Hi Hannes,

Sure, we will consider that feedback when updating the draft. Thanks!

Yours,
Daniel

On Tue, Dec 26, 2023 at 3:42 AM Hannes Tschofenig <hannes.tschofe...@gmx.net>
wrote:

> Hi Daniel,
>
>
> thanks for the additional background.
>
>
> I would suggest avoid talking about IoT in the documents and take the use
> case description from our email conversation instead. This will provide a
> more convincing story for the functionality you are suggesting.
>
>
> Ciao
>
> Hannes
>
>
> Am 24.12.2023 um 22:18 schrieb Daniel Migault:
>
> Hi Hannes,
>
> I actually do not mind at all whether the Base Stations are considered as
> an IoT or not. I said "could be" in the sense that is a very specific
> hardware dedicated to very specific tasks looking closely at the resources
> engaged in its transactions to meet the latency requirements. Obviously
> anyone looking at compressing the number of bytes is paying attention to
> the resources. I agree though they might also be quite far from use cases
> with low battery, few packets....
>
> I think the confusion comes from the fact that the annexes of the current
> document are only focused on IoT. These are examples we started with quite
> some time ago, but these are not anymore the use case for which I have
> cycles to drive this effort. That said, I still think the protocol can be
> used for other use cases than the base station use case - including any IoT
> and non IoT related use case. I am actually quite happy that we are
> not addressing a single use case.
>
> Yours,
> Daniel
>
>
>
>
> On Sun, Dec 24, 2023 at 8:47 AM Hannes Tschofenig <
> hannes.tschofe...@gmx.net> wrote:
>
>> Hi Daniel,
>>
>>
>> I think we are on the same page on a number of items already.
>>
>> There is only this "base station is an IoT use case" issue left.
>>
>>
>> Could you explain under what circumstances you consider a base station
>> being an IoT device (or even a constrained IoT use case)?
>>
>> Ciao
>> Hannes
>>
>> Am 17.12.2023 um 16:45 schrieb Daniel Migault:
>>
>> Hi Hannes,
>>
>> Please find my responses inline.
>>
>> Yours,
>> Daniel
>>
>> On Tue, Dec 12, 2023 at 9:45 AM <hannes.tschofe...@gmx.net> wrote:
>>
>>> Hi Daniel,
>>>
>>>
>>>
>>> thanks for your response. See my response below.
>>>
>>>
>>>
>>> *From:* Daniel Migault <mglt.i...@gmail.com>
>>> *Sent:* Dienstag, 12. Dezember 2023 15:20
>>> *To:* Hannes Tschofenig <hannes.tschofe...@gmx.net>
>>> *Cc:* Hannes Tschofenig <hannes.tschofenig=40gmx....@dmarc.ietf.org>;
>>> Carsten Bormann <c...@tzi.org>; Tero Kivinen <kivi...@iki.fi>;
>>> ipsec@ietf.org; s...@ietf.org
>>> *Subject:* Re: [IPsec] WG Adoption calls for
>>> draft-mglt-ipsecme-diet-esp and draft-mglt-ipsecme-ikev2-diet-esp-extension
>>>
>>>
>>>
>>> Hi Hannes,
>>>
>>>
>>>
>>> Seems I did not click "sent" yesterday. Please see my response inline.
>>>
>>>
>>>
>>> Yours,
>>>
>>> Daniel
>>>
>>>
>>>
>>> On Mon, Dec 11, 2023 at 12:02 PM Hannes Tschofenig <
>>> hannes.tschofe...@gmx.net> wrote:
>>>
>>> Hi Daniel, Hi all,
>>>
>>>
>>>
>>> don't get me wrong: I am trying to be helpful.
>>>
>>>
>>>
>>> This is how I am reading your comments.
>>>
>>> Integrating the functionality into SCHC alone is not enough. You need to
>>> integrate it into an implementation of IKEv2/IPsec that is suitable to the
>>> mentioned constrained IoT use cases. I have not seen IPsec/IKEv2 being used
>>> in constrained environments so far nor have I seen a "lightweight"
>>> implementation for microcontrollers.
>>>
>>>
>>>
>>> In our case, we want to "compress" / "decompress" IPsec traffic for our
>>> base stations. These could be seen as IoT in the sense that they are under
>>> heavy constraints... but I admit these are not sensors with a battery.
>>>
>>>
>>>
>>> [Hannes] Base Stations are not constrained IoT devices (see RFC 7228
>>> terminology). I assume that the base stations originate or terminate the
>>> traffic and the traffic being protected is some signaling protocol. If so,
>>> your co-workers, Magnus & John, who working on SCTP in the TSVWG, tell us
>>> that IPsec/IKEv2 is being phased out and replaced by TLS/DTLS. There is a
>>> design team working on this topic in the TSVWG. Hopefully your drafts are
>>> not taken over by the attempts to move telco infrastructure implementations
>>> into the cloud.
>>>
>>
>> <mglt>
>> I am fine with the base station not being IoT - I said "could".
>>
>> The interfaces we want to use diet-esp are fronthaul or sidehaul related
