Skip to main content

Reed-Solomon Forward Error Correction (FEC) Schemes
draft-ietf-rmt-bb-fec-rs-05

Revision differences

Document history

Date Rev. By Action
2007-12-13
05 (System) IANA Action state changed to RFC-Ed-Ack from Waiting on RFC Editor
2007-12-13
05 (System) IANA Action state changed to Waiting on RFC Editor from In Progress
2007-12-13
05 (System) IANA Action state changed to In Progress from Waiting on Authors
2007-12-12
05 Amy Vezza State Changes to RFC Ed Queue from Approved-announcement sent by Amy Vezza
2007-12-11
05 Amy Vezza IESG state changed to Approved-announcement sent
2007-12-11
05 Amy Vezza IESG has approved the document
2007-12-11
05 Amy Vezza Closed "Approve" ballot
2007-12-11
05 (System) IANA Action state changed to Waiting on Authors from In Progress
2007-12-11
05 (System) IANA Action state changed to In Progress
2007-11-30
05 (System) Removed from agenda for telechat - 2007-11-29
2007-11-29
05 Amy Vezza State Changes to Approved-announcement to be sent from IESG Evaluation by Amy Vezza
2007-11-29
05 (System) [Ballot Position Update] New position, No Objection, has been recorded for Sam Hartman by IESG Secretary
2007-11-29
05 David Ward [Ballot Position Update] New position, No Objection, has been recorded by David Ward
2007-11-29
05 Mark Townsley [Ballot Position Update] New position, No Objection, has been recorded by Mark Townsley
2007-11-29
05 Dan Romascanu [Ballot Position Update] New position, No Objection, has been recorded by Dan Romascanu
2007-11-29
05 Chris Newman [Ballot Position Update] New position, No Objection, has been recorded by Chris Newman
2007-11-29
05 Jon Peterson [Ballot Position Update] New position, No Objection, has been recorded by Jon Peterson
2007-11-28
05 Tim Polk
[Ballot comment]
The authors should be commended for the great improvement in the Security Considerations
section between draft -03 and -05.  The current text is …
[Ballot comment]
The authors should be commended for the great improvement in the Security Considerations
section between draft -03 and -05.  The current text is probably *too* prescriptive, given that
the broad applicability of the Reed Solomon FEC scheme.  I can not in good conscience
block this document for being too perscriptive, since the changes were a vigorous response to
a secdir review, but I do believe that the points Steve Kent raised in his re-review should be
addressed.  I have appended his re-review comments below.

--- re-review comments on fec-rs section 9 (security considerations)  ---

I appreciate the efforts of the authors to make this section more precise and technically accurate.  However, in retrospect, I wonder if a document that is so broad in its scope of applicability (it contains no normative references to ANY specific protocols for multicast content distribution) ought to make statements about requirements for specific security mechanisms. I think it might be appropriate to remove the MAYs and SHOULDs from this section, and just cite examples of relevant IETF standards that are probably appropriate for use in this context. Also, the authors need not assume the burden of making security recommendations for all multicast content distribution schemes.  They should focus only on the need for such security relative to use of FEC. This is what they sate in the intro to section 9, but the text that follows tends to ignore this statement in most instances.

Section 9.2.1

        IPsec is misspelled.

        The use of "access control" here seems a bit odd.  We usually say that encryption is employed to provide confidentiality for objects during transmission (or in storage).  We say that access control is afforded to objects in storage, or to machines or networks. Finally, since the focus of this document is use of FEC in a multicast context, this section should refer to MSEC documents that describe use of IPsec confidentiality in that context, not just RFC 4303, if the section is retained.

        I think this subsection should be removed, or substantially reduced in size, since the authors note that there appear to be no confidentiality implications of using FEC in this context.

Section 9.2.2

        the discussion of object-level integrity and authentication discusses PKCS #1. I think that a reference to RFC 3852 (CMS) would be more appropriate, as it is standards track while PKCS #1 is Informational.  Also I question the use of MAY here, given the overall flavor of this document, and the lack of a similar requirements statement for any of the other alternatives presented in this subsection.

