Re: [mif] I-D Action: draft-ietf-mif-mpvd-arch-02.txt

Dmitry Anipko <Dmitry.Anipko@microsoft.com> Tue, 22 July 2014 01:35 UTC

Return-Path: <Dmitry.Anipko@microsoft.com>
X-Original-To: mif@ietfa.amsl.com
Delivered-To: mif@ietfa.amsl.com
Received: from localhost (ietfa.amsl.com [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id AF1F41A028A for <mif@ietfa.amsl.com>; Mon, 21 Jul 2014 18:35:34 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -1.902
X-Spam-Level:
X-Spam-Status: No, score=-1.902 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, RCVD_IN_DNSWL_NONE=-0.0001, SPF_HELO_PASS=-0.001, SPF_PASS=-0.001] autolearn=ham
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id 90giatToiAiJ for <mif@ietfa.amsl.com>; Mon, 21 Jul 2014 18:35:30 -0700 (PDT)
Received: from na01-bn1-obe.outbound.protection.outlook.com (mail-bn1blp0182.outbound.protection.outlook.com [207.46.163.182]) (using TLSv1 with cipher ECDHE-RSA-AES256-SHA (256/256 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id 325C81A0154 for <mif@ietf.org>; Mon, 21 Jul 2014 18:35:30 -0700 (PDT)
Received: from SN2PR03MB077.namprd03.prod.outlook.com (10.255.175.153) by SN2PR03MB077.namprd03.prod.outlook.com (10.255.175.153) with Microsoft SMTP Server (TLS) id 15.0.995.11; Tue, 22 Jul 2014 01:35:27 +0000
Received: from SN2PR03MB077.namprd03.prod.outlook.com ([169.254.2.92]) by SN2PR03MB077.namprd03.prod.outlook.com ([169.254.2.92]) with mapi id 15.00.0995.011; Tue, 22 Jul 2014 01:35:27 +0000
From: Dmitry Anipko <Dmitry.Anipko@microsoft.com>
To: Markus Stenberg <markus.stenberg@iki.fi>
Thread-Topic: [mif] I-D Action: draft-ietf-mif-mpvd-arch-02.txt
Thread-Index: AQHPoBEWIOtJ4GGw3EiNv/wLZv79mZurSf3A
Date: Tue, 22 Jul 2014 01:35:26 +0000
Message-ID: <4b4ace2e01184131bd355c46ecc7b56f@SN2PR03MB077.namprd03.prod.outlook.com>
References: <20140704005457.5925.30656.idtracker@ietfa.amsl.com> <1404435563313.15510@microsoft.com> <alpine.DEB.2.02.1407040833460.7929@uplift.swm.pp.se> <3ea0c51c57224263a806916c9821f9d8@SN2PR03MB077.namprd03.prod.outlook.com> <81AEBE4D-7C62-4D87-879D-36662459FC9C@iki.fi>
In-Reply-To: <81AEBE4D-7C62-4D87-879D-36662459FC9C@iki.fi>
Accept-Language: en-US
Content-Language: en-US
X-MS-Has-Attach:
X-MS-TNEF-Correlator:
x-originating-ip: [131.107.192.23]
x-microsoft-antispam: BCL:0;PCL:0;RULEID:
x-o365ent-eop-header: Message processed by - O365_ENT: Allow from ranges (Engineering ONLY)
x-forefront-prvs: 02801ACE41
x-forefront-antispam-report: SFV:NSPM; SFS:(6009001)(24454002)(377454003)(52044002)(199002)(13464003)(189002)(83322001)(110136001)(81542001)(74662001)(87936001)(4396001)(95666004)(19580395003)(54356999)(64706001)(81342001)(99286002)(92566001)(105586002)(86612001)(21056001)(50986999)(19580405001)(74502001)(83072002)(85852003)(76176999)(86362001)(2656002)(85306003)(107046002)(33646002)(561944003)(66066001)(20776003)(106356001)(74316001)(77096002)(101416001)(80022001)(79102001)(93886003)(76482001)(106116001)(76576001)(77982001)(99396002)(31966008)(46102001)(108616002)(24736002); DIR:OUT; SFP:; SCL:1; SRVR:SN2PR03MB077; H:SN2PR03MB077.namprd03.prod.outlook.com; FPR:; MLV:sfv; PTR:InfoNoRecords; MX:1; LANG:en;
Content-Type: text/plain; charset="us-ascii"
Content-Transfer-Encoding: quoted-printable
MIME-Version: 1.0
X-OriginatorOrg: microsoft.onmicrosoft.com
Archived-At: http://mailarchive.ietf.org/arch/msg/mif/flvdcbfta2U71dzUkcilu1VnNGs
Cc: "mif@ietf.org" <mif@ietf.org>
Subject: Re: [mif] I-D Action: draft-ietf-mif-mpvd-arch-02.txt
X-BeenThere: mif@ietf.org
X-Mailman-Version: 2.1.15
Precedence: list
List-Id: Multiple Interface Discussion List <mif.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/mif>, <mailto:mif-request@ietf.org?subject=unsubscribe>
List-Archive: <http://www.ietf.org/mail-archive/web/mif/>
List-Post: <mailto:mif@ietf.org>
List-Help: <mailto:mif-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/mif>, <mailto:mif-request@ietf.org?subject=subscribe>
X-List-Received-Date: Tue, 22 Jul 2014 01:35:34 -0000

Hello Markus,

Thank you for the comments.

