Re: [Mipshop] AD review of draft-ietf-mipshop-mstp-solution

Jari Arkko <jari.arkko@piuha.net> Wed, 21 May 2008 04:19 UTC

Return-Path: <mipshop-bounces@ietf.org>
X-Original-To: mipshop-archive@megatron.ietf.org
Delivered-To: ietfarch-mipshop-archive@core3.amsl.com
Received: from [127.0.0.1] (localhost [127.0.0.1]) by core3.amsl.com (Postfix) with ESMTP id 722D23A6959; Tue, 20 May 2008 21:19:46 -0700 (PDT)
X-Original-To: mipshop@core3.amsl.com
Delivered-To: mipshop@core3.amsl.com
Received: from localhost (localhost [127.0.0.1]) by core3.amsl.com (Postfix) with ESMTP id 8273D3A6BB5 for <mipshop@core3.amsl.com>; Tue, 20 May 2008 21:19:44 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -1.003
X-Spam-Level:
X-Spam-Status: No, score=-1.003 tagged_above=-999 required=5 tests=[AWL=-0.704, BAYES_00=-2.599, MANGLED_ONLINE=2.3]
Received: from mail.ietf.org ([64.170.98.32]) by localhost (core3.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id QhoL7SQDY7Gk for <mipshop@core3.amsl.com>; Tue, 20 May 2008 21:19:41 -0700 (PDT)
Received: from smtp.piuha.net (p130.piuha.net [IPv6:2001:14b8:400::130]) by core3.amsl.com (Postfix) with ESMTP id C2C0228CA72 for <mipshop@ietf.org>; Tue, 20 May 2008 21:07:34 -0700 (PDT)
Received: from smtp.piuha.net (localhost [127.0.0.1]) by smtp.piuha.net (Postfix) with ESMTP id 4A2761986E2; Wed, 21 May 2008 07:07:36 +0300 (EEST)
Received: from [127.0.0.1] (unknown [IPv6:2001:14b8:400::130]) by smtp.piuha.net (Postfix) with ESMTP id 8E6E11986D9; Wed, 21 May 2008 07:07:35 +0300 (EEST)
Message-ID: <4833A007.8060106@piuha.net>
Date: Wed, 21 May 2008 07:07:35 +0300
From: Jari Arkko <jari.arkko@piuha.net>
User-Agent: Thunderbird 1.5.0.14ubu (X11/20080502)
MIME-Version: 1.0
To: gorry@erg.abdn.ac.uk
References: <483170AA.2000403@piuha.net> <DD0238A0AAE9B74A8F70A91BDF497C2F03AD050F@xmb-ams-335.emea.cisco.com> <4831AC1B.7020501@piuha.net> <483327CF.9060809@erg.abdn.ac.uk>
In-Reply-To: <483327CF.9060809@erg.abdn.ac.uk>
X-Virus-Scanned: ClamAV using ClamSMTP
Cc: draft-ietf-mipshop-mstp-solution@tools.ietf.org, Mipshop <mipshop@ietf.org>
Subject: Re: [Mipshop] AD review of draft-ietf-mipshop-mstp-solution
X-BeenThere: mipshop@ietf.org
X-Mailman-Version: 2.1.9
Precedence: list
List-Id: <mipshop.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/listinfo/mipshop>, <mailto:mipshop-request@ietf.org?subject=unsubscribe>
List-Archive: <https://www.ietf.org/mailman/private/mipshop>
List-Post: <mailto:mipshop@ietf.org>
List-Help: <mailto:mipshop-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/mipshop>, <mailto:mipshop-request@ietf.org?subject=subscribe>
Content-Type: text/plain; charset="us-ascii"
Content-Transfer-Encoding: 7bit
Sender: mipshop-bounces@ietf.org
Errors-To: mipshop-bounces@ietf.org

Thanks.

Jari

Gorry Fairhurst kirjoitti:
> Jari,
>
> I have not reviewed this document recently. I'll add this to my to-do
> list.
>
> Gorry
>
> Jari Arkko wrote:
>> Telemaco,
>>
>>> The DHC WG so far was not involved upon suggestion of the Mipshop
>>> chairs.
>>>   
>>
>> Right, but see Vijay's mail. We do need to talk to them at this stage.
>> That's OK, we ship a lot of documents via them...
>>
>>> As for the transport review, Gorry has been added to the MIH DT mailer
>>> since Chicago.
