Re: [Int-dir] [Anima] An IOT DIR review of draft-ietf-anima-autonomic-control-plane

Michael Richardson <mcr+ietf@sandelman.ca> Thu, 15 March 2018 09:37 UTC

Return-Path: <mcr@sandelman.ca>
X-Original-To: int-dir@ietfa.amsl.com
Delivered-To: int-dir@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 576DD12D893; Thu, 15 Mar 2018 02:37:06 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -0.308
X-Spam-Level:
X-Spam-Status: No, score=-0.308 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, DATE_IN_PAST_03_06=1.592, SPF_PASS=-0.001, URIBL_BLOCKED=0.001] autolearn=no autolearn_force=no
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id c3doTgaA9w6g; Thu, 15 Mar 2018 02:37:05 -0700 (PDT)
Received: from relay.sandelman.ca (relay.cooperix.net [176.58.120.209]) (using TLSv1.2 with cipher AECDH-AES256-SHA (256/256 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id 5F2C312D886; Thu, 15 Mar 2018 02:37:02 -0700 (PDT)
Received: from dooku.sandelman.ca (unknown [81.128.173.187]) by relay.sandelman.ca (Postfix) with ESMTPS id D5B7F1F963; Thu, 15 Mar 2018 09:37:00 +0000 (UTC)
Received: by dooku.sandelman.ca (Postfix, from userid 179) id 662E21929; Thu, 15 Mar 2018 02:31:43 -0400 (EDT)
From: Michael Richardson <mcr+ietf@sandelman.ca>
To: "Pascal Thubert (pthubert)" <pthubert@cisco.com>
cc: iot-dir <iot-dir@ietf.org>, "ops-dir@ietf.org" <ops-dir@ietf.org>, "int-dir@ietf.org" <int-dir@ietf.org>, "draft-ietf-anima-autonomic-control-plane@ietf.org" <draft-ietf-anima-autonomic-control-plane@ietf.org>, "anima@ietf.org" <anima@ietf.org>
In-reply-to: <449b7e2f10094531b325919710696754@XCH-RCD-001.cisco.com>
References: <449b7e2f10094531b325919710696754@XCH-RCD-001.cisco.com>
Comments: In-reply-to "Pascal Thubert (pthubert)" <pthubert@cisco.com> message dated "Mon, 26 Feb 2018 17:25:58 +0000."
X-Mailer: MH-E 8.6; nmh 1.6; GNU Emacs 24.5.1
MIME-Version: 1.0
Content-Type: multipart/signed; boundary="=-=-="; micalg="pgp-sha1"; protocol="application/pgp-signature"
Date: Thu, 15 Mar 2018 06:31:43 +0000
Message-ID: <20093.1521095503@dooku.sandelman.ca>
Archived-At: <https://mailarchive.ietf.org/arch/msg/int-dir/xAlfqeUneGKa9L1ADU7fp7AzRO8>
Subject: Re: [Int-dir] [Anima] An IOT DIR review of draft-ietf-anima-autonomic-control-plane
X-BeenThere: int-dir@ietf.org
X-Mailman-Version: 2.1.22
Precedence: list
List-Id: "This list is for discussion between the members of the Internet Area directorate." <int-dir.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/int-dir>, <mailto:int-dir-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/int-dir/>
List-Post: <mailto:int-dir@ietf.org>
List-Help: <mailto:int-dir-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/int-dir>, <mailto:int-dir-request@ietf.org?subject=subscribe>
X-List-Received-Date: Thu, 15 Mar 2018 09:37:06 -0000

Thank you Pascal for for the review!

I don't think I want to respond to your specific comments, but rather
constrast some text to explain why (charter aside) we felt that we need
to leave out constrained networks.

The ACP is primarily about connecting network *service* equipment at an ISP
(or Enterprise) with the Network Operations Center for managemenet and
control.  Running SDN flows over the ACP makes a significant amount of sense.
Doing RESTconf over the ACP also makes sense.
Or just ssh in and type "conf term" and go, knowing you *can't* fat finger
something and lose your command channel.

The ACP is secondarily (today! we hope it will change) about connectivity
*among* this equipment such that the devices can interact at a meta-level.
The ACP is in some sense an "Internet of Routers", ... by routers and *for*
routers (and devices that contain switching functionality like hypervisors)

These devices otherwise do revenue generating activities like moving packets,
slicing and dicing video, running virtual machines, mining bitcoin, etc.

There is no fundamental reason why constrained networks of constrained
devices couldn't have an ACP, except for code size and energy consumption.
I.e. except for the thing that makes them constrained.

In a cabinet full of a physical hosts supporting some kind of virtualized
structure such as you might find at facebook, google, amazon, etc.  the
little bit of interaction between the Top-of-Rack switch, the service
processors (iDrac, iLO, etc.) of the systems, is significantly less than 1%
of the typical 10G+ that the cabinet probably has.
The ACP gives you a safe and secure place to bring in the sensors and
actuators in the cabinet (IP enabled power bars, etc.).  IPsec support in
a powerbar is not unknown.

To constrast this to battery-powered OpenMote scale devices.
The ACP overhead is probably 80% of the bandwidth of network.

You asked about why we have so many possible ACP technologies, but really
IPsec is the MTI.  That's partly because many are unfamiliar with IPsec and
are sure that some other "custom" solution would be better.  Grass is just
greener over there.

But in fact we actually have no other IETF standard solution that we can
actually point to.  "SSL VPN" is a marketing term, solutions are completely
vertically integrated: they don't interoperate at all.
OpenVPN an example of one, but it is a company/open-source-project, not an
RFC.   And also some would like to try MACSEC.

I think that we could get IPsec + IKEv2 (or some other similar technology)
into an OpenMote, but I'm not sure it's worthwhile, because at the end of
the day the ROI isn't that good if you eat 70% of the system doing this.

This brings me to your comments about how many parents to select and the
like.  While we don't have layer-2 ACKs in the IPsec hop-by-hop tunnels the
way that 15.4 does, but we do have IKEv2 dead-peer-detection messages.  We
will generally know quite quickly if we have lot a connection to a parent.
The occurance of an IKEv2 negotiation also provides a very strong signal of
that there is a new peer.

--
]               Never tell me the odds!                 | ipv6 mesh networks [
]   Michael Richardson, Sandelman Software Works        | network architect  [
]     mcr@sandelman.ca  http://www.sandelman.ca/        |   ruby on rails    [







--
Michael Richardson <mcr+IETF@sandelman.ca>, Sandelman Software Works
 -= IPv6 IoT consulting =-