Hello Magnus:

Please recall the Discuss in regard with our deadline-time draft and we believe 
we addressed your comments in the current revision (05).

It will be great if you could pass the Discuss positions in the record, if the 
security concerns raised are addressed.

The relevant text from security portion of 05 revision is below, for your quick 
reference.

<<

   The protocol elements specified in this document are designed to work
   in controlled operational environments (e.g., industrial process
   control and automation).  In order to avoid misuse of the deadline
   information that could potentially result in a Denial of Service
   (DoS) attack, proper functioning of this deadline time mechanism
   requires the provisioning and management of network resources for
   supporting traffic flows with deadlines, performance monitoring, and
   admission control policy enforcement.  The network provisioning can
   be done either centrally or in a distributed fashion.  For example,
   tracks in a 6tisch network could be established by a centralized PCE,
   as described in the 6tisch architecture
   [I-D.ietf-6tisch-architecture].

   The Security Considerations of Detnet architecture
   [I-D.ietf-detnet-architecture] mostly apply to this document as well,
   as follows.  To secure the request and control of resources allocated
   for tracks, authentication and authorization can be used for each
   device, and network controller devices.  In the case of distributed
   control protocols, security is expected to be provided by the
   security properties of the protocols in use.

   When deadline bearing flows are identified on a per-flow basis, which
   may provide attackers with additional information about the data
   flows, when compared to networks that do not include per-flow
   identification.  The security implications of disclosing that
   additional information deserve consideration when implementing this
   deadline specification.
   
   Because of the requirement of precise time synchronization, the
   accuracy, availability, and integrity of time synchronization is of
   critical importance.  Extensive discussion of this topic can be found
   in [RFC7384].
>>

 Kindly let us know if your comments and valuable inputs.

 Thanks & Regards
 Lijo Thomas


----------------------------------------------------------------------------------------------

Subject:        Re: [6lo] Magnus Westerlund's Discuss on 
draft-ietf-6lo-deadline-time-04: (with DISCUSS and COMMENT)
Date:   Thu, 6 Jun 2019 09:46:17 +0530
From:   Lijo Thomas <[email protected]>

To:     'Magnus Westerlund' <[email protected]>

CC:     [email protected]



Hi Magnus,

Thanks for the great response, we will update the draft accordingly.

Thanks & Regards,
Lijo Thomas 
-----Original Message-----
From: Magnus Westerlund <[email protected]> Sent: 05 June 2019 
17:23
To: Lijo Thomas <[email protected]>; 'Charlie Perkins'
<[email protected]>; 'The IESG' <[email protected]>
Cc: [email protected]; 'Samita Chakrabarti' <[email protected]>;
'Shwetha Bhandari' <[email protected]>; [email protected];
[email protected]; 'satish anamalamudi' <[email protected]>;
[email protected]
Subject: Re: [6lo] Magnus Westerlund's Discuss on
draft-ietf-6lo-deadline-time-04: (with DISCUSS and COMMENT)

Hi,

Thanks for providing some background information. From my perspective I
think there are some benefit to indicate the context the solution was
developed in. Note this is really comment level and not required.



On 2019-06-05 07:54, Lijo Thomas wrote:

Hi Magnus,

Thanks for your detailed review and really appreciate your time taken for the 
effort !!!!.

Please find our below response for the frame work query addressed by you.

One of the main use cases of the draft is the industrial automation and control 
applications. The end point of such applications puts the deadline information 
as per its delay requirements.
I agree that the underlying 6Lo network needs to ensure that the deadline is 
met using its delay sensitive routing and scheduling mechanisms while 
forwarding the packet along the path. The 6Lo network can support such a QoS 
requirement through end-to-end provisioning of the required network resources 
either centrally and/or in a distributed
fashion .


In the case of a 6tisch network, one could think of setting up tracks 
[draft-ietf-6tisch-architecture] along with delay aware Scheduling Function 
implemented by the intermediate nodes. The deadline draft works well within the 
context of the framework described in the draft-6tisch-architecture draft. The 
6tisch architecture draft defines tracks which could either be set up by a 
centralised entity PCE or by setting up tracks in a distributed fashion by 
reserving network resources that provide end-to-end delay guarantees. Packets 
of application flows can be sent over these tracks and scheduled based on their 
deadlines. The CAC can be exercised where reservation fails for a new track 
setup. There are situations like asynchronous time critical emergency messages 
where track set up delay is not acceptable. In such cases, we can use 
distributed on-the-fly scheduling using 6P protocol described in RFC 8480 that 
takes into
consideration the deadline information.

There are several deadline based scheduling algorithms that have proposed in 
the literature including the basic Earliest Deadline First (EDF). Based on our 
deadline draft, we implemented this scheme over a 6tisch network running on 
OpenWSN protocol stack and our draft implementation has been merged with the 
OpenWSN environment for future
downloads too.

