Re: sockets APIs extensions for Host Identity Protocol

Miika Komu <miika@iki.fi> Thu, 10 May 2007 19:04 UTC

Return-path: <discuss-bounces@apps.ietf.org>
Received: from [127.0.0.1] (helo=stiedprmman1.va.neustar.com) by megatron.ietf.org with esmtp (Exim 4.43) id 1HmDwe-0002wZ-IC; Thu, 10 May 2007 15:04:56 -0400
Received: from discuss by megatron.ietf.org with local (Exim 4.43) id 1HmDwd-0002tg-Bg for discuss-confirm+ok@megatron.ietf.org; Thu, 10 May 2007 15:04:55 -0400
Received: from [10.91.34.44] (helo=ietf-mx.ietf.org) by megatron.ietf.org with esmtp (Exim 4.43) id 1HmDwd-0002tY-29 for discuss@apps.ietf.org; Thu, 10 May 2007 15:04:55 -0400
Received: from twilight.cs.hut.fi ([130.233.40.5]) by ietf-mx.ietf.org with esmtp (Exim 4.43) id 1HmDwb-0007Wi-Nj for discuss@apps.ietf.org; Thu, 10 May 2007 15:04:55 -0400
Received: by twilight.cs.hut.fi (Postfix, from userid 60001) id 465E72D0E; Thu, 10 May 2007 22:04:53 +0300 (EEST)
X-Spam-Checker-Version: SpamAssassin 3.2.0-niksula20070322 (2007-05-01) on twilight.cs.hut.fi
X-Spam-Level:
X-Spam-Status: No, score=0.0 required=5.0 tests=none autolearn=disabled version=3.2.0-niksula20070322
X-Spam-Niksula: No
Received: from kekkonen.cs.hut.fi (kekkonen.cs.hut.fi [130.233.41.50]) by twilight.cs.hut.fi (Postfix) with ESMTP id 9A4BC2D0C; Thu, 10 May 2007 22:04:52 +0300 (EEST)
Date: Thu, 10 May 2007 22:04:52 +0300
From: Miika Komu <miika@iki.fi>
X-X-Sender: mkomu@kekkonen.cs.hut.fi
To: Keith Moore <moore@cs.utk.edu>
Subject: Re: sockets APIs extensions for Host Identity Protocol
In-Reply-To: <46436B10.5090706@cs.utk.edu>
Message-ID: <Pine.SOL.4.64.0705102159020.10049@kekkonen.cs.hut.fi>
References: <Pine.SOL.4.64.0705041801060.14418@kekkonen.cs.hut.fi> <20070507082737.GB21759@nic.fr> <46413DD7.8020702@cs.utk.edu> <20070509121703.GA21070@nic.fr> <4641CA52.70504@cs.utk.edu> <Pine.LNX.4.64.0705091449360.26169@hermes-1.csi.cam.ac.uk> <4641D94C.9070304@cs.utk.edu> <Pine.SOL.4.64.0705102013550.10049@kekkonen.cs.hut.fi> <46436B10.5090706@cs.utk.edu>
MIME-Version: 1.0
Content-Type: TEXT/PLAIN; charset="US-ASCII"; format="flowed"
X-Spam-Score: 0.0 (/)
X-Scan-Signature: 8b30eb7682a596edff707698f4a80f7d
Cc: discuss@apps.ietf.org
X-BeenThere: discuss@apps.ietf.org
X-Mailman-Version: 2.1.5
Precedence: list
List-Id: general discussion of application-layer protocols <discuss.apps.ietf.org>
List-Unsubscribe: <https://www1.ietf.org/mailman/listinfo/discuss>, <mailto:discuss-request@apps.ietf.org?subject=unsubscribe>
List-Post: <mailto:discuss@apps.ietf.org>
List-Help: <mailto:discuss-request@apps.ietf.org?subject=help>
List-Subscribe: <https://www1.ietf.org/mailman/listinfo/discuss>, <mailto:discuss-request@apps.ietf.org?subject=subscribe>
Errors-To: discuss-bounces@apps.ietf.org

On Thu, 10 May 2007, Keith Moore wrote:

>> My exact question is that what to put into the socket address
>> structures when we have HIP-aware applications. Based on the
>> discussion, I think we can leave socket address structures based on
>> DNS names out of the scope and concentrate on two alternatives:
>> globally scoped HITs and locally scoped idenfiers (endpoint descriptors).
>>
>> The use of globally-scoped HITs has the following trade-offs:
>> + No extra translation step from local id to global id
>> + Smaller transition step to convert a legacy app to a HIP aware app?
>> - Opportunistic HIP mode, where the server's HIT is not known before
>> hand,
>>   will require a locally-scoped identifier anyway. This is similar to
>>   IN6ADDR_ANY, but it is used for the remote host, i.e.,
>>   connect(UNKOWN_HIT) where only the locator is known.
>> - No future proofing against the HIT size
>>
>> Locally-scoped identifiers have the reverse properties:
>> - Extra translation step from local id to global id
>> - Bigger transition step to convert a legacy app to a HIP aware app?
>> + All identifiers are of the same type (also in opportunistic HIP mode)
>> + Future proofing against changes in the HIT size
>>
>> If you had to choose between these two, what would you choose and why?
>> Do the proposed trade-offs make sense and would have something to add?
>
> offhand, I think you need to support both.  HITs aren't very useful to
> apps unless they are visible to them and globally-scoped.  HIP is still
> useful without HIT visibility, but less useful.

It does not mean that the HIT fingerprint, or preferably even the 
corresponding public key, are completely invisible to the application with 
locally-scoped identifiers. It is just a question of an extra function 
call that translates the local-scope identifier to the desired format (HIT 
or public key).

-- 
Miika Komu                                       http://www.iki.fi/miika/