RE: [savi] Gen-ART review of draft-ietf-savi-threat-scope-06

2013-03-28 Thread Joel Halpern
I will try to come up with a way to address the MAC move topic.  The challenge 
is to word it in such a way that it does not imply a new protocol for 
communicating such a move (Savi was/is prohibited by charter from doing 
protocol development.)
Yours,
Joel

 -Original Message-
 From: Ted Lemon [mailto:ted.le...@nominum.com] 
 Sent: Wednesday, March 27, 2013 10:57 PM
 To: Joel Halpern Direct
 Cc: Black, David; Joel M. Halpern; McPherson, Danny; 
 s...@ietf.org; ietf@ietf.org; gen-...@ietf.org; Jean-Michel 
 Combes; Joel Halpern
 Subject: Re: [savi] Gen-ART review of draft-ietf-savi-threat-scope-06
 
 On Mar 27, 2013, at 12:45 PM, Joel Halpern Direct 
 jmh.dir...@joelhalpern.com wrote:
 
  Then it will be done.  I will wait for the AD to decide 
 what other changes are needed, and then will either make this 
 change or include it in an RFC Editor note.
 
  Old:
If the bridging topologies which connects the switches changes, or
if LACP [IEEE802.3ad] changes which links are used to deliver
traffic, the switch may need to move the SAVI state to a different
port, are the state may need to be moved or reestablished on a
different switch.
  New:
If the bridging topologies which connects the switches changes, or
if LACP [IEEE802.3ad], VRRP, or other link management
operations, change which links are used to deliver
traffic, the switch may need to move the SAVI state to a different
port, are the state may need to be moved or reestablished on a
different switch.
 
 I think you probably meant or, not are, in the second 
 word of the second-to-last line of the new text.
 
 As far as I am concerned, given that David is happy with your 
 recent change, I'm happy with it too.   However, since you 
 are asking, if you were willing to also accommodate David's 
 other request (see below) by adding some text to the document 
 in section 5, that would be an added bonus:
 
  A paragraph has been added to 5.2.3 to address all three of 
 the above concerns.   I guess that's ok, but I would have 
 liked to see some text pointing out that a MAC move can be 
 detected by the switches and used to update SAVI state about 
 which port(s) a MAC is accessed through.
 
 So if you can do this, it would be much appreciated; if you 
 can't do it, I think the document is valuable enough to move 
 forward without this additional work.
 
 

RE: Gen-ART review of draft-ietf-savi-threat-scope-06

2013-03-27 Thread Joel Halpern
I think I can add text to address this. I will look more closely tomorrow, and 
send you a proposal.
Thank you for all your efforts reviewing this.

Yours,
Joel

Sent from my Android phone using TouchDown (www.nitrodesk.com)

-Original Message-
From: Black, David [david.bl...@emc.com]
Received: Tuesday, 26 Mar 2013, 7:45pm
To: Ted Lemon [ted.le...@nominum.com]
CC: McPherson, Danny [dmcpher...@verisign.com]; Fred Baker [f...@cisco.com]; 
Joel Halpern [joel.halp...@ericsson.com]; gen-...@ietf.org [gen-...@ietf.org]; 
Jean-Michel Combes [jeanmichel.com...@gmail.com]; s...@ietf.org 
[s...@ietf.org]; ietf@ietf.org [ietf@ietf.org]
Subject: RE: Gen-ART review of draft-ietf-savi-threat-scope-06

Ted,

 Remembering that this is an informational draft, which does a pretty good job
 of informing the reader about the problem space, is it your opinion that the
 issues you have raised _must_ be addressed before the document is published,
 or do you think the document is still valuable even if no further text is
 added to address your concern?

At a minimum, in section 4.1.2, this should be addressed:

b) the new text implies that LACP is the only way to cause this situation - it's
not, so LACP should be used as an example.

I'm not sure I've seen Fred's response, but that change would suffice.  An RFC
Editor note should suffice.

Thanks,
--David

 -Original Message-
 From: Ted Lemon [mailto:ted.le...@nominum.com]
 Sent: Monday, March 25, 2013 9:38 PM
 To: Black, David
 Cc: McPherson, Danny; Fred Baker; joel.halp...@ericsson.com; gen-...@ietf.org;
 Jean-Michel Combes; s...@ietf.org; ietf@ietf.org
 Subject: Re: Gen-ART review of draft-ietf-savi-threat-scope-06

 On Mar 25, 2013, at 9:04 PM, Black, David david.bl...@emc.com wrote:
  Summary: This draft is on the right track, but has open issues, described in
 the review.

 While I identified the same issue you did with switching systems that do link
 aggregation and other magic, I think that the document is useful whether this
 is fixed or not.  It's true that it doesn't have a full section that talks
 specifically about this problem, but I think it's unlikely that the authors
 are going to add one-when I mentioned it to Joel, he didn't express excitement
 at the prospect.