>>> In Vancouver last winter, together with Nada, we answered the open
>>> questions/issues Gorry had.
>>>   
>>
>> Right, and that's been great. But I don't recall there was ever a formal
>> directorate review, was there? And since I'm not on the DT mailing list,
>> have you Gorry reviewed the most recent mstp draft as well? Any thoughts
>> on the questions below?
>>
>> Jari
>>
>>> Regards,
>>> Telemaco
>>> -----Original Message-----
>>> From: mipshop-bounces@ietf.org [mailto:mipshop-bounces@ietf.org] On
>>> Behalf Of Jari Arkko
>>> Sent: Monday, May 19, 2008 2:21 PM
>>> To: draft-ietf-mipshop-mstp-solution@tools.ietf.org; Mipshop
>>> Subject: [Mipshop] AD review of draft-ietf-mipshop-mstp-solution
>>>
>>> Hi all,
>>>
>>> I have made my AD review of this document. Please find details below.
>>> Overall, there were a few important missing or underspecified parts
>>> relating to parameters and algorithms for using UDP, discovery via
>>> another MoS, NAT-traversal retransmissions, and authorization. These
>>> should be specified. The security mechanisms should be narrowed down to
>>> a more reasonable set.
>>>
>>> But the big question for me was whether it is appropriate to employ
>>> DHCP-AAA binding so that per-MN information can be provided. I realize
>>> that we have done it once in the context of the Mobile IP bootstrapping
>>> work. But frankly, that sets a very high bar for deployment in a given
>>> access network and introduces dependencies and complexity that is
>>> undesirable. In general, if every application that wants to avoid
>>> configuration needs to have special support in DHCP relays, it becomes
>>> very hard to deploy anything new. My read of RFC 5164 does not say that
>>> the AAA binding is required. My question is whether (a) local MIH
>>> services, (b) configured home network name and DNS, (c) local MIH IS +
>>> redirection to home MIH, (d) other Internet service discovery
>>> mechanisms
>>> would be sufficient or preferable. At the very least, we should
>>> consider
>>> publishing the simple solution first, and only if there's actual
>>> evidence of deployments with more complex requirements, consider
>>> extending it.
>>>
>>> Process:
>>>
>>> Given the extensive use of DHCP in this document, we need to engage the
>>> DHC WG in a discussion of this draft. I would also like to see a
>>> transport directorate review. Both to be done after a revision
>>> addressing my own comments has been submitted, however.
>>>
>>> Technical:
>>>
>>>  
>>>>    DHCP  Dynamic Host Configuration Protocol: a protocol described in
>>>>       [RFC2131 <http://tools.ietf.org/html/rfc2131>] that allows
>>>>     
>>> Internet devices to obtain IP addresses,
>>>  
>>>>       subnet masks, default gateway addresses, and other IP
>>>>       configuration information from DHCP servers.
>>>>       
>>> IPv6 needs to be covered as well. Please add the appropriate reference.
>>>
>>>  
>>>>    Different types of MoS can be provided independently of other types
>>>>    and there is no strict relationship between ES, CS and IS, nor is
>>>>    there a requirement that the entities that provide these services
>>>>    should be co-located.  However, while IS tends to involve a large
>>>>    amounts of static information, ES and CS are dynamic services and
>>>>    some relationships between them can be expected, e.g., a handover
>>>>    command (CS) could be issued upon reception of a link event (ES).
>>>>    Hence, while in theory MoS can be implemented in different
>>>>     
>>> locations,
>>>  
>>>>    it is expected that ES and CS will be co-located, whereas IS can be
>>>>    co-located with ES/CS or located elsewhere.  Therefore, having the
>>>>    flexibility at the MSTP to discover different services in different
>>>>    locations is an important feature that can be used to optimize
>>>>    handover performance.  MoS discovery is discussed in more detail in
>>>>    Section 5
>>>>     
>>> <http://tools.ietf.org/html/draft-ietf-mipshop-mstp-solution-04#section-
>>>
>>> 5>.
>>>  
>>>>       
>>> Is there a need to state that ES/CS is more likely to be associated
>>> with
>>> a visited network than home?
>>>
>>>  
>>>>    The configuration of the MoS could be executed either upon network
>>>>    attachment or after successful IP configuration.  The methodology
>>>>     
>>> to
>>>  
>>>>    be used depends on the considered deployment scenario.
