Re: [RTG-DIR] RtgDir review: draft-ietf-6tisch-architecture-21.txt

"Pascal Thubert (pthubert)" <pthubert@cisco.com> Sat, 22 June 2019 16:37 UTC

Return-Path: <pthubert@cisco.com>
X-Original-To: rtg-dir@ietfa.amsl.com
Delivered-To: rtg-dir@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 1E67B120134; Sat, 22 Jun 2019 09:37:32 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -14.5
X-Spam-Level:
X-Spam-Status: No, score=-14.5 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, DKIM_SIGNED=0.1, DKIM_VALID=-0.1, DKIM_VALID_AU=-0.1, HTML_MESSAGE=0.001, RCVD_IN_DNSWL_HI=-5, SPF_PASS=-0.001, USER_IN_DEF_DKIM_WL=-7.5] autolearn=ham autolearn_force=no
Authentication-Results: ietfa.amsl.com (amavisd-new); dkim=pass (1024-bit key) header.d=cisco.com header.b=Di4LQdV6; dkim=pass (1024-bit key) header.d=cisco.onmicrosoft.com header.b=djbSVvJ0
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id zqmfvxKWsBdJ; Sat, 22 Jun 2019 09:37:29 -0700 (PDT)
Received: from rcdn-iport-9.cisco.com (rcdn-iport-9.cisco.com [173.37.86.80]) (using TLSv1.2 with cipher DHE-RSA-SEED-SHA (128/128 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id 534F1120089; Sat, 22 Jun 2019 09:37:29 -0700 (PDT)
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/simple; d=cisco.com; i=@cisco.com; l=17271; q=dns/txt; s=iport; t=1561221449; x=1562431049; h=from:to:cc:subject:date:message-id:references: in-reply-to:mime-version; bh=EEdVnI1M9Dkz/xRhcLLV0+9xGvU1NY45JgJcWvMI0HY=; b=Di4LQdV6UzWj5XnAwof8bJzRhIVWOFZjPDJ/SkQigHLuiKRJjeBFj0o4 GYjRrgFwcRAukancTg8XbBD7PfwvCjVzJckuq7b85O0HGFQgVNTAI5D9n JZ3AyYKJlfb0MP0zHbDS1dsQehwWPmEuuTXk07feanGJj/+igwHCOx6yR E=;
IronPort-PHdr: 9a23:mSH1ChYK5q4haKE8AARCEbz/LSx94ef9IxIV55w7irlHbqWk+dH4MVfC4el20gabRp3VvvRDjeee87vtX2AN+96giDgDa9QNMn1NksAKh0olCc+BB1f8KavycywnFslYSHdu/mqwNg5eH8OtL1A=
X-IronPort-Anti-Spam-Filtered: true
X-IronPort-Anti-Spam-Result: A0BIAAA2WA5d/5pdJa1jHAEBAQQBAQcEAQGBUwcBAQsBgUMpJwNqVSAECygKhAyDRwOEUooOgjYliUWJH4RUgS4UgRADVAkBAQEMAQEjCgIBAYRAAheCRyM0CQ4BAwEBBAEBAgEFbYo3DIVLAgEDEhEdAQE3AQ8CAQgSAisDAgICHxEUAw4CBA4FGweDAAGBHU0DHQECAQuZWwKBOIhfcYExgnkBAQWEeQ0LghEJgTQBhHCEJIJJF4FAP4ERJwwTgkw+gho8CwKBSTiCajKCJotuG4IWL4R5lgc/CQKCFIVxXIkng24bgihrhiKOEpRVgW2NZwIEAgQFAg4BAQWBPRM4gVhwFWUBgkEJgjgMF4ECAQiCQoUUhT9yAYEojVsBgSABAQ
X-IronPort-AV: E=Sophos;i="5.63,405,1557187200"; d="scan'208,217";a="492961614"
Received: from rcdn-core-3.cisco.com ([173.37.93.154]) by rcdn-iport-9.cisco.com with ESMTP/TLS/DHE-RSA-SEED-SHA; 22 Jun 2019 16:37:27 +0000
Received: from XCH-RCD-004.cisco.com (xch-rcd-004.cisco.com [173.37.102.14]) by rcdn-core-3.cisco.com (8.15.2/8.15.2) with ESMTPS id x5MGbRqX014799 (version=TLSv1.2 cipher=AES256-SHA bits=256 verify=FAIL); Sat, 22 Jun 2019 16:37:27 GMT
Received: from xhs-rcd-003.cisco.com (173.37.227.248) by XCH-RCD-004.cisco.com (173.37.102.14) with Microsoft SMTP Server (TLS) id 15.0.1473.3; Sat, 22 Jun 2019 11:37:27 -0500
