Re: [RTG-DIR] RtgDir review: draft-ietf-6tisch-architecture-21.txt

"Pascal Thubert (pthubert)" <pthubert@cisco.com> Mon, 24 June 2019 08:24 UTC

Return-Path: <pthubert@cisco.com>
X-Original-To: rtg-dir@ietfa.amsl.com
Delivered-To: rtg-dir@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 6B167120090; Mon, 24 Jun 2019 01:24:38 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -14.5
X-Spam-Level:
X-Spam-Status: No, score=-14.5 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, DKIM_SIGNED=0.1, DKIM_VALID=-0.1, DKIM_VALID_AU=-0.1, HTML_MESSAGE=0.001, RCVD_IN_DNSWL_HI=-5, SPF_PASS=-0.001, USER_IN_DEF_DKIM_WL=-7.5] autolearn=ham autolearn_force=no
Authentication-Results: ietfa.amsl.com (amavisd-new); dkim=pass (1024-bit key) header.d=cisco.com header.b=hLGIZ30Z; dkim=pass (1024-bit key) header.d=cisco.onmicrosoft.com header.b=sLcxju0d
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id U7tGmNK_l3OB; Mon, 24 Jun 2019 01:24:36 -0700 (PDT)
Received: from alln-iport-3.cisco.com (alln-iport-3.cisco.com [173.37.142.90]) (using TLSv1.2 with cipher DHE-RSA-SEED-SHA (128/128 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id 8EF81120048; Mon, 24 Jun 2019 01:24:35 -0700 (PDT)
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/simple; d=cisco.com; i=@cisco.com; l=28972; q=dns/txt; s=iport; t=1561364675; x=1562574275; h=from:to:cc:subject:date:message-id:references: in-reply-to:mime-version; bh=jIdrno1OaDfgu94fBTons9LLH6aKIFSKB0FTeVuo0M4=; b=hLGIZ30ZQlCLZkZCiagAz503wLi4nhikc81S+xgmW1JWO3wT0M1PGjtv jacEnMly+Ualb9l0BywXgTpPmNJk1IOKgSePwGES5YutZmzMx7HWHaXe8 kySqc3hXVoABChrnUeCx02PNBcnEcy6OEW/kuCPIq8ZceT675e2hx538I I=;
IronPort-PHdr: 9a23:A06zHhTJVDYKhJznK1t26VJhBtpsv++ubAcI9poqja5Pea2//pPkeVbS/uhpkESXBNfA8/wRje3QvuigQmEG7Zub+FE6OJ1XH15g640NmhA4RsuMCEn1NvnvOjQmHNlIWUV513q6KkNSXs35Yg6arw==
X-IronPort-Anti-Spam-Filtered: true
X-IronPort-Anti-Spam-Result: A0CVCABohxBd/4oNJK1kHgEGBwaBVgYLAYEUL1ADalUgBAsoCoQMg0cDjmGCW5JYDIRUgUKBEANUCQEBAQwBAS0CAQGEQAIXgk8jNwYOAQMBAQQBAQIBBW2KNwyFSgEBAQMBEhEKEwEBMgUBBAsCAQgSMAICAjAXDgIEAQkEDRMHgwGBHU0DDg8BApgOAoE4iF9xgTGCeQEBBYR6GIIRCYE0hHGEJHaBUxeBQD+BEUaCTD6BVII0JBoMgnwygiaMAIJOhHmWRgkCghSIToJhiE6CKIcNhAqGAoQGjSaXAwIEAgQFAg4BAQWBZiKBWHAVgyeCQQwXg02KU3KBKY1mAYEgAQE
X-IronPort-AV: E=Sophos;i="5.63,411,1557187200"; d="scan'208,217";a="296242051"
Received: from alln-core-5.cisco.com ([173.36.13.138]) by alln-iport-3.cisco.com with ESMTP/TLS/DHE-RSA-SEED-SHA; 24 Jun 2019 08:24:34 +0000
Received: from XCH-ALN-018.cisco.com (xch-aln-018.cisco.com [173.36.7.28]) by alln-core-5.cisco.com (8.15.2/8.15.2) with ESMTPS id x5O8OYTJ029526 (version=TLSv1.2 cipher=AES256-SHA bits=256 verify=FAIL); Mon, 24 Jun 2019 08:24:34 GMT
Received: from xhs-aln-002.cisco.com (173.37.135.119) by XCH-ALN-018.cisco.com (173.36.7.28) with Microsoft SMTP Server (TLS) id 15.0.1473.3; Mon, 24 Jun 2019 03:24:33 -0500