>>>>       
>>> First, there's a problem here with what kind of network attachment we
>>> are talking about. I believe mobility services need to be provided from
>>> the access network in many situations. IP layer configuration is
>>> somewhat independent of the link layer attachments, given things like
>>> bridging, access concentrators, tunneling, proxy MIP and so on. Given
>>> this, I think the above needs to say that discovery happens upon
>>> initial
>>> or changed link layer attachment.
>>>
>>> Secondly, the part about IP configuration needs to talk about
>>> changed IP
>>> configuration as well.  If your DHCP lease expires, and you get a new
>>> address, will you redo discovery? What if you generate a new 3041
>>> address? If the prefixes in the RAs change without the routers
>>> themselves being changed? What if you do DNAv4 or v6 and detect a
>>> network change?
>>>
>>> Thirdly, I do not think it is appropriate to leave this entirely to
>>> deployments. At least for the mobile node side, code needs to be
>>> written
>>> and every host needs to be able to behave in the correct manner.
>>>
>>> In conclusion, this text needs to be written in a much more detailed
>>> and
>>> specification-like manner. It may be that subsequent sections
>>> contain at
>>> least some of these details. If so, forward references would be needed.
>>>
>>>  
>>>>    In the case where MoS is provided locally (scenarios S1 and S2) ,
>>>>     
>>> the
>>>  
>>>>    discovery techniques described in
>>>>     
>>> [I-D.ietf-mipshop-mos-dhcp-options
>>> <http://tools.ietf.org/html/draft-ietf-mipshop-mstp-solution-04#ref-I-D.
>>>
>>> ietf-mipshop-mos-dhcp-options>]
>>>  
>>>>    and [I-D.ietf-mipshop-mos-dns-discovery
>>>>     
>>> <http://tools.ietf.org/html/draft-ietf-mipshop-mstp-solution-04#ref-I-D.
>>>
>>> ietf-mipshop-mos-dns-discovery>] are both applicable and
>>>  
>>>>    either one MAY be used to discover the MoS.
>>>>       
>>> Dns-discovery requires starting from a known domain name, which
>>> seems to
>>> exclude using it for local networks. Other than as a follow-up to other
>>> methods, like DHCP.
>>>
>>>  
>>>>    In the case where MoS is provided in the home network while the MN
>>>>     
>>> is
>>>  
>>>>    in the visited network (scenario S3), the DNS based discovery
>>>>    described in [I-D.ietf-mipshop-mos-dns-discovery
>>>>     
>>> <http://tools.ietf.org/html/draft-ietf-mipshop-mstp-solution-04#ref-I-D.
>>>
>>> ietf-mipshop-mos-dns-discovery>] is applicable,
>>>  
>>>>    while the DHCP based discovery method would require an interaction
>>>>    between the DHCP and the AAA infrastructure, similarly to what is
>>>>    specified in [I-D.ietf-mip6-bootstrapping-integrated-dhc
>>>>     
>>> <http://tools.ietf.org/html/draft-ietf-mipshop-mstp-solution-04#ref-I-D.
>>>
>>> ietf-mip6-bootstrapping-integrated-dhc>] .  This
>>>  
>>>>    latter case assumes that MoS assignment is performed during access
>>>>    authentication and authorization.
>>>>       
>>> I would like to see this simply state that DHCP based discovery in such
>>> a scenario is inappropriate for the given reasons. I do not believe it
>>> is beneficial to start bundling DHCP with other parts of the network,
>>> except where absolutely required.
>>>  
>>>>    It should be noted that authorization of a MN to use a specific MoS
>>>>    server is not in scope of this document and is specified in
>>>>    [IEEE80221
>>>>     
>>> <http://tools.ietf.org/html/draft-ietf-mipshop-mstp-solution-04#ref-IEEE
>>>
>>> 80221>] . This needs expansion. How does the IEEE scheme affect the
>>> transport
>>> protocol? Can we end up in a situation where DHCP discovery delivers a
>>> server address which refuses to talk to us, for instance?
>>>
>>>  
>>>> In order to use that
>>>> mechanism, the MN MUST first find out the domain name of its home
>>>> network.  Home domains are usually pre-configured in the MNs (i.e.
>>>> subscription is tied to a network), thus the MN can simply read its
>>>> configuration data to find out the home domain name (scenario S1).
>>>>     
>>> This is formulated in a peculiar way. Wouldn't it be simpler to just
>>> say
>>> that MNs must be configured with the domain name of their home network?
