RE: Comments on draft-ietf-ipv6-unique-local-addr-00.txt

2003-08-30 Thread Christian Huitema
> Additionally, let us postulate that all three entities have a small
> population of hosts which must be accessible from the public networks,
and
> that those hosts must also be reachable from the local private
network.

The plan of record is that these publicly reachable hosts will have both
a local address and a global address. The global address will be derived
from a prefix announced by the ISP.

> Unless I have missed some essential clause in your description above,
we
> appear to have a failure mode, with a root cause of user neglect or
user
> error, in which the non-propagation requirement for unique-local
prefixes
> to the global routing table is likely to be violated.

Stuff happens. However, one ISP making a mistake does not have to
endanger the whole Internet. Any good ISP is suppose to filter routes in
the FC00::/7 prefix from its own BGP announcements, and to ignore prefix
in the FC00::/7 range that peer ISP might mistakenly advertise.

-- Christian Huitema




IETF IPng Working Group Mailing List
IPng Home Page:  http://playground.sun.com/ipng
FTP archive:  ftp://playground.sun.com/pub/ipng
Direct all administrative requests to [EMAIL PROTECTED]



RE: Comments on draft-ietf-ipv6-unique-local-addr-00.txt

2003-08-29 Thread Christian Huitema

> However, we might be able to make the suggested restrictions a bit
less
> burdensome, provided that we can satisfy the never-route-private-addrs
> zealots that the revised scheme can still be effective in limiting
> unintended propagation of non-globally-routable prefixes. See below
for
> specifics.  I'll welcome further comments from any source.

The goal of the recommendation is both to provide some degree of
isolation, and also to ensure that the local addresses are not abused in
the future. One way to achieve that is to ensure that routers
systematically junk any packet sent to FC00::/8 or FD00::/8, unless a
more specific route has been installed. This will not require Dan to
update his internal routers, since there will indeed be a more specific
route for his own internal site. Backdoor connections between links will
also work, if a /48 route is announced for the backdoor.

-- Christian Huitema



IETF IPng Working Group Mailing List
IPng Home Page:  http://playground.sun.com/ipng
FTP archive:  ftp://playground.sun.com/pub/ipng
Direct all administrative requests to [EMAIL PROTECTED]



RE: Comments on draft-ietf-ipv6-unique-local-addr-00.txt

2003-08-29 Thread Christian Huitema


Geoff's initial comment included the classic birthday paradox formula,
which would indeed apply if we were to use the randomly generated
addresses as global site identifiers valid across the Internet. The
practical consequence is that we should be extremely clear about the
usage limitation: randomly assigned addresses should in no way be used
as site identifiers. This should not even be left for further study, it
is just wrong.

The usage that is actually envisaged is more limited: an identifier that
provides disambiguation in a limited environment, normally a single
site, possibly a small number of sites directly linked by VPN-like
relations. In that scenario, the collisions that matter are those that
occur within this "working set" of connected sites. The probability of
such a collision is determined by the probability of collision "x"
between two identifiers (x = 2^-40 in our example) and by the size "W"
of the working set. The probability that single site does not collide
with any member of a working set is:

P(collision in a set of size W) = 1 - (1-x)^(W-1)

There will be a large number of these working sets, probably as many as
there are sites -- each site will participate in average to W sets. The
probability that a given site observes a collision in one of its working
sets will be:

P(collision in one of W sets) = 1 - (1-x)^(W*(W-1))

If we have N sites, the probability of observing one collision on the
Internet will be:

P(collision in N sites with W sets) = 1 - (1-x)^(N*W*(W-1))

Given x=2^-40, the number N for which this probability equals .5 varies
with W as:

W   N
50  311070769
100 76982160
200 19148829
500 3054603
1000762886
2000190626
500030491
1   7622 

Bottom line: using the random allocation in large working sets is a bad
idea. If people want to do that, they should register a unique
allocation instead.

One possible way to improve the situation is to have a provision for
small sites, in which we use a 56 bits random number to identify a link,
rather than a 40 bits random number identifying a site.

-- Christian Huitema 



IETF IPng Working Group Mailing List
IPng Home Page:  http://playground.sun.com/ipng
FTP archive:  ftp://playground.sun.com/pub/ipng
Direct all administrative requests to [EMAIL PROTECTED]



RE: Weekly posting summary for ipng@sunroof.eng.sun.com

2003-08-24 Thread Christian Huitema
I had to take time off this list, and thus had the privilege of reading one week of 
back up mail. I suggest that most of the participants in this discussions should (1) 
relax, (2) read the last week of email, and (3) realize that this discussion is both 
not productive and not funny.
 
-- Christian Huitema



From: [EMAIL PROTECTED] on behalf of Rob Austein
Sent: Sat 8/23/2003 9:00 PM
To: [EMAIL PROTECTED]
Subject: Weekly posting summary for [EMAIL PROTECTED]



Messages   |  Bytes| Who
+--++--+
 25.16% |   40 | 25.68% |   216885 | [EMAIL PROTECTED]
 12.58% |   20 | 14.43% |   121847 | [EMAIL PROTECTED]
 12.58% |   20 | 11.50% |97109 | [EMAIL PROTECTED]
  4.40% |7 |  5.06% |42750 | [EMAIL PROTECTED]
  4.40% |7 |  3.85% |32475 | [EMAIL PROTECTED]
  4.40% |7 |  3.24% |27324 | [EMAIL PROTECTED]
  3.14% |5 |  4.24% |35799 | [EMAIL PROTECTED]
  3.77% |6 |  3.05% |25734 | [EMAIL PROTECTED]
  1.89% |3 |  3.57% |30164 | [EMAIL PROTECTED]
  2.52% |4 |  2.13% |17957 | [EMAIL PROTECTED]
  1.89% |3 |  1.94% |16420 | [EMAIL PROTECTED]
  1.89% |3 |  1.85% |15622 | [EMAIL PROTECTED]
  1.89% |3 |  1.74% |14682 | [EMAIL PROTECTED]
  1.89% |3 |  1.59% |13456 | [EMAIL PROTECTED]
  1.89% |3 |  1.33% |11243 | [EMAIL PROTECTED]
  1.26% |2 |  1.90% |16083 | [EMAIL PROTECTED]
  1.26% |2 |  1.41% |11921 | [EMAIL PROTECTED]
  1.26% |2 |  0.87% | 7388 | [EMAIL PROTECTED]
  1.26% |2 |  0.87% | 7330 | [EMAIL PROTECTED]
  0.63% |1 |  1.02% | 8575 | [EMAIL PROTECTED]
  0.63% |1 |  0.83% | 7047 | [EMAIL PROTECTED]
  0.63% |1 |  0.83% | 7014 | [EMAIL PROTECTED]
  0.63% |1 |  0.60% | 5098 | [EMAIL PROTECTED]
  0.63% |1 |  0.57% | 4792 | [EMAIL PROTECTED]
  0.63% |1 |  0.56% | 4696 | [EMAIL PROTECTED]
  0.63% |1 |  0.55% | 4644 | [EMAIL PROTECTED]
  0.63% |1 |  0.54% | 4583 | [EMAIL PROTECTED]
  0.63% |1 |  0.53% | 4497 | [EMAIL PROTECTED]
  0.63% |1 |  0.53% | 4436 | [EMAIL PROTECTED]
  0.63% |1 |  0.52% | 4377 | [EMAIL PROTECTED]
  0.63% |1 |  0.51% | 4332 | [EMAIL PROTECTED]
  0.63% |1 |  0.46% | 3911 | [EMAIL PROTECTED]
  0.63% |1 |  0.46% | 3852 | [EMAIL PROTECTED]
  0.63% |1 |  0.43% | 3629 | [EMAIL PROTECTED]
  0.63% |1 |  0.42% | 3541 | [EMAIL PROTECTED]
  0.63% |1 |  0.39% | 3330 | [EMAIL PROTECTED]
+--++--+
100.00% |  159 |100.00% |   844543 | Total

Grunchweather Associates provides this automatic summary on an at-whim
basis at the request of the IPv6 WG chairs.  Your mileage may vary.
We decline responsibilities, all shapes, all sizes, all colors.
If this script produces broken output, you get to keep both pieces.

IETF IPng Working Group Mailing List
IPng Home Page:  http://playground.sun.com/ipng
FTP archive:  ftp://playground.sun.com/pub/ipng
Direct all administrative requests to [EMAIL PROTECTED]





IETF IPng Working Group Mailing List
IPng Home Page:  http://playground.sun.com/ipng
FTP archive:  ftp://playground.sun.com/pub/ipng
Direct all administrative requests to [EMAIL PROTECTED]



RE: Fourth alternative [was Re: Moving forward ....]

2003-08-14 Thread Christian Huitema
> Eliot Lear wrote:
> I guess my concern is that ISPs end up routing the address
> space in Bob's proposal and that we'll have another PI problem.
> So while there's nothing wrong with Bob's proposal in theory
> (indeed I prefer it vastly to the other SL approaches), if
> customers believe they have stable addresses we could end up
> right back where we were in the early '90s. I don't see this
> happening for DSL customers but it could happenfor medium to
> large size businesses who have the power of the purse.
 
It is possible to write sufficient restrictions and avoid both the drift towards 
announcing /48 in the DMZ and using the unique local addresses in a NATv6 
configuration. The requirement is that the site local replacement be "special". We can 
for example request that backbone routers ignore announces that fall in the special 
prefix unless a /48 has been explicitly. As a result, even if someone convinces their 
local ISP, they will not be able to get connectivity to the whole Internet, and the 
addresses will not be usable as "globally routed PI." In fact, we should do that.
 
-- Christian Huitema



IETF IPng Working Group Mailing List
IPng Home Page:  http://playground.sun.com/ipng
FTP archive:  ftp://playground.sun.com/pub/ipng
Direct all administrative requests to [EMAIL PROTECTED]



RE: apps people?

2003-08-14 Thread Christian Huitema
> The few self-described apps people I've seen take
> a stand have to my recollection been strongly
> against dealing with locally scoped addresses .

Let's be clear. Our group (Windows Networking) has received a lot of feedback from 
developers of applications on the Windows platform. The negative developers' feedback 
was mostly centered on the difficulty of identifying the scope of an address, 
specially when a node is connected to several sites (e.g. home network and VPN to the 
corporate network), or when a node moves from site to site. Since the scope is not 
indicated in the address itself, applications have to keep track of a "site 
identifier" of some kind. The bottom line is that ambiguity hurts. The local scope 
nature also hurts, but not quite as much; it is another case of limited connectivity, 
which is a common "feature" in many networks.
 
-- Christian Huitema


IETF IPng Working Group Mailing List
IPng Home Page:  http://playground.sun.com/ipng
FTP archive:  ftp://playground.sun.com/pub/ipng
Direct all administrative requests to [EMAIL PROTECTED]



RE: Moving forward on Site-Local and Local Addressing

2003-08-14 Thread Christian Huitema
> Actually, I believe we do not have a birthday paradox issue in this case.
> The birthday paradox would exist only if ALL 1.2 million self-drawn prefixes would 
> see each other.
> However, in our scenario, the merging of two enterprises, only the two local 
> prefixes may collide with each other.
> They can not collide with the other 1.2 million or any other number of prefixes out 
> there.
> Thus, the probability remains 2^-40.

The individual probability of two domains colliding is x=2^-40, but the global result 
on the Internet is a somewhat larger. If we have N domains, and each peers with M 
other domains, then the probability of absence of collision for each domain is:
  p1 = (1-x)^M
The probability that no collision will be observed in the whole Internet is
  p2 = (1-x)^MN
I believe we can easily find a value of N (say 10 billion) and M (say 100) where p2 is 
close to 1, i.e. some poor guy somewhere is going to get stuck.
 
Which means that we should build an escape hatch: easy renumbering & number 
registration come to mind.
 
-- Christian Huitema
 
 


IETF IPng Working Group Mailing List
IPng Home Page:  http://playground.sun.com/ipng
FTP archive:  ftp://playground.sun.com/pub/ipng
Direct all administrative requests to [EMAIL PROTECTED]



RE: inevitability of PI = 3

2003-08-14 Thread Christian Huitema
Hey, we can legislate whatever...

-- Christian Huitema



IETF IPng Working Group Mailing List
IPng Home Page:  http://playground.sun.com/ipng
FTP archive:  ftp://playground.sun.com/pub/ipng
Direct all administrative requests to [EMAIL PROTECTED]



RE: apps people?

2003-08-11 Thread Christian Huitema
 >> Let's be clear. Our group (Windows Networking) has received a lot
>> of feedback from developers of applications on the Windows
>> platform. The negative developers' feedback was mostly centered on the
>> difficulty of identifying the scope of an address, specially when a
>> node is connected to several sites (e.g. home network and VPN to the
>> corporate network), or when a node moves from site to site.
>
>  Which is to say, topology information which it didn't
>  have to consider in the past and for which it has little
>  information at its disposal from which to make decisions.

No, I specifically did not say "topology information". Topology is a very wide notion, 
and application developers are actually OK with some amount of topology handling, e.g. 
doing things differently with folks that are "near me". The feedback on local 
addresses was very specific. Applications would learn or remember that the address of 
some correspondent was "FEC0::1234:5678:9ABC", they would try to feed the address in a 
socket address structure and issue a connect, and the call will fail because they did 
not fill up the "site identifier" variable, as in "FEC0::1234:5678:9ABC&1". The 
problem is compounded by the fact that the site identifier varies with the host 
instantiation, e.g. sometimes &1 and sometimes &2, and thus that the host identifier 
cannot be remembered in memory, or learned from a name server. Having a non ambiguous 
address solves that problem, because the stack will know over which interface a 
connect request to "FC00:DEAD:BEEF::1234:5678:9ABC" shall be routed!
 . The application will not have to handle "site identifiers", and that is a very good 
thing.
 
-- Christian Huitema


IETF IPng Working Group Mailing List
IPng Home Page:  http://playground.sun.com/ipng
FTP archive:  ftp://playground.sun.com/pub/ipng
Direct all administrative requests to [EMAIL PROTECTED]



RE: Moving forward on Site-Local and Local Addressing

2003-08-06 Thread Christian Huitema
I think we should do alternative B, i.e. deprecate and at the same time propose a 
replacement. Barring that, C is also acceptable. Alternative A is likely to generate 
fisrt uncertainty, and then a free-for-all, and the risk of some "grass root RFC 1918".

-- Christian Huitema


IETF IPng Working Group Mailing List
IPng Home Page:  http://playground.sun.com/ipng
FTP archive:  ftp://playground.sun.com/pub/ipng
Direct all administrative requests to [EMAIL PROTECTED]



RE: DiffServ field

2003-07-30 Thread Christian Huitema
> >Does anyone know is use of DiffServ field supported in some equipment
and
> >networks?
> 
> It is supported in some equipment. I wouldn't be able to tell you how
> networks configure their equipment; they generally view this as NDA
> information.

We have found some issues when trying to use the diffserv field in
practical deployments. There are a number of routers in the network that
were built and deployed before diffserv was widely accepted as a
standard. Understandably, these routers implement the previous standard,
i.e. the RFC 791 definition of the TOS bit. Specifically, the old
routers look at the three precedence bits and treat it as a priority
level. In practice, this restricts the number of diffserv code points
that can be safely used. You don't want for example to define a code
point for "less than best effort" in which the three precedence bits
happen to mean "high priority" in the old routers...

-- Christian Huitema



IETF IPng Working Group Mailing List
IPng Home Page:  http://playground.sun.com/ipng
FTP archive:  ftp://playground.sun.com/pub/ipng
Direct all administrative requests to [EMAIL PROTECTED]



RE: IPv6 -> MAC multicast address mapping

2003-07-29 Thread Christian Huitema
> I can't think of a way this is a security problem - can you point this
out
> please? With the exception that a DOS might be mounted by sending
packets
> to the wrong MAC address that are later discarded... But you'll have
to
> stop them at the source, not at the receivers, to prevent the DOS.

There is a class of attacks based on mismatches between MAC and IP
addressing. For example, if a node is a member of an IP group, it is
possible to send it a packet where the MAC destination is the unicast
MAC address of the node, while the IP destination is the group address.
Or vice versa, send a packet where the MAC destination is a multicast
address, but the IP destination is a unicast address. Hackers can use
the first technique to disrupt the operation of multicast groups, and
the second one to mount some forms of denial of service attacks. These
attacks require that the attacker be connected on the same link as a
target, but there are cases such as public access wireless where this
isn't much of a mitigation. (University dorms are also a great place for
such attacks.)

-- Christian Huitema



IETF IPng Working Group Mailing List
IPng Home Page:  http://playground.sun.com/ipng
FTP archive:  ftp://playground.sun.com/pub/ipng
Direct all administrative requests to [EMAIL PROTECTED]



RE: Status of

2003-06-05 Thread Christian Huitema
> Bob,
> 
> >
> >>Hence, I see no real reason at all to stray from FEC0::/10 - and
lots
> >>of reasons to remain in that space.
> >
> > I think you are suggesting that the draft be changed to reuse the
> > FEC0::/10 space with a resulting 38-bit global ID.  This would allow
> > for 274,877,906,944 prefixes, or 30 per person in 2050.
> >
> > My preference would be for a larger global ID, but I would like to
> > hear what other folks think.
> >
> 
> For what it is worth, I agree with kre as well.

Isn't that cool? We had this discussion before. In the spring of 1997,
as a matter of fact. And the suggestion then was:

> Date: Tue, 13 May 1997 11:25:42 -0400
> From: [EMAIL PROTECTED] (Christian Huitema)
> Subject: (IPng 3627) Re: W.G. Last Call on "Advanced Sockets API for
IPv6"
>
> > Site-local addresses have the same problem as link-local when a
> > host has interfaces in multiple sites, e.g. interface A belongs to
> > site X and interface B belongs to site Y.
>
> In fact, site local addresses have all the problems related to non
unique
> addresses, which are well known and documented in e.g. RFC 1627.  This
may
> be late in the game, but we should really consider a way to somehow
avoid
> or minimize the problems related to that non-uniqueness.
>
> Did we ever consider inserting some site identifier, e.g. a random
value,
> in the site local prefix ?  I know that this would not make the
problem
> disappear entirely, I know that randomness leads to unhappy birthdays,
> specially when the random number is not actually random (albeit the
site
> manager could actually trow dices, it is a one time operation).  But
we
> could still go a long way...

Did we not in fact go a long way those last 8 years?

-- Christian Huitema



IETF IPng Working Group Mailing List
IPng Home Page:  http://playground.sun.com/ipng
FTP archive:  ftp://playground.sun.com/pub/ipng
Direct all administrative requests to [EMAIL PROTECTED]



RE: My Thoughts on Site-Locals

2003-04-04 Thread Christian Huitema
> This should not be surprising. Given that the applications community
> blindly assumes there is a single addressing scope, when they bump
into
> the reality of the deployed network there will be problems.
Proclaiming
> that scopes are bad for applications does not make the filtering that
> causes scopes go away.

Bad, bad application developers. We should really punish them! :-)

Seriously, application developers face some very real problems. The
issues are uniqueness in space and uniqueness in time. 

The space dimension is experienced when a host is connected to several
sites, e.g. home network and VPN. If the application receives a site
local address from a local name service or a local discovery service, it
must associate that address with a site identifier. The first stumbling
block is that most applications don't have this concept, they just copy
the address. 

The second stumbling block is that there are no readily available site
identifiers -- you would need to manage a unique name space, which is
precisely what you don't get from FFC0::/10. In the absence of site
identifier, the routing of connections to the proper site is haphazard.
The application is supposed to remember that the site local address was
learned through a specific site, i.e. only use in site X the site local
addresses learned from site X's DNS service. This become quickly very
hairy, as the DNS does not in fact have a concept of site.

Restricting hosts to handle exactly one site removes some of the
problem. But you then bump into the time dimension. Hosts may become
members of different sites at different times, e.g. a laptop moving from
the office to the airport or to the home. Addresses learned in one site
should not be used in the next, but for that you must have an easy way
to tell that you have changed sites. Without a site identifier, that can
be real hard.

Tony, these problems are not theoretical. They come very much on top of
the issues encountered by developers porting applications to IPv6.

