Hi Waldemar I concur with Jen’s comments
I’m struggling to find an actual problem statement that makes this proposed draft a useful and unique fit. For me, 2 “private” networks are private for a reason, if there is a need to connect them together in some way. I either control both networks or I have some open line of communication with the other network manager and will be negotiating at a human level the interconnection. Yes this includes a mutually agreed level of trust I certainly don’t believe there’s a use case for random network to network interconnection without the human elements preceding it. Given the above statements, there are far better ways to be able to route between 2 private networks compared to the proposed solution especially as your draft is silent to actual security implications, in fact as far as I can tell, there is zero encryption of traffic being routed over ipref – this could easily falsely lead network users to assume that the IP traffic between the networks is secure, because hey its private to private networking right… any commonly available site to site vpn tunnel would be far simpler to implement in a secure manner and won’t require any kinds of translations at the DNS layer or weird translations at the IP layer to start with. Having read the draft a bit more – its 100% not clear how the encoding subnets are chosen or the ipref values – if I read correctly it looks like they are entirely selected arbitrarily – there is no schema or standard to follow with synthesizing these values? – therefore the would become an implicit human “negotiation” aspect to this as you make sure you select non-overlapping encoding subnets and exchange (via DNS) the iprefs – you cannot say that there is no negotiation at all, also the human choice aspect will lead to humans being humans and picking things that logically make sense and therefore it provides an extra vector for a malicious actor to potentially enumerate network devices To me the biggest overhead becomes – how does one map DNS for hostnames to the “mapped” IP which gets converted to an IPREF encoding – it sounds like one would need to just like they are maintaining those mappings for IPREF on the gateways, they have to map some split horizon DNS which is already not a recommended approach from a maintenance and scalability perspective. Yet more things to manually map and maintain Overall I am struggling to see how this draft would be useful. Thanks Anthony Waldemar, Would you be able to elaborate on the problem statement and the benefits of the proposed solution? After reading the draft and listening to the presentation I'm not sure I fully understand the problem. It looks like your goal is to achieve a kind of end2end. However: 1) We do not need anything for IPv6-to-IPv6 end2end. 2) For IPv6-to-IPv4 we have NAT64, and for IPv4-to-IPv6 we have SIIT. 3) For IPv4-to-IPv4 we have some forms of NAT-T and STUN. If your goal is to replace #2 and #3 with a one protocol to rule them all, I'm not sure we shall put too much effort (time and money) into developing new solutions for the legacy protocol version. Especially as we expect IPv4 to decline over time. Am I missing some key benefits of the proposed solution which would make IPREF attractive enough to deploy instead of existing solutions? -- SY, Jen Linkova aka Furry This email disclaimer applies to the original email, all attachments and any subsequent emails sent by Liquid Telecom. This email contains valuable business information that is privileged, confidential and/or otherwise protected from disclosure, intended only for the named person or entity to which it is addressed. If you are not the intended recipient of this email and you received this e-mail in error, any review, use, dissemination, distribution, printing or copying of this e-mail is strictly prohibited and may be unlawful and/or an infringement of copyright. Please notify us immediately of the error and permanently delete the email from your system, retaining no copies in any media. No employee or agent is authorized to conclude any binding agreement on behalf of Liquid Telecom with another party or give any warranty by email without the express written confirmation by an authorized representative or a director of Liquid Telecom. Nothing in this email shall be construed as a legally binding agreement or warranty or an offer to contract. Liquid Telecom will not be responsible for any damages suffered by the recipient as a result of the recipient not taking cognizance of this principle. Liquid Telecom accepts no liability of whatever nature for any loss, liability, damage or expense resulting directly or indirectly from the access of any files which are attached to this message. Any email addressed to Liquid Telecom shall only be deemed to have been received once receipt is confirmed by Liquid Telecom orally or in writing. An automated acknowledgment of receipt will not suffice as proof of receipt by the Liquid Telecom. This email disclaimer shall be governed by the laws of South Africa. Internal All Employees
_______________________________________________ Int-area mailing list Int-area@ietf.org https://www.ietf.org/mailman/listinfo/int-area