Re: [nwcrg] IRSG review of draft-irtf-nwcrg-bats-03

Colin Perkins <csp@csperkins.org> Mon, 05 December 2022 20:02 UTC

Return-Path: <csp@csperkins.org>
X-Original-To: nwcrg@ietfa.amsl.com
Delivered-To: nwcrg@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 39AE6C14F6E5; Mon, 5 Dec 2022 12:02:47 -0800 (PST)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -7.095
X-Spam-Level:
X-Spam-Status: No, score=-7.095 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, DKIM_SIGNED=0.1, DKIM_VALID=-0.1, DKIM_VALID_AU=-0.1, DKIM_VALID_EF=-0.1, HTML_MESSAGE=0.001, RCVD_IN_DNSWL_HI=-5, RCVD_IN_ZEN_BLOCKED_OPENDNS=0.001, SPF_HELO_NONE=0.001, SPF_PASS=-0.001, URIBL_BLOCKED=0.001, URIBL_DBL_BLOCKED_OPENDNS=0.001, URIBL_ZEN_BLOCKED_OPENDNS=0.001] autolearn=ham autolearn_force=no
Authentication-Results: ietfa.amsl.com (amavisd-new); dkim=pass (2048-bit key) header.d=csperkins.org
Received: from mail.ietf.org ([50.223.129.194]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id nnGY1A-9tJ1b; Mon, 5 Dec 2022 12:02:42 -0800 (PST)
Received: from mx2.mythic-beasts.com (mx2.mythic-beasts.com [IPv6:2a00:1098:0:82:1000:0:2:1]) (using TLSv1.3 with cipher TLS_AES_256_GCM_SHA384 (256/256 bits) key-exchange ECDHE (P-256) server-signature RSA-PSS (2048 bits) server-digest SHA256) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id 69BFCC1524B0; Mon, 5 Dec 2022 12:01:48 -0800 (PST)
DKIM-Signature: v=1; a=rsa-sha256; q=dns/txt; c=relaxed/relaxed; d=csperkins.org; s=mythic-beasts-k1; h=Date:Subject:To:From; bh=iF2+ehZFQAPPf7FbivyMGpIQbjJu1yk+cMuQD04iY/s=; b=nu308Nz59+HTsai7XpHIK3xSfm sGgoRp00wZmymw7IHA8Q4oMUapUWv+/zS/TlLVl08lDL8lapfMsdUgE56+p1ylSmcu5ZteFDLqVC3 cRSFdT3Q30PDGJr/ye1kKLxO+sfjqICmaqIQfT9ERYhbjjiaBxm8hEc7SikC1yJ8qSFWmMRDw2MCH BigdWXyYE1TDr5/PZenTUfvZfm9ivkq5LrXppbGbuBnryWbbRCelbOW3gsrKasz/kJ3azIVxq3lTK 8flWZFgfLEAELpB4ED1la222aqxsGLHZf+/ZQuy9b13qJxrCYoyPORk8HS1rU+cRHR29vPEJeGuES GAt4kP5A==;
Received: from [81.187.2.149] (port=42399 helo=[192.168.0.72]) by mailhub-hex-d.mythic-beasts.com with esmtpsa (TLS1.2) tls TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384 (Exim 4.94.2) (envelope-from <csp@csperkins.org>) id 1p2Hes-00GJgA-7N; Mon, 05 Dec 2022 20:01:46 +0000
From: Colin Perkins <csp@csperkins.org>
To: Shenghao Yang <shenghao.yang@gmail.com>
Cc: The IRSG <irsg@irtf.org>, "David R. Oran" <daveoran@orandom.net>, Nwcrg <nwcrg@irtf.org>
Date: Mon, 05 Dec 2022 20:01:39 +0000
X-Mailer: MailMate (1.14r5928)
Message-ID: <AF9F9B8E-AAD3-42CF-866D-5F41B0C4E034@csperkins.org>
In-Reply-To: <E0B5D17C-07F6-404F-B10E-09ECEABDD662@orandom.net>
References: <AEB59B2F-5D77-49C3-8A4F-265C19DD5502@csperkins.org> <5778CB87-DF64-47E0-88A2-3C8E423C643E@orandom.net> <2550D87D-FDB5-47E1-80EF-222933DE1752@csperkins.org> <1209B42F-9115-4796-9160-716D2D4EE23A@orandom.net> <610D2FA6-CFDD-4098-8DC0-25545F6D2A12@gmail.com> <E0B5D17C-07F6-404F-B10E-09ECEABDD662@orandom.net>
MIME-Version: 1.0
Content-Type: multipart/alternative; boundary="=_MailMate_D006DE42-DCC8-4F52-93E8-9D7F19E02C34_="
Content-Transfer-Encoding: 8bit
Embedded-HTML: [{"plain":[363, 6339], "uuid":"ECE91837-7E17-4639-BEB8-6EDEC6744959"}]
X-BlackCat-Spam-Score: 0
Archived-At: <https://mailarchive.ietf.org/arch/msg/nwcrg/O7fAm6Ju8xjf3yBAMoLZ6unESlE>
Subject: Re: [nwcrg] IRSG review of draft-irtf-nwcrg-bats-03
X-BeenThere: nwcrg@irtf.org
X-Mailman-Version: 2.1.39
Precedence: list
List-Id: IRTF Network Coding Research Group discussion list <nwcrg.irtf.org>
List-Unsubscribe: <https://www.irtf.org/mailman/options/nwcrg>, <mailto:nwcrg-request@irtf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/nwcrg/>
List-Post: <mailto:nwcrg@irtf.org>
List-Help: <mailto:nwcrg-request@irtf.org?subject=help>
List-Subscribe: <https://www.irtf.org/mailman/listinfo/nwcrg>, <mailto:nwcrg-request@irtf.org?subject=subscribe>
X-List-Received-Date: Mon, 05 Dec 2022 20:02:47 -0000