Using unambiguous addresses solves a lot of the problems: a multi homed
site can route connections to the proper site, source address selection
can work, and moves to another site can be detected. There are remaining
issues, notably dealing with intermittent connectivity, but these issues
are inherent to any mobility scenario.

By the way, link local addresses tend to suffer from much of the same
issue. However, it is easier for applications to deal with LL addresses,
as there is a clear linkage between addresses and discovery protocols
operating in a single link.

-- Christian Huitema



IETF IPng Working Group Mailing List
IPng Home Page:  http://playground.sun.com/ipng
FTP archive:  ftp://playground.sun.com/pub/ipng
Direct all administrative requests to [EMAIL PROTECTED]



RE: NAT != SL (Was: RE: CONSENSUS CALL: Deprecating Site-Local Addressing)

2003-04-04 Thread Christian Huitema
> > You don't get the point. If enough hosts come programmed to enforce
> > scope restrictions, then the non compliant product ends up with a
> > deployment headache and has to be fixed. This is basically the root
of
> > Internet standards -- enforcement by peer pressure.
> 
> The Globally addressed peer hosts when a communicating host is
> behind NAT are talking to another Global peer address at the NAT
> agent.

That is correct. The enforcement will not be by the remote site, except
maybe if the remote site uses IPSEC.

> This only requires complicity on the NAT box and the host,
> not the peer communicator.  The proposed requirement provides
> no further burden to implementors than NATv4 systems.

Your point is the mirror image of my argument. If a sufficient fraction
of the hosts refuses to play along with the NAT, then the NAT will not
be able to work. The laws of network physics are such that, if solution
A (NAT) is broken, then the easiest next solution will be chosen
(advertise a global prefix). The problem is that vendors of host
software can only deliberately brake the NAT scenario if they have some
"air cover", i.e. if the standard clearly says that communication
between addresses of different scopes is prohibited. Which is why it
should say so...

-- Christian Huitema



IETF IPng Working Group Mailing List
IPng Home Page:  http://playground.sun.com/ipng
FTP archive:  ftp://playground.sun.com/pub/ipng
Direct all administrative requests to [EMAIL PROTECTED]



RE: NAT != SL (Was: RE: CONSENSUS CALL: Deprecating Site-Local Addressing)

2003-04-03 Thread Christian Huitema
> > This simple suggestion will in fact prevent using SL in the NAT
> > scenario,
> 
> It will prevent _Standards Compliant_ client implementations from
> using NAT, but as we both know many vendors loosely interpret
> standards in any case.

You don't get the point. If enough hosts come programmed to enforce
scope restrictions, then the non compliant product ends up with a
deployment headache and has to be fixed. This is basically the root of
Internet standards -- enforcement by peer pressure.

-- Christian Huitema



IETF IPng Working Group Mailing List
IPng Home Page:  http://playground.sun.com/ipng
FTP archive:  ftp://playground.sun.com/pub/ipng
Direct all administrative requests to [EMAIL PROTECTED]



RE: e2e & global view

2003-04-03 Thread Christian Huitema
> % Let me try an rephrase my question.  I would like to know if there
is
> % consensus on the architectural view that IPv6 should have addresses
with
> % different scopes? 

No, there is definitely not consensus on that point. There are three big
classes of arguments.

The first class of argument is more against "ambiguous addresses" than
scoped addresses: using ambiguity as a surrogate for unreachability is
unnecessary (firewall can do that on any address) and inconvenient
(ambiguity of addresses makes several error scenarios undecipherable).

The second class of argument relates to routing and network management.
Maintaining scoped addresses makes routing hard, especially if a node
has to support multiple instantiations of a given scope. Margaret also
developed an argument about the need to maintain a site convex, and the
interaction of that requirement with shortest path routing.

The third class of argument considers the use of addresses by
applications. Using scoped addresses forces applications to understand
scopes, which is much more complex and error prone than just considering
that all addresses are equal. 

> % Again, I fail to see how deprecating site-local addresses
(specifically
> the
> % FEC0::/10 prefix) solves the underlying problem (e2e communications
> failing
> % with some src/dst address pairs).

Everybody should know that, and Bill is perfectly correct: just because
an address is globally unique does not mean it is reachable. However, if
it is unique, you eliminate a number of the error cases caused by
ambiguity.

-- Christian Huitema



IETF IPng Working Group Mailing List
IPng Home Page:  http://playground.sun.com/ipng
FTP archive:  ftp://playground.sun.com/pub/ipng
Direct all administrative requests to [EMAIL PROTECTED]



RE: NAT != SL (Was: RE: CONSENSUS CALL: Deprecating Site-Local Addressing)

2003-04-03 Thread Christian Huitema
If we are serious about NAT != SL, then we should enforce it. Clearly,
we cannot send the protocol police and whack every market driven
designer of a NAT, but we can perform "collective enforcement", i.e.
design our specification in such a way that misusing site local in a NAT
configuration is guaranteed to break every application, and thus that
any attempt to deploy an IPv6 NAT using site local will be a deployment
nightmare.

Suppose for example that we change our spec to forbid any communication
between addresses of different scopes. This can be enforced by senders
(refuse to send a packet if dest scope != source scope), routers or
firewalls (drop packet if srce and dest scope don't match), and
receivers (drop incoming packet if srce and dest scope don't match). You
don't need to enforce it in every host and every router to be effective:
just enforce in in a significant fraction of the hosts makes sure that
any attempt to use the forbidden pattern will be very unreliable.

This simple suggestion will in fact prevent using SL in the NAT
scenario, as at some point the scenario relies on communication between
an SL addressed source (e.g. a client) and a globally addressed
destination (e.g. a web site).

I think that we should enforce this requirement whether we maintain site
local or find a replacement for disconnected sites.

-- Christian Huitema



IETF IPng Working Group Mailing List
IPng Home Page:  http://playground.sun.com/ipng
FTP archive:  ftp://playground.sun.com/pub/ipng
Direct all administrative requests to [EMAIL PROTECTED]



Globally unique link prefix alternative to site-locals

2003-04-02 Thread Christian Huitema
The "anti-SL" arguments are primarily arguments aainst using ambiguous addresses. 
Ambiguous addresses are a royal pain in hosts that connect to multiple sites, either 
simultaneously or over time -- the applications need extra logic, and that creates 
bugs. But we clearly have an issue in the case of disconnected sites, intermittently 
connected sites, and ad hoc networks.
 
The "let's pick a prefix" argument is probably OK for large "managed" sites. In fact, 
most of the large sites have at least one IPv4 address and can pick a prefix; they 
could even obtain a provisional allocation from a friendly ISP. But this leaves out 
the small sites, the ad hoc networks, the unmanaged sites. However, if we just look at 
these small sites, we can easily get unambiguous *link* prefixes of the form:
 ::/64
In a small site, these prefixes can be autoconfigured by routers, and then published 
in the IGP. If there are several routers on the same link, they can either elect a 
master prefix or just advertise one prefix each. Having unique per-link prefixes has 
quite a few advantages:
 
- We get actual zero-configuration, a site can be just switched on.
- Local connectivity can be used for adding a global addressing plan when the 
site joins the Internet.
- Hosts can be multihomed at will; there is enough information in the address 
to find the right exit.
- The addresses remain valid if a site is split, or if two sites are merged.
- Unreachability is enforced by firewalls, not by bits in the address.
- Since the link prefix is a /64, there is zero chance of having a nasty ISP 
leak it to the Internet.
- If the /16 is well known, it can be plugged as "least preferred" in the 
address selection rules.
 
Is anyone interested in pursuing this design?
 
-- Christian Huitema


IETF IPng Working Group Mailing List
IPng Home Page:  http://playground.sun.com/ipng
FTP archive:  ftp://playground.sun.com/pub/ipng
Direct all administrative requests to [EMAIL PROTECTED]



RE: CONSENSUS CALL: Deprecating Site-Local Addressing

2003-04-01 Thread Christian Huitema
Yes but.

I understand why we want to remove ambiguity in addressing and make the
application writer's task simpler, but we need to have a solution for
zero-configuration of disconnected sites.

> -Original Message-
> From: Margaret Wasserman [mailto:[EMAIL PROTECTED]
> Sent: Tuesday, April 01, 2003 11:38 AM
> To: [EMAIL PROTECTED]
> 
> 
> Hi All,
> 
> At the IPv6 WG meetings in SF, we reached consensus on several
> points, all of which will be confirmed on the IPv6 mailing list.
> One point in particular seems to be the source of discussion
> on our list and elsewhere, so we will check this consensus on the
> mailing list now.  Specifically, we would like to check the consensus
> of the IPv6 WG regarding the deprecation of site-local addresses.
> 
> This email asks those that were NOT present at the Thursday IPv6
> meeting in SF to express their opinions on a question that was
> asked of the room.   If you expressed an opinion on this issue in
> SF you can skip this message; in any case you MUST NOT respond to
> this query.
> 
> By now, all of you have heard about the IPv6 meeting held on
> Thursday, March 20th, where we discussed what to do about
> IPv6 site-local addressing.
> 
> At the meeting, the chairs (Bob Hinden and Margaret Wasserman)
> changed the agenda to include a joint presentation by the
> chairs on various options for site-local usage.  There were
> no objections to the agenda change.
> 
> The chairs' joint presentation can be found at:
> 
> http://www.psg.com/~mrw/IPv6_Site_Local_Mar03.ppt
> 
> After the chairs' joint presentation, there was over an hour of
> lively discussion that covered many aspects of site-local
> addressing.  Draft minutes of the discussion can be found at:
> 
> http://www.psg.com/~mrw/ipv6-wg-minutes-mar2003.txt
> 
> These minutes are a summary of the discussion, and they did
> not capture every detail of the discussion.
> 
> During the discussion, it became clear that the "exclusive" model
> proposed by the chairs had some fundamental flaws and was not
> a viable option.  The WG was unwilling to choose between the three
> options presented for site-local usage ("limited", "exclusive" or
> "moderate"), believing that all three models represented a poor
> cost vs. benefit trade-off.  And, as the discussion developed, it
> became clear that there was growing support for deprecating
> site-local addressing.
> 
> After the usual discussion regarding the phrasing and meaning
> of the question (not all of which was captured in the minutes),
> the chairs asked a yes/no question:  "Should we deprecate IPv6
> site-local unicast addressing?"  There was clear consensus in the
> room to deprecate site-local addressing.  So, now it is time to
> check that consensus on the mailing list.
> 
> In order to get a good read for consensus on this point, PLEASE
> adhere to the following rules:
> 
> NOTE:  DO NOT reply if you already expressed an opinion during
> the IPv6 WG meeting in SF!
> 
>   - Make your response very clear (YES or NO).
> - Respond by Monday, April 7th, 2003 at 5pm EST.
> - Do NOT respond if you were physically present
>   in SF and participated in the consensus
>   call at that time (We are trusting you!).
> - Respond to this thread with the subject intact.
> - Respond only once.
>   - Clearly identify yourself (in the From: line or
>   inside your message).
>   - Include the IPv6 WG mailing list in your response
>   ([EMAIL PROTECTED]).
> - PLEASE do NOT start any discussion in this thread
> (Discussions are encouraged in other threads).
> 
> Any responses that do not adhere to these rules may not be counted.
> 
> The question is:
> 
>  Should we deprecate IPv6 site-local unicast addressing?
> 
> Valid responses are:
> 
>   "YES -- Deprecate site-local unicast addressing".
>   "NO -- Do not deprecate site-local unicast addressing".
> 
> If you express an opinion not to deprecate site-local addressing, it
> would be helpful if you would provide a reason.  Providing a reason
> is completely optional, but it may help us to determine how to move
> forward if the consensus to deprecate site-locals does not hold.
> Possible reasons include:
> 
>   - Site-locals should be retained for disconnected sites.
>   - Site-locals should be retained for intermittently
>   connected sites.
>   - Site-locals should be retained for their access control
>   benefits.
>   - Site-locals should be retained as a means for internal
>   connections to survive global prefix renumbering.
>   - Other (please specify).
> 
> Please, make your response _very_ clear (either YES or NO), or it will
> not be counted.
> 
> Please Note:  DO NOT respond if you already participated in the
> consensus call at the meeting in SF.  At the meeting, there were
> 102 people who raised their hands for YES (deprecate sit

RE: 6to4 and 2002:PRIV:ATE [RE: A use for site local addresses?]

2003-03-27 Thread Christian Huitema
> > You're making an assumption that all nodes implementing 6to4
> > pseudo-intefarce take part in the IGP to get the more specific
> > 2002:FOO routes,
> 
> Well, yes but these nodes are only routers. Hosts MUST NOT have any
6to4
> pseudo-interfaces (or have it deactivated).

Making rules as we speak, uh? At most, you are saying that a node that
has a 6to4 interface should be called a router. Fine. What have you
achieved? You only get control if you can convince a specific node to
not activate a particular function, i.e. if you had control over the
node in the first place.

It is reasonable to expect nodes who receive an RA for 2002:F00::, or
for that matter 2002:DEAD:BEEF::, to route packets bound to that
specific prefix towards the interface over which they received the RA.
But it is also not unreasonable to expect nodes to drop packets bound to
illegal 2002:: addresses, and possibly ignore advertisements of illegal
prefixes.

-- Christian Huitema




IETF IPng Working Group Mailing List
IPng Home Page:  http://playground.sun.com/ipng
FTP archive:  ftp://playground.sun.com/pub/ipng
Direct all administrative requests to [EMAIL PROTECTED]



RE: A use for site local addresses?

2003-03-26 Thread Christian Huitema

One of the advocated uses of site local addresses was for disconnected
sites. However, Dino made the point in the meeting that, if a site is
truly disconnected, it can just as well pick any random addresses it
wants. The absence of a "reserved range" (a la RFC 1918) will pressure
the disconnected site to renumber when it actually connects, rather than
go on using private addresses and a NAT.

In fact, most large sites have at least one IPv4 address, and they can
get a unique 2002::/48 prefix out of that address, even if they don't
have an actual IPv6 ISP yet.

-- Christian Huitema



IETF IPng Working Group Mailing List
IPng Home Page:  http://playground.sun.com/ipng
FTP archive:  ftp://playground.sun.com/pub/ipng
Direct all administrative requests to [EMAIL PROTECTED]



RE: M & O Bits was: draft-ietf-ipv6-node-requirements-01.txt

2003-02-12 Thread Christian Huitema
> It should be SHOULD.  The M bit means "use" Tasteful.  The "O" bit
means
> use Stateful.  Two different contexts.  I was here when they were put
in
> ND and recall why.  One reason is that not everyone believed that just
> stateless was acceptable and that was vision on those persons part.

We had a conclusive discussion off this point during the interim WG
meeting in Sunnyvale. The reasoning goes as follow: if we want to
maximize interoperability, we want to have a single mandatory address
configuration procedure, not two; everybody agrees that we must support
stateless address configuration; thus we should make stateless
mandatory, and other configuration methods optional.

This is properly reflected in section 5.3 (nodes MAY support DHCPv6), in
section 4.5.2 (MUST support stateless) and in the current text of
section 4.5.5, which is just fine.

-- Christian Huitema


IETF IPng Working Group Mailing List
IPng Home Page:  http://playground.sun.com/ipng
FTP archive:  ftp://playground.sun.com/pub/ipng
Direct all administrative requests to [EMAIL PROTECTED]




RE: Enforcing unreachability of site local addresses

2003-01-27 Thread Christian Huitema
> What words would you like me to use for portable, globally-routable
> addresses that are assigned to an entity (home, enterprise, etc.) and
> that can be used by that entity regardless of the ISP from which
> they purchase their service, cannot be changed by the ISP, and don't
> need to change if the entity changes ISPs.

Provider independent. Hey, that is the definition.

> I don't mean to imply, however, that these addresses would be
> randomly assigned, or that there wouldn't be some way (other than
> provider-based aggregation) to aggregate them.  In fact, we would
> NEED to find a way to aggregate these addresses to make them
> useful/scalable.  Possibilities for how to allocate aggregable
> provider-independent addresses could include (among other options)
> the geographical addresses that Tony Hain has proposed.
> 
> What term should I use for that?

"Aggregatable PI addresses", which is however kind of a contradiction in
terms. Addresses are as much aggregatable as their assignment reflects
the underlying topology, which includes the split of the network among
various providers. By definition, a structure that is independent of
providers can only be a gross approximation of the topology, and as such
can only have crude aggregation characteristics. Geographical addresses
are one such crude approximation of the topology.

-- Christian Huitema


IETF IPng Working Group Mailing List
IPng Home Page:  http://playground.sun.com/ipng
FTP archive:  ftp://playground.sun.com/pub/ipng
Direct all administrative requests to [EMAIL PROTECTED]




RE: Retail IPv6 Service in the US?

2002-12-20 Thread Christian Huitema
> % What we need is netgear and linksys to get on board and some of us
in
> % deployment land are bugging folks like that now.
> 
> Jim,
>   what is the issue here?  I have both linksys and netgear
>   kit in the home network and both pass native IPv6.  granted
>   not all their kit works w/ IPv6.
> 
> --bill

Linksys and Netgear build different types of equipment. Their hub and
bridge/switch products most probably pass IPv6 through without any
problem. But IPv6 will not pass through a "home router" (e.g. a DSL
router) unless that device has some adequate code.

-- Christian Huitema


IETF IPng Working Group Mailing List
IPng Home Page:  http://playground.sun.com/ipng
FTP archive:  ftp://playground.sun.com/pub/ipng
Direct all administrative requests to [EMAIL PROTECTED]




RE: "unique enough" [RE: globally unique site local addresses]

2002-12-04 Thread Christian Huitema
>  1) globally unique
>  2) provider independent (AKA "portable")
>  3) globally routable
>  4) indistinguishable from provider-allocated addresses by
>  routers, applications, etc.

Margaret,

Routing solutions have to consider have to be considered with two
angles, politics and graph theory. The points you are making may be
great politics, but until the ghost of Dijkstra comes out with a
solution, graph theory still tells us that (2) and (3) are
contradictory.

-- Christian Huitema


IETF IPng Working Group Mailing List
IPng Home Page:  http://playground.sun.com/ipng
FTP archive:  ftp://playground.sun.com/pub/ipng
Direct all administrative requests to [EMAIL PROTECTED]




RE: Enforcing unreachability of site local addresses

2002-12-02 Thread Christian Huitema
> and I don't know why an ISP would accept advertisements for GUPIs from
> its peers unless it was paid (well) to do so.

The key part of enforcement is indeed the community effect. If the
community agreement is that GUPIs should not be routed over the
Internet, we will get a situation were GUPIs are automatically rejected
by 90% of the ISP, through a combination of black-hole routes and BGP
filtering. If we get there, then no amount of pressure on individual ISP
can compromise the global routing tables.

What I perceived in the previous discussion was an unwillingness to do
this, because is would ban Internet wide routing of the GUPI forever.
There are some who seem to be willing to use GUPI to sneak PI routing in
IPv6. I believe we should really not go there, and state clearly that PI
addressing will be the result of the MULTI6 work (perhaps), not an
evolution of the GUPI.

-- Christian Huitema 


IETF IPng Working Group Mailing List
IPng Home Page:  http://playground.sun.com/ipng
FTP archive:  ftp://playground.sun.com/pub/ipng
Direct all administrative requests to [EMAIL PROTECTED]




RE: GUSL proposal (very crude)

2002-11-28 Thread Christian Huitema
There is a sense of deja vu in all this discussion -- similar proposals of making SL 
more unique by somehow sticking an identifier in the 38 available bits have popped out 
every 2 years on the list since 1994; I have to plead guilty, since I have indeed been 
one of the proponents.
 
>   There is a need for three types of allocation:
>   - Free, automated configuration, no registration,
> no external connection, almost unique.
>   - Free, manual or semi-automatic configuration,
> no registration, Internet connection necessary
> for semi-automatic configuration, unique.
>   - Fee-based, manual registration, unique.
> Additonal properties TBD.

I don't understand the intermediate category, and specifically the implementation as:
 
>   1.2.2 Unregistered, free, unique, sequentially allocated.
 
