Re: Call for Comments: Principles of Internet Host Configuration

Ted Hardie <hardie@qualcomm.com> Mon, 06 October 2008 15:26 UTC

Return-Path: <ietf-bounces@ietf.org>
X-Original-To: ietf-archive@megatron.ietf.org
Delivered-To: ietfarch-ietf-archive@core3.amsl.com
Received: from [127.0.0.1] (localhost [127.0.0.1]) by core3.amsl.com (Postfix) with ESMTP id CED0028C1D0; Mon, 6 Oct 2008 08:26:22 -0700 (PDT)
X-Original-To: ietf@core3.amsl.com
Delivered-To: ietf@core3.amsl.com
Received: from localhost (localhost [127.0.0.1]) by core3.amsl.com (Postfix) with ESMTP id A76D728C16A for <ietf@core3.amsl.com>; Mon, 6 Oct 2008 08:26:21 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -105.599
X-Spam-Level:
X-Spam-Status: No, score=-105.599 tagged_above=-999 required=5 tests=[AWL=1.000, BAYES_00=-2.599, RCVD_IN_DNSWL_MED=-4, USER_IN_WHITELIST=-100]
Received: from mail.ietf.org ([64.170.98.32]) by localhost (core3.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id uAUJi+kJXKYG; Mon, 6 Oct 2008 08:26:16 -0700 (PDT)
Received: from wolverine01.qualcomm.com (wolverine01.qualcomm.com [199.106.114.254]) by core3.amsl.com (Postfix) with ESMTP id A4A7A28C194; Mon, 6 Oct 2008 08:26:15 -0700 (PDT)
DKIM-Signature: v=1; a=rsa-sha256; c=simple/simple; d=qualcomm.com; i=hardie@qualcomm.com; q=dns/txt; s=qcdkim; t=1223306812; x=1254842812; h=mime-version:message-id:in-reply-to:references:date:to: from:subject:cc:content-type:x-ironport-av; z=MIME-Version:=201.0|Message-ID:=20<p06240602c50fdb702e5d @[10.227.68.106]>|In-Reply-To:=20<20081006101429.DF8E23A6 89D@core3.amsl.com>|References:=20<20081006101429.DF8E23A 689D@core3.amsl.com>|Date:=20Mon,=206=20Oct=202008=2008:2 6:46=20-0700|To:=20IAB=20Chair=20<iab-chair@ietf.org>,=20 <ietf@ietf.org>|From:=20Ted=20Hardie=20<hardie@qualcomm.c om>|Subject:=20Re:=20Call=20for=20Comments:=20Principles =20of=20Internet=20Host=20Configuration|CC:=20"iab@iab.or g"=20<iab@iab.org>|Content-Type:=20text/plain=3B=20charse t=3D"us-ascii"|X-IronPort-AV:=20E=3DMcAfee=3Bi=3D"5300,27 77,5398"=3B=20a=3D"10116819"; bh=1QWtA80vJrN81vPOqPHundKPVJ/ygOFCJOCyqNmmpjY=; b=Gzi2jfH6WJXXTk0PCI8EAiAM7cGAixb4RaDe9uIkFLz3wtBHqTlfyM9J a5VH3w2b7OjTY6IbsJ11cpC9yJK0A3WsAb6I4gp65WZKeZnfWwu6WvPGR RjPUPcxjqoseCOPettCxdE9eOlAjTJtQXMo0PQGj5QEtMkrP8cqi/WnxK w=;
X-IronPort-AV: E=McAfee;i="5300,2777,5398"; a="10116819"
Received: from pdmz-ns-mip.qualcomm.com (HELO ithilien.qualcomm.com) ([199.106.114.10]) by wolverine01.qualcomm.com with ESMTP/TLS/DHE-RSA-AES256-SHA; 06 Oct 2008 08:26:52 -0700
Received: from hamtaro.qualcomm.com (hamtaro.qualcomm.com [129.46.61.157]) by ithilien.qualcomm.com (8.14.2/8.14.2/1.0) with ESMTP id m96FQpT0006219 (version=TLSv1/SSLv3 cipher=DHE-RSA-AES256-SHA bits=256 verify=FAIL); Mon, 6 Oct 2008 08:26:51 -0700
Received: from nasanexhc02.na.qualcomm.com (nasanexhc02.na.qualcomm.com [172.30.33.23]) by hamtaro.qualcomm.com (8.14.2/8.14.2/1.0) with ESMTP id m96FQlOs024059 (version=TLSv1/SSLv3 cipher=RC4-MD5 bits=128 verify=NOT); Mon, 6 Oct 2008 08:26:51 -0700 (PDT)
Received: from [10.227.68.106] (10.227.68.106) by qcmail1.qualcomm.com (172.30.33.23) with Microsoft SMTP Server (TLS) id 8.1.291.1; Mon, 6 Oct 2008 08:26:47 -0700
MIME-Version: 1.0
Message-ID: <p06240602c50fdb702e5d@[10.227.68.106]>
In-Reply-To: <20081006101429.DF8E23A689D@core3.amsl.com>
References: <20081006101429.DF8E23A689D@core3.amsl.com>
Date: Mon, 06 Oct 2008 08:26:46 -0700
To: IAB Chair <iab-chair@ietf.org>, ietf@ietf.org
From: Ted Hardie <hardie@qualcomm.com>
Subject: Re: Call for Comments: Principles of Internet Host Configuration
Cc: "iab@iab.org" <iab@iab.org>
X-BeenThere: ietf@ietf.org
X-Mailman-Version: 2.1.9
Precedence: list
List-Id: IETF-Discussion <ietf.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/listinfo/ietf>, <mailto:ietf-request@ietf.org?subject=unsubscribe>
List-Post: <mailto:ietf@ietf.org>
List-Help: <mailto:ietf-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/ietf>, <mailto:ietf-request@ietf.org?subject=subscribe>
Content-Type: text/plain; charset="us-ascii"
Content-Transfer-Encoding: 7bit
Sender: ietf-bounces@ietf.org
Errors-To: ietf-bounces@ietf.org