>>>
>>>  
>>>> Alternatively, the MN
>>>> MAY use the DHCP options for MoS
>>>> discovery[I-D.ietf-mipshop-mos-dhcp-options] as shown inFigure 6b.
>>>>     
>>> Again, binding the DHCP process with AAA, knowledge of particular
>>> node's
>>> home network etc is undesirable. Can we remove this from the draft?
>>>
>>>  
>>>>    DHCP --  In order to find out the domain name of the local network,
>>>>       the MN SHOULD use the dhcpv4 option 15 for learning the domain
>>>>       name [RFC2132 <http://tools.ietf.org/html/rfc2132>].  A similar
>>>>     
>>> solution is available for dhcpv6
>>>  
>>>>       [I-D.ietf-dhc-dhcpv6-opt-dnsdomain
>>>>     
>>> <http://tools.ietf.org/html/draft-ietf-mipshop-mstp-solution-04#ref-I-D.
>>>
>>> ietf-dhc-dhcpv6-opt-dnsdomain>] .
>>>  
>>>>       
>>> The draft is expired. I would suggest re-considering whether this
>>> approach (dchp + dns) is necessary.
>>>
>>>  
>>>>    Reverse dns query --  When DHCP does not provide the required
>>>>     
>>> domain
>>>  
>>>>       name, the MN MAY use reverse DNS (DNS PTR record) to find the
>>>>       domain name associated with the IP address it is using in the
>>>>       visited network.  Note, that when a NAT device exists between
>>>>     
>>> the
>>>  
>>>>       MN and the visited network, the MN will first need to find out
>>>>     
>>> the
>>>  
>>>>       external IP address of the NAT device.  Some possible methods
>>>>     
>>> for
>>>  
>>>>       determining the NAT's external IP address are STUN [RFC3849
>>>>     
>>> <http://tools.ietf.org/html/rfc3849>] or
>>>  
>>>>       UPnP [UPnP_IDG_DCP
>>>>     
>>> <http://tools.ietf.org/html/draft-ietf-mipshop-mstp-solution-04#ref-UPnP
>>>
>>> _IDG_DCP>].  Once the MN has determined the external IP
>>>  
>>>>       address of the NAT device, it MUST use that address in the
>>>>     
>>> reverse
>>>  
>>>>       DNS query.
>>>>     
>>> A lot of complexity. I wonder if this is really needed. Anyone who is
>>> willing to deploy a relatively costly service such as the MIS on their
>>> network, why would they not be willing to add a few DHCP options to
>>> their network as well? Note that you do not need to use DHCP in IPv6 to
>>> acquire such options; stateless DHCP would also do fine, and can be
>>> combined with autoconfig addresses.
>>>
>>>  
>>>>    When the discovery of an MoS at the visited network, using the FQDN
>>>>    returned in the reverse DNS query, is not successful, the MN MAY
>>>>    attempt to remove portions from the left side of the FQDN and
>>>>     
>>> attempt
>>>  
>>>>    discovery again.  The process MAY be repeated iteratively until a
>>>>    successful discovery.
>>>>     
>>> As in eventually asking for mobility services from .com, for
>>> instance? I
>>> think you need text to avoid this from happening.
>>>
>>>  
>>>>    This section assumes the use of IPv6 and DHCPv6 based mechanisms to
>>>>    discover MoS services in home while the MN is in visited network.
>>>>     
>>> If
>>>  
>>>>    similar functionalities are desired for IPv4 additional DHCPv4
>>>>    extensions would be required.  Since use cases requiring these
>>>>    extensions were not identified at the time of writing this
>>>>     
>>> document,
>>>  
>>>>    they were excluded from the scope of the document.
>>>>     
>>> I am surprised by this. Generally speaking, I would expect to see
>>> feature parity for IPv4 and IPv6 in specifications like this.
>>>
>>>  
>>>>    To discover an MoS in a remote network other than home network, the
>>>>    MN MUST use the DNS based MoS discovery method described in
>>>>    [I-D.ietf-mipshop-mos-dns-discovery
>>>>     
>>> <http://tools.ietf.org/html/draft-ietf-mipshop-mstp-solution-04#ref-I-D.
>>>
>>> ietf-mipshop-mos-dns-discovery>].  The MN MUST first learn the
>>>  
>>>>    domain name of the network containing the MoS it is searching for.
