We are working on it with Kiran, I actually started yesterday to consider her latest feedback (2nd round) - not yet being pushed, but that should happen very soon.
Yours, Daniel On Thu, Jun 2, 2022 at 7:30 AM Eric Vyncke (evyncke) <evyn...@cisco.com> wrote: > As we are halfway between IETF-113 and IETF-114, it is time to make a > check as I have seen no revised version for those 2 ‘naming’ drafts. > > > > You may also have noticed that Ted’s ‘stub networking’ work is going in a > SNAC BoF at IETF-114 (please attend and contribute to the s...@ietf.org > mailing list). > > > > Therefore, the plan is to close Homenet early July 2022 if nothing changes. > > > > Hoping to see you in “Philly” to celebrate the achievments of Homenet ! > > > > Regards > > > > -éric > > > > *From: *homenet <homenet-boun...@ietf.org> on behalf of "Eric Vyncke > (evyncke)" <evyncke=40cisco....@dmarc.ietf.org> > *Date: *Thursday, 14 April 2022 at 09:16 > *To: *"homenet@ietf.org" <homenet@ietf.org> > *Cc: *"kiran.i...@gmail.com" <kiran.i...@gmail.com>, Michael Richardson < > mcr+i...@sandelman.ca>, Daniel Migault <mglt.i...@gmail.com>, Stephen > Farrell <stephen.farr...@cs.tcd.ie> > *Subject: *Re: [homenet] naming drafts > > > > Dear Homenet, > > > > After 9 months, it is time to resurrect this email thread and move forward > with the 'naming drafts', which are still in WG Last Call since May 2021: > > - draft-ietf-homenet-front-end-naming-delegation > > - draft-ietf-homenet-naming-architecture-dhc-options > > > > AT IETF-113, there was a meeting with two authors, the chairs, and I (as > the responsible AD for Homenet). The plan is to give the authors a chance > to issue a revised I-D considering Chris Blox's review as well as trying to > improve the readability and flow of the text (which suffers from multiple > revisions that have rendered the I-D difficult to read). Once done, the > chairs will close the WGLC and will request publication to continue the > process. This should be done by IETF-114 (July 2022) if not earlier. > > > > About the DynDNS discussion of last year, I am in favor of going forward > anyway with the homenet drafts and wait for the IETF Last Call + IESG > evaluation to get a broader scope than the Homenet WG on this very specific > topic. > > > > Final point, the chairs and I have decided that once those 2 drafts have > been approved by the IESG [1], then the Homenet WG can be closed after 11 > years [2]. > > > > Of course, feedback and comments on the above are welcome. > > > > Regards > > > > -éric > > > > [1] or if the publication is not requested before IETF-114, then I will > declare those two I-D as "dead" and proceed anyway with the closing of > Homenet. > > [2] a new home will need to be found for Ted Lemon's drafts on "stub > networking" > > > > *From: *homenet <homenet-boun...@ietf.org> on behalf of Daniel Migault < > mglt.i...@gmail.com> > *Date: *Tuesday, 13 July 2021 at 23:28 > *To: *Chris Box <chris.box.i...@gmail.com> > *Cc: *"homenet@ietf.org" <homenet@ietf.org> > *Subject: *Re: [homenet] naming drafts > > > > Hi, > > > > Thanks for the follow up Chris. I apologize for the delay. > > > > Yours, > > Daniel > > > > On Tue, Jun 22, 2021 at 12:31 PM Chris Box <chris.box.i...@gmail.com> > wrote: > > Daniel, > > > > On Wed, 16 Jun 2021 at 01:27, Daniel Migault <mglt.i...@gmail.com> wrote: > > > > The HNA SHOULD drop any packets arriving on the WAN interface that are > not issued from the DM. > > Depending how the communications between the HNA and the DM are secured, > only packets associated to that protocol SHOULD be allowed. > > > The separation looks good, but I'd like to tweak the second paragraph. By > "only packets associated to that protocol" do you mean destination port > filtering? > > > > To me IP and port filtering are implemented by the previous line. "only > packets associated with that protocol" to me means that only TLS packets > are allowed. The reason we are not mentioning TLS explicitly is that > other protocols may be used. > > > > Ah, I see, so this is about the payload of the packets. But surely > intelligent validation of the incoming packets is always going to happen? > This is a key property of any security protocol. > > If the DM is listening on TCP 443, and the incoming packet is not a TLS > Client Hello that it is happy with, it'll get ignored. > > If the DM is listening on UDP 500, and the incoming packet is not an > IKE_SA_INIT that it is happy with, it'll get ignored. > > > > So I'm not disagreeing with you, I'm just questioning whether the sentence > is needed. I don't really mind if it stays. > > This may not be necessary, but the reason I would prefer to keep it is to > head up that additional checks - when possible - may be performed in > addition to port filtering. So unless you have a strong preference, I would > prefer to keep this additional check that could be performed by the > terminating node or a firewall. > > > > > > I'm not concerned about the additional round trip. I was more concerned > that the DM could be implemented as a frontend/backend architecture. The > FQDN would resolve to the front end, and this is likely to be a small list > of addresses, or even a single address. But the backend servers would have > distinct, different addresses. Connections from the DM to the HNA might be > initiated from the backend. If the HNA only looked up the FQDN, it would > drop legitimate connections. This suggests we need a way to inform the HNA > of the set of legitimate source addresses. > > > > > > What did you think of this last point? > > > > I see your point. The architecture document envisioned this case by > specifying the dm_acl parameter in the informative section 14. > > We did not include it into the DHCP option as we were requested to > implement the simplest use case that is envisioned. My understanding was > that DHCP Options had some history where complex options had been designed > but hardly used. > > That said, if that is something you believe is really needed, we may bring > this discussion and add this parameter to the current DHCP Options. It > still represents a minor change as already considered in the architecture > document. > > > > Another alternative may also consider adding an extension so the acl may > be negotiated through the control channel, which I see more scalable than > designing large DHCP options. At that point, I would rather keep the > architecture as it is a let such option for future work - though fairly > easy to set. > > > > > > > > > > Chris > > > > > -- > > Daniel Migault > > Ericsson > -- Daniel Migault Ericsson
_______________________________________________ homenet mailing list homenet@ietf.org https://www.ietf.org/mailman/listinfo/homenet