Received: from xhs-rtp-001.cisco.com (64.101.210.228) by xhs-aln-002.cisco.com (173.37.135.119) with Microsoft SMTP Server (TLS) id 15.0.1473.3; Mon, 24 Jun 2019 03:24:32 -0500
Received: from NAM02-CY1-obe.outbound.protection.outlook.com (64.101.32.56) by xhs-rtp-001.cisco.com (64.101.210.228) with Microsoft SMTP Server (TLS) id 15.0.1473.3 via Frontend Transport; Mon, 24 Jun 2019 04:24:32 -0400
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=cisco.onmicrosoft.com; s=selector2-cisco-onmicrosoft-com; h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-SenderADCheck; bh=jIdrno1OaDfgu94fBTons9LLH6aKIFSKB0FTeVuo0M4=; b=sLcxju0dWeo7VzuYAXe/IvKRJZUm27xRGncmydWVvjGmz+4oQK0XkQnUWJF5aQacch6BXAlY/eYzi0kg7rYIOfgBFxgSSQvJPewJXoBou3jGhae2KvWIZzD8noscxPfRgmkbYRT2IicZgVe6Wl7tWrH0mmjfe6r3Tp9ZQmUCm8U=
Received: from MN2PR11MB3565.namprd11.prod.outlook.com (20.178.250.159) by MN2PR11MB3648.namprd11.prod.outlook.com (20.178.252.15) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id 15.20.2008.16; Mon, 24 Jun 2019 08:24:21 +0000
Received: from MN2PR11MB3565.namprd11.prod.outlook.com ([fe80::1ce9:1582:146c:c50a]) by MN2PR11MB3565.namprd11.prod.outlook.com ([fe80::1ce9:1582:146c:c50a%6]) with mapi id 15.20.2008.014; Mon, 24 Jun 2019 08:24:21 +0000
From: "Pascal Thubert (pthubert)" <pthubert@cisco.com>
To: "Andrew G. Malis" <agmalis@gmail.com>, "<rtg-ads@ietf.org>" <rtg-ads@ietf.org>
CC: "rtg-dir@ietf.org" <rtg-dir@ietf.org>, "draft-ietf-6tisch-architecture.all@ietf.org" <draft-ietf-6tisch-architecture.all@ietf.org>, "6tisch@ietf.org" <6tisch@ietf.org>
Thread-Topic: RtgDir review: draft-ietf-6tisch-architecture-21.txt
Thread-Index: AQHVKHhN2/HVBDnJh0K18wKrXZJX1aaqXpvw
Date: Mon, 24 Jun 2019 08:24:14 +0000
Deferred-Delivery: Mon, 24 Jun 2019 08:24:03 +0000
Message-ID: <MN2PR11MB3565C4B48980A0E4463C7206D8E00@MN2PR11MB3565.namprd11.prod.outlook.com>
References: <CAA=duU12f2eqQZsOAkm_LVR63Y1AXgruokm=eH9MVz-+mPZ_jA@mail.gmail.com>
In-Reply-To: <CAA=duU12f2eqQZsOAkm_LVR63Y1AXgruokm=eH9MVz-+mPZ_jA@mail.gmail.com>
Accept-Language: fr-FR, en-US
Content-Language: en-US
X-MS-Has-Attach:
X-MS-TNEF-Correlator:
authentication-results: spf=none (sender IP is ) smtp.mailfrom=pthubert@cisco.com;
x-originating-ip: [173.38.220.59]
x-ms-publictraffictype: Email
x-ms-office365-filtering-correlation-id: 11346251-c26c-4572-f7fc-08d6f87d5c01
x-microsoft-antispam: BCL:0; PCL:0; RULEID:(2390118)(7020095)(4652040)(8989299)(4534185)(4627221)(201703031133081)(201702281549075)(8990200)(5600148)(711020)(4605104)(1401327)(2017052603328)(7193020); SRVR:MN2PR11MB3648;
x-ms-traffictypediagnostic: MN2PR11MB3648:
x-ms-exchange-purlcount: 2
x-microsoft-antispam-prvs: <MN2PR11MB3648455C0F3B3BBDF5F75344D8E00@MN2PR11MB3648.namprd11.prod.outlook.com>
