[v6tc] Tunnel endpoint discovery summary/tradeoffs
Pekka Savola <pekkas@netcore.fi> Wed, 22 December 2004 19:46 UTC
Received: from ietf-mx.ietf.org (ietf-mx.ietf.org [132.151.6.1])
by ietf.org (8.9.1a/8.9.1a) with ESMTP id OAA26574;
Wed, 22 Dec 2004 14:46:52 -0500 (EST)
Received: from megatron.ietf.org ([132.151.6.71])
by ietf-mx.ietf.org with esmtp (Exim 4.33)
id 1ChCbQ-0000p7-WE; Wed, 22 Dec 2004 14:56:58 -0500
Received: from localhost.localdomain ([127.0.0.1] helo=megatron.ietf.org)
by megatron.ietf.org with esmtp (Exim 4.32)
id 1ChCKv-0002s7-6a; Wed, 22 Dec 2004 14:39:53 -0500
Received: from odin.ietf.org ([132.151.1.176] helo=ietf.org)
by megatron.ietf.org with esmtp (Exim 4.32) id 1ChCGe-000752-J6
for v6tc@megatron.ietf.org; Wed, 22 Dec 2004 14:35:28 -0500
Received: from ietf-mx.ietf.org (ietf-mx.ietf.org [132.151.6.1])
by ietf.org (8.9.1a/8.9.1a) with ESMTP id OAA25961
for <v6tc@ietf.org>; Wed, 22 Dec 2004 14:35:26 -0500 (EST)
Received: from netcore.fi ([193.94.160.1])
by ietf-mx.ietf.org with esmtp (Exim 4.33) id 1ChCQJ-0000Wv-My
for v6tc@ietf.org; Wed, 22 Dec 2004 14:45:32 -0500
Received: from localhost (pekkas@localhost)
by netcore.fi (8.11.6/8.11.6) with ESMTP id iBMJYoa04931
for <v6tc@ietf.org>; Wed, 22 Dec 2004 21:34:50 +0200
Date: Wed, 22 Dec 2004 21:34:50 +0200 (EET)
From: Pekka Savola <pekkas@netcore.fi>
To: v6tc@ietf.org
Message-ID: <Pine.LNX.4.61.0412222107140.4066@netcore.fi>
MIME-Version: 1.0
Content-Type: TEXT/PLAIN; charset=US-ASCII; format=flowed
X-Spam-Score: 2.0 (++)
X-Scan-Signature: 4b800b1eab964a31702fa68f1ff0e955
Subject: [v6tc] Tunnel endpoint discovery summary/tradeoffs
X-BeenThere: v6tc@ietf.org
X-Mailman-Version: 2.1.5
Precedence: list
List-Id: v6tc.ietf.org
List-Unsubscribe: <https://www1.ietf.org/mailman/listinfo/v6tc>,
<mailto:v6tc-request@ietf.org?subject=unsubscribe>
List-Archive: <http://www1.ietf.org/pipermail/v6tc>
List-Post: <mailto:v6tc@ietf.org>
List-Help: <mailto:v6tc-request@ietf.org?subject=help>
List-Subscribe: <https://www1.ietf.org/mailman/listinfo/v6tc>,
<mailto:v6tc-request@ietf.org?subject=subscribe>
Sender: v6tc-bounces@ietf.org
Errors-To: v6tc-bounces@ietf.org
X-Spam-Score: 2.0 (++)
X-Scan-Signature: d8ae4fd88fcaf47c1a71c804d04f413d
Hi,
Below is my attempt to briefly summarize the situation with Tunnel
endpoint discovery analysis, and some next steps.
The most important document is draft-palet-v6ops-tun-auto-disc-02.txt.
1) It analyzes different mechanisms (proposed or existing) for
discovering the tunnel endpoint:
- anycast address methods
- various forms of DNS lookups (reverse DNS to be added)
- centralized omniscient brokers (not feasible)
- DHCPv4
* not really feasible: oesn't work through NAT boxes, or
unmodified DHCP servers
- PPP (PPP not always used, ban on new extensions)
- SLP
* doesn't look promising (can't depend on multicast, etc.)
The document maybe needs to better justify why existing solutions are
not sufficient (after all, there has been a LOT of work in the IETF
for service discovery in general).
2) It tries to describe the different scenarios how endpoint discovery
could happen. This needs revision and discussion. In summary there
are three options:
a) no discovery: always assume the client pre-configures the endpoint
information.
b) discovery at the visited ISP only (compare to MIPv6 RO),
or manually ("home agent" -like tunnel broker). The user/client
implemetation will have to pick preference:
1) first try local, if fails, try manual config
2) manual config first, then try local
3) only local or only manual config
This is a policy decision by the client, but no rocket science.
E.g., Microsoft's 6to4/ISATAP implementations work in a similar
manner this way.
c) discovery of the endpoint everywhere (like 6to4 anycast address).
This is likely very problematic both administratively, financially
and technically.
c) seems to be out of scope for this discovery mechanism.
There are three other relevant documents:
- draft-palet-v6ops-solution-tun-auto-disc-01.txt
- draft-yamamoto-naptr-service-discovery-00.txt
- draft-daniel-dhc-ipv6in4-opt-05.txt
The first describes a combination of potential mechanisms for
tunnel-endpoint discovery. This likely needs a lot of work and
trimming down, to just one mechanism. DNS lookups use forward tree.
The second describes using reverse DNS for service discovery.
The third describes DHCPv4 based solution, but very likely it won't be
a sufficient solution to the whole problem, and it may not be
productive to specify multiple ones.
At this point, the most important issue wrt. solutions is to
understand key implications between using forward DNS (using the DNS
search path) and reverse DNS (looking up information at your IP
address), but the tradeoffs will be analyzed at more depth in the
revision of draft-palet-v6ops-tun-auto-disc.
--
Pekka Savola "You each name yourselves king, yet the
Netcore Oy kingdom bleeds."
Systems. Networks. Security. -- George R.R. Martin: A Clash of Kings
_______________________________________________
v6tc mailing list
v6tc@ietf.org
https://www1.ietf.org/mailman/listinfo/v6tc
- [v6tc] Tunnel endpoint discovery summary/tradeoffs Pekka Savola
- Re: [v6tc] Tunnel endpoint discovery summary/trad… Alain Durand
- Re: [v6tc] Tunnel endpoint discovery summary/trad… Miguel Angel Diaz