Updates to Draft Specification for DTN TCPCLv4

Slides:



Advertisements
Similar presentations
SIP Interconnect Guidelines draft-hancock-sip-interconnect-guidelines-02 David Hancock, Daryl Malas.
Advertisements

1 Internet Networking Spring 2003 Tutorial 11 Explicit Congestion Notification (RFC 3168) Limited Transmit (RFC 3042)
1 Spring Semester 2007, Dept. of Computer Science, Technion Internet Networking recitation #8 Explicit Congestion Notification (RFC 3168) Limited Transmit.
Certificate Path Building draft-ietf-pkix-certpathbuild-01.txt Peter Hesse Matt Cooper Yuriy Dzambasow Susan Joseph Richard Nicholas.
INRIA Rhône-Alpes - Planète research group Reed-Solomon FEC I-D LDPC-* FEC I-D TESLA I-D Simple-auth I-D IETF 70 th – Vancouver meeting, November 2007.
1 IPFIX Protocol Specifications IPFIX IETF-59 March 3, 2004 Benoit Claise Mark Fullmer Reinaldo Penno Paul Calato Stewart Bryant Ganesh Sadasivan.
SIPREC Conference Recording (draft-kyzivat-siprec-conference-use-cases-01) IETF 89, March 7, 2014 Authors: Michael Yan, Paul Kyzivat, Simon Romano.
Rfc7180bis: Further TRILL Clarifications, Corrections, and Updates Donald Eastlake Mingui Zhang, Radia Perlman, Ayan Banerjee, Anoop Ghanwani, Sujay Gupta.
0 NAT/Firewall NSLP IETF 62th – March 2005 draft-ietf-nsis-nslp-natfw-05.txt Martin Stiemerling, Hannes Tschofenig, Cedric Aoun.
July 27, 2009IETF NEA Meeting1 NEA Working Group IETF 75 Co-chairs: Steve Hanna
What makes for a quality RFC? An invited talk to the MPLS WG Adrian Farrel IETF-89 London, March 2014.
Yang Shi (Richard), Yong Zhang IETF 74 th 26 March 2009, San Francisco CAPWAP WG MIB Drafts Report.
4395bis irireg Tony Hansen, Larry Masinter, Ted Hardie IETF 82, Nov 16, 2011.
SHIM6 Protocol Drafts Overview Geoff Huston, Marcelo Bagnulo, Erik Nordmark.
Disman – IETF 56 Alarm MIB Sharon Chisholm Dan Romascanu
SIEVE Mail Filtering WG IETF 65, Dallas WG Chairs: Cyrus Daboo, Alexey Melnikov Mailing List: Jabber:
RTSP to Draft Standard draft-ietf-mmusic-rfc2236bis-02.txt Authors: Henning Schulzrinne, Anup Rao, Robert Lanphier, Magnus Westerlund.
SIP Interconnect Guidelines draft-hancock-sip-interconnect-guidelines-01 David Hancock, Daryl Malas.
SIP INFO Event Framework (draft-kaplan-sip-info-events-00) Hadriel Kaplan Christer Holmberg 70th IETF, Vancouver, Canada.
Rfc4474bis-01 IETF 90 (Toronto) STIR WG Jon. First principles (yet again) Separating the work into two buckets: 1) Signaling – What fields are signed,
March 2006 CAPWAP Protocol Specification Update March 2006
SIP PUBLISH draft-ietf-simple-publish-01 Aki Niemi
Mobile IPv6 with IKEv2 and revised IPsec architecture IETF 61
RADEXT WG RADIUS Attribute Guidelines Greg Weber March 21 st, 2006 IETF-65, Dallas v1 draft-weber-radius-attr-guidelines-02.txt draft-wolff-radext-ext-attribute-00.txt.
