Re: [homenet] pervasive v4

2011-11-15 Thread Hans Liu
On Tue, Nov 15, 2011 at 1:42 PM, Lorenzo Colitti lore...@google.com wrote:
 On Tue, Nov 15, 2011 at 09:42, Brian E Carpenter
 brian.e.carpen...@gmail.com wrote:

 If homenet is going to support arbitrary self-configuring topologies,
 and pervasive legacy IPv4 is required, we'd surely end up recommending
 NAT444-within-the-home as the only remotely practicable approach.

 Hans from D-Link suggests that another option is simply to bridge IPv4
 packets and route IPv6 packets.

To be very honest, if you have two D-Link router at home, you put one
after another, it won't work today. I believe the problem is quite
general a case to many NAT boxes today since they all share
192.168.0.0/24 or 192.168.1.0/24.  So what I told Lorenzo is that, in
that case I would like to disable NAT and route IPv6.

Regards,
Hans
___
homenet mailing list
homenet@ietf.org
https://www.ietf.org/mailman/listinfo/homenet


Re: [homenet] secret sharing among devices

2011-11-15 Thread Ted Lemon
On Nov 15, 2011, at 5:10 PM, Joe Touch to...@isi.edu wrote:
 I'll remember that next time I login using the iPad to alter its config ;-)

IETF geeks are not the target end user!   :)

___
homenet mailing list
homenet@ietf.org
https://www.ietf.org/mailman/listinfo/homenet


Re: [homenet] secret sharing among devices

2011-11-15 Thread Thomas Herbst
Like wifi protected setup? Push button, pass phrase, near field coms and usb 
stick, recently reduced to push button and pass phrase. 

Not an ietf thing. 


- Original Message -
From: Ted Lemon [mailto:mel...@fugue.com]
Sent: Tuesday, November 15, 2011 03:19 AM
To: Thomas Herbst
Cc: Michael Richardson m...@sandelman.ca; homenet homenet@ietf.org; Thomas 
Herbst
Subject: Re: [homenet] secret sharing among devices

On Nov 15, 2011, at 6:40 PM, Thomas Herbst ther...@silverspringnet.com wrote:
 Ignoring the transfer mechanism for a moment, why would a home networking
 vendor put this on their products?

The point of it is to prevent problems that would otherwise occur.   For any 
home router that has hard-wired ethernet ports, we already have a potential 
solution to this problem that prevents accidental network merges, although I 
guess we'd have to talk someone in the IEEE into putting forth the actual 
802.xxx protocol that would do what we need.

The point is that two devices that haven't physically touched somehow hadn't 
ought to automatically form a network together.   Believe me, if they do, 
that'll generate plenty of support calls.

___
homenet mailing list
homenet@ietf.org
https://www.ietf.org/mailman/listinfo/homenet


Re: [homenet] pervasive v4

2011-11-15 Thread Acee Lindem
+1 

On Nov 15, 2011, at 12:49 AM, Lorenzo Colitti wrote:

 On Tue, Nov 15, 2011 at 11:04, Erik Nordmark nordm...@cisco.com wrote:
 On 11/14/11 6:19 PM, Brian E Carpenter wrote:
 Yes, but then we're extending v4 and expecting homenets to run (presumably) 
 RIP.
 
 Why RIP? Same protocol between the home routers as we will pick for routing 
 IPv6 in the home.
 
 The primitives you have to configure and renumber IPv6 hosts (multiple 
 addresses, multiple RAs and address deprecation, and so on) are different 
 from the ones we have in IPv4 (essentially, DHCPv4 and NAT).
 
 So I don't think we will be able to take what we do in IPv6 and apply it 
 as-is to IPv4. Instead, I think we'll have to either NAT everywhere (like we 
 do today) or bridge everywhere.
 ___
 homenet mailing list
 homenet@ietf.org
 https://www.ietf.org/mailman/listinfo/homenet



smime.p7s
Description: S/MIME cryptographic signature
___
homenet mailing list
homenet@ietf.org
https://www.ietf.org/mailman/listinfo/homenet


Re: [homenet] Comments on draft-acee-ospf-ospfv3-autoconfig-00

2011-11-15 Thread Michael Richardson

 Lorenzo == Lorenzo Colitti lore...@google.com writes:
Lorenzo 4. For security, I think we should pick an auth scheme and
Lorenzo stick to it, otherwise
Lorenzo it will just lead to fragmentation. Some pre-shared key
Lorenzo scheme might be adequate; I don't know much about security
Lorenzo so I don't really care what it is, but I do think we need
Lorenzo to have one and it needs to be the same for 
Lorenzo everyone. I think we should say MUST here.

