Re: Time to kill layer 2

Ted Lemon <mellon@fugue.com> Thu, 14 April 2016 21:57 UTC

Return-Path: <mellon@fugue.com>
X-Original-To: ietf@ietfa.amsl.com
Delivered-To: ietf@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id AB8A112D955 for <ietf@ietfa.amsl.com>; Thu, 14 Apr 2016 14:57:22 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -2.6
X-Spam-Level:
X-Spam-Status: No, score=-2.6 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, DKIM_SIGNED=0.1, DKIM_VALID=-0.1, HTML_MESSAGE=0.001, RCVD_IN_DNSWL_LOW=-0.7, SPF_PASS=-0.001] autolearn=ham autolearn_force=no
Authentication-Results: ietfa.amsl.com (amavisd-new); dkim=pass (2048-bit key) header.d=fugue-com.20150623.gappssmtp.com
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id NSufsp29isNT for <ietf@ietfa.amsl.com>; Thu, 14 Apr 2016 14:57:20 -0700 (PDT)
Received: from mail-lf0-x22e.google.com (mail-lf0-x22e.google.com [IPv6:2a00:1450:4010:c07::22e]) (using TLSv1.2 with cipher ECDHE-RSA-AES128-GCM-SHA256 (128/128 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id 2888F12D9A9 for <ietf@ietf.org>; Thu, 14 Apr 2016 14:57:20 -0700 (PDT)
Received: by mail-lf0-x22e.google.com with SMTP id e190so125163158lfe.0 for <ietf@ietf.org>; Thu, 14 Apr 2016 14:57:20 -0700 (PDT)
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=fugue-com.20150623.gappssmtp.com; s=20150623; h=mime-version:in-reply-to:references:from:date:message-id:subject:to :cc; bh=bGi65gjzPbZOgl6MpYcl+PFNihrP/XzlXTP7VmPR10c=; b=DK/G4hcFqDO4z3iccGgS5KLektfi9rBycheC6gqFmzeZWSOD/GFucitPZ86+QFz/0r +zK2Zxg5DnaOORagUloOryk5gZrOgOIVfQQpQi2FkMOqtpZn2GnMLJLQIxP9CAYrS/P3 GzvnIg5XUJgY2N+Qqctq4G6KmbhLcHkmIRkIqXCr7FcEYLOAovGSgSChEaf58X4Hlf2a A+cQ8lx79m4xr+pzo4GzthYtwBg5oL2qvp0bNFf6wzq10I/kYAG+lsWuaqkfK7neUMxj jRbwrlsEXPFXkVbFZBdU5KJCR8+U3kYMNsPH9yk4JcGr3iNkdKpPnHYyG8G39kpPBe8Q Wz0Q==
X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20130820; h=x-gm-message-state:mime-version:in-reply-to:references:from:date :message-id:subject:to:cc; bh=bGi65gjzPbZOgl6MpYcl+PFNihrP/XzlXTP7VmPR10c=; b=l7vDZagIAmemUehTt9gOC6frX43YqysPguXhwEjATBraLMZXzD+mFcBevZVQX6gC/R nASy2qRcJxe/rtgH9ilhb1RCly140jU/G5yRSmo4tKgrr3KdQSn2Yyxkz5zAh8LsuRe1 meQfLSZ4PYIZSj+cdJKZFW1dNGhJwuuMT7rhqYNPzqP3k9u1KstXgxpnYyzfRnr1N0V7 1fmpAkdG23WjFLhyhvOBuM9iIuXu30BOmuerYf7J4hs5xSjQJ0f/W7ccOZJED4HORX8N UMGMZtuRD02+UR5ckUSpcycbbZetb9xxOHTSkWoEudv30754HNKJb/AovHz3jS3RN267 qUHg==
X-Gm-Message-State: AOPr4FW3wypLpzr67O/KtoMDUWKCh7Yyz8me9/4Edh24gpnZwItLEiRdcurahzsk/wH7e2Hj8W0z4e3BwqkZMA==
X-Received: by 10.25.32.213 with SMTP id g204mr4520031lfg.119.1460671038308; Thu, 14 Apr 2016 14:57:18 -0700 (PDT)
MIME-Version: 1.0
Received: by 10.25.213.19 with HTTP; Thu, 14 Apr 2016 14:56:38 -0700 (PDT)
X-Originating-IP: [71.233.41.235]
In-Reply-To: <571011B2.9080003@intec.ugent.be>
References: <CAMm+Lwg-HTYCv2pGt=SP2+Xjoko6GcJ73kVzqXC1LBTOMDKV_A@mail.gmail.com> <571011B2.9080003@intec.ugent.be>
From: Ted Lemon <mellon@fugue.com>
Date: Thu, 14 Apr 2016 17:56:38 -0400
Message-ID: <CAPt1N1m71Vx6LX-dTuHVoYfZG_X7wykax2QMteqFjcsRt+RThw@mail.gmail.com>
Subject: Re: Time to kill layer 2
To: Dimitri Staessens <dimitri.staessens@intec.ugent.be>
Content-Type: multipart/alternative; boundary="001a11401fec5f596a053078fafe"
Archived-At: <http://mailarchive.ietf.org/arch/msg/ietf/oNpmRceDYaJONsUvZWIQLKKADkw>
Cc: ietf <ietf@ietf.org>
X-BeenThere: ietf@ietf.org
X-Mailman-Version: 2.1.17
Precedence: list
List-Id: IETF-Discussion <ietf.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/ietf>, <mailto:ietf-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/ietf/>
List-Post: <mailto:ietf@ietf.org>
List-Help: <mailto:ietf-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/ietf>, <mailto:ietf-request@ietf.org?subject=subscribe>
X-List-Received-Date: Thu, 14 Apr 2016 21:57:22 -0000

