On Fri, 1 Mar 2002 [EMAIL PROTECTED] wrote:
>       Title           : Minimum Requirement of IPv6 for Low Cost Network 
>                           Appliance
>       Author(s)       : N. OKABE et al.
>       Filename        : draft-okabe-ipv6-lcna-minreq-01.txt
>       Pages           : 20
>       Date            : 28-Feb-02

A few comments in  addition to ones I sent for -00..

              Table 1. Resource restrictions of LCNA

   ===============+===============+==================+=======
                   Memory          CPU Performance    OS
   ===============+===============+==================+=======
    PC             >64MB           Pentium/64bits     Windows
   ---------------+---------------+------------------+-------
   PDA             2-8MB           RISC/32bits(50MHz) WinCE  
                                                      VxWorks
                                                      PalmOS 

==> I think it'd be policitally correct to _at least_ change 'Windows'
there to 'Any', and possibly add 'Others' to PDA section (e.g. I like
Linux and NetBSD on PDA's :-).

2.7 Security
    In Section 4 "Security for LCNA", we will regulate a baseline for
    guaranteeing that a minimum host can communicate securely. However,
    Denial of Service (DoS) and intrusion are out of scope.  So, we have
    to consider defending from DoS and/or intrusion in another place.   
    Also, the authentication of users is out of scope, because some     
    minimum hosts can omit a mechanism of user accounts.

==> intrusion out of scope?  What do you mean by that?
Auth?

2.8 Mobility support
    In this draft, we do not assume that LCNA itself moves on the
    network, but the processing from other nodes that operate as Mobile
    Nodes of Mobile IPv6 is mandatory.

==> I don't see why you force mobility but neglect security.

    - When it can recognize the extension header but does not support
      the options in it, it MUST perform error processing according to
          the option number.

==> you mean s/extension header/destination options header/?  There is no 
processing defined by option number for extension headers.

    [Receiving]
    A minimum host SHOULD recognize it as a Hop-by-Hop Options Header,
    and  perform the processing according to the option and option
    number in it. Because this option is used for signaling and router
    alert, in order to control routers on the path, all nodes on the  
    transmission path have to interpret this header but do not need to
    interpret all options in it.

==> I don't understand your reasoning for router alert; LCNA's aren't 
routers by definition :-)

3.1.2 Routing Header
    [Sending]
    Following 3.1, minimum hosts do not send packets with this extension
    header.

    [Receiving]
    RFC regulates that if the Segment Left field has non-zero value in
    this header, the node has to forward the packet to the next
    intermediate node, even when the node is a host. But in the case of
    a minimum host, this forwarding MAY be omitted and be treated as an
    unsupported extension header, because only intermediate nodes (such
    as routers) and the destination node have to interpret this header.

==> please see draft-savola-ipv6-rh-hosts-00.txt

    <Optional>
    One exception is when the minimum host supports the mobile node
    function of Mobile IPv6. As Mobile IPv6 uses a Routing header for
    receiving packets destined to Mobile Node, this header MUST be   
    processed correctly. Another exception for sending this header is
    when using route optimization for communicating with Mobile IPv6 
    mobility agents. If route optimization is performed using binding
    update, the node MUST send packets with these extension headers. 

==> mobile-ip wg chairs just decided that the consensus was to define a 
new routing header type for MIPv6, so LCNA's might only need to process 
type 2 RH's.

3.1.3 Fragment Header

    If a minimum host satisfies the following conditions, the host MAY
    not send this extension header, and MAY treat one as an unsupported
    header when receiving it.

==> I'm not sure what the robustness principle would say about hosts that 
cannot defragment.

3.1.4 Destination Options Header
    A minimum host SHOULD recognize this header as Destination Options
    Header and perform processing according to the options and option 
    numbers in it. One exception is the handling of Home address
    destination option for Mobile IPv6. As mentioned in section 2.8,
    even if LCNA itself does not move, it has to process the packets
    sent from other mobile nodes. Therefore, the processing of Home 
    address option becomes mandatory. However, since final specification
    of Mobile IPv6 is not regulated yet, we omit the concrete regulation
    for LCNA now.

==> one does not need to interpret HAO if one wants to communicate with 
mobile node: then all the traffic would just have to go through the Home 
Agent.  In LCNA case, Home Agent would probably most often be in the home 
network, so nothing would be lost..

