Project

General

Profile

Task #4424

Investigate solutions to fetch keys reliably when DirectFetch fails to fetch a key from neighbors' content store

Added by Ashlesh Gawande over 2 years ago. Updated over 2 years ago.

Status:
New
Priority:
Normal
Assignee:
-
Target version:
Start date:
12/22/2017
Due date:
% Done:

0%

Estimated time:

Description

When a router receives an LSA, it sends an interest for the signing key back to the face from which the LSA is received. Since the neighbor that sent the LSA has verified the data, it must have retrieved the key and a copy of the key should be in its content store which can satisfy the router’s interest.
However, content store is opportunistic and cannot guarantee this (content could be replaced).

Currently we also use /localhop prefix for LSA - but it is under multicast strategy so situation is a little better.

We can restore the broadcast key prefix as earlier.

Long term solution is to have insert the keys and LSA into a local repo so other router's can retrieve independent of cache or nlsr.


Related issues

Related to NLSR - Feature #4448: Serve other routers' certificatesClosed01/09/2018

Actions
Related to NLSR - Feature #4868: Insert the keys and LSA into a local repo so other router's can retrieve independent of cache or nlsrNew

Actions

History

#1

Updated by Ashlesh Gawande over 2 years ago

  • Target version set to v0.6.0
#2

Updated by Lan Wang over 2 years ago

  • Subject changed from Investigate alternatives to DirectFetch to Investigate solutions to fetch keys reliably when DirectFetch fails to fetch a key from content store
#3

Updated by Lan Wang over 2 years ago

  • Subject changed from Investigate solutions to fetch keys reliably when DirectFetch fails to fetch a key from content store to Investigate solutions to fetch keys reliably when DirectFetch fails to fetch a key from neighbors' content store
#4

Updated by Muktadir Chowdhury over 2 years ago

We agreed on the solution where whenever a router receives a LSA data from its neighbors, it will store the certificates needed to validate that data packet. So, a router can serve other routers' LSA data along with the certificates needed to validate it.

#5

Updated by Muktadir Chowdhury over 2 years ago

  • Related to Feature #4448: Serve other routers' certificates added
#6

Updated by Saurab Dulal about 1 year ago

  • Related to Feature #4868: Insert the keys and LSA into a local repo so other router's can retrieve independent of cache or nlsr added

Also available in: Atom PDF