Re: [nwcrg] IRSG review of draft-irtf-nwcrg-bats-03
"David R. Oran" <daveoran@orandom.net> Mon, 05 December 2022 16:01 UTC
Return-Path: <daveoran@orandom.net>
X-Original-To: nwcrg@ietfa.amsl.com
Delivered-To: nwcrg@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 0122CC1524BF; Mon, 5 Dec 2022 08:01:00 -0800 (PST)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -6.897
X-Spam-Level:
X-Spam-Status: No, score=-6.897 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, DKIM_SIGNED=0.1, DKIM_VALID=-0.1, HTML_MESSAGE=0.001, RCVD_IN_DNSWL_HI=-5, RCVD_IN_ZEN_BLOCKED_OPENDNS=0.001, SPF_PASS=-0.001, URIBL_DBL_BLOCKED_OPENDNS=0.001, URIBL_ZEN_BLOCKED_OPENDNS=0.001] autolearn=ham autolearn_force=no
Authentication-Results: ietfa.amsl.com (amavisd-new); dkim=pass (1024-bit key) header.d=crystalorb.net header.b=Dh1Jd0yI; dkim=neutral reason="invalid (unsupported algorithm ed25519-sha256)" header.d=crystalorb.net header.b=pCV4R8wQ
Received: from mail.ietf.org ([50.223.129.194]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id YN7AtvxMbsiM; Mon, 5 Dec 2022 08:00:55 -0800 (PST)
Received: from crystalorb.net (omega.crystalorb.net [IPv6:2600:3c01:e000:42e::1]) (using TLSv1.3 with cipher TLS_AES_256_GCM_SHA384 (256/256 bits) key-exchange ECDHE (P-256) server-signature RSA-PSS (2048 bits) server-digest SHA256) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id 6047BC1524AD; Mon, 5 Dec 2022 08:00:55 -0800 (PST)
DKIM-Signature: v=1; a=rsa-sha256; q=dns/txt; c=relaxed/relaxed; d=crystalorb.net; s=mail; h=Content-Transfer-Encoding:Content-Type: MIME-Version:References:In-Reply-To:Message-ID:Date:Subject:Cc:To:From:From: Sender:Reply-To:Subject:Date:Message-ID:To:Cc:MIME-Version:Content-Type: Content-Transfer-Encoding:Content-ID:Content-Description:Resent-Date: Resent-From:Resent-Sender:Resent-To:Resent-Cc:Resent-Message-ID:In-Reply-To: References:List-Id:List-Help:List-Unsubscribe:List-Subscribe:List-Post: List-Owner:List-Archive; bh=pOV4G3Qm1sU6i5Wl4Y284jpn8FzQHMDFJZAf3NTrjdw=; b=D h1Jd0yIIg2ihTegwVSt9WUtiG4aT+YprP54q/VmVkljSh1J2FrA08nI750oK1hVM9WDnwfVfxIypz SsSwQbpPX69GYG1/k1iQ32IW24sQlHWgX2kntafN7nyqn3/xrb+af4M1XdYUKhNVk7Ajk6a6RDl3B tWKnH5GyrEYxaYUI=;
DKIM-Signature: v=1; a=ed25519-sha256; q=dns/txt; c=relaxed/relaxed; d=crystalorb.net; s=omegamail; h=Content-Transfer-Encoding:Content-Type: MIME-Version:References:In-Reply-To:Message-ID:Date:Subject:Cc:To:From:From: Sender:Reply-To:Subject:Date:Message-ID:To:Cc:MIME-Version:Content-Type: Content-Transfer-Encoding:Content-ID:Content-Description:Resent-Date: Resent-From:Resent-Sender:Resent-To:Resent-Cc:Resent-Message-ID:In-Reply-To: References:List-Id:List-Help:List-Unsubscribe:List-Subscribe:List-Post: List-Owner:List-Archive; bh=pOV4G3Qm1sU6i5Wl4Y284jpn8FzQHMDFJZAf3NTrjdw=; b=p CV4R8wQ1dqZWl9ENFtRerC/Vm9ZAK6W91SZN3Ew+4OScj+RzwysOhZ8a/k4WBbkS9bwAYYa40XM8z jb5iC6BQ==;
Received: from [2601:184:407f:80cf:7ca2:9607:6826:dd2c] (helo=[192.168.15.242]) by crystalorb.net with esmtpsa (TLS1.2) tls TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384 (Exim 4.94.2) (envelope-from <daveoran@orandom.net>) id 1p2Drx-00Gaxo-Sd; Mon, 05 Dec 2022 07:59:02 -0800
From: "David R. Oran" <daveoran@orandom.net>
To: Shenghao Yang <shenghao.yang@gmail.com>
Cc: The IRSG <irsg@irtf.org>, Nwcrg <nwcrg@irtf.org>
Date: Mon, 05 Dec 2022 11:00:52 -0500
X-Mailer: MailMate (1.14r5929)
Message-ID: <E0B5D17C-07F6-404F-B10E-09ECEABDD662@orandom.net>
In-Reply-To: <610D2FA6-CFDD-4098-8DC0-25545F6D2A12@gmail.com>
References: <AEB59B2F-5D77-49C3-8A4F-265C19DD5502@csperkins.org> <5778CB87-DF64-47E0-88A2-3C8E423C643E@orandom.net> <2550D87D-FDB5-47E1-80EF-222933DE1752@csperkins.org> <1209B42F-9115-4796-9160-716D2D4EE23A@orandom.net> <610D2FA6-CFDD-4098-8DC0-25545F6D2A12@gmail.com>
MIME-Version: 1.0
Content-Type: multipart/alternative; boundary="=_MailMate_D3D69BA7-2BA6-412F-AEE9-6A99B856DE3B_="
Content-Transfer-Encoding: 8bit
Embedded-HTML: [{"plain":[578, 5509], "uuid":"05BEBEBA-E701-4925-ABB6-486FFF2CDB13"}]
