Qin Wu <[email protected]> wrote:
    > Hi Michale: If my interpretation is correct, the mapping between IP
    > address and Name is only valid for specific session or connection, when

I don't understand your comment.
The policy might say, "permit TCP port 1245 to example.com"
In order to enact this policy, the enforcement point needs a mapping from
example.com to (e.g.,) 192.0.0.1 [%].  There are a number of ways of
implementing the enforcement point, not all have to maintain state for the
entire connection.  But even among those that do, the state is attached to
the IP address, not the name.

So I don't understand how the mapping is only valid for a specific session.







[%] actually, example.com has an actual IPv4/IPv6 address which answers on
    port 80 and 443 :-).  And it's not a documentation IP.

    > the session or connection is torn down, The mapping is no longer valid
    > even though you cached the them, especially, TTL exceeds the
    > preconfigured period of time.  I am wondering whether session
    > expiration time is also cached together with the mapping as the state?

MUD does not say anything about how long the session could last.
For policy enforcement points that keep state on every session, whether or
not that state is allowed to exceed the TTL on the name is an interesting
implementation question.   I would think carefully about whether I wanted my
enforcement point to keep so much state, and I don't think I'd kill sessions
because the DNS name timed out.  Maybe, I'd have an upper limit on session
state duration, but does violate the end to end principal.  Still, it happens
all the time with NAT44.

--
Michael Richardson <[email protected]>, Sandelman Software Works
 -= IPv6 IoT consulting =-                      *I*LIKE*TRAINS*

Attachment: signature.asc
Description: PGP signature

_______________________________________________
OPSAWG mailing list
[email protected]
https://www.ietf.org/mailman/listinfo/opsawg

Reply via email to