Thank you to Shenghao and the authors for the update, and to Dave and 
Vincent for the speedy response.

It seems the changes address the major review comments, but there are a 
few minor issue remaining. If it’s possible to issue an update to 
address those, we can then move this draft forward.

Regards,
Colin




On 5 Dec 2022, at 16:00, David R. Oran wrote:

> I looked over -04 and my comments have been addressed. Thank you! 
> While I didn’t do a detailed re-read (looking mostly at the sections 
> I had commented on) I did notice a few typos that should be fixed:
>
> in 4.2, s/packets of a batche on the same path/packets of a batch on 
> the same path/
> in 6.2, s/reduancy/redundant/
>
> Also, I saw the good comments in an email from Vincent, which should 
> get covered in a revision.
>
> I’m happy for this to advance past IRSG review as soon as you can 
> issue a further update.
>
> Many Thanks,
> DaveO.
>
> On 3 Dec 2022, at 12:29, Shenghao Yang wrote:
>
>> Dear David,
>>
>> We just submitted a revised version based on comments.
>> https://datatracker.ietf.org/doc/draft-irtf-nwcrg-bats/04/ 
>> <https://datatracker.ietf.org/doc/draft-irtf-nwcrg-bats/04/>
>>
>> See the point-to-point response below. The security related issues 
>> took us some time to revise.
>>
>>
>> Best,
>>
>> Shenghao
>>
>>> On Jun 22, 2022, at 21:43, David R. Oran <daveoran@orandom.net> 
>>> wrote:
>>>
>>> I reviewed draft-irtf-nwcrg-bats-03 as designated reviewer for the 
>>> IRSG. The document is in very good shape and the technical content 
>>> sound. I have just a few minor comments and some grammar/typographic 
>>> nits for the authors to consider prior to publication.
>>>
>>> Minor Comments
>>>
>>> In the introduction (paragraph 2), you should mention more than just 
>>> interference as something that makes a wireless channel unreliable. 
>>> There’s also fading, multipath, etc.
>>>
>>>
>> We mentioned fading and multiparty in the revision.
>>>
>>> Discussion of multipath doesn’t show up until quite far along in 
>>> the document, and in a few places the wording seems to restrict 
>>> operation to a single receiver. There is in fact good discussion of 
>>> multicast in the research questions section, so I suggest just a 
>>> brief mention in the introduction that BATs is intended to work well 
>>> in both unicast and multicast environments, possibly with a forward 
>>> reference to the later discussion.
>>>
>>>
>> Multicast is mentioned in the introduction with referring to Sec 4.
>>> On p7, the way the requirements on coded packets are laid out is bit 
>>> difficult to follow. I suggest starting each set with something like 
>>> a description list, with who the requirement applies to as the 
>>> lead-in, for example:
>>> Encoder - the encoder DDP must deliver each coded packet with for 
>>> following:
>>>
>>> BID: batch ID
>>> Recoder - The DDP MUST deliver the following information to each 
>>> recorder:
>>>
>>> M: batch size
>>> q: recoding field size
>>> Decoder - The DDP MUST deliver the following information to each 
>>> decoder:
>>>
>>> M: batch size
>>> q: recoding field size
>>> K: the number of source packets
>>> T: the number of Octets in a source packet
>>> DD: the degree of distribution
>> The presentation style of this part is revised.
>>> p9, beginning of section 2.2.4 says “A destination node needs the 
>>> data transmitted by the source node”. Well, sure, but are you 
>>> trying to say something beyond the obvious here? If so, it isn’t 
>>> coming through.
>>>
