Re: Last Call: draft-wu-sava-testbed-experience (SAVA Testbed and Experiences to Date) to Experimental RFC

2008-03-28 Thread Jari Arkko
Thanks for your review, Pekka. A few notes:

 it doesn't go into much detail on how they solved 
 difficult and more interesting issues, for example:
   - how they solved MTU problems caused by adding hop-by-hop header
   - given their deployment model, why didn't they try inserting a destination 
 options
 header instead of hop-by-hop and if they tried, why it didn't work;
   - how did the rekeying of inter-AS solution work (not described)

 These would increase the value of the report.

This would be very useful addition to the document. Authors?

But note that the overall experience from the specific approach chosen
here was that yes, its possible get it to working, but there are
significant issues both for deployment and for the way the protocol bits
are arranged. Remember that this was an experiment, not a design ready
for standardization. MTU problems are in the list that is in Section 5.3.

 I object to 
 publishing the draft as written. At least issue 1) below needs to be 
 fixed before publication because the draft is confusing and 
 misrepresentative of the scope of existing solution solution space.

 1) Access Network SAV and Intra-AS SAV terminology misrepresents the
 applicability of BCP38/84 and needs to be rephrased.

 We use the term intra-AS source address validation to mean the IP
 source address validation at the attachment point of an access
 network to its provider network, also called the ingress point.  IP
 source address validation at ingress points can enforce the source IP
 address correctness at the IP prefix level, assuming the access
 network owns one or more IP address blocks.  This practice has been
 adopted as the Internet Best-Current-Practice [RFC2827][RFC3704].

 This text (also to some degree the previous paragraph) and Figure 1 
 are confusing.  In Figure 1, Intra-AS SAV occurs between two routers 
 is construed as if it was only applicable between routers. BCP38 and 
 BCP84 are applicable also in scenarios which are in the figure listed 
 under Access Network SAV, not just under intras-AS SAV. 
 Specifically, BCP38/84 can be applied on each LAN interface of a 
 router.  In case router connects just one host, that is also a 
 sufficient solution and nothing else is needed.
   

Right. This needs to be corrected in the draft.

I am not commenting on the remaining issues, but I expect the authors to
address them in a new revision of their document.

Jari

___
IETF mailing list
IETF@ietf.org
https://www.ietf.org/mailman/listinfo/ietf


Re: Last Call: draft-wu-sava-testbed-experience (SAVA Testbed and Experiences to Date) to Experimental RFC

2008-03-28 Thread Pekka Savola
On Fri, 28 Mar 2008, Jari Arkko wrote:
 This would be very useful addition to the document. Authors?

 But note that the overall experience from the specific approach chosen
 here was that yes, its possible get it to working, but there are
 significant issues both for deployment and for the way the protocol bits
 are arranged. Remember that this was an experiment, not a design ready
 for standardization. MTU problems are in the list that is in Section 5.3.

A lot of issues are brought up in Section 5 (and elsewhere).  For 
issues noted, for each I'd like to ask quostions such as:
  - was this noticed in the testbed?  how?
  - was the issue relevant in that context; if not, why not?
  - if the issue was noticed, how was it worked around?  which
approaches worked (in that restricted context), which did not?
  - if the issue was not worked around, what kind of impact not
doing so had in the testbed and in testing?

I suspect some of the issues listed were addressed in some way (not 
necessarily in a globally applicable way).  For example, wrt MTU 
issues, a statement like MTU increase was not an issue because the 
transit network provided 9000B MTU or Participating hosts were 
manually configured to use 1280B MTU would have been useful.

So, when reading the report, I find it has basically the following 
kinds of content:
  1) some general overview of the problem space
  2) description of new mechanisms developed
  3) description of the testbed where mechanisms were tested
  4) description of issues to be considered in future work

However, 4) seems to be mainly about 1) and 2); it would have been 
possible to write fundamentally the same draft without any significant 
testbed deployment.  In other words, the experiences from the testbed 
and deployment itself are not extensively captured in the report, and 
as a result it is not obvious how useful the testbed was when 
considering follow-up activities in this space.

-- 
Pekka Savola You each name yourselves king, yet the
Netcore Oykingdom bleeds.
Systems. Networks. Security. -- George R.R. Martin: A Clash of Kings
___
IETF mailing list
IETF@ietf.org
https://www.ietf.org/mailman/listinfo/ietf


Re: Last Call: draft-wu-sava-testbed-experience (SAVA Testbed and Experiences to Date) to Experimental RFC

2008-03-28 Thread Jari Arkko

 For issues noted, for each I'd like to ask quostions such as:
  - was this noticed in the testbed?  how?
  - was the issue relevant in that context; if not, why not?
  - if the issue was noticed, how was it worked around?  which
approaches worked (in that restricted context), which did not?
  - if the issue was not worked around, what kind of impact not
doing so had in the testbed and in testing?
Yes, this would be useful.

