Re: Time to kill layer 2

Dimitri Staessens <dimitri.staessens@intec.ugent.be> Fri, 15 April 2016 06:55 UTC

Return-Path: <dimitri.staessens@intec.ugent.be>
X-Original-To: ietf@ietfa.amsl.com
Delivered-To: ietf@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 8720C12DFBE for <ietf@ietfa.amsl.com>; Thu, 14 Apr 2016 23:55:57 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -5.215
X-Spam-Level:
X-Spam-Status: No, score=-5.215 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, HTML_MESSAGE=0.001, RCVD_IN_DNSWL_MED=-2.3, RCVD_IN_MSPIKE_H3=-0.01, RCVD_IN_MSPIKE_WL=-0.01, RP_MATCHES_RCVD=-0.996] autolearn=ham autolearn_force=no
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id aVQfpvrxnGjl for <ietf@ietfa.amsl.com>; Thu, 14 Apr 2016 23:55:55 -0700 (PDT)
Received: from smtp2.ugent.be (smtp2.ugent.be [157.193.49.126]) (using TLSv1 with cipher ADH-AES256-SHA (256/256 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id C28B612DF7F for <ietf@ietf.org>; Thu, 14 Apr 2016 23:55:54 -0700 (PDT)
Received: from localhost (mcheck3.ugent.be [157.193.71.89]) by smtp2.ugent.be (Postfix) with ESMTP id 9015212C267 for <ietf@ietf.org>; Fri, 15 Apr 2016 08:55:53 +0200 (CEST)
X-Virus-Scanned: by UGent DICT
Received: from smtp2.ugent.be ([IPv6:::ffff:157.193.49.126]) by localhost (mcheck3.UGent.be [::ffff:157.193.43.11]) (amavisd-new, port 10024) with ESMTP id ixWD16EHv8g2 for <ietf@ietf.org>; Fri, 15 Apr 2016 08:55:52 +0200 (CEST)
Received: from mail2.intec.ugent.be (mail2.intec.ugent.be [157.193.214.245]) by smtp2.ugent.be (Postfix) with ESMTP id 0112212C25D for <ietf@ietf.org>; Fri, 15 Apr 2016 08:55:51 +0200 (CEST)
Received: from localhost (localhost [127.0.0.1]) by mail2.intec.ugent.be (Postfix) with ESMTP id 5D9272D for <ietf@ietf.org>; Fri, 15 Apr 2016 08:55:51 +0200 (CEST)
X-Virus-Scanned: Debian amavisd-new at intec.ugent.be
Received: from mail2.intec.ugent.be ([127.0.0.1]) by localhost (mail2.intec.ugent.be [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id uGDx3AFIPfvu for <ietf@ietf.org>; Fri, 15 Apr 2016 08:55:51 +0200 (CEST)
Received: from [192.168.66.170] (78-22-161-144.access.telenet.be [78.22.161.144]) (using TLSv1 with cipher ECDHE-RSA-AES128-SHA (128/128 bits)) (No client certificate requested) (Authenticated sender: dstaesse) by mail2.intec.ugent.be (Postfix) with ESMTPSA id BD7D22C for <ietf@ietf.org>; Fri, 15 Apr 2016 08:55:50 +0200 (CEST)
Subject: Re: Time to kill layer 2
To: ietf@ietf.org
References: <CAMm+Lwg-HTYCv2pGt=SP2+Xjoko6GcJ73kVzqXC1LBTOMDKV_A@mail.gmail.com> <571011B2.9080003@intec.ugent.be> <CAPt1N1m71Vx6LX-dTuHVoYfZG_X7wykax2QMteqFjcsRt+RThw@mail.gmail.com> <57105657.80006@gmail.com> <5710604a.4d40620a.1fffb.ffffd647@mx.google.com> <57108BF3.4030608@intec.ugent.be>
From: Dimitri Staessens <dimitri.staessens@intec.ugent.be>
Message-ID: <5710906A.3050608@intec.ugent.be>
Date: Fri, 15 Apr 2016 08:55:38 +0200
User-Agent: Mozilla/5.0 (X11; Linux x86_64; rv:38.0) Gecko/20100101 Thunderbird/38.7.2
MIME-Version: 1.0
In-Reply-To: <57108BF3.4030608@intec.ugent.be>
Content-Type: multipart/alternative; boundary="------------070709050401090503020400"
X-Miltered: at jchkm1 with ID 57109077.000 by Joe's j-chkmail (http://helpdesk.ugent.be/email/)!