>> Is this meant to be IPv6-only? Because most typical hosts allow only one IPv4 address per interface, and that leads to NATs and all sorts of fun stuff. 2.5 refers to dual stack, and there's references to IPv4, but e.g. 5.2.3.1 example using the address as determinant of PvD sounds bit stretched unless you really can provision multiple IP addresses for v4 too.
Host 
|
Router - ISP1
|
ISP2
>> How is this supposed to work with IPv4, and say, 2 ISPs and one VPN connection? (I can guess, but document doesn't really say.)

[danipko] I think the text was written with the assumption in mind that different PvDs can provide different addresses, which should be the case in IPv6, and in some topologies with IPv4. If you have a proposal  that works for the topology you described, where presumably the Router performs address assignment (and does NATing?), please feel free to describe it. 

>> I'm still not happy with mixed mode definition in 2.2 - it explicitly _does_ limit to one implicit PvD per link.

[danipko] I will change the text to further clarify that multiple implicit are allowed.

>> What's wrong with IPv4/IPv6 PvDs being distinct in any case? Given good multi-PvD support, what's the problem?

[danipko] My understanding is that in order for things like DHCPv6 prefix policy option to work, the respective IPv4 and IPv6 connectivity need to be considered within a context of the single PvD. Having IPv4 and IPv6 from the same administrator to be in different PvDs seems to increase complexity, and e.g. break the scenario with the prefix policy, while the benefits of putting in different PvDs are unclear. Can you elaborate on why you think the default of putting IPv4 and IPv6 into separate implicit ones makes more sense than into single implicit one?

>> Does the explicit PvD ID have to be really globally unique or just low chance of collision (like ULA or the implicit PvD)?

[danipko]  IIRC there was a discussion in London on this question, but I don't believe there was any better proposal for the arch doc compared to the current wording. My 2 cents is that I would not object to change the current wording to something like "or otherwise, an ID with high probability of being unique", if that has consensus. For those types of PvD IDs (to be defined in a separate design doc), where the ID is tied to e.g. DNS suffix and a cert, global uniqueness would be assured through those means (an attacker can try to fake the ID, but it won't be trusted, and hence the PvD may be ignored by the host).

>>
2.3: s/one interfaces/one interface/
3.3: [refs to X and Y]
4: the section title is bit misleading I think - I'd just remove 'and number of PVDs'
4.1/4.2: '- one' - I'd just remove the -, or better yet, rework out the parentheses too..

[danipko]  OK.

-Dmitry

-----Original Message-----
From: Markus Stenberg [mailto:markus.stenberg@iki.fi] 
Sent: Tuesday, July 15, 2014 2:42 AM
To: Dmitry Anipko
Cc: Markus Stenberg; Mikael Abrahamsson; mif@ietf.org
Subject: Re: [mif] I-D Action: draft-ietf-mif-mpvd-arch-02.txt

.. back from my vacation, also rereading from scratch.

On 8.7.2014, at 1.34, Dmitry Anipko <Dmitry.Anipko@microsoft.com> wrote:
>>> 2.3. Does the current writing prohibit that multiple implicit PVDs are formed on a single interface, for instance if RAs are seen from two or more routers on the same link, each announcing non-overlapping address space and DNS resolvers? I would like to see a PVD being formed for each of these to also allow for source based routing to send packets / use each resolver depending on what source address based on these RAs are being used.
> IIRC the WG discussed this question on a couple of occasions, and my understanding of consensus is: while there is no intent to prohibit multiple implicit PvDs on an interface, there is no clear way how to enable the implicit PvDs with finer granularity either. The text was supposed to reflect such position by saying "By default, implicit PVDs are limited... If additional information is available to the host through mechanisms out of scope of this document, the host may form implicit PVDs with different granularity".  Do you think this needs more elaboration in the text? (such as e.g. including your example into that section; this may open questions though such as e.g., how to make sure that IPv6 & IPv4 from the same router do not end up in different PvDs)

Comments:

2.1/.../5.2.3.1: 

Is this meant to be IPv6-only? Because most typical hosts allow only one IPv4 address per interface, and that leads to NATs and all sorts of fun stuff. 2.5 refers to dual stack, and there's references to IPv4, but e.g. 5.2.3.1 example using the address as determinant of PvD sounds bit stretched unless you really can provision multiple IP addresses for v4 too.

How is this supposed to work with IPv4, and say, 2 ISPs and one VPN connection? (I can guess, but document doesn't really say.)

Diagram:

Host 
|
Router - ISP1
|
ISP2


2.2/2.3:

I'm still not happy with mixed mode definition in 2.2 - it explicitly _does_ limit to one implicit PvD per link. What's wrong with IPv4/IPv6 PvDs being distinct in any case? Given good multi-PvD support, what's the problem? Same thing with 2.3 too - why not have implicits be next hop based by default?

(Similarly in 2.5 - it seems to confuse interface and next hop :-p)

2.4:

Does the explicit PvD ID have to be really globally unique or just low chance of collision (like ULA or the implicit PvD)? Constructing one that is globally unique _and_ human readable may be tricky. Is there some construction here that (for average human) is human readable and guaranteed to be globally unique? FQDN or AS# or something derived from prefix do not really count here I think. And some combination of $MEGACORP and $SERVICE is not guaranteed to be unique either.

The point I'm trying to make is that e.g. 'LameISP SlowSpeed' is human readable, but has just 'some' global uniqueness guarantee. slowspeed.lamepsi.example.com can be made globally unique, but at expense of readability.

7.1: 

Not really serious comment as such, but I think there's some heartwarming trust here towards ISP that actually uses 'trust' mechanism with a customer not to do evil things ;-)

My nits:

2.3: s/one interfaces/one interface/

3.3: [refs to X and Y]

4: the section title is bit misleading I think - I'd just remove 'and number of PVDs'

4.1/4.2: '- one' - I'd just remove the -, or better yet, rework out the parentheses too..

Cheers,

-Markus