Re: [Hipsec] Draft: data transport in HIP

Gonzalo Camarillo <Gonzalo.Camarillo@ericsson.com> Thu, 31 July 2008 17:32 UTC

Return-Path: <hipsec-bounces@ietf.org>
X-Original-To: hip-archive@lists.ietf.org
Delivered-To: ietfarch-hip-archive@core3.amsl.com
Received: from [127.0.0.1] (localhost [127.0.0.1]) by core3.amsl.com (Postfix) with ESMTP id 647E528C243; Thu, 31 Jul 2008 10:32:41 -0700 (PDT)
X-Original-To: hipsec@core3.amsl.com
Delivered-To: hipsec@core3.amsl.com
Received: from localhost (localhost [127.0.0.1]) by core3.amsl.com (Postfix) with ESMTP id 8C49028C243 for <hipsec@core3.amsl.com>; Thu, 31 Jul 2008 10:32:39 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -6.249
X-Spam-Level:
X-Spam-Status: No, score=-6.249 tagged_above=-999 required=5 tests=[BAYES_00=-2.599, HELO_EQ_SE=0.35, RCVD_IN_DNSWL_MED=-4]
Received: from mail.ietf.org ([64.170.98.32]) by localhost (core3.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id yLMJhSWjZQY8 for <hipsec@core3.amsl.com>; Thu, 31 Jul 2008 10:32:38 -0700 (PDT)
Received: from mailgw4.ericsson.se (mailgw4.ericsson.se [193.180.251.62]) by core3.amsl.com (Postfix) with ESMTP id 4DF2F28C223 for <hipsec@ietf.org>; Thu, 31 Jul 2008 10:32:38 -0700 (PDT)
Received: from mailgw4.ericsson.se (unknown [127.0.0.1]) by mailgw4.ericsson.se (Symantec Mail Security) with ESMTP id 2A22F20373; Thu, 31 Jul 2008 19:32:55 +0200 (CEST)
X-AuditID: c1b4fb3e-ae198bb000004ec0-e9-4891f747a166
Received: from esealmw128.eemea.ericsson.se (unknown [153.88.254.121]) by mailgw4.ericsson.se (Symantec Mail Security) with ESMTP id 06B9220093; Thu, 31 Jul 2008 19:32:55 +0200 (CEST)
Received: from esealmw128.eemea.ericsson.se ([153.88.254.176]) by esealmw128.eemea.ericsson.se with Microsoft SMTPSVC(6.0.3790.1830); Thu, 31 Jul 2008 19:32:54 +0200
Received: from [164.48.29.59] ([164.48.29.59]) by esealmw128.eemea.ericsson.se with Microsoft SMTPSVC(6.0.3790.1830); Thu, 31 Jul 2008 19:32:54 +0200
Message-ID: <4891F745.4030207@ericsson.com>
Date: Thu, 31 Jul 2008 20:32:53 +0300
From: Gonzalo Camarillo <Gonzalo.Camarillo@ericsson.com>
User-Agent: Thunderbird 2.0.0.16 (Windows/20080708)
MIME-Version: 1.0
To: "Henderson, Thomas R" <thomas.r.henderson@boeing.com>
References: <48906773.8000501@ericsson.com> <77F357662F8BFA4CA7074B0410171B6D07B0B71D@XCH-NW-5V1.nw.nos.boeing.com> <4891E56F.2010405@ericsson.com> <77F357662F8BFA4CA7074B0410171B6D07B0B721@XCH-NW-5V1.nw.nos.boeing.com>
In-Reply-To: <77F357662F8BFA4CA7074B0410171B6D07B0B721@XCH-NW-5V1.nw.nos.boeing.com>
X-OriginalArrivalTime: 31 Jul 2008 17:32:54.0658 (UTC) FILETIME=[77118E20:01C8F333]
X-Brightmail-Tracker: AAAAAA==
Cc: "Pekka Nikander (JO/LMF)" <pekka.nikander@ericsson.com>, HIP <hipsec@ietf.org>, Jan Melen <jan.melen@ericsson.com>
Subject: Re: [Hipsec] Draft: data transport in HIP
X-BeenThere: hipsec@ietf.org
X-Mailman-Version: 2.1.9
Precedence: list
List-Id: "This is the official IETF Mailing List for the HIP Working Group." <hipsec.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/listinfo/hipsec>, <mailto:hipsec-request@ietf.org?subject=unsubscribe>
List-Archive: <http://www.ietf.org/pipermail/hipsec>
List-Post: <mailto:hipsec@ietf.org>
List-Help: <mailto:hipsec-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/hipsec>, <mailto:hipsec-request@ietf.org?subject=subscribe>
Content-Transfer-Encoding: 7bit
Content-Type: text/plain; charset="us-ascii"; Format="flowed"
Sender: hipsec-bounces@ietf.org
Errors-To: hipsec-bounces@ietf.org

