Re: [i2rs] Call for Adoption by WG: draft-atlas-i2rs-architecture-01 (ends Aug 12)

"Carlos Pignataro (cpignata)" <cpignata@cisco.com> Wed, 14 August 2013 18:12 UTC

Return-Path: <cpignata@cisco.com>
X-Original-To: i2rs@ietfa.amsl.com
Delivered-To: i2rs@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 725FD11E8189 for <i2rs@ietfa.amsl.com>; Wed, 14 Aug 2013 11:12:46 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -110.299
X-Spam-Level:
X-Spam-Status: No, score=-110.299 tagged_above=-999 required=5 tests=[AWL=-0.300, BAYES_00=-2.599, J_CHICKENPOX_15=0.6, RCVD_IN_DNSWL_HI=-8, USER_IN_WHITELIST=-100]
Received: from mail.ietf.org ([12.22.58.30]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id Xfbh0OStqubD for <i2rs@ietfa.amsl.com>; Wed, 14 Aug 2013 11:12:41 -0700 (PDT)
Received: from rcdn-iport-2.cisco.com (rcdn-iport-2.cisco.com [173.37.86.73]) by ietfa.amsl.com (Postfix) with ESMTP id 5FF4C11E8187 for <i2rs@ietf.org>; Wed, 14 Aug 2013 11:12:41 -0700 (PDT)
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/simple; d=cisco.com; i=@cisco.com; l=5410; q=dns/txt; s=iport; t=1376503961; x=1377713561; h=from:to:cc:subject:date:message-id:references: in-reply-to:mime-version; bh=Np3sDXNzbFXDbwOZqJ9nCARSJ0ULB3aH+m49kXoDY+U=; b=hU2gGbUUt2EQTYq+hCfwVcBu5SQbQYWieL5REm20M5ALEgTrBCnW8viU W8bTqda+DrQsfD8T4q/y8Y2faNcmDLAHTa7PFkqZyEKCbvppTYevLSjcH 27KAYIo4EO+9qmUYY8qi8WehVceSsgmSvwfvDw7E7NUfU/6Ac7kJ4npTm 4=;
X-Files: signature.asc : 203
X-IronPort-Anti-Spam-Filtered: true
X-IronPort-Anti-Spam-Result: AiIFAJTHC1KtJXHA/2dsb2JhbABRAQmDBjVQvmSBJBZ0giQBAQEDAQEBARpRCwUHBAIBCBIDAQIKJCEGCxcOAgQOAwIIBodwAwkGDKtNhDgNiFoEjVWBNAGBFTEHgxt3A5AWgS6EN44UhSeBYYE6QIFq
X-IronPort-AV: E=Sophos; i="4.89,878,1367971200"; d="asc'?scan'208"; a="247312229"
Received: from rcdn-core2-5.cisco.com ([173.37.113.192]) by rcdn-iport-2.cisco.com with ESMTP; 14 Aug 2013 18:12:39 +0000
Received: from xhc-rcd-x05.cisco.com (xhc-rcd-x05.cisco.com [173.37.183.79]) by rcdn-core2-5.cisco.com (8.14.5/8.14.5) with ESMTP id r7EICdp1027501 (version=TLSv1/SSLv3 cipher=AES128-SHA bits=128 verify=FAIL); Wed, 14 Aug 2013 18:12:39 GMT
Received: from xmb-aln-x02.cisco.com ([169.254.5.110]) by xhc-rcd-x05.cisco.com ([173.37.183.79]) with mapi id 14.02.0318.004; Wed, 14 Aug 2013 13:12:38 -0500
From: "Carlos Pignataro (cpignata)" <cpignata@cisco.com>
To: "Joel M. Halpern" <jmh@joelhalpern.com>
Thread-Topic: [i2rs] Call for Adoption by WG: draft-atlas-i2rs-architecture-01 (ends Aug 12)
Thread-Index: AQHOmNTIGXq8y8N2nUWzTz3+dH/OQ5mVVeEA
Date: Wed, 14 Aug 2013 18:12:37 +0000
Message-ID: <95067C434CE250468B77282634C96ED322E05EE8@xmb-aln-x02.cisco.com>
References: <CAG4d1rdDqdajvUeF4WwJ1Jwn_=xqOMkXrkWwCHtsdsZn6WKzRA@mail.gmail.com><51F8ED88.5050208@cisco.com> <CAG4d1rdBjyx2+jR5+Pc0RNsr_NSRLtrK6RaFgEqwvguHweZ0Cw@mail.gmail.com> <02fb01ce98d1$6a6c6ac0$4001a8c0@gateway.2wire.net> <520B54A2.1080107@joelhalpern.com>
In-Reply-To: <520B54A2.1080107@joelhalpern.com>
Accept-Language: en-US
Content-Language: en-US
X-MS-Has-Attach: yes
X-MS-TNEF-Correlator:
x-originating-ip: [10.117.115.50]
Content-Type: multipart/signed; boundary="Apple-Mail=_259C7F46-3592-4C90-875A-BA9D5C0D0FDC"; protocol="application/pgp-signature"; micalg="pgp-sha1"
MIME-Version: 1.0
Cc: "<i2rs@ietf.org>" <i2rs@ietf.org>, "Joe Clarke (jclarke)" <jclarke@cisco.com>, "t.petch" <ietfc@btconnect.com>, Alia Atlas <akatlas@gmail.com>
Subject: Re: [i2rs] Call for Adoption by WG: draft-atlas-i2rs-architecture-01 (ends Aug 12)
X-BeenThere: i2rs@ietf.org
X-Mailman-Version: 2.1.12
Precedence: list
List-Id: "Interface to The Internet Routing System \(IRS\)" <i2rs.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/i2rs>, <mailto:i2rs-request@ietf.org?subject=unsubscribe>
List-Archive: <http://www.ietf.org/mail-archive/web/i2rs>
List-Post: <mailto:i2rs@ietf.org>
List-Help: <mailto:i2rs-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/i2rs>, <mailto:i2rs-request@ietf.org?subject=subscribe>
X-List-Received-Date: Wed, 14 Aug 2013 18:12:46 -0000

