Hi Anthony,
Thanks for taking time to comment. Hmm, some things may be too obvious
to me. I'll try in-line. Also, please read my somewhat lengthy response
to Jen (but I was asked to 'elaborate' so that's my excuse)
On 3/28/23 06:49, Anthony Somerset wrote:
Hi Waldemar
I concur with Jen’s comments
I’m struggling to find an actual problem statement that makes this
proposed draft a useful and unique fit.
For me, 2 “private” networks are private for a reason, if there is a
need to connect them together in some way. I either control both
networks or I have some open line of communication with the other
network manager and will be negotiating at a human level the
interconnection.
Yes this includes a mutually agreed level of trust I certainly don’t
believe there’s a use case for random network to network
interconnection without the human elements preceding it.
Not sure what you mean by 'human elements preceding it'. Obviously
making hosts reachable is an action traceable to a human being. We're
talking about negotiation of the sort whatever tunnels you have in mind
have to do to resolve address overlap. VPNs on the other hand, place the
hosts in the control of the other network admin. Maybe you want that,
but if you have a service for a supplier, you don't necessarily force
your suppliers to lend their hosts to control by your admin.
I already explained a dubious assumption that technologies exist to
traverse NAT in the response to Jen.
Given the above statements, there are far better ways to be able to
route between 2 private networks compared to the proposed solution
especially as your draft is silent to actual security implications, in
fact as far as I can tell, there is zero encryption of traffic being
routed over ipref – this could easily falsely lead network users to
assume that the IP traffic between the networks is secure, because hey
its private to private networking right… any commonly available site
to site vpn tunnel would be far simpler to implement in a secure
manner and won’t require any kinds of translations at the DNS layer or
weird translations at the IP layer to start with.
I wrote a follow up to a question about security asked during the
session which discusses encryption. IPREF is not going to make vanilla
IPv4 or IPv6 encrypted. It's not its mission. IPSEC, TLS, SSH are some
of the means of achieving that. I think people know neither IPv4 nor
IPv6 alone encrypt the traffic. It has nothing to do with private or non
private networks. Incidentally, the thinking that local 'private'
networks don't need encryption is a common misconception. That's very
unfortunate. IPREF is not about education in security measures.
Having read the draft a bit more – its 100% not clear how the encoding
subnets are chosen or the ipref values – if I read correctly it looks
like they are entirely selected arbitrarily – there is no schema or
standard to follow with synthesizing these values? – therefore the
would become an implicit human “negotiation” aspect to this as you
make sure you select non-overlapping encoding subnets and exchange
(via DNS) the iprefs – you cannot say that there is no negotiation at
all, also the human choice aspect will lead to humans being humans and
picking things that logically make sense and therefore it provides an
extra vector for a malicious actor to potentially enumerate network
devices
The selection is a local decision. There is no need to standardize
because it does not affect interoperability, hence nothing in the
draft. However, to your point, there may be a need for a Best Practice
document. I'm OK with that. It's a bit early for it, but yes. To
explain a little, they are 'arbitrary' in the sense that it is the local
matter how this is done. Local admin can do it manually but in practice
it would be allocated automatically by some algorithm, perhaps randomly.
The point is, all these decision belong to the local admin. There is no
need to negotiate with peers hence no need to define a protocol for it.
To me the biggest overhead becomes – how does one map DNS for
hostnames to the “mapped” IP which gets converted to an IPREF encoding
– it sounds like one would need to just like they are maintaining
those mappings for IPREF on the gateways, they have to map some split
horizon DNS which is already not a recommended approach from a
maintenance and scalability perspective. Yet more things to manually
map and maintain
There is no split horizon. Normally, organization designate a special
domain for local name resolution, for example 'mycompany.internal'.
These authoritative servers are visible only locally. There is also a
public, externally visible authoritative server that list address of the
same hosts for external access. Those addresses are obviously
different. With IPREF, it works exactly the same way. External public
authoritative server publish IPREF addresses, local 'mycompany.internal'
authoritative server publish local IP addresses. There is no need for
split horizon. There is no more mapping than with standard
external/internal domains. In that case, you have to map a DNS name to
a host for external use and again for internal use. Even with split
horizon (not needed) you still have to do it twice.
Overall I am struggling to see how this draft would be useful.
Thanks
Anthony
Waldemar,
Would you be able to elaborate on the problem statement and the
benefits of the proposed solution?
After reading the draft and listening to the presentation I'm not sure
I fully understand the problem. It looks like your goal is to achieve
a kind of end2end.
However:
1) We do not need anything for IPv6-to-IPv6 end2end.
2) For IPv6-to-IPv4 we have NAT64, and for IPv4-to-IPv6 we have SIIT.
3) For IPv4-to-IPv4 we have some forms of NAT-T and STUN.
If your goal is to replace #2 and #3 with a one protocol to rule them
all, I'm not sure we shall put too much effort (time and money) into
developing new solutions for the legacy protocol version. Especially
as we expect IPv4 to decline over time.
Am I missing some key benefits of the proposed solution which would
make IPREF attractive enough to deploy instead of existing solutions?
--
SY, Jen Linkova aka Furry
This email disclaimer applies to the original email, all attachments
and any subsequent emails sent by Liquid Telecom. This email contains
valuable business information that is privileged, confidential and/or
otherwise protected from disclosure, intended only for the named
person or entity to which it is addressed. If you are not the intended
recipient of this email and you received this e-mail in error, any
review, use, dissemination, distribution, printing or copying of this
e-mail is strictly prohibited and may be unlawful and/or an
infringement of copyright. Please notify us immediately of the error
and permanently delete the email from your system, retaining no copies
in any media. No employee or agent is authorized to conclude any
binding agreement on behalf of Liquid Telecom with another party or
give any warranty by email without the express written confirmation by
an authorized representative or a director of Liquid Telecom. Nothing
in this email shall be construed as a legally binding agreement or
warranty or an offer to contract. Liquid Telecom will not be
responsible for any damages suffered by the recipient as a result of
the recipient not taking cognizance of this principle. Liquid Telecom
accepts no liability of whatever nature for any loss, liability,
damage or expense resulting directly or indirectly from the access of
any files which are attached to this message. Any email addressed to
Liquid Telecom shall only be deemed to have been received once receipt
is confirmed by Liquid Telecom orally or in writing. An automated
acknowledgment of receipt will not suffice as proof of receipt by the
Liquid Telecom. This email disclaimer shall be governed by the laws of
South Africa.
Internal All Employees
_______________________________________________
Int-area mailing list
Int-area@ietf.org
https://www.ietf.org/mailman/listinfo/int-area
_______________________________________________
Int-area mailing list
Int-area@ietf.org
https://www.ietf.org/mailman/listinfo/int-area