        The discussion of ECC use needs to be improved. First, it is not clear that ECC is fast enough and imposes low enough overhead to make it an acceptable per-packet solution in all contexts, contrary to what the text here suggests.  Also, the comments about ECC patent claims should be softened (and the phrase "proprietary patents" is poor English).

        TESLA may be fine in some contexts, but here too the authors seem to endorse it too broadly, given the very general nature of the multicast content distribution contexts where the FEC technology might be employed. Soften the text a bit here as well.

        The very brief discussion of key management here is probably not worth including, since it is bereft of any citations to relevant IETF standards.

        Since IETF specs like this are oriented toward protocol developers, the following statement seems odd: "It is up to the developer and deployer, who know the security requirements and features of the target application area, to define which solution is the most appropriate."  Just refer to the content distribution  protocol developers, not users or "deployers."

Section 9.3

        The recommendation for use of an XML signature to protect FEC OTI when it is carried in an FDT Instance makes sense, given that this data structure is an XML construct. If FEC OTI is sent out-of-band, then the corresponding recommendation should be more specific, e.g., to use CMS, rather than just saying "digitally signing it."
2007-11-28
05 Tim Polk [Ballot Position Update] New position, No Objection, has been recorded by Tim Polk
2007-11-28
05 Tim Polk
[Ballot comment]
The authors should be commended for the great improvement in the Security Considerations
section between draft -04 and -05.  The current text is …
[Ballot comment]
The authors should be commended for the great improvement in the Security Considerations
section between draft -04 and -05.  The current text is probably *too* prescriptive, given that
the broad applicability of the Reed Solomon FEC scheme.  I can not in good conscience
block this document for being too perscriptive, since the changes were a vigorous response to
a secdir review, but I do believe that the points Steve Kent raised in his re-review should be
addressed.  I have appended his re-review comments below.

--- re-review comments on fec-rs section 9 (security considerations)  ---

I appreciate the efforts of the authors to make this section more precise and technically accurate.  However, in retrospect, I wonder if a document that is so broad in its scope of applicability (it contains no normative references to ANY specific protocols for multicast content distribution) ought to make statements about requirements for specific security mechanisms. I think it might be appropriate to remove the MAYs and SHOULDs from this section, and just cite examples of relevant IETF standards that are probably appropriate for use in this context. Also, the authors need not assume the burden of making security recommendations for all multicast content distribution schemes.  They should focus only on the need for such security relative to use of FEC. This is what they sate in the intro to section 9, but the text that follows tends to ignore this statement in most instances.

Section 9.2.1

        IPsec is misspelled.

        The use of "access control" here seems a bit odd.  We usually say that encryption is employed to provide confidentiality for objects during transmission (or in storage).  We say that access control is afforded to objects in storage, or to machines or networks. Finally, since the focus of this document is use of FEC in a multicast context, this section should refer to MSEC documents that describe use of IPsec confidentiality in that context, not just RFC 4303, if the section is retained.

        I think this subsection should be removed, or substantially reduced in size, since the authors note that there appear to be no confidentiality implications of using FEC in this context.

Section 9.2.2

        the discussion of object-level integrity and authentication discusses PKCS #1. I think that a reference to RFC 3852 (CMS) would be more appropriate, as it is standards track while PKCS #1 is Informational.  Also I question the use of MAY here, given the overall flavor of this document, and the lack of a similar requirements statement for any of the other alternatives presented in this subsection.

        The discussion of ECC use needs to be improved. First, it is not clear that ECC is fast enough and imposes low enough overhead to make it an acceptable per-packet solution in all contexts, contrary to what the text here suggests.  Also, the comments about ECC patent claims should be softened (and the phrase "proprietary patents" is poor English).

        TESLA may be fine in some contexts, but here too the authors seem to endorse it too broadly, given the very general nature of the multicast content distribution contexts where the FEC technology might be employed. Soften the text a bit here as well.

        The very brief discussion of key management here is probably not worth including, since it is bereft of any citations to relevant IETF standards.

