Re: snmpv2 Will it flood us or be slow

karl@mel-brooks.tgv.com Tue, 12 October 1993 22:18 UTC

Received: from ietf.nri.reston.va.us by IETF.CNRI.Reston.VA.US id aa00937; 12 Oct 93 18:18 EDT
Received: from CNRI.RESTON.VA.US by IETF.CNRI.Reston.VA.US id aa00932; 12 Oct 93 18:18 EDT
Received: from JArthur.CS.HMC.Edu by CNRI.Reston.VA.US id aa22000; 12 Oct 93 18:18 EDT
Received: from jarthur by jarthur.Claremont.EDU id ab27075; 12 Oct 93 13:00 PDT
Received: from lists.psi.com by jarthur.Claremont.EDU id aa26091; 12 Oct 93 12:51 PDT
Received: by lists.psi.com (4.1/SMI-4.1.2-PSI) id AA27718; Tue, 12 Oct 93 15:29:59 EDT
Return-Path: <karl@Mel-Brooks.TGV.COM>
Received: from psi.com by lists.psi.com (4.1/SMI-4.1.2-PSI) id AA27663; Tue, 12 Oct 93 15:29:35 EDT
Received: from TGV.COM (HQ.TGV.COM) by psi.com (4.1/2.1-PSI/PSINet) id AA10523; Tue, 12 Oct 93 15:30:13 EDT
Received: from mel-brooks.empirical.com ([161.44.128.66]) by TGV.COM via INTERNET ; Tue, 12 Oct 93 12:29:46 PDT
Received: from karl.mel-brooks by mel-brooks.empirical.com (4.1/SMI-4.1) id AA11078; Tue, 12 Oct 93 12:30:03 PDT
Date: Tue, 12 Oct 93 12:30:03 PDT
Message-Id: <9310121930.AA11078@mel-brooks.empirical.com>
To: kasten@ftp.com
Cc: feit@tigger.jvnc.net, snmp@psi.com
In-Reply-To: Frank Kastenholz's message of Tue, 12 Oct 93 09:40:41 -0400 <9310121340.AA26204@ftp.com>
Subject: Re: snmpv2 Will it flood us or be slow
Reply-To: karl@empirical.com
X-Orig-Sender: karl@mel-brooks.tgv.com
Sender: ietf-archive-request@IETF.CNRI.Reston.VA.US
From: karl@mel-brooks.tgv.com
Repository: empirical.com
Originating-Client: mel-brooks

Hi -- Despite some of my statements, I really am a fan of V2.  I sort
of look at V2 as the artist did the block of marble -- somewhere
inside that large block of stone is a beautiful statue waiting to be
exposed.  We just need to chip off the excess...

 >    > My view of V2 is that it is more like the Social Security
 >    > Administration -- an administrative nightmare that has far more
 >    > administrative framework that is reasonable to do a simple job.
 >
 >   It seems to me that IF you want
 >   all the things in V2 THEN you must "pay the price" however, if you do
 >   not want some stuff then you do not need to configure that stuff.

If you draw a graph of agent complexity versus agent capabilitie, you
won't see a nice straight line.  Rather you will see a major step
function.  If you want authenticated transactions (the lack of which
is the purported reason why few SET requests have ever been issued in
real-life) then there is an extremely large increment in the
complexity which must be active in an agent.

After all the years of people saying that the reason they don't do SET
requests is because of lack of authentication, is it realistic to
believe that agents are going to now avoid bearing the cost of
authentication?  Of course not, any device which accepts Set requests
is going to authenticate them.  And we all admit that it will be a
significant incremental cost to use this one, all important feature.

 >   Furthermore, if your agent-system does not need something then do not
 >   implement it and constrain the configuration interfaces (MIBs, consoles,
 >   etc) accordingly -- if you feel that you do not need privacy in your
 >   agent then A) do not implement DES and B) don't allow someone to
 >   set the partyPrivProtocol to anything other than noPriv".

The privacy protocol is actually the easier part of things.  It's the
authentication, the views, the access lists that is the real pain.
All those internal mib-cross references that must be maintained.

All those MIB data structures will exist, need to be initialized, need
to be maintained, need to be handled in case they become inconsistent.

(BTW -- the fact that the choice of protocol, i.e. noPriv,
paryPrivProtocl, etc., is expressed as a variable-lengh, multiple byte
OID rather than a simple enumerated byte is an example of the silly
extent the protocol has gone to accomodate any and all unforeseeable
changes.)

 >    > My concern is that the management of SNMPv2 itself will turn out to be
 >    > painfully large; that a significant part of the work of managing a
 >    > network will be used to manage the management system.
 >
 >   If and Only If you want to use all the goop.

I want to use only a tiny dab of the goop, authentication, and the
cost of that little piece is very large.  And much of reason why that
cost is so large is that the basic function of authentication --
proving that the sender of a packet is truely who he purports to be --
is has been bound up with access lists, views and the like.

Yes, I can define parties with views and access lists that are pretty
short and all inclusive.  But that means that the agent must have the
mechanisms to deal with those.  And it means that those administrative
MIB elements must be managed and maintaned.

 >    > Indeed, I have substantial concerns that SNMPv2 party mib
 >    > misconfigurations and mis-implementations will result in a overall
 >    > *decrease* in network stability.
 >
 >   Yup -- and filling out your tax forms incorrectly will result in an
 >   overall decrease in your financial stability :-) The point is that
 >   we have a need for powerful capabilities -- privacy, authentication,
 >   views, access policies, and so on. Now, ASSUMING that this need is
 >   genuine then we need the facilities and capabilities in SNMPv2
 >   configuration. 

I really disagree here.  I find that SNMPv2, just like CMIP, is a
basket into which everybody threw their favorite hobbyhorse.  CMIP has
scoping and filters.  V2 has access lists and views.  CMIP has linked
replies.  SNMPv2 has proxy mibs.  SNMPV2 has row creation.  CMIP has
create/delete primitives.  CMIP has GDMO.  SNMPv2 has "textual
conventions".  And the list goes on.

Neither protocol was engineered against a well articulated statement
of requirements, as a consequence, both protocols are obese.  There
was no statement of goals to say whether the benefit of say, for
example, instance level granularity, was worth the cost to the
community or was simply useful to a small community.

As Simon Hacket put it: All we wanted out of V2 was a way to safely do
Sets.  Instead of the racehorse we wanted, we got a camel -- a
horse designed by a committee -- which is big, slow, smells bad, and
spits, although it will do well on extremely sandy racetracks.

In V2 we have a system which invites misuse and mis-configuration.
Tax forms at least have internal cross checks and are easily audited
for simple computing errors.  The V2 administrative framework is
highly subject to pollution from a single implementation or
operational error.

 >    > I have already seen network gear fail because of SNMPv1 implementation
 >    > bugs.  So I am not optimimistic.
 >
 >   Implementation is different than operation/configuration. 

That's not a very useful distinction.

When I am out in the field trying to get something to work, I don't
care whether it is the implementation or the specification.  If the
box doesn't work, it doesn't work.

			--karl--