So, let me go over the options in order to violently agree.

1) OSPF is multicast, so we can't use any bilteral key-agreement
   protocol on it's own.  Statically keyed AH can be used for multicast
   traffic, and a router can trivially ignore an AH validation failure in
   order to provide some diagnostics by evaluating the contents of
   the OSPF frame. (This requires hacks on platforms that already have
   IPsec, but if you implement the AH inside the OSPF daemon)

   (so diagnostics can say, I saw router FOO on interface BLAH, but
   the key didn't match, so I ignored it, or even, I saw router FOO
   on interface BLAH, and since the key didn't match, I treated it as a
   guest network.  What router FOO thinks of the packets it receives is an
   open question)

2) While we could invoke some kind of group-KMP, these essentially work
   out to a series of bilateral trust relationships which results in the
   master machine giving out the pre-shared secret in a secure fashion.
   The bilateral trust mechanism needs to be anchored by something, 
   and you can invoke public key mechanisms, or... shared secret.

   Public key mechanisms with a leap-of-faith and then confirmation via UI,
   would be very cool, but completely exceeds our needs.  

3) my understanding is that OSPFv3 eliminated the plain-text HELLO and
   md5 methods. 

The major thing we need to specify for zOSPF is that we need to pick a
well-known SPI value for the AH header.  That SPI value will need to
specify an algorithm (HMAC-SHA1, HMAC-SHA2, HMAC-SHA3...) and perhaps a
key length.  We should publish a few choices for future interop, but we
will need to pick one MUST for today.  We can't really be resistant
against a bid-down attack, but even HMAC-SHA1 is pretty resistant today
(vs bare SHA1), and I think that we can count upon being able to specify
HMAC-SHA3 for this work.

-- 
]   He who is tired of Weird Al is tired of life!   |  firewalls  [
]   Michael Richardson, Sandelman Software Works, Ottawa, ON|net architect[
] m...@sandelman.ottawa.on.ca http://www.sandelman.ottawa.on.ca/ |device driver[
   Kyoto Plus: watch the video http://www.youtube.com/watch?v=kzx1ycLXQSE
   then sign the petition. 



pgpd7dddsM2V0.pgp
Description: PGP signature
___
homenet mailing list
homenet@ietf.org
https://www.ietf.org/mailman/listinfo/homenet


Re: [homenet] privacy vs subnet-id

2011-11-15 Thread Michael Richardson

 Brian == Brian E Carpenter Brian writes:
Brian The responsible parent, for example, who does not want to
Brian be fined for their kid's illegal downloads.

So, something that we could specify is some way to name the subnets,
and to communicate from the CPE router to the ISP about what is what,
particularly in the case where the CPE router is provided by and/or
partially managed by the ISP.

The goal here is to give the ISP some information the network topology
so that the ISP and the responsible parent can more easily work out who
is being complained about.  

Said communication doesn't necessarily mean a protocol between the CPE
router and ISP (although it could via INCH or MILE).  It could be as
simple as deciding upon a clear human readable textual description of the
network, something the responsible parent can copypaste from a web
interface to an email with the ISP.

-- 
]   He who is tired of Weird Al is tired of life!   |  firewalls  [
]   Michael Richardson, Sandelman Software Works, Ottawa, ON|net architect[
] m...@sandelman.ottawa.on.ca http://www.sandelman.ottawa.on.ca/ |device driver[
   Kyoto Plus: watch the video http://www.youtube.com/watch?v=kzx1ycLXQSE
   then sign the petition. 

