Re: [Hipsec] Draft: data transport in HIP
Gonzalo Camarillo <Gonzalo.Camarillo@ericsson.com> Thu, 31 July 2008 17:32 UTC
Return-Path: <hipsec-bounces@ietf.org>
X-Original-To: hip-archive@lists.ietf.org
Delivered-To: ietfarch-hip-archive@core3.amsl.com
Received: from [127.0.0.1] (localhost [127.0.0.1]) by core3.amsl.com (Postfix) with ESMTP id 647E528C243; Thu, 31 Jul 2008 10:32:41 -0700 (PDT)
X-Original-To: hipsec@core3.amsl.com
Delivered-To: hipsec@core3.amsl.com
Received: from localhost (localhost [127.0.0.1]) by core3.amsl.com (Postfix) with ESMTP id 8C49028C243 for <hipsec@core3.amsl.com>; Thu, 31 Jul 2008 10:32:39 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -6.249
X-Spam-Level:
X-Spam-Status: No, score=-6.249 tagged_above=-999 required=5 tests=[BAYES_00=-2.599, HELO_EQ_SE=0.35, RCVD_IN_DNSWL_MED=-4]
Received: from mail.ietf.org ([64.170.98.32]) by localhost (core3.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id yLMJhSWjZQY8 for <hipsec@core3.amsl.com>; Thu, 31 Jul 2008 10:32:38 -0700 (PDT)
Received: from mailgw4.ericsson.se (mailgw4.ericsson.se [193.180.251.62]) by core3.amsl.com (Postfix) with ESMTP id 4DF2F28C223 for <hipsec@ietf.org>; Thu, 31 Jul 2008 10:32:38 -0700 (PDT)
Received: from mailgw4.ericsson.se (unknown [127.0.0.1]) by mailgw4.ericsson.se (Symantec Mail Security) with ESMTP id 2A22F20373; Thu, 31 Jul 2008 19:32:55 +0200 (CEST)
X-AuditID: c1b4fb3e-ae198bb000004ec0-e9-4891f747a166
Received: from esealmw128.eemea.ericsson.se (unknown [153.88.254.121]) by mailgw4.ericsson.se (Symantec Mail Security) with ESMTP id 06B9220093; Thu, 31 Jul 2008 19:32:55 +0200 (CEST)
Received: from esealmw128.eemea.ericsson.se ([153.88.254.176]) by esealmw128.eemea.ericsson.se with Microsoft SMTPSVC(6.0.3790.1830); Thu, 31 Jul 2008 19:32:54 +0200
Received: from [164.48.29.59] ([164.48.29.59]) by esealmw128.eemea.ericsson.se with Microsoft SMTPSVC(6.0.3790.1830); Thu, 31 Jul 2008 19:32:54 +0200
Message-ID: <4891F745.4030207@ericsson.com>
Date: Thu, 31 Jul 2008 20:32:53 +0300
From: Gonzalo Camarillo <Gonzalo.Camarillo@ericsson.com>
User-Agent: Thunderbird 2.0.0.16 (Windows/20080708)
MIME-Version: 1.0
To: "Henderson, Thomas R" <thomas.r.henderson@boeing.com>
References: <48906773.8000501@ericsson.com> <77F357662F8BFA4CA7074B0410171B6D07B0B71D@XCH-NW-5V1.nw.nos.boeing.com> <4891E56F.2010405@ericsson.com> <77F357662F8BFA4CA7074B0410171B6D07B0B721@XCH-NW-5V1.nw.nos.boeing.com>
In-Reply-To: <77F357662F8BFA4CA7074B0410171B6D07B0B721@XCH-NW-5V1.nw.nos.boeing.com>
X-OriginalArrivalTime: 31 Jul 2008 17:32:54.0658 (UTC) FILETIME=[77118E20:01C8F333]
X-Brightmail-Tracker: AAAAAA==
Cc: "Pekka Nikander (JO/LMF)" <pekka.nikander@ericsson.com>, HIP <hipsec@ietf.org>, Jan Melen <jan.melen@ericsson.com>
Subject: Re: [Hipsec] Draft: data transport in HIP
X-BeenThere: hipsec@ietf.org
X-Mailman-Version: 2.1.9
Precedence: list
List-Id: "This is the official IETF Mailing List for the HIP Working Group." <hipsec.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/listinfo/hipsec>, <mailto:hipsec-request@ietf.org?subject=unsubscribe>
List-Archive: <http://www.ietf.org/pipermail/hipsec>
List-Post: <mailto:hipsec@ietf.org>
List-Help: <mailto:hipsec-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/hipsec>, <mailto:hipsec-request@ietf.org?subject=subscribe>
Content-Transfer-Encoding: 7bit
Content-Type: text/plain; charset="us-ascii"; Format="flowed"
Sender: hipsec-bounces@ietf.org
Errors-To: hipsec-bounces@ietf.org