X-SA-Exim-Connect-IP: 2601:184:407f:80cf:7ca2:9607:6826:dd2c
X-SA-Exim-Mail-From: daveoran@orandom.net
X-SA-Exim-Scanned: No (on crystalorb.net); SAEximRunCond expanded to false
Archived-At: <https://mailarchive.ietf.org/arch/msg/nwcrg/jqcHbWxbFt25ddIf7Nj1dmHIOYg>
Subject: Re: [nwcrg] IRSG review of draft-irtf-nwcrg-bats-03
X-BeenThere: nwcrg@irtf.org
X-Mailman-Version: 2.1.39
Precedence: list
List-Id: IRTF Network Coding Research Group discussion list <nwcrg.irtf.org>
List-Unsubscribe: <https://www.irtf.org/mailman/options/nwcrg>, <mailto:nwcrg-request@irtf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/nwcrg/>
List-Post: <mailto:nwcrg@irtf.org>
List-Help: <mailto:nwcrg-request@irtf.org?subject=help>
List-Subscribe: <https://www.irtf.org/mailman/listinfo/nwcrg>, <mailto:nwcrg-request@irtf.org?subject=subscribe>
X-List-Received-Date: Mon, 05 Dec 2022 16:01:00 -0000
I looked over -04 and my comments have been addressed. Thank you! While I didn’t do a detailed re-read (looking mostly at the sections I had commented on) I did notice a few typos that should be fixed: in 4.2, s/packets of a batche on the same path/packets of a batch on the same path/ in 6.2, s/reduancy/redundant/ Also, I saw the good comments in an email from Vincent, which should get covered in a revision. I’m happy for this to advance past IRSG review as soon as you can issue a further update. Many Thanks, DaveO. On 3 Dec 2022, at 12:29, Shenghao Yang wrote: > Dear David, > > We just submitted a revised version based on comments. > https://datatracker.ietf.org/doc/draft-irtf-nwcrg-bats/04/ > <https://datatracker.ietf.org/doc/draft-irtf-nwcrg-bats/04/> > > See the point-to-point response below. The security related issues > took us some time to revise. > > > Best, > > Shenghao > >> On Jun 22, 2022, at 21:43, David R. Oran <daveoran@orandom.net> >> wrote: >> >> I reviewed draft-irtf-nwcrg-bats-03 as designated reviewer for the >> IRSG. The document is in very good shape and the technical content >> sound. I have just a few minor comments and some grammar/typographic >> nits for the authors to consider prior to publication. >> >> Minor Comments >> >> In the introduction (paragraph 2), you should mention more than just >> interference as something that makes a wireless channel unreliable. >> There’s also fading, multipath, etc. >> >> > We mentioned fading and multiparty in the revision. >> >> Discussion of multipath doesn’t show up until quite far along in >> the document, and in a few places the wording seems to restrict >> operation to a single receiver. There is in fact good discussion of >> multicast in the research questions section, so I suggest just a >> brief mention in the introduction that BATs is intended to work well >> in both unicast and multicast environments, possibly with a forward >> reference to the later discussion. >> >> > Multicast is mentioned in the introduction with referring to Sec 4. >> On p7, the way the requirements on coded packets are laid out is bit >> difficult to follow. I suggest starting each set with something like >> a description list, with who the requirement applies to as the >> lead-in, for example: >> Encoder - the encoder DDP must deliver each coded packet with for >> following: >> >> BID: batch ID >> Recoder - The DDP MUST deliver the following information to each >> recorder: >> >> M: batch size >> q: recoding field size >> Decoder - The DDP MUST deliver the following information to each >> decoder: >> >> M: batch size >> q: recoding field size >> K: the number of source packets >> T: the number of Octets in a source packet >> DD: the degree of distribution > The presentation style of this part is revised. >> p9, beginning of section 2.2.4 says “A destination node needs the >> data transmitted by the source node”. Well, sure, but are you >> trying to say something beyond the obvious here? If so, it isn’t >> coming through. >> > This paragraph is rewritten. >> In the various