 I think Fred's response, while a little salty, accurately represents the
 situation: the working group produced this document, the document does what
 it's supposed to do, one could continue to polish it indefinitely, but then
 the document would never get published.

 Remembering that this is an informational draft, which does a pretty good job
 of informing the reader about the problem space, is it your opinion that the
 issues you have raised _must_ be addressed before the document is published,
 or do you think the document is still valuable even if no further text is
 added to address your concern?




Re: [savi] Gen-ART review of draft-ietf-savi-threat-scope-06

2013-03-27 Thread Joel Halpern Direct
Then it will be done.  I will wait for the AD to decide what other 
changes are needed, and then will either make this change or include it 
in an RFC Editor note.


Thank you,
Joel

On 3/27/2013 12:42 PM, Black, David wrote:

That would do nicely.

Thanks,
--David



-Original Message-
From: Joel M. Halpern [mailto:j...@joelhalpern.com]
Sent: Wednesday, March 27, 2013 12:30 PM
To: Black, David
Cc: Ted Lemon; McPherson, Danny; s...@ietf.org; ietf@ietf.org; gen-
a...@ietf.org; Jean-Michel Combes; joel.halp...@ericsson.com
Subject: Re: [savi] Gen-ART review of draft-ietf-savi-threat-scope-06

Would it suffice to replace
Old:
 If the bridging topologies which connects the switches changes, or
 if LACP [IEEE802.3ad] changes which links are used to deliver
 traffic, the switch may need to move the SAVI state to a different
 port, are the state may need to be moved or reestablished on a
 different switch.
New:
 If the bridging topologies which connects the switches changes, or
 if LACP [IEEE802.3ad], VRRP, or other link management
 operations, change which links are used to deliver
 traffic, the switch may need to move the SAVI state to a different
 port, are the state may need to be moved or reestablished on a
 different switch.
?

Proposed changes on the second - fourth lines above.
Yours,
Joel

On 3/26/2013 7:45 PM, Black, David wrote:

Ted,


Remembering that this is an informational draft, which does a pretty good

job

of informing the reader about the problem space, is it your opinion that

the

issues you have raised _must_ be addressed before the document is

published,

or do you think the document is still valuable even if no further text is
added to address your concern?


At a minimum, in section 4.1.2, this should be addressed:

b) the new text implies that LACP is the only way to cause this situation -

it's

not, so LACP should be used as an example.

I'm not sure I've seen Fred's response, but that change would suffice.  An

RFC

Editor note should suffice.

Thanks,
--David


-Original Message-
From: Ted Lemon [mailto:ted.le...@nominum.com]
Sent: Monday, March 25, 2013 9:38 PM
To: Black, David
Cc: McPherson, Danny; Fred Baker; joel.halp...@ericsson.com; gen-

a...@ietf.org;

Jean-Michel Combes; s...@ietf.org; ietf@ietf.org
Subject: Re: Gen-ART review of draft-ietf-savi-threat-scope-06

On Mar 25, 2013, at 9:04 PM, Black, David david.bl...@emc.com wrote:

Summary: This draft is on the right track, but has open issues, described

in

the review.

While I identified the same issue you did with switching systems that do

link

aggregation and other magic, I think that the document is useful whether

this

is fixed or not.  It's true that it doesn't have a full section that talks
specifically about this problem, but I think it's unlikely that the authors
are going to add one-when I mentioned it to Joel, he didn't express

excitement

at the prospect.

I think Fred's response, while a little salty, accurately represents the
situation: the working group produced this document, the document does what
it's supposed to do, one could continue to polish it indefinitely, but then
the document would never get published.

Remembering that this is an informational draft, which does a pretty good

job

of informing the reader about the problem space, is it your opinion that

the

issues you have raised _must_ be addressed before the document is

published,

or do you think the document is still valuable even if no further text is
added to address your concern?



___
savi mailing list
s...@ietf.org
https://www.ietf.org/mailman/listinfo/savi





Re: [lisp] Last Call: draft-ietf-lisp-eid-block-03.txt (LISP EID Block) to Informational RFC

2012-11-18 Thread Joel Halpern Direct
Most of what you describe Sander sounds reasonable, and sounds aligned 
with what is i the deployment documents.


The WG debated the EID allocation extensively.  One could argue that 
there is no need for it, that we could merely request that PI 
allocations be granted for LISP EID usage individually.  The WG felt 
that if we could get all IPv6 LISP EID allocations from a single block 
that was not used for anything else, that would simplify avoiding 
lookups in the mapping system that were inevitably going to fail.  Thus 
the allocations request.


