Time to kill layer 2

Phillip Hallam-Baker <phill@hallambaker.com> Thu, 14 April 2016 12:59 UTC

Return-Path: <hallam@gmail.com>
X-Original-To: ietf@ietfa.amsl.com
Delivered-To: ietf@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 64CE512DBD6 for <ietf@ietfa.amsl.com>; Thu, 14 Apr 2016 05:59:33 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -2.4
X-Spam-Level:
X-Spam-Status: No, score=-2.4 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, DKIM_SIGNED=0.1, DKIM_VALID=-0.1, FREEMAIL_FORGED_FROMDOMAIN=0.199, FREEMAIL_FROM=0.001, HEADER_FROM_DIFFERENT_DOMAINS=0.001, RCVD_IN_DNSWL_LOW=-0.7, SPF_PASS=-0.001] autolearn=ham autolearn_force=no
Authentication-Results: ietfa.amsl.com (amavisd-new); dkim=pass (2048-bit key) header.d=gmail.com
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id dnEsZqDBHjGl for <ietf@ietfa.amsl.com>; Thu, 14 Apr 2016 05:59:31 -0700 (PDT)
Received: from mail-lf0-x22f.google.com (mail-lf0-x22f.google.com [IPv6:2a00:1450:4010:c07::22f]) (using TLSv1.2 with cipher ECDHE-RSA-AES128-GCM-SHA256 (128/128 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id 88ACE12D958 for <ietf@ietf.org>; Thu, 14 Apr 2016 05:59:31 -0700 (PDT)
Received: by mail-lf0-x22f.google.com with SMTP id c126so107629780lfb.2 for <ietf@ietf.org>; Thu, 14 Apr 2016 05:59:31 -0700 (PDT)
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=gmail.com; s=20120113; h=mime-version:sender:date:message-id:subject:from:to; bh=SsRrOaEtBjHL9L3Ci/PZE1DUVB0L/AOOF9hasUC4nJI=; b=tjbLWNLk6RVOzM4sE4Rt53DXg1u/sKbm1WfvbKeqeYkgmyMyLDkcoWFYLH2Ae10dWf cAYIE7BA0RnXoDsFffEMoiEgoLdsxTbOTnnahJsSWHTnKAd1MhD7kvF14dFuBKBnIJ4Z nO+pnf46/n/yfxG56GpQF2Rk464eHbFWkMAY8GsixqilRVwkyV8rSHx15EJ60HrGxSye RJsoTjJmGP6PAbVQWj8/DzUNMcjV9rDvoXk9A3nzxqCV7CViYcnYOqZv5kaauWGgrzLa 5Kt2PLHDu0Lkg6fdkQoGNjr140H30eovQJ//0tAUU9jNsyZYuvayQGRIEmT7V+CHOQnl zogg==
X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20130820; h=x-gm-message-state:mime-version:sender:date:message-id:subject:from :to; bh=SsRrOaEtBjHL9L3Ci/PZE1DUVB0L/AOOF9hasUC4nJI=; b=Z7IIhm78Wfz16kw9yM2IAmNiocP29aoixXPJYOPod/m8oetoUXyPse5nVtREr75Z3C w5JsOnmaN1hH2pYzUuEM1IxUni8Wp3/n/43D9ETdoipg6sjVzYfnp8clgq5m5ZjvejPg m74zNRigAInEAua3YrxWZCYJsM405opPa9lUKf1YX7R7vUCA60mrS+Ws1mKgD9VqJqiL yVaewJkJ/y8/sBDW6dj9ahWpnEGviSfIjrs9pUkzDBOlnnm8NPTr1F02J54Wn5xrxZqG RIA5k1uNSsvU8RryZMd+2uA6CJEng8PzgN6Ue6wBo9tpM7rT3IGSHJ//LK3Zm0VflO4d iO/w==
X-Gm-Message-State: AOPr4FWh8Nr5lBdyqwONBcScHHSsIYW3YfGRAXBMD1EhO5a8hggb9zkWgSvUeTh56cllW/gQaa91JhnfAfnWVg==
MIME-Version: 1.0
X-Received: by 10.25.138.7 with SMTP id m7mr1651361lfd.153.1460638769675; Thu, 14 Apr 2016 05:59:29 -0700 (PDT)
Sender: hallam@gmail.com
Received: by 10.112.151.67 with HTTP; Thu, 14 Apr 2016 05:59:29 -0700 (PDT)
Date: Thu, 14 Apr 2016 08:59:29 -0400
X-Google-Sender-Auth: ZIPV55bNf64vnvy6YI_itmMkw5c
Message-ID: <CAMm+Lwg-HTYCv2pGt=SP2+Xjoko6GcJ73kVzqXC1LBTOMDKV_A@mail.gmail.com>
Subject: Time to kill layer 2
From: Phillip Hallam-Baker <phill@hallambaker.com>
To: IETF Discussion Mailing List <ietf@ietf.org>
Content-Type: text/plain; charset="UTF-8"
Archived-At: <http://mailarchive.ietf.org/arch/msg/ietf/0VNcRVSkPTiaR2ljNN-kskkpjQE>
X-BeenThere: ietf@ietf.org
X-Mailman-Version: 2.1.17
Precedence: list
List-Id: IETF-Discussion <ietf.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/ietf>, <mailto:ietf-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/ietf/>
List-Post: <mailto:ietf@ietf.org>
List-Help: <mailto:ietf-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/ietf>, <mailto:ietf-request@ietf.org?subject=subscribe>
X-List-Received-Date: Thu, 14 Apr 2016 12:59:33 -0000

