Re: [dhcwg] IESG Review Comments on draft-ietf-dhc-3315id-for-v4-04.txt

Ralph Droms <rdroms@cisco.com> Wed, 01 June 2005 18:56 UTC

Received: from localhost.localdomain ([127.0.0.1] helo=megatron.ietf.org) by megatron.ietf.org with esmtp (Exim 4.32) id 1DdYO2-0002j5-Dh; Wed, 01 Jun 2005 14:56:18 -0400
Received: from odin.ietf.org ([132.151.1.176] helo=ietf.org) by megatron.ietf.org with esmtp (Exim 4.32) id 1DdYNz-0002ir-DI for dhcwg@megatron.ietf.org; Wed, 01 Jun 2005 14:56:17 -0400
Received: from ietf-mx.ietf.org (ietf-mx.ietf.org [132.151.6.1]) by ietf.org (8.9.1a/8.9.1a) with ESMTP id OAA15410 for <dhcwg@ietf.org>; Wed, 1 Jun 2005 14:56:11 -0400 (EDT)
Received: from sj-iport-3-in.cisco.com ([171.71.176.72] helo=sj-iport-3.cisco.com) by ietf-mx.ietf.org with esmtp (Exim 4.33) id 1DdYhr-00041P-Cs for dhcwg@ietf.org; Wed, 01 Jun 2005 15:16:48 -0400
Received: from rtp-core-2.cisco.com (64.102.124.13) by sj-iport-3.cisco.com with ESMTP; 01 Jun 2005 11:56:05 -0700
X-IronPort-AV: i="3.93,157,1115017200"; d="scan'208"; a="272762882:sNHT35704652"
Received: from xbh-rtp-201.amer.cisco.com (xbh-rtp-201.cisco.com [64.102.31.12]) by rtp-core-2.cisco.com (8.12.10/8.12.6) with ESMTP id j51Itv50025660; Wed, 1 Jun 2005 14:56:02 -0400 (EDT)
Received: from xmb-rtp-211.amer.cisco.com ([64.102.31.118]) by xbh-rtp-201.amer.cisco.com with Microsoft SMTPSVC(6.0.3790.211); Wed, 1 Jun 2005 14:56:00 -0400
Received: from 161.44.65.252 ([161.44.65.252]) by xmb-rtp-211.amer.cisco.com ([64.102.31.118]) via Exchange Front-End Server email.cisco.com ([64.102.31.38]) with Microsoft Exchange Server HTTP-DAV ; Wed, 1 Jun 2005 18:56:00 +0000
Received: from localhost.localdomain by email.cisco.com; 01 Jun 2005 14:56:30 -0400
Subject: Re: [dhcwg] IESG Review Comments on draft-ietf-dhc-3315id-for-v4-04.txt
From: Ralph Droms <rdroms@cisco.com>
To: dhcwg@ietf.org
In-Reply-To: <p06200708beaa237d1de4@[10.0.0.171]>
References: <p06200708beaa237d1de4@[10.0.0.171]>
Content-Type: text/plain
Content-Transfer-Encoding: 7bit
Date: Wed, 01 Jun 2005 14:56:30 -0400
Message-Id: <1117652190.11049.50.camel@localhost.localdomain>
Mime-Version: 1.0
X-Mailer: Evolution 2.0.4 (2.0.4-2)
X-OriginalArrivalTime: 01 Jun 2005 18:56:00.0478 (UTC) FILETIME=[8D524FE0:01C566DB]
X-Spam-Score: 0.0 (/)
X-Scan-Signature: cdb443e3957ca9b4c5b55e78cfcf4b26
Content-Transfer-Encoding: 7bit
Cc: margaret@thingmagic.com, "Wijnen, Bert (Bert)" <bwijnen@lucent.com>, David Kessens <david.kessens@nokia.com>, Brian E Carpenter <brc@zurich.ibm.com>, Russ Housley <housley@vigilsec.com>
X-BeenThere: dhcwg@ietf.org
X-Mailman-Version: 2.1.5
Precedence: list
List-Id: dhcwg.ietf.org
List-Unsubscribe: <https://www1.ietf.org/mailman/listinfo/dhcwg>, <mailto:dhcwg-request@ietf.org?subject=unsubscribe>
List-Post: <mailto:dhcwg@ietf.org>
List-Help: <mailto:dhcwg-request@ietf.org?subject=help>
List-Subscribe: <https://www1.ietf.org/mailman/listinfo/dhcwg>, <mailto:dhcwg-request@ietf.org?subject=subscribe>
Sender: dhcwg-bounces@ietf.org
Errors-To: dhcwg-bounces@ietf.org

