Re: [shara] Updated BOF proposal
<teemu.savolainen@nokia.com> Fri, 30 January 2009 12:35 UTC
Return-Path: <shara-bounces@ietf.org>
X-Original-To: shara-archive@ietf.org
Delivered-To: ietfarch-shara-archive@core3.amsl.com
Received: from [127.0.0.1] (localhost [127.0.0.1]) by core3.amsl.com (Postfix)
with ESMTP id D17313A68B9; Fri, 30 Jan 2009 04:35:59 -0800 (PST)
X-Original-To: shara@core3.amsl.com
Delivered-To: shara@core3.amsl.com
Received: from localhost (localhost [127.0.0.1]) by core3.amsl.com (Postfix)
with ESMTP id B62053A6B34 for <shara@core3.amsl.com>;
Fri, 30 Jan 2009 04:35:58 -0800 (PST)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -6.599
X-Spam-Level:
X-Spam-Status: No, score=-6.599 tagged_above=-999 required=5 tests=[AWL=0.000,
BAYES_00=-2.599, RCVD_IN_DNSWL_MED=-4]
Received: from mail.ietf.org ([64.170.98.32]) by localhost (core3.amsl.com
[127.0.0.1]) (amavisd-new, port 10024) with ESMTP id WeDt3khkFTYZ for
<shara@core3.amsl.com>; Fri, 30 Jan 2009 04:35:54 -0800 (PST)
Received: from mgw-mx06.nokia.com (smtp.nokia.com [192.100.122.233]) by
core3.amsl.com (Postfix) with ESMTP id E65A03A68B9 for <shara@ietf.org>;
Fri, 30 Jan 2009 04:35:53 -0800 (PST)
Received: from vaebh106.NOE.Nokia.com (vaebh106.europe.nokia.com
[10.160.244.32]) by mgw-mx06.nokia.com (Switch-3.2.6/Switch-3.2.6) with ESMTP
id n0UCZHrK001712; Fri, 30 Jan 2009 14:35:24 +0200
Received: from vaebh102.NOE.Nokia.com ([10.160.244.23]) by
vaebh106.NOE.Nokia.com with Microsoft SMTPSVC(6.0.3790.3959);
Fri, 30 Jan 2009 14:35:08 +0200
Received: from vaebh101.NOE.Nokia.com ([10.160.244.22]) by
vaebh102.NOE.Nokia.com with Microsoft SMTPSVC(6.0.3790.3959);
Fri, 30 Jan 2009 14:35:03 +0200
Received: from smtp.mgd.nokia.com ([65.54.30.5]) by vaebh101.NOE.Nokia.com
over TLS secured channel with Microsoft SMTPSVC(6.0.3790.3959);
Fri, 30 Jan 2009 14:34:58 +0200
Received: from nok-am1mhub-06.mgdnok.nokia.com (65.54.30.10) by
NOK-am1MHUB-01.mgdnok.nokia.com (65.54.30.5) with Microsoft SMTP Server (TLS)
id 8.1.291.1; Fri, 30 Jan 2009 13:34:58 +0100
Received: from NOK-EUMSG-01.mgdnok.nokia.com ([65.54.30.106]) by
nok-am1mhub-06.mgdnok.nokia.com ([65.54.30.10]) with mapi;
Fri, 30 Jan 2009 13:34:57 +0100
From: <teemu.savolainen@nokia.com>
To: <magnus.westerlund@ericsson.com>
Date: Fri, 30 Jan 2009 13:34:33 +0100
Thread-Topic: [shara] Updated BOF proposal
Thread-Index: AcmCx/lVv/GePSsuRb66I/498cU7SQACxQxQ
Message-ID: <18034D4D7FE9AE48BF19AB1B0EF2729F27E865B300@NOK-EUMSG-01.mgdnok.nokia.com>
References: <ZlzdcyDY1nt1@kRV1RHqY> <4982DA55.5080602@ericsson.com>
In-Reply-To: <4982DA55.5080602@ericsson.com>
Accept-Language: en-US
Content-Language: en-US
X-MS-Has-Attach:
X-MS-TNEF-Correlator:
acceptlanguage: en-US
MIME-Version: 1.0
X-OriginalArrivalTime: 30 Jan 2009 12:34:58.0259 (UTC)
FILETIME=[297FCA30:01C982D7]
X-Nokia-AV: Clean
Cc: shara@ietf.org
Subject: Re: [shara] Updated BOF proposal
X-BeenThere: shara@ietf.org
X-Mailman-Version: 2.1.9
Precedence: list
List-Id: Sharing of an IPv4 Address discussion list <shara.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/listinfo/shara>,
<mailto:shara-request@ietf.org?subject=unsubscribe>
List-Archive: <http://www.ietf.org/pipermail/shara>
List-Post: <mailto:shara@ietf.org>
List-Help: <mailto:shara-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/shara>,
<mailto:shara-request@ietf.org?subject=subscribe>
Content-Type: text/plain; charset="us-ascii"
Content-Transfer-Encoding: 7bit
Sender: shara-bounces@ietf.org
Errors-To: shara-bounces@ietf.org
Hi,