3.3 Neighbor Discovery for IP Version 6 (IPv6) (RFC2461) [22]
    In this draft, we assume that an LCNA has only one network
    Interface, but it does not inhibit multiple interfaces. When
    an LCNA is assumed to have multiple interfaces, the following
    considerations are necessary, which requires more resources. 

    - Source address selection

==> even with one interface, the LCNA has multiple addresses, so it 
obviously still needs source address selection (consider e.g. the case 
with link-local, site-local, 6to4 address, and native address).  It may 
not necessarily need to be as complex though.

3.5 Internet Control Message Protocol (ICMPv6) for the Internet Protocol
    Version 6 (IPv6) Specification (RFC2463) [24]

    On minimum hosts, ICMP used only by a router MAY be omitted (Table
    2). ICMPs for Echo Request/Reply and minimum error reporting MUST be
    supported.

==> this MUST includes rate-limiting of error replies, I hope?

                Table 2. Mandatory ICMP messages for LCNA
        ===============+===============================+==========
        Type            Code                            Necessary?
        ===============+===============================+==========
        1:              0: No route to destination      No
        Destination     1: Administratively Prohibited  No
        Unreachable     3: Address unreachable          No
        Message         4: port unreachable             Yes

==> depending on how MIPv6 goes, some of these (e.g. admin prohibit)
might become necessary too.

3.7 DNS Extensions to support IP version 6 (RFC1886) [26] and IPv6  
    Stateless DNS Discovery (draft-ietf-ipngwg-dns-discovery-02.txt)
    [27]

    The only function that is not supported in the current IPv6
    autoconfiguration is automatic discovery of DNS server. On this
    topic discussions are ongoing in IETF IPNG WG. If a standard is
    fixed, it might become a mandatory item for minimum hosts.    
    AAAA record is defined for transform from IPv6 name to IPv6   
    address. So, AAAA is currently mandatory for minimum host name
    resolution. Also, A6 record is currently proposed and discussed in
    IETF for an alternative of AAAA record.  We need to check the
    progress.

==> What about reverse lookups?  nibble-style, probably?  ip6.int or 
ip6.arpa, or both?

4.2 Security mechanism for LCNA
    For example, IPsec realizes security on the IP layer, which is
    transparent from the transport and/or application layer, so it can
    be a generic solution. On the other hand, IPsec does not work well
    with IP layer translation technology (such as NAT and IPv4/IPv6
    translator), which might be a restriction for the promotion of
    LCNAs.

==> I disagree with the latter: IMO it's ok to assume that people who want 
to connect remotely (when security is a MUST) to LCNA would use native 
IPv6.

4.3 Minimum security specification for LCNA
    
==> basically you seem to be saying it's okay to omit security (meaning 
encryption) if LCNA is so underpowered it can't handle it.  I disagree.  
Put a better chip on it or say something to the effect 'If proper[??] 
encryption and security is not implemented, the node MUST NOT have a 
global address'.

6.2 Management facilities for LCNAs

==> personally I think being able to remotely monitor the status of the 
system is a rather necessary feature.

7. Security Consideration
    As mentioned in 2.7, DOS and intrusion are out of the scope of this
    draft.

==> you cannot specify requirements while leaving these features out of 
scope.

10 Appendix: Example of IPSEC minimum requirements specification
[...]
    We believe that IPsec is an effective technology in order to  
    guarantee security of communication. That is the reason why we
    regulate the minimum IPsec specification in this draft.

==> this needs editing as the last sentence is obviously false.

    * Even though we regulate minimum IPsec as mandatory, no one uses
      it because there are no prospects to deploy it in the real 
      world. Therefore, it is WRONG to regulate the IPsec minimum
      specification as mandatory.

==> FUD.  IPsec works fine in closed environment (which is what LCNA would 
be used in): it's trivial to perform manual keying for all of your systems 
(e.g. two computers and a few LCNA's), or use something like IKE in a 
restricted domain.

Strangers accessing LCNA using IPsec is the problem you're referring to, 
but they shouldn't access it anyway. :-) 

(I didn't read the rest of the ipsec appendix).

HTH,

-- 
Pekka Savola                 "Tell me of difficulties surmounted,
Netcore Oy                   not those you stumble over and fall"
Systems. Networks. Security.  -- Robert Jordan: A Crown of Swords

--------------------------------------------------------------------
IETF IPng Working Group Mailing List
IPng Home Page:                      http://playground.sun.com/ipng
FTP archive:                      ftp://playground.sun.com/pub/ipng
Direct all administrative requests to [EMAIL PROTECTED]
--------------------------------------------------------------------

Reply via email to