Unique and sequential  is contradictory with unregistered. I understand that we could 
implement a web site that distributes sequential numbers, although it is not clear 
that we can run a web site that runs a strictly sequential counter efficiently; you 
will probably need to loosen the sequential requirement to allow for a parallel 
implementation. But in the absence of registration there is a big risk that poorly 
written implementations will get a new number each time they boot. In fact, there is 
also a big risk that a denial of service attack brings the system down. I would 
personally go for a simpler scheme: 1 bit for random/registered, and a controlled 
registration process to remove doubts. By the way, I would also probably reserve a /16 
prefix for a special class of 32 bits identifiers, the alreday allocated  IPv4 
addresses.
 
-- Christian Huitema




IETF IPng Working Group Mailing List
IPng Home Page:  http://playground.sun.com/ipng
FTP archive:  ftp://playground.sun.com/pub/ipng
Direct all administrative requests to [EMAIL PROTECTED]




RE: one question...

2002-11-26 Thread Christian Huitema
>  - Some companies may pay their ISPs to globally route their
>  GUPI addresses.  I know that some people don't
>  want this to be possible, but I'm not sure why.
>  I agree that we should only advise this if we can
>  come up with an aggregable method for allocating
>  GUPI addresses.

Margaret,

You should check the evolution of the size of the DFZ tables, for
example at http://bgp.potaroo.net/. From my neck of the woods, I
perceive a consensus on two points: that rapid growth of the number of
globally routed prefixes is not a good thing; and that the major cause
of growth is "site multi-homing", which translates exactly into "some
companies may pay their ISPs to globally route their (global)
addresses". (Attempts at traffic engineering through clever use of
routing tables is probably the other cause of table growth.)

The whole point of placing restrictions on the routability of the GUPI
is precisely to thwart attempts to pay your way into the routing table:
whatever the amount of money on the table, the ISP cannot say yes since
it cannot guarantee that other ISPs will route the GUPI.

-- Christian Huitema


IETF IPng Working Group Mailing List
IPng Home Page:  http://playground.sun.com/ipng
FTP archive:  ftp://playground.sun.com/pub/ipng
Direct all administrative requests to [EMAIL PROTECTED]




RE: Taking two steps back (Was: Re: one question...)

2002-11-26 Thread Christian Huitema
> Let's take two steps back, stop discussing possible solutions for a
> moment and discuss the problem statement.  I'd like it to be possible
for
> an enterprise to:
> 
>  - Have resources (i.e nodes or services) that are accessible
>  only to sub-groups within the enterprise (i.e.
>  departments).  Example:  a printer that only
marketing
>  is allowed to use.
>  - Have resources that are available to the whole enterprise,
>  but that are not accessible outside the enterprise.
>  Example:  An HR benefits website.
>  - Have resources that are available on an extranet (between a
>  selected group of enterprises) that are not
accessible
>  to all other enterprises.  Example:  A
supplier/customer
>  network.
>  - Have resources that are globally available, and be able to
>  send global traffic. Example:  Google.
> 
> All of these things can be achieved without site-locals, using
> provider-allocated global addresses and appropriate configurations of
> firewalls, ACLs, route filtering and split DNS.

In theory people would be smart and would never assign any security
property to an address. They would base access control on actual
authentication protocols, authorizing an activity if they have enough
trust in the user initiating the activity and the remote computer
through which the activity is performed. I wish everybody understood
that.

In practice, many system administrators do assign some properties to
addresses. In a large network, assigning properties to addresses
translates in a large number of access control lists in which the "only
marketing" or "HR benefits" restriction is translated into a set of
address prefixes. Experience proves that updating these prefixes during
network renumbering is a major pain. Having a stable set of prefixes
that you can use internally is thus very helpful.

-- Christian Huitema


IETF IPng Working Group Mailing List
IPng Home Page:  http://playground.sun.com/ipng
FTP archive:  ftp://playground.sun.com/pub/ipng
Direct all administrative requests to [EMAIL PROTECTED]




RE: one question...

2002-11-25 Thread Christian Huitema
> > So I've been watching this debate about globally
> > ~unique site locals and I don't understand how the
> > end node knows whether a particular destination
> > address is in scope (reachable) or not. The old
> > way, it just matched it to its own scoped prefix
> > and was done with it. What I've been hearing is
> > some desire to be able to patch together other
> > sites (extranets)... how would a node know which
> > scope address to use in that case?
> 
> in general the only way for node A to determine whether node B
> is reachable is for A to send a packet to B.  if A gets a reply
> from B, B is reachable.  if A gets an ICMP message back, B
> is not reachable (for temporary or permanent reasons).  if A
> gets nothing back, either B is (temporarily) unreachable or
> B doesn't want to answer A.
> 
> but you'll never be able to determine this by looking at prefixes.

Actually, the "Default Address Selection for IPv6" draft includes
language of that nature. It would have to be amended to take into
account the GUPI proposal. Something about assuming reachability of GUPI
if on the same site, but not if on a remote site. And then, we would
have to add policy hooks to mention "connected sites."

-- Christian Huitema


IETF IPng Working Group Mailing List
IPng Home Page:  http://playground.sun.com/ipng
FTP archive:  ftp://playground.sun.com/pub/ipng
Direct all administrative requests to [EMAIL PROTECTED]




RE: even one reason why provably unique SL is needed?

2002-11-25 Thread Christian Huitema
Pekka,

You keep ignoring one of the requirements: that we be able to find out
who is leaking information when "local" addresses leak through
applications, or through management protocols. Random numbers don't give
you that. Also, you should never underestimate how bad people and
computers are at picking random numbers. And you should also never
underestimate the malicious users who will deliberately pick the "wrong"
value and cause trouble.

There are several ways to provide global uniqueness: registration is
one; reuse of an already registered number is another. Among the
candidates that we could consider:

* IPv4 addresses, for those who already have them: 32 bits.
* Telephone numbers: we can encode 11 digits in 37 bits.
* Various unique enterprise numbers.

Such numbers can easily be configured offline.

-- Christian Huitema



IETF IPng Working Group Mailing List
IPng Home Page:  http://playground.sun.com/ipng
FTP archive:  ftp://playground.sun.com/pub/ipng
Direct all administrative requests to [EMAIL PROTECTED]




RE: "unique enough" [RE: globally unique site local addresses]

2002-11-24 Thread Christian Huitema
> It is actually my (weak) understanding that taking more inputs 
> does not actually result in more "uniqueness", at least for 
> random number generation. 
> Does anyone know how that works for hashing? 

This is well explained in RFC 1750, Randomness Recommendations for Security, D. 
Eastlake, S. Crocker,
J. Schiller, December 1994. In short, you need to make sure that the various strings 
you are hashing provide you the desired level of entropy -- would be 38 bits in this 
example.

-- Christian Huitema 





IETF IPng Working Group Mailing List
IPng Home Page:  http://playground.sun.com/ipng
FTP archive:  ftp://playground.sun.com/pub/ipng
Direct all administrative requests to [EMAIL PROTECTED]




Enforcing unreachability of site local addresses

2002-11-23 Thread Christian Huitema
One of the point in the discussion of the "globally unique" site local addresses has 
been the discussion of their usage. In particular, if the new addresses are globally 
unique, how do we prevent them from being globally routed and creating a mess in the 
global routing tables; and, on a related note, how do we make sure that they are 
actually local?
 
The issue is clearly complex. There are legitimate scenarios in which two sites might 
want to create some kind of backdoor connection independent of any ISP connection, in 
a way similar to the various "extranet" scenarios that are common today; it could also 
be used in a merger situation. There are also illegitimate scenarios in which a 
powerful customer would pressure an ISP to simply advertize their globally unique /48.
 
I believe that Bob Hinden provided the beginning of the answer when he proposed that 
all routers would have a default black-hole for the site local prefix. The 
implementation would be the following:
 
1) In a local site, advertise the subnet routes in the IGP, possibly a default route 
for the site, and a black-hole for the site local prefix. This guarantees internal 
connectivity to the valid subnets, and unreachability for all other sites.
 
2) In an extranet scenario, import in the IGP an explicit route for the "friendly" 
sites, and point it to the specific backdoor connecctions to these sites. This will 
override the blackhole.
 
3) At a border router, discard all BGP route that point to the site local prefix or 
subsets of it.
 
4) At a site border router or firewall, perform ingress filtering and discard all 
externally sourced packets in which the source address pretends to belong to the 
internal site.
 
The combination of 1 and 3 presents a powerful disencentive against the "leakage of 
routes" risk: a powerful customer might pressure a local ISP, but that would be to no 
avail since the packets would be dropped by the next hop. I believe that the 
combination of the four rules will provide the desired locality benefits without 
having to resort to ambiguity as an enforcement mechanism.
 
-- Christian Huitema


IETF IPng Working Group Mailing List
IPng Home Page:  http://playground.sun.com/ipng
FTP archive:  ftp://playground.sun.com/pub/ipng
Direct all administrative requests to [EMAIL PROTECTED]




RE: "unique enough" generation

2002-11-21 Thread Christian Huitema
> I'm assuming that for the intents and purposes of replacing
> "local" site-locals, "nearly unique" site-locals would be enough.

Not quite. You should get the slides of Rob Austein presentation to the
working group. We must really separate two issues, reachability and
ambiguity. It is very easy to ensure that a block of address is not
reachable -- any firewall can do that. But just because an address is
unreachable does not mean that they could just as well be ambiguous,
because these ambiguous addresses end up leaking in various places: DNS
records, source of ICMP packets, next hop in BGP messages, "received"
headers in mail or "via" headers in SIP, etc. In short, buggy addresses
appear at places where they should not. Ambiguity causes problem,
because you can never debug these problems.

I realize that we have a tension between two requirements, uniqueness
which imposes some form of registration, and "free use" which imply
making up the addresses locally and virtually guaranteeing possible
collisions. Maybe we have to embrace the dilemma, and allow for several
types of identifiers, some guaranteed unique and some quasi random. But
you must definitely provide unique numbers to those who are ready to
wait for registration.

-- Christian Huitema


IETF IPng Working Group Mailing List
IPng Home Page:  http://playground.sun.com/ipng
FTP archive:  ftp://playground.sun.com/pub/ipng
Direct all administrative requests to [EMAIL PROTECTED]




globally unique site local addresses

2002-11-21 Thread Christian Huitema
During the WG meeting, we agreed to work on the definition of a globally unqiue site 
local addressing architecture, so that we can eventually deprecate site local 
addresses. I am listing here so far a couple of points that were made by different 
speakers, as an introduction to the debate:
 
* we want to remove ambiguity, which is the root cause of many problems occuring when 
scoped addresses leak.
 
* we may or may not want to prevent routing of these addresses between sites. I guess 
we should certainly prevent routing between non-consenting sites.
 
* we definitely want the addresses to be provider independent, so they can survive 
renumbering or intermittent connectivity.
 
* indeed, it would be desirable that the addresses be usable in sites that are not 
connected.
 
* and we would definitely want the addresses to be free.
 
One of the main point of contention regarded routing. I guess that the consensus is, 
"just like site local addresses." We don't want to prevent usage in connected sites, 
but we expect that in these sites the hosts will also have provider based addresses, 
and that traffic routed out of the site will use the provider addresses.
 
Now, I guess we have to work from there. 
 
-- Christian Huitema


IETF IPng Working Group Mailing List
IPng Home Page:  http://playground.sun.com/ipng
FTP archive:  ftp://playground.sun.com/pub/ipng
Direct all administrative requests to [EMAIL PROTECTED]




RE: Proposal for site-local clean-up

2002-11-20 Thread Christian Huitema
> Perhaps more importantly, I don't buy the argument that *any* set of
> addresses should be considered trustworthy, by default or otherwise.  
> Addresses are simply not sufficient as an authentication mechanism. 
> This is not a practice that IETF standards should endorse or encourage.

I certainly agree with your first point: considering a block of addresses trustworthy 
is silly. What site locals give you is a component of "defense in depth": if an 
application listen only to a local scope addresses, it will not receive any packet 
that come directly from the Internet. Like it or not, that is a sizeable risk 
reduction, even if it is indeed possible to receive packets from a compromised local 
host, or from a clandestine attachment to the local network. But clearly, that is not 
sufficient: applications shall indeed check the credentials of their remote users, not 
just the addresses.

-- Christian Huitema

 





IETF IPng Working Group Mailing List
IPng Home Page:  http://playground.sun.com/ipng
FTP archive:  ftp://playground.sun.com/pub/ipng
Direct all administrative requests to [EMAIL PROTECTED]




RE: Proposal for site-local clean-up

2002-11-19 Thread Christian Huitema
>> Ok, but it isn't clear that these two factors are of even remotely similar
>> weight.  Leakage is a problem that can be addressed, but there are a lot of
>> things that simply will not work without stable addresses (at least not
>> without a complete overhaul of many higher-level protocols).
>
> Agreed that stable addresses are necessary, but experience suggests that
> it is very difficult to 'address' leakage of addresses.  Every application
> is another path by which addresses can be leaked.  For that matter, so
> is every mobile host.
During the transition phase, a number of hosts will be using IPv6 addresses 
that are derived from IPv4 addresses, and will thus be just as stable as 
IPv4 addresses. Even if we close our eyes very hard and wish for stable 
addresses very strongly, global IPv6 addresses will not be all that 
stable, at least not during the transition phase. We need some form 
of provider independent addresses for the local applications, and site 
local are what we have.
 
Clearly, site local are not perfect. As Keith points out, we can minimize 
address leakage, but we can certainly not guarantee a leakproof use of 
site local addresses. We can all observe that RFC 1918 do leak. 
 
I would argue that we are in a better position with IPv6 site local than 
with RFC 1918 IPv4 addresses. There is a standard API to determine the scope 
of an address, which makes the application's writer job somewhat simpler; 
indeed, these application writers has already to be concerned with not leaking 
link local addresses, so site local don't make their task much more complex. 
Also, IPv6 site local address include a mostly unique 64 bit node ID, which
means that the consequences of leakage are not quite as bad as for IPv4: you 
will mostly get a failed conection, not a connection to some other random host 
on the remote site.
 
The right solution could be to have provider independent non routable addresses. 
They would effectively be global, which would make programming simpler and would 
make leaks mostly  harmless. However, we don't have such addresses today, so this
is mostly a rhetorical argument. Also, such global addresses would require much
more management. I guess we are stuck with site local for now.
 
-- Christian Huitema


IETF IPng Working Group Mailing List
IPng Home Page:  http://playground.sun.com/ipng
FTP archive:  ftp://playground.sun.com/pub/ipng
Direct all administrative requests to [EMAIL PROTECTED]




Security & draft-deering-ipv6-encap-addr-deletion-00.txt

2001-12-11 Thread Christian Huitema

Steve,

In the WG discussion, we alluded to a security risk related to IPSEC
tunnels. The risk is the following. Compare a typical VPN set-up that
uses ESP:


<-- outer IPv6 header -><-- inner IPv6 packet, encrypted -> 
++++++++
+ 
|||||||| | 
|oNAF|  oSRC  |  oDEST | ESP header |iNAF|  iSRC  |  iDEST | |  iPAYLOAD

|||||||| | 
++++++++
+

Now, with the compression, we would in many cases be able to "compress"
the source address, resulting in:

<-- outer IPv6 header -><-- inner IPv6 packet, encrypted -> 
+++++++ + 
||||||| | 
|oNAF|  oSRC  |  oDEST | ESP header |iNAF|  iDEST | |  iPAYLOAD 
||||||| | 
+++++++ +

The big difference between the two is the iSRC is not protected by the
encryption, but recomposed after decryption by copying oSRC -- which is
not protected. This would open an attack avenue for a hacker or, heavens
forbids, a NAT...

-- Christian Huitema


IETF IPng Working Group Mailing List
IPng Home Page:  http://playground.sun.com/ipng
FTP archive:  ftp://playground.sun.com/pub/ipng
Direct all administrative requests to [EMAIL PROTECTED]




RE: draft-hinden-ipv6-host-load-sharing-00.txt

2001-11-09 Thread Christian Huitema

> > > An implementation MUST cycle through the router list in a round-
> > > robin fashion while making sure it always returns a reachable or
> > > a probably reachable router when one is available.
> > 
> > I can see encouraging implementations to do some sort of 
> load sharing,
> > but why does it have to be round-robin, and why MUST and not SHOULD?
> 
> The idea probably is that if it is MUST, you can rely (up to a certain
> point) on clients on actually doing load-balancing.

Even if we wanted to somehow mandate load sharing, there are generally
issues with mandating a round robin approach, or in fact any specific
algorithm. Round robin has two drawbacks: it hypothesizes that all
routers are equal, which is very often not the case, and it implies some
explicit ordering of the requests, which can lead to synchronizations.
The all routers equal hypothesis is fine for dumb hosts, but smart hosts
can acquire a knowledge that this or that router usually performs
better, which is enough to justify a "SHOULD" instead of "MUST". The way
to avoid synchronization is normally randomization, i.e. pick routers in
a random order rather than doing round robin.

-- Christian Huitema

IETF IPng Working Group Mailing List
IPng Home Page:  http://playground.sun.com/ipng
FTP archive:  ftp://playground.sun.com/pub/ipng
Direct all administrative requests to [EMAIL PROTECTED]




RE: /127 for P-t-P Considered Harmful

2001-11-06 Thread Christian Huitema

/127 for a P-t-P link? This must be a bug! We need a /64!

Have people considered the privacy implications? The computer at the end
of the link may well want to use privacy addresses. Also, there is a
credible possibility that a computer is composed of multiple subsystems,
each with their own IPv6 address. In the aggregatable architecture, it
makes a lot of sense if "n" is in fact 64 for most links.

-- Christian Huitema

IETF IPng Working Group Mailing List
IPng Home Page:  http://playground.sun.com/ipng
FTP archive:  ftp://playground.sun.com/pub/ipng
Direct all administrative requests to [EMAIL PROTECTED]




RE: W.G. Last Call on "IP Version 6 Addressing Architecture"

2001-09-27 Thread Christian Huitema

Brian,

Yes, we have in some cases to test whether the address is "global in
scope" or not; such tests are mandated for example in the behavior of
Shipworm routers. This points us to section 2.4 of the addressing spec,
which reads:

   The type of an IPv6 address is identified by the high-order bits of
   the address, as follows:


  Address type Binary prefixIPv6 notation   Section
   --   ---
  Unspecified  00...0  (128 bits)   ::/128  2.5.2
  Loopback 00...1  (128 bits)   ::1/128 2.5.3
  Multicast FF00::/82.7
  Link-local unicast   111010   FE80::/10   2.5.6
  Site-local unicast   111011   FEC0::/10   2.5.6
  Global unicast   (everything else)

So, when I implement the test, I am going to check whether the address
matches ::/127, FF00::/8, or FF80/9, and if yes recognize a non local
scope. What I should specifically not do is check whether the address
matches 2000::/3, and if not recognize a non local scope! In short,
looking for an inexistent format prefix would drive a programming error.

-- Christian Huitema

> -Original Message-
> From: Brian E Carpenter [mailto:[EMAIL PROTECTED]]
> Sent: Friday, September 07, 2001 11:49 AM
> To: Erik Nordmark
> Cc: Bob Hinden; [EMAIL PROTECTED]
> Subject: Re: W.G. Last Call on "IP Version 6 Addressing Architecture"
> 
> Well, I miswrote slightly - the fact is that an implementation has to
> first check if the address is any of the non-global-unicast cases, and
> that
> involves doing a sequence of matches which involve the bits
> Formerly Known as the Format Prefix (not just 3 of them of course).
> I think the new text makes this harder to understand. It doesn't
> change
> what implementors should do.
> 
> Feel free to ignore my comment if nobody else has the same reaction.
> 
>Brian
> 
> Erik Nordmark wrote:
> >
> > > I also think that abolishing the term "format prefix" is
> obfuscation. The
> > > fact is that the leading bits of an address *are* a format prefix
> and
> > > implementors *will* look at those bits before processing an
> address. Why
> > > obscure that fact?
> >
> > Brian,
> > It is exactly this that we want to avoid - implementors thinking
> that they
> > need to inspect the first 3 bits of the addresses.
> > There is no need to do this and we need to reduce the probability
> that
> > implementors hard-code any knowledge of any leading 3 bit
> combinations
> > since it will make it harder to use the other 15/16th of the address
> space
> > in the future.
> >
> >   Erik
> 
> IETF IPng Working Group Mailing List
> IPng Home Page:  http://playground.sun.com/ipng
> FTP archive:  ftp://playground.sun.com/pub/ipng
> Direct all administrative requests to [EMAIL PROTECTED]
> 


IETF IPng Working Group Mailing List
IPng Home Page:  http://playground.sun.com/ipng
FTP archive:  ftp://playground.sun.com/pub/ipng
Direct all administrative requests to [EMAIL PROTECTED]




RE: Any ideas about IPv6 in wireless network such as UMTS?

