Re: ietf.org end-to-end principle

Eliot Lear <lear@cisco.com> Thu, 17 March 2016 21:45 UTC

Return-Path: <lear@cisco.com>
X-Original-To: ietf@ietfa.amsl.com
Delivered-To: ietf@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 4F2B312D8D8 for <ietf@ietfa.amsl.com>; Thu, 17 Mar 2016 14:45:52 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -14.522
X-Spam-Level:
X-Spam-Status: No, score=-14.522 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, DKIM_SIGNED=0.1, DKIM_VALID=-0.1, DKIM_VALID_AU=-0.1, RCVD_IN_DNSWL_HI=-5, RCVD_IN_MSPIKE_H3=-0.01, RCVD_IN_MSPIKE_WL=-0.01, RP_MATCHES_RCVD=-0.001, SPF_PASS=-0.001, USER_IN_DEF_DKIM_WL=-7.5] autolearn=ham autolearn_force=no
Authentication-Results: ietfa.amsl.com (amavisd-new); dkim=pass (1024-bit key) header.d=cisco.com
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id BKhEEmrfJpu7 for <ietf@ietfa.amsl.com>; Thu, 17 Mar 2016 14:45:50 -0700 (PDT)
Received: from aer-iport-4.cisco.com (aer-iport-4.cisco.com [173.38.203.54]) (using TLSv1.2 with cipher DHE-RSA-SEED-SHA (128/128 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id 3078512D8CA for <ietf@ietf.org>; Thu, 17 Mar 2016 14:45:50 -0700 (PDT)
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/simple; d=cisco.com; i=@cisco.com; l=4447; q=dns/txt; s=iport; t=1458251150; x=1459460750; h=subject:to:references:from:message-id:date:mime-version: in-reply-to; bh=8qbBdItlj022qN3O3OtmEXc0K2uQ5l5nWSQvGqu55Rc=; b=g/Fw1L1Pg+eBK5Z7arxA8IjReHibWb8FkfwaUOB8GucTLL8gL5g1yiOj 4ZdpkS685kq0K0WGeuvkqF3dwHmYmTBmGLps6nD35C063CIRBUBMtOGcC tVPKuqWhlwFdVe5CaI7bth+z/zzUOjfvooI+zTgmkyHZO5DnTkmkLbERy k=;
X-Files: signature.asc : 481
X-IronPort-Anti-Spam-Filtered: true
X-IronPort-Anti-Spam-Result: A0CrBAA1JetW/xbLJq1ehBhuvAQZhXQCggcBAQEBAQFlJ4RBAQEBAwEjVQYLCxgJFgsCAgkDAgECAUUGAQwIAQGIGwiyAY9UAQEBAQEBBAEBAQEBARIIiWN/hzyBOgWXVIMcgWZtiBKCMIcChVSPA2KDZjsuimMBAQE
X-IronPort-AV: E=Sophos;i="5.24,351,1454976000"; d="asc'?scan'208";a="636351050"
Received: from aer-iport-nat.cisco.com (HELO aer-core-1.cisco.com) ([173.38.203.22]) by aer-iport-4.cisco.com with ESMTP/TLS/DHE-RSA-AES256-GCM-SHA384; 17 Mar 2016 21:45:35 +0000
Received: from [10.61.76.113] (ams3-vpn-dhcp3185.cisco.com [10.61.76.113]) by aer-core-1.cisco.com (8.14.5/8.14.5) with ESMTP id u2HLjM4L003395; Thu, 17 Mar 2016 21:45:28 GMT
Subject: Re: ietf.org end-to-end principle
To: Melinda Shore <melinda.shore@gmail.com>, ietf@ietf.org
References: <56E90BF9.4090306@cisco.com> <871189680.1322359.1458113811142.JavaMail.yahoo@mail.yahoo.com> <CAHw9_i+yFhJVYvcMLSEgkOkqJjZBsQicCQsi13SaoVQuzxqc8g@mail.gmail.com> <5D6893D1-D61C-490C-91EF-CA5E5C1F484A@piuha.net> <56EA63E3.2070602@restena.lu> <VI1PR07MB15815DEAB1939141F0DCCCF3BC8B0@VI1PR07MB1581.eurprd07.prod.outlook.com> <56EA82FC.5050400@restena.lu> <6D32668528F93D449A073F45707153D8BEC8C8FA@US70UWXCHMBA03.zam.alcatel-lucent.com> <50BC4E4E-822F-4E2F-8F0F-ABE48A5E49E8@telefonica.com> <56EA8908.5050109@cs.tcd.ie> <56EAE74E.70004@gmail.com>
From: Eliot Lear <lear@cisco.com>
Message-ID: <56EB2568.3000801@cisco.com>
Date: Thu, 17 Mar 2016 22:45:12 +0100
User-Agent: Mozilla/5.0 (Macintosh; Intel Mac OS X 10.11; rv:38.0) Gecko/20100101 Thunderbird/38.6.0
MIME-Version: 1.0
In-Reply-To: <56EAE74E.70004@gmail.com>
Content-Type: multipart/signed; micalg="pgp-sha256"; protocol="application/pgp-signature"; boundary="QOmu3hANKwjQJoF8nnoe67NawtFvDM06E"
Archived-At: <http://mailarchive.ietf.org/arch/msg/ietf/P9z3AeHVUHFtBvR8q23VIbw2AzE>
X-BeenThere: ietf@ietf.org
X-Mailman-Version: 2.1.17
Precedence: list
List-Id: IETF-Discussion <ietf.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/ietf>, <mailto:ietf-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/ietf/>
List-Post: <mailto:ietf@ietf.org>
List-Help: <mailto:ietf-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/ietf>, <mailto:ietf-request@ietf.org?subject=subscribe>
X-List-Received-Date: Thu, 17 Mar 2016 21:45:52 -0000