Hi, in my view, all the non-API-related stuff you propose, belongs to this draft. All the API-related stuff belongs somewhere else (i.e., in the HIP API draft). Cheers, Gonzalo Henderson, Thomas R wrote: > > >> -----Original Message----- >> From: Gonzalo Camarillo [mailto:Gonzalo.Camarillo@ericsson.com] >> Sent: Thursday, July 31, 2008 9:17 AM >> To: Henderson, Thomas R >> Cc: HIP; Pekka Nikander (JO/LMF); Jan Melen >> Subject: Re: [Hipsec] Draft: data transport in HIP >> >> Hi Tom, >> >> the idea with this draft is the following: >> >> o define a HIP DATA packet as discussed in the past. >> o discuss the trade offs involved in the use of this packet. We gain >> efficiency but lose DoS protection. >> o discuss under which circumstances implementations may want >> to use DATA >> and also under which circumstances an implementation wants to >> accept or >> reject DATA (e.g., in some cases, an application that is part of a >> trusted overlay may want to accept DATA). >> o when an implementation does not want to accept DATA (e.g., >> because of >> DoS concerns), it needs to be able to return an R1 to start a base >> exchange instead. >> >> >> The reason why, at this point, the document does not spend >> time defining >> DATA is because we wanted to stress the importance of the >> discussions >> on why it is appropriate to use such a mechanism. We will be >> introducing >> the definition of DATA in future revisions of the draft. > > I wasn't suggesting to spend time defining DATA now, but to define how > the user of DATA perceives the service that DATA provides. > > The HICCUPS draft briefly states what is the purpose of this service-- > to provide carriage of signaling messages between hosts, while solving > for the signaling protocol all of the details of NAT traversal, > mobility, multihoming. This, to me, would be clearly a nice service to > provide, and I don't know how much more you need to justify it. > > However, there are a lot of details that need to be resolved, such as: > - what are the delivery semantics (reliable, unreliable) of such > messages? > - what are the security semantics? From a server perspective, should > application be able to select a listening service that uses base > exchange or not, or should that detail be hidden from the signaling > application? Can/should applications specify what source HIT should be > used? Should applications be able to provide or load their own host > identity? Should opportunistic mode be supported, and how is this mode > controlled? > - can applications use this service by providing a URL or by providing > only a destination HIT? > - does the application provide hints as to which overlay the destination > HIT has stored its bindings? > - what kind of other policy can an application flow down to the HIP > daemon, and how is it communicated at the API? > - do locators (addresses) play any role at the API level? > - what kind of error codes are provided back to the signaling > applications? > > I don't think we can fully specify DATA until we understand how the > above questions are answered. > >> With respect to the API, we decided to wait with the API >> draft until the >> NAT traversal and overlay work is in a more advanced state so that we >> have a clearer picture on the requirements for a HIP API. >> > > Yes, these issues (overlay, native API, HICCUPS) are all bound together, > but I think that to move forward on the protocol details, we first have > to have a clear vision as to what is the service API we are trying to > support. > > Regards, > Tom _______________________________________________ Hipsec mailing list Hipsec@ietf.org https://www.ietf.org/mailman/listinfo/hipsec
- [Hipsec] Draft: data transport in HIP Gonzalo Camarillo
- Re: [Hipsec] Draft: data transport in HIP Henderson, Thomas R
- Re: [Hipsec] Draft: data transport in HIP Gonzalo Camarillo
- Re: [Hipsec] Draft: data transport in HIP Henderson, Thomas R
- Re: [Hipsec] Draft: data transport in HIP Gonzalo Camarillo
- Re: [Hipsec] Draft: data transport in HIP Henderson, Thomas R
- Re: [Hipsec] Draft: data transport in HIP Gonzalo Camarillo