Re: [mif-arch-dt] New Version Notification for draft-anipko-mif-mpvd-arch-00.txt

Tim Chown <tjc@ecs.soton.ac.uk> Mon, 22 July 2013 12:58 UTC

Return-Path: <tjc@ecs.soton.ac.uk>
X-Original-To: mif-arch-dt@ietfa.amsl.com
Delivered-To: mif-arch-dt@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id C055B11E810D for <mif-arch-dt@ietfa.amsl.com>; Mon, 22 Jul 2013 05:58:24 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -2.599
X-Spam-Level:
X-Spam-Status: No, score=-2.599 tagged_above=-999 required=5 tests=[BAYES_00=-2.599]
Received: from mail.ietf.org ([12.22.58.30]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id nZuKWF-9hJFl for <mif-arch-dt@ietfa.amsl.com>; Mon, 22 Jul 2013 05:58:23 -0700 (PDT)
Received: from falcon.ecs.soton.ac.uk (falcon.ecs.soton.ac.uk [IPv6:2001:630:d0:f102::25e]) by ietfa.amsl.com (Postfix) with ESMTP id 6CE2111E80FE for <mif-arch-dt@ietf.org>; Mon, 22 Jul 2013 05:58:23 -0700 (PDT)
Received: from falcon.ecs.soton.ac.uk (localhost [127.0.0.1]) by falcon.ecs.soton.ac.uk (8.13.8/8.13.8) with ESMTP id r6MCwIej025382 for <mif-arch-dt@ietf.org>; Mon, 22 Jul 2013 13:58:18 +0100
X-DKIM: Sendmail DKIM Filter v2.8.2 falcon.ecs.soton.ac.uk r6MCwIej025382
DKIM-Signature: v=1; a=rsa-sha1; c=simple/simple; d=ecs.soton.ac.uk; s=201304; t=1374497898; bh=wVC+D9Qz2GUg6Iak+4crzzbX3o4=; h=Mime-Version:Subject:From:In-Reply-To:Date:References:To; b=ZTkiY895FY3/V4uPJa8+UtVRJb/Czk4P6g5a/uj7s+8cyn1JVCRiMiTHMCiTERAnQ a//KOdGnEsLp7nZb4l6nBajuc4U23fgyFprMilRm4F82tvlMccxxWddDbNM3rPh2oB JxNlF6maXuKt04Lkiv7CNZtvlSxrOnquHrUGVE+g=
Received: from gander.ecs.soton.ac.uk ([2001:630:d0:f102:250:56ff:fea0:401]) by falcon.ecs.soton.ac.uk (falcon.ecs.soton.ac.uk [2001:630:d0:f102:250:56ff:fea0:68da]) envelope-from <tjc@ecs.soton.ac.uk> with ESMTP (valid=N/A) id p6LDwI0544519234zk ret-id none; Mon, 22 Jul 2013 13:58:18 +0100
Received: from [172.20.10.9] (dab-bhx1-h-80-4.dab.02.net [82.132.229.223]) (authenticated bits=0) by gander.ecs.soton.ac.uk (8.13.8/8.13.8) with ESMTP id r6MCuvXo005490 (version=TLSv1/SSLv3 cipher=AES128-SHA bits=128 verify=NO) for <mif-arch-dt@ietf.org>; Mon, 22 Jul 2013 13:56:59 +0100
Content-Type: text/plain; charset="windows-1252"
Mime-Version: 1.0 (Mac OS X Mail 6.5 \(1508\))
From: Tim Chown <tjc@ecs.soton.ac.uk>
In-Reply-To: <8D23D4052ABE7A4490E77B1A012B63077521C9E7@mbx-01.win.nominum.com>
Date: Mon, 22 Jul 2013 13:57:02 +0100
Content-Transfer-Encoding: quoted-printable
Message-ID: <EMEW3|25fe7aca8d4acd7aafc4345bd0e9fa99p6LDwI03tjc|ecs.soton.ac.uk|8AD05C25-AA13-48BF-810C-439C178EE1D3@ecs.soton.ac.uk>
References: <20130714041913.29430.66253.idtracker@ietfa.amsl.com> <e7573b69f58a4f0b903cf7a3ae03cf48@SN2PR03MB077.namprd03.prod.outlook.com> <024f01ce836a$0c59b220$250d1660$@com> <9f84e98ff5bc45e2ac0465c72bdc24e1@SN2PR03MB077.namprd03.prod.outlook.com> <002801ce851f$f8eb8cb0$eac2a610$@com> <8D23D4052ABE7A4490E77B1A012B63077521C9E7@mbx-01.win.nominum.com> <8AD05C25-AA13-48BF-810C-439C178EE1D3@ecs.soton.ac.uk>
To: "mif-arch-dt@ietf.org" <mif-arch-dt@ietf.org>
X-Mailer: Apple Mail (2.1508)
X-ECS-MailScanner: Found to be clean, Found to be clean
X-smtpf-Report: sid=p6LDwI054451923400; tid=p6LDwI0544519234zk; client=relay,forged,no_ptr,ipv6; mail=; rcpt=; nrcpt=1:0; fails=0
X-ECS-MailScanner-Information: Please contact the ISP for more information
X-ECS-MailScanner-ID: r6MCwIej025382
X-ECS-MailScanner-From: tjc@ecs.soton.ac.uk
Subject: Re: [mif-arch-dt] New Version Notification for draft-anipko-mif-mpvd-arch-00.txt
X-BeenThere: mif-arch-dt@ietf.org
X-Mailman-Version: 2.1.12
Precedence: list
List-Id: MIF Architecture Design Team mailing list <mif-arch-dt.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/mif-arch-dt>, <mailto:mif-arch-dt-request@ietf.org?subject=unsubscribe>
List-Archive: <http://www.ietf.org/mail-archive/web/mif-arch-dt>
List-Post: <mailto:mif-arch-dt@ietf.org>
List-Help: <mailto:mif-arch-dt-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/mif-arch-dt>, <mailto:mif-arch-dt-request@ietf.org?subject=subscribe>
X-List-Received-Date: Mon, 22 Jul 2013 12:58:24 -0000

