Re: [netlmm] Last call for draft-ietf-netlmm-lma-discovery-03

jouni korhonen <jouni.nospam@gmail.com> Wed, 12 May 2010 19:08 UTC

Return-Path: <jouni.nospam@gmail.com>
X-Original-To: netlmm@core3.amsl.com
Delivered-To: netlmm@core3.amsl.com
Received: from localhost (localhost [127.0.0.1]) by core3.amsl.com (Postfix) with ESMTP id B4D513A6D0D for <netlmm@core3.amsl.com>; Wed, 12 May 2010 12:08:07 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -0.643
X-Spam-Level:
X-Spam-Status: No, score=-0.643 tagged_above=-999 required=5 tests=[AWL=-0.644, BAYES_50=0.001]
Received: from mail.ietf.org ([64.170.98.32]) by localhost (core3.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id lZDaipNFeMgC for <netlmm@core3.amsl.com>; Wed, 12 May 2010 12:08:06 -0700 (PDT)
Received: from mail-fx0-f44.google.com (mail-fx0-f44.google.com [209.85.161.44]) by core3.amsl.com (Postfix) with ESMTP id 5657C28C177 for <netlmm@ietf.org>; Wed, 12 May 2010 11:57:33 -0700 (PDT)
Received: by fxm7 with SMTP id 7so448216fxm.31 for <netlmm@ietf.org>; Wed, 12 May 2010 11:57:19 -0700 (PDT)
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=gmail.com; s=gamma; h=domainkey-signature:received:received:subject:mime-version :content-type:from:in-reply-to:date:cc:content-transfer-encoding :message-id:references:to:x-mailer; bh=5MiqRZnKk7q4yACYViAsR2sB01GW9gzEOgy74EjVyjs=; b=J0TcWvZg/0MWMHo3d1dN+/b0Wmq24dNV3/6BVfJFNWENlxy2lmNSVayHaUUB7ZzJs4 oodzP0k9Wz1nd0lDQurtwo98lU0RnYvtaTX07WfkqDQwnrnnLkmOiqoPxc76KyelrSmc DdpFI9M78hHDlOyKj/2eWZSO8jPnY4VWMKBYY=
DomainKey-Signature: a=rsa-sha1; c=nofws; d=gmail.com; s=gamma; h=subject:mime-version:content-type:from:in-reply-to:date:cc :content-transfer-encoding:message-id:references:to:x-mailer; b=ZCK+pG1a1v4tWgW/vt7vrEzohaVfInMzcVQM9y0/HaW9L7hlXWhVT1b7F0c13aW3z5 bciGLD/Ql5Ndrmi1dw3kjl30ioK13r4ufMhFa8ZZICEEYq5kwgLrjo0FHkgrqGsiC02l T3geQ1EXgzpoU10H/XkfXBbGTUcTmfGbyC4M4=
Received: by 10.223.18.154 with SMTP id w26mr8781563faa.39.1273690639099; Wed, 12 May 2010 11:57:19 -0700 (PDT)
Received: from a88-114-68-242.elisa-laajakaista.fi (a88-114-68-242.elisa-laajakaista.fi [88.114.68.242]) by mx.google.com with ESMTPS id r25sm1959610fai.11.2010.05.12.11.57.16 (version=TLSv1/SSLv3 cipher=RC4-MD5); Wed, 12 May 2010 11:57:18 -0700 (PDT)
Mime-Version: 1.0 (Apple Message framework v1078)
Content-Type: text/plain; charset="us-ascii"
From: jouni korhonen <jouni.nospam@gmail.com>
In-Reply-To: <4BE46CF5.1010404@earthlink.net>
Date: Wed, 12 May 2010 21:57:14 +0300
Content-Transfer-Encoding: quoted-printable
Message-Id: <4EDA1A18-48E5-4DDB-BB05-1A4B1FB4245B@gmail.com>
References: <C7FF1B07.AED2C%Jonne.Soininen@nsn.com> <4BE46CF5.1010404@earthlink.net>
To: "Charles E. Perkins" <charles.perkins@earthlink.net>
X-Mailer: Apple Mail (2.1078)
Cc: "Soininen, Jonne (NSN-FI/Espoo)" <Jonne.Soininen@nsn.com>, netlmm@ietf.org, Jouni Korhonen <jouni.korhonen@teliasonera.com>
Subject: Re: [netlmm] Last call for draft-ietf-netlmm-lma-discovery-03
X-BeenThere: netlmm@ietf.org
X-Mailman-Version: 2.1.9
Precedence: list
List-Id: NETLMM working group discussion list <netlmm.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/listinfo/netlmm>, <mailto:netlmm-request@ietf.org?subject=unsubscribe>
List-Archive: <http://www.ietf.org/mail-archive/web/netlmm>
List-Post: <mailto:netlmm@ietf.org>
List-Help: <mailto:netlmm-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/netlmm>, <mailto:netlmm-request@ietf.org?subject=subscribe>
X-List-Received-Date: Wed, 12 May 2010 19:08:07 -0000

Hi Charlie,

Responses inline.