I don't believe there was any followup discussion in response to
Margaret's post about issues raised by the IESG regarding draft-ietf-
dhc-3315id-for-v4-04.txt.  Please review and comment so we can resolve
the IESG issues and publish this document...

- Ralph

On Fri, 2005-05-13 at 05:35 -0400, Margaret Wasserman wrote:
> Hi All,
> 
> The IESG reviewed draft-ietf-dhc-3315id-for-v4-04.txt on our telechat 
> yesterday.  There were several comments on the document, included 
> below.  Issues marked "discuss" are blocking issues that need to be 
> resolved before the document will be approved for publication. 
> Non-blocking comments, marked "comment", should also be considered by 
> the WG and authors, but approval is not blocked pending their 
> resolution.
> 
> Some of these issues are fairly straight forward to address, but the 
> issue raised by Brian Carpenter and the long set of comments from 
> David Kessens will probably warrant WG discussion.
> 
> Thanks,
> Margaret
> 
> Brian Carpenter:
> Discuss:
> [2005-05-12] I expected to find some words stating what happens when 
> a client following this spec meets a server that doesn't, or vice 
> versa. Are these failure scenarios or is there implicit backwards 
> compatibility? This really isn't obvious and should probably be added 
> to the applicability section.
> 
> Ted Hardie:
> Comment:
> [2005-05-10] The document's IANA considerations says:
> 
> This document deprecates all 'client
>    identifier' type codes other than 255, and thus there is no need
>    for the IANA to track additional possible values for the type field
>    of the 'client identifier' option.
> 
> I got a bit confused about whether any values registered in this:
> http://www.iana.org/assignments/bootp-dhcp-parameters
> 
> are deprecated, or this only deprecates further registration.  A
> clarification may be in order.
> 
> Sam Hartman:
> Comment:
> [2005-05-08] I didn't find this document particularly clear it seemed harder to
> follow than it should be.  I think that's probably because it is a set
> of diffs to other behavior and has too many references to stand on its
> own.  However I did eventually follow it and I don't think anything I
> found should block publication at this stage.
> 
> Russ Housley:
> Discuss:
> [2005-05-09]
>    The Introduction says:
>    >
>    > This supersedes the behaviour specified in RFC2131 and RFC2132.
>    >
>    The header and the abstract need to indicate that this document
>    updates RFC 2131 and RFC 2132.
> 
> Comment:
> [2005-05-09]
>    Section 2.4 says:
>    >
>    > Like the client identifier format recommended by RFC2131, this
>    > suffers from the problems previously described in (2) and (3).
>    >
>    Section numbers are needed to refer to the previous problems.
> 
> David Kessens:
> Discuss:
> [2005-05-12] I received the following comment from the OPS 
> directorate. I understand from the comment that the issue might have 
> been discussed in the past. I would appreciate if you could 
> reconsider this issue:
> 
> How is a server expected to handle the case where a single computer first
> chooses to identify itself with a client identifier, and then later chooses
> not to supply an identifier at all?  This is never clearly explained in
> any section of RFC2131/2132, so there are three possible interpretations:
> 
> A) Treat them as two separate, discrete clients.
> 
> B) Synthesize a client identifier out of the CHADDR field - thus treating
>    clients who identify themselves with their ethernet MAC address as the
>    same client which didn't identify themself, on the same MAC address.
> 
> C) 'Slide' identities between the two clients.  In essence, the lack of a
>    client-identifier is like an "ANY" tag - any lease which was allocated
>    to a client using that CHADDR contents is fair game, and vice versa...
>    any lease which did not have a client identifier but had the same CHADDR
>    is fair game.
> 
> It might seem that the worst such different interpretations might cause
> is redundant address allocations - something that gets solved by itself
> when addresses expire.  It's true that this happens, and it's highly
> undesirable by DHCP server administrators, especially in the case where
> clients are limited to a certain number of leases (due to contractual
> levels of service).
> 
> There exists a "Windows for Embedded Devices" whose product name escapes
> me right at this moment.  Consider then the following reference case:
> 
> 1) PXE boots and obtains an IP address and configuration via DHCP - it is
>    told to download the Windows boot image.
