Robin,

In catch-up mode, your suggestion of a need for more
discussion of scaling properties is a good one, and
something I think that can be accommodated in the
next IRON update.

Thanks - Fred
fred.l.temp...@boeing.com

> -----Original Message-----
> From: Robin Whittle [mailto:r...@firstpr.com.au]
> Sent: Tuesday, March 09, 2010 6:18 PM
> To: RRG
> Cc: Templin, Fred L
> Subject: Re: [rrg] IRON-RANGER scalability and support for packets from 
> non-upgradednetworks
> 
> Hi Fred,
> 
> You wrote:
> 
> >> I don't understand the mechanisms by which potentially very large
> >> numbers of IRON routers repeatedly and continually register with
> >> potentially multiple VP routers.  These IRON routers could be
> >> anywhere and so could the VP routers.  In that message, the most I
> >> can discern about this mechanism is:
> >>
> >>    IRON routers lease portions of their VPs as Provider
> >>    Independent (PI) prefixes for customer equipment (CEs),
> >>    thereby creating a sustaining business model. CEs that lease
> >>    PI prefixes propagate address mapping(s) throughout their
> >>    attached RANGER networks and up to VP-owning IRON router(s)
> >>    through periodic transmission of "bubbles" with authenticating
> >>    and PI prefix information. Routers in RANGER networks and IRON
> >>    routers that receive and forward the bubbles securely install
> >>    PI prefixes in their FIBs, but do not inject them into the RIB.
> >>
> >> I have a rough idea of what you are trying to achieve with this
> >> mechanism, but I have no idea what the mechanism is - "bubbles"
> >> doesn't give me any understanding of exactly how the IRON routers
> >> would do this securely.  Only when I understand exactly how they
> >> would do this could I estimate the scaling and security problems
> >> which are no-doubt involved.
> >
> > I have been using the term "bubbles" to keep this at a
> > high level and to avoid getting bound up into talking
> > about specific mechanisms. But, it sounds like you want
> > to know more about the specifics, so I can tell you that
> > a "bubble" is actually an IPv6 Router Advertisement (or
> > moral equivalent) using the RFC3971, Section 6.1
> > authorization model. In this model, routers are given
> > certificates from a trust anchor which authorizes them
> > to act as routers and to advertise a certain set of
> > subnet prefixes. Other routers in RANGER use the
> > certificates to verify authorization.
> >
> > The scalability part is addressed in the new text I
> > have added to the rebuttal. What we really need to
> > avoid is having off-path attackers injecting lots of
> > bogus RAs that cause IRON routers to have to perform
> > lots of unnecessary crypto. By shutting down off-path
> > spoofing, IRON-RANGER ensures that end sites that act
> > with integrity will not overload correspondents with
> > crypto-busting DoS attacks. End sites that do NOT act
> > with integrity on the other hand will be easy to detect
> > and can safely be blacklisted.
> 
> I wasn't even thinking about attackers.  I don't know anything in
> detail about RFC 3971 and I don't think you should require readers to
> interpret a document such as this, which has nothing to do with I-R,
> in the context of what little they know about I-R - and then to
> figure out enough detail about how it would work to convince
> themselves that this is scalable.
> 
> To improve on this section of the I-R description, I suggest you
> nominate some target numbers for the maximum number of IRON routers
> there will ever be, how many individual prefixes of end-user network
> "edge" space there could be in total, the maximum number of these
> that any one IRON router might need to handle, how many VPs there
> would be, how many individual "edge" prefixes there might be in a VP,
> how many VP routers there might be per VP prefix, how often each IRON
> router will register each of its "edge" prefixes with the one or move
> VP routers . . . and then describe in detail how the system works,
> with one or more examples.  This would enable people to understand in
> good physical detail how your system works, without having to read
> RFC 3971 and imagine how you would use it in I-R.  The reader needs
> to be able to estimate the number of packets flowing in the various
> roles, the length of the packets, the computational resources
> required at each router, the security measures as you mentioned - but
> in greater detail - and then to figure out who is paying for all this
> and why they would do so.  They would also want to see the whole