x-ms-oob-tlc-oobclassifiers: OLM:10000;
x-forefront-prvs: 007814487B
x-forefront-antispam-report: SFV:NSPM; SFS:(10009020)(376002)(366004)(39860400002)(346002)(396003)(136003)(189003)(199004)(446003)(6246003)(66066001)(6306002)(54896002)(81166006)(81156014)(2906002)(8676002)(33656002)(4326008)(3846002)(55016002)(486006)(8936002)(256004)(14444005)(790700001)(5660300002)(64756008)(66446008)(7696005)(99286004)(316002)(11346002)(25786009)(6116002)(26005)(478600001)(66476007)(229853002)(66556008)(7736002)(53936002)(54906003)(110136005)(76176011)(76116006)(66946007)(74316002)(102836004)(6506007)(476003)(186003)(73956011)(6666004)(86362001)(9686003)(52536014)(14454004)(6436002)(71190400001)(71200400001)(68736007)(491001); DIR:OUT; SFP:1101; SCL:1; SRVR:MN2PR11MB3648; H:MN2PR11MB3565.namprd11.prod.outlook.com; FPR:; SPF:None; LANG:en; PTR:InfoNoRecords; MX:1; A:1;
received-spf: None (protection.outlook.com: cisco.com does not designate permitted sender hosts)
x-ms-exchange-senderadcheck: 1
x-microsoft-antispam-message-info: ue5N3OHPTjR08eCuDgS0HdUkvFrHwSVfyQ7EkQ0iBrEcPXVwE039dFMxQarACHZ0XZpzXPW9XVubhBsCv1ULCZ2IjxuaceRpt8Y0MlkOY9kQOvV7QQicMbYN8A7/qD/d8iaBbbeVqrh8EIABWPdQj5AfkmO+ZPOCv1zFiYG7N+s32F22kkonBNZGdf21G2pmct0hk6msMsLo99LEACUQ1iXY09/TZ5qP5C3Caux5m6a5tKzxPB8z45vL7ljNZ65UNJ1QS1mPNVteDKcGL9w8wMJRgQiH2LU25Uc5qXzekp+xtRXKsb49pTvTmvwGbgHnWtOJ/a1lO4MNgtsdGn/G9Wk044HTte0alJesL8JWh1KGIc4AFf++21V+gItHzz0t24tzdonktayYuzf07KBbPuczfCR95lqfETDsJrPiY6Q=
Content-Type: multipart/alternative; boundary="_000_MN2PR11MB3565C4B48980A0E4463C7206D8E00MN2PR11MB3565namp_"
MIME-Version: 1.0
X-MS-Exchange-CrossTenant-Network-Message-Id: 11346251-c26c-4572-f7fc-08d6f87d5c01
X-MS-Exchange-CrossTenant-originalarrivaltime: 24 Jun 2019 08:24:21.5788 (UTC)
X-MS-Exchange-CrossTenant-fromentityheader: Hosted
X-MS-Exchange-CrossTenant-id: 5ae1af62-9505-4097-a69a-c1553ef7840e
X-MS-Exchange-CrossTenant-mailboxtype: HOSTED
X-MS-Exchange-CrossTenant-userprincipalname: pthubert@cisco.com
X-MS-Exchange-Transport-CrossTenantHeadersStamped: MN2PR11MB3648
X-OriginatorOrg: cisco.com
X-Outbound-SMTP-Client: 173.36.7.28, xch-aln-018.cisco.com
X-Outbound-Node: alln-core-5.cisco.com
Archived-At: <https://mailarchive.ietf.org/arch/msg/rtg-dir/_obTT02pE9miO-yU_skFwJO54M4>
Subject: Re: [RTG-DIR] RtgDir review: draft-ietf-6tisch-architecture-21.txt
X-BeenThere: rtg-dir@ietf.org
X-Mailman-Version: 2.1.29
Precedence: list
List-Id: Routing Area Directorate <rtg-dir.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/rtg-dir>, <mailto:rtg-dir-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/rtg-dir/>
List-Post: <mailto:rtg-dir@ietf.org>
List-Help: <mailto:rtg-dir-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/rtg-dir>, <mailto:rtg-dir-request@ietf.org?subject=subscribe>
X-List-Received-Date: Mon, 24 Jun 2019 08:24:38 -0000

