[SAFE] SAFE BoF in Vancouver

Colin Perkins <csp@csperkins.org> Fri, 16 November 2007 13:59 UTC

Return-path: <safe-bounces@ietf.org>
Received: from [127.0.0.1] (helo=stiedprmman1.va.neustar.com) by megatron.ietf.org with esmtp (Exim 4.43) id 1It1je-000271-1m; Fri, 16 Nov 2007 08:59:54 -0500
Received: from safe by megatron.ietf.org with local (Exim 4.43) id 1It1jd-00024X-3f for safe-confirm+ok@megatron.ietf.org; Fri, 16 Nov 2007 08:59:53 -0500
Received: from [10.90.34.44] (helo=chiedprmail1.ietf.org) by megatron.ietf.org with esmtp (Exim 4.43) id 1It1jX-0001u0-Dc; Fri, 16 Nov 2007 08:59:47 -0500
Received: from mr1.dcs.gla.ac.uk ([130.209.249.184]) by chiedprmail1.ietf.org with esmtp (Exim 4.43) id 1It1jW-0001Rq-P3; Fri, 16 Nov 2007 08:59:47 -0500
Received: from mangole.dcs.gla.ac.uk ([130.209.247.112]:55087) by mr1.dcs.gla.ac.uk with esmtpsa (TLSv1:AES128-SHA:128) (Exim 4.42) id 1It1jV-00053Y-UC; Fri, 16 Nov 2007 13:59:45 +0000
Mime-Version: 1.0 (Apple Message framework v752.2)
Content-Type: text/plain; charset="US-ASCII"; delsp="yes"; format="flowed"
Message-Id: <351D0D85-DE60-4F47-8D16-E61B6799EC79@csperkins.org>
Content-Transfer-Encoding: 7bit
From: Colin Perkins <csp@csperkins.org>
Date: Fri, 16 Nov 2007 13:59:53 +0000
To: ietf@ietf.org
X-Mailer: Apple Mail (2.752.2)
X-Spam-Score: 0.0 (/)
X-Scan-Signature: 0fa76816851382eb71b0a882ccdc29ac
Cc: safe@ietf.org, "Isomaki Markus (Nokia-SIR/Espoo)" <Markus.Isomaki@nokia.com>
Subject: [SAFE] SAFE BoF in Vancouver
X-BeenThere: safe@ietf.org
X-Mailman-Version: 2.1.5
Precedence: list
Reply-To: safe@ietf.org
List-Id: Self-Address Fixing Evolution <safe.ietf.org>
List-Unsubscribe: <https://www1.ietf.org/mailman/listinfo/safe>, <mailto:safe-request@ietf.org?subject=unsubscribe>
List-Archive: <http://www1.ietf.org/pipermail/safe>
List-Post: <mailto:safe@ietf.org>
List-Help: <mailto:safe-request@ietf.org?subject=help>
List-Subscribe: <https://www1.ietf.org/mailman/listinfo/safe>, <mailto:safe-request@ietf.org?subject=subscribe>
Errors-To: safe-bounces@ietf.org

The following BoF has been proposed for the Vancouver IETF. There is  
a mailing list <safe@ietf.org> for discussion.

Colin




SAFE - Self-Address Fixing Evolution BoF
----------------------------------------

Chairs:
   Colin Perkins  (csp@csperkins.org)
   Markus Isomaki (Markus.Isomaki@nokia.com)

Mailing list:
   https://www1.ietf.org/mailman/listinfo/safe

Various NAT hole-punching techniques such as IPsec NAT traversal,  
Teredo, and STUN/ICE send periodic UDP keep-alive messages to keep  
their NAT binding alive.

However, a drawback of these techniques is their chattiness which is  
a result of the host application not knowing the NAT's binding  
lifetime (IPsec NAT traversal, STUN/ICE) or because the application  
is unable to extend the lifetime of the NAT's binding (Teredo).  The  
endpoint has to send periodic packets which consume power on battery  
powered devices, consume network bandwidth, and place an unnecessary  
load on servers.

There are two approaches to resolve the problem of chattiness. The  
first is to interact directly with the NAT using a NAT control  
protocol. Several of these protocols exist which unfortunately have  
different drawbacks:

   * incremental deployment is not possible with MIDCOM, NSIS-NSLP,
     UPnP IGD, or NAT-PMP.  With all of these protocols, both the NAT
     and the endpoint have to support the same protocol
   * nested NATs are not possible with UPnP IGD or NAT-PMP
   * topology awareness is required of MIDCOM
   * security must be established between the controlling entity and
     the NAT for MIDCOM and NSIS-NSLP
   * UPnP IGD uses broadcasts packets and NAT-PMP expects the NAT to be
     the default gateway; neither work well on routed networks

The second approach is to empirically test the NAT's binding  
lifetime, as done by Teredo. This can optimise the keep-alive traffic  
based on the NAT's binding lifetime, but cannot extend the duration  
of the binding lifetime. Also, empirical testing does not always give  
reliable results due to varying behaviour of NAT and firewall  
implementations.

This BoF is intended to discuss a newly-proposed technique for using  
STUN to discover, query and control firewalls and NATs, that can  
eliminate UDP
keep-alive traffic. The BoF will review the problem space and  
existing work, and decide if there is a need for new work in the  
area, and if the IETF is an appropriate home for that work. The  
intent is not to form a new working group at this time, but to gauge  
interest in work in this area, and consider an appropriate future  
home for that work.


Agenda:
    Introduction ...................................... (Chairs, 10)
    Problem statement and scope ......................... (Wing, 15)
    Survey of existing work ........................... (Barnes, 30)
       draft-eggert-middlebox-control-survey-01.txt
    NAT/Firewall control with STUN ...................... (Wing, 15)
       draft-wing-behave-nat-control-stun-usage-05.txt
    Discussion ................................................ (20)
    Future directions ................................. (Chairs, 30)


--
version: 1.5, 16-Nov-2007



_______________________________________________
SAFE mailing list
SAFE@ietf.org
https://www1.ietf.org/mailman/listinfo/safe