X-j-chkmail-Enveloppe: 57109077.000 from mail2.intec.ugent.be/mail2.intec.ugent.be/157.193.214.245/mail2.intec.ugent.be/<dimitri.staessens@intec.ugent.be>
X-j-chkmail-Score: MSGID : 57109077.000 on smtp2.ugent.be : j-chkmail score : . : R=. U=. O=. B=0.000 -> S=0.000
X-j-chkmail-Status: Ham
Archived-At: <http://mailarchive.ietf.org/arch/msg/ietf/8XNxqo7n35nS2DLQZc_QYNXs8kQ>
X-BeenThere: ietf@ietf.org
X-Mailman-Version: 2.1.17
Precedence: list
List-Id: IETF-Discussion <ietf.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/ietf>, <mailto:ietf-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/ietf/>
List-Post: <mailto:ietf@ietf.org>
List-Help: <mailto:ietf-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/ietf>, <mailto:ietf-request@ietf.org?subject=subscribe>
X-List-Received-Date: Fri, 15 Apr 2016 06:55:57 -0000

Upss. I meant Layer 4 of course ;)

On 04/15/16 08:36, Dimitri Staessens wrote:
> If you killed the user, Layer 3 would stop working...
>
> On 04/15/16 05:30, Chaitanya D wrote:
>>
>> The BOFH way - kill the user and let the network be.... ;)
>>
>> Kidding of course
>>
>>
>> *From: *Carlos M. Martinez
>> *Sent: *15 April 2016 08:18
>> *To: *Ted Lemon;Dimitri Staessens
>> *Cc: *ietf
>> *Subject: *Re: Time to kill layer 2
>>
>> All the way up to the user ? Many times.
>>
>> On 4/14/16 6:56 PM, Ted Lemon wrote:
>>
>> > Of course!
>>
>> >
>>
>> > On Thu, Apr 14, 2016 at 5:54 PM, Dimitri Staessens
>>
>> > <dimitri.staessens@intec.ugent.be
>>
>> > <mailto:dimitri.staessens@intec.ugent.be>> wrote:
>>
>> >
>>
>> >     anyone thought of killing everything on top of layer 2?
>>
>> >
>>
>> >
>>
>> >     On 04/14/16 14:59, Phillip Hallam-Baker wrote:
>>
>> >
>>
>> >         This morning I spent an hour debugging the network to print 
>> out two
>>
>> >         class projects that were due. Some points:
>>
>> >
>>
>> >         1) My ability to debug the network is better than 99% of the
>>
>> >         population
>>
>> >         2) The interaction of Bonjour, DHCP and auto power saving is
>>
>> >         unfortunate
>>
>> >         3) Things should still work after I have been away for a week
>>
>> >         4) If vendors want to be selling all that IoT gear, they 
>> have to
>>
>> >         solve
>>
>> >         these issues.
>>
>> >
>>
>> >         5) I want someone to blame. Right now when the network doesn't
>>
>> >         work, I
>>
>> >         don't know who is the cause. I want one point of contact. 
>> Whoever is
>>
>> >         that point of contact will get most of my networking money.
>>
>> >
>>
>> >
>>
>> >         One of the biggest headaches in debugging is that 'smart 
>> hubs' are
>>
>> >         not. They are actually very stupid. They make assumptions 
>> of network
>>
>> >         topology that are not true. Another is the unfortunate
>>
>> >         implementation
>>
>> >         of DHCP.
>>
>> >
>>
>> >         I don't use SNMP for a simple reason - it is not available 
>> to most
>>
>> >         ordinary people. I want to understand networking for the 99%,
>>
>> >         not the
>>
>> >         IETF 1%-ers.
>>
>> >
>>
>> >         All this networking gear is presented to me as black boxes over
>>
>> >         which
>>
>> >         I have absolutely no control (which is fine-ish) and no 
>> visibility.
