[homenet] WGLC comments on ietf-homenet-arch-07
Michael Richardson <mcr+ietf@sandelman.ca> Thu, 14 February 2013 00:26 UTC
Return-Path: <mcr@sandelman.ca>
X-Original-To: homenet@ietfa.amsl.com
Delivered-To: homenet@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 4E81721E80A3 for <homenet@ietfa.amsl.com>; Wed, 13 Feb 2013 16:26:29 -0800 (PST)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -2.599
X-Spam-Level:
X-Spam-Status: No, score=-2.599 tagged_above=-999 required=5 tests=[AWL=0.000, BAYES_00=-2.599]
Received: from mail.ietf.org ([64.170.98.30]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id 3u-RYpE5Ser3 for <homenet@ietfa.amsl.com>; Wed, 13 Feb 2013 16:26:28 -0800 (PST)
Received: from tuna.sandelman.ca (unknown [IPv6:2607:f0b0:f:3:216:3eff:fe7c:d1f3]) by ietfa.amsl.com (Postfix) with ESMTP id CF6CC21E809B for <homenet@ietf.org>; Wed, 13 Feb 2013 16:26:24 -0800 (PST)
Received: from sandelman.ca (desk.marajade.sandelman.ca [209.87.252.247]) by tuna.sandelman.ca (Postfix) with ESMTP id 4309E20168 for <homenet@ietf.org>; Wed, 13 Feb 2013 19:32:46 -0500 (EST)
Received: by sandelman.ca (Postfix, from userid 179) id 850436376A; Wed, 13 Feb 2013 19:25:18 -0500 (EST)
Received: from sandelman.ca (localhost [127.0.0.1]) by sandelman.ca (Postfix) with ESMTP id 74971636C5 for <homenet@ietf.org>; Wed, 13 Feb 2013 19:25:18 -0500 (EST)
From: Michael Richardson <mcr+ietf@sandelman.ca>
To: homenet@ietf.org
X-Mailer: MH-E 8.3; nmh 1.3-dev; XEmacs 21.4 (patch 22)
X-Face: $\n1pF)h^`}$H>Hk{L"x@)JS7<%Az}5RyS@k9X%29-lHB$Ti.V>2bi.~ehC0; <'$9xN5Ub# z!G,p`nR&p7Fz@^UXIn156S8.~^@MJ*mMsD7=QFeq%AL4m<nPbLgmtKK-5dC@#:k
MIME-Version: 1.0
Content-Type: multipart/signed; boundary="=-=-="; micalg="pgp-sha1"; protocol="application/pgp-signature"
Date: Wed, 13 Feb 2013 19:25:18 -0500
Message-ID: <24497.1360801518@sandelman.ca>
Sender: mcr@sandelman.ca
Subject: [homenet] WGLC comments on ietf-homenet-arch-07
X-BeenThere: homenet@ietf.org
X-Mailman-Version: 2.1.12
Precedence: list
List-Id: <homenet.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/homenet>, <mailto:homenet-request@ietf.org?subject=unsubscribe>
List-Archive: <http://www.ietf.org/mail-archive/web/homenet>
List-Post: <mailto:homenet@ietf.org>
List-Help: <mailto:homenet-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/homenet>, <mailto:homenet-request@ietf.org?subject=subscribe>
X-List-Received-Date: Thu, 14 Feb 2013 00:26:29 -0000
I have read the document from top to bottom. It isn't ready. I find that it needs more detailed editing. It makes quite a number of non-normative references to documents which might never be published. I realize that this won't keep the document from moving forward, but I wonder how useful those references will be in the future. I do not find that there is really any substantive content in the architecture document which I disagree with, or which is, at this point, at all controversal. I think that actually it should be more definitive, and in a number of places, significantly less repetitive. I think that we need two further revisions of this document. One to tighten things up, and a second to include text on a more clearly prescriptive notion of what the architecture is. === I found this part weird: [RFC6204] defines basic requirements for customer edge routers (CERs). The scope of this text is the internal homenet, and thus specific features on the CER are out of scope for this text. I'm confused by this. If the architecture and requirements set out by homenet can not apply to the CER, then how does any of this work? Maybe it needs to say: [RFC6204] defines basic requirements for customer edge routers (CERs). The scope of this text is the internal homenet, and thus specific features on the **WAN side of** the CER are out of scope for this text. (again in paragraph 2 of section 3) section 2.4: s/hoemnet/homenet/ Please change: In the case where LLNs are being set up in a new home/deployment, individual LLNs may, at least initially, each use their own /48 ULA prefix. to; In the case where LLNs are being set up in a new home/deployment (as early as during construction of the home), LLNs will need to use their own /48 ULA prefix. Depending upon circumstances beyond the scope of homenet, it may be impossible to renumber the ULA used by the LLN so routing between ULA /48s may be required. I'd sure like to UPPERCASE all of: As such, neither IPv6 NAT or NPTv6 is recommended for use in the homenet architecture. add to: As noted later in this text, if appropriate filtering is in place on the CER(s) **(as mandated by RFC6024 requirement S-2)***, a ULA source address may be taken as an indication of locally sourced traffic. (while it is clear that BCP38 says that packets with a ULA in the source field should not be sent upstream, it is unclear to me if BCP38 is sufficiently clear that ULA packets arriving on the WAN interface with ULA source addresses should also not be passed into the LAN.) I wonder if section 2.6 point 1 really belongs. "Ensuring there is a way to access concent in the IPv4 Internet." There is no particular reason this belongs in homenet or has to be implemented in the home network itself. There are advantages to doing it "onsite" if at least one of the CERs has IPv4 connectivity, otherwise two ISPs implementing DNS64 could confuse the homenet. 