Re: [Pppext] FW: I-D Action:draft-huang-ipv6cp-options-00.txt

James Carlson <carlsonj@workingcode.com> Wed, 10 February 2010 14:17 UTC

Return-Path: <carlsonj@workingcode.com>
X-Original-To: pppext@core3.amsl.com
Delivered-To: pppext@core3.amsl.com
Received: from localhost (localhost [127.0.0.1]) by core3.amsl.com (Postfix) with ESMTP id DFAB93A76EC for <pppext@core3.amsl.com>; Wed, 10 Feb 2010 06:17:55 -0800 (PST)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -2.599
X-Spam-Level:
X-Spam-Status: No, score=-2.599 tagged_above=-999 required=5 tests=[BAYES_00=-2.599]
Received: from mail.ietf.org ([64.170.98.32]) by localhost (core3.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id tHbblIrs0inP for <pppext@core3.amsl.com>; Wed, 10 Feb 2010 06:17:54 -0800 (PST)
Received: from carlson.workingcode.com (carlsonj-pt.tunnel.tserv4.nyc4.ipv6.he.net [IPv6:2001:470:1f06:1d9::2]) by core3.amsl.com (Postfix) with ESMTP id DEFA33A76E6 for <pppext@ietf.org>; Wed, 10 Feb 2010 06:17:53 -0800 (PST)
Received: from [75.150.68.97] (carlson [75.150.68.97]) (authenticated bits=0) by carlson.workingcode.com (8.14.2+Sun/8.14.3) with ESMTP id o1AEIqbw013202 (version=TLSv1/SSLv3 cipher=DHE-RSA-AES256-SHA bits=256 verify=NO); Wed, 10 Feb 2010 09:18:52 -0500 (EST)
Message-ID: <4B72C04C.20906@workingcode.com>
Date: Wed, 10 Feb 2010 09:18:52 -0500
From: James Carlson <carlsonj@workingcode.com>
User-Agent: Mozilla/5.0 (X11; U; SunOS i86pc; en-US; rv:1.9.1.5) Gecko/20100103 Lightning/1.0b1 Thunderbird/3.0
MIME-Version: 1.0
To: "HUANG, JERRY (ATTLABS)" <zh1424@att.com>
References: <00b801caa542$5d9daec0$18d90c40$@net> <4B705B4E.6030405@workingcode.com> <2FFFD6E98F51BE43878BFED80215F83805512CB3@misout7msgusr7a.ugd.att.com> <4B7073C2.407@workingcode.com> <2FFFD6E98F51BE43878BFED80215F83805512E88@misout7msgusr7a.ugd.att.com> <4B7169A4.2090006@workingcode.com> <2FFFD6E98F51BE43878BFED80215F838055933F9@misout7msgusr7a.ugd.att.com>
In-Reply-To: <2FFFD6E98F51BE43878BFED80215F838055933F9@misout7msgusr7a.ugd.att.com>
Content-Type: text/plain; charset=ISO-8859-1
Content-Transfer-Encoding: 7bit
X-DCC-dmv.com-Metrics: carlson; whitelist
Cc: pppext@ietf.org
Subject: Re: [Pppext] FW: I-D Action:draft-huang-ipv6cp-options-00.txt
X-BeenThere: pppext@ietf.org
X-Mailman-Version: 2.1.9
Precedence: list
List-Id: PPP Extensions <pppext.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/listinfo/pppext>, <mailto:pppext-request@ietf.org?subject=unsubscribe>
List-Archive: <http://www.ietf.org/mail-archive/web/pppext>
List-Post: <mailto:pppext@ietf.org>
List-Help: <mailto:pppext-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/pppext>, <mailto:pppext-request@ietf.org?subject=subscribe>
X-List-Received-Date: Wed, 10 Feb 2010 14:17:56 -0000