>I think this is an very important question that needs to be
>figured out about the scope. I think the description needs to
>be clear that it currently proposes an evaluate and pick phase
>on the solution.
I will clarify this to the proposal draft on Monday, with the comments received by that time.
At this point as far as I know the actual proposals are:
1) Transport layer protocol based multiplexing. There will be new draft early next week that combines and evolves draft-boucadair-dhc-port-range and draft-bajko-v6ops-port-restricted-ipaddr-assign, and which proposes using new DHCP options to achieve assignment of port-restricted IPv4 addresses (while of course other address assigning protocols could be extended as well)
2) SAM (draft-despres-sam)
3) IPv4 address + bits from Identification field (no draft)
>I think what technologies that are applicable to this is very
>depending on the problem one tries to solve. One of the big
>questions I have on the problem statement is what classes of
>legacy application you intended to support.
>
>Legacy client to sever application where the client towards
>the external uses an fractional address and which doesn't
>matter. Works fine with any allocation of address.
For this class of applications the benefits would be distribution of NAT to/toward edges instead of core. This is one of big benefits, I believe.
>Legacy application that have some IPv4 NAT traversal
>capabilities but still some specific requirements like
>particular port ranges or adjacent ports. Can they still work
>under a limited port range? Or do you need to capability to
>request and assign specific ports?
Generally these proposals would not provide all the benefits of IPv4, thus we recommend moving to IPv6 as fast as possible.
In worst case the legacy application would face the same environment as with any NATed access, as the port restricted IPv4 address can be hidden from these applications by host-internal NAT. Thus applications trying to utilize specific ports (like IANA assigned) or port ranges would face similar trouble as when trying to work with privacy addresses. Thus the proposals shuld not be making life more difficult for unmodified apps.
However, a modified application could gain at least following benefits over NATed address (on the drafts listed as reading there are probably more that I immediately recall):
- host a server in one of the allocated public ports (provided rendezvous protocols allow communication of port as well)
-> similar functionality is possible with UPnP/NAT-PMP, provided NAT allows control - which it always does not
- avoid use of STUN, as the public address would be known already
- perhaps fasten ICE procedures, if address candidate set would be smaller
- avoid sending of NAT-keepalives (may still need firewall keepalives..)
Now depending on proposal there is or is not possibility to get adjacent ports. I had forgotten that requirement of some real-time (right?) apps. I have never really understood why the adjacent port design was made - it makes implementations more complex. Is it to simplify creation of ALGs/firewall rules? That could be a problem to be sorted out.
Best regards,
Teemu
_______________________________________________
shara mailing list
shara@ietf.org
https://www.ietf.org/mailman/listinfo/shara
- [shara] Updated BOF proposal teemu.savolainen
- Re: [shara] Updated BOF proposal pierre.levis
- Re: [shara] Updated BOF proposal teemu.savolainen
- Re: [shara] Updated BOF proposal Magnus Westerlund
- Re: [shara] Updated BOF proposal teemu.savolainen