At 3:14 AM -0700 10/6/08, IAB Chair wrote:
>The IAB is ready to ask the RFC-Editor to publish:
>
>     Principles of Internet Host Configuration
>            draft-iab-ip-config-08.txt
>
>as an informational RFC. Before doing so the IAB wants to solicit from
>the community any last comments on this document.
>
>Abstract
>   This document describes principles of Internet host configuration.
>   It covers issues relating to configuration of Internet layer
>   parameters, as well as parameters affecting higher layer protocols.

Speaking personally, I find the treatment of mobility in the document
worryingly sparse.  I don't have a good estimate of the number of
IP-capable mobile nodes currently out in the market, but it is probably
a billion or more.  While many of those nodes exist in wall-garden
environments where details of configuration are handled by the
tender of the garden, we certainly have some nodes which do not
ever get planted in those well-mulched beds and many other which
are occasionally found in the wild.  Based on this document,
I would have to guess that those nodes are pretty much the same
as every non-mobile/non-nomadic node, with the exception of
the need to configure a mobility agent, discussed here:

Mobility agent(s)
              While Mobile IPv4 [RFC3344] and Mobile IPv6 [RFC3775]
              include their own mechanisms for locating home agents, it
              is also possible for mobile nodes to utilize dynamic home
              agent configuration.

First, does dynamic home agent configuration here refer to
RFC 4433's mechanism?

Second, is there a general set of statements that the IAB
can make on how mobile node configuration should
proceed for higher layer configuration when the Internet
layer configuration has a mobility agent and thus
a tunneled interface?  There seems to be a lot of
real complexity out in the world that is not represented here.
To take one example, how should a mobile node associate
name services with specific interfaces?  Do I assume that name
servers available locally and through a tunnel have the same
data (thus presuming split dns is not important to the node?)?
Do I assume that I can trust name servers equally (presuming,
I guess that DNSSEC is deployed and the node can use it)?

If the authors do not feel that this is the appropriate place
to handle questions related to configuration in the presence
of mobility, I would prefer a statement that made explicit.

Thanks for listening,
			regards,
				Ted Hardie




_______________________________________________
Ietf mailing list
Ietf@ietf.org
https://www.ietf.org/mailman/listinfo/ietf