Re: [nwcrg] [irsg] IRSG review of draft-irtf-nwcrg-bats-03

Marie-Jose Montpetit <marie@mjmontpetit.com> Mon, 05 December 2022 16:02 UTC

Return-Path: <marie@mjmontpetit.com>
X-Original-To: nwcrg@ietfa.amsl.com
Delivered-To: nwcrg@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id C9F4DC1524BF for <nwcrg@ietfa.amsl.com>; Mon, 5 Dec 2022 08:02:19 -0800 (PST)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -6.893
X-Spam-Level:
X-Spam-Status: No, score=-6.893 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, DKIM_SIGNED=0.1, DKIM_VALID=-0.1, HTML_MESSAGE=0.001, RCVD_IN_DNSWL_HI=-5, RCVD_IN_ZEN_BLOCKED_OPENDNS=0.001, SPF_HELO_NONE=0.001, SPF_NONE=0.001, URIBL_BLOCKED=0.001, URIBL_DBL_BLOCKED_OPENDNS=0.001, URIBL_ZEN_BLOCKED_OPENDNS=0.001] autolearn=ham autolearn_force=no
Authentication-Results: ietfa.amsl.com (amavisd-new); dkim=pass (2048-bit key) header.d=mjmontpetit-com.20210112.gappssmtp.com
Received: from mail.ietf.org ([50.223.129.194]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id S7LxoCLiM78Q for <nwcrg@ietfa.amsl.com>; Mon, 5 Dec 2022 08:02:16 -0800 (PST)
Received: from mail-oo1-xc29.google.com (mail-oo1-xc29.google.com [IPv6:2607:f8b0:4864:20::c29]) (using TLSv1.3 with cipher TLS_AES_128_GCM_SHA256 (128/128 bits) key-exchange X25519 server-signature RSA-PSS (2048 bits) server-digest SHA256) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id 1009BC1524C2 for <nwcrg@irtf.org>; Mon, 5 Dec 2022 08:02:15 -0800 (PST)
Received: by mail-oo1-xc29.google.com with SMTP id j1-20020a4ad181000000b0049e6e8c13b4so1767382oor.1 for <nwcrg@irtf.org>; Mon, 05 Dec 2022 08:02:15 -0800 (PST)
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=mjmontpetit-com.20210112.gappssmtp.com; s=20210112; h=cc:to:subject:message-id:date:mime-version:references:in-reply-to :from:from:to:cc:subject:date:message-id:reply-to; bh=SPwj53C6gBlSBhRK0YEzv4s9PX+0qoLlTTUNquN+Sd8=; b=N9/kLV5fx06Iw6dibluxCNi4pb498DtDnBMGTCKDvDJ3Rt3CEXFKE5mC2w+sjhj0xr Pj6R7u7Z65wgwgvA3WS5QX9U7DLw4bBASKjTg3VOEe4op8GWONUMcsRp/bKR0xQQk/tQ PZVKhMXUpao6BN4i0+SOtOZ6gWn77fjJO03SY7Ukh4BdI4OxDmzSzOQUim/zViEv07lE ge91djNClvuDMobqrauxdGnAPpTppQc74ddUqFt5eCPFX+mUdfEdUCGsGLPG938OEMgM 88aB1UWO17EUoYlpen/QRYo4s9LXm69DsxrG/OcrLi6b+rsTpKnEwj0ajwQUb6BK7Z0q Zzgg==
X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20210112; h=cc:to:subject:message-id:date:mime-version:references:in-reply-to :from:x-gm-message-state:from:to:cc:subject:date:message-id:reply-to; bh=SPwj53C6gBlSBhRK0YEzv4s9PX+0qoLlTTUNquN+Sd8=; b=a8NrqUlJBnSHl/7fS+sO1UWdszh6MaNQ2Y20gK9GG7dWL7MNATORzwSZlYcq5w4cWf zgR/k9juSXyd1DZ3P1/1QQ72fquZ5QElmZS/MovKelsHZ1lsKN/B+UMWjuVdqIZ4/nuW zRPSLb0z3lwa5WSpcnvDWZ6SKEVgeE10NaoCy0eX6A2cJX3S/GdqyQ4kQbtyvmzh3NbH KZgPCMwUfpfELcYOhz7rQa/5VZTacb5hkgDERUHBDjty3K1gBbKy0zAVApdx1vF7OxL1 VkhSJ5/guuhIhrFMpVORtgGxOrYjcMUnOGMVRawPHsQ8UbcT39xuZOaHKAqFppDjIyP+ FBbA==
X-Gm-Message-State: ANoB5pk4ZS5OJvzMmoZ16uKoE0mwTd/URClwDf5rx+f1Bp4VrOCxGMs8 dVGqH93FFEzCi2/W+Dml6Lml0CRd2sfeFUtfjHf3pA==
X-Google-Smtp-Source: AA0mqf7WxYdGQQPFapSQ7JWsXvUKlb1qp+iHa2YnCIkdzahgeAs1B7q77HXbdS3ppaJSynXGx7uj+N7IstlRBzti16I=
X-Received: by 2002:a4a:d182:0:b0:49f:d8eb:9ec8 with SMTP id j2-20020a4ad182000000b0049fd8eb9ec8mr4221026oor.26.1670256135103; Mon, 05 Dec 2022 08:02:15 -0800 (PST)
Received: from 1058052472880 named unknown by gmailapi.google.com with HTTPREST; Mon, 5 Dec 2022 10:02:14 -0600
From: Marie-Jose Montpetit <marie@mjmontpetit.com>
In-Reply-To: <E0B5D17C-07F6-404F-B10E-09ECEABDD662@orandom.net>
References: <AEB59B2F-5D77-49C3-8A4F-265C19DD5502@csperkins.org> <5778CB87-DF64-47E0-88A2-3C8E423C643E@orandom.net> <2550D87D-FDB5-47E1-80EF-222933DE1752@csperkins.org> <1209B42F-9115-4796-9160-716D2D4EE23A@orandom.net> <610D2FA6-CFDD-4098-8DC0-25545F6D2A12@gmail.com> <E0B5D17C-07F6-404F-B10E-09ECEABDD662@orandom.net>
MIME-Version: 1.0
Date: Mon, 05 Dec 2022 10:02:14 -0600
Message-ID: <CAPjWiCRkH-2JyDY=GDSuXiGp05GJf9wgQ+H8+OhugHNnDTEicg@mail.gmail.com>
To: "David R. Oran" <daveoran@orandom.net>, Shenghao Yang <shenghao.yang@gmail.com>
Cc: The IRSG <irsg@irtf.org>, Nwcrg <nwcrg@irtf.org>
Content-Type: multipart/alternative; boundary="0000000000009e018705ef16cfe4"
Archived-At: <https://mailarchive.ietf.org/arch/msg/nwcrg/YwXFijpAbN0UH-djZmhxNFPmRfc>
Subject: Re: [nwcrg] [irsg] IRSG review of draft-irtf-nwcrg-bats-03
X-BeenThere: nwcrg@irtf.org
X-Mailman-Version: 2.1.39
Precedence: list
List-Id: IRTF Network Coding Research Group discussion list <nwcrg.irtf.org>
List-Unsubscribe: <https://www.irtf.org/mailman/options/nwcrg>, <mailto:nwcrg-request@irtf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/nwcrg/>
List-Post: <mailto:nwcrg@irtf.org>
List-Help: <mailto:nwcrg-request@irtf.org?subject=help>
List-Subscribe: <https://www.irtf.org/mailman/listinfo/nwcrg>, <mailto:nwcrg-request@irtf.org?subject=subscribe>
X-List-Received-Date: Mon, 05 Dec 2022 16:02:19 -0000

