Re: [BEHAVE] predictable translations

"Poscic, Kristian (Kristian)" <kristian.poscic@alcatel-lucent.com> Mon, 26 September 2011 19:16 UTC

Return-Path: <kristian.poscic@alcatel-lucent.com>
X-Original-To: behave@ietfa.amsl.com
Delivered-To: behave@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id B9F9E1F0C4D for <behave@ietfa.amsl.com>; Mon, 26 Sep 2011 12:16:37 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -6.459
X-Spam-Level:
X-Spam-Status: No, score=-6.459 tagged_above=-999 required=5 tests=[AWL=0.139, BAYES_00=-2.599, HTML_MESSAGE=0.001, RCVD_IN_DNSWL_MED=-4]
Received: from mail.ietf.org ([12.22.58.30]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id 8sG-5I0DKo8T for <behave@ietfa.amsl.com>; Mon, 26 Sep 2011 12:16:33 -0700 (PDT)
Received: from ihemail3.lucent.com (ihemail3.lucent.com [135.245.0.37]) by ietfa.amsl.com (Postfix) with ESMTP id 96B1D1F0C35 for <behave@ietf.org>; Mon, 26 Sep 2011 12:16:33 -0700 (PDT)
Received: from usnavsmail4.ndc.alcatel-lucent.com (usnavsmail4.ndc.alcatel-lucent.com [135.3.39.12]) by ihemail3.lucent.com (8.13.8/IER-o) with ESMTP id p8QJJDUD013529 (version=TLSv1/SSLv3 cipher=DHE-RSA-AES256-SHA bits=256 verify=OK); Mon, 26 Sep 2011 14:19:13 -0500 (CDT)
Received: from USNAVSXCHHUB01.ndc.alcatel-lucent.com (usnavsxchhub01.ndc.alcatel-lucent.com [135.3.39.110]) by usnavsmail4.ndc.alcatel-lucent.com (8.14.3/8.14.3/GMO) with ESMTP id p8QJJBqZ022275 (version=TLSv1/SSLv3 cipher=RC4-MD5 bits=128 verify=NOT); Mon, 26 Sep 2011 14:19:13 -0500
Received: from USNAVSXCHMBSC3.ndc.alcatel-lucent.com ([135.3.39.139]) by USNAVSXCHHUB01.ndc.alcatel-lucent.com ([135.3.39.110]) with mapi; Mon, 26 Sep 2011 14:19:11 -0500
From: "Poscic, Kristian (Kristian)" <kristian.poscic@alcatel-lucent.com>
To: Chris Donley <C.Donley@cablelabs.com>, "mohamed.boucadair@orange.com" <mohamed.boucadair@orange.com>, "'behave@ietf.org'" <behave@ietf.org>
Date: Mon, 26 Sep 2011 14:18:54 -0500
Thread-Topic: [BEHAVE] predictable translations
Thread-Index: Acx8dZBE4v1iOZCYR2OjsHqh53Jj/gACBjZw
Message-ID: <2073A6C5467C99478898544C6EBA3F4602BC3C85BF@USNAVSXCHMBSC3.ndc.alcatel-lucent.com>
References: <2073A6C5467C99478898544C6EBA3F4602BC3C82BF@USNAVSXCHMBSC3.ndc.alcatel-lucent.com> <CAA6171B.24580%c.donley@cablelabs.com>
In-Reply-To: <CAA6171B.24580%c.donley@cablelabs.com>
Accept-Language: en-US
Content-Language: en-US
X-MS-Has-Attach:
X-MS-TNEF-Correlator:
acceptlanguage: en-US
Content-Type: multipart/alternative; boundary="_000_2073A6C5467C99478898544C6EBA3F4602BC3C85BFUSNAVSXCHMBSC_"
MIME-Version: 1.0
X-Scanned-By: MIMEDefang 2.57 on 135.245.2.37
X-Scanned-By: MIMEDefang 2.64 on 135.3.39.12
Subject: Re: [BEHAVE] predictable translations
X-BeenThere: behave@ietf.org
X-Mailman-Version: 2.1.12
Precedence: list
List-Id: mailing list of BEHAVE IETF WG <behave.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/behave>, <mailto:behave-request@ietf.org?subject=unsubscribe>
List-Archive: <http://www.ietf.org/mail-archive/web/behave>
List-Post: <mailto:behave@ietf.org>
List-Help: <mailto:behave-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/behave>, <mailto:behave-request@ietf.org?subject=subscribe>
X-List-Received-Date: Mon, 26 Sep 2011 19:16:37 -0000

Thanks Chris!
I was wondering how would one extend the port-block in deterministic-CGN for an inside IP address if all the ports in the originally assigned port-block are exhausted.
It looks like that you combined deterministic NAT with the dynamic port assignment through the D variable, which I think is a good compromise.

As I understand In you example, you eliminated inside addresses 192.168.0.0 and 192.168.0.15 from the range 192.168.0.0/28, and in essence allocated their share of outside ports via the D factor to the dynamic allocation. Nice.

A few questions:

-          Do you always assume that the 0 and bcast host part of the inside IP address range is automatically excluded from 'I'?

-          You mentioned on page 4, point 2 in the last sentence: " Subscribers could be restricted to ports from a single IPv4 address, or could be allocated ports across all addresses in a pool, for example". Do you mean that this can be done in  a deterministic fashion? In other words, can an inside IP address spawn more outside IP addresses in a deterministic fashion (along with outside port ranges)?