Hello Andrew:

Many thanks for your in-depth review.

Please see below:



>  The primary editor of this draft is also active in the DetNet working group, and leverages the work being done there to support the work in this draft. The draft does reference some DetNet technologies that have not yet been completely specified to the point where they can be implemented such as PREOF (Packet Replication, Elimination and Ordering Functions), although such specifications are an expected deliverable in the DetNet WG. So a full implementation of this architecture may have to wait for the completion of the related DetNet specification work.

<PT> Very true. Note that 6TiSCH was not chartered to deliver specifications to implement the deterministic side of the architecture. We hope to form RAW to do that, and RAW would inherit from DetNet’s specifications that are on the works now. At the architecture level, the reference we need is the DetNet architecture that introduces PREOFs, not the specs. And as you know, the DetNet architecture will be RFC before this. So I guess we do not have an issue there but rather a clear order in which things will get done, do we?

> With respect to routing and forwarding, this draft builds upon the work already done in the 6lowpan WG, such as RPL for routing and 6lowpan header compression. It adds the necessary scheduling and time synchronization functions needed to support the TSCH aspects of IEEE 802.15.4, which is the point of this work. But other than these new aspects, routing and forwarding should continue to work to the extent that they work in the 6lowpan specifications. My one concern regarding IPv6 forwarding is the use of draft-svshah-tsvwg-lln-diffserv-recommendations in section 4.7.2. See my major issues below for more on this concern.

<PT> That will be entirely removed, please see below.

Major issues:

--------------

I'm concerned with the number of references to individual drafts (even if informational) in a major architecture specification, since the rest of the work on this technology, including solution documents, will rest on the correctness and completeness of the architecture. If these references are essential, then I would recommend that publication of the architecture be delayed until it's more clear whether these individual drafts will be adopted by a WG, and any abandoned individual drafts be removed. Otherwise, how can a published architecture depend on unpublished, abandoned work? Speaking of which, I note that one of those referenced drafts, draft-svshah-tsvwg-lln-diffserv-recommendations, hasn't been updated in over four years, and should either be removed or adopted by the 6tisch WG. Another, draft-thubert-bier-replication-elimination, hasn't been updated in over a year. Is it still alive? At least the remaining individual drafts have fairly recent updates.

<PT> Yes, the link to svshah-tsvwg-lln-diffserv-recommendations is not really used in the architecture, it’s more of a pointer to work that we thought years ago would happen at TSVWG and never did. DetNet never seemed to depend on it either. I should really have removed that link on my own in addition to the changes I did in reaction to Gorry’s review, it will be gone in -22. I’ll also remove what is section 4.8.3 in -21. Looking at the other non-WG doc references, I do not think that the same reasoning applies, but I’m happy to discuss that in more depth.