Many thanks to you :)

Marie-José Montpetit, Ph.D.
marie@mjmontpetit.com



From: David R. Oran <daveoran@orandom.net> <daveoran@orandom.net>
Reply: David R. Oran <daveoran@orandom.net> <daveoran@orandom.net>
Date: December 5, 2022 at 11:01:01 AM
To: Shenghao Yang <shenghao.yang@gmail.com> <shenghao.yang@gmail.com>
Cc: The IRSG <irsg@irtf.org> <irsg@irtf.org>, Nwcrg <nwcrg@irtf.org>
<nwcrg@irtf.org>
Subject:  Re: [irsg] [nwcrg] IRSG review of draft-irtf-nwcrg-bats-03

I looked over -04 and my comments have been addressed. Thank you! While I
didn’t do a detailed re-read (looking mostly at the sections I had
commented on) I did notice a few typos that should be fixed:

in 4.2, s/packets of a batche on the same path/packets of a batch on the
same path/
in 6.2, s/reduancy/redundant/

Also, I saw the good comments in an email from Vincent, which should get
covered in a revision.

I’m happy for this to advance past IRSG review as soon as you can issue a
further update.

Many Thanks,
DaveO.

On 3 Dec 2022, at 12:29, Shenghao Yang wrote:

Dear David,

We just submitted a revised version based on comments.
https://datatracker.ietf.org/doc/draft-irtf-nwcrg-bats/04/

See the point-to-point response below. The security related issues took us
some time to revise.


