Dave Thaler - le (m/j/a) 4/4/09 4:20 AM:
-----Original Message-----
From: james woodyatt [mailto:[email protected]]
Sent: Friday, April 03, 2009 4:01 PM
To: Dave Thaler
Cc: NAT66 HappyFunBall
Subject: Re: [nat66] RSIP and NAT66
On Apr 3, 2009, at 14:56, Dave Thaler wrote:
RSIP is quite different from SAF, although it attempts to achieve
end-to-end transparency as well. In the taxonomy of solution classes
in draft-iab-ipv6-nat, RSIP is in the second class (tunneling),
whereas
NAT66 and hence SAF fall into the third class (translation).
My understanding of SAF, from the presentation you gave at the 6AI
session at IETF 74, is that it too is a tunneling solution-- just that
the tunnel is compressed on the wire. From the perspective of an
application in a SAF-enabled host, it looks like there is a tunnel
interface with an address assigned from the exterior realm. Transport
endpoints on the host think they are bound to their exterior realm
address mapped by the NAT66 gateway.
That's not correct. The SAF model is a translate-and-detranslate model.
So the differences between RSIP and NAT66+SAF are:
* RSIP uses tunneling, whereas NAT66+SAF use translation. Tunneling
introduces MTU issues, and has greater incentive issues since you
get nothing until you update both hosts and gateways, whereas
with translation you get something when you only deploy a gateway
(the slide I showed with some happy apps and some unhappy apps).
I'll grant that RSIP, as it was published, did not compress the
tunnel, and so it would have the MTU issue that people are worrying
about because of the inner/outer headers. If a compliant NAT66
gateway were also to comprise an RSIP-derived service that optionally
permitted the tunnel to be compressed as you described in your
presentation, then that would seem to cover all the cases, wouldn't
it? Hosts and/or networks could decide whether they want compressed
or uncompressed tunnels.
The point I'm trying to raise is that we should insist that no NAT66
gateways be deployed unless they already have the upgrade path for
hosts to permit the restoration of transparency. Whether the tunnels
or compressed or not is of only secondary interest to me at this point.
The SAF model is an illustration that there's an upgrade path
without having to change the NAT66 device, but you do have to change
the host (just not at the same time).
* RSIP requires hosts to know the IP address of the gateway,
whereas NAT66+SAF do not. As such, failover is better with
NAT66+SAF
since the gateway is stateless and routing can just reroute traffic
to the working exit/entry point.
Isn't Christian Huitema's point about multi-homing relevant here?
Any reference where the point is described?
In any event, if RSIP is extended to support tunnel compression, then
hosts would be freed from the requirement to know the interior realm
address of any particular NAT66 gateway; they could just send to the
exterior realm destination address and rely on the network to forward
traffic accordingly. Hosts would still be at the mercy of the network
in the case of Christian's multi-homing scenario.
* RSIP requires (and specifies) a signaling protocol between the
host and the gateway. A SAF mechanism may or may not have such
a protocol. Minimally, all that's required is that it get the
inner/outer prefix if you're using NAT66 (or equivalent if you're
using another IPv6 NAT mechanism). It could get these from
some internal entity (like a DHCPv6 server), from the NAT itself
via a signaling protocol, or from an external entity more like
STUN/Teredo use. This flexibility is important to note since
if someone deploys a NAT66 today and then wants to do a SAF
mechanism, it means there are ways to do so that don't entail
upgrading the NAT66 device.
I'd like to see NAT66 service, if we're going to standardize one,
start at day one with a SAF mechanism, and I think that RSIP (or
perhaps its predecessor, NAR, if we want to ignore Christian's point
about multi-homing) could be a fine starting point for documents to
adopt in any working group process we might contemplate starting.
If we have the liberty of starting at day one with a SAF mechanism,
I would agree. However, if "vendors already have NAT66" but not
SAF then I don't know if we have that liberty (again I hope we do,
and I agree with you). NAR is perhaps one SAF mechanism worth
evaluation, and I expect there are others as well (Remi stated he
believes SAM is another SAF mechanism, for example, and I'm sure
the possibilities don't stop there).
Let me confirm here that SAM is intended in particular to restore e2e
transparency, and to support multihoming in an ingress-filtering
compatible way. It uses for this encapsulation with a stateless address
mapping. It doesn't need a new protocol.
Having comments from someone having taken the time to read the posted
draft-despres-sam-02 would be highly appreciated.
In my understanding, SAF does need encapsulation in the multihoming
case. The question is then whether, to keep things simpler,
encapsulation should be authorized also in the single-homing case, or
whether it should be forbidden wherever it is feasible to avoid it. (The
first option seems preferable for me. "Simplicity is the ultimate
sophistication" - Leonardo da Vinci)
Last point: encapsulation can advantageously be used as a sign that e2e
transparency is expected, even in the single-homing case. Conversely,
absence of encapsulation can be used as an indication that address
modification is accepted or expected: accepted if due to an inability to
do it, which ensures backward compatibility with legacy IPv6 hosts;
expected if due to a conscious desire for address modification, e.g. for
some privacy reason.
However your main point, I gather, is that if we publish NAT66 as
an RFC, we should really simultaneously publish some SAF mechanism.
I am of the same opinion here.
Going further, why to exclude publishing an e2e transparent solution
before a non-transparent one, if this is possible. (Of course, it can
only be possible if tried :-))
RD
_______________________________________________
nat66 mailing list
[email protected]
https://www.ietf.org/mailman/listinfo/nat66