Yours,
Joel

On 11/16/2012 4:12 PM, Sander Steffann wrote:

Hi Joel,


Why does any operator have a reason to carr any routes other than their paying 
customers?  Because it provides connectivity for their customers.
If we get this block allocaed, then it results in 1 extra routing entry in the 
global routing table to support LISP inter-working.
An entry that some of their customers may use, whether the operator carrying it 
knows that or not.

In fact, it would take significant extra work for the operator to somehow block 
this aggregate.

If LISP fails, this is a small cost to find out.
If LISP succeeds, this results in significant reduction in core tabl sizes for 
everyone.


That still assumes the altruistic routing of the prefix. And I am afraid that 
if the usage of this block gets a bad reputation that all LISP usage will share 
that reputation. I really like LISP but I am still not convinced that it's a 
good idea. If we can find a way to get the EID prefix routed in a reliable way 
then I would love it!

I really care about LISP and I am afraid that: people see unreliable routing for 
EID /16 = assume LISP is unreliable. That is why I am pushing so hard to get 
this sorted out.

Hmmm. What about the following strategy:
- Start with the EID prefix being handed out like PI
   - Either through the RIRs if they are willing to take the responsibility
   - Or from a separate registry
- Some altruistic /16 PITRs might show up in the global BGP table
- A holders of a (assume) /48 from the EID prefix can arrange PITRs for their 
own space
   - And announce it as a separate route in the global BGP table (for now)
   - Keep the routing and reliability under their own control
- If the experiment is a success we advise ISPs to:
   - Install their own PITRs for the /16
   - Filter out the /48s at their border

The filtering of the more-specifics once they have their own PITRs will make 
sure that they use those PITRs and that they will use the most optimal path to 
the locators as soon as possible. It will also keep their routing table 
smaller. If enough big transit providers offer /16 PITRs to their customers 
then the more-specifics might be filtered on a larger scale.

So, summary:

The ways to reach a PITR would be
a) Run your own PITR (big networks, LISP users)
b) Use one from your transit(s) (smaller networks that don't have their own)
c) Use an altruistic one as last resort

As long as (a) and (b) aren't a reality the LISP users who don't want to rely 
on (c) can run/rent/etc a PITR for their own space. I think the routing 
community would really appreciate it if all those more-specific routes would be 
temporary until wide deployment of (a) and (b) make them unnecessary.

And if this doesn't become a success we have a bunch of /48 prefixes to the 
separate PITRs in the BGP table. It won't be much, otherwise we would have 
declared success. So the risk of messing the BGP table up is very limited. And 
when can tell people: if you are bothered by those more-specifics in your 
routing table you can always deploy your own PITRs and filter the 
more-specifics at your border. That might keep everyone happy.

What do you think?

Thanks,
Sander



Re: notes from discussion of KARP design guidelines

2011-07-10 Thread Joel Halpern

Joe,
THE KARP WG Chairs have reviewed your comments, in order to figure 
out what the best way to address them.   We would appreciate it if you 
could engage in discussion of this proposal on the KARP working group 
email list.  If you feel we are still not understanding your point, we 
would be happy to make some time avaialble for discussion at the WG 
session in Quebec City.  (Comments from anyone else, particularly WG 
members, on the proposals being made by the WG chairs are appreciated as 
well.)


Rather than a line by line response, we have tried to find the common 
themes and respond to them.  If we have missed major issues, please let 
us know.


You raised concern about the use of the term on-the-wire.  Rather than 
replace the term, we would prefer to add descriptive text early in the 
document.  This text would note that it is a widely used term in IETF 
documents, including many RFCs.  It would also state for clarity that in 
this document it is used to refer to the message sent from one routing 
process to another.


With regard to your comment about identifiers, we can add in the 
description of protocol reviews indications that such reviews should be 
clear about what IDs the review considers need protecting, as that is 
important context for the protocol review.


As noted in other exchanges, the document abstract needs a complete 
rewrite.  It should be just an abstract, with the rest of the context 
either removed or moved to the introduction.  In doing so, we will add 
text describing briefly the general concept of the routing protocol 
transport.


In general however, protocol specific behaviors are to be left to the 
protocol analysis documents.  Equally, descriptions of detailed threats 
will be left either to the threat document or to the individual protocol 
analysis document as appropriate.


There are several items in your comments indicating that you would like 
to see more discussion in the design guidelines of the protocol 
layering.  That does not seem to be a useful addition to this document. 
 Again, individual protocol analysis documents will deal with that 
where it is appropriate, and avoid it where it is a distraction.  We do 
not see useful general statements of guidance that can be put into this 
document.


Adding some general text in the discussion of communication modes 
elaborating on the difference between the communication as seen by the 
routing and security components, and the actual communication (e.g. that 
what is seen as multicast may be delivered as broadcast or multiple 
uni-cast) does seem a helpful addition to the document, and we will do that.


Yours,
Joel and Brian

___
Ietf mailing list
Ietf@ietf.org
https://www.ietf.org/mailman/listinfo/ietf