[v6tc] Tunnel endpoint discovery summary/tradeoffs

Pekka Savola <pekkas@netcore.fi> Wed, 22 December 2004 19:46 UTC

Received: from ietf-mx.ietf.org (ietf-mx.ietf.org [132.151.6.1]) by ietf.org (8.9.1a/8.9.1a) with ESMTP id OAA26574; Wed, 22 Dec 2004 14:46:52 -0500 (EST)
Received: from megatron.ietf.org ([132.151.6.71]) by ietf-mx.ietf.org with esmtp (Exim 4.33) id 1ChCbQ-0000p7-WE; Wed, 22 Dec 2004 14:56:58 -0500
Received: from localhost.localdomain ([127.0.0.1] helo=megatron.ietf.org) by megatron.ietf.org with esmtp (Exim 4.32) id 1ChCKv-0002s7-6a; Wed, 22 Dec 2004 14:39:53 -0500
Received: from odin.ietf.org ([132.151.1.176] helo=ietf.org) by megatron.ietf.org with esmtp (Exim 4.32) id 1ChCGe-000752-J6 for v6tc@megatron.ietf.org; Wed, 22 Dec 2004 14:35:28 -0500
Received: from ietf-mx.ietf.org (ietf-mx.ietf.org [132.151.6.1]) by ietf.org (8.9.1a/8.9.1a) with ESMTP id OAA25961 for <v6tc@ietf.org>; Wed, 22 Dec 2004 14:35:26 -0500 (EST)
Received: from netcore.fi ([193.94.160.1]) by ietf-mx.ietf.org with esmtp (Exim 4.33) id 1ChCQJ-0000Wv-My for v6tc@ietf.org; Wed, 22 Dec 2004 14:45:32 -0500
Received: from localhost (pekkas@localhost) by netcore.fi (8.11.6/8.11.6) with ESMTP id iBMJYoa04931 for <v6tc@ietf.org>; Wed, 22 Dec 2004 21:34:50 +0200
Date: Wed, 22 Dec 2004 21:34:50 +0200 (EET)
From: Pekka Savola <pekkas@netcore.fi>
To: v6tc@ietf.org
Message-ID: <Pine.LNX.4.61.0412222107140.4066@netcore.fi>
MIME-Version: 1.0
Content-Type: TEXT/PLAIN; charset=US-ASCII; format=flowed
X-Spam-Score: 2.0 (++)
X-Scan-Signature: 4b800b1eab964a31702fa68f1ff0e955
Subject: [v6tc] Tunnel endpoint discovery summary/tradeoffs
X-BeenThere: v6tc@ietf.org
X-Mailman-Version: 2.1.5
Precedence: list
List-Id: v6tc.ietf.org
List-Unsubscribe: <https://www1.ietf.org/mailman/listinfo/v6tc>, <mailto:v6tc-request@ietf.org?subject=unsubscribe>
List-Archive: <http://www1.ietf.org/pipermail/v6tc>
List-Post: <mailto:v6tc@ietf.org>
List-Help: <mailto:v6tc-request@ietf.org?subject=help>
List-Subscribe: <https://www1.ietf.org/mailman/listinfo/v6tc>, <mailto:v6tc-request@ietf.org?subject=subscribe>
Sender: v6tc-bounces@ietf.org
Errors-To: v6tc-bounces@ietf.org
X-Spam-Score: 2.0 (++)
X-Scan-Signature: d8ae4fd88fcaf47c1a71c804d04f413d

Hi,

Below is my attempt to briefly summarize the situation with Tunnel 
endpoint discovery analysis, and some next steps.

The most important document is draft-palet-v6ops-tun-auto-disc-02.txt.

1) It analyzes different mechanisms (proposed or existing) for 
discovering the tunnel endpoint:
   - anycast address methods
   - various forms of DNS lookups (reverse DNS to be added)
   - centralized omniscient brokers (not feasible)
   - DHCPv4
     * not really feasible: oesn't work through NAT boxes, or
       unmodified DHCP servers
   - PPP (PPP not always used, ban on new extensions)
   - SLP
     * doesn't look promising (can't depend on multicast, etc.)

The document maybe needs to better justify why existing solutions are 
not sufficient (after all, there has been a LOT of work in the IETF 
for service discovery in general).

2) It tries to describe the different scenarios how endpoint discovery 
could happen.  This needs revision and discussion.  In summary there 
are three options:

  a) no discovery: always assume the client pre-configures the endpoint
     information.
  b) discovery at the visited ISP only (compare to MIPv6 RO),
     or manually ("home agent" -like tunnel broker).  The user/client
     implemetation will have to pick preference:
      1) first try local, if fails, try manual config
      2) manual config first, then try local
      3) only local or only manual config
     This is a policy decision by the client, but no rocket science.
     E.g., Microsoft's 6to4/ISATAP implementations work in a similar
     manner this way.
  c) discovery of the endpoint everywhere (like 6to4 anycast address).
     This is likely very problematic both administratively, financially
     and technically.

  c) seems to be out of scope for this discovery mechanism.


There are three other relevant documents:
  - draft-palet-v6ops-solution-tun-auto-disc-01.txt
  - draft-yamamoto-naptr-service-discovery-00.txt
  - draft-daniel-dhc-ipv6in4-opt-05.txt

The first describes a combination of potential mechanisms for 
tunnel-endpoint discovery.  This likely needs a lot of work and 
trimming down, to just one mechanism.  DNS lookups use forward tree.

The second describes using reverse DNS for service discovery.

The third describes DHCPv4 based solution, but very likely it won't be 
a sufficient solution to the whole problem, and it may not be 
productive to specify multiple ones.

At this point, the most important issue wrt. solutions is to 
understand key implications between using forward DNS (using the DNS 
search path) and reverse DNS (looking up information at your IP 
address), but the tradeoffs will be analyzed at more depth in the 
revision of draft-palet-v6ops-tun-auto-disc.

-- 
Pekka Savola                 "You each name yourselves king, yet the
Netcore Oy                    kingdom bleeds."
Systems. Networks. Security. -- George R.R. Martin: A Clash of Kings

_______________________________________________
v6tc mailing list
v6tc@ietf.org
https://www1.ietf.org/mailman/listinfo/v6tc