<PT> The other non-WG docs are given as an informational early sense of how things could be implemented. We have this “Architecture Components” (section 4) that goes deeper than the usual architecture docs (more like our section 3). This is because this architecture tracked the WG as it went (like a spiral design or an agile approach) as opposed to the traditional cascading design stages. So we had those references live as we went over the last 5 years, from which svshah-tsvwg-lln-diffserv-recommendations appears like a unfiltered leftover. Also, the architecture is really an IOT architecture, that positions work done in multiple IETF WGs and ensures the global consistency and completeness. We value the archiving of section 4 because it provides the missing link between the high level architecture and what the group actually worked on (e.g., 6P) or pushed to other WGs such as ROLL and 6lo to obtain that overall consistency that was really missing 5 years ago.

<PT> OTOH, the architecture does not depend on those informational references. e.g.,  selander-ace-cose-ecdhe : LAKE BoF is happening at IETF 105. The 6TiSCH zerotouch will depend on LAKE as indicated in the architecture, but the architecture itself does not. This is given as an indication of how zerotouch could be done. For all I know, Thread is working on their own zerotouch that must have an equivalent functionality and that may not be edhoc. Fine with me at the architecture level, the key is to describe the model and position it within the other components.

--------------

A related concern is that this draft specifically depends on work to be done elsewhere in and outside of the IETF that is currently unchartered (see section A.2). Many of the individual drafts discussed in the previous paragraph are referenced in this section. To the extent that 6tisch depends on this work for its own eventual success, the WG may wish to evaluate if there are alternative ways to have the necessary work completed, such as using an alternative solution or rechartering the WG to include necessary work that looks unlikely to happen elsewhere.

<PT> Agreed.

<PT>  6TiSCH as a WG is close to completion now, this is why we are publishing our blue print. We’ve produced the specs that we needed for IPv6 over TSCH as chartered. We’ve had interop tests during past IETFs, and then more formal plugtests under ETSI supervision. 6TiSCH as chartered does not depend on WIP for its success. But the IOT network that the 6TiSCH  architecture describes will need upcoming additions such as zerotouch and RAW for which we provided the architecture but not the implementation.

<PT> We looked at it and found that the work to be done inherits more from DetNet and CCAMP than it does from 6TiSCH. Also that the work should not be so specific to the TSCH MAC but could apply to .11ac/be or to URLLC. Bottom line

<PT> Note that the non-IETF ref (IEEE802.15.12) is not a dependency to get IPv6 over TSCH to work, since it already does. It is a note that the MAC may be evolving and that a 6TiSCH implementation could be impacted. In this case, the 6P protocol may be transferred to IEEE, which is a rare occasion we thought worth noting in appendix.

----------------------

Minor issue:

To the extent that this architecture makes use of centralized control mechanisms such as PCE, the security considerations should mention this dependency and perhaps have a short discussion of effects on the network if connectivity between the centralized controller and the network nodes is lost, either due to an outage or a deliberate attack, and how such effects could be mitigated.

<PT> Makes sense to me. The inheritance from DetNet applies to both the protection of the control path and of the time distribution, which I’m discussing with David in parallel.
Proposed text:
”
The operation of 6TiSCH Tracks inherits its high level operation from DetNet and is subject to the observations in section 5 of [ietf-detnet-architecture]. As discussed there, measures must be taken to protect the time synchronization, and for 6TiSCH this includes ensuring that the ASN, which is used for the computation of NONCE,  is not compromised. Also, the installation and maintenance of 6TiSCH Tracks depends in the availability of a controller with a PCE to compute and push them in the network. When that connectivity is lost, existing Tracks may continue to operate until the end of their lifetime, but cannot be removed or updated, and new Tracks cannot be installed. As with DetNet in general, the communication with the PCE must be secured and should be protected against DoS attacks, and the discussion on the security considerations defined for Abstraction and Control of Traffic Engineered Networks (ACTN) applies equally to 6TiSCH.
“

Again, many thanks for your time spent on helping us through. I hope it was worth the read!

Pascal