>>>>    If the MN does not yet know the domain name of the network,
>>>>     
>>> learning
>>>  
>>>>    it may require more than one operation, as DHCP based discovery can
>>>>    not be used and pre-configuration is not a feasible solution in
>>>>     
>>> case
>>>  
>>>>    of an arbitrary remote network.  The MN MAY attempt to first
>>>>     
>>> discover
>>>  
>>>>    an MoS in either the local or home network (as in Figure 9 part
>>>>     
>>> (a))
>>>  
>>>>    and query that MoS to find out the domain name of a specific
>>>>     
>>> network
>>>  
>>>>    or the domain name of a network at a specific location (as in
>>>>    Figure 9 part (b)).  Alternatively, the MN MAY query an MoS
>>>>    previously known to learn the domain name of the desired network
>>>>    (e.g., via an IS Query).  Finally, the MN MUST use DNS queries to
>>>>    find MoS in the remote network as inFigure 9 part(c).  It should be
>>>>    noted that step c can only be performed upon obtaining the domain
>>>>    name of the remote network.
>>>>     
>>> The part about finding more information from MoS to redirect the mobile
>>> node to a third party is vague. Can this document point to specific
>>> attributes defined in IEEE that would carry such information? Otherwise
>>> this cannot be implemented.
>>>
>>> Also, its not clear why "pre-configuration is not a feasible
>>> solution in
>>> case of an arbitrary remote network". Surely its no harder to configure
>>> a given 3rd party network than a given home network. I agree that
>>> pre-configuration should be avoided if possible, though.
>>>
>>>  
>>>> while it is preferred to avoid using MIH ACKs with TCP
>>>>    since TCP includes acknowledgement and retransmission
>>>>     
>>> functionality.
>>> Is there no need for application level confirmation? TCP ACKs will only
>>> tell you that the message got through, not, for instance, that it
>>> can be
>>> obeyed.
>>>
>>>  
>>>> On the other hand, if UDP
>>>> is used, a rate-limiting effect similar to the one obtained with
>>>> TCP may be obtained by adequately adjusting the parameters of a
>>>> token bucket regulator as defined in the MIH specifications [IEEE80221
>>>>     
>>> <http://tools.ietf.org/html/draft-ietf-mipshop-mstp-solution-04#ref-IEEE
>>>
>>> 80221>].
>>>  
>>>> Recommendations for tocken bucket parameter settings are specific
>>>> to the scenario considered.
>>>>     
>>> The parameters and algorithms governing the use and timing of UDP need
>>> to be specified. Its fine to point to an IEEE spec, but it needs to be
>>> clear that they are mandatory. From the above I cannot determine
>>> what an
>>> implementation needs to do.
>>>  
>>>> As [RFC4787 <http://tools.ietf.org/html/rfc4787>] requires a
>>>> minimum state timeout of two minutes or more, MIH messages using
>>>> UDP as transport SHOULD be sent once every two minutes.
>>>>     
>>> This is too vague. Sent when? If you have an implementation capable of
>>> using MIH? When you have something to send, you keep sending it over
>>> and
>>> over again? When you have something to receive you keep sending
>>> something else? How do you know when you have something to receive, or
>>> when you want to receive something?
>>>
>>> Note that it would be very unfortunate if every host in every network
>>> that had turned MIH on would be sending a packet every 2 mins.
>>>
>>>  
>>>> MIH messages sent over UDP, TCP or other supported
>>>>    transport MUST use the default port number defined for that
>>>>    particular transport.
>>>>     
>>> Where are these specified?
>>>
>>>  
>>>> MIH Transport Options
>>>>     
>>> The document is very silent on how MIH messages are carried on a given
>>> transport protocol. At the very least the draft should indicate that no
>>> extra framing is needed because IEEE specs already contain a length
>>> field.
>>>
>>>  
>>>> MIH Transport Options
>>>>     
>>> The document does not talk about how servers know the capabilities of
>>> clients that send event/command services to. Is this a part of the IEEE
>>> definitions, and you subscribe to a particular event stream? In any
>>> case, the document should talk about this and point to the relevant
>>> other specifications where needed.
>>>
>>>  
>>>>    In the case where DHCP is used for node discovery and
>>>>     
>>> authentication
>>>  
>>>>    of the source and content of DHCP messages is required, network
>>>>    administrators SHOULD use DHCP authentication option described in
>>>>    [RFC3118 <http://tools.ietf.org/html/rfc3118>], where available or
>>>>     
>>> rely upon link layer security.  This
>>>  
>>>>    will also protect the DHCP server against denial of service attacks
>>>>    to.  [RFC3118 <http://tools.ietf.org/html/rfc3118>] provides
>>>>     
>>> mechanisms for both entity authentication and
>>>  
>>>>    message authentication.