___
homenet mailing list
homenet@ietf.org
https://www.ietf.org/mailman/listinfo/homenet


Re: [homenet] privacy vs subnet-id

2011-11-15 Thread Randy Turner
Once HomeNet is figured out, a real subsequent challenge will be to address 
how to translate any leftover configuration required for the end user.  This 
would be anything we couldn't figure out how to auto-configure. By translate 
I mean translating any geek-speak config concepts into equivalent mass market 
concepts that can be easily grasped by the average consumer. If we can't figure 
this out, and the resulting model has too much policy or buttons and levers to 
manipulate, then we're probably setting up a nice managed service offering for 
an NSP.

Randy



On Nov 15, 2011, at 7:36 AM, Michael Richardson m...@sandelman.ca wrote:

 
 Brian == Brian E Carpenter Brian writes:
Brian The responsible parent, for example, who does not want to
Brian be fined for their kid's illegal downloads.
 
 So, something that we could specify is some way to name the subnets,
 and to communicate from the CPE router to the ISP about what is what,
 particularly in the case where the CPE router is provided by and/or
 partially managed by the ISP.
 
 The goal here is to give the ISP some information the network topology
 so that the ISP and the responsible parent can more easily work out who
 is being complained about.  
 
 Said communication doesn't necessarily mean a protocol between the CPE
 router and ISP (although it could via INCH or MILE).  It could be as
 simple as deciding upon a clear human readable textual description of the
 network, something the responsible parent can copypaste from a web
 interface to an email with the ISP.
 
 -- 
 ]   He who is tired of Weird Al is tired of life!   |  firewalls  
 [
 ]   Michael Richardson, Sandelman Software Works, Ottawa, ON|net 
 architect[
 ] m...@sandelman.ottawa.on.ca http://www.sandelman.ottawa.on.ca/ |device 
 driver[
   Kyoto Plus: watch the video http://www.youtube.com/watch?v=kzx1ycLXQSE
   then sign the petition. 
 
 ___
 homenet mailing list
 homenet@ietf.org
 https://www.ietf.org/mailman/listinfo/homenet
 
___
homenet mailing list
homenet@ietf.org
https://www.ietf.org/mailman/listinfo/homenet


Re: [homenet] Comments on draft-acee-ospf-ospfv3-autoconfig-00

2011-11-15 Thread Carlos Pignataro
Hi Acee,

On 11/14/2011 10:11 PM, Acee Lindem wrote:
 
 On Nov 14, 2011, at 9:46 PM, Lorenzo Colitti wrote:
 
 On Tue, Nov 15, 2011 at 10:25, Acee Lindem acee.lin...@ericsson.com
 mailto:acee.lin...@ericsson.com wrote:

  1. I think the OSPFv3 router ID should not be based on the MAC
 address because that will encourage people to assume it's unique
 most of the time. I think we should just make it a pseudo-random
 number so it's clear that uniqueness is only guaranteed by
 collision detection and that collision detection needs to be robust.

 The draft requires duplicate Router-ID detection and resolution. I
 don't think that the fact that a portion of the MAC address is
 used as a first try is reason for this detection/resolution not to
 be implemented or tested.


 In my experience, giving people something that works most of the
 time will cause the cases where it doesn't work to break. I think
 it's better to explicitly provide no guarantees of uniqueness to make
 it clear that collision detection needs to be robust. 
 
 In the OSPF WG, the fact that a mechanism is specified implies that it
 is required to be robust. 
 
 Also, if we rely on collision detection, then what's the advantage of
 using the MAC address? We might as well as make it random all the time
 - that probably has a lower chance of collision anyway.
 
 I can't disagree with this argument and think we could go with a
 psuedo-random number seeded with a hash on the hardware fingerprint as
 the first try for router-id. 
 

As a side note, what's your opinion on citing and suggesting/requiring
http://tools.ietf.org/html/rfc5642#section-4 for manageability?

Thanks,

-- Carlos.


 I think you mean virtual links. They are definitely not needed in
 the auto-configured environment as they are for providing a
 backbone path through a transit area and the OSPFv3
 auto-configured routing domain assumes only a backbone area.


 Yes, virtual links. Do we need to state explicitly that they cannot
 exist and are not supported?
 
 Since the auto-configured routing domain is area 0 only, it is explicit. 
 
