Re: tsv-dir review of draft-ymbk-aplusp-08

2011-02-08 Thread Masataka Ohta
Pasi Sarolahti wrote:

My comments are as an implementer of a port restricted IP.

 * The typical initial scenario probably is that an A+P gateway
 is NATing the traffic to a legacy host in private address
 realm, but I understood that if a host/application supports
 A+P, it could use A+P addressing directly without NAT.

That's the proper way to use of port restricted IP with the
end to end transparency not unnecessarily combined with
legacy NAT.

 Have you thought how this would be reflected on the socket API?
 For example, what would be the intended behavior, if an
 application tries to bind a port that was not part of the port
 range assigned for the host?

It's like specifying a source address not belonging to the host.

So, a super user should be allowed to do so with raw IP.

 Apparently it is thought that there would be some extended API
 for an A+P-aware application to query which ports are
 available, right?

My implementation of PRIP has such mechanisms as ioctl.

Masataka Ohta
___
Ietf mailing list
Ietf@ietf.org
https://www.ietf.org/mailman/listinfo/ietf


tsv-dir review of draft-ymbk-aplusp-08

2011-02-07 Thread Pasi Sarolahti
Hello,

I've reviewed this document as part of the transport area directorate's ongoing 
effort to review key IETF documents. These comments were written primarily for 
the transport area directors, but are copied to the document's authors for 
their information and to allow them to address any issues raised. The authors 
should consider this review together with any other last-call comments they 
receive. Please always CC tsv-...@ietf.org if you reply to or forward this 
review.

I found no major issues with the document, and the document is ready for 
publication. Below are some minor nits you might want to consider addressing 
before publishing:

* Section 1.1: You could add reference to UPnP/NAT-PMP.

* Bottom of page 16: you could describe with a few words what delayed 
translation is. (is it address translation that doesn't happen at the edge of 
the A+P subsystem?)

* Section 5.2: There is a general observation that the more demanding customer 
uses around 1024 ports when heavily communicating. -- on what is this based 
on? Do you have some reference or other data to back this up?

* The typical initial scenario probably is that an A+P gateway is NATing the 
traffic to a legacy host in private address realm, but I understood that if a 
host/application supports A+P, it could use A+P addressing directly without 
NAT. Have you thought how this would be reflected on the socket API? For 
example, what would be the intended behavior, if an application tries to bind a 
port that was not part of the port range assigned for the host? Is there an 
error, or does that trigger some other behavior? You might want to mention 
something about such API interactions in some appropriate place (maybe in 
5.3.4?). Apparently it is thought that there would be some extended API for an 
A+P-aware application to query which ports are available, right?

- Pasi

___
Ietf mailing list
Ietf@ietf.org
https://www.ietf.org/mailman/listinfo/ietf


RE: Review of draft-ymbk-aplusp-08

2011-01-28 Thread Tina Tsou



Best Regards,
Tina TSOU
http://tinatsou.weebly.com/contact.html


-Original Message-
From: Randy Bush [mailto:ra...@psg.com] 
Sent: Tuesday, January 25, 2011 1:51 PM
To: Tina Tsou
Cc: ops-...@ietf.org; sec...@ietf.org; draft-ymbk-apl...@tools.ietf.org;
i...@ietf.org; ietf@ietf.org
Subject: Re: Review of draft-ymbk-aplusp-08

 Operations directorate and Security directorate reviews are solicited
 primarily to help the area directors improve their efficiency,
particularly
 when preparing for IESG telechats, and allowing them to focus on documents
 requiring their attention and spend less time on the trouble-free ones.

and which are you?  can't be ops, as you are a vendor.  so security?
but we already received the security review.
[Tina:
I know the author is my friend Randy, so I have to be very careful ;-)

I'm a member and also the secretary of Operations directorate.
Here is the wiki page for the Operations directorate.
http://trac.tools.ietf.org/area/ops/trac/wiki/Directorates
You can see many of us do not have the affiliation of operators.
I did the additional review besides the allocated member's review.

I'm also a member of Security directorate.
I did the additional review besides the allocated member's review.

Hope it clarifies.
]

but thanks for the review anyway.

randy, a bit confused

___
Ietf mailing list
Ietf@ietf.org
https://www.ietf.org/mailman/listinfo/ietf


Re: Review of draft-ymbk-aplusp-08

2011-01-28 Thread Randy Bush
 I'm a member and also the secretary of Operations directorate.

the ops dir is a joke.  does reviews for an area director who does not
do his/her own?

there is an ops cabal that meets at ietf and has ML etc.  all actual ops
except for one guest, the actual ops director, ron.

 http://trac.tools.ietf.org/area/ops/trac/wiki/Directorates
 You can see many of us do not have the affiliation of operators.

welcome to the ietf

 I'm also a member of Security directorate.

must be fun.

randy
___
Ietf mailing list
Ietf@ietf.org
https://www.ietf.org/mailman/listinfo/ietf


Review of draft-ymbk-aplusp-08

2011-01-26 Thread Tina Tsou
I reviewed the document draft-ymbk-aplusp-08 in general.
 