2001-09-25 Thread Christian Huitema



> -Original Message-
> From: Xingang Liang [mailto:[EMAIL PROTECTED]] 
> Sent: Tuesday, September 25, 2001 1:47 AM
> To: [EMAIL PROTECTED]
> Subject: Any ideas about IPv6 in wireless network such as UMTS?
> 
> 
> Hi,My friends,how are you!
> 
> I am doing some research about the benefits/challenges of 
> IPv6 deployment in wireless network such as UMTS and 
> encountered some problems:
> 
> 1.I don't know why the IPv6 should be deployed in the 
> wireless network.
> 
> 2.I don't know what is the benefits of IPv6 when implementing 
> in the wireless network.

Check RFC 3002, "Overview of 2000 IAB Wireless Internetworking
Workshop",  for an answer to your 1st and 2nd questions.

> 3.I don't know what challenges  we can face when implementing 
> IPv6 in the wireless network?

In a nutshell, agreeing on address allocation and mobile IPv6.

> 4.What is the reason of convergence between wireless network 
> and Internet?

Check the deployment of 802.11 networks, or the success of NTT Docomo.

-- Christian Huitema

IETF IPng Working Group Mailing List
IPng Home Page:  http://playground.sun.com/ipng
FTP archive:  ftp://playground.sun.com/pub/ipng
Direct all administrative requests to [EMAIL PROTECTED]




PPPoE & IPv6: packet too long?

2001-09-17 Thread Christian Huitema

According to RFC 2516, PPPoE, the Maximum-Receive-Unit (MRU) option MUST
NOT be negotiated to a larger size than 1492. If PPPoE implementations
actually negotiated an MRU size of 1492 bytes, we would not have an
issue. However, many implementations of PPPoE servers only support an
MTU of about 1100 bytes, i.e. less than the minimal MTU allowed by IPv6.

What should we do?

-- Christian Huitema

IETF IPng Working Group Mailing List
IPng Home Page:  http://playground.sun.com/ipng
FTP archive:  ftp://playground.sun.com/pub/ipng
Direct all administrative requests to [EMAIL PROTECTED]




RE: W.G. Last Call on "IP Version 6 Addressing Architecture"

2001-09-14 Thread Christian Huitema

> >>   Unassigned:
> >>
> >>   6/8 + 57/512 (2.5521177519070384759753095557382e+38
> >> +
> 3.788299787987010237775850121799e+37
> >> of addresses)
> >>This is the remaining of the address space, which
> has not
> >> been assigned.
> 
>   for implementers, it needs to be known that the unassigned
> region is
>   unicast addresses, not just "unassigned".
>   otherwise, implemnters cannot implement the code to handle these
>   "future allocation" addresses.  in my understanding this is the
>   main reason for the wording change between RFC and i-d.

Second that. We have to be able to decide thinks like "address scope"
and "address type", in order to implement requirements such as
"addresses used in this context must be global scope unicast addresses."
If we want compatibility with future assignments, that should not be
done by testing for 200::/3...

-- Christian Huitema

IETF IPng Working Group Mailing List
IPng Home Page:  http://playground.sun.com/ipng
FTP archive:  ftp://playground.sun.com/pub/ipng
Direct all administrative requests to [EMAIL PROTECTED]




RE: refocusing: what about the flow label?

2001-09-07 Thread Christian Huitema

> With the current flow label semantics the routers can avoid doing
> intserv
> state lookup if the flow label is null. If the flow label is used for
> path
> distribution, the router will be searching for the intserv state for
> all the
> packets (assuming the router does intserv at all). So from this
> point-of-view it might be better to designate a separate label type
> for
> intserv?

That should be a question for the Intserv WG. Either they can live with
the default mechanism, or they expand the effort of specifying their own
solution. I have no personal preference on this subject.

> What I'm aiming at is to see if a classifying router (intserv,
> diffserv, or other) could be ignorant of the different flow label 
> types when doing the lookup based on the 3-tuple of the source 
> address, destination address and the 20 bit flow label. 

That is indeed debatable. My proposal is to treat any non-understood
label as if it had been null; an alternate proposal could be to treat
any non-understood label as a basic label. Again, I don't have a strong
preference, we just need to pick one specification.

-- Christian Huitema


IETF IPng Working Group Mailing List
IPng Home Page:  http://playground.sun.com/ipng
FTP archive:  ftp://playground.sun.com/pub/ipng
Direct all administrative requests to [EMAIL PROTECTED]




RE: refocusing: what about the flow label?

2001-09-07 Thread Christian Huitema

>  > Doing that the "normal way" (value modulo some prime) seems like it
> would be
>  > a much too expensive operation to contemplate.   Doing it by
> calculating some
>  > kind of CRC of the 272 bits, then using however many bits of that
> would be
>  > better, but still not blindingly cheap.
> 
>Associative memory is your friend :-)

In fact, one of the points that were made clear in the debate is that
the router manufacturers will never "just trust the host", i.e. just
trust that the "flow label" is sufficiently random and sufficiently
unique that they could use it without looking at the addresses. Then,
even if the flow was unique, we should note that even 20 bits would be
two small to be practical: the birthday paradox would kick in as soon as
the router processes 1,024 flows, which is not a very large number; you
would need some kind of tie-breaking logic, which means that you would
have at a minimum to process the source address. So, it is much safer to
assume that the primary classification will be based on the address
pair, and that the label is just a differentiator for packets that carry
the same address pair and require specific treatment; Mike points out
one possible solution; there are certainly others; hashing 256 bits of
source-destination should not require an inordinate number of gates in a
VLSI.

-- Christian Huitema



IETF IPng Working Group Mailing List
IPng Home Page:  http://playground.sun.com/ipng
FTP archive:  ftp://playground.sun.com/pub/ipng
Direct all administrative requests to [EMAIL PROTECTED]




refocusing: what about the flow label?

2001-09-06 Thread Christian Huitema

I hope that after three weeks of exchanges, everybody is convinced that
we will not get any consensus on whether the best handling of QoS is
diffserv, intserv, or maybe no QoS at all. Let's try to be practical. We
have a simple problem to solve, the definition of the flow label in the
IPv6 specification. I propose the following compromise:

The flow label is comprised of 20 bits, divided between a four bit label
type and a 16 bit label value. IPv6 sources may set the flow label type
and the flow label value to label sequences of packets for which they
request special handling by the IPv6 routers, such as non-default
quality of service or "real-time" service; the label type defines how
the label value shall be used in the production of these services.
Label types may be defined in IETF standards and registered with the
IANA. This specification (i.e. IPv6) defines only one label type, the
basic label, whose value in binary is . Sources that do not require
any specific service should set the label type to the basic label and
the label value to a null value.

When the label type is the basic label and the label value to a non null
value, IPv6 routers are expected to treat identically all packets that
carry the same source address, destination address and flow label. For
example, when traffic is load balanced along several alternate paths,
these packets should all sent on a single path; when classification is
performed for the purpose of quality of service, these packets should
all be classified in the same class. If the label type is set to the
basic type, IPv6 routers SHOULD NOT rewrite or alter the flow label
value.

Processing of the flow label, and possibly rewriting of the label value,
is specified in the IETF standard defining the label type. When a router
encounters a packet with an unknown flow label type, it should treat the
packet as if the label type was the basic value and the label value was
the null value. Routers SHOULD NOT rewrite or alter the flow label value
if the flow label type is unknown.

I believe it captures most of our discussions: we get a basic label that
is roughly equivalent to the label currently assumed by RSVP/Intserv; we
get reserved bits for the future generations; and we get an extension
mechanism that can possibly used by Diffserv, charge to them to describe
exactly how they intend to use it.

-- Christian Huitema


IETF IPng Working Group Mailing List
IPng Home Page:  http://playground.sun.com/ipng
FTP archive:  ftp://playground.sun.com/pub/ipng
Direct all administrative requests to [EMAIL PROTECTED]




RE: a), b), c), d), or e)

2001-08-29 Thread Christian Huitema

I believe you are wrong. On obvious counter-example comes if the sender
has no privilege with the sender's ISP, but the receiver has these
privileges. In that case, the packet is marked as "priority high,
traffic type X" by the sender; the sender ISP's rewrites that to
"priority standard, traffic type X"; the receiver's ISP rewrites to
"priority high, traffic type X."

By the way, many people seem to believe that diffserv necessarily ties
with monetary exchanges. That is not necessary, if for example you
implement "alternative best effort" and get 2 best effort classes, one
for "high throughput, low loss", and one for "low delay, possible
losses."

-- Christian Huitema

> -Original Message-
> From: [EMAIL PROTECTED] [mailto:[EMAIL PROTECTED]]
> Sent: Wednesday, August 29, 2001 2:21 PM
> To: Christian Huitema; [EMAIL PROTECTED]; [EMAIL PROTECTED]
> Cc: [EMAIL PROTECTED]
> Subject: RE: a), b), c), d), or e)
> 
> Christian,
> 
> I might be wrong, but it seems that a downstream (operator) router
> CANNOT
> use end-to-end immutable information. If the policer in the 1st
> operators
> domain concludes that the customer is not paying enough for the
> treatment
> he's asking, the "treatment indicator" needs to be downgraded. If that
> is
> not allowed, the only other option would be to drop the packet
> altogether.
> 
>   Jarno
> 
> Christian Huitema wrote:
> > > > There are no stupid questions. Some of the pushback is
> > > > simply based on the fact that the diffserv model of QoS
> > > > is inherently broken because there is no end-to-end
> > > > immutable set of bits for local decisions to be based on.
> > >
> > > This is a very unfair comment. Diffserv is just fine in the
> > > case of unencrypted traffic. It has a problem (and so does
> > > intserv I suspect) with tunnel or transport mode ESP.
> >
> > ESP is just one of the cases in which "looking at the port
> > numbers" does
> > not provide sufficient information to make an informed decision.
> There
> > are many examples that do not involve ESP, e.g. an audio stream can
> > carry different levels of hierarchical encoding on successive
> > ports, an
> > HTTP transaction can carry a medical transaction just as well as
> > recreational content, a file transfer may be a virus update or a
> virus
> > propagation. At some point, the classification decision has to rely
> on
> > information provided by the source.
> >
> > In fact, there is no contradiction between the "immutable"
> requirement
> > that Tony is advocating and Brian's "diffserv handle" requirement.
> In
> > the diffserv model, the actual classification is based on the 6
> > classifier bits; there is no context that this can be mutable, since
> > ISPs must be authorized to reclassify traffic. The reclassification
> is
> > based on information carried in the packet, part of which is the
> label
> > affixed by the source; making that label immutable is a good thing,
> > since it prevents intermediaries from removing the
> > information that can
> > be used by a downstream router.
> >
> > -- Christian Huitema

IETF IPng Working Group Mailing List
IPng Home Page:  http://playground.sun.com/ipng
FTP archive:  ftp://playground.sun.com/pub/ipng
Direct all administrative requests to [EMAIL PROTECTED]




RE: a), b), c), d), or e)

2001-08-29 Thread Christian Huitema

> > There are no stupid questions. Some of the pushback is
> > simply based on the fact that the diffserv model of QoS
> > is inherently broken because there is no end-to-end
> > immutable set of bits for local decisions to be based on.
> 
> This is a very unfair comment. Diffserv is just fine in the
> case of unencrypted traffic. It has a problem (and so does
> intserv I suspect) with tunnel or transport mode ESP.

ESP is just one of the cases in which "looking at the port numbers" does
not provide sufficient information to make an informed decision. There
are many examples that do not involve ESP, e.g. an audio stream can
carry different levels of hierarchical encoding on successive ports, an
HTTP transaction can carry a medical transaction just as well as
recreational content, a file transfer may be a virus update or a virus
propagation. At some point, the classification decision has to rely on
information provided by the source.

In fact, there is no contradiction between the "immutable" requirement
that Tony is advocating and Brian's "diffserv handle" requirement. In
the diffserv model, the actual classification is based on the 6
classifier bits; there is no context that this can be mutable, since
ISPs must be authorized to reclassify traffic. The reclassification is
based on information carried in the packet, part of which is the label
affixed by the source; making that label immutable is a good thing,
since it prevents intermediaries from removing the information that can
be used by a downstream router.

-- Christian Huitema

IETF IPng Working Group Mailing List
IPng Home Page:  http://playground.sun.com/ipng
FTP archive:  ftp://playground.sun.com/pub/ipng
Direct all administrative requests to [EMAIL PROTECTED]




RE: a), b), c), d), or e)

2001-08-27 Thread Christian Huitema

> >  0   1
> >  0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9
> > +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
> > |0|   Pseudo-Random Value   |
> > +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
> >
> >
> >  0   1
> >  0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9
> > +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
> > |1| Diffserv IPv6 Flow Label|
> > +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+

Could we be a bit parcimonious and reserve a couple of header bits "for
further use"? We don't seem to have a level of consensus in the group
that people can guarantee that either a bunch of random bits, or a
diffserv flow label, are absolutely the best thing since sliced bread.
Not at the same level as the payload type or payload length, in any
case.  It would be nice to be able to invent something like ECN in
2010...

Maybe we could make it something like 4 bits of "label type" and 16 bits
of label value, defining then the possibilities for "0-0", "0-random"
and "1-diffserv" -- whatever that means.

-- Christian Huitema

IETF IPng Working Group Mailing List
IPng Home Page:  http://playground.sun.com/ipng
FTP archive:  ftp://playground.sun.com/pub/ipng
Direct all administrative requests to [EMAIL PROTECTED]




RE: (ngtrans) Joint DNSEXT & NGTRANS summary

2001-08-22 Thread Christian Huitema

In retrospect, I believe I made at least one mistake when writing the A6
RFC, which is going for a "full recursion" model. This triggers all
kinds of "interesting" possibilities. Going for a site model would have
been more appropriate: basically, one could request that the "prefix
domain name" points to a set of  records, allowing for exactly one
level of indirection. 

-- Christian Huitema

IETF IPng Working Group Mailing List
IPng Home Page:  http://playground.sun.com/ipng
FTP archive:  ftp://playground.sun.com/pub/ipng
Direct all administrative requests to [EMAIL PROTECTED]




RE: Higher level question about flow label

2001-08-22 Thread Christian Huitema

> On Thu, Aug 16, 2001 at 08:44:59AM -0500, Brian E Carpenter wrote:
> > I think the WG needs to decide once and for all whether the flow
label
> is
> >a) a CATNIP or MPLS-like routing handle
> > or b) a QOS hint for intserv only
> > or c) a QOS hint for intserv and diffserv
> > or d) a waste of bits

I think that the most useful use is probably (c). Option (a) is not
terribly interesting: if you want to do MPLS, just insert an MPLS
header; MP in MPLS stands for multi-protocol, which means that MPLS is
always going to have a "layer of indirection" for v4, v6, and whatever
else the ISP wants to run on it. Option (b) really means "a set of
random bits" and is not terribly useful either: it would require that
the routers trusts the random generation in the hosts, which is not
going to happen (the trust, I mean.) 

Option (c) really means "tell me something useful about the content of
the packet so I can use it for classification." Suppose I place here the
port number that identifies the service, e.g. 25 for mail, 80 for web,
etc., plus an indication of whether this is UDP or TCP. This plus the
addresses would enable some easy filtering into intserv or diffserv
classifications, without requiring that the router go deep into the
header chain. It would enable easy traffic statistics. It would be easy
to implement for the host (pick the lowest of dest or source port.) It
would work even if the packet is encrypted. We could reserve values for
specific traffics, e.g. RTP-audio, RTP-video. It would work even if we
use ESP. From an information theory point of view, this looks much more
useful than either random bits or null values.

Indeed, the bits will have to be set by the host. But then, so are the
port numbers. Nothing prevent cooperating hosts from running NFS over
port 80... In fact, if the router is willing to inspect the full header
chain, it could rewrite the bits to a "trusted" value. Also, some hosts
may not be willing to provide the information, e.g. when they actually
want to hide the nature of the encrypted traffic; these hosts could use
a null field, which would be classified to some default rule by the
diffserv filters (you cannot have it both ways.)

Count my vote for (c).

-- Christian Huitema

IETF IPng Working Group Mailing List
IPng Home Page:  http://playground.sun.com/ipng
FTP archive:  ftp://playground.sun.com/pub/ipng
Direct all administrative requests to [EMAIL PROTECTED]




RE: I-D ACTION:draft-hain-ipv6-pi-addr-00.txt

2001-07-05 Thread Christian Huitema

Tony,

You allocate prefixes by combining latitude and longitude. The scheme
you propose is reasonably efficient, using 44 bits to pave the earth
with "squares" (in fact, trapezes) whose sides are at most 10 meter
wide. This is about OK, except for the fact that an awful lot of the
space is dedicated to deserts and oceans. But what happens in the rather
common case of office buildings in which different organizations share
different floors?

-- Christian Huitema

IETF IPng Working Group Mailing List
IPng Home Page:  http://playground.sun.com/ipng
FTP archive:  ftp://playground.sun.com/pub/ipng
Direct all administrative requests to [EMAIL PROTECTED]




test

2001-07-03 Thread Christian Huitema

-

IETF IPng Working Group Mailing List
IPng Home Page:  http://playground.sun.com/ipng
FTP archive:  ftp://playground.sun.com/pub/ipng
Direct all administrative requests to [EMAIL PROTECTED]




RE: RFC 2553 bind semantics harms the way to AF independence

2001-07-02 Thread Christian Huitema

Francis,

I believe that your comments are based on a host model that does not
entirely cover reality. An IP address, v4 or v6, designates an
interface, not a host. A host can have many IP addresses; it can be
multi-homes to several interfaces, and it can be "artificially divided"
into several "sub-host", e.g. when the host is the platform for several
"sites", each with its own servers for HTTP, FTP, telnet and SMTP.

In a multi-homed host, processes must obviously be able to bind to a
specific address. For example, if a host supports www.example1.com and
www.example2.com, you definitely expect that two different mail server
processes will bind to www.example1.com:25 and www.example2.com:25.
Another reason to do so may be to insist that a specific service is only
reachable through a specific interface. You expect to achieve the
address or interface selection by binding the socket to a specific
address+port combination, not just a port number. Indeed, you want to be
able to support this function for IPv4 and IPv6 addresses.

In a multi-homed host that uses IPv4 and IPv6, you get quite a number of
combinations. I may want a socket to all interfaces and all protocols,
to a specific interface and a specific protocol. I could also imagine to
"all protocols on a specific interface, but there is a slippery slope
here. As we start taking advantage of the large IPv6 address space, we
introduce new concepts such as privacy addresses, so we loose the
restriction of "one address per interface", and the correspondence
between "the IPv4 address of the interface" and "the IPv6 address of the
interface" becomes fuzzy. Then, there are interfaces such as 6to4 that
are IPv6 only. Pretty soon, you realize that the easiest way to select
an interface is to bind to a port on a fully specified address, and that
such sockets will by definition be single protocol.

