Re: [nwcrg] IRSG review of draft-irtf-nwcrg-bats-03

Vincent Roca <vincent.roca@inria.fr> Tue, 06 December 2022 21:30 UTC

Return-Path: <vincent.roca@inria.fr>
X-Original-To: nwcrg@ietfa.amsl.com
Delivered-To: nwcrg@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id EDDC1C14F744; Tue, 6 Dec 2022 13:30:25 -0800 (PST)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -2.796
X-Spam-Level:
X-Spam-Status: No, score=-2.796 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, DKIM_SIGNED=0.1, DKIM_VALID=-0.1, DKIM_VALID_AU=-0.1, DKIM_VALID_EF=-0.1, HTML_MESSAGE=0.001, RCVD_IN_DNSWL_LOW=-0.7, RCVD_IN_MSPIKE_H2=-0.001, RCVD_IN_ZEN_BLOCKED_OPENDNS=0.001, SPF_HELO_NONE=0.001, SPF_PASS=-0.001, URIBL_BLOCKED=0.001, URIBL_DBL_BLOCKED_OPENDNS=0.001, URIBL_ZEN_BLOCKED_OPENDNS=0.001] autolearn=ham autolearn_force=no
Authentication-Results: ietfa.amsl.com (amavisd-new); dkim=pass (1024-bit key) header.d=inria.fr
Received: from mail.ietf.org ([50.223.129.194]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id O5FLdv6Bx23g; Tue, 6 Dec 2022 13:30:20 -0800 (PST)
Received: from mail2-relais-roc.national.inria.fr (mail2-relais-roc.national.inria.fr [192.134.164.83]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id 9319AC1522AC; Tue, 6 Dec 2022 13:30:19 -0800 (PST)
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=inria.fr; s=dc; h=from:message-id:mime-version:subject:date:in-reply-to:cc: to:references; bh=bmu7dmUmCe4gIPEN4eYwASGoG/fJd7Y3B9J1+R8APnI=; b=AvR1UPLE0o/LBuhIGb+s/1ChTb+2j3KrVo7/Ar//pxxZynhLWzrJNfgE nLJc4AF5sJz7nHimQ46lO254DEkNuDLKj34ZG0vDx4yONcYmIGSY9b/CN Y7PFkRWYahyB23vvdUyvp45gyOvtMMZ1D0PJXoFBEYSqBm+5mTGRJtcfb c=;
Authentication-Results: mail2-relais-roc.national.inria.fr; dkim=none (message not signed) header.i=none; spf=SoftFail smtp.mailfrom=vincent.roca@inria.fr; dmarc=fail (p=none dis=none) d=inria.fr
X-IronPort-AV: E=Sophos; i="5.96,223,1665439200"; d="scan'208,217"; a="82073800"
Received: from 91-173-89-86.subs.proxad.net (HELO smtpclient.apple) ([91.173.89.86]) by mail2-relais-roc.national.inria.fr with ESMTP/TLS/ECDHE-RSA-AES256-GCM-SHA384; 06 Dec 2022 22:30:18 +0100
From: Vincent Roca <vincent.roca@inria.fr>
Message-Id: <0C5D8CC6-3612-4522-BEDC-911D79BBF6E6@inria.fr>
Content-Type: multipart/alternative; boundary="Apple-Mail=_933FB78F-9807-4B0A-A70E-E7B94047EB3F"
Mime-Version: 1.0 (Mac OS X Mail 16.0 \(3696.120.41.1.1\))
Date: Tue, 06 Dec 2022 22:30:17 +0100
In-Reply-To: <56486223-16D7-4604-8527-6B9D7757DB48@csperkins.org>
Cc: Vincent Roca <vincent.roca@inria.fr>, "David R. Oran" <daveoran@orandom.net>, The IRSG <irsg@irtf.org>, Nwcrg <nwcrg@irtf.org>
To: Colin Perkins <csp@csperkins.org>, Shenghao Yang <shenghao.yang@gmail.com>
References: <AEB59B2F-5D77-49C3-8A4F-265C19DD5502@csperkins.org> <5778CB87-DF64-47E0-88A2-3C8E423C643E@orandom.net> <2550D87D-FDB5-47E1-80EF-222933DE1752@csperkins.org> <1209B42F-9115-4796-9160-716D2D4EE23A@orandom.net> <610D2FA6-CFDD-4098-8DC0-25545F6D2A12@gmail.com> <E0B5D17C-07F6-404F-B10E-09ECEABDD662@orandom.net> <AF9F9B8E-AAD3-42CF-866D-5F41B0C4E034@csperkins.org> <CAMGveSXCPdnsVBf=T8a6M957DfGgmfbHyLZCMyzSZzBBQqvA+A@mail.gmail.com> <56486223-16D7-4604-8527-6B9D7757DB48@csperkins.org>
X-Mailer: Apple Mail (2.3696.120.41.1.1)
Archived-At: <https://mailarchive.ietf.org/arch/msg/nwcrg/2APDEnQTtrFskIfMGjeB6FFRzZs>
Subject: Re: [nwcrg] IRSG review of draft-irtf-nwcrg-bats-03
X-BeenThere: nwcrg@irtf.org
X-Mailman-Version: 2.1.39
Precedence: list
List-Id: IRTF Network Coding Research Group discussion list <nwcrg.irtf.org>
List-Unsubscribe: <https://www.irtf.org/mailman/options/nwcrg>, <mailto:nwcrg-request@irtf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/nwcrg/>
List-Post: <mailto:nwcrg@irtf.org>
List-Help: <mailto:nwcrg-request@irtf.org?subject=help>
List-Subscribe: <https://www.irtf.org/mailman/listinfo/nwcrg>, <mailto:nwcrg-request@irtf.org?subject=subscribe>
X-List-Received-Date: Tue, 06 Dec 2022 21:30:26 -0000

