Re: [lisp] Request for WG document - draft-farinacci-lisp-name-encoding

"Joel M. Halpern" <jmh@joelhalpern.com> Tue, 29 September 2020 20:23 UTC

Return-Path: <jmh@joelhalpern.com>
X-Original-To: lisp@ietfa.amsl.com
Delivered-To: lisp@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 995D43A11A5 for <lisp@ietfa.amsl.com>; Tue, 29 Sep 2020 13:23:42 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -2.311
X-Spam-Level:
X-Spam-Status: No, score=-2.311 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, DKIM_SIGNED=0.1, DKIM_VALID=-0.1, DKIM_VALID_AU=-0.1, DKIM_VALID_EF=-0.1, NICE_REPLY_A=-0.213, RCVD_IN_MSPIKE_H3=0.001, RCVD_IN_MSPIKE_WL=0.001, SPF_PASS=-0.001, URIBL_BLOCKED=0.001] autolearn=ham autolearn_force=no
Authentication-Results: ietfa.amsl.com (amavisd-new); dkim=pass (1024-bit key) header.d=joelhalpern.com
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id wf3U-4FlgGZz for <lisp@ietfa.amsl.com>; Tue, 29 Sep 2020 13:23:40 -0700 (PDT)
Received: from mailb1.tigertech.net (mailb1.tigertech.net [208.80.4.153]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id E2B853A1183 for <lisp@ietf.org>; Tue, 29 Sep 2020 13:23:40 -0700 (PDT)
Received: from localhost (localhost [127.0.0.1]) by mailb1.tigertech.net (Postfix) with ESMTP id 4C19nm5wrRz5bY6P; Tue, 29 Sep 2020 13:23:40 -0700 (PDT)
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=joelhalpern.com; s=2.tigertech; t=1601411020; bh=TKlOfkLsYqevV/I8w1Uw8IUt8mMKQqKBHq7Ebrj4PY8=; h=Subject:To:Cc:References:From:Date:In-Reply-To:From; b=elmq5PfYoXfQ3afcEgb/aU6OpGlrYzmi013acEYJEHVS0eKFHjBgYMCQOg+tx0bs9 pBkWBeMktCTjh+QELHHBdGaOxjhiqKhGIT2faF+XDX3fTCv+cYfu9y5jW5/ljZ8gbb 0Pp9C0nwvvVLBnlE1XeF84rlddb9bKVUama4P+BY=
X-Quarantine-ID: <9RnqSwLgw68l>
X-Virus-Scanned: Debian amavisd-new at b1.tigertech.net
Received: from [192.168.128.43] (209-255-163-147.ip.mcleodusa.net [209.255.163.147]) (using TLSv1.2 with cipher ECDHE-RSA-AES128-GCM-SHA256 (128/128 bits)) (No client certificate requested) by mailb1.tigertech.net (Postfix) with ESMTPSA id 4C19nm2Fc0z5bdDW; Tue, 29 Sep 2020 13:23:40 -0700 (PDT)
To: Dino Farinacci <farinacci@gmail.com>
Cc: "lisp@ietf.org list" <lisp@ietf.org>
References: <8ab7a055-3615-cf04-2749-446ecde2cc38@joelhalpern.com> <8A777782-AF51-48CA-936A-B6BD68C98334@gmail.com> <f6e19069-7df6-8507-67de-194edd9f625a@joelhalpern.com> <5B6F5137-C628-459A-9EB0-767635D5A622@gmail.com> <1be68d18-37f4-47a8-2136-b74b45a3e392@joelhalpern.com> <A0EBAC8B-3572-41B6-B71D-0B00BBDB2AE7@gmail.com>
From: "Joel M. Halpern" <jmh@joelhalpern.com>
Message-ID: <921b82e9-ea40-bab9-eb3e-809375528741@joelhalpern.com>
Date: Tue, 29 Sep 2020 16:23:39 -0400
User-Agent: Mozilla/5.0 (Windows NT 10.0; WOW64; rv:68.0) Gecko/20100101 Thunderbird/68.12.0
MIME-Version: 1.0
In-Reply-To: <A0EBAC8B-3572-41B6-B71D-0B00BBDB2AE7@gmail.com>
Content-Type: text/plain; charset="utf-8"; format="flowed"
Content-Language: en-US
Content-Transfer-Encoding: 8bit
Archived-At: <https://mailarchive.ietf.org/arch/msg/lisp/KBWJ6NpMTgt-yBC5b03-br9DkJc>
Subject: Re: [lisp] Request for WG document - draft-farinacci-lisp-name-encoding
X-BeenThere: lisp@ietf.org
X-Mailman-Version: 2.1.29
Precedence: list
List-Id: List for the discussion of the Locator/ID Separation Protocol <lisp.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/lisp>, <mailto:lisp-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/lisp/>
List-Post: <mailto:lisp@ietf.org>
List-Help: <mailto:lisp-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/lisp>, <mailto:lisp-request@ietf.org?subject=subscribe>
X-List-Received-Date: Tue, 29 Sep 2020 20:23:44 -0000