> thing works OK when individual routers fail, become unreachable, are
> rebooted etc.
> 
> The only way I could develop my partial understanding if I-R was to
> do a lot of imagining, then ask detailed questions, and then have you
> provide answers - in a recursive process until I thought I had a good
> enough understanding of the proposal.   I don't have time to do this
> for I-R or other proposals now.  However, if you have a clear idea of
> how it would work, and what your targets are, you should be able to
> write a description which anyone can read and understand, without
> having to imagine anything or ask too many further questions.
> 
> There may well be a way of doing it - and I think for anyone involved
> in CES architectures, I think I-R certainly is worth understanding.
> All I am saying now is that the current state of the proposal leaves
> important scaling problems unanswered.  Its actually more than that -
> it doesn't explain this registration process in anything like
> sufficient detail for people to understand how it would work.
> 
> 
> >>>> there's no apparent method of supporting packets sent from
> >>>> non-upgraded networks.
> >>>
> >>> Non-upgraded IPv4 networks will continue to work as they
> >>> always have. Do you mean non-upgraded IPv6 networks?
> >>
> >> I mean when you start installing IRON routers, these will collect
> >> packets addressed to "edge" addresses (or whatever the new subset of
> >> "EID" space is called in I-R)
> >
> > Virtual Prefixes (VPs) - but, VPs cover what IRON-RANGER
> > calls Endpoint Interface iDentifier (EID) prefixes.
> 
> So do the VP routers act like Ivip's DITRs and LISP's PTRs?  To make
> this work without unreasonably extending the path between the sending
> host and the IRON router which connects to the destination network,
> you would need multiple VP routers - say 10 or 20 or so, depending on
> how keen you were to minimise path lengths.  This number needs to be
> part of the explanation regarding operation and scaling properties I
> suggested above.
> 
> 
> >> from the ISP networks they are
> >> installed in.  Packets sent by hosts in those networks will be
> >> handled according to I-R principles and the recipient networks of
> >> those packets will get the benefits (portability, multihoming and
> >> inbound TE) for those packets.
> >>
> >> But what of packets sent from hosts without IRON routers?  AFAIK,
> >> there's no equivalent in I-R to Ivip's DITRs or LISP's PTRs.
> >
> > Considering for now only IPv6 as EID space, an IPv6
> > host will be connected to a network that is ultimately
> > served either by an IRON VP or a "native" IPv6 prefix.
> > If an IRON VP, then routing is naturally via the IRON.
> > If a "native" IPv6 prefix (e.g., a 2001::/ derivative),
> > packets will follow default or more-specific routes as
> > usual but will encounter an IRON VP router if the
> > destination is covered by a VP.
> 
> OK - this confirms what I assumed above, about the VP router(s)
> acting as DITR(s) or PTR(s).
> 
> I recall that the VP router advertises its VP in the IRON overlay
> network.  Does it advertise the VP in the DFZ too?  It would need to
> if it were to receive packets sent from hosts in non-upgraded networks.
> 
> 
> >>> Assuming the latter, let's consider that today we have
> >>> two separate BGP instances - the IPv4 BGP instance and
> >>> the IPv6 BGP instance. The IPv6 BGP instance carries a
> >>> set of IPv6 prefixes (e.g., 2001:: derivatives) that are
> >>> routed in the IPv6 Internet in the "traditional" sense.
> >>> What IRON-RANGER is doing is essentially creating a
> >>> *third* BGP instance - one that carries a new set of
> >>> IPv6 Virtual Prefixes (VPs) that are distinct from the
> >>> prefixes carried in the traditional IPv6 BGP instance.
> >>>
> >>> Due to routing scaling issues, IRON-RANGER expects that
> >>> growth of this new third BGP instance will flourish while
> >>> growth of the traditional IPv6 BGP instance will level
> >>> off. In order to support what I think you mean by
> >>> non-upgraded networks then, it only requires that IPv6
> >>> routers connected to the IRON also participate in the
> >>> traditional IPv6 BGP instance. For that matter, not all
> >>> IRON routers need to participate, but at least some must.
> 
> Sorry, I still can't follow this and I don't have time to ask more
> about it.
> 
>  - Robin
> 

_______________________________________________
rrg mailing list
rrg@irtf.org
http://www.irtf.org/mailman/listinfo/rrg

Reply via email to