Re: [nbs] I-D Action:draft-xu-name-shim6-00.txt

mingzx <> Mon, 18 October 2010 03:20 UTC

Return-Path: <>
Received: from localhost (localhost []) by (Postfix) with ESMTP id 383AF3A6C3C; Sun, 17 Oct 2010 20:20:07 -0700 (PDT)
X-Virus-Scanned: amavisd-new at
X-Spam-Flag: NO
X-Spam-Score: 1.273
X-Spam-Level: *
X-Spam-Status: No, score=1.273 tagged_above=-999 required=5 tests=[BAYES_00=-2.599, HTML_MESSAGE=0.001, MIME_BASE64_TEXT=1.753, RELAY_IS_220=2.118]
Received: from ([]) by localhost ( []) (amavisd-new, port 10024) with ESMTP id uqJ9WXZ4jwQJ; Sun, 17 Oct 2010 20:20:05 -0700 (PDT)
Received: from ( []) by (Postfix) with ESMTP id E14BB3A6973; Sun, 17 Oct 2010 20:19:56 -0700 (PDT)
Received: from mingzx ( [] ) by ajax-webmail-wmsvr17 (Coremail) ; Mon, 18 Oct 2010 11:21:07 +0800 (CST)
Date: Mon, 18 Oct 2010 11:21:07 +0800 (CST)
From: mingzx <>
To: "Brian E Carpenter" <>
Message-ID: <>
In-Reply-To: <>
References: <> <>
MIME-Version: 1.0
Content-Type: multipart/alternative; boundary="----=_Part_159879_1004678001.1287372067391"
X-Originating-IP: []
X-Priority: 3
X-Mailer: Coremail Webmail Server Version SP_ntes V3.5 build 100930(11984.3465.3457) Copyright (c) 2002-2010 126com
X-CM-CTRLDATA: sVI1yGZvb3Rlcl9odG09OTAyMjo4MQ==
X-CM-TRANSID: EcqowKDLsKwkvbtM9jQwAA--.317W
X-CM-SenderInfo: pplqw6b06rjloofrz/1tbi8BVuBUoiVzDItAABs8
X-Coremail-Antispam: 1U5529EdanIXcx71UUUUU7vcSsGvfC2KfnxnUU==
Cc: shim6-wg <>,
Subject: Re: [nbs] I-D Action:draft-xu-name-shim6-00.txt
X-Mailman-Version: 2.1.9
Precedence: list
List-Id: Name based sockets discussion list <>
List-Unsubscribe: <>, <>
List-Archive: <>
List-Post: <>
List-Help: <>
List-Subscribe: <>, <>
X-List-Received-Date: Mon, 18 Oct 2010 03:20:07 -0000

Thanks for this feedback and it is very valuable to me :)
The materials in this email will be included in draft-01. 

On 2010-10-17 12:06:05,"Brian E Carpenter" <> wrote:
>> Abstract
>>    This document describes and defines shim6 as a mobility solution for
>>    name-based sockets.  
>My most general comment is that I think the draft should explain both
>how NBS works in the original shim6 scenario (multihoming without
>mobility) and then how it also works in the mobile case. I think
>it's a very neat trick if it really does extend shim6 to support
>mobility, but let's not forget the basics.
In the multihoming scenario, the following two cases may happen exclusively:

   1.  A subset but not all of the host's addresses becomes invalid.

   2.  All of the host's addresses become invalid.

In the first case, REAP works as its normal way as is defined in RFC
5534.  NO_LOC state will not be reached and the DNS will not be
queried.  With the presence of NBS, name is used as ULID instead of
IP and all addresses are treated equally.  NBS will not experience
the situation that and the connection must be terminated as the
address used as ULID becomes invalid.  Apart from the change to ULID,
Shim6 just works as is specified in RFC 5533 to provide multihoming.

In the second case, the original Shim6 will immediatelly terminate
the connection when all the addresses becomes invalid (or may be
earlier if the ULID is not the last one which becomes invalid) while
the modified Shim6 will first transmit to the NO_LOC state and breaks
the connection when timeout.  This means that NBS will preserve the
connection for a NO_LOC timeout interval even if there will no longer
be any address to use.  While this approach may lead to the holding
of the system resources when not necessary, it does have the advantage
that the connection can be recovered if the host achieves a valid
address during the NO_LOC period.
Does it make sense?
>> 3.1.  Introduction
>>    The traditional Shim6 defined in RFC5533 [RFC5533] does not aim to
>>    solve mobility problem, so changes need to be made to the existing
>>    Shim6 protocol.  One of the reasons for not supporting mobility is
>>    that Shim6 uses a specific IP address as the identifier of the upper
>>    lay protocol.  To avoid confusion, communication must be stopped when
>>    this IP address becomes unavailable.  
>Small but important change: unavailable ==> invalid. You say this correctly
>later. "Unavailable" is confusing, since it might be understood to mean
>"unreachable"; actually it's quite normal that the ULID goes unreachable.
I have made it correct. Thank you.
>> 4.1.1.  Brief overview of changes
>>    Name Based Sockets suggest using the name of a host as the
>>    identifier.  This solves the above problems, as a name is valid for
>>    as long as a host wishes it to be. 
>I don't think that's accurate. I think it would be accurate to
>say "a name is valid for as long as it exists in the DNS."
>If a name vanishes completely from the DNS, it seems that it is
>just as invalid as an expired IP address; it is simply a much
>rarer event.

I think this relates to the semantic of name in the name based sockets.
The DNS is used to provide NBS with a mobility solution but NBS does not 
require that the name depends on DNS. Even if a name vanishes completely
from the DNS, it still can be used by NBS to identify a session (through name exchange) 
and further be used by NBS+Shim6 to get multihoming. 

>On a related point, I think that you need a discussion somewhere
>of the latency for DNS updates to propagate, and how that affects
>the speed of recovery of a mobile connection. This point might
>make or break this whole solution. If the time to get an updated
>DNS RR is greater than the TCP session timeout, there's a problem.
Yes, this is definitely important. We are doing DNS investigation as
well as prototype test to see how DNS affects the recovery of a mobile
connection. I will back to you when I get more details.
>> 5.  Security Considerations
>The security of shim6 depends on using HBA/CGA addresses (including
>the initial ULID). How do we get equivalent security here?
>Is secure dynamic DNS update plus DNSSEC sufficient?

One trivial way to get equivalent security is to let NBS use HBA/CGA addresses. 
However, NBS was not designed to be dependent on HBA/CGA addresses and it might
not be the way we want to go. I'm not quite sure about whether secure dynamic DNS
update plus DNSSEC sufficient to provide equivalent security. We' are doing
investigation on this topic. Please let me know if you have any suggestion.
Zhongxing Ming