Re: [homenet] Status of draft-tldm-simple-homenet-naming CFA

Ted Lemon <mellon@fugue.com> Sun, 13 August 2017 14:48 UTC

Return-Path: <mellon@fugue.com>
X-Original-To: homenet@ietfa.amsl.com
Delivered-To: homenet@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 7A8571321A6 for <homenet@ietfa.amsl.com>; Sun, 13 Aug 2017 07:48:53 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -1.9
X-Spam-Level:
X-Spam-Status: No, score=-1.9 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, DKIM_SIGNED=0.1, DKIM_VALID=-0.1, HTML_MESSAGE=0.001, RCVD_IN_DNSWL_NONE=-0.0001, SPF_PASS=-0.001] autolearn=ham autolearn_force=no
Authentication-Results: ietfa.amsl.com (amavisd-new); dkim=pass (2048-bit key) header.d=fugue-com.20150623.gappssmtp.com
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id NdCATLOC561m for <homenet@ietfa.amsl.com>; Sun, 13 Aug 2017 07:48:51 -0700 (PDT)
Received: from mail-qt0-x235.google.com (mail-qt0-x235.google.com [IPv6:2607:f8b0:400d:c0d::235]) (using TLSv1.2 with cipher ECDHE-RSA-AES128-GCM-SHA256 (128/128 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id 22862132655 for <homenet@ietf.org>; Sun, 13 Aug 2017 07:48:51 -0700 (PDT)
Received: by mail-qt0-x235.google.com with SMTP id p3so41395407qtg.2 for <homenet@ietf.org>; Sun, 13 Aug 2017 07:48:50 -0700 (PDT)
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=fugue-com.20150623.gappssmtp.com; s=20150623; h=from:message-id:mime-version:subject:date:in-reply-to:cc:to :references; bh=JhU7nlFtwmko+82aqNw3xJ8freWOCBq4iF0BocTUNAI=; b=k5ZxnxPKt8GYr7twenvQ7Dowa7KEiqIaCci/38bqxJzqnRruYbyBD1Ya/PPzl8xmGv G60QtKquIh/Q0A8pOXlkplpC9AgxV0GQv9FZp76NksFnJ12lilkb+SDdMe/wCkpXA4GY KUauucfkW4Ct6DR1RnNmSWV7ZijZLleMMDjdo853wXj0DpDg4M3S0yzRtMi7hlSpf44D FLwPmNxJYgMrILczxA4lT4ZkOGMJGOucnqBBII7LxnuBECbk7o4VEAmDPoFJqPnMSR73 muS73k4G543fuySvgBnP/a8wh0/bOZZtazhOP0yEq+jAVSTRymDjH3MvykfkElu8zN6y c3Cg==
X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20161025; h=x-gm-message-state:from:message-id:mime-version:subject:date :in-reply-to:cc:to:references; bh=JhU7nlFtwmko+82aqNw3xJ8freWOCBq4iF0BocTUNAI=; b=V35NMiBw18kWwErMCFvESMXX2SkTveHuEdnB9/7gazeSpRfraGmfaN6/L6r2+brIKM DpW9WtWravpwJStBviTZLgoI2lAnz62Ex07dgQ3aejVH0SwuZBxSjuYKCZnHPbPIB4q+ dFh6rGRjZiC5hEk4T3SIJRlfxDH+L+/EXeH3S9vpHV2jwccPxvYiWKIKG4IhBqmrgaWC /gSHgI2rI1WzqbXtV1IR+dqQ0fRi3creHP3IM70edgKZXV5iw3pwGoX9qt7BIbBYI804 tuMPH5/D4tg6b8LImGqmj4paUmlH00OpgTP1C54djW+D4LjTRAwKQWhphHLvMGqjX4vg 8lYQ==
X-Gm-Message-State: AHYfb5hNU0n0ER/KtugJhj9tNJOc/6p6HMmaaGIDJGp7y/buwx/VFyIK 5XUmEnBGrigvAmWnX74AhQ==
X-Received: by 10.200.8.20 with SMTP id u20mr28968841qth.287.1502635730105; Sun, 13 Aug 2017 07:48:50 -0700 (PDT)
Received: from [10.0.30.153] (c-73-167-64-188.hsd1.ma.comcast.net. [73.167.64.188]) by smtp.gmail.com with ESMTPSA id n69sm3500528qke.52.2017.08.13.07.48.48 (version=TLS1_2 cipher=ECDHE-RSA-AES128-GCM-SHA256 bits=128/128); Sun, 13 Aug 2017 07:48:49 -0700 (PDT)
From: Ted Lemon <mellon@fugue.com>
Message-Id: <FCAD81FA-BBA0-45B0-8F1F-D1D5FD010484@fugue.com>
Content-Type: multipart/alternative; boundary="Apple-Mail=_B452ED6C-4B25-463C-9624-2A26E42992E6"
Mime-Version: 1.0 (Mac OS X Mail 10.3 \(3273\))
Date: Sun, 13 Aug 2017 10:48:47 -0400
In-Reply-To: <87valry4o7.fsf@toke.dk>
Cc: Juliusz Chroboczek <jch@irif.fr>, HOMENET <homenet@ietf.org>
To: Toke Høiland-Jørgensen <toke@toke.dk>
References: <2D09D61DDFA73D4C884805CC7865E6114DBF5904@GAALPA1MSGUSRBF.ITServices.sbc.com> <20170810203843.xq7wxdxp27vqt4pz@mx4.yitter.info> <87wp6byvw5.fsf@toke.dk> <A9C8CA05-54A0-4160-B2F0-645744BD259E@fugue.com> <87poc3yt3d.fsf@toke.dk> <22E4B7B8-317F-4CBB-8536-D0AB345B0837@fugue.com> <87h8xez9ys.fsf@toke.dk> <CAPt1N1m+218+FX_G+2W-msDWmxP8XXMKF9S0faTeCBnEEzk1uw@mail.gmail.com> <877eyaz2jm.fsf@toke.dk> <CAPt1N1m5nVGD-y2VrbkoTEPTs4qF98oRxGuvd-Has1yzuS0fmg@mail.gmail.com> <874ltez1wg.fsf@toke.dk> <7E8390B5-9048-4783-B17F-6C9EA5610887@fugue.com> <7ivalujdfu.wl-jch@irif.fr> <15F1CE39-82EE-4B0D-A31B-2C1805991541@fugue.com> <871sofzqma.fsf@toke.dk> <CAPt1N1=oiU+DbjD6izOBNJOnC25d=-S3ARqFxydRfWLEet5mEQ@mail.gmail.com> <87valry4o7.fsf@toke.dk>
X-Mailer: Apple Mail (2.3273)
Archived-At: <https://mailarchive.ietf.org/arch/msg/homenet/uXEUm1pRl5mTbAl2-XFl-CgKe9w>
Subject: Re: [homenet] Status of draft-tldm-simple-homenet-naming CFA
X-BeenThere: homenet@ietf.org
X-Mailman-Version: 2.1.22
Precedence: list
List-Id: IETF Homenet WG mailing list <homenet.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/homenet>, <mailto:homenet-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/homenet/>
List-Post: <mailto:homenet@ietf.org>
List-Help: <mailto:homenet-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/homenet>, <mailto:homenet-request@ietf.org?subject=subscribe>
X-List-Received-Date: Sun, 13 Aug 2017 14:48:53 -0000