-- Christian Huitema


> -Original Message-
> From: Francis Dupont [mailto:[EMAIL PROTECTED]]
> Sent: Sunday, July 01, 2001 9:34 AM
> To: Mauro Tortonesi
> Cc: Jim Bound; [EMAIL PROTECTED]; [EMAIL PROTECTED];
> [EMAIL PROTECTED]
> Subject: Re: RFC 2553 bind semantics harms the way to AF independence
> 
>  In your previous mail you wrote:
> 
>> With V6ONLY you should be able to bind 0.0.0.0, 23 and bind ::,23
one
>> using AF_INET and the other AF_INET6.
> 
>RFC2553 does not state this behaviour.
> 
> => I disagree.
> 
>in fact many implementations do not allow to do this.
> 
> => fix them!
> 
>can you explain better? let's take two sockets, an AF_INET and an
>AF_INET6+V6ONLY one. can i bind them on the same port only if i
>bind first to 0.0.0.0 and then to ::? or is it also correct to bind
>first to :: and then to 0.0.0.0?
> 
> => both, V6ONLY removes possible interferences between IPv6 and IPv4
> spaces.
> 
>RFC2553 is silent about this.
> 
> => 2553 bis is not, reread the V6ONLY spec.
> 
> [EMAIL PROTECTED]
> 
> IETF IPng Working Group Mailing List
> IPng Home Page:  http://playground.sun.com/ipng
> FTP archive:  ftp://playground.sun.com/pub/ipng
> Direct all administrative requests to [EMAIL PROTECTED]
> 

IETF IPng Working Group Mailing List
IPng Home Page:  http://playground.sun.com/ipng
FTP archive:  ftp://playground.sun.com/pub/ipng
Direct all administrative requests to [EMAIL PROTECTED]




RE: RFC 2553 bind semantics harms the way to AF independence

2001-06-26 Thread Christian Huitema

>then why bothering to write RFC2553? if any ISV can do what he
wants it
>has been only a useless effort.

There is a strong case to be made that the IETF should limit itself to
the definition of protocols, i.e. the bits that flow on the wire, and
should not be concerned with APIs. APIs are typically determined by two
factors, the function that you want to provide and the environment in
which you provide it. The IETF knows a lot about what function to
provide, but it generally does not know all that much about the
environment. Would you still use the socket API in a firmware
implementation? Would it be the same in a massively parallel machine?
What about a quantum computer? API definition in the IETF is always an
exception, not a norm.

In fact, we may observe that RFC 2553 is an informational document, not
a standard track document. It was produced by the WG in a burst of
enthusiasm, but it is a strange beast when in comes to process. How does
one apply the "implementation that interoperate" test? How do we
progress a document and drop features that were not in fact implemented?
How does it apply to hardware implementations of TCP/IP? If there are
not enough compliant implementations, does one obsolete the document and
forget about it? 

On the other hand, the subject makes for volume of exchanges on the WG
list, which gives us a comforting sense of liveness...

-- Christian Huitema

IETF IPng Working Group Mailing List
IPng Home Page:  http://playground.sun.com/ipng
FTP archive:  ftp://playground.sun.com/pub/ipng
Direct all administrative requests to [EMAIL PROTECTED]




RE: IPv6 over UDP/IPv4

2001-06-15 Thread Christian Huitema

> From: Robert Elz [mailto:[EMAIL PROTECTED]]
> From:    "Christian Huitema" <[EMAIL PROTECTED]>
> 
>   | I think we must meet the following requirements:
> 
> If all that is to be done, then it would probably be easier to
> just use TCP.  That doesn't, of itself, satisfy all the requirements,
> but it makes it a lot easier to handle them (eg: it pretty much
handles
> the two way data problem, and it allows some kind of authentication
that
> doesn't have to be repeated for every packet).

In fact, if you really want to maximize the chances of going through
"hostile territory", you probably want to use IPv6 > HTTP > TLS > TCP.
And yes, I do mean "https"; using a different port would allow the
network police to see you and catch you. This would get you through
firewalls as well as NAT. OTOH, shipping this kind of solution will also
get you "interesting" comments from network managers. Also, you may have
a small problem with the packets' latencies.

Seriously, I believe that most of the requirements can be met pretty
easily. You need to design a protocol that starts with a formal
handshake, probably similar in nature to the PPP control protocol:
provide credentials in a format that is compatible with a Radius
back-end. You want the handshake to be at least a three ways handshake,
so has to ensure that the connection actually works. You may want to
negotiate something like ESP or TLS. As Franci points out, once the
connection is set and the identities have been validated, then we
probably are home free -- use autoconfig if needed, use NUD, etc.

-- Christian Huitema


IETF IPng Working Group Mailing List
IPng Home Page:  http://playground.sun.com/ipng
FTP archive:  ftp://playground.sun.com/pub/ipng
Direct all administrative requests to [EMAIL PROTECTED]




RE: IPv6 over UDP/IPv4

2001-06-15 Thread Christian Huitema

The UDP tunneling scenario aims at solving the NAT crossing problem.
This is fine, but we need more than just a pot number and a payload
format to make this work. Since the origin of the tunnel is located
behind a NAT, and possibly many, you cannot predict the port number and
the IP address that it will use. Also, it is fair to assume that the
tunnel will probably not be offered by the local ISP -- if this ISP
wished to provide IPv6 service, it could just enable native IPv6, or
possibly native tunneling. I think we must meet the following
requirements:

1) There is no way to "pre-configure" the connection. The association
between a given "user prefix" and a pair of natted address and port must
be discovered in real-time.

2) There must be a way to verify the identity of the party requesting
the tunnel, to mitigate the risk of traffic highjacking, and possibly to
ensure that only authorized parties are using the service.

3) There must be some way to verify the origin of the traffic, in order
to avoid denial of service attacks.

4) There must be a way to "qualify" the tunnel, and check that traffic
is indeed flowing in both directions -- NAT configurations are prone to
bizarre cases of failure.

We should also note that IPv6 over UDP should be designed to work with
all NATs, including those that use "destination specific" port mappings.
The design, and the port discovery, should be focused on bilateral
tunnels. 

-- Christian Huitema

> -Original Message-
> From: Francis Dupont [mailto:[EMAIL PROTECTED]]
> Sent: Friday, June 15, 2001 7:44 AM
> To: [EMAIL PROTECTED]
> Subject: IPv6 over UDP/IPv4
> 
> We know that IPv6 over UDP/IPv4 is very useful for some users.
> This is very easy to do too (see the PS) but an advantage to
> have a document which specifies it is we can get a standard port...
> Do you believe we should write an Internet Draft about it?
> 
> [EMAIL PROTECTED]
> 
> PS: on FreeBSD 4.3 with Netgraph a little variation of
> the /usr/share/examples/netgraph/udp.tunnel script does the job.
> With if_tun (for systems without a netgraph-like facility) this takes
> one page of trivial code... or nothing if the user mode PPP has both
> UDP and IPv6 supports.
> 
> IETF IPng Working Group Mailing List
> IPng Home Page:  http://playground.sun.com/ipng
> FTP archive:  ftp://playground.sun.com/pub/ipng
> Direct all administrative requests to [EMAIL PROTECTED]
> 

IETF IPng Working Group Mailing List
IPng Home Page:  http://playground.sun.com/ipng
FTP archive:  ftp://playground.sun.com/pub/ipng
Direct all administrative requests to [EMAIL PROTECTED]




RE: Draft Minutes for IPng Interim Meeting

2001-06-12 Thread Christian Huitema

> > I for one believe that we should assume rapid renumbering as a
feature
> > of IPv6.
> 
> great!  how does it work?  not broad desires, but the devilish details
> please.

This is a perfectly reasonable request. I believe that the correct
answer is "draft the scenarios, plan the technology, demonstrate and
drill." So, lets first agree on a set of scenarios. I propose the
following five:

Scenario 1, first connection:
A site is currently isolated. The internal subnets have been numbered
using "site local" addresses. The site joins the IPv6 Internet. The site
managers use "Router Renumbering for IPv6" (RFC 2894) to automatically
inform the internal routers that they should start advertising the new
prefix. The hosts receive a router advertisement and automatically
create a global address as specified in "IPv6 Stateless Address
Autoconfiguration" (RFC 2462). 

Scenario 2, disconnection:
A site is currently connected to the Internet. The site managers plan to
disconnect. This occurs in two phases, first deprecating the old prefix,
then removing it. Both phases are implemented using "Router Renumbering
for IPv6" (RFC 2894) and "IPv6 Stateless Address Autoconfiguration" (RFC
2462).

Scenario 3, multi-homing:
A site is connected to the Internet through a single provider. The site
managers set a contract with another provider, and obtain a new prefix.
The site managers use "Router Renumbering for IPv6" (RFC 2894) to
automatically inform the internal routers that they should start
advertising the new prefix. The hosts receive a router advertisement and
automatically create a second global address as specified in "IPv6
Stateless Address Autoconfiguration" (RFC 2462).

Scenario 4, removing a provider:
A site is connected to the Internet through two providers. The site
managers want to terminate the contract with one of these providers.
This occurs in two phases, first deprecating the old prefix, then
removing it. Both phases are implemented using "Router Renumbering for
IPv6" (RFC 2894) and "IPv6 Stateless Address Autoconfiguration" (RFC
2462).

Scenario 5, time-of-day preference:
A site is connected to the Internet through two providers. These
providers use different tariffs. The site managers desire that one of
the providers be preferred during working hours, say from 9:00 am to
5:00 pm, and another be preferred during the rest of the day. They use
"Router Renumbering for IPv6" (RFC 2894) at critical times (9:00 am,
6:00 pm) to deprecate one of the global prefixes and promote the other.
The hosts receive router advertisements and heed them as specified in
"IPv6 Stateless Address Autoconfiguration" (RFC 2462).

You will indeed notice that these scenarios are broadly sketched. The
purpose of the scenarios is indeed to discover whatever is missing in
our toolbox. For example, we say nothing of "static address filters"
used for QoS and security purposes; we may guess that these could be
updated as a side effect of router renumbering, but we would be better
offwith a real specification. More to the point, we say nothing about
DNS interaction. We know the requirement, as Itojun pointed it:
addresses should remain valid for as long as the TTL of the DNS record;
this is addressed in the scenarios 2 and 4 through a two phase approach,
first deprecate a prefix, then at the end of the TTL remove it. When it
comes to creating new addresses, or deprecating them, we really have two
choices. One possibility is to let the hosts use dynamic DNS updates to
create or update  or A6 records on the fly; another possibility is
to have the site managers update the  or A6 records in a reference
file. We have to analyse the benefit/cost of /A6 in this context.

But first, let's agree on the scenarios. Do we believe that they are
realistic? Can we qualify them with a "frequency indicator," e.g. once
in a life-time, once a year, once a month, once a day? Is there a big
scenario that we are missing, such as maybe provider mandated
renumbering, or the merging of independent sites?

-- Christian Huitema

IETF IPng Working Group Mailing List
IPng Home Page:  http://playground.sun.com/ipng
FTP archive:  ftp://playground.sun.com/pub/ipng
Direct all administrative requests to [EMAIL PROTECTED]




RE: Draft Minutes for IPng Interim Meeting

2001-06-11 Thread Christian Huitema

I for one believe that we should assume rapid renumbering as a feature
of IPv6. The argument for that is the classic "fire escape" analogy. If
you don't practice frequent exercises, you find one the day of the
actual fire that a clutter of boxes blocks the escape. If we want to be
able to renumber when needed, then we should assume that we will
renumber frequently.

Note however that the window of opportunity is closing fast. In the
absence of a strong endorsement of A6, we will start deploying stacks
that only do . Once millions of these have shipped, the issue will
be moot.

-- Christian Huitema 

> -Original Message-
> From: Rob Austein [mailto:[EMAIL PROTECTED]]
> Sent: Sunday, June 10, 2001 1:00 PM
> To: [EMAIL PROTECTED]
> Subject: Re: Draft Minutes for IPng Interim Meeting
> 
> The basic problem is that neither the IPv6 community nor the DNS
> community has reached a clear consensus on whether the extra features
> of A6 over  are worth the extra cost.  That's not a euphemism for
> "have decided that they're not", I really mean that we have people
> advocating each side in each group and have not answered the question.
> 
> So we attempted to approach the question from the angle of "what does
> IPv6 need the DNS to do?"  Since that question also appears to be a
> potential rathole, we tried to focus on the specific areas in which A6
> would allow us to do things that can't be done with just  and some
> preprocessing during zone file generation.
> 
> All the cases we thought of that would justify A6 appeared to boil
> down to situations where the DNS data would have to change so fast
> that it isn't practical to update the DNS that quickly (eg, rapid
> renumbering, or GSE-like routing).
> 
> So the question to the IPv6 WGs is: is IPv6 going to be doing these
> things?  If so,  probably is not sufficient, and A6 may be the
> answer.  If not,  may or may not be sufficient, but the new
> features that A6 provides don't appear to be justified by IPv6's
> requirements.
> 
> 
> IETF IPng Working Group Mailing List
> IPng Home Page:  http://playground.sun.com/ipng
> FTP archive:  ftp://playground.sun.com/pub/ipng
> Direct all administrative requests to [EMAIL PROTECTED]
> 

IETF IPng Working Group Mailing List
IPng Home Page:  http://playground.sun.com/ipng
FTP archive:  ftp://playground.sun.com/pub/ipng
Direct all administrative requests to [EMAIL PROTECTED]




RE: DNS query over anycast

2001-06-04 Thread Christian Huitema

Part of the problem is the definition of the IPv6 anycast service. We
would really want to have a service that works well for UDP as well as
TCP; using an anycast address as a TCP source is problematic; in  fact,
even using an anycast address as an UDP source generates interesting
failure cases if the query packet happens to be replicated and the
response happen to come from two servers.
 
In the short term, we could indeed just use the current IPv4 solution.
In fact, you can probably weasel that into the current IPv6 framework,
explaining that the address is in fact a unicast address to a
"distributed interface" to a "distributed server."
 
In the mid term, we would want to study a "real" solution. This should
probably be based on some kind of "redirect" scenario: try to reach the
"logical address X:X:X:X", and receive a redirect to a physical
implementation; that could work with TCP as well as UDP, and be robust.
 
-- Christian Huitema

 winmail.dat


RE: W.G. Last Call on "Default Address Selection for IPv6"

2001-06-01 Thread Christian Huitema

In fact, there is only one debatable MUST that remains -- at the end of
section 4, the reference to "Rule 2 (prefer appropriate scope) MUST be
implemented and given high priority because it can affect
interoperability." Rule 2 essentially states that one should pick the
lowest scope that it still higher or equal than the destination. There
are plenty of reasons to override that, e.g. different performance of
different interfaces, etc. A SHOULD would be in order.

-- Christian Huitema

> -Original Message-
> From: Erik Nordmark [mailto:[EMAIL PROTECTED]]
> Sent: Friday, June 01, 2001 10:35 AM
> To: Christian Huitema
> Cc: Francis Dupont; Bob Hinden; [EMAIL PROTECTED]
> Subject: RE: W.G. Last Call on "Default Address Selection for IPv6"
> 
> Christian,
> 
> Which MUST in the spec do you feel is inappropriate?
> 
> There are only 6 MUST/MUST NOT and as far as I can tell
> they specify constraints that effect interoperability or the protocols
> actually working (e.g. not letting a link local addresses for
> link A be used on as a source address for packets sent on link B).
> 
>   Erik


IETF IPng Working Group Mailing List
IPng Home Page:  http://playground.sun.com/ipng
FTP archive:  ftp://playground.sun.com/pub/ipng
Direct all administrative requests to [EMAIL PROTECTED]




RE: W.G. Last Call on "Default Address Selection for IPv6"

2001-06-01 Thread Christian Huitema

I believe that Francis has a point when it comes to must vs. should or
may. The current document is based on theoretical analysis rather than
field experience, and there is no telling what we will learn in the next
two years. As a rule, I believe that this document should never use the
clause "must", and restrict itself to the milder should. In short, if
there is any use for such a document, it should be some kind of a safe
harbor approach, as in, "if you do this, we believe you won't cause much
problems to the network, but if you know better feel free to innovate."

Note that the fledging nature of IPv6 is actually an argument for
standard track, since it will automatically trigger a revision mechanism
in 6 month to 2 years, when we have to progress the status of this
document. If we have a choice, it is not between proposed standard and
informational, but rather between proposed standard and experimental.
The latter would suit me just fine.

-- Christian Huitema

> -Original Message-
> From: Francis Dupont [mailto:[EMAIL PROTECTED]]
> Sent: Thursday, May 31, 2001 5:33 PM
> To: Bob Hinden
> Cc: [EMAIL PROTECTED]
> Subject: Re: W.G. Last Call on "Default Address Selection for IPv6"
> 
> I strongly object against the standard track status for this document
> because this will close the door:
>  - research won't be done in order to find alternate/better solution
>  - implementors will have to implement exactly the mechasnims
described
>in the document or they won't be conformant.
> The first point is a known drawback for standards. My concern is more
> the second point, I understand we have to restraint freedom for
getting
> more interoperability but in this case we are going too far!
>  Some choices are still arguable, in particular in defaults, and these
> will become standards so even we believe they are not good we will be
> stuck with them.
>  These concerns have already slowed down the document and can become
> critical when it will go further in the standard track. Common sense
> rules ("MUSTs") should be in a different document than some detailed
> mechanisms ("SHOULD/MAYs").
> 
> Regards
> 
> [EMAIL PROTECTED]
> 
> IETF IPng Working Group Mailing List
> IPng Home Page:  http://playground.sun.com/ipng
> FTP archive:  ftp://playground.sun.com/pub/ipng
> Direct all administrative requests to [EMAIL PROTECTED]
> 

IETF IPng Working Group Mailing List
IPng Home Page:  http://playground.sun.com/ipng
FTP archive:  ftp://playground.sun.com/pub/ipng
Direct all administrative requests to [EMAIL PROTECTED]




RE: Interim Meeting -- phone line

2001-05-30 Thread Christian Huitema

One more change to the meeting place call for tomorrow & Friday.  Phone
number is still the same:  +1 (425) 703-7600 locally and 800-421-6738.  
 
Meeting ID has changed:  1962 NOT 1926

-Original Message- 
From: Christian Huitema on behalf of Christian Huitema 
Sent: Wed 5/30/2001 11:07 AM 
To: [EMAIL PROTECTED]; [EMAIL PROTECTED] 
Cc: 
Subject: Interim Meeting -- phone line


We have a phone hook up to the conference room today, tomorrow &
Friday, allowing for up to 25 callers between 9am and 5pm local time.
The call number is:
   1-800-421-6738 or +1 (425) 703-7600
The meeting ID is
   1926
 
    -- Christian Huitema 


 winmail.dat


Interim Meeting -- phone line

2001-05-30 Thread Christian Huitema

We have a phone hook up to the conference room today, tomorrow & Friday,
allowing for up to 25 callers between 9am and 5pm local time. The call
number is:
   1-800-421-6738 or +1 (425) 703-7600
The meeting ID is
   1926
 
-- Christian Huitema 

 winmail.dat


RE: Consequences of 6to4

2001-05-09 Thread Christian Huitema

> |As for the other consequences of 6to4, the main one will be to raise
> |expectations. 6to4 enables a user to derive an IPv6 prefix from a
single
> |global IPv4 address. Many solutions will be using this capability,
e.g.
> |providing global addresses to multiple devices, or using multiple
> |addresses for different functions within a single computer. This
imply
> |that the "native v6" ISP will be expected to provide users with a
> |prefix, not a single host address -- otherwise, the native v6
solution
> |will be perceived as inferior to the existing 6to4 solution.
> 
> Yes, and that's going to annoy the ISP no end.

Uh, I don't perceive IPv6 as a tool to annoy the ISPs. ISPs are selling
a product that users use to run applications and get services. ISP
services compare in terms of how many applications you can run
(transparency), how fast (bandwidth), how reliably, how easily and at
what price. The price and the offer are mostly determined by cost and
competition; the cost depends largely on the underlying technology, how
easy it is to manage, how many support calls do we expect from users,
etc. If we provide technology that let ISP provide better services at a
reasonable cost, there will be more demand, the market will expand, etc.
Everybody will be happier.

-- Christian Huitema

IETF IPng Working Group Mailing List
IPng Home Page:  http://playground.sun.com/ipng
FTP archive:  ftp://playground.sun.com/pub/ipng
Direct all administrative requests to [EMAIL PROTECTED]




Consequences of 6to4

2001-05-08 Thread Christian Huitema

> It's relevant unless you eliminate 6to4 and any other scheme that
> generates portable v6 address space from v4 space.  6to4 is actually 
> rather interesting in that it has the potential to overtake "native"
v6
> addressing (especially considering Microsoft's treatment of 6to4 as a 
> first-class citizen).  