>> This paragraph is rewritten.
>>> In the various field descriptions and the equations, you use the 
>>> letter “O” for “octets”. This slowed me down a bit as I had 
>>> to think each time that you didn’t mean zero (“0”), despite 
>>> the fact that the glyphs are in fact distinguishable in all three 
>>> target renderings. It might be a pain to fix all of these, but I do 
>>> think a better choice would either be “T” (which you use in the 
>>> example above as a parameter for the decoder), or a two-letter 
>>> variable name like “OC”.
>>>
>>>
>> O is changed to CO (the first two letters of coefficient).
>>>
>>> On p12 you say “A common primitive polynomial should be specified 
>>> for all the finite field multiplications over GF(256). Is this 
>>> actually a MUST for the operation of the code?
>>>
>> “Should” is changed to “MUST"
>>> In the discussion of routing issues, on p18, you talk about the 
>>> possibility of different batches being sent on different paths to 
>>> achieve multipath gain. Is there a reason why batches can’t be 
>>> similarly split and sent over different paths? If not, why not?
>>>
>> We add the discussion about whether to transmit the packets of a 
>> batch on the same path or different paths for unicast and multicast.
>>> Section 4.3 is titled “Application-related issues”, however most 
>>> (perhaps all?) of the discussion isn’t actually about applications 
>>> but about usage and deployment scenarios over different kinds of 
>>> network technologies and topologies. Suggest renaming this “Usage 
>>> Scenario Considerations” or something similar and if there are in 
>>> fact application issues (e.g. multimedia, IoT, etc.) split those out 
>>> in a separate section.
>>>
>> The section title is changed to “Usage Scenario Considerations”.
>>> In section 6 on security considerations you address eavesdropping 
>>> well, but don’t talk at all about traffic analysis. Are there 
>>> interesting factors in BATs affecting the ability of traffic 
>>> analysis to figure out what is happening with the application data 
>>> flows, e.g. does BATs produce detectable timing or padding behavior 
>>> that can be leveraged better than non-coded data, or perhaps 
>>> conversely make things harder for an adversary?
>>>
>> A new subsection is added to discuss traffic analysis. See 6.2.
>>> The discussion of attestation in section 6.2 left me feeling a bit 
>>> un-satisfied, given that the protocol doesn’t actually provide 
>>> provenance (i.e. the attestation of the chain of coders/recoders 
>>> does not seem explicitly bound into the data streams). Simple origin 
>>> authentication (e.g. using signatures) doesn’t seem to be 
>>> adequate. Am I missing something here?
>>>
>> The pollution attack part is rewritten. See 6.3.
>>> Nits
>>>
>>> p7, s/DD[i] is the possibility/DD[i] is the probability/
>>>
>>> p12, s/addition is an logical XOR/addition is a logical XOR/
>>>
>>> p17, s/increasing too much end-to-end latency/increasing end-to-end 
>>> latency too much/
>>>
>>> p17, s/achieves the mulicast/achieves the multicast/
>>>
>>> [End of review]
>>>
>>> _______________________________________________
>>> nwcrg mailing list
>>> nwcrg@irtf.org
>>> https://www.irtf.org/mailman/listinfo/nwcrg
>
>> _______________________________________________
>> nwcrg mailing list
>> nwcrg@irtf.org
>> https://www.irtf.org/mailman/listinfo/nwcrg
> DaveO

> _______________________________________________
> nwcrg mailing list
> nwcrg@irtf.org
> https://www.irtf.org/mailman/listinfo/nwcrg