Another way of looking at my issue here is the many problems the DNS 
folks have had with tXT records.  They are free-form text.  Making them 
useful has proven to be a major challenge.  hence, even as RLOCs rather 
than EIDs (where the collision problem is not an issue), I am concerned 
that adding this is opening a can of worms.

Yours,
Joel

PS: Dino, youa re correct that the hash probably won't collide with 
anything else.  But for anything that is not cryptographically random, 
collision seems a major risk.

PPS: Even for you hash case, you concluded that you needed a type 
discriminator (hash:).  Presumably so taht you would know which one you 
needed for the ECDSA operation.  Sensible.  But if we need that, 
probably eveyrone needs that.  At which point it should be part of the 
definition.  At which point we get into defining the structure of these 
naems with sufficient uniqueness.  Or sub-typing,  Or something.

On 9/29/2020 3:58 PM, Dino Farinacci wrote:
>> I think it really needs more structure.  One does not say "here is a shared database; use any key you like and hope not to collide with other users."
> 
> I can add that to the draft.
> 
>>
>>>> If there is to be standard usage of this, and if there is to be more than one such usage, how are collisions avoided?  It is not sufficient to say "just don't" as different problems may end up needing overlapping name spaces.  The hash usage (below) assumes that the solution is to prepend the string "hash:' on the front.  But that is not formally defined, and as such is not actually a reliable mechanism.
>>>> (Frankly, for the hashes I would prefer to use a different EID LCAF that carries the binary hash.)
>>> The ecdsa-auth use-case assumes that the hash length is largest where collisions won’t happen. There are applications that use UUIDs and encodes them in distinguished-name EIDs. UUIDs do not have an allocation authority. And:
>>
>> the ECDSA draft assumes that no other uses will begin with hash:.  This has nothing to do with length.  My concern is not collision amon hashes.  It is collision between hashes and other uses of the "distinguished name" LCAF.
> 
> If the hash avoids collisions, then anything you put before it, in totality makes the name unique.
> 
>> I suspect that the people supporting this have expectations on how this will work.  But it seems sufficiently basic that the semantics, rather than the encoding, is where I would expect the WG to start.  Encodings are easy.
>>> So lets have a look at each Internet Draft that references draft-farinacci-lisp-name-encoding and lets review those semantic encodings.
>>
>> Looking at the couple of places you have chosen to use this, and have therefore been careful not to collide with yourself really does not tell us much.
> 
> If you connect two IPv4 islands behind NATs and register their addresses to the same instance-ID to the same mapping system, those addresses will collide. The same goes for these names. That is what VPNs are used for and hence instance-IDs allows the registering entities to agree to not collide names.
> 
> This is a general principle for the LISP mapping system for all EIDs being used. And note for RLOC-names, they do not have to be unique. They are free-form documentation based names.
> 
>> If you want a sub-type under LCAF, then let's do that.  trying to pretend arbitrary strings have distinguishable semantics is asking for trouble.
> 
> The AFI encoding is tigher and save less space in the packet and hence why it was chosen. Plus if you use it in LCAFs, there is less LCAF nesting. I'm sure many coders appreceiate this.
> 
> Dino
>