Re: [Softwires] AD review of draft-ietf-softwire-dual-stack-lite (part 2)

"Yiu L. Lee" <yiu_lee@cable.comcast.com> Wed, 18 August 2010 12:52 UTC

Return-Path: <yiu_lee@cable.comcast.com>
X-Original-To: softwires@core3.amsl.com
Delivered-To: softwires@core3.amsl.com
Received: from localhost (localhost [127.0.0.1]) by core3.amsl.com (Postfix) with ESMTP id 5EB693A693E for <softwires@core3.amsl.com>; Wed, 18 Aug 2010 05:52:44 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -99.204
X-Spam-Level:
X-Spam-Status: No, score=-99.204 tagged_above=-999 required=5 tests=[AWL=0.463, BAYES_00=-2.599, HELO_MISMATCH_COM=0.553, HOST_MISMATCH_NET=0.311, RCVD_NUMERIC_HELO=2.067, USER_IN_WHITELIST=-100]
Received: from mail.ietf.org ([64.170.98.32]) by localhost (core3.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id 4BpM2p4eV3uB for <softwires@core3.amsl.com>; Wed, 18 Aug 2010 05:52:43 -0700 (PDT)
Received: from cable.comcast.com (copdcimo01.potomac.co.ndcwest.comcast.net [76.96.32.251]) by core3.amsl.com (Postfix) with ESMTP id 1FEF23A68A0 for <softwires@ietf.org>; Wed, 18 Aug 2010 05:52:42 -0700 (PDT)
Received: from ([147.191.124.13]) by copdcimo01.cable.comcast.com with ESMTP with TLS id 5503630.6762504; Wed, 18 Aug 2010 06:58:34 -0600
Received: from PAOAKEXCSMTP02.cable.comcast.com (10.52.116.31) by copdcexhub02.cable.comcast.com (147.191.124.13) with Microsoft SMTP Server id 14.0.702.0; Wed, 18 Aug 2010 06:53:14 -0600
Received: from PACDCEXCMB04.cable.comcast.com ([24.40.15.86]) by PAOAKEXCSMTP02.cable.comcast.com with Microsoft SMTPSVC(6.0.3790.4675); Wed, 18 Aug 2010 08:53:14 -0400
Received: from 69.241.25.0 ([69.241.25.0]) by PACDCEXCMB04.cable.comcast.com ([24.40.15.86]) via Exchange Front-End Server legacywebmail.comcast.com ([24.40.8.152]) with Microsoft Exchange Server HTTP-DAV ; Wed, 18 Aug 2010 12:53:13 +0000
User-Agent: Microsoft-Entourage/12.26.0.100708
Date: Wed, 18 Aug 2010 08:53:10 -0400
From: "Yiu L. Lee" <yiu_lee@cable.comcast.com>
To: Jari Arkko <jari.arkko@piuha.net>, draft-ietf-softwire-dual-stack-lite@tools.ietf.org, softwires@ietf.org
Message-ID: <C8914FF6.30BB4%yiu_lee@cable.comcast.com>
Thread-Topic: [Softwires] AD review of draft-ietf-softwire-dual-stack-lite (part 2)
Thread-Index: Acs+1E+e85vOnjuT7Eq/wzSsk+mImA==
In-Reply-To: <4C6A6AEE.70409@piuha.net>
MIME-Version: 1.0
Content-Type: text/plain; charset="US-ASCII"
Content-Transfer-Encoding: 7bit
X-OriginalArrivalTime: 18 Aug 2010 12:53:14.0144 (UTC) FILETIME=[52175200:01CB3ED4]
Subject: Re: [Softwires] AD review of draft-ietf-softwire-dual-stack-lite (part 2)
X-BeenThere: softwires@ietf.org
X-Mailman-Version: 2.1.9
Precedence: list
List-Id: softwires wg discussion list <softwires.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/listinfo/softwires>, <mailto:softwires-request@ietf.org?subject=unsubscribe>
List-Archive: <http://www.ietf.org/mail-archive/web/softwires>
List-Post: <mailto:softwires@ietf.org>
List-Help: <mailto:softwires-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/softwires>, <mailto:softwires-request@ietf.org?subject=subscribe>
X-List-Received-Date: Wed, 18 Aug 2010 12:52:44 -0000

Hi Arkko,

> Technical:
> 
> I wonder if the draft should say something more about MTU handling. In
> particular, should it attempt to inform clients on its inner interface
> of the real MTU so that fragmentation is not needed. Here's what RFC
> 5844 said in a very similar situation.
> 
>    o  The DHCPOFFER message [RFC2131] sent to the mobile node MUST
>       include the Interface MTU option [RFC2132].  The DHCP servers in
>       the Proxy Mobile IPv6 domain MUST be configured to include the
>       Interface MTU option.  The MTU value SHOULD reflect the tunnel MTU
>       for the bidirectional tunnel between the mobile access gateway and
>       the local mobility anchor.
> 
> (Though I wonder if this text is right either, as presumably you have to
> ask for options before handing them out...)
> 
[YL] I don't object the adding the text to the section.

