[NSIS] GIST over GIST-unaware NATs

Xiaoming Fu <fu@cs.uni-goettingen.de> Wed, 11 October 2006 19:49 UTC

Received: from [127.0.0.1] (helo=stiedprmman1.va.neustar.com) by megatron.ietf.org with esmtp (Exim 4.43) id 1GXk5D-0003Pj-CG; Wed, 11 Oct 2006 15:49:39 -0400
Received: from [10.91.34.44] (helo=ietf-mx.ietf.org) by megatron.ietf.org with esmtp (Exim 4.43) id 1GXk5B-0003Pb-Hq for nsis@ietf.org; Wed, 11 Oct 2006 15:49:37 -0400
Received: from mailer.gwdg.de ([134.76.10.26]) by ietf-mx.ietf.org with esmtp (Exim 4.43) id 1GXk5A-0007y4-7z for nsis@ietf.org; Wed, 11 Oct 2006 15:49:37 -0400
Received: from [210.72.28.251] (helo=[172.31.13.12]) by mailer.gwdg.de with esmtpsa (TLSv1:RC4-MD5:128) (Exim 4.60) (envelope-from <fu@cs.uni-goettingen.de>) id 1GXk55-000588-5H for nsis@ietf.org; Wed, 11 Oct 2006 21:49:34 +0200
Message-ID: <452D4AC5.4010806@cs.uni-goettingen.de>
Date: Wed, 11 Oct 2006 21:49:25 +0200
From: Xiaoming Fu <fu@cs.uni-goettingen.de>
Organization: University of Goettingen, Germany
User-Agent: Thunderbird 1.5.0.7 (Windows/20060909)
MIME-Version: 1.0
To: "nsis@ietf.org" <nsis@ietf.org>
Content-Type: text/plain; charset="ISO-8859-1"; format="flowed"
Content-Transfer-Encoding: 7bit
X-Authenticated-Id: xfu
X-Virus-Scanned: (clean) by exiscan+sophie
X-Spam-Score: 0.5 (/)
X-Scan-Signature: 798b2e660f1819ae38035ac1d8d5e3ab
Subject: [NSIS] GIST over GIST-unaware NATs
X-BeenThere: nsis@ietf.org
X-Mailman-Version: 2.1.5
Precedence: list
List-Id: Next Steps in Signaling <nsis.ietf.org>
List-Unsubscribe: <https://www1.ietf.org/mailman/listinfo/nsis>, <mailto:nsis-request@ietf.org?subject=unsubscribe>
List-Post: <mailto:nsis@ietf.org>
List-Help: <mailto:nsis-request@ietf.org?subject=help>
List-Subscribe: <https://www1.ietf.org/mailman/listinfo/nsis>, <mailto:nsis-request@ietf.org?subject=subscribe>
Errors-To: nsis-bounces@ietf.org

Hi all,

There were some IESG discussions on GIST over GIST-unaware NATs.  I
read through draft-pashalidis-nsis-gist-legacynats-00 and found it makes
a number of clarifications on this issue:

- The presence of a GIST-unaware NAT can be detected by comparing 
headers of the GIST query-response procedure message in the two adjacent
non-NAT GIST nodes.

- Upon the detection of such a NAT (and affiliated rules), these two 
GIST nodes can then establish a UDP tunnel between them, and encapsulate 
the GIST messages (query-response-...) into the tunnel, and the outgoing 
tunnel endpoints decapsulate the messages into the desired format.

- The draft also gives detailed description on GIST signaling and data 
traffic processing in both the case where a NAT is located close to the 
NI and the case where a NAT is close to the NR. The rationale looks fine 
to me. If there is an implementation demoing this, it would be even nicer.

What do others think?
Xiaoming

_______________________________________________
nsis mailing list
nsis@ietf.org
https://www1.ietf.org/mailman/listinfo/nsis