El 13 ag 2017, a les 9:32, Toke Høiland-Jørgensen <toke@toke.dk> va escriure:
> Sure. I'm just not sure I agree that MPvD shouldn't also be on the "nice
> to have" list, rather than the "absolutely required" list.

Why do you think CDNs exist?   What would happen if every home network suddenly stopped using the technology that makes CDNs work?   You mentioned that you don't use it, and your Netflix works fine, and that's my experience too (I have the same configuration).   But if everybody did that, I think it would not work fine, and that's why we should make sure that out of the box, by default, it works correctly.   We want users of homenet to have a good experience, and to be able to tune their experience if they want non-default behavior.

> Perhaps it would help if you could explain (a) the details of "the CDN
> problem" (what mechanism is used to determine answers for a given
> prefix, and what is the failure mode if the wrong address is used?), and
> (b) how the client is supposed to actually work with this mechanism
> (seems to me an unmodified client will probably make a mess of things?).

The idea with CDNs is that you put the content close to the edge and give different answers using DNS or HTTP depending on where the client is.   By doing this, you can balance the load across the right number of servers in the right data centers, and avoid transporting the same traffic over the backbone many times.

> As for an "ideal" resolver behaviour, to me that would be full recursive
> resolution from the root inside the home, replicating all queries across
> all upstreams and picking the best reply (best being something like
> "first reply that passes DNSSEC validation"). With an "advanced
> configuration" option somewhere that allows the user to override
> arbitrary names/zones as they see fit.

This is mostly what the MPvD solution does (minus the override option, which I think is out of scope).   Queries are sent to all upstreams, and the good answer that arrives first is used.   What MPvD does _in addition_ is to make sure that if ISP A's answer is chosen, then ISP A's connection is used to connect to the destination.

MPvD also accounts for the fact that this connection might not work.   It isn't good enough to just select whichever DNS answer comes back first, because that answer may not actually result in establishment of a successful connection.   So ideally you try both connections, either simultaneously or else according to some algorithm that optimises for which connection is preferred.

For example, if you really, really want to use connection A, then you only try connection B if you don't have a successful connection established after 30 seconds, but if you don't care, then you try both nearly simultaneously and take the first one to succeed to the point where you have completed the https handshake (for example) and validated the cert using PKI validation.

You may also want to configure things so that you have a primary and a backup connection, and your backup connection is never used for certain things, or only used for certain things.   E.g., if your backup is a cell phone backup that costs more per megabyte, or has a lower data cap.   Or in some cases just the opposite.   This is useful for situations where you want to be able to have dual-homing for the sake of IoT six-sigma reliability, but don't want to use the backup link for anything else, because it's expensive.

Now, as for the "mostly" above, the problem with what you've said is that it doesn't scale: if every home does full recursion, that's a much larger load on authoritative name servers than currently exists.   There's a reason why that's not how things are done now.   If we were to specify this behaviour, there would be substantial pushback from dnsop, and I would be participating in that pushback.   I don't think this would get IETF consensus.   This is not to say that you are wrong, but the point is that this is the wrong working group in which to have that argument.