Operations directorate and Security directorate reviews are solicited
primarily to help the area directors improve their efficiency, particularly
when preparing for IESG telechats, and allowing them to focus on documents
requiring their attention and spend less time on the trouble-free ones.

Improving the documents is important, but clearly a secondary purpose.
A third purpose is to broaden the OpsDir reviewers' exposure to work going
on in other parts of the IETF.
 
Reviews from OpsDir/SecDir members do not in and of themselves cause the
IESG to raise issue with a document. The reviews may, however, convince
individual IESG members to raise concern over a particular document
requiring further discussion. The reviews, particularly those conducted in
last call and earlier, may also help the document editors improve their
documents.
 
-
This document is well written, though there may be some nits.

Comment #1:
In Abstract section this draft proposes an IPv4 address sharing scheme,
treating some of the port number bits as part of an extended IPv4 address.
A SOHO CPE (A+P) may provide with website service. When a host in external
network accesses this website, what information that DNS servers feedback to
host? If it is an IP address, it can't uniquely identify the CPE. If it is
IP + port range, how can host recognize this and process? If it is IP + some
a Port, how can DNS server know when port changed? 
Some Operators identify services by five elements include UDP/TCP well-known
ports when CPE is an unreliable device. If well-known ports changed, service
can't be recognized.

Comment #2:
Abstract section,
In the face of IPv4 address exhaustion, the need for addresses is stronger
than the need to be able to address thousands of applications on a single
host.
- This viewpoint is not always true. During the transition from IPv4 to
IPv6, some set of operators do not want the services are affected, which may
result some customers lost. A smoothly transition technology is more
favorable.

Comment #3:
Section 1.1 says: Another issue with CGN is the trade-off between session
state and network placement.
- If there are too many session state to keep, two CGN or more can be
placed. A distributed CGN may be a good choice. And single point of failure
can be resolved

Comment #4:
In section 3.3.1, it says: different port-ranges can have different
lifetimes, and the CPE is not entitled to use them after they expire what is
the appropriate lifetime for a port-rang?  When for P2P application, many
ports are used. In a short-term period, when for some fixed service (e.g.
site), a port may be used for many years. Will the server allocate port
according application? Or else there is some security problem or port
efficient allocation. For the more, port allocation will make more burdens
for server because of large number s of ports and high frequency
requisition.

Comment #5:
SMAP (stateless A+P Mapping) is proposed in section 4.1, IPv4 address and
port is embedded in the IPv6 address – which would be used to create a
tunnel. 
- In section 5.2, “Dynamic Allocation of Port Ranges” is proposed. What if
the allocated ports do not belong to a single IP address? The SMAP mechanism
may not work in this case. 
- The IPv6 address would follow the format defined in
[I-D.ietf-behave-address-format], but port is not included in the address
formats defined by that draft. Any plan to define the address format?

Here is the format defined in [I-D.ietf-behave-address-format]:


+--+---+---+---+---+---+---+---+---+---+---+---+---+---+---+---+---+
|PL| 0-32--40--48--56--64--72--80--88--96--104-|
+--+---+---+---+---+---+---+---+---+---+---+---+---+---+---+---+---+
|32| prefix|v4(32) | u | suffix|
+--+---+---+---+---+---+---+---+---+---+---+---+---+---+---+---+---+
|40| prefix|v4(24) | u |(8)| suffix|
+--+---+---+---+---+---+---+---+---+---+---+---+---+---+---+---+---+
|48| prefix|v4(16) | u | (16)  | suffix|
+--+---+---+---+---+---+---+---+---+---+---+---+---+---+---+---+---+
|56| prefix|(8)| u |  v4(24)   | suffix|
+--+---+---+---+---+---+---+---+---+---+---+---+---+---+---+---+---+
|64| prefix| u |   v4(32)  | suffix|
+--+---+---+---+---+---+---+---+---+---+---+---+---+---+---+---+---+
|96| prefix|v4(32) |
+--+---+---+---+---+---+---+---+---+---+---+---+---+---+---+---+---+

Figure 1


Comment #6:
In section 5.1.2 A+P for Mobile Providers 
- If A+P is implemented in a terminal device, e.g. mobile phone and PC,
there might be some problems, e.g. ARP problem – terminal would not be able
to send packets to 

Re: Review of draft-ymbk-aplusp-08

2011-01-26 Thread Randy Bush
 Operations directorate and Security directorate reviews are solicited
 primarily to help the area directors improve their efficiency, particularly
 when preparing for IESG telechats, and allowing them to focus on documents
 requiring their attention and spend less time on the trouble-free ones.

and which are you?  can't be ops, as you are a vendor.  so security?
but we already received the security review.

but thanks for the review anyway.

randy, a bit confused
___
Ietf mailing list
Ietf@ietf.org
https://www.ietf.org/mailman/listinfo/ietf