>> in our case are the Lower Layer Control (LLS), the low latency coordination
>> interface between RAN Compute basebands (E5 or Elastic RAN in LTE). It is
>> correct that these interfaces include the user plan.
>> On the other hand, I am pretty sure my co-workers did not mean to say so
>> and it is correct that DTLS may be used on on the midhaul and inter
>> Centralized Units interfaces such as CU-UP/CU-CP (E1), DU/CU-UP (F1-C),
>> DU/CU-UP(F1-C), CU-CP/CU-CP (Xn-C), CU-CP/AMF (N2).
>> </mglt>
>>
>>>
>>>
>>> The advantage of using SCHC is that there is a SCHC protocol code points
>>> so we can have different layers of compressions and use the same framework
>>> for all layers (including applications). ESP is only one layer. The
>>> implementation of course needs compression/decompression to be integrated
>>> into IPsec. In our case mostly to adapt data structures accordingly and
>>> perform the actual compression / decompression. Suppose one field is
>>> removed. Some implementations build that field and remove it, others may
>>> simply not add that field. Doing one or the other depends on which hardware
>>> / software you are using.
>>>
>>>
>>>
>>> [Hannes] Your use case makes sense to me (if IPsec is still going to be
>>> used in this environment in the future). You should maybe add text about
>>> this use case to your document. This would provide a lot of extra context
>>> for the reader.
>>>
>> <mglt>
>> I agree. This context is currently not being mentioned as we were mostly
>> focused on the profile itself, but we will add some context.
>> </mglt>
>>
>>> The feedback on the list in response to the call for adoption was
>>> confusing to me. Someone was saying “I could use it for ANIMA” and others
>>> said “I could use it for LPWAN”. I don’t believe those use cases are
>>> realistic.
>>>
>>>
>>>
>>> I have, however, heard about uses of WireGuard on Linux-based IoT
>>> devices (these are non-constrained devices, obviously) with the argument
>>> that it is simple to use and efficient.
>>>
>>>
>>>
>>> I believe it is worthwhile to think about the motivation of using
>>> WireGuard instead of IPsec/IKEv2 instead of spending a lot of time on yet
>>> another tiny optimization.
>>>
>>>
>>>
>>> For ESP, I have in mind wireguard performs 10 % / 15 % better in
>>> terms of throughput for Chacha and AES-GCM, but I do not know enough to
>>> tell if this is due to a specific setting or whether there is an
>>> implementation/systems reasons for it. I hardly see the packet format being
>>> an issue but of course I might be wrong. Of course if one can improve ESP
>>> we should do it and that is part of the evolution of ESP.
>>>
>>>
>>>
>>> [Hannes] Paul responded to this aspect already. I have not done an
>>> analysis but it would be good to talk about this topic in some document so
>>> that two sides of the story can be described.
>>>
>>
>> <mglt>
>> I agree, but that seems to me a separate document.
>> </mglt>
>>
>>>
>>>
>>> Hence, I would aim for a more ambitious goal: Make IPsec/IKEv2 work well
>>> on Linux-based IoT devices (*)
>>>
>>> It would be interesting to understand what you think should be improved
>>> with the current IPsec/IKEv2. We have defined minimal versions of IKEv2/ESP
>>> that go into the simplification of the code. I think we could do more to
>>> ease the configuration, and probably the yang model that the WG are a good
>>> start - at least we are thinking of leveraging from these.
>>>
>>>
>>>
>>> [Hannes] I would like a document I could point to whenever I run into
>>> the next “Wireguard is so much better than IPsec” discussion. If, as part
>>> of this write-up, we find out that there are gaps, I would like those to be
>>> fixed. Reading Paul’s email, I think he is saying that there are not gaps.
>>> Everything is just fine.
>>>
>>>
>>>
>> <mglt>
>> It might be interesting and probably the topic of another thread. I think
>> wireguard positioned itself toward IPsec/IKEv2 which could be a
>> good starting point. I guess that is what makes it hard is that there are
>> multiple implementations/deployment of IPsec. </mglt>
>>
>>>
>>>
>>> Ciao
>>>
>>> Hannes
>>>
>>>
>>>
>>
>>
>> --
>> Daniel Migault
>> Ericsson
>>
>>
>
> --
> Daniel Migault
> Ericsson
>
>

-- 
Daniel Migault
Ericsson
_______________________________________________
IPsec mailing list
IPsec@ietf.org
https://www.ietf.org/mailman/listinfo/ipsec

Reply via email to