Hi.

Below are my comments on the draft-ietf-dmm-requirements-03.

Overall, the draft has much to admire and agreeable on most points.
Kudos to the authors.


===================
Comment 1:

REQ2:  Transparency to Upper Layers when needed

>> I would like to suggest that DMM must provide transparency to upper layers 
>> for a limited time only when needed. Upper layer protocols or applications 
>> that are unaware of IP layer mobility and IP address changes cannot be 
>> supported indefinitely, without compromising the purpose of DMM. How much 
>> time is of course another matter, but that can be discussed during design or 
>> even dynamic.
In time, applications and upper layer protocols will have to be updated to 
handle IP address changes by reconnect or other means, as long as DMM provides 
temporary shield from packet losses or other disruptions and buy them time to 
make preparations.

====================
Comment 2:

REQ6:  Security considerations 

>> I think the requirements described here may give the impression that DMM 
>> excludes ephemeral security for the purpose of routing to the correct 
>> entities, but not necessarily tied to service authorizations or identities. 
>> Also, protection requirements beyond what current ISPs deal with for their 
>> access routers seem unnecessary. DMM's own security should be limited to 
>> risks that DMM adds to the access network, not the whole access network 
>> security.

=====================
Comment 3:
REQ7:  DMM should enable multicast solutions in flexible distribution scenario.

>> I lack the necessary knowledge on multicast but this seems like a feel-good 
>> statement without a point. I suggest to drop this requirement or make a 
>> clearer statement like "DMM should allow multicast to survive IP layer 
>> mobility without packet loss", or more modestly, "DMM should not foreclose 
>> multicast support during IP layer mobility.", etc..

====================
Comment 4:

5.  Security Considerations
   Distributed mobility management (DMM) requires two kinds of security
   considerations: First, access network security that only allows a
   legitimate mobile host/router to access the DMM service; Second, end-
   to-end security that protects signaling messages for the DMM service.

>> Related to my Comment 2, "access network security" is confusing here, as it 
>> often means allowing access to the network to begin with. DMM must assume 
>> that is already done at least in the lower layer or even IP layer. It may or 
>> may not offer DMM service to anyone or only to authorized devices/users. I 
>> think DMM must cover the situation where the service is offered to anything 
>> that asks for it, while ensuring the packets are not redirected to wrong 
>> directions.

===================

Bests.

Byoung-Jo "J" Kim
AT&T Labs - Research
https://sites.google.com/site/macsbug/


On Apr 10, 2013, at 3:19 AM, Jouni Korhonen wrote:

> Folks,
> 
> This mail starts a two week WGLC #2 for draft-ietf-dmm-requirements-03.
> The issues, even editorials, must be recorded into the Issue Tracker,
> otherwise they are likely to be neglected. We require minimum three
> reviews (that are more than one liners). The more the better, though.
> 
> The WGLC ends on Wednesday 24rd April.
> 
> - Jouni & Julien
> _______________________________________________
> dmm mailing list
> [email protected]
> https://www.ietf.org/mailman/listinfo/dmm

_______________________________________________
dmm mailing list
[email protected]
https://www.ietf.org/mailman/listinfo/dmm

Reply via email to