        Since IETF specs like this are oriented toward protocol developers, the following statement seems odd: "It is up to the developer and deployer, who know the security requirements and features of the target application area, to define which solution is the most appropriate."  Just refer to the content distribution  protocol developers, not users or "deployers."

Section 9.3

        The recommendation for use of an XML signature to protect FEC OTI when it is carried in an FDT Instance makes sense, given that this data structure is an XML construct. If FEC OTI is sent out-of-band, then the corresponding recommendation should be more specific, e.g., to use CMS, rather than just saying "digitally signing it."
2007-11-28
05 Russ Housley
[Ballot comment]
From Gen-ART Review by Elwyn Davies.

  s9.2.1:
  s/packet per packet/packet-by-packet/
  s/Even if we mention these attacks/Although these attacks are described/ …
[Ballot comment]
From Gen-ART Review by Elwyn Davies.

  s9.2.1:
  s/packet per packet/packet-by-packet/
  s/Even if we mention these attacks/Although these attacks are described/

  s9.2.2, para 1:
  s/may be in some case/may be in some cases/

  s9.2.2, TESLA bullet:
  s/Yet/However/

  s9.2.2, last para:
  s/Nonetheless, in case there is any concern of the threat of object corruption/
  /Nonetheless, if there is any risk of object corruption/
2007-11-28
05 Russ Housley [Ballot Position Update] New position, No Objection, has been recorded by Russ Housley
2007-11-28
05 Ron Bonica [Ballot Position Update] New position, No Objection, has been recorded by Ron Bonica
2007-11-27
05 Ross Callon [Ballot Position Update] New position, No Objection, has been recorded by Ross Callon
2007-11-27
05 Jari Arkko [Ballot Position Update] New position, No Objection, has been recorded by Jari Arkko
2007-11-27
05 Lars Eggert [Ballot Position Update] New position, No Objection, has been recorded by Lars Eggert
2007-11-14
05 Magnus Westerlund State Changes to IESG Evaluation from Waiting for AD Go-Ahead::AD Followup by Magnus Westerlund
2007-11-14
05 Magnus Westerlund Placed on agenda for telechat - 2007-11-29 by Magnus Westerlund
2007-11-14
05 Magnus Westerlund [Ballot Position Update] New position, Yes, has been recorded for Magnus Westerlund
2007-11-14
05 Magnus Westerlund Ballot has been issued by Magnus Westerlund
2007-11-14
05 Magnus Westerlund Created "Approve" ballot
2007-11-12
05 (System) Sub state has been changed to AD Follow up from New Id Needed
2007-11-12
05 (System) New version available: draft-ietf-rmt-bb-fec-rs-05.txt
2007-10-26
05 Magnus Westerlund State Changes to Waiting for AD Go-Ahead::Revised ID Needed from Waiting for AD Go-Ahead by Magnus Westerlund
2007-10-25
05 (System) State has been changed to Waiting for AD Go-Ahead from In Last Call by system
2007-10-11
05 Amanda Baber
IANA Last Call comments:

The IANA Considerations section does not appear to have changed
since the document's first Last Call.

Assignment #1:

Upon approval of …
IANA Last Call comments:

The IANA Considerations section does not appear to have changed
since the document's first Last Call.

Assignment #1:

Upon approval of this document, the IANA will make the following
assignments in the "Reliable Multicast Transport (RMT) FEC
Encoding IDs and FEC Instance IDs - per [RFC5052]" registry
located at
http://www.iana.org/assignments/rmt-fec-parameters
sub-registry "ietf:rmt:fec:encoding
Fully-Specified FEC schemes (0-127)"

Value Description Reference
----- ------------------------------------------------- ---------
2 Reed-Solomon Codes over GF(2^^m) [RFC-rmt-bb-fec-rs-
03]
5 Reed-Solomon Codes over GF(2^^8) [RFC-rmt-bb-fec-rs-
03]

Assignment #2:

Upon approval of this document, the IANA will make the following
assignments in the "Reliable Multicast Transport (RMT) FEC
Encoding IDs and FEC Instance IDs - per [RFC5052]" registry
located at

http://www.iana.org/assignments/rmt-fec-parameters
sub-registry "ietf:rmt:fec:encoding:instance:129
ietf:rmt:fec:encoding = 129 (Small Block Systematic FEC Codes)"

Value Description Reference
----- ------------------------------------------------- ---------
0 Reed-Solomon Codes over GF(2^^8) [RFC-rmt-bb-fec-rs-
03]


We understand the above to be the only IANA Actions for this
document.
2007-10-11
05 Amy Vezza Last call sent
2007-10-11
05 Amy Vezza State Changes to In Last Call from Last Call Requested by Amy Vezza
2007-10-11
05 Magnus Westerlund State Changes to Last Call Requested from AD Evaluation::AD Followup by Magnus Westerlund
2007-10-11
05 Magnus Westerlund Last Call was requested by Magnus Westerlund
2007-10-10
05 (System) Sub state has been changed to AD Follow up from New Id Needed
2007-10-10
04 (System) New version available: draft-ietf-rmt-bb-fec-rs-04.txt
2007-10-08
05 Magnus Westerlund State Changes to AD Evaluation::Revised ID Needed from Waiting for AD Go-Ahead by Magnus Westerlund
2007-10-08
05 Magnus Westerlund Will need new IETF last call at Proposed Standard. However, first comments from reviewers should be taken care of.
2007-10-08
05 Magnus Westerlund Intended Status has been changed to Proposed Standard from Experimental
2007-10-04
05 (System) State has been changed to Waiting for AD Go-Ahead from In Last Call by system
2007-09-27
05 Samuel Weiler Request for Last Call review by SECDIR Completed. Reviewer: Stephen Kent.
2007-09-25
05 Amanda Baber
IANA Last Call comments:

Assignment #1:

Upon approval of this document, the IANA will make the following assignments in the "Reliable Multicast Transport (RMT) FEC …
IANA Last Call comments:

Assignment #1:

Upon approval of this document, the IANA will make the following assignments in the "Reliable Multicast Transport (RMT) FEC Encoding IDs and FEC Instance IDs - per [RFC5052]" registry located at
http://www.iana.org/assignments/rmt-fec-parameters
sub-registry "ietf:rmt:fec:encoding
Fully-Specified FEC schemes (0-127)"

Value Description Reference
----- ------------------------------------------------- ---------
2 Reed-Solomon Codes over GF(2^^m) [RFC-rmt-bb-fec-rs-
03]
5 Reed-Solomon Codes over GF(2^^8) [RFC-rmt-bb-fec-rs-
03]

Assignment #2
Upon approval of this document, the IANA will make the following assignments in the "Reliable Multicast Transport (RMT) FEC Encoding IDs and FEC Instance IDs - per [RFC5052]" registry located at
http://www.iana.org/assignments/rmt-fec-parameters
sub-registry "ietf:rmt:fec:encoding:instance:129
ietf:rmt:fec:encoding = 129 (Small Block Systematic FEC Codes)"

Value Description Reference
----- ------------------------------------------------- ---------
0 Reed-Solomon Codes over GF(2^^8) [RFC-rmt-bb-fec-rs-
03]


We understand the above to be the only IANA Actions for this document.
2007-09-20
05 Samuel Weiler Request for Last Call review by SECDIR is assigned to Stephen Kent
2007-09-20
05 Samuel Weiler Request for Last Call review by SECDIR is assigned to Stephen Kent
2007-09-20
05 Amy Vezza State Changes to In Last Call from Last Call Requested by Amy Vezza
2007-09-20
05 Magnus Westerlund Last Call was requested by Magnus Westerlund
2007-09-20
05 Magnus Westerlund State Changes to Last Call Requested from Publication Requested by Magnus Westerlund
2007-09-20
05 (System) Ballot writeup text was added
2007-09-20
05 (System) Last call text was added
2007-09-20
05 (System) Ballot approval text was added
2007-09-10
05 Magnus Westerlund
draft-ietf-rmt-bb-fec-rs-03 intended for publication in the
"Experimental" category.

