Re: [Ila] [5gangip] ILA forwaring [Was Re: Problem Statement]

"Joel M. Halpern" <jmh@joelhalpern.com> Tue, 01 May 2018 17:22 UTC

Return-Path: <jmh@joelhalpern.com>
X-Original-To: ila@ietfa.amsl.com
Delivered-To: ila@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 6E1FC12E8CE; Tue, 1 May 2018 10:22:29 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -2.7
X-Spam-Level:
X-Spam-Status: No, score=-2.7 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, DKIM_SIGNED=0.1, DKIM_VALID=-0.1, DKIM_VALID_AU=-0.1, RCVD_IN_DNSWL_LOW=-0.7, SPF_PASS=-0.001, URIBL_BLOCKED=0.001] autolearn=ham autolearn_force=no
Authentication-Results: ietfa.amsl.com (amavisd-new); dkim=pass (1024-bit key) header.d=joelhalpern.com
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id T-7qssdQfxIo; Tue, 1 May 2018 10:22:27 -0700 (PDT)
Received: from mailb2.tigertech.net (mailb2.tigertech.net [208.80.4.154]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id 8E1E112E8C9; Tue, 1 May 2018 10:22:27 -0700 (PDT)
Received: from localhost (localhost [127.0.0.1]) by mailb2.tigertech.net (Postfix) with ESMTP id 7AE8440231A; Tue, 1 May 2018 10:22:27 -0700 (PDT)
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=joelhalpern.com; s=2.tigertech; t=1525195347; bh=TAtUHRNkVm6iwVhXCSGXnlE5cKAf8aoeZC5nAyeO2+s=; h=Subject:To:Cc:References:From:Date:In-Reply-To:From; b=g/tu8HLrXrlfo0KfrnLQcyOYJomBc3J7mK1WBt7k1GB2T+t+MuSVLsKCgWGpyaIV9 OVUo1/yH3MQYoVLQS4yGtGxV9AXArQpD7D1OgSu0M4kIIu0gBiccOc6lbCnSm66xak lT5A54O3sFfxhz3rJ21oz8I/jMBTrSC/bbdNFBdU=
X-Virus-Scanned: Debian amavisd-new at b2.tigertech.net
Received: from Joels-MacBook-Pro.local (unknown [50.225.209.67]) (using TLSv1.2 with cipher ECDHE-RSA-AES128-GCM-SHA256 (128/128 bits)) (No client certificate requested) by mailb2.tigertech.net (Postfix) with ESMTPSA id 971F040005A; Tue, 1 May 2018 10:22:26 -0700 (PDT)
To: Tom Herbert <tom@herbertland.com>
Cc: Tom Herbert <tom@quantonium.net>, ila@ietf.org, 5GANGIP <5gangip@ietf.org>
References: <CALx6S37_oce-S0pEUgB8CpkWemcHhrb4HoDXUfPHZMGiokCqcA@mail.gmail.com> <253963a3-9e0b-2cb9-e216-745c6b99766c@joelhalpern.com> <CAPDqMeqsdG5FKtMaq9bjcJYDMw69Ow=OkeqMdba8aqRh9ayPrQ@mail.gmail.com> <08110014-adce-3f88-02d1-643871e46dcb@joelhalpern.com> <CALx6S34=Yeu3-hHTiVCOoQUM7KwvXPpGMmu8Ss-ZHeuOU6b7ug@mail.gmail.com>
From: "Joel M. Halpern" <jmh@joelhalpern.com>
Message-ID: <6d25230b-aafe-e985-7e0f-f8bd3acfb800@joelhalpern.com>
Date: Tue, 01 May 2018 13:22:25 -0400
User-Agent: Mozilla/5.0 (Macintosh; Intel Mac OS X 10.12; rv:52.0) Gecko/20100101 Thunderbird/52.7.0
MIME-Version: 1.0
In-Reply-To: <CALx6S34=Yeu3-hHTiVCOoQUM7KwvXPpGMmu8Ss-ZHeuOU6b7ug@mail.gmail.com>
Content-Type: text/plain; charset="utf-8"; format="flowed"
Content-Language: en-US
Content-Transfer-Encoding: 7bit
Archived-At: <https://mailarchive.ietf.org/arch/msg/ila/3ZykBq0YrV5mXS1cvQl6t2vy5RI>
Subject: Re: [Ila] [5gangip] ILA forwaring [Was Re: Problem Statement]
X-BeenThere: ila@ietf.org
X-Mailman-Version: 2.1.22
Precedence: list
List-Id: Identifier Locator Addressing <ila.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/ila>, <mailto:ila-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/ila/>
List-Post: <mailto:ila@ietf.org>
List-Help: <mailto:ila-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/ila>, <mailto:ila-request@ietf.org?subject=subscribe>
X-List-Received-Date: Tue, 01 May 2018 17:22:29 -0000

I am not sure I follow.
If I am reading you right, you suggest that dropping cache usage during 
a DOS attack is a useful feature.
If the system is engineered to operate well using local caches in the 
ILA, then dropping cache usage would seem to result in a DOS attack on 
the ILA-R infrastructure as it will have to handle a sustained packet 
load much higher than its design target.