> 
>          - A server now has a lease allocated to this MAC address in its
>            database, as allocated to a client that did not supply a client
>            identifier.
> 
> 2) Execution is passed to the Windows boot image - the system already has
>    an IP address, configured by PXE, but Windows wants to query the DHCP
>    server with more, vendor-specific, options added to the 'Options Request
>    List' to get extra configuration state the original PXE client did not
>    know it needed to know.
> 
>          - The Windows boot image sends a DISCOVER message with the address
>            as obtained by PXE in a 'Requested Address' option, and a client
>            identifier whose contents match the CHADDR field.
> 
>          - A server as implimenting interpretation A (above) allocates a new
>            address for the client, since the Windows client did supply a
>            client identifier, and this is interpreted as meaning it is a
>            seperate, distinct client from the former.
> 
>          - The Windows boot image, running within PXE, is unable to alter the
>            network configuration, and instead of REQUESTing the lease it was
>            just offered, continues to resend DISCOVER messages.
> 
> 3) The system ultimately times out and reboots itself - goto 1).
> 
> 
> This actually represents an insidious compatibility problem, and I
> submit it stems from poor definition of the client identifier option
> in RFC2131/2132.
> 
> Now, this draft has fine goals - the DHCPv6 Node Identifier that is being
> duplicated here is the right way to go about client identifiers, and it will
> serve useful purposes.  Not only for the dual-stack purposes of being able
> to detect what specific clients (as identified by their DUID's) are using
> both ipv4 and ipv6 addresses, but also for things like Dynamic DNS, and for
> unusual client configurations (clients having more than one interface - since
> the server can peek into the client-identifier it can see that a client has
> multiple interfaces active within a given broadcast domain - you may want
> to allocate the same address, different addresses, or even different
> addresses in different subnets within that broadcast domain).
> 
> Since the old identifiers were 'completely opaque', it's also a reverse
> compatible approach - servers that treat the client identifier as an
> opaque field will work acceptably well under all imaginable circumstances
> when clients supply identifiers in this draft's suggested formats.
> 
> These are all good things, and we need this draft to reach RFC at some
> point.
> 
> But I think we have learned from the past that not defining a "MUST"
> behaviour for this case - where a client presents itself at different
> times with a mixture of identities - produces incompatibilities due to
> differing interpretations.
> Producing a new format of the client identifier option, and not at least
> describing this problem much less addressing it, seems to be "not learning
> from our own mistakes."
> 
> Understand that the problem is magnified in this draft -
> 
> In the old RFC2131/2132 world, we could (as I described above) just
> synthesize a client-identiifer out of the ethernet MAC address and address
> 99.9% of the problematic cases.
> 
> But in this draft, we have defined a whole new encoding for the client
> identifier that has never appeared elsewhere and cannot be synthesized by
> the DHCP server from any other DHCP packet contents.
> 
> The only option I believe systems administrators will employ to avoid
> deployment problems with products conforming to this draft as delivered
> by products that don't (PXE), is to disable their server's implementation
> of client identifiers entirely.
> 
> Which is not at all what we want.
> 
> So it's a good draft, with good contents, features that we need, but also
> with what I think is a serious potential problem that I think should be
> addressed at least as it applies to this draft, if not in general.
> 
> Bert Wijnen:
> Discuss:
> [2005-05-12] I see RFC2119 luanguage (keywords SHOULD and such) 
> without a citation
> and a normative reference.
> 
> Comment:
> [2005-05-12] Mmm... I see citations in the abstract. My understanding is that
> those are not allowed. Easy to fix, just use perenthesis instead
> of square brackets.
> 
> _______________________________________________
> dhcwg mailing list
> dhcwg@ietf.org
> https://www1.ietf.org/mailman/listinfo/dhcwg

_______________________________________________
dhcwg mailing list
dhcwg@ietf.org
https://www1.ietf.org/mailman/listinfo/dhcwg