[Pana] draft-ohba-pana-relay-02.txt

Margaret Wasserman <margaretw42@gmail.com> Fri, 19 November 2010 17:50 UTC

Return-Path: <margaretw42@gmail.com>
X-Original-To: pana@core3.amsl.com
Delivered-To: pana@core3.amsl.com
Received: from localhost (localhost [127.0.0.1]) by core3.amsl.com (Postfix) with ESMTP id 9A0183A6860 for <pana@core3.amsl.com>; Fri, 19 Nov 2010 09:50:10 -0800 (PST)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -2.599
X-Spam-Level:
X-Spam-Status: No, score=-2.599 tagged_above=-999 required=5 tests=[BAYES_00=-2.599]
Received: from mail.ietf.org ([64.170.98.32]) by localhost (core3.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id vFET1Q6n3cvi for <pana@core3.amsl.com>; Fri, 19 Nov 2010 09:50:08 -0800 (PST)
Received: from mail-vw0-f44.google.com (mail-vw0-f44.google.com [209.85.212.44]) by core3.amsl.com (Postfix) with ESMTP id 6C2403A6892 for <pana@ietf.org>; Fri, 19 Nov 2010 09:50:07 -0800 (PST)
Received: by vws7 with SMTP id 7so161021vws.31 for <pana@ietf.org>; Fri, 19 Nov 2010 09:50:56 -0800 (PST)
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=gmail.com; s=gamma; h=domainkey-signature:received:received:message-id:from:to :content-type:content-transfer-encoding:mime-version:subject:date:cc :x-mailer; bh=FaaoP7EjHulGVMMhE7jMS8XJeRAJsPibWv4GIjd2N80=; b=q8f9mWJW0TDXPeVY13lwu41nWlUGJhdUMPcn4YBf1v3i5zxaq6QtOipGVlz7E61klv 1ImBrJPYICDBVFUFkAfLVwy8CgiyyojnZTjLjEOs4HDelvYaATA5s0su4lBFKN0YY+RW lh+4gAWY3rJLyxLjiJ3Rw5019SFewyoUqLzrk=
DomainKey-Signature: a=rsa-sha1; c=nofws; d=gmail.com; s=gamma; h=message-id:from:to:content-type:content-transfer-encoding :mime-version:subject:date:cc:x-mailer; b=TNc2CPXujExZ7RWgcsivixOp9/U4wqM6XjkYKhqJkKetjxFKA0wUXo4C++r5b3SChs I5hGYyXRBW/n/8YdtJbU+ouqQE+rh3c4YFxaHuptMhNJeUm13wNUbMdVKkZSNHJOXAHb /zDMNMXk3+UpcofiYRMxv+pO5zu6Vep4Pef2Y=
Received: by 10.220.179.7 with SMTP id bo7mr570301vcb.61.1290189055898; Fri, 19 Nov 2010 09:50:55 -0800 (PST)
Received: from [10.36.0.42] (pool-108-20-27-240.bstnma.fios.verizon.net [108.20.27.240]) by mx.google.com with ESMTPS id m10sm464649vcf.45.2010.11.19.09.50.53 (version=TLSv1/SSLv3 cipher=RC4-MD5); Fri, 19 Nov 2010 09:50:54 -0800 (PST)
Message-Id: <85588142-AF5E-40D9-912B-171D442E081F@lilacglade.org>
From: Margaret Wasserman <margaretw42@gmail.com>
To: paduffy@cisco.com, Samita Chakrabarti <samitac@ipinfusion.com>, robert.cragie@gridmerge.com, yoshihiro.ohba@toshiba.co.jp, Alper Yegin <alper.yegin@yegin.org>
Content-Type: text/plain; charset="US-ASCII"; format="flowed"; delsp="yes"
Content-Transfer-Encoding: 7bit
Mime-Version: 1.0 (Apple Message framework v936)
Date: Fri, 19 Nov 2010 12:50:52 -0500
X-Mailer: Apple Mail (2.936)
Cc: Ralph Droms <rdroms.ietf@gmail.com>, pana@ietf.org
Subject: [Pana] draft-ohba-pana-relay-02.txt
X-BeenThere: pana@ietf.org
X-Mailman-Version: 2.1.9
Precedence: list
List-Id: Protocol for carrying Authentication for Network Access <pana.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/listinfo/pana>, <mailto:pana-request@ietf.org?subject=unsubscribe>
List-Archive: <http://www.ietf.org/mail-archive/web/pana>
List-Post: <mailto:pana@ietf.org>
List-Help: <mailto:pana-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/pana>, <mailto:pana-request@ietf.org?subject=subscribe>
X-List-Received-Date: Fri, 19 Nov 2010 17:50:10 -0000

Hi Pana Relay Authors,

I've been asked to shepherd draft-ohba-pana-relay-02.txt for RFC
publication as a standards track document.  As part of that process, I
am required to perform my own review of the document before doing a
document write-up.  During my review, I found several issues that
should be resolved before this draft is published.

I'll start with a question: Before I read this draft, I was under the
impression that the Pana Relay would forward Pana messages between an
unmodified Pana Client (PAC) and an unmodified Pana Authentication
Agent (PAA), allowing Pana to be used on networks, such as 6lowpan
networks, that have multi-hop links.  However, the mechanism in this
draft requires modifications to the PAA to support a new message type
for relayed messages.  Are the expected users of this technology
aware that an updated PAA will be required?  Is there reason to believe
that updated PAAs will be available?

Now onto issues with the document text...

SUBSTANTIVE ISSUES:

S1) It appears that this document should be held for a reference to a
document coming from outside the IETF, the Zigbee IP Specification.  I
don't think we have a very good mechanism to do that, and I am not
sure why it is desirable for this document to be held for that
document.  Why wouldn't a reference to the 6lowpan documents suffice?

S2) The document says:

    The relay operation requires that a PANA session is initiated by the
    PaC, i.e., the first message that the PRE relays for any PANA  
session
    is a PCI (PANA-Client-Initiation) message.

It also indicates that the PRE does not maintain any per-PAC state.  It
is unclear to me that the PRE can ensure that the above text is true
without maintaining per-PAC state.

S3) I am not sure I understand what this text means:

    (a) The PAA uses the source IP address and the source port number of
    the PCI and the source IP address and UDP port number of the PRY to
    identify the PaC among multiple PCI messages sent from different
    PaCs.

Does it mean that all four values are used to differentiate the request?
So that we can support more than one PaC with the same address/port  
pair,
as long as they use different PREs?  Or only that we would allow more  
than
one PaC to use the same PRE?  Further explanation would be helpful.

EDITORIAL ISSUES:

E1) Some of the references in this document do not have corresponding
references within the text.  Specifically, RFC2464 and RFC5226.  These
references need to be removed, or references need to be added in the
text.

E2) The reference to RFC 2119 should be normative, not informative.

E3) There are many places in the text where acronyms are spelled out
in parentheses after the acronym, e.g. "PANA (Protcol for carrying
Authentication for Network Access)".  RFCs do this the other way
"Protocol for Carrying Authentication for Network Access (PANA)".

E4) AVP is not defined the first time it is used.

Please produce a new version of this document to address these issues,  
as well as the issues raised by Rafa Marin Lopez on the Pana list.  In  
the meantime, I will attempt to solicit a security reviewer for this  
document.

Thanks,
Margaret