Yours,
Joel

On 5/1/18 1:16 PM, Tom Herbert wrote:
> On Tue, May 1, 2018 at 9:58 AM, Joel M. Halpern <jmh@joelhalpern.com> wrote:
>> If you do not use caches in your ILA-Ns (and yes, I understand your
>> reasoning for not doing so), then you are constructing an overlay network.
>> One of the arguments I was given for using ILA was to enable direct
>> forwarding of packets effectively without needing to have routing track the
>> moving entities.  Without caches, you are pushing all the traffic through
>> fewer entities.  And you seem to be either using a lot of ILA-R with
>> concomitant information distribution or few ILA-R restricting the
>> information distribution problem but instead having traffic concentration
>> problems.
>>
>> I understood from your earlier presentation that the ILA-r using the packet
>> as a signal was to avoid dropping the first packet, and as a side-effect not
>> needing a separate query message.
>> Now you seem to be saying that your think it important to support not having
>> caches in the ILA-Ns, which is a VERY different trade-off.
>>
> Joel,
> 
> I think you've misunderstood my position. Caches are _very_ important
> to eliminate the cost triangular routing (latency, average path load).
> This reduces latency and reduces average load on ILA-Rs. But, and this
> is the critical part, caches are only an _optimization_ in ILA. That
> means if the cache is rendered ineffective (like by a well crafted DOS
> attack) then the only effect is that the optimization is loss (i.e.
> greater latency due to triangular router)-- this is quantitively the
> worst effect of the attack on an ILA cache. This can be contrasted
> that to LISP where the worst case effects of a DOS attack on the cache
> is loss of service for users (infinite latency since packets can be
> dropped or indefinitely blocked on a cache miss).
> 
> Tom
> 
>> Yours,
>> Joel
>>
>>
>> On 5/1/18 12:37 PM, Tom Herbert wrote:
>>>
>>> On Tue, May 1, 2018 at 9:10 AM, Joel M. Halpern <jmh@joelhalpern.com>
>>> wrote:
>>>>
>>>> Three reactions, all personal opinion (in case someone thinks my having
>>>> helped chair the BoF is in any way relevant; it isn't):
>>>>
>>>> 1) If ILA-Ns do not have caches, the ILA-Rs will become hot-spots in the
>>>> network.  Yes, you have provision for multiple of them sharing load.
>>>> However, if that sharing gets to be a significant percentage of teh
>>>> routers
>>>> in the network, then there is no point in having bothered with ILA, you
>>>> are
>>>> just routing on the SIR.
>>>>
>>> Joel,
>>>
>>> If you provision a network (or any system really) based on an
>>> assumption that caches will always attain some hit rate this is a
>>> fundamental mistake. One of the goals of a DOS attack would be to
>>> drive the hit rate to zero in which case someone will be in a world of
>>> hurt. Caches and DOS are a hard mix to contend with in nearly any
>>> context, that's why it's much better to view caches as an optimization
>>> rather than a requirement. They can be used to alleviate load, but
>>> that cannot be relied upon.
>>>
>>> I would also point out that caches only make sense as internal devices
>>> for intra domain communications. This does not make sense for edge
>>> routers that would need to create a working set cache for any
>>> aribtrary load of traffic from the Internet.
>>>
>>>> 2) As far as I can tell, when some ILA-N have caches, the ILA-R have no
>>>> way
>>>> of knowing whether the ILA-N have caches or not.  I can understand what
>>>> happens if all ILA-N in a network have the same cache state (either they
>>>> all
>>>> have caches or they all do not have caches).  But I do not know what
>>>> behavior you expect of an ILA-R if the ILA-N are not uniform. Given the
>>>> hot-spot issue above, I think you need to really explain why ILA-N would
>>>> not
>>>> ahve caches.
>>>>
>>> ILA-Rs and ILA-Ns communicate via ILAMP protocol. That can include
>>> capabilities description.
>>>
>>>> 3 - Minor) Your usage of "sharding" seems odd.  You are simply dividing
>>>> the
>>>> domain into address blocks, and distributing responsibility for those
>>>> blocks
>>>> separately.  In other contexts, sharding seems to be used more generally
>>>> for
>>>> having subcollections of the data which can be moved around.
>>>>
>>> Sharding is a database term that describes partitioning of the
>>> database into smaller chunks for manageablibilty. That is what is
>>> happening here (literally in the implementation since we are use a
>>> database backend).
>>>
>>> Tom
>>>
>>