The main advantage of 6to4 is that we can jumpstart IPv6 quickly,
without requiring any tunnel configuration. We get a solution that is as
easy to deploy as a NAT, but which does enable global addressing and is
thus markedly superior in several important communication scenarios,
e.g. peer-to-peer applications, voice and video communication,
multi-player games.

Note however that these scenarios do not require "portable" addresses.
Most of the interesting applications come with their own rendezvous
mechanism, such as dynamic registration of peers in Napster or Gnutella,
SIP proxies for voice or video, lobbies for game players. Dynamic
addresses are fine, as long as they are global.

By the way, this means that we will get two kinds of ISPs: if an ISP can
provide a home with at least one global address, then we can start
enable IPv6 in the home with 6to4, and thus enable the applications. On
the other hand, if an ISP only provides the home with a non-global
address, e.g. a net 10 address, then a number of interesting
applications will not work. I suspect that this will create some form of
market pressure.

> Once 6to4 has served its purpose of jump-starting IPv6 deployment and
the
> time comes to kill it off in favor of native aggregated addressing,
the 
> task may be more difficult than was anticipated.  If the bulk of users
are
> on the 6to4 side, simply severing ties to the native backbone won't do
the 
> trick since that would hurt the native users more than the 6to4 users.
It
> would instead require action on the v4 backbone to block the
encapsulated 
> 6to4 traffic, and that might raise some eyebrows.

There are two answers to this question. A first one is to make the
interoperation between 6to4 and "native v6" as seamless as possible;
this is precisely why NGTRANS adopted the "6to4 anycast" draft, so that
we could deploy 6to4 boxes that automatically find a default route to
::/0; this draft is in the RFC editor's queue, pending IANA processing.
A second one is to enable the "6to4 boxes" to automatically receive an
IPv6 address prefix from an ISP, and then be able to propagate that
prefix to a local network, e.g. a home network. If we had that capacity,
then the "box" could be programmed to not start the 6to4 operation if it
can find a better, native, alternative. We can more or less do this
today in a clunky way, through a mix of PPPv6 and router advertisements;
we are lacking a properly engineered standard. Indeed, this standard
would be particularly helpful for the ISPs who, for some reason, cannot
provide global IPv4 addresses to their users.

As for the other consequences of 6to4, the main one will be to raise
expectations. 6to4 enables a user to derive an IPv6 prefix from a single
global IPv4 address. Many solutions will be using this capability, e.g.
providing global addresses to multiple devices, or using multiple
addresses for different functions within a single computer. This imply
that the "native v6" ISP will be expected to provide users with a
prefix, not a single host address -- otherwise, the native v6 solution
will be perceived as inferior to the existing 6to4 solution.

-- Christian Huitema

IETF IPng Working Group Mailing List
IPng Home Page:  http://playground.sun.com/ipng
FTP archive:  ftp://playground.sun.com/pub/ipng
Direct all administrative requests to [EMAIL PROTECTED]




RE: AAAA/A6 thing

2001-05-01 Thread Christian Huitema

>   this part i don't really understand.  if we advocate "A6 0
<128bit>"
>   there will be resolver implementation that does not chase A6
chains
>   at all (like for cellphones or whatever).  if there's no need,
>   there'll be no code.  then, there will be no possibility for "A6
> ".  so I don't really see
> benefit
>   of "A6 0 <128bit>" than "".

I think we have to delineate the various motivation and arguments: we
want A6 to facilitate site renumbering and site multi-homing, while
reducing the rate of DNS update; we also want to avoid harmful effects
on the DNS resolution.

The motivation for A6 is still valid; no new argument there, I believe
it will be a great tool for network managers. There have been two
questions on its use, the linkage with the address allocation and the
depth of the hierarchy. The short answer to address allocation is router
advertisement; the short answer to the depth of the hierarchy is that a
depth of 1 is probably adequate to show significant benefits.

The motivation for using "A6 0 <128bit>" is the use of A6 during the
name resolution process, especially at the top level. We don't want root
servers spending their time chasing A6 chains, and we also don't want
the extra-load on root servers that could be caused by clients chasing
A6 chains. This means that the address records of name servers will have
to be explicitly updated when a site is renumbered. I believe that this
is a reasonable compromise; without A6 one would have to update all the
records; with the initial design we aimed at updating exactly one record
per site; with the compromise one would update a few records only.

We definitely need to gather operational experience. For example, an
assumption in the design of A6 is that the higher level of the hierarchy
will be very likely to be cached; whether this is true or false is easy
to measure after a modicum of deployment. Another assumption is that the
nodes can automatically update their addresses, and that the update
process can be synchronized with the DNS updates; this can indeed also
be tested. And, once we are done testing, we should document the
results.

Note that RFC 2874 packs together the use of A6 for name to IPv6 address
resolution, and the use of binary labels and DNAME for the IPv6 address
to name translation. When we conduct the evaluation, it may be useful to
separate the three points: A6, discussed above, DNAME, which has its own
set of benefits and issues, and binary labels, which is clearly an
extension to the core DNS name resolution mechanism.

-- Christian Huitema

IETF IPng Working Group Mailing List
IPng Home Page:  http://playground.sun.com/ipng
FTP archive:  ftp://playground.sun.com/pub/ipng
Direct all administrative requests to [EMAIL PROTECTED]




Addresses and BGP (was RE: was a6/aaaa - RA/ND & exchanges)

2001-05-01 Thread Christian Huitema

> BGP is bound between two IP addresses. When the IP addresses change
> the BGP peering is lost.

This is a valid point, which has already been discussed many times on
the list, but is not discussed or even alluded to in RFC 2283. The
solution in IGPs is to use link-local addresses for exchanging IGP
packets; this means that the "peering" in RIP, OSPF or IS-IS will
survive renumbering. This solution is not entirely applicable to BGP.
However, we can probably use a combination of the following:

1) Use of link local addresses when BGP peers are directly connected.
2) Use of site-local addresses when BGP peers belong to the same site.
3) Use of mobile-IP solutions so that TCP survives renumbering.
4) Use of IPv4 addresses in multi-protocol environments.

Each of these solutions is partial, and requires work, e.g. discovery
that peers are on the same link, or in the same site. I would argue that
this type of work is typical of the implementation phase that we are
entering, and should be conducted by pragmatists (the IDR working group)
rather than explorers (IPNG).

-- Christian Huitema

IETF IPng Working Group Mailing List
IPng Home Page:  http://playground.sun.com/ipng
FTP archive:  ftp://playground.sun.com/pub/ipng
Direct all administrative requests to [EMAIL PROTECTED]




RE: Source addresses, DDoS prevention and ingress filtering

2001-04-24 Thread Christian Huitema

I am well aware of the threat model. I still believe that we have to
find a solution that does not "cut our nose to cure the cold." I have
specifically discussed how the attack can be fought by other means, and
how the attacker can in fact move from "spray" to other disguises and
still continue causing the problem. We have to find a solution that does
not prohibit mobile IP or multihoming.

-- Christian Huitema 

> -Original Message-
> From: Edward Vielmetti [mailto:[EMAIL PROTECTED]]
>
> Christian,
> 
> The specific threat model is a compromised host being directed under
> remote control to send a spray of packets with randomly forged source
> addresses to a victim host far away.  Intelligently throwing your
local
> equivalent of "ip verify unicast reverse-path" as a check in at
logical
> choke points on the network will *in actual practice* drop a whole lot
of
> traffic that should be dropped.  This has important implications for
> network operators.
> 
> This is not a security or confidentiality problem, and thus IPSEC is
> irrelevant.  It is a network integrity problem.
> 
> Ed
> 
> On Thu, 19 Apr 2001, Christian Huitema wrote:
> 
> > I am not sure it is such a good idea.
> >
> > From a security stand point, it is very weak. You are trusting that
some
> > third party, at the other end of the network, will do the right
thing.
> > What happens if the "first hop" is compromised? And, by the way,
what
> > exactly is the first hop? The wireless LAN in my home? The Ethernet
> > backbone in the same home? If you want any form of security, you
really
> > have to build it yourself, e.g. by using IPSEC. The only form of
source
> > address control that has a prayer of working is local, i.e. refuse
to
> > accept inbound packets in your domain that pretend to already come
from
> > an inside address.
> >
> > It is also very weak from a routing stand point. Internet routing is
> > anything but symmetric. The exit path from a domain depends only on
the
> > destination address, not the source address; insisting on strict
control
> > of the source address basically breaks multi-homing. It also breaks
> > several forms of mobility...
> >
> >
> > > -Original Message-
> > > From: Edward Vielmetti [mailto:[EMAIL PROTECTED]]
> > > Sent: Wednesday, April 18, 2001 10:41 AM
> > > To: Glenn Morrow
> > > Cc: Michael Thomas; Thomas Eklund; '[EMAIL PROTECTED]';
'ietf-
> > > [EMAIL PROTECTED]'
> > > Subject: RE: Source addresses, DDoS prevention and ingress
filtering
> > >
> > > And you're going to mandate source filtering on the first hop
across
> > the
> > > entire internet, how?  It's a great idea and a best common
practice
> > but
> > > not something that can be set by fiat.
> > >
> > > Ed
> > >
> > > On Wed, 18 Apr 2001, Glenn Morrow wrote:
> > >
> > > > Then again if source filtering is mandated on the first hop this
> > might
> > > > eliminate the need to do filtering on other hops and this would
> > > eliminate
> > > > the need to do subnet translation or tunneling by either the MN
or
> > the
> > > MR.
> > > >
> > > > -Original Message-
> > > > From: Morrow, Glenn [RICH2:C330:EXCH]
> > > > Sent: Wednesday, April 18, 2001 11:56 AM
> > > > To: 'Michael Thomas'
> > > > Cc: Michael Thomas; Thomas Eklund; '[EMAIL PROTECTED]';
> > > > '[EMAIL PROTECTED]'
> > > > Subject: RE: Source addresses, DDoS prevention and ingress
filtering
> > > >
> > > >
> > > > Oh, I see what you were concerned about. It seems to me that an
MR
> > will
> > > have
> > > > to tunnel or subnet translate unless it is on it's home subnet.
> > > >
> > > > -Original Message-
> > > > From: Michael Thomas [mailto:[EMAIL PROTECTED]]
> > > > Sent: Wednesday, April 18, 2001 9:49 AM
> > > > To: Morrow, Glenn [RICH2:C330:EXCH]
> > > > Cc: Michael Thomas; Thomas Eklund; '[EMAIL PROTECTED]';
> > > > '[EMAIL PROTECTED]'
> > > > Subject: RE: Source addresses, DDoS prevention and ingress
filtering
> > > >
> > > >
> > > > Glenn Morrow writes:
> > > >  > If the node behind the MR obtained its home address from the
the
> > > mobile
> > > >  > router's subnet, then the MN will use this as t

RE: Source addresses, DDoS prevention and ingress filtering

2001-04-20 Thread Christian Huitema

I believe that the source address should be defined as "the address at
which the source would like to receive replies to this message." In the
case of a mobile host, there is value in getting replies either at your
transient address or at the permanent address -- it basically depends on
the circumstance, just like multi-homing, and things would be simpler if
both were allowed.

Mobile networks could also be thought off as multi-homed networks. The
mobile router could in theory advertise two prefixes, one based on a
"permanent" connection maintain via some tunneling mechanism and one
based on the "transient" connection. Indeed, this can also be thought
off as an exercise in fast network renumbering. Say a car is traveling
at 180 km/h on a freeway, and a cell is 1 km wide -- it stays in any
given cell for 20 seconds; you may have to renumber the network every 20
seconds. That seems a more interesting problem to solve than source
address filtering, and I would in fact rather not make it even more
complex by throwing in mandatory source address filtering...

-- Christian Huitema

> -Original Message-
> From: Michael Thomas [mailto:[EMAIL PROTECTED]]
> Sent: Friday, April 20, 2001 8:53 AM
> To: Christian Huitema
> Cc: Edward Vielmetti; [EMAIL PROTECTED]; ietf-
> [EMAIL PROTECTED]
> Subject: RE: Source addresses, DDoS prevention and ingress filtering
> 
> 
> Christian,
> 
> So what is your opinion of using the topologically
> "incorrect" IP address as the source when, say, a
> mobile node is away from home? It is still, after
> all, return routable via its home address, so it's
> not completely bogus on its face. In fact, it's no
> different than the multihomed case. However, right
> now as currently constituted in mobileipv6 two
> things will be extremely problematic:
> 
> 1) The stationary host behind a mobile router I brought
>up before (no way to know what is "correct")
> 
> 2) RSVP reservations upon change of CoA will need
>to create a completely new reservation since
>the filterspec must change. If the classifier
>used the home address, the reservation could
>converge locally which would be beneficial.
> 
> There may well be other things which break because
> of the expectation of a fixed source address.
> 
>   Mike
> 
> Christian Huitema writes:
>  > Ed,
>  >
>  > I have seen over the past years many knee-jerk reactions to attacks
> that
>  > essentially followed the model you are describing. An example is to
cut
>  > ICMP because it is used in some attacks; the proposal to "verify
> unicast
>  > reverse-path" is another. The problem is that a number of these
> defenses
>  > amount to cutting your nose in order to cure the common cold. For
>  > example, cutting ICMP also suppresses efficient path MTU discovery;
>  > random reverse path verification kills multi-homing and makes
mobility
>  > much harder. This is compelled by the evolutionary nature of the
>  > attacks: many of the ICMP attacks can be replicated over UDP, and
thus
>  > you find sites cutting UDP as well -- and here goes voice over IP;
in
>  > fact, I could also mount attacks by sending TCP packets outside the
>  > context of connections -- think of the consequences of various
router
>  > protections for that...
>  >
>  > The "verify unicast" defense looks good on paper, but if you
analyze
> it,
>  > it requires quasi universal deployment to make a difference. This
is
> not
>  > simpler than deploying protection against forged addresses in the
>  > potential targets, mostly large web servers. In fact, the number of
>  > targets is probably lower than the number of "ingress routers" that
>  > would have to be upgraded. But then, there are three important
>  > differences.
>  >
>  > First, modern servers actually include protection against the
forged
>  > address attacks that you mention -- proper handling of TCP context
>  > creation and verification of the plausibility of sequence numbers
>  > provide a first line of defense; SSL or IPSEC provide further
> protection
>  > for critical systems. Routers don't include such protections today;
> they
>  > would require modification to routing protocols to describe the
>  > authorized source address in parallel to the allowed destinations,
>  > possibly additional fast-path hardware, and certainly an increased
>  > management load.
>  >
>  > Second, the protection only works if it is implemented everywhere,
and
>  > is in any case partial. As long as I cannot be sure that all
Internet
>  > routers perform the filter

RE: Source addresses, DDoS prevention and ingress filtering

2001-04-20 Thread Christian Huitema

Ed,

I have seen over the past years many knee-jerk reactions to attacks that
essentially followed the model you are describing. An example is to cut
ICMP because it is used in some attacks; the proposal to "verify unicast
reverse-path" is another. The problem is that a number of these defenses
amount to cutting your nose in order to cure the common cold. For
example, cutting ICMP also suppresses efficient path MTU discovery;
random reverse path verification kills multi-homing and makes mobility
much harder. This is compelled by the evolutionary nature of the
attacks: many of the ICMP attacks can be replicated over UDP, and thus
you find sites cutting UDP as well -- and here goes voice over IP; in
fact, I could also mount attacks by sending TCP packets outside the
context of connections -- think of the consequences of various router
protections for that...

The "verify unicast" defense looks good on paper, but if you analyze it,
it requires quasi universal deployment to make a difference. This is not
simpler than deploying protection against forged addresses in the
potential targets, mostly large web servers. In fact, the number of
targets is probably lower than the number of "ingress routers" that
would have to be upgraded. But then, there are three important
differences. 

First, modern servers actually include protection against the forged
address attacks that you mention -- proper handling of TCP context
creation and verification of the plausibility of sequence numbers
provide a first line of defense; SSL or IPSEC provide further protection
for critical systems. Routers don't include such protections today; they
would require modification to routing protocols to describe the
authorized source address in parallel to the allowed destinations,
possibly additional fast-path hardware, and certainly an increased
management load.

Second, the protection only works if it is implemented everywhere, and
is in any case partial. As long as I cannot be sure that all Internet
routers perform the filtering, I still have to implement adequate server
side protections. If the router can be hacked, the protection is
obviously ineffective. If the egress filtering operates on broad ranges,
say a university network, the hacker can stop using random addresses,
and instead pretend that all packets come from a single machine, e.g.
the university's web site.

Third, and most important, the network based defense places the defense
burden at the wrong side of the problem. The local network is not really
suffering from the attack; its administrators have only minor incentives
to fix it. The one who is suffering is a remote server; there, you have
a lot of incentives to fix the problem, fix the TCP stack, deploy IPSEC.

All in all, I wish we would not cut the node of our face. As servers get
hardened, the mode of attack will change. We don't want to maim the
network today to protect against an attack that will not be in much use
tomorrow.

-- Christian Huitema



> -Original Message-
> From: Edward Vielmetti [mailto:[EMAIL PROTECTED]]
> Sent: Thursday, April 19, 2001 9:24 PM
> To: Christian Huitema
> Cc: Glenn Morrow; Michael Thomas; Thomas Eklund;
[EMAIL PROTECTED];
> [EMAIL PROTECTED]
> Subject: RE: Source addresses, DDoS prevention and ingress filtering
> 
> Christian,
> 
> The specific threat model is a compromised host being directed under
> remote control to send a spray of packets with randomly forged source
> addresses to a victim host far away.  Intelligently throwing your
local
> equivalent of "ip verify unicast reverse-path" as a check in at
logical
> choke points on the network will *in actual practice* drop a whole lot
of
> traffic that should be dropped.  This has important implications for
> network operators.
> 
> This is not a security or confidentiality problem, and thus IPSEC is
> irrelevant.  It is a network integrity problem.
> 
> Ed
> 
> On Thu, 19 Apr 2001, Christian Huitema wrote:
> 
> > I am not sure it is such a good idea.
> >
> > >From a security stand point, it is very weak. You are trusting that
> some
> > third party, at the other end of the network, will do the right
thing.
> > What happens if the "first hop" is compromised? And, by the way,
what
> > exactly is the first hop? The wireless LAN in my home? The Ethernet
> > backbone in the same home? If you want any form of security, you
really
> > have to build it yourself, e.g. by using IPSEC. The only form of
source
> > address control that has a prayer of working is local, i.e. refuse
to
> > accept inbound packets in your domain that pretend to already come
from
> > an inside address.
> >
> > It is also very weak from a routing stand point. Internet routing is
> > anything but symmetric. The exit path from a domain

RE: Source addresses, DDoS prevention and ingress filtering

2001-04-20 Thread Christian Huitema

No, I am not referring to AAA solutions. I am referring to server side
defenses. These defenses are effective against most DoS attacks. They
may not be effective against a complete saturation attack that floods
the server's access link, but I doubt that source address verification
would be the solution to that one; after all, activists can swamp a
phone bank today without hiding their calling numbers. Replicated server
at a number of diverse location is probably more effective than source
address verification. By the way, most "server flooding" today is caused
by "flash-crowd" phenomena with plain bona-fide clients. 