  

  3. Can we use normal LSAs to detect collisions? One idea would
 be if you see your own router ID in the list of neighbours of a
 network LSA or router LSA, then there is a collision. Will that
 work? If so we wouldn't need the hardware fingerprint at all.

 No. In an arbitrary topology, A router with a duplicate router-id
 can be multiple hops away.


 Yes, but router and network LSAs are flooded, so you'll hear them
 regardless of whether your duplicate is multiple hops away, no?
 
 Both OSPFv3 and OSPFv2 would consider an unrecognized self-originated
 LSA, i.e. having our Route-ID, as a stale LSA and purge it. This is a
 very basic mechanism of OSPF. I'd rather use a separate mechanism for
 duplicate Router-ID detection. I considered techniques involving the
 encoding some additional information in the Router-LSA but these all
 seemed to be hacked. 
 
 
  

 If the pre-shared key is hard-coded, it is no better than the
 OSPFv3 Interface Instance ID that is specified to prevent
 inadvertent adjacencies with routers not supporting the
 auto-configuration. If configuration of a pre-shared key is
 required, you no longer have auto-configuration.


 Sorry, that wasn't clear. What I meant to say is that we should pick
 one scheme (e.g., HMAC-SHA) and stick to it; we shouldn't support
 multiple schemes as that will lead to interoperability issues for
 devices that use one scheme and devices that use another scheme.
 
 The OSPFv3 Instance ID is part of the base OSPFv3 specification and I
 think it is a very good mechanism to prevent inadvertent adjacencies. If
 we need real authentication, we'll need a pre-shared key. I don't see
 any advantage of authentication with a well-known pre-shared key to
 prevent inadvertent adjacencies. 
 
 Thanks for the comments,
 Acee 
 
 
 
 
 ___
 homenet mailing list
 homenet@ietf.org
 https://www.ietf.org/mailman/listinfo/homenet
___
homenet mailing list
homenet@ietf.org
https://www.ietf.org/mailman/listinfo/homenet


Re: [homenet] Comments on draft-acee-ospf-ospfv3-autoconfig-00

2011-11-15 Thread Acee Lindem
Hi Michael,

On Nov 15, 2011, at 10:26 AM, Michael Richardson wrote:

 
 
 
 Lorenzo == Lorenzo Colitti lore...@google.com writes:
Lorenzo 4. For security, I think we should pick an auth scheme and
Lorenzo stick to it, otherwise
Lorenzo it will just lead to fragmentation. Some pre-shared key
Lorenzo scheme might be adequate; I don't know much about security
Lorenzo so I don't really care what it is, but I do think we need
Lorenzo to have one and it needs to be the same for 
Lorenzo everyone. I think we should say MUST here.
 
 So, let me go over the options in order to violently agree.
 
 1) OSPF is multicast, so we can't use any bilteral key-agreement
   protocol on it's own.  Statically keyed AH can be used for multicast
   traffic, and a router can trivially ignore an AH validation failure in
   order to provide some diagnostics by evaluating the contents of
   the OSPF frame. (This requires hacks on platforms that already have
   IPsec, but if you implement the AH inside the OSPF daemon)
 
   (so diagnostics can say, I saw router FOO on interface BLAH, but
   the key didn't match, so I ignored it, or even, I saw router FOO
   on interface BLAH, and since the key didn't match, I treated it as a
   guest network.  What router FOO thinks of the packets it receives is an
   open question)
 
 2) While we could invoke some kind of group-KMP, these essentially work
   out to a series of bilateral trust relationships which results in the
   master machine giving out the pre-shared secret in a secure fashion.
   The bilateral trust mechanism needs to be anchored by something, 
   and you can invoke public key mechanisms, or... shared secret.
 
   Public key mechanisms with a leap-of-faith and then confirmation via UI,
   would be very cool, but completely exceeds our needs.  
 
 3) my understanding is that OSPFv3 eliminated the plain-text HELLO and
   md5 methods. 
 