Received: from xhs-aln-001.cisco.com (173.37.135.118) by xhs-rcd-003.cisco.com (173.37.227.248) with Microsoft SMTP Server (TLS) id 15.0.1473.3; Sat, 22 Jun 2019 11:37:26 -0500
Received: from NAM05-CO1-obe.outbound.protection.outlook.com (173.37.151.57) by xhs-aln-001.cisco.com (173.37.135.118) with Microsoft SMTP Server (TLS) id 15.0.1473.3 via Frontend Transport; Sat, 22 Jun 2019 11:37:26 -0500
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=cisco.onmicrosoft.com; s=selector2-cisco-onmicrosoft-com; h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-SenderADCheck; bh=EEdVnI1M9Dkz/xRhcLLV0+9xGvU1NY45JgJcWvMI0HY=; b=djbSVvJ0aMSrzw4cCaAi4tCKFIfJM2RaP+TS7NTp4T9FnKNy8EPhUunJ/Pg+WeT3tAV8tzE9eq9TkbHHMYE44rEAbnz4cqwhSMPZ4v1j2ZFzbY66HnF/pspxRBnrUWxFEX6LCEuLTTAkxRGOqH3tPpBu04tot9llFi8Irtl8/H4=
Received: from MN2PR11MB3565.namprd11.prod.outlook.com (20.178.250.159) by MN2PR11MB3901.namprd11.prod.outlook.com (10.255.180.76) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id 15.20.2008.16; Sat, 22 Jun 2019 16:37:24 +0000
Received: from MN2PR11MB3565.namprd11.prod.outlook.com ([fe80::1ce9:1582:146c:c50a]) by MN2PR11MB3565.namprd11.prod.outlook.com ([fe80::1ce9:1582:146c:c50a%6]) with mapi id 15.20.2008.014; Sat, 22 Jun 2019 16:37:24 +0000
From: "Pascal Thubert (pthubert)" <pthubert@cisco.com>
To: "Andrew G. Malis" <agmalis@gmail.com>
CC: "<rtg-ads@ietf.org>" <rtg-ads@ietf.org>, "6tisch-chairs@ietf.org" <6tisch-chairs@ietf.org>, "rtg-dir@ietf.org" <rtg-dir@ietf.org>, "draft-ietf-6tisch-architecture.all@ietf.org" <draft-ietf-6tisch-architecture.all@ietf.org>, "6tisch@ietf.org" <6tisch@ietf.org>
Thread-Topic: RtgDir review: draft-ietf-6tisch-architecture-21.txt
Thread-Index: AQHVKHhN2/HVBDnJh0K18wKrXZJX1aan2uCAgAAFupk=
Date: Sat, 22 Jun 2019 16:37:24 +0000
Message-ID: <B4AE3872-1863-4B6A-9CCA-720EF067BC24@cisco.com>
References: <CAA=duU12f2eqQZsOAkm_LVR63Y1AXgruokm=eH9MVz-+mPZ_jA@mail.gmail.com>, <CAA=duU16Vz58oMerho4fSF+S=zfqu8W0qPG9e02psy7+a+T=ag@mail.gmail.com>
In-Reply-To: <CAA=duU16Vz58oMerho4fSF+S=zfqu8W0qPG9e02psy7+a+T=ag@mail.gmail.com>
Accept-Language: fr-FR, en-US
Content-Language: fr-FR
X-MS-Has-Attach:
X-MS-TNEF-Correlator:
authentication-results: spf=none (sender IP is ) smtp.mailfrom=pthubert@cisco.com;
x-originating-ip: [91.69.164.91]
x-ms-publictraffictype: Email
x-ms-office365-filtering-correlation-id: 0d06cf98-9fdc-4e00-e41e-08d6f72fe7fd
x-microsoft-antispam: BCL:0; PCL:0; RULEID:(2390118)(7020095)(4652040)(8989299)(4534185)(4627221)(201703031133081)(201702281549075)(8990200)(5600148)(711020)(4605104)(1401327)(2017052603328)(7193020); SRVR:MN2PR11MB3901;
x-ms-traffictypediagnostic: MN2PR11MB3901:
x-ms-exchange-purlcount: 1
x-microsoft-antispam-prvs: <MN2PR11MB390185DF08672AE5E74956C3D8E60@MN2PR11MB3901.namprd11.prod.outlook.com>