-- Christian Huitema 

> -Original Message-
> From: [EMAIL PROTECTED] [mailto:owner-
> [EMAIL PROTECTED]] On Behalf Of Thomas Eklund
> Sent: Friday, April 20, 2001 4:26 AM
> To: Christian Huitema; 'Edward Vielmetti'; 'Glenn Morrow'
> Cc: 'Michael Thomas'; '[EMAIL PROTECTED]'; 'ietf-
> [EMAIL PROTECTED]'
> Subject: RE: Source addresses, DDoS prevention and ingress filtering
> 
> Hi Christian,
> I hope you not referring to the AAAv6 ideas? Because that is  just a
way
> to do access control and possibly combine it with the packet filters
that
> in most cases already sit in the router. It tells nothing about
mandating
> it everywhere - this is of course up to the service
provider/enterprise to
> use, but in the mobile systems there is a demand for AAA and this AAA
> draft could be a good start. And it does not break multihoming,
mobility!
> 
> Of course you can still use end-to end IPsec if you want that and at
the
> same time enforce authentication and authorazation towards the AAA
server
> and if the authentication suceeds, and then the router could update
the
> packet filter with the "authenticated" host's IP address (which could
be
> the CoA).
> 
> -- thomas
> 
> > -Original Message-
> > From: Christian Huitema [mailto:[EMAIL PROTECTED]]
> > Sent: den 20 april 2001 01:11
> > To: Edward Vielmetti; Glenn Morrow
> > Cc: Michael Thomas; Thomas Eklund; [EMAIL PROTECTED];
> > [EMAIL PROTECTED]
> > Subject: RE: Source addresses, DDoS prevention and ingress filtering
> >
> >
> > I am not sure it is such a good idea.
> >
> > From a security stand point, it is very weak. You are
> > trusting that some
> > third party, at the other end of the network, will do the right
thing.
> > What happens if the "first hop" is compromised? And, by the way,
what
> > exactly is the first hop? The wireless LAN in my home? The Ethernet
> > backbone in the same home? If you want any form of security,
> > you really
> > have to build it yourself, e.g. by using IPSEC. The only form
> > of source
> > address control that has a prayer of working is local, i.e. refuse
to
> > accept inbound packets in your domain that pretend to already
> > come from
> > an inside address.
> >
> > It is also very weak from a routing stand point. Internet routing is
> > anything but symmetric. The exit path from a domain depends
> > only on the
> > destination address, not the source address; insisting on
> > strict control
> > of the source address basically breaks multi-homing. It also breaks
> > several forms of mobility...
> >
> >
> > > -Original Message-
> > > From: Edward Vielmetti [mailto:[EMAIL PROTECTED]]
> > > Sent: Wednesday, April 18, 2001 10:41 AM
> > > To: Glenn Morrow
> > > Cc: Michael Thomas; Thomas Eklund;
> > '[EMAIL PROTECTED]'; 'ietf-
> > > [EMAIL PROTECTED]'
> > > Subject: RE: Source addresses, DDoS prevention and ingress
filtering
> > >
> > > And you're going to mandate source filtering on the first hop
across
> > the
> > > entire internet, how?  It's a great idea and a best common
practice
> > but
> > > not something that can be set by fiat.
> > >
> > > Ed
> > >
> > > On Wed, 18 Apr 2001, Glenn Morrow wrote:
> > >
> > > > Then again if source filtering is mandated on the first hop this
> > might
> > > > eliminate the need to do filtering on other hops and this would
> > > eliminate
> > > > the need to do subnet translation or tunneling by either the MN
or
> > the
> > > MR.
> > > >
> > > > -Original Message-
> > > > From: Morrow, Glenn [RICH2:C330:EXCH]
> > > > Sent: Wednesday, April 18, 2001 11:56 AM
> > > > To: 'Michael Thomas'
> > > > Cc: Michael Thomas; Thomas Eklund; &

RE: Source addresses, DDoS prevention and ingress filtering

2001-04-19 Thread Christian Huitema

I am not sure it is such a good idea.

>From a security stand point, it is very weak. You are trusting that some
third party, at the other end of the network, will do the right thing.
What happens if the "first hop" is compromised? And, by the way, what
exactly is the first hop? The wireless LAN in my home? The Ethernet
backbone in the same home? If you want any form of security, you really
have to build it yourself, e.g. by using IPSEC. The only form of source
address control that has a prayer of working is local, i.e. refuse to
accept inbound packets in your domain that pretend to already come from
an inside address.

It is also very weak from a routing stand point. Internet routing is
anything but symmetric. The exit path from a domain depends only on the
destination address, not the source address; insisting on strict control
of the source address basically breaks multi-homing. It also breaks
several forms of mobility...


> -Original Message-
> From: Edward Vielmetti [mailto:[EMAIL PROTECTED]]
> Sent: Wednesday, April 18, 2001 10:41 AM
> To: Glenn Morrow
> Cc: Michael Thomas; Thomas Eklund; '[EMAIL PROTECTED]'; 'ietf-
> [EMAIL PROTECTED]'
> Subject: RE: Source addresses, DDoS prevention and ingress filtering
> 
> And you're going to mandate source filtering on the first hop across
the
> entire internet, how?  It's a great idea and a best common practice
but
> not something that can be set by fiat.
> 
> Ed
> 
> On Wed, 18 Apr 2001, Glenn Morrow wrote:
> 
> > Then again if source filtering is mandated on the first hop this
might
> > eliminate the need to do filtering on other hops and this would
> eliminate
> > the need to do subnet translation or tunneling by either the MN or
the
> MR.
> >
> > -Original Message-
> > From: Morrow, Glenn [RICH2:C330:EXCH]
> > Sent: Wednesday, April 18, 2001 11:56 AM
> > To: 'Michael Thomas'
> > Cc: Michael Thomas; Thomas Eklund; '[EMAIL PROTECTED]';
> > '[EMAIL PROTECTED]'
> > Subject: RE: Source addresses, DDoS prevention and ingress filtering
> >
> >
> > Oh, I see what you were concerned about. It seems to me that an MR
will
> have
> > to tunnel or subnet translate unless it is on it's home subnet.
> >
> > -Original Message-
> > From: Michael Thomas [mailto:[EMAIL PROTECTED]]
> > Sent: Wednesday, April 18, 2001 9:49 AM
> > To: Morrow, Glenn [RICH2:C330:EXCH]
> > Cc: Michael Thomas; Thomas Eklund; '[EMAIL PROTECTED]';
> > '[EMAIL PROTECTED]'
> > Subject: RE: Source addresses, DDoS prevention and ingress filtering
> >
> >
> > Glenn Morrow writes:
> >  > If the node behind the MR obtained its home address from the  the
> mobile
> >  > router's subnet, then the MN will use this as the source i.e. the
> MN's
> > home
> >  > subnet is the MR's subnet.
> >
> >Right, but when the MR's upstream router does an
> >RPF check... it will drop the SN's packets.
> >
> >  > Either way (tunneling or subnet translation), the topological
> correctness
> > is
> >  > still maintained.
> >
> >Well, that's sort of the problem. The SN doesn't
> >know that it's putting topologically incorrect
> >source address in the IP header.
> >
> >   Mike
> >
> 
> 
> 
> IETF IPng Working Group Mailing List
> IPng Home Page:  http://playground.sun.com/ipng
> FTP archive:  ftp://playground.sun.com/pub/ipng
> Direct all administrative requests to [EMAIL PROTECTED]
> 

IETF IPng Working Group Mailing List
IPng Home Page:  http://playground.sun.com/ipng
FTP archive:  ftp://playground.sun.com/pub/ipng
Direct all administrative requests to [EMAIL PROTECTED]




RE: I-D ACTION:draft-francis-ipngwg-site-def-00.txt

2001-04-03 Thread Christian Huitema

> Tell me a good reason why we couldn't run the whole of IBM world-wide
> as a single site-local scope, if we wanted to?

Well, one good reason: you probably need more than 16 bits for numbering
your subnets. 

IETF IPng Working Group Mailing List
IPng Home Page:  http://playground.sun.com/ipng
FTP archive:  ftp://playground.sun.com/pub/ipng
Direct all administrative requests to [EMAIL PROTECTED]




RE: an unplanned benefit of IPv6

2001-03-30 Thread Christian Huitema

> From: Niall Richard Murphy [mailto:[EMAIL PROTECTED]]
> On Fri, Mar 30, 2001 at 08:55:15PM +1000, Robert Elz wrote:
> 
> >   | An unplanned deficit of IPv6: operating without DNS will be
much,
> much
> >   | harder. (Particularly if you can't type ":" quickly)
> 
> > That wasn't unplanned, and isn't a defecit - ridding the world of
the
> > use of literal IP addresses is one of the things needed to make
> > renumbering conceivable (if not by itself make it easy).
> 
> Perhaps I was exaggerating for the sake of effect :-)
> 
> I feel there will still be a need to type IPv6 addresses in some
> circumstance no matter what, unfortunately...

We should not equate "operating without the DNS" and "typing addresses
by hand." NAPSTER or Gnutella operate without the DNS; SIP only requires
DNS entries for the proxies. These systems just exchange addresses as
part of their normal operation.

-- Christian Huitema

IETF IPng Working Group Mailing List
IPng Home Page:  http://playground.sun.com/ipng
FTP archive:  ftp://playground.sun.com/pub/ipng
Direct all administrative requests to [EMAIL PROTECTED]




RE: what is a site???

2001-03-26 Thread Christian Huitema

Steve,

May I observe that the definition of a site in the "Scoped Address
Architecture" draft contains a loophole? The draft says that "A personal
residence may be treated as ... a part of a site (for example, when the
residence obtains Internet access via an employer's or school's site)."
This is in fact the classic definition of a "corporate" network, i.e.
all the systems that are hidden behind the corporate firewall(s). From a
networking point of view, there is not much difference between an
employee's home, a remote office, or even the laptop of a traveling
employee: once there are brought "behind the firewall" through some kind
of VPN tunnel, they effectively become part of the "site." 

So far, I have found two important attributes of "IPv6 sites." The first
one is the address stability: site addresses are stable, even if the
site's external prefixes change; indeed, they are only subject to
renumbering if two sites are merging. The second one is the "border
police": site local packets are not supposed to leave the site, nor to
originate outside the site; this provides a very rough form of access
control, which may be adequate for some inexpensive devices or services.
(Yes, I know perfectly well that this is weak -- at least as weak as
firewalls.)

I believe that most practical network manager will equate a site with a
corporate network, with the practical exception of large corporations
that will probably have to split their network into multiple sites, e.g.
one site per campus. Or, to put it differently, the site will be a
subset of the corporate network that enjoys its own independent
connections to the Internet. 

By the way, it is a bad idea to swallow an employee's home network into
a corporate site, as indicated in the addressing example. You definitely
don't want the employee's teen-age children to roam your network... 

-- Christian Huitema

 

IETF IPng Working Group Mailing List
IPng Home Page:  http://playground.sun.com/ipng
FTP archive:  ftp://playground.sun.com/pub/ipng
Direct all administrative requests to [EMAIL PROTECTED]




Sites with multiple border routers (not just 6to4)

2001-03-23 Thread Christian Huitema

This conversation originated in Sigtran, but this is really about the
IPv6 routing architecture, so I bring it to IPNGWG. The initial context
was the handling of a site with multiple "6to4" routers.

> From: Vladislav Yasevich [mailto:[EMAIL PROTECTED]]
>...
> However, I still don't see a need for a special address for
> 6to4 routers.  The DSTM mechanism can provide the TEP and
> it might as well provide the 6to4 address of the router (not
> any speciall address).

If there is a need, this need is independent of 6to4. It relates to
"egress control" and v6 multi-homing. Suppose that a site is
multi-homed. Each station gets several IPv6 addresses. For a given TCP
connection, it picks one of them as source addresses. As packets are
sent, the egress router is chosen as a function of the destination
address, independent of the source address. This means that we can see
packets flowing through ISP-A, using a source address allocated by
ISP-B.

The only problem with that is, what happens if ISP-A, in the name of
protection against source-address spoofing, rejects these packets?

-- Christian Huitema

> May be DSTM might be extended to privide multiple TEPs and
> let the implementation choose one (or cycle through them)?
> Just a thought.  This way we don't have to reserve a speciall
> address.
> 
> -vlad
> 
> George Tsirtsis wrote:
> >
> > -Original Message-
> > From: Christian Huitema [mailto:[EMAIL PROTECTED]]
> > Sent: Friday, March 23, 2001 10:50 AM
> > To: [EMAIL PROTECTED]
> > Cc: Vladislav Yasevich; George Tsirtsis; NGTRANS List
> > Subject: RE: (ngtrans) Sites with multiple 6to4 border routers
> >
> > > >> I believe that's what Brian Carpenter, Tony Hain, and Dave
Thaler
> > were
> > > >> saying the meeting.   You have to use a globaly IPv4 address to
> > > >> create a 6to4 prefix.  I don't beleave you can assign the same
IPv4
> > > >> address to 2 independent devices...
> > > >Uh? There is nothing impossible there. Suppose that we have a
> > > >multi-homed site that connects to the Internet through multiple
> > routers,
> > > >both of which advertise the same IPv4 prefix, say 123.123.1/23.
> > >
> > >   i guess you are talking about different thing from Vladislav
> > said:
> > >
> > > >/---\   /--
> > > >|   | +-+   |
> > > >|   +-+A+---+
> > > >|   | +-+   |
> > > >| Site  |   | Internet
> > > >|   | +-+   |
> > > >|   +-+B+---+
> > > >|   | +-+   |
> > > >\---/   \-
> >
> > No. When I say that "It is quite natural to reserve a single IPv4
> > address for the 6to4 routing service", I mean that A and B both use
> > 2002::::/48; both A and B use x.x.x.x. They advertise
different
> > addresses in the IPv6 cloud; they advertise the same IPv4 prefix
(say
> > x.x.x/24) to the Internet; the routing of outward bound packets is
> > determined by IPv6 routing inside the site, e.g. RIPng; the routing
of
> > packets from the Internet is determined by Internet routing
protocols
> > (e.g. BGP).
> >
> > GT> Indeed! The requirement for 2 or more 6to4 gates to be able to
use
> the
> > same 6to4 prefix is that they advertise the same ipv4 prefix in the
IPv4
> > Internet. Up to now it has been assumed that they only advertise a
> single
> > IPv4 address but this is clearly not necessary.
> >
> > GT> In this case, mechanisms that require outgoing and incoming
paths to
> be
> > using the same 6to4 gate could make use of Alain's 6to4 designated
> address.
> >
> > George

IETF IPng Working Group Mailing List
IPng Home Page:  http://playground.sun.com/ipng
FTP archive:  ftp://playground.sun.com/pub/ipng
Direct all administrative requests to [EMAIL PROTECTED]




RE: DDoS Work

2001-03-22 Thread Christian Huitema

> From: Steven M. Bellovin [mailto:[EMAIL PROTECTED]]
> In message <[EMAIL PROTECTED]>, Jari Arkko writes:
> >
> >* In the Internet Area, there is the itrace WG which is
> >   specifically chartered for looking into DoS, but is
> >   looking only at a particular solution. Is this
> >   solution sufficient for all DoS issues? We're not sure
> >   but at least some of the individual DoS concerns such
> >   as attacking address autoconfiguration don't really
> >   fall on the area that i-trace can deal with.
> 
> Without addressing your general question, IESG policy is that working
> groups should be very carefully focused.  A hypothetical "Fix DDoS
Working
> Group" would probably not meet that test -- there are no concrete
> deliverables.

I would think that a study of mechanisms to trace the actual source of
Internet packets would pass the charter test. After all, there have been
several proposals to do this by letting the routers mark bits in
packets, using a probabilistic algorithm. This seem to fall in the
single problem / existing proposed solution / concrete deliverable
category.

Indeed, we can also debate whether source tracing is useful...

-- Christian Huitema 

IETF IPng Working Group Mailing List
IPng Home Page:  http://playground.sun.com/ipng
FTP archive:  ftp://playground.sun.com/pub/ipng
Direct all administrative requests to [EMAIL PROTECTED]




RE: Near-Unique Site-Local Identifier draft

2001-02-27 Thread Christian Huitema

You wrote:

The probability of a duplicate assignment somewhere is
N^2/2^38...

which is not quite correct. The probability of at least one duplicate
out of N assignments out of a space of size X is
P = 1 - product(1..N)(1-(i-1)/X)
Which is a bit hard to compute, and certainly does not result in N^2/X.
Using a log approximation, you get
Log (1-P) = sigma(1..N) log (1 - (i-1)/X)
  = sigma(1..N)(-(i-1)/X) + 0(N^3/X^2)
Thus
(1-P) ~= e^-(N.N-1/2.X) ~= e^-(N^2/2.X)
P ~= 1 - e^-(N^2/2.X) if N^3 << X^2
I would suggest you correct your phrase to be a bit less assertive,
something like "The probability of a duplicate assignment somewhere
becomes significant is N^2 becomes close to 2^38" -- or just mention the
birthday paradox.

> -Original Message-
> From: Paul Francis [mailto:[EMAIL PROTECTED]] 
> Sent: Monday, February 26, 2001 10:41 AM
> To: [EMAIL PROTECTED]
> Subject: Near-Unique Site-Local Identifier draft
> 
> 
> 
> I've posted a draft on assigning random site-local 
> identifiers at 
> http://www.aciri.org/francis/draft-francis-ipngwg-unique-site-
> local-00.txt.
> 
> This was submitted in time to make the Minn. ID deadline.
> 
> Thanks,
> 
> PF
> 
> Abstract
> 
>For many or most sites, site-local addresses are used for packets
>between nodes within the site.  The fact that site-local addresses
>are not globally unique makes their usage and administration more
>difficult than they would be if there were globally unique (or
>nearly globally unique).  For instance, before two sites can be
>merged, one of them has to be renumbered.  The meaning of 
> site-local
>addresses becomes ambiguous when they are taken out of the 
> immediate
>context of the IPv6 layer, for instance when they are conveyed in
>email or stored in text files.
> 
>All other things being equal, it would be preferable if the prefix
>of addresses with site-local scope were as globally unique as
>possible.  This draft expands the format of the site-local address
>to allow them to be near-unique.  It does not, however, change the
>definition or usage of the site-local address.  This draft 
> describes
>the format and assignment method of near-unique site-local 
> prefixes.
>It also outlines some usage scenarios.
> 
> 
> 
> 
> IETF IPng Working Group Mailing List
> IPng Home Page:  http://playground.sun.com/ipng
> FTP archive:  ftp://playground.sun.com/pub/ipng
> Direct all administrative requests to [EMAIL PROTECTED]
> 
> 

IETF IPng Working Group Mailing List
IPng Home Page:  http://playground.sun.com/ipng
FTP archive:  ftp://playground.sun.com/pub/ipng
Direct all administrative requests to [EMAIL PROTECTED]




RE: Wade through the archives (was Re: another renumbering question)

2001-02-19 Thread Christian Huitema

The discussions always ended up on the same kind of conclusion: in
theory it is a fine idea, but we would have to change existing
implementation, and besides it is not easy to allocate unique numbers.
There are basically four ways to allocate random numbers, and none of
them is particularly attractive:

1) Picking numbers at random is easy, but you need a good random
generator, and besides you hit the birthday paradox with 2^^19 entries,
i.e. less than a million. There are way more than 1 million potential
sites.

2) Deriving numbers from other pre-established registries is tempting,
but there are not very many suitable pre-existing registries. IEEE-802
numbers are too large too fit; IPv4 addresses have the right size but
not the right stability.

3) Starting a new registry looks simple on paper, but the practical
problem are not so small -- for example, decide who will be king; find
the right balance between automation and reliability; etc.

4) Combining random allocation with duplicate detection would go past
the birthday paradox, but is almost impossible to conduct at the scale
of the Internet...

Now, if you can change that...

