Thank you very much for the feed backs. I will have a look at the comments today and should be able to implement them by early next week. Yours, Daniel
On Thu, Jun 9, 2022 at 7:44 PM Kiran M <kiran.i...@gmail.com> wrote: > Hi Daniel, > > I finally managed to finish the review of front-end naming document. My > apologies for the delay. Many thanks for addressing the first round of > comments, the readability has improved quite a bit. The remainder of the > comments are in the Github. Hope we will see a revision soon. > > Cheers, > Kiran > > > ------------------------------ > *From:* Daniel Migault [mailto:mglt.i...@gmail.com <mglt.i...@gmail.com>] > *Sent:* Thursday, June 2, 2022, 6:36 AM > *To:* Eric Vyncke (evyncke) > *Cc:* Eric Vyncke (evyncke); homenet@ietf.org; kiran.i...@gmail.com; > Michael Richardson; Stephen Farrell > *Subject:* [homenet] naming drafts > > We are working on it with Kiran, I actually started yesterday to consider > her latest feedback (2nd round) - not yet being pushed, but that should > happen very soon. > > Yours, > Daniel > > On Thu, Jun 2, 2022 at 7:30 AM Eric Vyncke (evyncke) <evyn...@cisco.com> > wrote: > >> As we are halfway between IETF-113 and IETF-114, it is time to make a >> check as I have seen no revised version for those 2 ‘naming’ drafts. >> >> >> >> You may also have noticed that Ted’s ‘stub networking’ work is going in a >> SNAC BoF at IETF-114 (please attend and contribute to the s...@ietf.org >> mailing list). >> >> >> >> Therefore, the plan is to close Homenet early July 2022 if nothing >> changes. >> >> >> >> Hoping to see you in “Philly” to celebrate the achievments of Homenet ! >> >> >> >> Regards >> >> >> >> -éric >> >> >> >> *From: *homenet <homenet-boun...@ietf.org> on behalf of "Eric Vyncke >> (evyncke)" <evyncke=40cisco....@dmarc.ietf.org> >> *Date: *Thursday, 14 April 2022 at 09:16 >> *To: *"homenet@ietf.org" <homenet@ietf.org> >> *Cc: *"kiran.i...@gmail.com" <kiran.i...@gmail.com>, Michael Richardson < >> mcr+i...@sandelman.ca>, Daniel Migault <mglt.i...@gmail.com>, Stephen >> Farrell <stephen.farr...@cs.tcd.ie> >> *Subject: *Re: [homenet] naming drafts >> >> >> >> Dear Homenet, >> >> >> >> After 9 months, it is time to resurrect this email thread and move >> forward with the 'naming drafts', which are still in WG Last Call since May >> 2021: >> >> - draft-ietf-homenet-front-end-naming-delegation >> >> - draft-ietf-homenet-naming-architecture-dhc-options >> >> >> >> AT IETF-113, there was a meeting with two authors, the chairs, and I (as >> the responsible AD for Homenet). The plan is to give the authors a chance >> to issue a revised I-D considering Chris Blox's review as well as trying to >> improve the readability and flow of the text (which suffers from multiple >> revisions that have rendered the I-D difficult to read). Once done, the >> chairs will close the WGLC and will request publication to continue the >> process. This should be done by IETF-114 (July 2022) if not earlier. >> >> >> >> About the DynDNS discussion of last year, I am in favor of going forward >> anyway with the homenet drafts and wait for the IETF Last Call + IESG >> evaluation to get a broader scope than the Homenet WG on this very specific >> topic. >> >> >> >> Final point, the chairs and I have decided that once those 2 drafts have >> been approved by the IESG [1], then the Homenet WG can be closed after 11 >> years [2]. >> >> >> >> Of course, feedback and comments on the above are welcome. >> >> >> >> Regards >> >> >> >> -éric >> >> >> >> [1] or if the publication is not requested before IETF-114, then I will >> declare those two I-D as "dead" and proceed anyway with the closing of >> Homenet. >> >> [2] a new home will need to be found for Ted Lemon's drafts on "stub >> networking" >> >> >> >> *From: *homenet <homenet-boun...@ietf.org> on behalf of Daniel Migault < >> mglt.i...@gmail.com> >> *Date: *Tuesday, 13 July 2021 at 23:28 >> *To: *Chris Box <chris.box.i...