RE: [dhcwg] [mif] Gen-ART review of draft-ietf-dhc-container-00

"Giyeong Son" <gson@rim.com> Thu, 16 April 2009 21:33 UTC

Return-Path: <gson@rim.com>
X-Original-To: ietf@core3.amsl.com
Delivered-To: ietf@core3.amsl.com
Received: from localhost (localhost [127.0.0.1]) by core3.amsl.com (Postfix) with ESMTP id A56173A6946; Thu, 16 Apr 2009 14:33:02 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -5.203
X-Spam-Level:
X-Spam-Status: No, score=-5.203 tagged_above=-999 required=5 tests=[BAYES_00=-2.599, MIME_QP_LONG_LINE=1.396, RCVD_IN_DNSWL_MED=-4]
Received: from mail.ietf.org ([64.170.98.32]) by localhost (core3.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id 8MaoiaXAbE2X; Thu, 16 Apr 2009 14:33:01 -0700 (PDT)
Received: from mhs04ykf.rim.net (mhs04ykf.rim.net [216.9.243.82]) by core3.amsl.com (Postfix) with ESMTP id 882C73A6D15; Thu, 16 Apr 2009 14:33:01 -0700 (PDT)
Received: from mhs04ykf.rim.net (unknown [127.0.0.1]) by mhs04ykf.rim.net (Symantec Brightmail Gateway) with ESMTP id 02CA45C685; Thu, 16 Apr 2009 17:34:14 -0400 (EDT)
X-AuditID: 0a666446-a998ebb000007e46-ac-49e7a455cd22
Received: from XCH20YKF.rim.net (unknown [10.102.100.35]) by mhs04ykf.rim.net (Symantec Mail Security) with ESMTP id AE7415C645; Thu, 16 Apr 2009 17:34:13 -0400 (EDT)
Received: from XCH42YKF.rim.net ([10.64.31.38]) by XCH20YKF.rim.net with Microsoft SMTPSVC(5.0.2195.6713); Thu, 16 Apr 2009 17:34:13 -0400
X-MimeOLE: Produced By Microsoft Exchange V6.5
Content-class: urn:content-classes:message
MIME-Version: 1.0
Content-Type: text/plain; charset="us-ascii"
content-transfer-encoding: quoted-printable
Subject: RE: [dhcwg] [mif] Gen-ART review of draft-ietf-dhc-container-00
Date: Thu, 16 Apr 2009 17:33:58 -0400
Message-ID: <777025D7F9E074449F3DAEB73C25690205F0FCE3@XCH42YKF.rim.net>
In-Reply-To: <9E06629B-2B0E-4AD3-BD5F-94F2C2192CAE@cisco.com>
X-MS-Has-Attach:
X-MS-TNEF-Correlator:
Thread-Topic: [dhcwg] [mif] Gen-ART review of draft-ietf-dhc-container-00
Thread-Index: Acm+uWSO2sFWVqJtTSyZjWjNtPZ5IgAGopew
From: Giyeong Son <gson@rim.com>
To: Ralph Droms <rdroms@cisco.com>, Ted Lemon <Ted.Lemon@nominum.com>
X-OriginalArrivalTime: 16 Apr 2009 21:34:13.0575 (UTC) FILETIME=[162A3570:01C9BEDB]
X-Tracking: ONC3m79J7f57zp0jFVtWxPxr7v2VYI3kBbb
X-Brightmail-Tracker: AAAAAA==
X-Mailman-Approved-At: Fri, 17 Apr 2009 09:12:17 -0700
Cc: mif <mif@ietf.org>, ietf@ietf.org, gen-art@ietf.org, dhc WG <dhcwg@ietf.org>, Black_David@emc.com
X-BeenThere: ietf@ietf.org
X-Mailman-Version: 2.1.9
Precedence: list
List-Id: IETF-Discussion <ietf.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/listinfo/ietf>, <mailto:ietf-request@ietf.org?subject=unsubscribe>
List-Archive: <http://www.ietf.org/mail-archive/web/ietf>
List-Post: <mailto:ietf@ietf.org>
List-Help: <mailto:ietf-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/ietf>, <mailto:ietf-request@ietf.org?subject=subscribe>
X-List-Received-Date: Thu, 16 Apr 2009 21:33:02 -0000

Again as I mentioned, in order to prepare or build an efficient routing
policy and to select an efficient connection/interface, it would be
necessary to identify, classify and/or prioritize underlying network
characteristics or information of the attached networks. 

In addition, as many network characteristics which are essential to be
used for simultaneous use of multiple interfaces are not generic forms
(e.g. SSID only for 802.11), these network characteristics may require a
mechanism to make them be associated with generic (formed) elements used
for routing policy preparation and routing decision. Therefore, if MIF
can provide an efficient guideline or mechanism for associating, it
would be really amazing. 

I believe, the current IP network related protocols and standardized
technologies may not be enough to support that on multiple interface
network environment. 

I think each vendor, carrier, service provider and/or technology, which
utilizes or supports simultaneous use of multiple
connections/interfaces, may have their own proprietary mechanism in
terms of gathering of network characteristics of each interface/access
network technology (e.g. WiFi, GPRS, CDMA, Bluetooth, etc.), their
mapping mechanism with generic formed elements, routing policy and
decision mechanisms with different IP based service networks owned by
different service providers or different IP network enabling core
networks owned by different carriers.

So, the problem Ted and Ralph are addressing seems to be just one of
issues (but only for WiFi network environments) in terms of network
characteristic that may be necessary to be considered during selection
of an efficient connection/interface from multiple candidates.

Giyeong  

-----Original Message-----
From: Ralph Droms [mailto:rdroms@cisco.com] 
Sent: April 16, 2009 1:32 PM
To: Ted Lemon
Cc: Giyeong Son; Hui Deng; dhc WG; gen-art@ietf.org; mif; ietf@ietf.org;
Black_David@emc.com
Subject: Re: [dhcwg] [mif] Gen-ART review of draft-ietf-dhc-container-00

Yup ... there is currently no way to provide authenticated, meaningful
identification of the network(s) to which a host is attached.  Without
that identification, it's pretty hard to write any reasonable policies.

- Ralph

On Apr 16, 2009, at 1:26 PM 4/16/09, Ted Lemon wrote:

> On 2009/4/13 Ralph Droms <rdroms@cisco.com> wrote:
>> For example, would a host process
>> information received from a Starbucks network over its 802.11 
>> interface differently from information received a home network over 
>> the 802.11 interface?
>
> It's even more fun than that.   How do we reliably know that we are  
> at Starbucks, and not at home?   The SSID?   That's not an  
> authenticated token.   Currently Windows makes security decisions  
> based on the SSID.   You could call this the best answer they could  
> come up with for a problem with no good answers.   Or you could say  
> that it instills the user with a false sense of security.   Either  
> way, it's not something I'd be comfortable seeing in a protocol spec, 
> so if the client is in fact to make decisions as you've
> suggested, we'd need a secure way of doing this.   I don't know  
> enough about WPA Enterprise to know if there's a bidirectional 
> authentication going on there - from the UI perspective it looks like 
> it's one-way.
>


---------------------------------------------------------------------
This transmission (including any attachments) may contain confidential information, privileged material (including material protected by the solicitor-client or other applicable privileges), or constitute non-public information. Any use of this information by anyone other than the intended recipient is prohibited. If you have received this transmission in error, please immediately reply to the sender and delete this information from your system. Use, dissemination, distribution, or reproduction of this transmission by unintended recipients is not authorized and may be unlawful.