Dear Authors, Colin,

Yes, I’m happy with this new version.
Thank you for this quick update.

Regards,   Vincent


> Le 6 déc. 2022 à 19:32, Colin Perkins <csp@csperkins.org> a écrit :
> 
> Dear Shenghao,
> 
> Thank you - once Vincent confirms this addresses his comment, I’ll move this forward.
> 
> Colin
> 
> 
> 
> On 6 Dec 2022, at 16:24, Shenghao Yang wrote:
> 
> Dear Colin, David and Vincent,
> 
> Thank you for your quick comments. An update is submitted. https://datatracker.ietf.org/doc/draft-irtf-nwcrg-bats/06/ <https://datatracker.ietf.org/doc/draft-irtf-nwcrg-bats/06/>
> 
> We are happy to cite RFC 9265, which is very relevant.
> 
> 2^(d-M)T>=2^T is changed to 2^(-(d-M)T)<=2^(-T)
> 
> 
> Shenghao
> 
> 
> On Tue, Dec 6, 2022 at 4:01 AM Colin Perkins <csp@csperkins.org <mailto:csp@csperkins.org>> wrote:
> Thank you to Shenghao and the authors for the update, and to Dave and Vincent for the speedy response.
> 
> It seems the changes address the major review comments, but there are a few minor issue remaining. If it’s possible to issue an update to address those, we can then move this draft forward.
> 
> Regards,
> Colin
> 
> 
> 
> 
> On 5 Dec 2022, at 16:00, David R. Oran wrote:
> 
> I looked over -04 and my comments have been addressed. Thank you! While I didn’t do a detailed re-read (looking mostly at the sections I had commented on) I did notice a few typos that should be fixed:
> 
> in 4.2, s/packets of a batche on the same path/packets of a batch on the same path/
> in 6.2, s/reduancy/redundant/
> 
> Also, I saw the good comments in an email from Vincent, which should get covered in a revision.
> 
> I’m happy for this to advance past IRSG review as soon as you can issue a further update.
> 
> Many Thanks,
> DaveO.
> 
> On 3 Dec 2022, at 12:29, Shenghao Yang wrote:
> 
> Dear David, 
> 
> We just submitted a revised version based on comments. 
> https://datatracker.ietf.org/doc/draft-irtf-nwcrg-bats/04/ <https://datatracker.ietf.org/doc/draft-irtf-nwcrg-bats/04/>
> 
> See the point-to-point response below. The security related issues took us some time to revise. 
> 
> 
> Best, 
> 
> Shenghao
> 
>> On Jun 22, 2022, at 21:43, David R. Oran <daveoran@orandom.net <mailto:daveoran@orandom.net>> wrote:
>> 
>> I reviewed draft-irtf-nwcrg-bats-03 as designated reviewer for the IRSG. The document is in very good shape and the technical content sound. I have just a few minor comments and some grammar/typographic nits for the authors to consider prior to publication.
>> 
>> Minor Comments
>> 
>> In the introduction (paragraph 2), you should mention more than just interference as something that makes a wireless channel unreliable. There’s also fading, multipath, etc.
>> 
>> 
> We mentioned fading and multiparty in the revision.
>> 
>> Discussion of multipath doesn’t show up until quite far along in the document, and in a few places the wording seems to restrict operation to a single receiver. There is in fact good discussion of multicast in the research questions section, so I suggest just a brief mention in the introduction that BATs is intended to work well in both unicast and multicast environments, possibly with a forward reference to the later discussion.
>> 
>> 
> Multicast is mentioned in the introduction with referring to Sec 4. 
>> On p7, the way the requirements on coded packets are laid out is bit difficult to follow. I suggest starting each set with something like a description list, with who the requirement applies to as the lead-in, for example:
>> Encoder - the encoder DDP must deliver each coded packet with for following:
>> 
>> BID: batch ID
>> Recoder - The DDP MUST deliver the following information to each recorder:
>> 
>> M: batch size
>> q: recoding field size
>> Decoder - The DDP MUST deliver the following information to each decoder:
>> 
>> M: batch size
>> q: recoding field size
>> K: the number of source packets