x-ms-oob-tlc-oobclassifiers: OLM:10000;
x-forefront-prvs: 0076F48C8A
x-forefront-antispam-report: SFV:NSPM; SFS:(10009020)(136003)(346002)(366004)(396003)(39860400002)(376002)(199004)(189003)(7736002)(73956011)(66574012)(236005)(91956017)(6512007)(81166006)(14444005)(66946007)(6306002)(68736007)(76116006)(6436002)(81156014)(54896002)(229853002)(66556008)(8676002)(316002)(66446008)(5660300002)(64756008)(8936002)(66066001)(53936002)(66476007)(2906002)(25786009)(476003)(186003)(4326008)(99286004)(6486002)(486006)(86362001)(11346002)(256004)(53546011)(6506007)(102836004)(26005)(2616005)(446003)(6116002)(33656002)(966005)(76176011)(3846002)(6246003)(14454004)(6916009)(606006)(71200400001)(478600001)(71190400001)(36756003)(1411001)(95394004)(244885003); DIR:OUT; SFP:1101; SCL:1; SRVR:MN2PR11MB3901; H:MN2PR11MB3565.namprd11.prod.outlook.com; FPR:; SPF:None; LANG:en; PTR:InfoNoRecords; A:1; MX:1;
received-spf: None (protection.outlook.com: cisco.com does not designate permitted sender hosts)
x-ms-exchange-senderadcheck: 1
x-microsoft-antispam-message-info: PzTyPlSdqQmqbXezCuu67ldVY+6Ofrz4nPMbHBknAvEC0X59ru2MK/zxSIDlkMSQd99NKkx0IMVadgRl5KinqMyP0+99NYAhCKpI/PgSxl8Jpzj3PALIhWP3H+jTvr/3EK1kXfWtGPEAAJ9dxdc/G6NYQ1FsU1McXqdfzJpXjF+4x07nQrOqDNTjIxffhBjCBckPTy3f0PLZQhICODkLQ8ZpKNfEw+jFLppqqUtxDeT26VuhYIBR/xjnMblBmVMGDIc2GHSsRz98vu+LxlZyf2JmdhJlM2cKB8Lz5Xp6cBjJX1wceuAFXQZ1dQgHJXd/Fm6lCLV9IslNwQxFcFEbaKQ1FYIjpfdgfYcer6BsBYMX1KxnV90zwy+Nlz7GnsPn/oc2L5PJMYKBu+3xeg50in5KvzGjH/DVqRQyWm8F0o4=
Content-Type: multipart/alternative; boundary="_000_B4AE387218634B6A9CCA720EF067BC24ciscocom_"
MIME-Version: 1.0
X-MS-Exchange-CrossTenant-Network-Message-Id: 0d06cf98-9fdc-4e00-e41e-08d6f72fe7fd
X-MS-Exchange-CrossTenant-originalarrivaltime: 22 Jun 2019 16:37:24.6463 (UTC)
X-MS-Exchange-CrossTenant-fromentityheader: Hosted
X-MS-Exchange-CrossTenant-id: 5ae1af62-9505-4097-a69a-c1553ef7840e
X-MS-Exchange-CrossTenant-mailboxtype: HOSTED
X-MS-Exchange-CrossTenant-userprincipalname: pthubert@cisco.com
X-MS-Exchange-Transport-CrossTenantHeadersStamped: MN2PR11MB3901
X-OriginatorOrg: cisco.com
X-Outbound-SMTP-Client: 173.37.102.14, xch-rcd-004.cisco.com
X-Outbound-Node: rcdn-core-3.cisco.com
Archived-At: <https://mailarchive.ietf.org/arch/msg/rtg-dir/QhrWH1xyTCLug3v5Oi8g0M445LA>
Subject: Re: [RTG-DIR] RtgDir review: draft-ietf-6tisch-architecture-21.txt
X-BeenThere: rtg-dir@ietf.org
X-Mailman-Version: 2.1.29
Precedence: list
List-Id: Routing Area Directorate <rtg-dir.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/rtg-dir>, <mailto:rtg-dir-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/rtg-dir/>
List-Post: <mailto:rtg-dir@ietf.org>
List-Help: <mailto:rtg-dir-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/rtg-dir>, <mailto:rtg-dir-request@ietf.org?subject=subscribe>
X-List-Received-Date: Sat, 22 Jun 2019 16:37:32 -0000