 The major thing we need to specify for zOSPF is that we need to pick a
 well-known SPI value for the AH header.  That SPI value will need to
 specify an algorithm (HMAC-SHA1, HMAC-SHA2, HMAC-SHA3...) and perhaps a
 key length.  We should publish a few choices for future interop, but we
 will need to pick one MUST for today.  We can't really be resistant
 against a bid-down attack, but even HMAC-SHA1 is pretty resistant today
 (vs bare SHA1), and I think that we can count upon being able to specify
 HMAC-SHA3 for this work.

We will soon have non-IPsec authentication for OSPFv3:

   http://www.ietf.org/id/draft-ietf-ospf-auth-trailer-ospfv3-10.txt 


The point that I don't understand from this E-mail thread is where the Security 
Association (SA) comes from to use for auto-configured OSPFv3 routers? 
I guess it is from a USB flash drive ;^)). Also, are you and Lorenzo suggesting 
we make authentication MANDATORY in for auto-configured OSPFv3 routers? 

Thanks,
Acee 



 
 -- 
 ]   He who is tired of Weird Al is tired of life!   |  firewalls  
 [
 ]   Michael Richardson, Sandelman Software Works, Ottawa, ON|net 
 architect[
 ] m...@sandelman.ottawa.on.ca http://www.sandelman.ottawa.on.ca/ |device 
 driver[
   Kyoto Plus: watch the video http://www.youtube.com/watch?v=kzx1ycLXQSE
  then sign the petition. 
 

___
homenet mailing list
homenet@ietf.org
https://www.ietf.org/mailman/listinfo/homenet


Re: [homenet] privacy vs subnet-id

2011-11-15 Thread Ted Lemon
On Nov 16, 2011, at 2:49 AM, Michael Richardson m...@sandelman.ca wrote:
 {why am I top-quoting?}
I don't know. 

 So, I agree with you about translating terminology, or at least, picking
 sufficiently unique (and multicultural) terminology such that the terms
 can be used unambiguously.
 
 The scenario I have in mind is:
1) ISP gets an abuse complaint about IP 
 2001:DB8:f00d:5634:0243:60ff:fefa:8842
 
2) ISP maps this via 2001:DB8:f00d:56/56 to customer FOO.
3) ISP contacts customer FOO about this issue, noting that
   it's on subnet-id 34.  No end-user is going to know 
   what 34 is, nor what 0243:60ff:fefa:8842 is, and
   given privacy extensions, that might be more random.
 
 So the question is, can we have a way for CPE router to unambiguously
 record/communicate that subnet-id is 34 was assigned to wifi guest
 network on ESSID garage-party.

It would certainly be handy if the homenet populated a reverse DNS tree that 
could be queried. 
___
homenet mailing list
homenet@ietf.org
https://www.ietf.org/mailman/listinfo/homenet


Re: [homenet] secret sharing among devices

2011-11-15 Thread Ted Lemon
On Nov 15, 2011, at 9:48 PM, Thomas Herbst ther...@silverspringnet.com wrote:
 Like wifi protected setup? Push button, pass phrase, near field coms and usb 
 stick, recently reduced to push button and pass phrase.

Into which router do you type he pass phrase?   How?
___
homenet mailing list
homenet@ietf.org
https://www.ietf.org/mailman/listinfo/homenet


Re: [homenet] secret sharing among devices

2011-11-15 Thread Michael Richardson

 Joe == Joe Touch to...@isi.edu writes:
Joe - verizon home network (no USB on my home router)
Joe - iPhone and iPad (USB clients, but not hosts)
Joe - no PC (use the iCloud service)
 
 Tell me again why you need homenet on such a simple network?

Joe So my iPad (and/or anything else in the house) can use either
Joe the verizon path or the iPhone path to the Internet with
Joe automatic routing. 

At this point, it is still a flat LAN with two exit paths.
It's also WIFI. If it was secured WIFI, then you already entered keys
into all devices, so actually, we are probably done.

So, it's not secured WIFI.  The network is open.  Should we have any
security enabled at all then?

Joe If it's too simple, add other routers that still don't have
Joe USBs or cameras. 

I agree that it's a problem, but it's not clear to me that it's a real
problem.  I think that USB ports are becoming ubiquitous.