>> 8.1. NAT pool
>> 
>> 
>> AFTRs MAY operate distinct, non overlapping NAT pools.  Those NAT
>> pools do not have to be continuous.
> 
> This text is unclear. Are you talking about different AFTRs operating
> with different sets of public address pools? Or one AFTR running for
> some set of clients, using a number of different address pools? Or
> assigning a public address for one client from different pools for
> different connections? These are all different, and I think you mean the
> second alternative but I'm not sure.
> 
> Please specify.
> 
We are talking about the second alternative. The idea is the AFTR can have
multiple NAT pools. For example, a AFTR can have two interfaces. Each
interface will have a disjoint pool NAT assigned to it. In other case, a
policy can apply to the AFTR that a set of B4s will use NAT pool 1 and a
different set of B4s will use NAT pool 2. From the specification point of
view, all we say is that the AFTR must not share any overlapping NAT pools.


>> The AFTR should only perform a minimum number of ALG for the classic
>> applications such as FTP, RTSP/RTP, IPsec and PPTP VPN pass-through
>> and enable the users to use their own ALG on statically or
>> dynamically reserved ports instead.
>>   
> 
> First off, shouldn't this be written as "... should only implement a
> minimum ..."
> 
> The more substantial comment is that the recommendation is very weak. I
> do not know if the application list above is complete or if I am
> expected to implement additional ALGs. Secondly, are there RFCs that we
> can point to for these ALGs? Finally, I do not know how to provide the
> use-own-alg functionality. But I'm reading on, maybe its described later
> in the document.
>
[YL] Like what you said, the list isn't complete. I also agree that it is
unclear to the implementer to know what ALG is needed. Perhaps we can
replace the text in the following:

"AFTR performs NAT-44 and inherits the limitations of NAT. Some protocols
required ALGs in the NAT device to traverse through the NAT. For example:
SIP and ICMP require ALG to work properly. ALGs consume resources and there
are many different types of ALGs. The AFTR is a shared network device that
supports a large number of B4 elements. It is impossible for the AFTR to
implement all the current and future ALGs. This specification only requires
the AFTR must support ALG for ICMP. Implementers can decide to implement
other ALGs in their implementations."
 
>> There is an important operational difference if those N ports are
>> pre-allocated in a cookie-cutter fashion versus allocated on demand
>> by incoming connections.  This is a difference between an average of
>> N ports and a maximum of N ports.  Several service providers have
>> reported an average number of connections per customer in the single
>> digits.  At the opposite end, thousands or tens of thousands of ports
>> could be use in a peak by any single customer browsing a number of
>> AJAX/Web 2.0 sites.
>>   
> 
> Is your argument assuming a traditional web browsing usage model, i.e..,
> that users actively use an application and that the computer sits idle
> at other times? I am not sure this the model we have going forward. Many
> popular applications are starting to update content and perform various
> actions even when the browser sits idle, for instance. I think there
> will still be a difference between average and maximum, though it is
> perhaps not as pronounced over the time dimension but could still be
> very visible between users.
> 
[YL] According to last week discussion in the mailing list, Alain suggested
to remove 8.4 and Appendix C altogether.


>> In order to achieve higher address space reduction ratios, it is
>> recommended that service provider do not use this cookie-cutter
>> approach, and, on the contrary, allocate ports as dynamically as
>> possible, just like on a regular NAT.
> 
> Given the above, perhaps the text should warn that in order for this
> trick to work at all, there really has to be a difference either in the
> between-users or the time dimension, and that trends in networking may
> easily reduce either one.
> 
>> When dynamic port assignment is used to maximize the number of
>> subscribers sharing the AFTR global IPv4 addresses, the AFTR should
>> implement checks to avoid DOS attack through exhaustion of available
>> ports.  
> 
> How?
> 
[YL] This will be removed in next revision.

> Editorial:
> 
> 
>>    In broadband home networks, sometime devices are directly connected
> 
> Sometimes? Some devices?
> 
>> Under this scenario, the customer device is a dual-stack capable host
>>    that is only provisioned by the service provider only with IPv6.
> 
> Would this be better: "... is provisioned by the service provider only
> with IPv6"?
> 
We will make these editorial changes in next revision.

Thanks,
Yiu