>>>>     
>>> I think the overall recommendation is good, but practically no one is
>>> going to deploy RFC 3118. With this in mind, I would like to see the
>>> above paragraph explain in more detail the security implications of
>>> relying on link layer security.
>>>
>>>  
>>>>    In the case where reliable transport protocol such as TCP is used
>>>>     
>>> for
>>>  
>>>>    transport connection between two MIHF peers, TLS [RFC4346
>>>>     
>>> <http://tools.ietf.org/html/rfc4346>] SHOULD be
>>>  
>>>>    used for message confidentiality and data integrity.  In
>>>>     
>>> particular,
>>>  
>>>>    TLS is designed for client/server applications and to prevent
>>>>    eavesdropping, tampering, or message forgery.  Readers should also
>>>>    follow the recommendations in [RFC4366
>>>>     
>>> <http://tools.ietf.org/html/rfc4366>] that provides generic
>>>  
>>>>    extension mechanisms for the TLS protocol suitable for wireless
>>>>    environments.
>>>>
>>>>    In the case where unreliable transport protocol such as UDP is used
>>>>    for transport connection between two MIHF peers, DTLS [RFC4347
>>>>     
>>> <http://tools.ietf.org/html/rfc4347>]
>>>  
>>>>    SHOULD be used for message confidentiality and data integrity.  The
>>>>    DTLS protocol is based on the Transport Layer Security (TLS)
>>>>     
>>> protocol
>>>  
>>>>    and provides equivalent security guarantees.
>>>>
>>>>    Alternatively, generic IP layer security, such as IPSec [RFC4301
>>>>     
>>> <http://tools.ietf.org/html/rfc4301>] MAY
>>>  
>>>>    be used where neither transport layer security for a specific
>>>>    transport is available nor server only authentication is required.
>>>>       
>>> Too many options. I do not see a particular requirement for IPsec here,
>>> why do we need to include it?
>>>
>>> Also, are TLS and DTLS mandatory to implement?
>>>
>>> The explanation on how to use TLS and DTLS seems thin. Is there
>>> something to be said about what type of certificates or infrastructure
>>> is needed, what modes of operation are allowed, etc?
>>>
>>> Editorial:
>>>
>>> Acronyms used before defined. At least for MSTP (!) and MIHF, maybe
>>> others. Expand them on first use, if this happens prior to the terms
>>> section.
>>>
>>> Most entries in Section 2 need to point to the relevant RFC or other
>>> specification that defines them. E.g., NAI or ES.
>>>
>>> Fix these idnits issues:
>>>
>>>   == Unused Reference: 'I-D.ietf-dime-mip6-integrated' is defined on
>>> line
>>>      1066, but no explicit reference was found in the text
>>>
>>>   -- Unexpected draft version: The latest known version of     
>>> draft-ietf-mip6-bootstrapping-integrated-dhc is -hc, but you're
>>> referring
>>>      to -06.
>>>
>>>
>>>  
>>>> Since transporting long MIH messages may require
>>>>    fragmentation that is not available in UDP, ...
>>>>     
>>> This needs to be reformulated. UDP itself has no fragmentation support,
>>> but IP does. But the issue is that IP layer fragmentation may not work
>>> well, particularly for large packets, may cause several other issues,
>>> etc.
>>>
>>>  
>>>> TCP client
>>>>     
>>> I believe it would be more appropriate to talk about the "MSTP client"
>>> or "MIH client" or "MSTP TCP client"; TCP does not operate on its own.
>>> Or, maybe you can merge "TCP client" and "MIHF" in Figure 10.
>>>
>>> (Appears in multiple places in the document, as does the corresponding
>>> UDP term)
>>>  
>>>>    and responses may cause DoS and the inability of the MN to
>>>> perform a
>>>>     
>>> Acronym "DoS" not introduced earlier.
>>>
>>> Jari
>>>
>>> _______________________________________________
>>> Mipshop mailing list
>>> Mipshop@ietf.org
>>> https://www.ietf.org/mailman/listinfo/mipshop
>>>
>>>
>>>   
>>
>>
>

_______________________________________________
Mipshop mailing list
Mipshop@ietf.org
https://www.ietf.org/mailman/listinfo/mipshop