Re: [homenet] New Version Notification for draft-howard-homenet-routing-comparison-00.txt

Jari Arkko <jari.arkko@piuha.net> Fri, 20 January 2012 13:54 UTC

Return-Path: <jari.arkko@piuha.net>
X-Original-To: homenet@ietfa.amsl.com
Delivered-To: homenet@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id BDC0421F8589 for <homenet@ietfa.amsl.com>; Fri, 20 Jan 2012 05:54:33 -0800 (PST)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -102.599
X-Spam-Level:
X-Spam-Status: No, score=-102.599 tagged_above=-999 required=5 tests=[BAYES_00=-2.599, USER_IN_WHITELIST=-100]
Received: from mail.ietf.org ([12.22.58.30]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id 1uqzz9-V-p2A for <homenet@ietfa.amsl.com>; Fri, 20 Jan 2012 05:54:33 -0800 (PST)
Received: from p130.piuha.net (p130.piuha.net [IPv6:2001:14b8:400::130]) by ietfa.amsl.com (Postfix) with ESMTP id E41AA21F8578 for <homenet@ietf.org>; Fri, 20 Jan 2012 05:54:32 -0800 (PST)
Received: from localhost (localhost [127.0.0.1]) by p130.piuha.net (Postfix) with ESMTP id 32CC22CC44; Fri, 20 Jan 2012 15:54:31 +0200 (EET)
X-Virus-Scanned: amavisd-new at piuha.net
Received: from p130.piuha.net ([127.0.0.1]) by localhost (p130.piuha.net [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id aUZ_pKUPF46G; Fri, 20 Jan 2012 15:54:30 +0200 (EET)
Received: from [127.0.0.1] (p130.piuha.net [IPv6:2001:14b8:400::130]) by p130.piuha.net (Postfix) with ESMTP id 05A342CC39; Fri, 20 Jan 2012 15:54:29 +0200 (EET)
Message-ID: <4F197215.3020600@piuha.net>
Date: Fri, 20 Jan 2012 15:54:29 +0200
From: Jari Arkko <jari.arkko@piuha.net>
User-Agent: Mozilla/5.0 (X11; Linux x86_64; rv:9.0) Gecko/20111220 Thunderbird/9.0
MIME-Version: 1.0
To: "Howard, Lee" <lee.howard@twcable.com>
References: <DCC302FAA9FE5F4BBA4DCAD46569377917370FC937@PRVPEXVS03.corp.twcable.com> <89BEBB84-AE13-433E-8322-E3EEF045E4F5@nominet.org.uk> <DCC302FAA9FE5F4BBA4DCAD46569377917377385D0@PRVPEXVS03.corp.twcable.com>
In-Reply-To: <DCC302FAA9FE5F4BBA4DCAD46569377917377385D0@PRVPEXVS03.corp.twcable.com>
Content-Type: text/plain; charset="ISO-8859-1"; format="flowed"
Content-Transfer-Encoding: 7bit
Cc: Ray Bellis <Ray.Bellis@nominet.org.uk>, "homenet@ietf.org" <homenet@ietf.org>
Subject: Re: [homenet] New Version Notification for draft-howard-homenet-routing-comparison-00.txt
X-BeenThere: homenet@ietf.org
X-Mailman-Version: 2.1.12
Precedence: list
List-Id: <homenet.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/homenet>, <mailto:homenet-request@ietf.org?subject=unsubscribe>
List-Archive: <http://www.ietf.org/mail-archive/web/homenet>
List-Post: <mailto:homenet@ietf.org>
List-Help: <mailto:homenet-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/homenet>, <mailto:homenet-request@ietf.org?subject=subscribe>
X-List-Received-Date: Fri, 20 Jan 2012 13:54:33 -0000

Lee,

I have to send a more in-depth review of your draft later, but just touching on a couple of important points:

> The problem with zOSPF is that it doesn't meet our requirements. It doesn't detect borders (unless the border happens to have another zOSPF router with the wrong password), 

The problem is that we have incomplete proposals, and people are making evaluations based on assumptions on what those incomplete specification or implementation parts might be. We also have a _system_, not an individual protocol, and several protocol implementation modules need to co-operate so that the system delivers the desired behavior. For instance, if we think about the home network as a black box, it needs to talk to external world probably at least with DHCP and DHCP-PD, talk to hosts within the network with ND, do something for naming and discovery protocols, etc. Internally, it may do something black box magic for the routing and other things, of course.

A case in point. I'm working on an implementation that most definitely detects borders, and still uses OSPF autoconfiguration to handle routing. How does it detect borders? It attempts to do DHCP, DHCP-PD, OSPF autoconfiguration, and the usual "I have a working connection to the Internet" probing techniques. It also allows for manual configuration, or the "this port is for Internet, the other one is for internal network" models.

> it requires configuration (for the password),

Acee's autoconfiguration design is nice in that it can be guaranteed to not accidentally connect to enterprise and ISP networks simply due to the selection of the area and instance IDs. See Section 2 in draft-acee.

I think it would be useful to provide an automatic security model on top of the autoconfiguration design, and some ideas for that have been circulated on the list. But I would think that the security model and issues in setting it up are very similar between different routing protocol-based designs and with the PIO design. For instance, we can provide ssh-like security relatively easily, but if you want to go beyond that then you must have configuration.

> it doesn't handle walled gardens (a requirement being debated), it's not lightweight. 

I agree that link state routing protocols are a bigger amount of code than, say, RIP. But I think the crux is code availability and reliability, rather than pure measurement of lines of code. Most home network vendors would use an openly available implementation rather than write their own, so having one available is more important than the number of lines in it. I think I have seen the working group favor support for complex topologies, preventing user action from leading to non-working network more than for absolutely simplicity. I think for absolute simplicity and code availability, RIP could be our choice.

Jari