@gmail.com> >> *Cc: *"homenet@ietf.org" <homenet@ietf.org> >> *Subject: *Re: [homenet] naming drafts >> >> >> >> Hi, >> >> >> >> Thanks for the follow up Chris. I apologize for the delay. >> >> >> >> Yours, >> >> Daniel >> >> >> >> On Tue, Jun 22, 2021 at 12:31 PM Chris Box <chris.box.i...@gmail.com> >> wrote: >> >> Daniel, >> >> >> >> On Wed, 16 Jun 2021 at 01:27, Daniel Migault <mglt.i...@gmail.com> wrote: >> >> >> >> The HNA SHOULD drop any packets arriving on the WAN interface that are >> not issued from the DM. >> >> Depending how the communications between the HNA and the DM are secured, >> only packets associated to that protocol SHOULD be allowed. >> >> >> The separation looks good, but I'd like to tweak the second paragraph. By >> "only packets associated to that protocol" do you mean destination port >> filtering? >> >> >> >> To me IP and port filtering are implemented by the previous line. "only >> packets associated with that protocol" to me means that only TLS packets >> are allowed. The reason we are not mentioning TLS explicitly is that >> other protocols may be used. >> >> >> >> Ah, I see, so this is about the payload of the packets. But surely >> intelligent validation of the incoming packets is always going to happen? >> This is a key property of any security protocol. >> >> If the DM is listening on TCP 443, and the incoming packet is not a TLS >> Client Hello that it is happy with, it'll get ignored. >> >> If the DM is listening on UDP 500, and the incoming packet is not an >> IKE_SA_INIT that it is happy with, it'll get ignored. >> >> >> >> So I'm not disagreeing with you, I'm just questioning whether the >> sentence is needed. I don't really mind if it stays. >> >> This may not be necessary, but the reason I would prefer to keep it is to >> head up that additional checks - when possible - may be performed in >> addition to port filtering. So unless you have a strong preference, I would >> prefer to keep this additional check that could be performed by the >> terminating node or a firewall. >> >> >> >> >> >> I'm not concerned about the additional round trip. I was more concerned >> that the DM could be implemented as a frontend/backend architecture. The >> FQDN would resolve to the front end, and this is likely to be a small list >> of addresses, or even a single address. But the backend servers would have >> distinct, different addresses. Connections from the DM to the HNA might be >> initiated from the backend. If the HNA only looked up the FQDN, it would >> drop legitimate connections. This suggests we need a way to inform the HNA >> of the set of legitimate source addresses. >> >> >> >> >> >> What did you think of this last point? >> >> >> >> I see your point. The architecture document envisioned this case by >> specifying the dm_acl parameter in the informative section 14. >> >> We did not include it into the DHCP option as we were requested to >> implement the simplest use case that is envisioned. My understanding was >> that DHCP Options had some history where complex options had been designed >> but hardly used. >> >> That said, if that is something you believe is really needed, we may >> bring this discussion and add this parameter to the current DHCP Options. >> It still represents a minor change as already considered in the >> architecture document. >> >> >> >> Another alternative may also consider adding an extension so the acl may >> be negotiated through the control channel, which I see more scalable than >> designing large DHCP options. At that point, I would rather keep the >> architecture as it is a let such option for future work - though fairly >> easy to set. >> >> >> >> >> >> >> >> >> >> Chris >> >> >> >> >> -- >> >> Daniel Migault >> >> Ericsson >> > > > -- > Daniel Migault > Ericsson > > -- Daniel Migault Ericsson
_______________________________________________ homenet mailing list homenet@ietf.org https://www.ietf.org/mailman/listinfo/homenet