-- 
]   He who is tired of Weird Al is tired of life!   |  firewalls  [
]   Michael Richardson, Sandelman Software Works, Ottawa, ON|net architect[
] m...@sandelman.ottawa.on.ca http://www.sandelman.ottawa.on.ca/ |device driver[
   Kyoto Plus: watch the video http://www.youtube.com/watch?v=kzx1ycLXQSE
   then sign the petition. 


___
homenet mailing list
homenet@ietf.org
https://www.ietf.org/mailman/listinfo/homenet


Re: [homenet] pervasive v4

2011-11-15 Thread Ted Lemon
On Nov 16, 2011, at 7:52 AM, Brian E Carpenter brian.e.carpen...@gmail.com 
wrote:
 But afaik this isn't
 the 'make IPv4 work better' WG. That means that the requirement
 to not break IPv4 actually constrains the possible topologies
 for IPv6.

This was definitely not the sense of the working group in the meeting.   The 
sense of the working group was if the IPv6 topology works, but the IPv4 
topology doesn't, oh well.   The consensus seemed to be that it was better to 
make IPv6 work well than to constrain the solution so that topologies in which 
IPv4 wouldn't work would also break IPv6 (which, let's be clear, is essentially 
what you are suggesting).

Having said that, if there's a way to make IPv4 topologies that either don't 
work, or work poorly, with a modern IPv4 NAT router, work well with a homenet 
router, and it's possible to get that essentially for free, then I think it's 
worth getting, even though that's certainly not the problem we've set out to 
solve.   And I think what a couple of people have been saying here (with which 
I agree) is that it is in fact possible to get this essentially for free.

___
homenet mailing list
homenet@ietf.org
https://www.ietf.org/mailman/listinfo/homenet


Re: [homenet] pervasive v4

2011-11-15 Thread Ted Lemon
On Nov 16, 2011, at 9:00 AM, Brian E Carpenter brian.e.carpen...@gmail.com 
wrote:
 What will happen if a user hangs an existing v4-only box bought in the 
 supermarket
 off a new homenet-conforming box? I'm not saying we have to guarantee that
 it works, but at least we need to understand the possible breakages (IMHO).

Sure.   In point of fact, it will work just as well as if they did the same 
thing with a non-homenet-conforming box, and possibly better.   In some cases 
that means it will work; in some cases it means it will not.   IOW, homenet 
won't make things worse.   So it's hard to accept the notion that, in the event 
that IPv4 breaks in this case, IPv6 ought to break as well.   Of course, since 
this is a non-homenet router, possibly it doesn't support IPv6 anyway.

___
homenet mailing list
homenet@ietf.org
https://www.ietf.org/mailman/listinfo/homenet


Re: [homenet] draft-baker-homenet-prefix-assignment

2011-11-15 Thread Russ White

 Right now clients don't pick the best one--they just pick one pretty much at 
 random.  But yes, if you have two DHCP servers providing different 
 information, you need to resolve that.   We would have to write a spec to 
 handle this—it's not handled in the existing protocol.

We need to be aware that not every network may be able to reach the
Internet... So you might need to have an address from every available
DHCP server, not just the best, one, or even a random, one.

For instance, your computer might talk to the power company, but the
power company doesn't want to transit your internet traffic. I'm not
saying this is a certainty, only that we need to think about it somehow.

:-)

Russ

___
homenet mailing list
homenet@ietf.org
https://www.ietf.org/mailman/listinfo/homenet


Re: [homenet] draft-baker-homenet-prefix-assignment

2011-11-15 Thread Ted Lemon
On Nov 16, 2011, at 11:18 AM, Russ White ru...@riw.us wrote:
 We need to be aware that not every network may be able to reach the
 Internet... So you might need to have an address from every available
 DHCP server, not just the best, one, or even a random, one.

Yes, this is part of a problem space of which I have become keenly aware over 
the course of this IETF meeting.   Expect a draft shortly.   :)

___
homenet mailing list
homenet@ietf.org
https://www.ietf.org/mailman/listinfo/homenet


Re: [homenet] draft-baker-homenet-prefix-assignment

2011-11-15 Thread Ole Troan
 We need to be aware that not every network may be able to reach the
 Internet... So you might need to have an address from every available
 DHCP server, not just the best, one, or even a random, one.
 