This writeup complies with RFC 4858.

  (1.a)  Who is the Document Shepherd for this document?  …
draft-ietf-rmt-bb-fec-rs-03 intended for publication in the
"Experimental" category.

This writeup complies with RFC 4858.

  (1.a)  Who is the Document Shepherd for this document?  Has the
          Document Shepherd personally reviewed this version of the
          document and, in particular, does he or she believe this
          version is ready for forwarding to the IESG for publication?

Document Shepherd is Brian Adamson, who has personally
reviewed this version of the document and believes it is ready
for forwarding to the IESG for publication.

  (1.b)  Has the document had adequate review both from key WG members
          and from key non-WG members?  Does the Document Shepherd have
          any concerns about the depth or breadth of the reviews that
          have been performed?

The document had adequate review both key WG members and from key non-WG members. 
A working, open source implementation of the FEC algorithms
this document describes has been available from Luigi Rizzo for several
years and has been applied in many applications.  The Reed-Solomon FEC
encoding technique is well-understood.  It's application to the packet erasure
channel for network transport is 10 years mature.
  (1.c)  Does the Document Shepherd have concerns that the document
          needs more review from a particular or broader perspective,
          e.g., security, operational complexity, someone familiar with
          AAA, internationalization or XML?

No additional reviews needed.

  (1.d)  Does the Document Shepherd have any specific concerns or
          issues with this document that the Responsible Area Director
          and/or the IESG should be aware of?  For example, perhaps he
          or she is uncomfortable with certain parts of the document, or
          has concerns whether there really is a need for it.  In any
          event, if the WG has discussed those issues and has indicated
          that it still wishes to advance the document, detail those
          concerns here.  Has an IPR disclosure related to this document
          been filed?  If so, please include a reference to the
          disclosure and summarize the WG discussion and conclusion on
          this issue.

There are no specific concerns or known IPR issues with this document.

  (1.e)  How solid is the WG consensus behind this document?  Does it
          represent the strong concurrence of a few individuals, with
          others being silent, or does the WG as a whole understand and
          agree with it?

This document represent a solid consensus of the RMT WG.

  (1.f)  Has anyone threatened an appeal or otherwise indicated extreme
          discontent?  If so, please summarise the areas of conflict in
          separate email messages to the Responsible Area Director.  (It
          should be in a separate email because this questionnaire is
          entered into the ID Tracker.)

No notable discontent.

  (1.g)  Has the Document Shepherd personally verified that the
          document satisfies all ID nits?  (See
          http://www.ietf.org/ID-Checklist.html and
          http://tools.ietf.org/tools/idnits/).  Boilerplate checks are
          not enough; this check needs to be thorough.  Has the document
          met all formal review criteria it needs to, such as the MIB
          Doctor, media type and URI type reviews?

There are three outdated Informative References that can be repaired immediately:

== Outdated reference: draft-ietf-rmt-fec-bb-revised has been published as
    RFC 5052

  == Outdated reference: A later version (-09) exists of
    draft-ietf-rmt-bb-fec-raptor-object-08

  == Outdated reference: A later version (-05) exists of
    draft-ietf-rmt-pi-norm-revised-04
  (1.h)  Has the document split its references into normative and
          informative?  Are there normative references to documents that
          are not ready for advancement or are otherwise in an unclear
          state?  If such normative references exist, what is the
          strategy for their completion?  Are there normative references
          that are downward references, as described in [RFC3967]?  If
          so, list these downward references to support the Area
          Director in the Last Call procedure for them [RFC3967].

The document splits its references into normative and
informative. No Downward References.

  (1.i)  Has the Document Shepherd verified that the document IANA
          consideration section exists and is consistent with the body
          of the document?  If the document specifies protocol
          extensions, are reservations requested in appropriate IANA
          registries?  Are the IANA registries clearly identified?  If
          the document creates a new registry, does it define the
          proposed initial contents of the registry and an allocation
          procedure for future registrations?  Does it suggest a
          reasonable name for the new registry?  See [RFC2434].  If the
          document describes an Expert Review process has Shepherd
          conferred with the Responsible Area Director so that the IESG
          can appoint the needed Expert during the IESG Evaluation?