IETF66 DIME WG John Loughney, Hannes Tschofenig and Victor Fajardo 3588-bis: Current Issues.
SIP PUBLISH Method Jonathan Rosenberg dynamicsoft.
Slide 1 July 2006, Montreal, QuebecIETF DNSEXT 2929bis Donald E. Eastlake 3 rd
1 draft-sidr-bgpsec-protocol-05 Open Issues. 2 Overview I received many helpful reviews: Thanks Rob, Sandy, Sean, Randy, and Wes Most issues are minor.
7/27/2004IETF San-Diego Plenary meeting 8/2004 EPON MIBs Lior Khermosh – Passave Technologies
GRUU Jonathan Rosenberg Cisco Systems. Changes in -06 Editorial as a result of RFC-ED early copy experiment.
Slide title In CAPITALS 50 pt Slide subtitle 32 pt RTSP draft-ietf-mmusic-rfc2396bis-10 Magnus Westerlund Co-auhtors: Henning Schulzrinne, Rob Lanphier,
SIP Events: Changes and Open Issues IETF 50 / SIP Working Group Adam Roach
NEMO Basic Support update IETF 61. Status IANA assignments done Very close to AUTH48 call Some issues raised recently We need to figure out if we want.
RFC 4068bis draft-ietf-mipshop-fmipv6-rfc4068bis-01.txt Rajeev Koodli.
RTP Usage for CLUE draft-lennox-clue-rtp-usage-02 Clue WG, IETF 83, 27 March 2012 Jonathan Lennox Allyn Romanow
Draft-ietf-p2psip-base-08 Cullen Jennings Bruce Lowekamp Eric Rescorla Salman Baset Henning Schulzrinne March 25, 2010.
Globally Identifiable Number (GIN) Registration Adam Roach draft-martini-roach-gin-01 IETF 77 – Anaheim, CA, USA March 22, 2010.
BGPSEC Protocol (From -01 to -02 and on to -03) Matt Lepinski.
Open issues with PANA Protocol
Internet Networking recitation #9
STIR WG / IETF 94 Yokohama, Nov 2015 Jon
PANA Issues and Resolutions
Updated SBSP draft-birrane-dtn-sbsp-01.txt Edward Birrane
draft-ietf-simple-message-sessions-00 Ben Campbell
Next Generation: Internet Protocol, Version 6 (IPv6) RFC 2460
LMP Behavior Negotiation
Bundle Protocol Specification
Nancy Cam-Winget June 2015 SACM Requirements Nancy Cam-Winget June 2015.
IKEv2 Mobility and Multihoming Protocol (MOBIKE)
draft-lts-pim-hello-mtu-01
Dr. John P. Abraham Professor UTPA
Requirements and Implementations for Intra-flow/Intra-AC DiffServ
Dr. John P. Abraham Professor UTRGV, EDINBURG, TX
Working Group Draft for TCPCLv4
SSL (Secure Socket Layer)
IETF 101 (London) STIR WG Mar2018
Robert Moskowitz, Verizon
Dr. John P. Abraham Professor UTPA
Internet Networking recitation #10
Proposal for Extensible Security
Multi-server Namespace in NFSv4.x Previous and Pending Updates
Comment resolution on BSR CID 8426
BPSEC Updates Edward Birrane
Working Group Draft for TCPCLv4
FILS Handling of Large Objects
Synchronization related comment resolution
draft-ietf-dtn-bpsec-06
BPSec: AD Review Comments and Responses
TRILL Header Extension Improvements
Working Group Draft for TCPCLv4
Presentation transcript:

Updates to Draft Specification for DTN TCPCLv4 Brian Sipos RKF Engineering Solutions

Overview Background and current draft Review comments and initial responses Path forward for TCPCL

Motivations for Updates to TCPCL During implementation of TCPCLv3, Scott Burleigh found an ambiguity in bundle acknowledgment and refusal. For use in a terrestrial WAN, I have a need for TLS-based authentication and integrity. TCPCLv3 mentions TLS but does not specify its use. Contact negotiation in TCPCLv3 is limited and relatively hard-coded. Allow an endpoint to positively reject a message (rather than simply ignoring it).

Goals for TCPCLv4 Do not change scope or workflow of TCPCL! As much as possible, keep existing requirements and behaviors. The baseline spec was a copy-paste of TCPCLv3. Still using single-phase contact negotiation, re-using existing headers and message type codes. Allow existing implementations to be adapted for TCPCLv4. Re-use existing encoding, type and reason codes. Avoid duplication of IANA assignments. Since workflow is preserved, majority of message types are retained. This inherits limitations from TCPCLv3 for the sake of simplified implementation changes.

Reviews To-Date Original TCPCL(v3) authors asked to review Michael Demmer no longer in field, declined review Simon Perreault reviewed with no comments Joerg Ott provided comments to WG mailing list

Comment Areas Front matter and editorial Interoperation with TCPCLv3 Combined BPv6 and BPv7 operation Multiple underlying transport? Contact Header Option List Bundle Exchange messages (Bundle IDs) Security requirements

General Comments Section 1 front matter Keyword capitalization Will update text for DTN WG, etc. Keyword capitalization Can scour document and replace Interoperation with TCPCLv3 Currently allow backward compatibility, but not stated earlier than Contact Header SHUTDOWN code for v3? Combined BPv6 and BPv7 operation Is this a necessary mode? Would require per-bundle version identifier Multiple underlying transport? My feeling is defer this until really needed, many “what if” options Need to bump the protocol version number? Yes, the TCPCLv3 concepts are kept but not the mechanisms

Contact Header Comments Option ordering Would add a canonical order by Type Code Reduce use of SDNV I don’t have strong opinion on this How to handle unknown Types Add flag to indicate mandatory interpretation (similar to CMS “CRITICAL” flag or BP block flags) Repeated options not allowed This just simplifies logic What would be an example of repeated option? Replacement for IGNORE mnemonic Any recommendations? Acknowledge Bundle negotiation This was purely for backwards compatibility, can leave out If both LENGTH and ACK_BUNDLE are protocol-mandatory then logic is simplified… thoughts? Bundle/fragment maximum size negotiation? Sure, with default no-limit

Bundle Exchange Comments LENGTH message size vs. actual received size difference Agree with comment, LENGTH is indicative only REJECT message add field to indicate troublesome location within message This seems fine to add but I’m not sure how much value it adds Nomenclature byte vs octet Will replace with octet throughout Tighter requirements on generation of Bundle IDs needed I was hoping to avoid this, but I do agree that lack of required behavior can lead to bad behavior Maybe specify sequentially increasing values..? Maybe specify contact negotiation of maximum ID..? Any thoughts? SDNV really needed for Bundle ID? I think this is too use-case dependent to be otherwise

Bundle Exchange cont. Rephrase requirement which depends on bundle structure I believe that this was in TCPCLv3 and left as-is I agree that this should simply be removed and existing requirement left as: each segment corresponds to distinct bundle LENGTH needs to contain Bundle ID? Yes, the Bundle ID is needed so that it can be present in a possible corresponding REFUSE message

STARTTLS Comments How to handle received messages on insecure link when secure link is required? I agree with a rejection reason AWAITING_TLS or similar Could use current UNEXPECTED Comment about requirements on TLS exchange itself Current draft follows lead of RFC2595 (STARTTLS for mail) Any TLS-specific parameters or negotiation are deferred to application, can plainly state this in TCPCL spec Question whether additional info is needed in Security section I believe only explicit lack of requirement is needed

Revised Protocol Status Editorial comments need to be incorporated into existing draft Further discussion on open questions DTN mailing list suitable for discussions Joerg has recommended review but current TCPCL implementers Would this be a side-effect of WG adoption of TCPCLv4? WG adoption of TCPCPv4 for BPbis use Would anything in I-D need to change to allow this?