 Yes, this is part of a problem space of which I have become keenly aware over 
 the course of this IETF meeting.   Expect a draft shortly.   :)

do we need to?
in a self organizing unmanaged home; if we were to do a combination of a 
network wide flooding mechanism and RAs. would we need DHCP in the network at 
all?

cheers,
Ole
___
homenet mailing list
homenet@ietf.org
https://www.ietf.org/mailman/listinfo/homenet


Re: [homenet] pervasive v4

2011-11-15 Thread Ted Lemon
On Nov 16, 2011, at 1:31 PM, Erik Nordmark nordm...@cisco.com wrote:
 The service call will be something like the internet is working fine, but 
 the printer is broken when the laptop uses dual-stack but the printer is 
 IPv4 only.
 
 I uniformity (within the home) is better if we care about complexity.

This is certainly a valid point, but you've got it backwards, since we're 
talking about bridging IPv4.  The real risk is that a bonjour printer will work 
only if you are plugged into the same router it is. 
___
homenet mailing list
homenet@ietf.org
https://www.ietf.org/mailman/listinfo/homenet


Re: [homenet] draft-baker-homenet-prefix-assignment

2011-11-15 Thread Ole Troan
 do we need to?
 in a self organizing unmanaged home; if we were to do a combination of a 
 network wide flooding mechanism and RAs. would we need DHCP in the network 
 at all?
 
 I am not claiming that we do. However, the problem exists whether we do DHCP 
 in homenet or not. 

yes, indeed.

cheers,
Ole

___
homenet mailing list
homenet@ietf.org
https://www.ietf.org/mailman/listinfo/homenet


Re: [homenet] pervasive v4

2011-11-15 Thread Randy Turner

Good points...Speaking of Bonjour, I haven't seen many references to support 
for multicast (yet)...I'm assuming this is on the plate.

Randy

On Nov 15, 2011, at 10:29 PM, Ted Lemon wrote:

 On Nov 16, 2011, at 1:31 PM, Erik Nordmark nordm...@cisco.com wrote:
 The service call will be something like the internet is working fine, but 
 the printer is broken when the laptop uses dual-stack but the printer is 
 IPv4 only.
 
 I uniformity (within the home) is better if we care about complexity.
 
 This is certainly a valid point, but you've got it backwards, since we're 
 talking about bridging IPv4.  The real risk is that a bonjour printer will 
 work only if you are plugged into the same router it is. 
 ___
 homenet mailing list
 homenet@ietf.org
 https://www.ietf.org/mailman/listinfo/homenet
 

___
homenet mailing list
homenet@ietf.org
https://www.ietf.org/mailman/listinfo/homenet


Re: [homenet] pervasive v4

2011-11-15 Thread Ray Bellis

On 16 Nov 2011, at 14:35, Randy Turner wrote:

 
 Good points...Speaking of Bonjour, I haven't seen many references to support 
 for multicast (yet)...I'm assuming this is on the plate.

Yes, it was one of the topics of discussion at the interim, mostly in the 
context of naming and service discovery.  There hasn't really been any 
discussion on the use of multicast as a high bandwidth streaming system.

Ray

___
homenet mailing list
homenet@ietf.org
https://www.ietf.org/mailman/listinfo/homenet


Re: [homenet] draft-baker-homenet-prefix-assignment

2011-11-15 Thread Fred Baker

On Nov 16, 2011, at 1:52 PM, Ole Troan wrote:

 We need to be aware that not every network may be able to reach the
 Internet... So you might need to have an address from every available
 DHCP server, not just the best, one, or even a random, one.
 
 Yes, this is part of a problem space of which I have become keenly aware 
 over the course of this IETF meeting.   Expect a draft shortly.   :)
 
 do we need to?

Need to what? Provide a subnet number on each subnet?

Is that a real question?

 in a self organizing unmanaged home; if we were to do a combination of a 
 network wide flooding mechanism and RAs. would we need DHCP in the network at 
 all?
 
 cheers,
 Ole

___
homenet mailing list
homenet@ietf.org
https://www.ietf.org/mailman/listinfo/homenet


Re: [homenet] draft-baker-homenet-prefix-assignment

2011-11-15 Thread Ole Troan
Fred,

 We need to be aware that not every network may be able to reach the
 Internet... So you might need to have an address from every available
 DHCP server, not just the best, one, or even a random, one.
 