On 02/10/10 02:02, HUANG, JERRY (ATTLABS) wrote:
>> From: James Carlson [mailto:carlsonj@workingcode.com]
>> Perhaps more importantly, the PPP-based mechanism described is a bit
>> less capable than the other mechanisms.  It's generally done once at
>> connection establishment time and provides little in the way of
>> customization mechanisms.  What happens if the parameters change while
>> the connection is running?  What if particular classes of clients need
>> different answers?  What if particular vendors or users need local
>> extensions to carry configuration information that's useful to them?
>> What if two DNS server addresses aren't right, but three are?
> 
> Given the scenario is PPP in L2TP, changes in parameters can be
> accommodated via L2TP control messages (CDN, etc) and allow the PPP
> session to be renegotiated, right?  Classes of users are accommodated
> via AAA (RADIUS) so different configuration parameters can be returned.
> Vendor-Specific-Attributes can probably handle local extensions.

RADIUS doesn't have client classes the way DHCP does, but that's perhaps
a minor point.

A larger point is that the scheme you're describing is actually a bit
worse.  There's no defined way for RADIUS to tell the client that
parameters need to be negotiated.  You'd have to invent some way of
telling PPP to restart from scratch -- because RADIUS depends on an
authentication session -- any time a parameter changed on the RADIUS
server.  Or you'd have to configure the PPP clients to do a restart
periodically just to check whether there are changes.

In contrast, DHCP obliges the clients to refresh their parameters
periodically, and (with v6) even includes an optional server-to-client
refresh mechanism.  In addition to that, DHCP doesn't require a new
round of authentication, nor does it involve tearing down the IP link
just to change a DNS server address.  The checks are "hitless."

Without RADIUS in the picture, and with the needed parameters somehow
present on the PPP "server," you'd still need to have IPCP restart,
which (for most implementations) would still cause an unnecessary link
bounce.  In some peers, though, layer restart is known to trigger bugs
that will cause link failure.  (Obviously not a specification issue, as
the spec is clear on what should happen, but a deployment issue none the
less.)

On top of that, DHCP is dirt cheap.  If all you need are configuration
parameters, then you just need DHCPv6 Information.  It's a UDP
request/response, without much in the way of overhead.

The "simplicity" argument in favor of new PPP options unfortunately also
runs into the usual counter-argument: computer capacity limitations
(even for the tiniest of embedded systems) are fleeting things in
comparison to the longevity of protocols.  We're still using the same
basic TCP/IP that was originally deployed in 1982.  Imagine if the
computer system limitations back then were encoded into the base protocols.

Again, the archive should be consulted here.  We've discussed at length
the problems in this concept when it's deployed outside of a walled
garden.  For essentially the same reason that it makes no sense to have
an Ethernet NIC caring about DNS addresses, it also makes no sense to
have PPP handling them.

>> more diverse Internet.  There's nothing particularly wrong with walled
>> gardens, but there's also little reason to standardize what they do,
> at
>> least within the IETF.  The protocols used there can be ad-hoc (or set
>> by some other standards group) without compromising the Internet
> itself.
> 
> I was thinking more in terms of dial network and (potential) RFC 5571
> implementation scenarios and attempted to extend the IPCP model for IPv4
> straight-forwardly to IPv6. IMHO, in those cases, IP address assignment
> by the NAS/LNS model could still make sense without invoking RA and/or
> DHCPv6 mechanisms. But I concede that in reality the proposal probably
> doesn't provide the benefits I was hoping to get, mainly because it adds
> to implementation requirements, instead of reducing them. 

Exactly.  For a robust and interoperable implementation, you'd actually
have to include both mechanisms.  It's only inside of the previously
mentioned walled gardens (where interoperability is tightly constrained)
that this can be safely ignored.  That makes it more complex.

Or as a wise IETF-er once said, a specification isn't complete when
there's nothing left to add, but rather not until there's nothing left
to remove.

-- 
James Carlson         42.703N 71.076W         <carlsonj@workingcode.com>