>> T: the number of Octets in a source packet
>> DD: the degree of distribution
> The presentation style of this part is revised. 
>> p9, beginning of section 2.2.4 says “A destination node needs the data transmitted by the source node”. Well, sure, but are you trying to say something beyond the obvious here? If so, it isn’t coming through.
>> 
> This paragraph is rewritten.
>> In the various field descriptions and the equations, you use the letter “O” for “octets”. This slowed me down a bit as I had to think each time that you didn’t mean zero (“0”), despite the fact that the glyphs are in fact distinguishable in all three target renderings. It might be a pain to fix all of these, but I do think a better choice would either be “T” (which you use in the example above as a parameter for the decoder), or a two-letter variable name like “OC”.
>> 
>> 
> O is changed to CO (the first two letters of coefficient). 
>> 
>> On p12 you say “A common primitive polynomial should be specified for all the finite field multiplications over GF(256). Is this actually a MUST for the operation of the code?
>> 
> “Should” is changed to “MUST"
>> In the discussion of routing issues, on p18, you talk about the possibility of different batches being sent on different paths to achieve multipath gain. Is there a reason why batches can’t be similarly split and sent over different paths? If not, why not?
>> 
> We add the discussion about whether to transmit the packets of a batch on the same path or different paths for unicast and multicast. 
>> Section 4.3 is titled “Application-related issues”, however most (perhaps all?) of the discussion isn’t actually about applications but about usage and deployment scenarios over different kinds of network technologies and topologies. Suggest renaming this “Usage Scenario Considerations” or something similar and if there are in fact application issues (e.g. multimedia, IoT, etc.) split those out in a separate section.
>> 
> The section title is changed to “Usage Scenario Considerations”.
>> In section 6 on security considerations you address eavesdropping well, but don’t talk at all about traffic analysis. Are there interesting factors in BATs affecting the ability of traffic analysis to figure out what is happening with the application data flows, e.g. does BATs produce detectable timing or padding behavior that can be leveraged better than non-coded data, or perhaps conversely make things harder for an adversary?
>> 
> A new subsection is added to discuss traffic analysis. See 6.2.
>> The discussion of attestation in section 6.2 left me feeling a bit un-satisfied, given that the protocol doesn’t actually provide provenance (i.e. the attestation of the chain of coders/recoders does not seem explicitly bound into the data streams). Simple origin authentication (e.g. using signatures) doesn’t seem to be adequate. Am I missing something here?
>> 
> The pollution attack part is rewritten. See 6.3.
>> Nits
>> 
>> p7, s/DD[i] is the possibility/DD[i] is the probability/
>> 
>> p12, s/addition is an logical XOR/addition is a logical XOR/
>> 
>> p17, s/increasing too much end-to-end latency/increasing end-to-end latency too much/
>> 
>> p17, s/achieves the mulicast/achieves the multicast/
>> 
>> [End of review]
>> 
>> _______________________________________________
>> nwcrg mailing list
>> nwcrg@irtf.org <mailto:nwcrg@irtf.org>
>> https://www.irtf.org/mailman/listinfo/nwcrg <https://www.irtf.org/mailman/listinfo/nwcrg>
> 
> _______________________________________________
> nwcrg mailing list
> nwcrg@irtf.org <mailto:nwcrg@irtf.org>
> https://www.irtf.org/mailman/listinfo/nwcrg <https://www.irtf.org/mailman/listinfo/nwcrg>
> DaveO
> 
> _______________________________________________
> nwcrg mailing list
> nwcrg@irtf.org <mailto:nwcrg@irtf.org>
> https://www.irtf.org/mailman/listinfo/nwcrg <https://www.irtf.org/mailman/listinfo/nwcrg>