 Yes, this is part of a problem space of which I have become keenly aware 
 over the course of this IETF meeting.   Expect a draft shortly.   :)
 
 do we need to?
 
 Need to what? Provide a subnet number on each subnet?
 
 Is that a real question?

extend the DHCP protocol to handle multiple sources of information.


cheers,
Ole

 in a self organizing unmanaged home; if we were to do a combination of a 
 network wide flooding mechanism and RAs. would we need DHCP in the network 
 at all?
 
 cheers,
 Ole
 

___
homenet mailing list
homenet@ietf.org
https://www.ietf.org/mailman/listinfo/homenet


Re: [homenet] pervasive v4

2011-11-15 Thread Randy Turner
Was the intent of naming and discovery to try and reuse the zeroconf/mdns stuff 
or something new?

Thanks!
Randy

 Original message 
Subject: Re: [homenet] pervasive v4 
From: Ray Bellis ray.bel...@nominet.org.uk 
To: Randy Turner rtur...@amalfisystems.com 
CC: homenet@ietf.org homenet@ietf.org 


On 16 Nov 2011, at 14:35, Randy Turner wrote:

 
 Good points...Speaking of Bonjour, I haven't seen many references to support 
 for multicast (yet)...I'm assuming this is on the plate.

Yes, it was one of the topics of discussion at the interim, mostly in the 
context of naming and service discovery.  There hasn't really been any 
discussion on the use of multicast as a high bandwidth streaming system.

Ray

___
homenet mailing list
homenet@ietf.org
https://www.ietf.org/mailman/listinfo/homenet

___
homenet mailing list
homenet@ietf.org
https://www.ietf.org/mailman/listinfo/homenet


Re: [homenet] draft-baker-homenet-prefix-assignment

2011-11-15 Thread Fred Baker
I don't much care whose charter it's in. I do think that if we have an idea 
that an ISP will allocate an IA_PD to a directly attached router and that 
router will then, in some way, sub-allocate subnet prefixes to subnets in the 
home, then there is a case in which there are multiple ISPs that have separate 
routers doing that. Ralph and I have suggested using the same mechanism that 
ISPs use to allocate prefixes to the home to allocate prefixes within the home, 
which means having multiple DHCP servers. If we do it another way, whether 
ZOSPF's or some other way, we have the same problem in the sense that there 
will be multiple sources of subnet prefixes.

On Nov 16, 2011, at 2:56 PM, Ted Lemon wrote:

 On Nov 16, 2011, at 2:46 PM, Ole Troan o...@cisco.com wrote:
 extend the DHCP protocol to handle multiple sources of information.
 
 I think this winds up being implicit in MIF's charter, although I didn't 
 realize that until quite recently.

___
homenet mailing list
homenet@ietf.org
https://www.ietf.org/mailman/listinfo/homenet


Re: [homenet] draft-baker-homenet-prefix-assignment

2011-11-15 Thread Ted Lemon
On Nov 16, 2011, at 3:41 PM, Fred Baker f...@cisco.com wrote:
 If we do it another way, whether ZOSPF's or some other way, we have the same 
 problem in the sense that there will be multiple sources of subnet prefixes.

Yes.   This becomes an even uglier problem as you progress into the network, 
because while at the edge you can tell that you are talking to two 
administrative domains, as you move into the network past the first delegating 
router, you wind up with a single DHCP server presenting the merged 
configuration information from two administrative domains as if they were a 
single administrative domain.

I thought I understood how to solve this problem before I started writing the 
problem statement, and then when I remembered this aspect of it I kind of flung 
my hands up in disgust.   I think the knowledge that there are two separate 
administrative domains has to be visible throughout the network, but this is 
really a substantial divergence from what DHCPv6, at least, currently does.

I can certainly imagine extending DHCPv6 in a cascading prefix delegation 
scenario where it signals this information down the cascade, but it's 
conceptually quite a bit different.

___
homenet mailing list
homenet@ietf.org
https://www.ietf.org/mailman/listinfo/homenet