Hello Michael


Please see inline (I removed all the full agreements





> -----Original Message-----

.

>

>     >  I suggest we remove the term debate and say this as follows:

>

>     >  " PANA (Layer-3), IEEE802.1x (Layer-2) or some light weight variation

>     > of those could be used in the join process.  Regardless, the security

>     > model must ensure that, prior to a join process, packets from a

>     > untrusted device are controlled in volume and in reachability.  This

>     > piece of the architecture is also deferred to a subsequent volume of

>     > the architecture.  A status of the work can be found in Section 13.  "

>

> okay.

>

>     >> 7) I don't understand why PANA lives above ACE in figure 3. I think

>     >> that

>     >  ACE lives above CoAP/DICE (DTLS is missing, but perhaps understood by

>     > DICE). I think that while technically PANA lives on top of UDP, there

>     > is of course a layer of EAP, and TLS above it, and perhaps a layer of

>     > ACE as well. So I'm not saying that this picture needs to be changed,

>     > just to observe this.

>

>     >  I suggested one, but please come back to me. I think ultimately we

>     > need to move all to COMI, including PANA if we adopt it, but none of

>     > that is clear now.

>

> It might be best to remove items from the picture rather than give wrong

> impressions.



I removed ACE and DICE from the picture,

unsure where they are going at this point



            +-----+-----+

            | PCEP|TEAS/|

            | PCE |CCAMP|

      +-----+-----+-----+-----+-------+-----+

      |     (COMI)      |PANA |6LoWPAN| RPL |

      | CoAP  / DTLS    |     |   ND  |     |

      +-----+-----+-----+-----+-------+-----+

      |       UDP       |          ICMP     |

      +-----+-----+-----+-----+-------+-----+-----+

      |                 IPv6                      |

      +-------------------------------------------+

      |  6LoWPAN adaptation and compression (HC)  |

      +-------------------------------------------+

      |                   6top                    |

      +-------------------------------------------+

      |             IEEE802.15.4e   TSCH          |

      +-------------------------------------------+



I also changed the language on PANA as follows, merging with René's comment:



"

   Similarly, the Protocol for Carrying Authentication for Network

   access (PANA) [RFC5191] is represented as an example of a protocol

   that could be leveraged to secure the join process, as a Layer-3

   alternate to IEEE802.1x/EAP.  Work resulting from [ACE] could be

   considered as well.  Regardless, the security model must ensure that,

   prior to a join process, packets from a untrusted device are

   controlled in volume and in reachability.  An overview of the

   security aspects of the join process can be found in Section 13.

   Related contributions are presented in Appendix A.

"







>

>     > to the full routing protocol.  The architecture also expects that a

>     > 6LoWPAN node that is not aware at all of the RPL protocol may also

>     > connect as a host. This can be achieved with an extension to 6LoWPAN

>     > ND, adding the capability to carry a sequence number that is used to

>     > track the movements of the device, and optionally some abstract

>     > information about the RPL instance (topology) that this device will be

>     > reachable over.  "

>

> I'm uncomfortable with things that say, "we can do X by extending Y".

> That's always true. ("We can extend 1950s telephone service to do web

> browsing by extending circuit switched networks to do IPv6...")

>

> Do we need/want to do X?  Is extending Y in our charter already?



Agreed, let us merge that text down to section 6, and make that a suggestion:

"



6.  6LoWPAN (and RPL)



  The architecture expects that a 6LoWPAN node that is not aware at all

   of the RPL protocol may still connect as a host.  It suggests to

   extend 6LoWPAN ND [RFC6775] to carry the sequence number that is

   needed by RPL to track the movements of the device, and optionally

   some abstract information about the RPL instance (topology) that the

   device will be reachable over.



   In this design, the root of the RPL network is integrated with the

   6LoWPAN ND 6LBR, but it is logically separated from the Backbone

   Router (6BBR) that is used to connect the RPL topology to the

   backbone.  This way, the root has all information from 6LoWPAN ND and

   RPL about the LLN devices attached to it.



   This architecture also expects that the root of the RPL network

   (proxy-)registers the LLN devices on their behalf to the 6BBR, for

   whatever operation the 6BBR performs on the backbone, such as ND

   proxy, or redistribution in a routing protocol.  It suggests to use an

   extension of the mixed mode of Efficient ND

   [I-D.chakrabarti-nordmark-6man-efficient-nd] for the registration as

   described in [I-D.thubert-6lowpan-backbone-router].



"

>     >> 14) I think that the relevant parts of [I-D.ietf-roll-rpl-industrial-

>     >  applicability] need to imported into this document, since this sure

>     > looks like a normative reference to me.

>     >>

>

>     >  I agree that this spec is fundamental to us. But importing it?

>

> If it's important, then it needs to be a normative reference. Otherwise, it 
> will be

> a downref that will break publication.



? If I make it a normative then it will be a downref. But I hardly see a 
requirement draft normative.



> s/performs bad/performs poorly/



Done



Please look up for an update on the bucket



These changes are specifically in 
https://bitbucket.org/6tisch/draft-ietf-6tisch-architecture/src/dcb5772198557b9fe08af9443b7fc04dfcbd548a/draft-ietf-6tisch-architecture-07.txt?at=master



Thanks a bunch for all!



Pascal
_______________________________________________
6tisch mailing list
[email protected]
https://www.ietf.org/mailman/listinfo/6tisch

Reply via email to