-          It is up to the vendor to figure out how will ports be assigned (in block, staggered fashion, etc). There are requirements out there that the ISPs run the algorithm on external nodes to do to reverse conversions. So this inconsistency will make life for ISP little bit more difficult, but I guess as people mentioned here, we can't mandate the details of the algorithm to the vendors.

-          I know that this is the first version of the draft, but in the future maybe you can mention load balancing across the modules performing the NAT function in the system and if there is anything in particular that you had in mind about this...

Thanks,
Kris




From: Chris Donley [mailto:C.Donley@cablelabs.com]
Sent: Monday, September 26, 2011 10:56 AM
To: Poscic, Kristian (Kristian); mohamed.boucadair@orange.com; 'behave@ietf.org'
Subject: Re: [BEHAVE] predictable translations

Kris,
We've been working on such an idea at CableLabs. I've been a little slow to post.

We're definitely interested in your feedback on our proposal.

Chris

A new version of I-D, draft-donley-behave-deterministic-cgn-00.txt has been successfully submitted by Chris Donley and posted to the IETF repository.

Filename:  draft-donley-behave-deterministic-cgn
Revision:  00
Title:         Deterministic Address Mapping to Reduce Logging in Carrier Grade NATs
Creation date:  2011-09-26
WG ID:         Individual Submission
Number of pages: 9

Abstract:
   Many Carrier Grade NAT solutions require per-connection logging.
   Unfortunately, such logging is not scalable to many residential
   broadband services.  This document suggests a way to manage Carrier
   Grade NAT translations in such a way as to significantly reduce the
   amount of logging required while providing traceability for abuse
   response.  This method also provides a way of including geo-location
   significance in such assignments.





The IETF Secretariat

From: "Poscic, Kristian (Kristian)" <kristian.poscic@alcatel-lucent.com<mailto:kristian.poscic@alcatel-lucent.com>>
Date: Fri, 23 Sep 2011 10:21:13 -0600
To: "mohamed.boucadair@orange.com<mailto:mohamed.boucadair@orange.com>" <mohamed.boucadair@orange.com<mailto:mohamed.boucadair@orange.com>>, "'behave@ietf.org<mailto:'behave@ietf.org>'" <behave@ietf.org<mailto:behave@ietf.org>>
Subject: Re: [BEHAVE] predictable translations

Hi Med,
By predictable translation I mean deterministic NAT.

For now, I'm just trying to evaluate (for my own sake) if this deterministic NAT makes any sense since 1) would take care of the concerns that I have. If deterministic NAT makes deployable sense [for a reason that I yet need to find, since 1) already takes care of my concerns], then I'm trying to evaluate surrounding issues related to ease of integration into existing OS  (which it looks like does not come into play) and any other legal issues related to use of already possibly patented algorithms.

Thanks,
Kris

From: mohamed.boucadair@orange.com<mailto:mohamed.boucadair@orange.com> [mailto:mohamed.boucadair@orange.com]
Sent: Thursday, September 22, 2011 11:00 PM
To: Poscic, Kristian (Kristian); 'behave@ietf.org<mailto:'behave@ietf.org>'
Subject: RE: predictable translations

Dear Kris,

Could please precise more what you mean by "predictable translation"?

(1) Do you want to eliminate the volume of CGN logs (e.g, few entries per customer) or (2) you want to eliminate the CGN logging (e.g., rely on DHCP records)?

(1) can be done in the CGN itself by design or configuration of the CGN to use port ranges. This is already supported by CGN implementation including A(..)U ;-)

(2) can be supported only if you eliminate the NAT function in the CGN which should be a PRR (Port Range Router; http://tools.ietf.org/html/draft-boucadair-port-range-02#section-6) instead.


Cheers,
Med

________________________________
De : behave-bounces@ietf.org<mailto:behave-bounces@ietf.org> [mailto:behave-bounces@ietf.org] De la part de Poscic, Kristian (Kristian)
Envoyé : vendredi 23 septembre 2011 01:28
À : 'behave@ietf.org<mailto:'behave@ietf.org>'
Objet : Re: [BEHAVE] predictable translations
I looked at this draft draft-bsd-softwire-stateless-port-index-analysis-00<http://datatracker.ietf.org/doc/draft-bsd-softwire-stateless-port-index-analysis/> which examines 6 different algorithms for predictable translation applicable to v4/v6 translation but I guess it can be potentially adopted for v4 to v4 conversions as well.

As my coworker (who is probably on this list) says "too many deterministic nat drafts make for non-deterministic behaviours".
Is there any plan to adopt one as a standard?
Thanks,
Kris

From: Poscic, Kristian (Kristian)
Sent: Thursday, September 22, 2011 11:57 AM
To: behave@ietf.org<mailto:behave@ietf.org>
Subject: predictable translations

Hi there -
Does anyone knows of any draft that is addressing a more predictable translations between the inside IP and outside IP + port range when it comes to NAT44.
For example in order to avoid logging, IPv4 inside address would be automatically (via an algorithm) be converted to an outside IPv4 address  + a port range. This mapping would be unique so that no logging is required. The revertive algo would be able to convert the outside IP + port back  to the inside IP.

I've seen some drafts addressing something similar in the softwire WG but they all deal with IPv4/IPv6 translations.
Thanks,
Kris