On May 7, 2010, at 10:41 PM, Charles E. Perkins wrote:

> Hello Jonne,
> 
> Below, please find the rest of my comments on this document.
> 
> =========================================================================
> 
> "In a case" --> "If"

OK.

> 
>>                                       IKEv2 could be
>>   existing example of such lower layer signaling when IPsec
>>   is the "lower layer" for the MN.
> 
> This is confusing.  Why not have a section entitled something
> more properly descriptive?  One suggestion:
> 
> "Security Procedure Assistance for Constructing the LMA FQDN"
> 
> IPsec isn't a "lower layer", and trying to make it
> so is very likely to have unwanted effects that will
> require various convoluted explanations.

I know it is not a "lower layer" per se. However, it is used more or less as such in certain systems architectures.


> 
>> MN has no knowledge it being anything LMA related.
> 
> --> MN does not associate the information with any LMA function.

Ok. I like this wording.


> 
>>   Some network access technologies (including tunneling solutions)
>>   allow the MN to signal the service name that identifies a particular
>>   service or the external network it wants to access.
> 
> Citations needed for both access technologies and tunneling
> solutions.

Ok. I will add a reference to RFC4306 and 24.302.


> 
>>              .....   The pre-defined formatting rules are usually
>>   agreed on among operators that belong to the same inter-operator
>>   roaming consortium ...
> 
> Citations needed.

Ok. Will add a reference to 23.003.


> 
>>              .....    network infrastructure vendors defining an
>>   open networking system architecture.
> 
> I sure wish they would.  They've had 15 years since
> Mobile IP was standardized and no luck yet.

;)


> 
> 
> "A number of LMA discovery" --> "Some LMA discovery"

OK.

> 
> "caching of DNS responses effectively delay"
> --> "caching of DNS responses effectively delays"

OK.

> 
> "caching times out" --> "cached data times out"

OK.

> 
> "Obviously, too low" --> "Low"

OK.

> - "Obviously" is a red flag word
> - "too low" ... as measured by what standard?

Good concern. I'll remove "obviously".


> 
> "Another alternative could that MAG uses, for example,"
> --> "Alternatively, the MAG could use (for example)"

OK.

> 
> "(assuming the MAG has e.g.
>   learned a group of LMA FQDNs via SRV [RFC2782] query)"
> Shouldn't this solution be described in a previous
> section, like the other solutions?

Hmm.. could be. However, I rather keep it here.


> 
>>   Once the MN completes its initial attachment to a PMIPv6 domain, the
>>   information about the LMA that is selected to serve the MN is stored
>>   in the Policy Store (or the AAA server).  The LMA information is
>>   conveyed to the policy store by the LMA after the initial attachment
>>   is completed [I-D.ietf-dime-pmip6].  Typically AAA infrastructure is
>>   used for exchanging information between the LMA and the Policy Store.
> 
> Here is another reference to the Policy Store.  But it
> really boils down to provisioning.  So it would be better
> to avoid referencing Policy.

Policy Store is RFC5312 terminology.. and used to hold above information.

> 
> Isn't it dangerous to have the MN's IP address potentially
> routed to any one of several LMAs?  Or, if the MN's IP address
> determines the LMA, why not return the single LMA that routes
> the IP address given to the MN?
> 
> The suggested approach seems far more complicated than
> necessary.

Once the LMA has been selected, the MN is assigned with its HNP by the selected LMA. I don't see a problem here.

> 
> "the MAG and the LMA belong belong to the same PMIPv6 domain"
> -- Was this ever stated in the preceding part of the document?

s/belong belong/belong

The PMIPv6 domain assumption comes as-is from RFC5213.


> 
> =========================================================================
> 
> Regards,
> Charlie P.

Thanks again,
	Jouni


> 
> _______________________________________________
> netlmm mailing list
> netlmm@ietf.org
> https://www.ietf.org/mailman/listinfo/netlmm