Hello Andrew:

This is another change with Gorry’s review.
The spec was intended to follow the path of the DetNet architecture as ses track but we’ll follow the A-Ds and the message was to shoot for informational. So we just changed for it.


Regards,

Pascal

Le 22 juin 2019 à 18:17, Andrew G. Malis <agmalis@gmail.com<mailto:agmalis@gmail.com>> a écrit :

One quick follow-up to my review - I just noticed that while the draft's intended status (in the draft) is Informational, the Datatracker lists it as Proposed Standard. The Datatracker should be updated.

Thanks,
Andy

On Fri, Jun 21, 2019 at 5:28 PM Andrew G. Malis <agmalis@gmail.com<mailto:agmalis@gmail.com>> wrote:
Hello,

I have been selected as the Routing Directorate reviewer for this draft. The Routing Directorate seeks to review all routing or routing-related drafts as they pass through IETF last call and IESG review, and sometimes on special request. The purpose of the review is to provide assistance to the Routing ADs. For more information about the Routing Directorate, please see http://trac.tools.ietf.org/area/rtg/trac/wiki/RtgDir

Although these comments are primarily for the use of the Routing ADs, it would be helpful if you could consider them along with any other IETF Last Call comments that you receive, and strive to resolve them through discussion or by updating the draft.

Document: draft-ietf-6tisch-architecture-21.txt
Reviewer: Andy Malis
Review Date: 21 June 2019
IETF LC End Date: 26 June 2019
Intended Status: Informational

Summary:

I have significant concerns about this document and recommend that the Routing ADs discuss these issues further with the authors.

Overall comments:

For this review, I was asked to "Focus on the impact/implications of the architecture on routing/forwarding." I will leave minor details such as editorial nits to others.

This is a very long and detailed document, and I have no prior experience with IEEE 802.15.4, 6lowpan, 6tisch, RPL, and related technologies. To prepare for this review I did some basic background reading, such an online introduction to IEEE 802.15.4 and RFC 7554. So in this review, I really don't feel competent to comments on some of the more technical aspects related to those technologies. However, I do feel competent to comment from the viewpoint of a naive reader with a general background in routing. As a naive reader, I appreciated the introduction to the technology in sections 1-3.

The primary editor of this draft is also active in the DetNet working group, and leverages the work being done there to support the work in this draft. The draft does reference some DetNet technologies that have not yet been completely specified to the point where they can be implemented such as PREOF (Packet Replication, Elimination and Ordering Functions), although such specifications are an expected deliverable in the DetNet WG. So a full implementation of this architecture may have to wait for the completion of the related DetNet specification work.

With respect to routing and forwarding, this draft builds upon the work already done in the 6lowpan WG, such as RPL for routing and 6lowpan header compression. It adds the necessary scheduling and time synchronization functions needed to support the TSCH aspects of IEEE 802.15.4, which is the point of this work. But other than these new aspects, routing and forwarding should continue to work to the extent that they work in the 6lowpan specifications. My one concern regarding IPv6 forwarding is the use of draft-svshah-tsvwg-lln-diffserv-recommendations in section 4.7.2. See my major issues below for more on this concern.

Major issues:

I'm concerned with the number of references to individual drafts (even if informational) in a major architecture specification, since the rest of the work on this technology, including solution documents, will rest on the correctness and completeness of the architecture. If these references are essential, then I would recommend that publication of the architecture be delayed until it's more clear whether these individual drafts will be adopted by a WG, and any abandoned individual drafts be removed. Otherwise, how can a published architecture depend on unpublished, abandoned work? Speaking of which, I note that one of those referenced drafts, draft-svshah-tsvwg-lln-diffserv-recommendations, hasn't been updated in over four years, and should either be removed or adopted by the 6tisch WG. Another, draft-thubert-bier-replication-elimination, hasn't been updated in over a year. Is it still alive? At least the remaining individual drafts have fairly recent updates.

A related concern is that this draft specifically depends on work to be done elsewhere in and outside of the IETF that is currently unchartered (see section A.2). Many of the individual drafts discussed in the previous paragraph are referenced in this section. To the extent that 6tisch depends on this work for its own eventual success, the WG may wish to evaluate if there are alternative ways to have the necessary work completed, such as using an alternative solution or rechartering the WG to include necessary work that looks unlikely to happen elsewhere.

Minor issue:

To the extent that this architecture makes use of centralized control mechanisms such as PCE, the security considerations should mention this dependency and perhaps have a short discussion of effects on the network if connectivity between the centralized controller and the network nodes is lost, either due to an outage or a deliberate attack, and how such effects could be mitigated.

Thanks,
Andy