Jari

___
IETF mailing list
IETF@ietf.org
https://www.ietf.org/mailman/listinfo/ietf


Re: Last Call: draft-wu-sava-testbed-experience (SAVA Testbed and Experiences to Date) to Experimental RFC

2008-03-26 Thread Pekka Savola
On Wed, 19 Mar 2008, Jari Arkko wrote:
 Just FYI, this draft is being AD sponsored as a report of a research effort
 that certain people have done in the source address validation space. To
 quote my ballot explanation:

   This draft documents an experimental design implemented in
   a research network for source address validation. The draft
   is not intended as a solution proposal but rather as a
   report of something that was done together with both
   the positive and negative experiences.

I've reviewed this draft.  I'm not sure what the draft intends to 
document as it doesn't go into much detail on how they solved 
difficult and more interesting issues, for example:
  - how they solved MTU problems caused by adding hop-by-hop header
  - given their deployment model, why didn't they try inserting a destination 
options
header instead of hop-by-hop and if they tried, why it didn't work;
  - how did the rekeying of inter-AS solution work (not described)

These would increase the value of the report.  Even without those, 
publishing the report may be of some value.  However, I object to 
publishing the draft as written. At least issue 1) below needs to be 
fixed before publication because the draft is confusing and 
misrepresentative of the scope of existing solution solution space.

1) Access Network SAV and Intra-AS SAV terminology misrepresents the
applicability of BCP38/84 and needs to be rephrased.

We use the term intra-AS source address validation to mean the IP
source address validation at the attachment point of an access
network to its provider network, also called the ingress point.  IP
source address validation at ingress points can enforce the source IP
address correctness at the IP prefix level, assuming the access
network owns one or more IP address blocks.  This practice has been
adopted as the Internet Best-Current-Practice [RFC2827][RFC3704].

This text (also to some degree the previous paragraph) and Figure 1 
are confusing.  In Figure 1, Intra-AS SAV occurs between two routers 
is construed as if it was only applicable between routers. BCP38 and 
BCP84 are applicable also in scenarios which are in the figure listed 
under Access Network SAV, not just under intras-AS SAV. 
Specifically, BCP38/84 can be applied on each LAN interface of a 
router.  In case router connects just one host, that is also a 
sufficient solution and nothing else is needed.

The figure needs to be redone.  The mechanisms described for Access network
SAV are only useful in contexts where multiple hosts attach to a router
using a single interface (e.g., using a switch).  Otherwise BCP38/84
mechanisms of Intra-AS SAV apply and access network SAV is not necessary.

One way to approach this is to change the figure as follows:

   __   __ 
   .-''   `':   .-''   `':
   | |  | |
   |   +-++  |   Inter-AS SAV   |   +-++  |
   |   |Router+--+--+---|Router+  +
   |   +--.---+  |  |   +--.---+  |
Intra-AS   |  |  |   Intra-AS   |  |  |
   SAV |   +--+---+   \ SAV |   +--+---+  |
   |   |Router|\|   |Router|  |
   |   +--.---+ \'_  +-+  _
   |  |  \`'---'''
  /   |   |
 /|   |
| +--+|
| |  .-. Router  ||
| ++/---\+|
|  || |  |   ||
|  ||+--+|+--+|Intra-AS
|  |||Switch|||Router||SAV
|  ||+--+|+--+|
|  ||\_   |  \   ||
|+-+--+\++|++ |
||Host|||Host|||Host| |
`.+|++|++,'
  `--. /  |  _.-'
  `---+''
   Access
   Network
   SAV

Further, rephrase:

It is important to enforce IP source address validity at the access
network.  That is, when an IP packet is sent from a host, the
routers, switches or other devices should check to make sure that the
packet carries a valid source IP address.  If this access network
source address validation is missing, then a host may be able to
spoof the source IP address which belongs to another local host.

To:

When multiple hosts attach to the same network, switches could check to
make sure that the
packet carries a valid source IP address.  If this access network
source address validation is missing, then a host may be able to
spoof the source IP address which belongs to another host in the same
 network.

And:

We use the term intra-AS source address validation to mean the IP
source address validation 

Re: Last Call: draft-wu-sava-testbed-experience (SAVA Testbed and Experiences to Date) to Experimental RFC

2008-03-19 Thread Jari Arkko
Just FYI, this draft is being AD sponsored as a report of a research effort
that certain people have done in the source address validation space. To
quote my ballot explanation:

   This draft documents an experimental design implemented in
   a research network for source address validation. The draft
   is not intended as a solution proposal but rather as a
   report of something that was done together with both
   the positive and negative experiences.

Jari

___
IETF mailing list
IETF@ietf.org
https://www.ietf.org/mailman/listinfo/ietf