Hi,

in my view, all the non-API-related stuff you propose, belongs to this 
draft. All the API-related stuff belongs somewhere else (i.e., in the 
HIP API draft).

Cheers,

Gonzalo

Henderson, Thomas R wrote:
>  
> 
>> -----Original Message-----
>> From: Gonzalo Camarillo [mailto:Gonzalo.Camarillo@ericsson.com] 
>> Sent: Thursday, July 31, 2008 9:17 AM
>> To: Henderson, Thomas R
>> Cc: HIP; Pekka Nikander (JO/LMF); Jan Melen
>> Subject: Re: [Hipsec] Draft: data transport in HIP
>>
>> Hi Tom,
>>
>> the idea with this draft is the following:
>>
>> o define a HIP DATA packet as discussed in the past.
>> o discuss the trade offs involved in the use of this packet. We gain 
>> efficiency but lose DoS protection.
>> o discuss under which circumstances implementations may want 
>> to use DATA 
>> and also under which circumstances an implementation wants to 
>> accept or 
>> reject DATA (e.g., in some cases, an application that is part of a 
>> trusted overlay may want to accept DATA).
>> o when an implementation does not want to accept DATA (e.g., 
>> because of 
>> DoS concerns), it needs to be able to return an R1 to start a base 
>> exchange instead.
>>
>>
>> The reason why, at this point, the document does not spend 
>> time defining 
>>   DATA is because we wanted to stress the importance of the 
>> discussions 
>> on why it is appropriate to use such a mechanism. We will be 
>> introducing 
>> the definition of DATA in future revisions of the draft.
> 
> I wasn't suggesting to spend time defining DATA now, but to define how
> the user of DATA perceives the service that DATA provides.
> 
> The HICCUPS draft briefly states what is the purpose of this service--
> to provide carriage of signaling messages between hosts, while solving
> for the signaling protocol all of the details of NAT traversal,
> mobility, multihoming.  This, to me, would be clearly a nice service to
> provide, and I don't know how much more you need to justify it.
> 
> However, there are a lot of details that need to be resolved, such as:
> - what are the delivery semantics (reliable, unreliable) of such
> messages?
> - what are the security semantics?  From a server perspective, should
> application be able to select a listening service that uses base
> exchange or not, or should that detail be hidden from the signaling
> application?  Can/should applications specify what source HIT should be
> used?  Should applications be able to provide or load their own host
> identity?  Should opportunistic mode be supported, and how is this mode
> controlled?
> - can applications use this service by providing a URL or by providing
> only a destination HIT?  
> - does the application provide hints as to which overlay the destination
> HIT has stored its bindings?
> - what kind of other policy can an application flow down to the HIP
> daemon, and how is it communicated at the API?
> - do locators (addresses) play any role at the API level?
> - what kind of error codes are provided back to the signaling
> applications?
> 
> I don't think we can fully specify DATA until we understand how the
> above questions are answered.
> 
>> With respect to the API, we decided to wait with the API 
>> draft until the 
>> NAT traversal and overlay work is in a more advanced state so that we 
>> have a clearer picture on the requirements for a HIP API.
>>
> 
> Yes, these issues (overlay, native API, HICCUPS) are all bound together,
> but I think that to move forward on the protocol details, we first have
> to have a clear vision as to what is the service API we are trying to
> support.  
> 
> Regards,
> Tom 

_______________________________________________
Hipsec mailing list
Hipsec@ietf.org
https://www.ietf.org/mailman/listinfo/hipsec