We would be happy to add some additional text specifying that ** a network 
monitoring entity with call admission policy is expected to be in place for 
observation and consequently better results during real
implementations**.

The proposed sentence appears problematic from two perspective. One that it
might be an overly complex solution for certain closed systems.
Secondly, is it really "call admission" rather than flow admission?

I think the right way forward here is that you document the security issues
that anyone that intend to deploy this needs to consider. I think that
discussion can discuss potential mitigations, but without specific surround
contexts it is impossible to mandate any such.

Cheers

Magnus




Hope this address your few concerns and based on your response we will update 
the draft.

Happy to receive your further thoughts and valuable inputs.

Thanks & Regards,
Lijo Thomas

-----Original Message-----
From: 6lo <[email protected]> On Behalf Of Magnus Westerlund
Sent: 03 June 2019 18:27
To: Charlie Perkins <[email protected]>; The IESG <[email protected]>
Cc: [email protected]; [email protected]; Samita 
Chakrabarti <[email protected]>; Shwetha Bhandari <[email protected]>; 
[email protected]
Subject: Re: [6lo] Magnus Westerlund's Discuss on
draft-ietf-6lo-deadline-time-04: (with DISCUSS and COMMENT)

Hi Charlie,

Please see for further comments inline.

On 2019-05-30 23:16, Charlie Perkins wrote:

On 5/13/2019 6:41 AM, Magnus Westerlund via Datatracker wrote:

Magnus Westerlund has entered the following ballot position for
draft-ietf-6lo-deadline-time-04: Discuss




--------------------------------------------------------------------
-
-
DISCUSS:
--------------------------------------------------------------------
-
-

The security consideration section have significant short comings as this 
mechanism enables multiple ways to attack both the packet and the system to my 
understanding. I would appreaciate your clarifications
on these matters.

First of all by changing the dead-line so that it gets dropped because it is 
already late, alternatively move the deadline time out further in time (later), 
so that the forwarders may deliver it so late that the receiver considers it to 
late.
Agreed that this vulnerability should be mentioned in the Security 
Considerations.



Secondly, there is the question if extensive use of this header will cause 
overload or affect the scheduling of packet transmission affect other traffic 
negatively. There appear to exist potential for new ways of bad interflow 
interactions here.
If other packet transmissions have to be pre-empted in order for the deadline 
to be met for a particular packet, then indeed this could affect other traffic. 
It is also a matter of possible interest what might happen if there were two 
packets in the transmission queue with the same or different deadlines. 
However, the processing in these cases is a local matter at each intermediate 
point, and out of scope for
this

draft. Does this also belong to be mentioned in the Security Considerations?
Yes, I think so, as it points to a requirement to consider either admission 
control or other solutions to keep the interaction on an
acceptable level.






--------------------------------------------------------------------
-
-
COMMENT:
--------------------------------------------------------------------
-
-

Looking at this mechanism it appears to me as something that should fit into a 
frame work, but that is not explicitly given. The main reason I am raising that 
is that it appears to not care about a number of interesting and challenging 
questions for a mechanism like this. Questions that a particular framework can 
take care of, or which any user of this mechanism would need to consider in 
their deployment before they can determine if they can safely deploy it. It 
might be that some of the questions have answers and I missed. In that case 
please straighten me out. And if you have some additional document that 
provides more detailed usage which discuss any of these
issues I would appreciate a pointer.

This mechanism is a simple kind of signaling that could fit into various 
frameworks, and exploring that space would be pretty interesting. But it would 
represent a huge digression away from the point of this draft, which all along 
was intended to offer a simple mechanisms without getting involved with messy 
issues of policy. If there is something missing in the basic mechanism, then 
that should be fixed. But I don't see what is missing. Some of the discussion 
below is also relevant to this point.

So, there no specific first initial framework that this solution has been 
developed to support? And you say you do not want to deal with policy, and 
instead put that on the ones attempting to utilize it.
Considering the security issues, and the higher layer requirements that this 
solution appears to create I think that is far from optimal. I really think 
this document should have a section making the assumptions about its expected 
deployments clear.




So quesitons that I got when reading this specification:

1. Are there any mechanism to provide feedback if the packets reach the 
receiver in time? If the sender sets the deadline shorter than the minimal 
one-way path delay, then all packets will be late. Will any feedback be 
provided that this is happening? In cases D=1 this appear to be a recipe for a 
black hole for the traffic. One can also end up in situation where a large 
fraction of the packet are late.
This kind of signaling is far more appropriate at the application level. To 
fully characterize the expected distribution of latency values is out of scope 
for the draft, and the information needed would usually depend on the 
application. Some applications don't care much for dropped packets but don't 
want to handle packets coming in too late. For other applications, knowing the 
distribution would allow for setting a deadline that would usually all 
reception of 85% of the packets (or some percentage predetermined by the 
application). It's hard for me to see that as in scope for our draft.