Joel,

On Aug 14, 2013, at 5:57 AM, Joel M. Halpern <jmh@joelhalpern.com> wrote:

> The virtual router question is an interesting one.  I believe that the answer is "it depends".
> On the one hand there is a base device.  There may or may not need to be capability for I2RS access to that entity.

It seems to me that this is dependent on whether the device is part of the routing system -- not whether it is physical or virtual. Does it have a RIB, participates in routing, and an interface to routing? If the answer is yes, then I2RS needs access (whether the base device or an individual virtual one).

> Then there are the individual virtual routers.  My inclination would be to use separate I2RS clients, each with a separate I2RS identity and identifier.

I agree with this (assuming you meant to write "I2RS agent" or "I2RS server" instead of "I2RS client") -- basically, if it is a node in the topology, it needs its I2RS identity.

>  But there appears to be enough flexibility in the modeling that we are discussing that one could probably model it as one I2RS agent with various pieces and parts.  In which case that one agent has only one identity and one identifier.
> 

I think there's potentially more than this, namely: proposed I2RS topology information models support node aggregation / virtual topologies. Shouldn't each node at a different level of the hierarchy have its own identity (and identifier)?

Thanks,

-- Carlos.


> Yours,
> Joel
> 
> On 8/14/13 5:24 AM, t.petch wrote:
>> ----- Original Message -----
>> From: "Alia Atlas" <akatlas@gmail.com>
>> To: "Joe Marcus Clarke" <jclarke@cisco.com>
>> Cc: <i2rs@ietf.org>
>> Sent: Tuesday, August 13, 2013 9:01 PM
>> 
>> 
>>> Hi Joe,
>>> 
>>> Thanks for the detailed review and suggestions.  Responses are
>> in-line.
>>> 
>>> Alia
>>> 
>>> On Wed, Jul 31, 2013 at 6:57 AM, Joe Marcus Clarke
>> <jclarke@cisco.com>wrote:
>>> 
>> <snip>
>>>> Section 6.4:
>>>> 
>>>> Each I2RS Client will have an identity; it can also have secondary
>>>>    identities to be used for troubleshooting.
>>>> 
>>>> JMC: Each application will have a _unique_ identity.
>>>> 
>>> 
>>> [Alia] Hmm, this ties into the discussion about how we want to handle
>>> redundancy and recovery for clients.   It's also a bit of a
>> tautology - a
>>> client is solely identified by its identity.    I have changed it to
>> say
>>> that "Each I2RS Client will have a unique identity" - but  that just
>> helps
>>> clarify the intent.
>> 
>> I think that this nicely encapsulates a confusion between identity and
>> identifier.  Identifiers identify.  Objects, in a very generic sense,
>> have identity.  Thus if a human being is an instance of an object, they
>> may be identified, based on context, by SSN, passport number, name, name
>> and date of birth, cell phone number etc; all could be valid
>> identifiers: but equally, a cell phone number could be the identifier of
>> a cell phone, which is associated with a function and multiple people,
>> while the cell phone could also be identified by its IMEI so the
>> determination of what is an identity, may take some consideration.  This
>> is often critical in security; you have a secure channel but with what?
>> Is the identifier sufficient proof of the identity?
>> 
>> Working with routers, you usually have multiple identifiers; the SNMP
>> sysName is not (usually) the OSPF 32 bit router id, while the BGP
>> Identifier (note, identifier) is different again.
>> 
>> Identifiers exist within a namespace, with rules about syntax,
>> uniqueness and so on (even if this are not made explicit).
>> 
>> The revised I-D contains
>> " A secondary  identity is merely a unique, opaque identifier ..."
>> and
>> "An I2RS Client may supply a secondary opaque  identity .."
>> 
>> I think that most uses of the word "identity" in this I-D are actually
>> referring to "identifier" but at the same time, given that almost all
>> routers have multiple identifiers (as above), then this issue, of the
>> difference between identity and identifier needs making explicit in this
>> I-D.
>> 
>> Tom Petch
>> 
>> (p.s. if you have multiple virtual routers in one physical router, how
>> many identities are there? Discuss.)
>> 
>> 
>> _______________________________________________
>> i2rs mailing list
>> i2rs@ietf.org
>> https://www.ietf.org/mailman/listinfo/i2rs
>> 
> _______________________________________________
> i2rs mailing list
> i2rs@ietf.org
> https://www.ietf.org/mailman/listinfo/i2rs