[homenet] WGLC comments on ietf-homenet-arch-07

Michael Richardson <mcr+ietf@sandelman.ca> Thu, 14 February 2013 00:26 UTC

Return-Path: <mcr@sandelman.ca>
X-Original-To: homenet@ietfa.amsl.com
Delivered-To: homenet@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 4E81721E80A3 for <homenet@ietfa.amsl.com>; Wed, 13 Feb 2013 16:26:29 -0800 (PST)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -2.599
X-Spam-Level:
X-Spam-Status: No, score=-2.599 tagged_above=-999 required=5 tests=[AWL=0.000, BAYES_00=-2.599]
Received: from mail.ietf.org ([64.170.98.30]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id 3u-RYpE5Ser3 for <homenet@ietfa.amsl.com>; Wed, 13 Feb 2013 16:26:28 -0800 (PST)
Received: from tuna.sandelman.ca (unknown [IPv6:2607:f0b0:f:3:216:3eff:fe7c:d1f3]) by ietfa.amsl.com (Postfix) with ESMTP id CF6CC21E809B for <homenet@ietf.org>; Wed, 13 Feb 2013 16:26:24 -0800 (PST)
Received: from sandelman.ca (desk.marajade.sandelman.ca [209.87.252.247]) by tuna.sandelman.ca (Postfix) with ESMTP id 4309E20168 for <homenet@ietf.org>; Wed, 13 Feb 2013 19:32:46 -0500 (EST)
Received: by sandelman.ca (Postfix, from userid 179) id 850436376A; Wed, 13 Feb 2013 19:25:18 -0500 (EST)
Received: from sandelman.ca (localhost [127.0.0.1]) by sandelman.ca (Postfix) with ESMTP id 74971636C5 for <homenet@ietf.org>; Wed, 13 Feb 2013 19:25:18 -0500 (EST)
From: Michael Richardson <mcr+ietf@sandelman.ca>
To: homenet@ietf.org
X-Mailer: MH-E 8.3; nmh 1.3-dev; XEmacs 21.4 (patch 22)
X-Face: $\n1pF)h^`}$H>Hk{L"x@)JS7<%Az}5RyS@k9X%29-lHB$Ti.V>2bi.~ehC0; <'$9xN5Ub# z!G,p`nR&p7Fz@^UXIn156S8.~^@MJ*mMsD7=QFeq%AL4m<nPbLgmtKK-5dC@#:k
MIME-Version: 1.0
Content-Type: multipart/signed; boundary="=-=-="; micalg="pgp-sha1"; protocol="application/pgp-signature"
Date: Wed, 13 Feb 2013 19:25:18 -0500
Message-ID: <24497.1360801518@sandelman.ca>
Sender: mcr@sandelman.ca
Subject: [homenet] WGLC comments on ietf-homenet-arch-07
X-BeenThere: homenet@ietf.org
X-Mailman-Version: 2.1.12
Precedence: list
List-Id: <homenet.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/homenet>, <mailto:homenet-request@ietf.org?subject=unsubscribe>
List-Archive: <http://www.ietf.org/mail-archive/web/homenet>
List-Post: <mailto:homenet@ietf.org>
List-Help: <mailto:homenet-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/homenet>, <mailto:homenet-request@ietf.org?subject=subscribe>
X-List-Received-Date: Thu, 14 Feb 2013 00:26:29 -0000

I have read the document from top to bottom.   It isn't ready.

I find that it needs more detailed editing.  It makes quite a number of
non-normative references to documents which might never be published.
I realize that this won't keep the document from moving forward,
but I wonder how useful those references will be in the future.

I do not find that there is really any substantive content in
the architecture document which I disagree with, or which is, at this
point, at all controversal.  I think that actually it should be more
definitive, and in a number of places, significantly less repetitive.

I think that we need two further revisions of this document.

One to tighten things up, and a second to include text on a more
clearly prescriptive notion of what the architecture is.


===
I found this part weird:

   [RFC6204] defines basic requirements for customer edge routers
   (CERs).  The scope of this text is the internal homenet, and thus
   specific features on the CER are out of scope for this text.

I'm confused by this.  If the architecture and requirements set out by
homenet can not apply to the CER, then how does any of this work?
Maybe it needs to say:

   [RFC6204] defines basic requirements for customer edge routers
   (CERs).  The scope of this text is the internal homenet, and thus
   specific features on the **WAN side of** the CER are out of scope for
   this text.
(again in paragraph 2 of section 3)

section 2.4: s/hoemnet/homenet/

Please change:
   In the case where LLNs are
   being set up in a new home/deployment, individual LLNs may, at least
   initially, each use their own /48 ULA prefix.

to;
   In the case where LLNs are
   being set up in a new home/deployment (as early as during
   construction of the home), LLNs will need to use their own /48
   ULA prefix.  Depending upon circumstances beyond the scope of
   homenet, it may be impossible to renumber the ULA used by the LLN
   so routing between ULA /48s may be required.


I'd sure like to UPPERCASE all of:
   As such, neither IPv6 NAT or NPTv6 is recommended for
   use in the homenet architecture.

add to:
   As noted later in this text, if appropriate filtering is in place on
   the CER(s) **(as mandated by RFC6024 requirement S-2)***, a ULA
   source address may be taken as an indication of
   locally sourced traffic.

(while it is clear that BCP38 says that packets with a ULA in the source
field should not be sent upstream, it is unclear to me if BCP38 is
sufficiently clear that ULA packets arriving on the WAN interface
with ULA source addresses should also not be passed into the LAN.)