Sure, but the document could make it clear that there exist a need to monitor 
the actual performance to know if the application will work successful





2. Any mechanism that exist to determine what the expected latency are from 
sender to receiver?
As above, I think this is most properly handled by the application



3. Are there any type of admittance or policy approval to use this
mechanism?

The policy details are out of scope for this draft. However, it might be 
worthwhile to mention that (similar to many QoS efforts) care must be taken to 
avoid abuse.

Please do.




4. What is the relationship between traffic with a dead-line and other traffic 
without a dead-line. Are traffic with a dead-line implicitly allowed to 
pre-empt other traffic or at least to delay it in
its queue?

We don't specify that, and since it's a local matter at each node, a mandate 
would be unenforceable. However, if it is important, we could design an 
advisory extension to the draft for this purpose. The problem is that the 
application should not necessarily need to be involved with changing its 
behavior in response to (highly dynamic)
traffic conditions.

Ok, I can agree that there is difficult to be descriptive here. As long at the 
potential impact is a discussed security issue I think this will be considered 
addressed.


5. As Barry noted, what are the protection against missuse?

These are issue that a framework or architecture would consider, I note that 
https://datatracker.ietf.org/doc/draft-ietf-detnet-architecture/
include some discussion of these topics. Still DETNET architecture appear
more constrained when it comes to usage than what this mechanism through its 
examples.

I think it would be best to enlarge the discussion in the draft to explain 
about the potential for abuse. I don't see just how the simple mechanism at the 
level of 6LoRH should be charged with the responsibility for an entire 
framework, and I really hope that simple mechanisms such as this one can be 
found to have value even without specification of a much larger set of 
protections and repairs.

My questions where more coming from the aspect, how do you have been part of 
developing this technical solution without having at least one framework that 
addresses the raised issue?

Thus, my preference that in the absence of a framework to point at, that the 
assumptions on the hypothetical framework are documented.

Cheers

Magnus Westerlund

----------------------------------------------------------------------
Network Architecture & Protocols, Ericsson Research
----------------------------------------------------------------------
Ericsson AB | Phone +46 10 7148287
Torshamnsgatan 23 | Mobile +46 73 0949079
SE-164 80 Stockholm, Sweden | mailto: [email protected]
----------------------------------------------------------------------


_______________________________________________
6lo mailing list
[email protected]
https://www.ietf.org/mailman/listinfo/6lo


----------------------------------------------------------------------
--------------------------------------
[ C-DAC is on Social-Media too. Kindly follow us at:
Facebook: https://www.facebook.com/CDACINDIA & Twitter: @cdacindia ]

This e-mail is for the sole use of the intended recipient(s) and may contain 
confidential and privileged information. If you are not the intended recipient, 
please contact the sender by reply e-mail and destroy all copies and the 
original message. Any unauthorized review, use, disclosure, dissemination, 
forwarding, printing or copying of this email is strictly prohibited and 
appropriate legal action will be
taken.

----------------------------------------------------------------------
--------------------------------------


-- 

Magnus Westerlund 
----------------------------------------------------------------------
Network Architecture & Protocols, Ericsson Research
----------------------------------------------------------------------
Ericsson AB                 | Phone  +46 10 7148287
Torshamnsgatan 23           | Mobile +46 73 0949079
SE-164 80 Stockholm, Sweden | mailto: [email protected]
----------------------------------------------------------------------



------------------------------------------------------------------------------------------------------------
[ C-DAC is on Social-Media too. Kindly follow us at:
Facebook: https://www.facebook.com/CDACINDIA & Twitter: @cdacindia ]

This e-mail is for the sole use of the intended recipient(s) and may
contain confidential and privileged information. If you are not the
intended recipient, please contact the sender by reply e-mail and destroy
all copies and the original message. Any unauthorized review, use,
disclosure, dissemination, forwarding, printing or copying of this email
is strictly prohibited and appropriate legal action will be taken.
------------------------------------------------------------------------------------------------------------

_______________________________________________
6lo mailing list
[email protected]
https://www.ietf.org/mailman/listinfo/6lo



------------------------------------------------------------------------------------------------------------
[ C-DAC is on Social-Media too. Kindly follow us at:
Facebook: https://www.facebook.com/CDACINDIA & Twitter: @cdacindia ]

This e-mail is for the sole use of the intended recipient(s) and may
contain confidential and privileged information. If you are not the
intended recipient, please contact the sender by reply e-mail and destroy
all copies and the original message. Any unauthorized review, use,
disclosure, dissemination, forwarding, printing or copying of this email
is strictly prohibited and appropriate legal action will be taken.
------------------------------------------------------------------------------------------------------------

_______________________________________________
6lo mailing list
[email protected]
https://www.ietf.org/mailman/listinfo/6lo

Reply via email to