field descriptions and the equations, you use the >> letter “O” for “octets”. This slowed me down a bit as I had >> to think each time that you didn’t mean zero (“0”), despite the >> fact that the glyphs are in fact distinguishable in all three target >> renderings. It might be a pain to fix all of these, but I do think a >> better choice would either be “T” (which you use in the example >> above as a parameter for the decoder), or a two-letter variable name >> like “OC”. >> >> > O is changed to CO (the first two letters of coefficient). >> >> On p12 you say “A common primitive polynomial should be specified >> for all the finite field multiplications over GF(256). Is this >> actually a MUST for the operation of the code? >> > “Should” is changed to “MUST" >> In the discussion of routing issues, on p18, you talk about the >> possibility of different batches being sent on different paths to >> achieve multipath gain. Is there a reason why batches can’t be >> similarly split and sent over different paths? If not, why not? >> > We add the discussion about whether to transmit the packets of a batch > on the same path or different paths for unicast and multicast. >> Section 4.3 is titled “Application-related issues”, however most >> (perhaps all?) of the discussion isn’t actually about applications >> but about usage and deployment scenarios over different kinds of >> network technologies and topologies. Suggest renaming this “Usage >> Scenario Considerations” or something similar and if there are in >> fact application issues (e.g. multimedia, IoT, etc.) split those out >> in a separate section. >> > The section title is changed to “Usage Scenario Considerations”. >> In section 6 on security considerations you address eavesdropping >> well, but don’t talk at all about traffic analysis. Are there >> interesting factors in BATs affecting the ability of traffic analysis >> to figure out what is happening with the application data flows, e.g. >> does BATs produce detectable timing or padding behavior that can be >> leveraged better than non-coded data, or perhaps conversely make >> things harder for an adversary? >> > A new subsection is added to discuss traffic analysis. See 6.2. >> The discussion of attestation in section 6.2 left me feeling a bit >> un-satisfied, given that the protocol doesn’t actually provide >> provenance (i.e. the attestation of the chain of coders/recoders does >> not seem explicitly bound into the data streams). Simple origin >> authentication (e.g. using signatures) doesn’t seem to be adequate. >> Am I missing something here? >> > The pollution attack part is rewritten. See 6.3. >> Nits >> >> p7, s/DD[i] is the possibility/DD[i] is the probability/ >> >> p12, s/addition is an logical XOR/addition is a logical XOR/ >> >> p17, s/increasing too much end-to-end latency/increasing end-to-end >> latency too much/ >> >> p17, s/achieves the mulicast/achieves the multicast/ >> >> [End of review] >> >> _______________________________________________ >> nwcrg mailing list >> nwcrg@irtf.org >> https://www.irtf.org/mailman/listinfo/nwcrg > _______________________________________________ > nwcrg mailing list > nwcrg@irtf.org > https://www.irtf.org/mailman/listinfo/nwcrg DaveO
- [nwcrg] IRSG review of draft-irtf-nwcrg-bats-03 David R. Oran
- Re: [nwcrg] IRSG review of draft-irtf-nwcrg-bats-… Shenghao Yang
- Re: [nwcrg] [irsg] IRSG review of draft-irtf-nwcr… Vincent Roca
- Re: [nwcrg] IRSG review of draft-irtf-nwcrg-bats-… David R. Oran
- Re: [nwcrg] [irsg] IRSG review of draft-irtf-nwcr… Marie-Jose Montpetit
- Re: [nwcrg] IRSG review of draft-irtf-nwcrg-bats-… Colin Perkins
- Re: [nwcrg] IRSG review of draft-irtf-nwcrg-bats-… Shenghao Yang
- Re: [nwcrg] IRSG review of draft-irtf-nwcrg-bats-… Colin Perkins
- Re: [nwcrg] IRSG review of draft-irtf-nwcrg-bats-… Vincent Roca
- Re: [nwcrg] IRSG review of draft-irtf-nwcrg-bats-… Colin Perkins
- Re: [nwcrg] IRSG review of draft-irtf-nwcrg-bats-… Raymond Yeung