-- Christian Huitema

> -Original Message-
> From: Paul Francis [mailto:[EMAIL PROTECTED]] 
> Sent: Monday, February 19, 2001 2:36 PM
> To: [EMAIL PROTECTED]
> Subject: Wade through the archives (was Re: another 
> renumbering question)
> 
> 
> 
> I took Steve up on his suggestion of looking through the 
> archives on this topic.
> 
> With some effort I found three threads, all initiated by 
> Christian, in May '97, Dec '97, and Nov '99.  I saved the 
> relevent messages...you can find them at 
> http://www.aciri.org/francis/IPv6> _site_id_threads.txt if you 
> are so inclined.  This is 
> probably not exhaustive, so if anyone can point me to other 
> threads that would be helpful.
> 
> I didn't see any major ideas in the previous threads that 
> weren't in the latest thread.
> 
> A problem I found when looking over the threads is that a 
> complete picture of what a site ID would be and how it would 
> work was never generated, with the end result that different 
> people were talking about different things and to some extent 
> talking past each other.
> 
> Having read the arguments, I still believe that there is 
> something to be said for the site-ID notion.  The site-ID 
> would be for sites that want to have their own number space 
> for internal communications, with reasonable assurance that 
> nobody else is using the same space.
> 
> The site-ID would not supplant the use of site-locals by 
> other sites who wanted to use them.  Site-locals would remain 
> as defined.
> 
> A site-ID would also not by itself identify what is and is 
> not in a given "site".  In other words, one couldn't take two 
> addresses with site-IDs and, in the absense of any other 
> information (DNS entries or routing tables) say definitively 
> whether they could or could not reach each other using the 
> site-ID addresses.
> 
> I'm inclined to write a draft specifying this so that we can 
> have a focused and consistent (and dare I say difinitive?) 
> discussion about it.  Is there anyone out there who in 
> principle likes the idea of site-IDs and would care to work 
> with me on this?
> 
> Thanks,
> 
> PF
> 
> 
> 
> 
> IETF IPng Working Group Mailing List
> IPng Home Page:  http://playground.sun.com/ipng
> FTP archive:  ftp://playground.sun.com/pub/ipng
> Direct all administrative requests to [EMAIL PROTECTED]
> 
> 

IETF IPng Working Group Mailing List
IPng Home Page:  http://playground.sun.com/ipng
FTP archive:  ftp://playground.sun.com/pub/ipng
Direct all administrative requests to [EMAIL PROTECTED]




RE: The case against naïve anti-poison (was A6 and DNAME)

2001-02-08 Thread Christian Huitema

May I observe that most of the issues Dan are rising result from a
specific approach to anti-poison, which is to rely strictly on the name
hierarchy? I don't know who decided on that approach, but it clearly has
the consequence of breaking existing practice, such as name servers
located in another domain. That existing practice had been going on for
quite a long time -- back in 1988, many of the name servers for
"inria.fr" were located in ".edu". There is no mention anywhere that
name server have to belong to the same hierarchy as the served domain.
So, instead of asking everybody on earth to revise their delegation, it
is probably avisable to make the anti-poison code a little bit smarter.
Now, this is probably a subject for the DNS group, not IPNG.

-- Christian Huitema

IETF IPng Working Group Mailing List
IPng Home Page:  http://playground.sun.com/ipng
FTP archive:  ftp://playground.sun.com/pub/ipng
Direct all administrative requests to [EMAIL PROTECTED]




RE: The case against A6 and DNAME

2001-02-07 Thread Christian Huitema

I think we are hearing the same argument over and over again, so let's
repeat the other side of the story:

1) Perl script don't help you if you must compute RSA signatures for
10,000 records -- or 10 millions. Having to sign one record instead of
10,000, on the other hand, is very beneficial.

2) If your site has 4 prefixes and 10,000 hosts, then A6 allows you to
have four times less DNS records to handle.

3) With A6, you can exercize "site redirection" by publishing short
lived A6 records for your site, while leaving the host and server
records unchanged.

The argument in the page is essentially an argument against dependency
loops. The dependency loop occurs when one needs to contact a nameserver
in order to get the address of that same nameserver. The problem is
aggravated by "anti-poison" protections that essentially prevent serving
cached records from domains for which the local server is not
authoritative. May I observe that if "zone administrators (could) write
trivial perl scripts", then they could just has well write a trivial
perl script that checks for dependency loops? In any case, it is fairly
easy to write reasonable guidelines on how to use the technology without
creating loops -- the AOL example is a great way to explain what to do
and what not to do.

As for deprecating or otherwise removing standards, we have a clear IETF
process. A standard progresses if it is implemented and used, and if we
can demonstrate successful inter-operation between independent
implementations. Let's just follow the process...

-- Christian Huitema


IETF IPng Working Group Mailing List
IPng Home Page:  http://playground.sun.com/ipng
FTP archive:  ftp://playground.sun.com/pub/ipng
Direct all administrative requests to [EMAIL PROTECTED]




RE: A6 benefits?

2001-01-25 Thread Christian Huitema

The motivation for A6 is the key database paradigm that atomic
information (e.g. a site prefix) should be stored exactly once. This has
major consequences on ease of update, as well as caching. The ease of
update argument is clear: it is simpler to update one record for a large
site than to update all records for all nodes in the site; this is
particularly true when the use of DNS security increases wildly the cost
of any given update. The caching argument is also a natural consequence
of the "atomic information" property: each component of the information
can be given an appropriate TTL, which means that information that does
not change, such as the lower bits of a node's address, can be stored
with a longer TTL than the site's prefix. The DNS is basically a
distributed database; database theory applies; storing atomic
information exactly once is a basic tenet of database theory; the A6
design is a direct consequence of the theory.

Jim, Randy and some other have made the argument that A6 would increase
the load on the DNS, by requiring several transaction for any given
exchange. This type of argument, however, does not take caching into
account. Prefixes are common to several nodes; the probability that a
prefix information will be cached increases for prefixes that are closer
to the root. If I am looking for the address of "node.example.com", and
I am returned an A6 that contains the node identifier and a reference to
"site-prefix.example.com", there are some serious chances that the A6
record for "site-prefix" is already present in my local cache. This is
specially true if the requesting node is itself a member of the
example.com domain.

We did in fact have this discussion in depth 2 years ago, when we
submitted the draft to the working group. The arguments on each side of
the issue have not changed. Usage examples showed that the DNS load
would be lessened, not increased, if we did caching right, and that the
total amount of information required to encode the addressing data for a
site would be lessened, not increased, in the case of multi-homed site.
In short, the A6 design trades off some additional design complexity for
a lesser management load and a lesser use of DNS resource when either
renumbering or multi-homing are frequent.

-- Christian Huitema

> -Original Message-
> From: Ian Jackson [mailto:[EMAIL PROTECTED]]
> Sent: Wednesday, January 24, 2001 4:46 PM
> To: [EMAIL PROTECTED]
> Subject: Re: A6 benefits? 
> 
> 
> Steven M. Bellovin writes ("Re: A6 benefits? "):
> > In message <[EMAIL PROTECTED]>, "D. J. 
> Bernstein" writes:
> > >Is there some other claimed benefit of A6?
> > 
> > Apart from not wanting more polling, the idea is to 
> facilitate rapid 
> > renumbering.
> 
> When I described A6 to someone recently they said they thought it was
> so that you could renumber entire networks automatically based on core
> topology changes without the relevant leaf network admins' having to
> do anything.
> 
> At the time I dismissed this idea as absurd; we have enough
> reliability problems as it is without large sites and networks being
> made unuseable even internally because someone somewhere at a
> different organisation made a mistake in a configuration and causes
> the DNS to start giving out wrong addresses.
> 
> I haven't seen much motivation for A6 in the relevant RFCs and I-Ds,
> so perhaps I'm barking up the wrong tree - in any case, some
> explanation of why this is a good thing and how it is expected to be
> used would be helpful.
> 
> Alternatively, perhaps I'm wrong and it is indeed the intent of the
> IPNG working groups that renumbering could happen entirely
> automatically, and need not involve an action by the administrator of
> the site being renumbered.  If so I have to say I'm rather alarmed,
> but perhaps I've missed some vital reason why this is a good idea.
> 
> On the other hand, I can't see another good reason for A6.  After all,
> if renumbering is going to require an administrative action by the
> people who run the site being renumbered, they might as well use the
> entirely normal and standard zone changing mechanisms to do it.
> 
> If an admin feels that doing a search-and-replace on their zone files
> is too difficult or error-prone, then they can easily use one of any
> number of tools to help them generate the zone files semiautomatically
> so that they only have to configure the network number in one place.
> If renumbering is too frequent to do like that (more than once a
> month, say) then I'm sure people will develop software to help manage
> it, and perhaps there would be a role for an IETF protocol for doing
> so in a secure and reliable way.
> 
> So the 

RE: Usage of IPv6 flow label

2000-12-01 Thread Christian Huitema

Brian Carpenter wrote:
> 
> Francis Dupont wrote:
> > 
> >  In your previous mail you wrote:
> > 
> >- figure out a way to make the other option in Alex's draft:
> > 
> >  0   1
> >  0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9
> > +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
> > |0|  Server Port Number| H-to-H protocol|
> > +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
> > 
> >suitable for use by policy-driven diffserv classifiers.
> > 
> > => can you explain why it is not enough to use the SPI in place of
> > higher layer selectors?
> 
> The SPI doesn't have the semantics. A QOS classifier needs to *know*
> the port and protocol numbers; that's how it takes its decisions.
> For example you might put traffic with protocol number 30 in a
> different class from traffic with protocol number 41.
> 
> Alex's idea of using "server port number" is in fact
> interesting, since it would allow you to classify traffic
> on its original well-known port #, without having to rely
> on dynamically assigned port #s for classification.
> I'm beginning to think he may be right. But I suggest
> allocating 11 bits to the port number and 8 to the
> protocol number, so that we can cover at least
> some of the registered ports (up to 2047). But the flow
> label isn't long enough for everything we need.

What is useful for the policy decision is to have an indication of the user
priviledges and then an indication of the application. Most policy decisions
are about given some users some guaranties that they can run some
applications. Addresses are only approximative indications of the users --
think about proxies, mobility, etc. -- and ports are only approximative
indications of the application -- think about floating ports, applications
multiplexed over HTTP, etc.

Having a protocol + port indication in the flow id is a way to provide an
indication about the indication. But we can do better than having a protocol
+ port tuple. What we really want is some registry of applications, into
which we could fold the registered ports; then, once the registration
becomes well known, it becomes easy to write rules that allow for packet
classification. If we start from this registration perspective, then we want
a format that allows for several classes:
* Inherit registration from current registration of TCP and UDP ports --
probably two 
  classes,
* One class registration of new applications, e.g. provide codes for those
applications that
  currently work on floating ports,
* One class for non-registered applications, allowing for experimentation,
* A null label for users who don't want to disclose what application they
are running.
If we do that, then the end system can easily set the application code, and
the intermediate routers can easily use them.

-- Christian Huitema

IETF IPng Working Group Mailing List
IPng Home Page:  http://playground.sun.com/ipng
FTP archive:  ftp://playground.sun.com/pub/ipng
Direct all administrative requests to [EMAIL PROTECTED]




RE: Usage of IPv6 flow label

2000-11-27 Thread Christian Huitema

Brian,

I am a bit puzzled by your reference to the 5 tuple as "enabling diffserv."
I think you have a model there in which the diffserv bits are set by some
intermediate router, after examining the "5 tuple" of the packet. In this
context, the five-tuple works somewhat. But it does not work well with IPSEC
(ports are hidden), it does not work well with floating port applications
such as VoIP, and it leads to some interesting header manipulation when we
encounter stacks of IPv6 headers.

There are at least two other ways to "enable diffserv." One way would be to
just let the hosts set the diffserv bits, and then let the intermediate
router do accounting, charging, and maybe rationing. Another way is to use
RSVP to convey the requested quality of service, and the user credentials,
to the intermediate routers; then, the flow-id can be use for flow
classification, and the intermediate routers can on this basis set the
diffserv bits however they see fit.

-- Christian Huitema

> -Original Message-
> From: Brian E Carpenter [mailto:[EMAIL PROTECTED]]
> Sent: Monday, November 27, 2000 2:49 PM
> To: Michael Thomas
> Cc: Jim Bound; Ipng (E-Mail)
> Subject: Re: Usage of IPv6 flow label
> 
> 
> Michael Thomas wrote:
> > 
> > Brian E Carpenter writes:
> >  > Jim,
> >  >
> >  > It still isn't clear to me what the flow label adds to 
> the semantics
> >  > used by existing 5-tuple QOS classifiers.
> > 
> >It seems intuitively more efficient for a flow classifier
> >to use a single host-defined flow identifier than having
> >to walk a potentially long list of extension headers.
> >Another advantage is that, sort of like diffserv, the
> >host itself can decide what is to be grouped in a particular
> >flow instead of requiring that it match the normal 5-tuple.
> 
> Just to make the point again: the 5-tuple has semantics that
> allows a classifier to *classify* the traffic. Today at least,
> the flow label has no such semantics - it's just plain bits.
> That may help in IntServ but it's no use at all in DiffServ.
> 
>   Brian
> 
> IETF IPng Working Group Mailing List
> IPng Home Page:  http://playground.sun.com/ipng
> FTP archive:  ftp://playground.sun.com/pub/ipng
> Direct all administrative requests to [EMAIL PROTECTED]
> 
> 

IETF IPng Working Group Mailing List
IPng Home Page:  http://playground.sun.com/ipng
FTP archive:  ftp://playground.sun.com/pub/ipng
Direct all administrative requests to [EMAIL PROTECTED]




RE: An IPv4 anycast address for 6to4<->6bone gateways

2000-10-27 Thread Christian Huitema

Actually, what you want is to reserve sufficiently large IP address prefix,
so that it will be accepted without questions by BGP routers -- at least a
/19; a class B would be nice; in fact, if an address rich institution would
donate a class B for that purpose, that would be even better; asking the
IANA to reserve 191.255/16 for that purpose would also look cool. It would
also be useful to dedicate an IPv4 AS number to that purpose.

The IPv6 routers that have a complete access to both IPv6 and IPv4 would
announce the corresponding prefix in their local IGP, as a route to an
external network. The ASes that run such routers and are willing to provide
access to the v6 network would announce a path to the v6 AS and to the 6to4
prefix using BGP; they could easily use the existing structure of peering
and transit agreement to control to whom they are willing to provide
service. The whole v6 network will appear to v4 as a single AS, with lots of
peering points all over the place.

The 6to4 gateways would then send use an address under the 6to4 prefix as a
default route for reaching v6 packets. It will normally reach the service
provided by their ISP, or by the closest ISP according to inter-domain
routing.

This scheme has many advantages. It is simple to implement in 6to4 gateways,
it allows ISP to control to whom they are providing service, it allows for
independent deployments of gateways to the 6Bone and the v6 network by
multiple ISPs, it allows for scaling by deploying a large number of "peering
points."

In the acknowledgement section: I believe that scheme was first proposed by
Randy Bush.

-- Christian Huitema

> -Original Message-
> From: Brad Huntting [mailto:[EMAIL PROTECTED]]
> Sent: Friday, October 27, 2000 2:46 PM
> To: f.johan.beisser
> Cc: [EMAIL PROTECTED]; [EMAIL PROTECTED]; 
> [EMAIL PROTECTED]
> Subject: An IPv4 anycast address for 6to4<->6bone gateways
> 
> 
> 
> > http://www.kfu.com/~nsayer/6to4/
> 
> Actually this web page brings up another issue that a freind and
> I were discussing just yesterday.  Anyone who's actually tried to
> use 6to4 (2002::/16) has probably noticed that they need a default
> route to reach the 6bone.  But even assuming you actually find such
> a router it is almost always on the far side of the Internet; which
> means that your packets get to take the scenic route on their way
> to the 6bone.
> 
> One simple solution to this would seem to be to use a well known
> IPv4 "anycast" address (call it "a.b.c.d" for now) for all 6to4
> gateways.
> 
> In this way, anyone using 6to4 could reliably use 2002:(a.b.c.d)::1
> (actual IPv6 address syntax will vary) as a default route to the
> 6bone.
> 
> 6to4 gateways would advertise to the their IPv4 peers that they
> have a route for "a.b.c.d".  And for their IPv6 peers (the 6bone)
> they can advertise a route for 2002::/16.
> 
> Does anyone see a problem with this?  I dont suppose there's already
> a block of IPv4 address space set aside for anycast?
> 
> 
> brad
> 
> IETF IPng Working Group Mailing List
> IPng Home Page:  http://playground.sun.com/ipng
> FTP archive:  ftp://playground.sun.com/pub/ipng
> Direct all administrative requests to [EMAIL PROTECTED]
> 
> 

IETF IPng Working Group Mailing List
IPng Home Page:  http://playground.sun.com/ipng
FTP archive:  ftp://playground.sun.com/pub/ipng
Direct all administrative requests to [EMAIL PROTECTED]




RE: IPv6 and NAT

2000-09-11 Thread Christian Huitema

> NAT was proposed as a temporary solution for the shortage of 
> IP address,
> which is solved with the IPv6 protocol. Currently I don't 
> expect IPv6 to be
> deployed soon (within 1 or 2 years). My ISP, nor many ISPs, 
> aren't promoting
> IPv6 yet, nor Microsoft provides IPv6 support for it's OSes.

Well, actually, Microsoft's support is documented at:
 * Microsoft IPv6 Tech Preview News
   http://www.microsoft.com/PressPass/press/2000/Mar00/IPv6PR.asp
 * Microsoft IPv6 Tech Preview Kit
   http://msdn.microsoft.com/downloads/sdks/platform/tpipv6.asp
 * Microsoft IPv6 white paper
   http://www.microsoft.com/technet/network/ipvers6.asp
but let's go to your actual points:

> However, some scenarios where NAT provides THE solution, are for
> * private networks that may not be exposed to the Internet   and
> * for networks that have only one IP address available to use on the
> Internet,
> while host on the private network are required to make 
> 'direct' connections
> to the Internet.

IPv6 supports "private networks that may not be exposed to the Internet"
through the use of scoped addresses, i.e. "site-local" and "link-local"
addresses. This covers most of the cases in which some dumb hosts are
allowed to connect to the network but not to the Internet. For example, if
you have a light-switch that should not be activated by remote players, that
light-switch should be configued to only use site-local and link-local
addresses. It will never receive a packet from outside the network, nor send
a packet to the outside.

I don't really understand how your hypothesis of "networks that have only
one IP address available" fit with the other statement, "for the shortage of
IP address, which is solved with the IPv6 protocol..."

-- Christian Huitema


IETF IPng Working Group Mailing List
IPng Home Page:  http://playground.sun.com/ipng
FTP archive:  ftp://playground.sun.com/pub/ipng
Direct all administrative requests to [EMAIL PROTECTED]




RE: When should mobile nodes use their care-of address, etc...

2000-08-17 Thread Christian Huitema

May I observe that, in attempting to specify a source address selection
algorithm, the WG goes well beyond the traditional IETF role, which is to
focus on interoperability issues, not implementations? I would expect such
algorithms to evolve in time, as we learn more on the subject. I would also
expect them to vary a lot depending on how much a particular station knows
about its environment, how far in the future it can predict the
application's behavior, what arbitration is made between privacy and
performance, etc. Rather than specify an actual algorithm, the WG should be
content with a list of recommendations, in the form of "if you do this,
expect that" or "don't do X, because it will cause interoperability problem
Y." 
-- Christian Huitema

IETF IPng Working Group Mailing List
IPng Home Page:  http://playground.sun.com/ipng
FTP archive:  ftp://playground.sun.com/pub/ipng
Direct all administrative requests to [EMAIL PROTECTED]




RE: Comment on draft-ietf-ipngwg-addrconf-privacy-02

2000-08-04 Thread Christian Huitema

Matt,

The privacy requirements imply, if you use Dynamic DNS, that you create
names, addresses, and reverse mapping. For the direct records, this is
slightly different from the classic DDNS usage, in which you update the
value of the address record for a pre-existing name. In particular, if the
name already exists, the DNS can secure the transaction using pre-existing
info, such as the public key associated with the name. Not sure that
existing DNS servers will gladly let you create a large number of phony
names.

Christian Huitema

IETF IPng Working Group Mailing List
IPng Home Page:  http://playground.sun.com/ipng
FTP archive:  ftp://playground.sun.com/pub/ipng
Direct all administrative requests to [EMAIL PROTECTED]




RE: SCTP API draft (was Re: New "IP Version 6 Addressing Architecture" draft)

2000-07-26 Thread Christian Huitema


> Note that how the system picks those addresses are still not "clearly"
> specified.  It may not make sense to pick all addresses 
> associated with an
> interface.  The reason for having multiple addresses is that 
> SCTP can failover
> to another address if the primary fails.  But if all the addresses are
> associated with an interface, failover may not make sense at 
> all.  There are
> still a lot of work to be done in this area in the draft...

If the multiple addresses have different prefixes, then the packets will be
routed through different paths. This provides a useful failover situation,
from a failing provider to a valid provider, even if the interface is the
same.

IETF IPng Working Group Mailing List
IPng Home Page:  http://playground.sun.com/ipng
FTP archive:  ftp://playground.sun.com/pub/ipng
Direct all administrative requests to [EMAIL PROTECTED]