>>
>> >
>>
>> >         What we have today is the product of a historical process. I
>>
>> >         remember
>>
>> >         the days when Ethernet ran on 10BaseT. But I installed my first
>>
>> >         switch
>>
>> >         30 years ago and it has been a switched protocol for 20 
>> years now.
>>
>> >
>>
>> >
>>
>> >         It seems to me that there is a business opportunity for any
>>
>> >         vendor who
>>
>> >         takes the rather obvious step of simplifying the system.
>>
>> >
>>
>> >         People talk about 'IP everywhere' and 'IP end-to-end' which is
>>
>> >         rather
>>
>> >         odd when you think about the fact that virtually every 
>> local network
>>
>> >         uses MAC addresses for routing.
>>
>> >
>>
>> >         One of the reasons that IP won against OSI was that it was 
>> simpler.
>>
>> >         Applications ran on top of the IP layer with only TCP 
>> inbetween. Of
>>
>> >         course these days we do have a Presentation layer, Web Services
>>
>> >         run on
>>
>> >         HTTP. But unlike the OSI presentation layer, ours does not 
>> introduce
>>
>> >         extra moving parts.
>>
>> >
>>
>> >         It seems to me that if we really believed in IP everywhere 
>> and IP
>>
>> >         end-to-end we would insist that network switches be IP 
>> routers that
>>
>> >         can be managed using BGP/OSPF or at least routing tables 
>> rather than
>>
>> >         heuristic devices that try to guess where packets should go 
>> based on
>>
>> >         goat entrails, phases of the moon or whatever they use.
>>
>> >
>>
>> >
>>
>> >         What should have happened many moons ago was that DHCP 
>> should have
>>
>> >         become a bidirectional protocol or a bootstrap to a 
>> bidirectional
>>
>> >         protocol. So when a printer joins the network, it 
>> authenticates and
>>
>> >         tells the network what it is. And this is all defined in 
>> one set of
>>
>> >         specifications from one organization, none of which assumes 
>> that
>>
>> >         security is an 'advanced', 'optional' or 'enterprise' feature.
>>
>> >
>>
>> >         Instead we have an ad-hoc layer trying to achieve the same 
>> result in
>>
>> >         peer-to-peer fashion. A similar approach works for frogs as a
>>
>> >         reproductive mechanism but only at the species level. It 
>> certainly
>>
>> >         does not work for the individual ova which may or may not 
>> connect to
>>
>> >         the printer it is trying to use to print the kids damned 
>> homework.
>>
>> >
>>
>> >
>>
>> >         Seriously, the fact that things have scaled thus far and 
>> the 1% can
>>
>> >         get them to work does not mean that we can get to the next 
>> level
>>
>> >         without a serious rethink of the local network architecture.
>>
>> >
>>
>> >         The type of device I think we need would be first and 
>> foremost an IP
>>
>> >         router. It would have ethernet plugs on the box and use 
>> ethernet
>>
>> >         layer
>>
>> >         1 specs. But when a another 'True-IP' device was plugged in, it
>>
>> >         would
>>
>> >         quickly negotiate a direct IP connection, oh and with 
>> proper 64KB
>>
>> >         packets. It would also, authenticate, announce and turn on link
>>
>> >         layer
>>
>> >         encryption.
>>
>> >
>>
>> >         Such a device would also be a legacy router. It would fake 
>> all the
>>
>> >         signals necessary for a legacy ethernet device to function. 
>> It would
>>
>> >         also be responsible for maintaining the local information 
>> for the
>>
>> >         network service database and intercommunicating with other 
>> hubs to
>>
>> >         achieve a global network view.
>>
>> >
>>
>> >
>>
>> >         The net result of all this would be that I would never ever 
>> need to
>>
>> >         install another printer (no, it is not actually necessary 
>> for every
>>
>> >         stupid printer to have its own stupid printer driver). 
>> Opening the
>>
>> >         'printers' folder would automatically show every printer 
>> that is on
>>
>> >         the network or can be woken from slumber by the hub it 
>> connects to.
>>
>> >
>>
>> >
>>
>> >
>>
>