On 3/17/16 6:20 PM, Melinda Shore wrote:
> On 3/17/16 2:38 AM, Stephen Farrell wrote:
>> I always think of it as the end to end argument, not principle,
>> and from that perspective, I think it remains entirely applicable.
>
> Yes, I do as well, but the IETF has not always responded
> pragmatically to the ways networks are being deployed today
> (and "cloud to cloud" isn't the issue).  

I started thinking it was an argument, and then John Wroclawski
forcefully corrected me.  My view these days is that it is an efficiency
principle.  It's not that nothing happens in the middle, but rather that
things must go where they are most efficiently deployed from a systemic
perspective.  Where is it necessary to implement something in the
middle, such as perhaps an IGP or a BGP, there's nothing wrong with
that.  Similarly, DDOS protection is best done as close to the source. 
If that's the network, so long as it doesn't cause other failures,
great.  NAT has survived because by and large it hasn't so seriously
harmed end to end that the network couldn't be useful.  Though it
certainly has broken its fair share.  I think pseudo-SMTP aware firewall
may have done as much damage.

I view the Tor case as interesting because they're a bit of a hybrid. 
There's a bit of application and a bit of network.  The exit-node is
semantically aware of JSON but strips it out.  Interesting case study.

Eliot


> During the 90s,
> ideological purity on the part of a number of participants
> and at least one IESG member prevented us from responding
> well to the NAT situation.
>
> But here's a problem: ideological purity and adherence to
> good design principles tend to look like one another and I'm
> not sure that it's always possible to tell one from another
> except in hindsight.  Another problem is that sometimes the
> "right" way to solve a problem, at least within our framework,
> doesn't work well with network operators' business models.
>
> I do think that one way to start to address some of this is
> to reshape the way the organization is structured so being in
> a leadership role (that is to say, the ones most likely
> to be in position to block publication of a document they don't
> like and to charter new work) isn't a full-time job, so that
> people whose actual job it is to build networks, talk to
> customers, and so on are able to step into those positions.  I
> don't think that will fix the problem but I think it would be
> an incremental improvement.
>
> Melinda
>
>