I wonder if section 2.6 point 1 really belongs.
  "Ensuring there is a way to access concent in the IPv4 Internet."
There is no particular reason this belongs in homenet or has to be
implemented in the home network itself.  There are advantages to doing
it "onsite" if at least one of the CERs has IPv4 connectivity, otherwise
two ISPs implementing DNS64 could confuse the homenet.

3.2.2, "Number of CERs" probably needs a [PCP] reference.

I wonder if the diagrams should have the "Service Provider Network"
label extended to "invade" into the CER:

<text/plain violators beware>

           +-------+-------+     +-------+-------+         \
           |   Service     |     |   Service     |          \
           |  Provider A   |     |  Provider B   |           | Service
           |    Router     |     |    Router     |           | Provider
           +------+--------+     +-------+-------+           | network
                  |                      |                   |
                  |      Customer        |                   |
                  | Internet connections |                  /
                  |                      |		   /
           +------+--------+     +-------+-------+        /
           |     IPv6      |     |    IPv6       |        _ _
           | Customer Edge |     | Customer Edge |           \
           |   Router 1    |     |   Router 2    |           /
           +------+--------+     +-------+-------+          /
</fixed>

3.2.3:

add to:
   In some cases IPv4 home networks may feature cascaded NATs, which
   could include cases where NAT routers are included within VMs, or
   where Internet connection sharing services are used. 

to say:
   In some cases IPv4 home networks may feature cascaded NATs.
   End users are frequently unaware that they have created such
   networks as "home routers" and "home switches" are frequently
   confused. In addition, there are cases where
   NAT routers are included within Virtual Machine Hypervisors 
   (VMware, HyperV, Xen, KVM, VirtualBox, etc...), or
   where Internet connection sharing services have been enabled.
   This document applies to the such hidden NAT "routers" equally.

3.2.4 para 4 s/archiecture/architecture/

3.2.4 (page 18):
   An example of such a 'simpler' approach has been documented in
   [I-D.ietf-v6ops-ipv6-multihoming-without-ipv6nat].  Alternatively a
   flooding/routing protocol could potentially be used to pass
   information through the homenet, such that internal routers and
   ultimately end hosts could learn per-prefix configuration
   information, allowing better address selection decisions to be made.
   However, this would imply probably host and certainly router changes.
   Or another avenue is to introduce support for source routing
   throughout the homenet; while greatly improving the 'intelligence' of
   routing decisions within the homenet, such an approach would require
   relatively significant router changes.

it seems that we are sitting on the fence here.  I think that we need to
be a bit more prescriptive here?

I think we need a definition of walled garden.  I'm not really happy
with the IAB one that I was pointed to when some said that the IAB said
that walled gardens were bad.

3.4.1: 
       However, if only a /64 is offered by the ISP, the homenet
       may be severely constrained or even unable to function.

I think that we need to say something different in the text that follows.

"if only a single /64 is received by a CER, then the homenet prefix
 distribution protocol MUST contain a way for that CER to signal
 that failure case"

I think that this replaces the text:
  For those reasons it is recommended that
  DHCP-PD or OSPFv3 capable routers have the ability to issue a warning
  upon receipt of a /64 if required to assign further prefixes within
  the home network.  Though some consideration needs to be given to how
  that should be presented to a typical home user.

3.4.1:
   There may be cases where local law means some ISPs are required to
   change IPv6 prefixes (current IPv4 addresses) for privacy reasons for
   their customers.  In such cases it may be possible to avoid an
   instant 'flash' renumbering and plan a non-flag day renumbering as
   per RFC 4192.

Maybe if we are going to talk about this at all, we should reference 
the specific law, and understand if the privacy law wouldn't also be 
violated if my host talked to facebook using prefix1::001 and
prefix2::001 at the same time, so in fact flash renumbering, is in fact
required in order to satisfy the supposed law...

3.4.2 says:
   The use of ULAs should be restricted to the homenet scope through
   filtering at the border(s) of the homenet, as described in RFC 6092.

I'm confused.  6092 doesn't mention ULAs at all?

3.4.2 last paragraph talks about multiple ULAs again and electing a
      master a second time. Might be best to just say this once.
      3.4.3 para 3 says it again.

3.5 I think we have consensus that homenet is deploying a routing protocol.

I think that 3.5 "Any routed solution" should be a seperate section.
Either the requirements in 3.x should have more headings, or we should
have explicit "REQ-XX" things itemized so that later documents can
better refer to this.

I think that perhaps much of section 3.7 could be removed, and replaced
with a some statements from the mdnsext BOF slides.  Simply stating that
"homenet requires site wide service discovery as described in X" should
be an abundant clue to the IESG that mdnsext in some form needs to be
chartered, and identifying gaps is part of our charter.

3.8.1 - I don't think that DiffServ has any utility for a homenet.
      The issue is for QoS is getting an upstream ISP to
      prioritize the relevant traffic onto the downstream
      link(s).  If it's really about traffic entirely internal
      to the homenet, then maybe some well known DSCP will
      do, sure...

      The right architecture, if there is going to be one is
      the IntServ/DiffEdge model.
      http://datatracker.ietf.org/doc/draft-bernet-diffedge/
      I know that diffserv talked a lot about such things, 
      and I'm told win2k can even do this, but to my knowedge
      nothing went forward as a specification.








-- 
Michael Richardson <mcr+IETF@sandelman.ca>, Sandelman Software Works