Project

General

Profile

Actions

Task #4989

closed

Error out if both localhop_security and auto_prefix_propagate are enabled

Added by Davide Pesavento over 5 years ago. Updated about 5 years ago.

Status:
Closed
Priority:
Normal
Assignee:
Category:
RIB
Target version:
Start date:
Due date:
% Done:

100%

Estimated time:

Description

We should give a clear error message rather than misbehaving when both sections are enabled in nfd.conf.

https://www.lists.cs.ucla.edu/pipermail/nfd-dev/2019-August/003755.html


Related issues 1 (0 open1 closed)

Blocks NFD - Task #5045: Release 0.7.0ClosedAlex Afanasyev

Actions
Actions #1

Updated by Junxiao Shi over 5 years ago

Disagree. The proper solution of the root cause is letting every node have a different command prefix for prefix registrations, as described in #3142 and #3143.

Actions #2

Updated by Davide Pesavento over 5 years ago

Oh, I don't disagree with fixing the root issues, but given that there has been no progress in 4 years, I don't expect them to be resolved any time soon. In the meantime, we should clearly communicate to our users that the two settings are mutually incompatible.

Actions #3

Updated by Wenkai Zheng over 5 years ago

Hi,for error message, which part do you want it to add in nfd.conf.sample.in,on both localhop_security part and auto_prefix_propagate part?

Actions #4

Updated by Wenkai Zheng over 5 years ago

  • Assignee set to Wenkai Zheng
Actions #5

Updated by Davide Pesavento over 5 years ago

You can add a note about the incompatibility in nfd.conf.sample.in, in both sections, but that's not the main goal of this task. The "error message" mentioned in the description must be raised by NFD at runtime, if the config is incorrect. That means throwing a ConfigFile::Error exception. There are plenty of similar cases in the codebase, for instance take a look at daemon/face/*-factory.cpp.

Actions #6

Updated by Wenkai Zheng over 5 years ago

Thanks for that example,I am thinking the config file is related with rib/service.cpp,and there is a ApplyConfig function,if the section has localhop_security already,and in next loop,it has auto_prefix_propagate,should this situation be incorrect for throwing exception?

Actions #7

Updated by Wenkai Zheng over 5 years ago

Is ApplyConfig function in rib/service.cpp a right place to add code ?

Actions #8

Updated by Ju Pan over 5 years ago

Wenkai Zheng wrote:

Is ApplyConfig function in rib/service.cpp a right place to add code ?

I think you are targeting at the correct file. But it seems more likely that the function you should work on is Service::checkConfig. E.g. if in a loop you see CFG_LOCALHOP_SECURITY and in another loop you see CFG_PREFIX_PROPAGATE, you need to throw an error.

Actions #9

Updated by Wenkai Zheng over 5 years ago

  • % Done changed from 0 to 90
Actions #10

Updated by Davide Pesavento about 5 years ago

  • Status changed from New to Code review
  • Target version set to v0.7

Apparently NFD-Android enables both these sections in the default config. Anyone knows why?

Actions #11

Updated by Ju Pan about 5 years ago

A basic question: what is the problem when both localhop_security and auto_prefix_propagate are enabled?

My understanding is there are only two combinations:

  1. localhost + auto_prefix_propagate: prefix registrations on NFD are propagated to the connected gateway router
  2. localhop: NFD expects prefix registrations from apps running on remote machines.

Why can't localhop work with auto_prefix_propagte? I must misunderstand something here.

Thanks in advance.

Actions #12

Updated by Alex Afanasyev about 5 years ago

Davide Pesavento wrote:

Apparently NFD-Android enables both these sections in the default config. Anyone knows why?

This was done in commit:449a431db2d67d98bb7d6aaad35696fdd26ed0ca to "fix" self-learning, with the disclaimer that this is a temporary solution and be replaced with the proper
trust management inside NDN android app later.

Actions #13

Updated by Davide Pesavento about 5 years ago

Ah thanks, I remember now. It shouldn't be a problem then. Self-learning is switching to its own validator instead of abusing the localhop validator. So NFD-Android can simply disable localhop_security again when it gets updated to the new NFD (and enable prefix_announcement_validation for self-learning).

Actions #14

Updated by Davide Pesavento about 5 years ago

Actions #15

Updated by Davide Pesavento about 5 years ago

  • Status changed from Code review to Closed
  • % Done changed from 90 to 100
Actions

Also available in: Atom PDF