Hi,

Some quick comments, as I won't now be able to make the call today.

Overall, the draft is taking shape nicely.

Section 1

If we talk of common scenarios, should we list them? Should we pick a couple that can be drilled into as examples later in the document, or in an Appendix? We had some discussion on this previously in the calls, but did we agree, what if anything, should go in this text?

Section 2.1 

This explains how the PVD architecture can be incrementally deployed, with incremental benefit, which is a nice property - perhaps the title of that section can be tweaked, or the topic of implicit vs explicit PVD discovery separated?

Towards the end of section 2.1 it would be great to have heuristics to do better than putting all implicit PVD information into one bucket, e.g. where a host is multihomed, where in such a case the host would have some idea of this due to multiple global prefixes.

Section 2.3

Are PVD IDs unique per PVD, per association between the client and PVD, per location, or…? e.g. if I am with a WiFi provider, will I always see the same PVD when I use that provider, anywhere? Would a friend on that provider see the same ID? Can any assumptions be made? As yet I don't think this is stated.

Section 2.4

The single PVD for dual-stack networks seems very sane. It is common today for a dual-stack host to get an IPv6 address and router via IPv6 RA, and other configuration information via IPv4 DHCP.

Section 4.2

So if there is an explicit vs implicit distinction for learning PVDs, perhaps a similar model should be applied here, explicit being e.g. a user toggle (explicit choice, rather like 3G vs WiFi, as hinted at in section 2.3), the implicit being e.g. connectivity tests (Happy PVDs?).

Section 4.2.1

A host may pick multiple PVDs intentionally to use MPTCP; it may explicitly want to ensure it is using different channels per path.

There may be cases for split PVDs, e.g. a host with VPN running, uses the VPN to the corporate network and the default provision for all other traffic (cue security comments…).

Section 5.1

Perhaps in addition to connection requests by applications the applications will first do DNS lookups, which is where the PVD selection is first used?

Section 6

eduroam is an interesting example here. Users authenticate to their home site using their home credentials, but the visited site then makes a provisioning (and authorisation) decision based on that result.  The visited site is the PVD, but the authentication is to the home site.  The authentication to eduroam can be mutual between the device and the visited network.

And a final question for now - are we including application configuration in this work, or is it purely network services?

Tim