Of course!

On Thu, Apr 14, 2016 at 5:54 PM, Dimitri Staessens <
dimitri.staessens@intec.ugent.be> wrote:

> anyone thought of killing everything on top of layer 2?
>
>
> On 04/14/16 14:59, Phillip Hallam-Baker wrote:
>
>> This morning I spent an hour debugging the network to print out two
>> class projects that were due. Some points:
>>
>> 1) My ability to debug the network is better than 99% of the population
>> 2) The interaction of Bonjour, DHCP and auto power saving is unfortunate
>> 3) Things should still work after I have been away for a week
>> 4) If vendors want to be selling all that IoT gear, they have to solve
>> these issues.
>>
>> 5) I want someone to blame. Right now when the network doesn't work, I
>> don't know who is the cause. I want one point of contact. Whoever is
>> that point of contact will get most of my networking money.
>>
>>
>> One of the biggest headaches in debugging is that 'smart hubs' are
>> not. They are actually very stupid. They make assumptions of network
>> topology that are not true. Another is the unfortunate implementation
>> of DHCP.
>>
>> I don't use SNMP for a simple reason - it is not available to most
>> ordinary people. I want to understand networking for the 99%, not the
>> IETF 1%-ers.
>>
>> All this networking gear is presented to me as black boxes over which
>> I have absolutely no control (which is fine-ish) and no visibility.
>>
>> What we have today is the product of a historical process. I remember
>> the days when Ethernet ran on 10BaseT. But I installed my first switch
>> 30 years ago and it has been a switched protocol for 20 years now.
>>
>>
>> It seems to me that there is a business opportunity for any vendor who
>> takes the rather obvious step of simplifying the system.
>>
>> People talk about 'IP everywhere' and 'IP end-to-end' which is rather
>> odd when you think about the fact that virtually every local network
>> uses MAC addresses for routing.
>>
>> One of the reasons that IP won against OSI was that it was simpler.
>> Applications ran on top of the IP layer with only TCP inbetween. Of
>> course these days we do have a Presentation layer, Web Services run on
>> HTTP. But unlike the OSI presentation layer, ours does not introduce
>> extra moving parts.
>>
>> It seems to me that if we really believed in IP everywhere and IP
>> end-to-end we would insist that network switches be IP routers that
>> can be managed using BGP/OSPF or at least routing tables rather than
>> heuristic devices that try to guess where packets should go based on
>> goat entrails, phases of the moon or whatever they use.
>>
>>
>> What should have happened many moons ago was that DHCP should have
>> become a bidirectional protocol or a bootstrap to a bidirectional
>> protocol. So when a printer joins the network, it authenticates and
>> tells the network what it is. And this is all defined in one set of
>> specifications from one organization, none of which assumes that
>> security is an 'advanced', 'optional' or 'enterprise' feature.
>>
>> Instead we have an ad-hoc layer trying to achieve the same result in
>> peer-to-peer fashion. A similar approach works for frogs as a
>> reproductive mechanism but only at the species level. It certainly
>> does not work for the individual ova which may or may not connect to
>> the printer it is trying to use to print the kids damned homework.
>>
>>
>> Seriously, the fact that things have scaled thus far and the 1% can
>> get them to work does not mean that we can get to the next level
>> without a serious rethink of the local network architecture.
>>
>> The type of device I think we need would be first and foremost an IP
>> router. It would have ethernet plugs on the box and use ethernet layer
>> 1 specs. But when a another 'True-IP' device was plugged in, it would
>> quickly negotiate a direct IP connection, oh and with proper 64KB
>> packets. It would also, authenticate, announce and turn on link layer
>> encryption.
>>
>> Such a device would also be a legacy router. It would fake all the
>> signals necessary for a legacy ethernet device to function. It would
>> also be responsible for maintaining the local information for the
>> network service database and intercommunicating with other hubs to
>> achieve a global network view.
>>
>>
>> The net result of all this would be that I would never ever need to
>> install another printer (no, it is not actually necessary for every
>> stupid printer to have its own stupid printer driver). Opening the
>> 'printers' folder would automatically show every printer that is on
>> the network or can be woken from slumber by the hub it connects to.
>>
>>
>