new flow until a route is established.  With a little tweaking, these could be extended a little bit to support other caching strategies if desired.
>>> 
>>> Also, with the code, I have _slowly_ been refactoring code to keep the forwarding plane aspects of the the nrlsmf "engine" distinct and separate from the control plane aspects with the idea in mind to eventually have the forwarding plane code be used independently in a kernel module (or elsewhere) with the various forwarding plane features we see needed for these sorts of protocols including duplicate packet detection, control plane updates like mentioned for AODV2 below, per-flow forwarding state, etc.  It's been _slow_ since my time to work on it is quite limited these days.  Meanwhile, we do get pretty good performance with it in user space, and I know there's improvements that could be made.
>>> 
>>> If the kernel forwarding table is used, there are ways (not pretty) to update by using a pcap socket to monitor packets and do that independently of the actual forwarding.  Again, not pretty or efficient, but a work around until such features are resident in the forwarding engine.  That's one of the things I see needed, including for the Elastic Multicast protocol operation, to have the forwarding plane notify the control plane, at least periodically and/or on an event-driven basis (e.g., new flow detected).  On Linux, I think that ideally would be through a netlink interface and my thought on encapsulating a forwarding mechanism like what "nrlsmf" provides into a kernel module would include that interface.  For example, to support the "per flow" packet processing and such notifications, I created a "Flow Description" data structure that's also used as an index on a modified Patricia Trie prefix-based radix tree (with field wildcarding support) to detect, identify, and classify packet flows for such purposes.
>>> 
>>> Cheers,
>>> 
>>> Brian
>>> 
>>> On 12/4/23, 9:04 AM, "manet on behalf of Henning Rogge" <manet-bounces@ietf.org <mailto:manet-bounces@ietf.org> <mailto:manet-bounces@ietf.org <mailto:manet-bounces@ietf.org>> on behalf of hrogge@gmail.com <mailto:hrogge@gmail.com> <mailto:hrogge@gmail.com <mailto:hrogge@gmail.com>>> wrote:
>>> 
>>> 
>>> Hi,
>>> 
>>> 
>>> I was thinking about how to implement AODV2 on a TUN but hit an
>>> interesting issue when reading through the "Interaction with the
>>> Forwarding Plane" chapter of AODVv2...
>>> 
>>> 
>>> Chapter 6.4:
>>> "AODVv2 needs to update the record of when a route was last used to
>>> forward a packet".
>>> 
>>> 
>>> Does this mean AODV cannot use the kernel routing forwarding system
>>> and is expected to do everything in user space? I ask because the
>>> "routing cache" (and its statistics for each route) were removed from
>>> Linux in version 3.6.
>>> 
>>> 
>>> Henning Rogge
>>> 
>>> 
>>> _______________________________________________
>>> manet mailing list
>>> manet@ietf.org <mailto:manet@ietf.org> <mailto:manet@ietf.org <mailto:manet@ietf.org>>
>>> https://www.ietf.org/mailman/listinfo/manet <https://www.ietf.org/mailman/listinfo/manet>
>>> 
>>> 
>>> 
>>> _______________________________________________
>>> manet mailing list
>>> manet@ietf.org <mailto:manet@ietf.org>
>>> https://www.ietf.org/mailman/listinfo/manet
>> _______________________________________________
>> manet mailing list
>> manet@ietf.org <mailto:manet@ietf.org>
>> https://www.ietf.org/mailman/listinfo/manet
> _______________________________________________
> manet mailing list
> manet@ietf.org
> https://www.ietf.org/mailman/listinfo/manet