Best,

Shenghao

On Jun 22, 2022, at 21:43, David R. Oran <daveoran@orandom.net> wrote:

I reviewed draft-irtf-nwcrg-bats-03 as designated reviewer for the IRSG.
The document is in very good shape and the technical content sound. I have
just a few minor comments and some grammar/typographic nits for the authors
to consider prior to publication.
Minor Comments

   -

   In the introduction (paragraph 2), you should mention more than just
   interference as something that makes a wireless channel unreliable. There’s
   also fading, multipath, etc.


We mentioned fading and multiparty in the revision.


   -

   Discussion of multipath doesn’t show up until quite far along in the
   document, and in a few places the wording seems to restrict operation to a
   single receiver. There is in fact good discussion of multicast in the
   research questions section, so I suggest just a brief mention in the
   introduction that BATs is intended to work well in both unicast and
   multicast environments, possibly with a forward reference to the later
   discussion.


Multicast is mentioned in the introduction with referring to Sec 4.


   - On p7, the way the requirements on coded packets are laid out is bit
   difficult to follow. I suggest starting each set with something like a
   description list, with who the requirement applies to as the lead-in, for
   example:
   -

   *Encoder* - the encoder DDP must deliver each coded packet with for
   following:
   - BID: batch ID

   *Recoder* - The DDP MUST deliver the following information to each
   recorder:
   - M: batch size
      - q: recoding field size

   *Decoder* - The DDP MUST deliver the following information to each
   decoder:
   - M: batch size
      - q: recoding field size
      - K: the number of source packets
      - T: the number of Octets in a source packet
      - DD: the degree of distribution

The presentation style of this part is revised.


   -

   p9, beginning of section 2.2.4 says “A destination node needs the data
   transmitted by the source node”. Well, sure, but are you trying to say
   something beyond the obvious here? If so, it isn’t coming through.

This paragraph is rewritten.


   -

   In the various field descriptions and the equations, you use the letter
   “O” for “octets”. This slowed me down a bit as I had to think each time
   that you didn’t mean zero (“0”), despite the fact that the glyphs are in
   fact distinguishable in all three target renderings. It might be a pain to
   fix all of these, but I do think a better choice would either be “T” (which
   you use in the example above as a parameter for the decoder), or a
   two-letter variable name like “OC”.


O is changed to CO (the first two letters of coefficient).


   -

   On p12 you say “A common primitive polynomial should be specified for
   all the finite field multiplications over GF(256). Is this actually a MUST
   for the operation of the code?

“Should” is changed to “MUST"


   -

   In the discussion of routing issues, on p18, you talk about the
   possibility of different batches being sent on different paths to achieve
   multipath gain. Is there a reason why batches can’t be similarly split and
   sent over different paths? If not, why not?

We add the discussion about whether to transmit the packets of a batch on
the same path or different paths for unicast and multicast.


   -

   Section 4.3 is titled “Application-related issues”, however most
   (perhaps all?) of the discussion isn’t actually about applications but
   about usage and deployment scenarios over different kinds of network
   technologies and topologies. Suggest renaming this “Usage Scenario
   Considerations” or something similar and if there are in fact application
   issues (e.g. multimedia, IoT, etc.) split those out in a separate section.

The section title is changed to “Usage Scenario Considerations”.


   -

   In section 6 on security considerations you address eavesdropping well,
   but don’t talk at all about traffic analysis. Are there interesting factors
   in BATs affecting the ability of traffic analysis to figure out what is
   happening with the application data flows, e.g. does BATs produce
   detectable timing or padding behavior that can be leveraged better than
   non-coded data, or perhaps conversely make things harder for an adversary?

A new subsection is added to discuss traffic analysis. See 6.2.


   -

   The discussion of attestation in section 6.2 left me feeling a bit
   un-satisfied, given that the protocol doesn’t actually provide provenance
   (i.e. the attestation of the chain of coders/recoders does not seem
   explicitly bound into the data streams). Simple origin authentication (e.g.
   using signatures) doesn’t seem to be adequate. Am I missing something here?

The pollution attack part is rewritten. See 6.3.

Nits

   -

   p7, s/DD[i] is the possibility/DD[i] is the probability/
   -

   p12, s/addition is an logical XOR/addition is a logical XOR/
   -

   p17, s/increasing too much end-to-end latency/increasing end-to-end
   latency too much/
   -

   p17, s/achieves the mulicast/achieves the multicast/

[End of review]
_______________________________________________
nwcrg mailing list
nwcrg@irtf.org
https://www.irtf.org/mailman/listinfo/nwcrg


_______________________________________________
nwcrg mailing list
nwcrg@irtf.org
https://www.irtf.org/mailman/listinfo/nwcrg

DaveO