The IANA consideration section exists, it is consistent with the rest
of the document and is consistent with the registration guidelines
specified in draft-ietf-rmt-fec-bb-revised. No new registry is
defined. No Expert Review Process is necessary for the IANA assignments
requested by this document.

  (1.j)  Has the Document Shepherd verified that sections of the
          document that are written in a formal language, such as XML
          code, BNF rules, MIB definitions, etc., validate correctly in
          an automated checker?

The documents contains no section written in formal language.

  (1.k)  The IESG approval announcement includes a Document
          Announcement Write-Up.  Please provide such a Document
          Announcement Write-Up?  Recent examples can be found in the
          "Action" announcements for approved documents.  The approval
          announcement contains the following sections:

          Technical Summary
            Relevant content can frequently be found in the abstract
            and/or introduction of the document.  If not, this may be
            an indication that there are deficiencies in the abstract
            or introduction.

          Working Group Summary
            Was there anything in WG process that is worth noting?  For
            example, was there controversy about particular points or
            were there decisions where the consensus was particularly
            rough?

          Document Quality
            Are there existing implementations of the protocol?  Have a
            significant number of vendors indicated their plan to
            implement the specification?  Are there any reviewers that
            merit special mention as having done a thorough review,
            e.g., one that resulted in important changes or a
            conclusion that the document had no substantive issues?  If
            there was a MIB Doctor, Media Type or other expert review,
            what was its course (briefly)?  In the case of a Media Type
            review, on what date was the request posted?

          Personnel
            Who is the Document Shepherd for this document?  Who is the
            Responsible Area Director?


Document Announcement Write-Up follows.

Technical Summary

    This document is an optional Building Block usable to fully define
    an RMT Protocol.  It fully-specifies Forward Error Correction
    (FEC) Codes based on the well-known Reed-Solomon algorithm for application
    in the packet erasure channel as consistent with RMT Protocol needs.  This
    is done within the guidelines of draft-ietf-rmt-fec-bb-revised. It also
    specifies procedures and packet-header fields, as required by
    draft-ietf-rmt-fec-bb-revised.

    The combination of this document and draft-ietf-rmt-fec-bb-revised
    allows the implementation of an interoperable Forward Error Correction
    scheme usable in the context of an RMT transport protocol (e.g.
    LCT/ALC or NORM).
   
    The Reed-Solomon code specified is a systematic code.  Parity symbols
    are generated using Galois field mathmatics.  A range of block sizes
    with varying computational complexity are covered with codes with
    individual symbol sizes from 2^^8..2^^16 described.  Reed-Solomon codes
    belong to the class of Maximum Distance Separable symbols from any set
    of k received symbols.  This idealized property allows adaptation to
    maximumally-efficient repair strategies for RMT protocol like NORM
    that use FEC-based repair.
Working Group Summary

    There is consensus in the WG to publish these documents.

Document Quality

    A very mature working, open source implementation of the FEC algorithms
    this document describes is available.  The FEC implementation has been used
    in working RMT NORM implementations.  The Reed-Solomon technique described
    has been successfully used in reliable multicast transport for over 10 years.

Brian Adamson is the Document Shepherd.
Magnus Westerlund is the Responsible Area Director.
2007-09-10
05 Magnus Westerlund Draft Added by Magnus Westerlund in state Publication Requested
2007-05-07
03 (System) New version available: draft-ietf-rmt-bb-fec-rs-03.txt
2006-12-27
02 (System) New version available: draft-ietf-rmt-bb-fec-rs-02.txt
2006-06-26
01 (System) New version available: draft-ietf-rmt-bb-fec-rs-01.txt
2006-03-02
00 (System) New version available: draft-ietf-rmt-bb-fec-rs-00.txt