3.2.2, "Number of CERs" probably needs a [PCP] reference. I wonder if the diagrams should have the "Service Provider Network" label extended to "invade" into the CER: <text/plain violators beware> +-------+-------+ +-------+-------+ \ | Service | | Service | \ | Provider A | | Provider B | | Service | Router | | Router | | Provider +------+--------+ +-------+-------+ | network | | | | Customer | | | Internet connections | / | | / +------+--------+ +-------+-------+ / | IPv6 | | IPv6 | _ _ | Customer Edge | | Customer Edge | \ | Router 1 | | Router 2 | / +------+--------+ +-------+-------+ / </fixed> 3.2.3: add to: In some cases IPv4 home networks may feature cascaded NATs, which could include cases where NAT routers are included within VMs, or where Internet connection sharing services are used. to say: In some cases IPv4 home networks may feature cascaded NATs. End users are frequently unaware that they have created such networks as "home routers" and "home switches" are frequently confused. In addition, there are cases where NAT routers are included within Virtual Machine Hypervisors (VMware, HyperV, Xen, KVM, VirtualBox, etc...), or where Internet connection sharing services have been enabled. This document applies to the such hidden NAT "routers" equally. 3.2.4 para 4 s/archiecture/architecture/ 3.2.4 (page 18): An example of such a 'simpler' approach has been documented in [I-D.ietf-v6ops-ipv6-multihoming-without-ipv6nat]. Alternatively a flooding/routing protocol could potentially be used to pass information through the homenet, such that internal routers and ultimately end hosts could learn per-prefix configuration information, allowing better address selection decisions to be made. However, this would imply probably host and certainly router changes. Or another avenue is to introduce support for source routing throughout the homenet; while greatly improving the 'intelligence' of routing decisions within the homenet, such an approach would require relatively significant router changes. it seems that we are sitting on the fence here. I think that we need to be a bit more prescriptive here? I think we need a definition of walled garden. I'm not really happy with the IAB one that I was pointed to when some said that the IAB said that walled gardens were bad. 3.4.1: However, if only a /64 is offered by the ISP, the homenet may be severely constrained or even unable to function. I think that we need to say something different in the text that follows. "if only a single /64 is received by a CER, then the homenet prefix distribution protocol MUST contain a way for that CER to signal that failure case" I think that this replaces the text: For those reasons it is recommended that DHCP-PD or OSPFv3 capable routers have the ability to issue a warning upon receipt of a /64 if required to assign further prefixes within the home network. Though some consideration needs to be given to how that should be presented to a typical home user. 3.4.1: There may be cases where local law means some ISPs are required to change IPv6 prefixes (current IPv4 addresses) for privacy reasons for their customers. In such cases it may be possible to avoid an instant 'flash' renumbering and plan a non-flag day renumbering as per RFC 4192. Maybe if we are going to talk about this at all, we should reference the specific law, and understand if the privacy law wouldn't also be violated if my host talked to facebook using prefix1::001 and prefix2::001 at the same time, so in fact flash renumbering, is in fact required in order to satisfy the supposed law... 3.4.2 says: The use of ULAs should be restricted to the homenet scope through filtering at the border(s) of the homenet, as described in RFC 6092. I'm confused. 6092 doesn't mention ULAs at all? 3.4.2 last paragraph talks about multiple ULAs again and electing a master a second time. Might be best to just say this once. 3.4.3 para 3 says it again. 3.5 I think we have consensus that homenet is deploying a routing protocol. I think that 3.5 "Any routed solution" should be a seperate section. Either the requirements in 3.x should have more headings, or we should have explicit "REQ-XX" things itemized so that later documents can better refer to this. I think that perhaps much of section 3.7 could be removed, and replaced with a some statements from the mdnsext BOF slides. Simply stating that "homenet requires site wide service discovery as described in X" should be an abundant clue to the IESG that mdnsext in some form needs to be chartered, and identifying gaps is part of our charter. 3.8.1 - I don't think that DiffServ has any utility for a homenet. The issue is for QoS is getting an upstream ISP to prioritize the relevant traffic onto the downstream link(s). If it's really about traffic entirely internal to the homenet, then maybe some well known DSCP will do, sure... The right architecture, if there is going to be one is the IntServ/DiffEdge model. http://datatracker.ietf.org/doc/draft-bernet-diffedge/ I know that diffserv talked a lot about such things, and I'm told win2k can even do this, but to my knowedge nothing went forward as a specification. -- Michael Richardson <mcr+IETF@sandelman.ca>, Sandelman Software Works
- [homenet] WGLC comments on ietf-homenet-arch-07 Michael Richardson