This morning I spent an hour debugging the network to print out two
class projects that were due. Some points:

1) My ability to debug the network is better than 99% of the population
2) The interaction of Bonjour, DHCP and auto power saving is unfortunate
3) Things should still work after I have been away for a week
4) If vendors want to be selling all that IoT gear, they have to solve
these issues.

5) I want someone to blame. Right now when the network doesn't work, I
don't know who is the cause. I want one point of contact. Whoever is
that point of contact will get most of my networking money.


One of the biggest headaches in debugging is that 'smart hubs' are
not. They are actually very stupid. They make assumptions of network
topology that are not true. Another is the unfortunate implementation
of DHCP.

I don't use SNMP for a simple reason - it is not available to most
ordinary people. I want to understand networking for the 99%, not the
IETF 1%-ers.

All this networking gear is presented to me as black boxes over which
I have absolutely no control (which is fine-ish) and no visibility.

What we have today is the product of a historical process. I remember
the days when Ethernet ran on 10BaseT. But I installed my first switch
30 years ago and it has been a switched protocol for 20 years now.


It seems to me that there is a business opportunity for any vendor who
takes the rather obvious step of simplifying the system.

People talk about 'IP everywhere' and 'IP end-to-end' which is rather
odd when you think about the fact that virtually every local network
uses MAC addresses for routing.

One of the reasons that IP won against OSI was that it was simpler.
Applications ran on top of the IP layer with only TCP inbetween. Of
course these days we do have a Presentation layer, Web Services run on
HTTP. But unlike the OSI presentation layer, ours does not introduce
extra moving parts.

It seems to me that if we really believed in IP everywhere and IP
end-to-end we would insist that network switches be IP routers that
can be managed using BGP/OSPF or at least routing tables rather than
heuristic devices that try to guess where packets should go based on
goat entrails, phases of the moon or whatever they use.


What should have happened many moons ago was that DHCP should have
become a bidirectional protocol or a bootstrap to a bidirectional
protocol. So when a printer joins the network, it authenticates and
tells the network what it is. And this is all defined in one set of
specifications from one organization, none of which assumes that
security is an 'advanced', 'optional' or 'enterprise' feature.

Instead we have an ad-hoc layer trying to achieve the same result in
peer-to-peer fashion. A similar approach works for frogs as a
reproductive mechanism but only at the species level. It certainly
does not work for the individual ova which may or may not connect to
the printer it is trying to use to print the kids damned homework.


Seriously, the fact that things have scaled thus far and the 1% can
get them to work does not mean that we can get to the next level
without a serious rethink of the local network architecture.

The type of device I think we need would be first and foremost an IP
router. It would have ethernet plugs on the box and use ethernet layer
1 specs. But when a another 'True-IP' device was plugged in, it would
quickly negotiate a direct IP connection, oh and with proper 64KB
packets. It would also, authenticate, announce and turn on link layer
encryption.

Such a device would also be a legacy router. It would fake all the
signals necessary for a legacy ethernet device to function. It would
also be responsible for maintaining the local information for the
network service database and intercommunicating with other hubs to
achieve a global network view.


The net result of all this would be that I would never ever need to
install another printer (no, it is not actually necessary for every
stupid printer to have its own stupid printer driver). Opening the
'printers' folder would automatically show every printer that is on
the network or can be woken from slumber by the hub it connects to.