Front posting because this more than a comment on Eliot's comment, which I tend 
to agree with.

The work cites RFC8799. When we wrote Section 6 of RFC8799, we weren't thinking 
of a Layer 2 solution to define the limited domain boundary, but something at a 
higher layer that would need cryptographic support and would only concern a 
subset of traffic. Many of the ideas were inspired by the ANIMA work on the 
autonomic control plane. So that's another approach (but it probably wouldn't 
be an int-area work item).

Regards
   Brian Carpenter

On 19-Oct-24 05:22, Eliot Lear wrote:
Warren, other authors,

Thank you for your thoughts.

&TL;DR I worry that you have selected the wrong design pattern as we are 
talking about *features* and not protocols.

Failing closed at the application and transport layers make a whole lot of sense, and 
that is why you get a "connection rejected" in TCP (there is a historical story 
about that for the (possibly virtual) bar if anyone would like to buy me a (possibly 
virtual) drink).  This isn't possible in L3, which is why we are having the the 
discussion; and I do agree that this topic is worthy of a LOT of discussion, and maybe 
even some debate.

Were this a new version of IP or some new layer like MPLS, then an ethertype 
would seem appropriate.  It's a very coarse mechanism to indicate either one 
supports a protocol or one does not.

But what is really at issue here amounts to selection of  L3 *features*, and how we 
handle feature compatibility.  Features by their nature can be used in combinatoric 
patterns.  Using ethertypes for feature compatibility has some issues.  If you want to 
use more than one feature, then you have the miserable choice of "tough 
noogies" or assigning a different ethertype for each feature combination.

Also, the draft needs to be more clear about its intent.  Should we be 
expecting that packets transit the network without the ethertype changing or 
should we be thinking about domains a'la MPLS?  Both have costs associated with 
them.

  * In the case of a single ethertype across a path, we risk not only an 
explosion of ethertype allocations, but an explosion of end-to-end IPs; and 
that would be Very Bad.  I don't think this is where you are going, but you 
should be explicit.
  * If the ethertype will be managed at the border level, we should expect 
misconfiguration to cause leakages from time to time, as happens, for instance, 
with BGP non-transitive attributes. Also, if a feature becomes dominant, I 
don't think you can expect it to remain off by default, especially if it does 
not require configuration.

Let me stop there for now.

Eliot

On 18.10.2024 16:58, Warren Kumari wrote:
Hi there all,

A few of us (Andrew  Alston, Éric Vyncke, Suresh Krishnan, Donald Eastlake and myself) 
have been working on a mechanism to make "limited domains" protocols safe(r) to 
deploy.

The 50,000ft [0] view is that fail-closed domains are inherently easier to 
protect than fail-open, and so the document provides some mechanisms which 
protocol designers can use to achieve this when designing new protocols.

We'd really like some review and feedback: 
https://datatracker.ietf.org/doc/draft-wkumari-intarea-safe-limited-domains/

What do you think of the approach? What do you think of the document? Is it 
clear and understandable? Does it help solve the issue(s)? etc…


W
[0]: AKA 15.24km for those who weird folk who enjoy complicating their lives by 
counting in tens instead of furlongs or shackles or shaftments or other simple 
systems like that.


_______________________________________________
Int-area mailing list --int-area@ietf.org
To unsubscribe send an email toint-area-le...@ietf.org

_______________________________________________
Int-area mailing list -- int-area@ietf.org
To unsubscribe send an email to int-area-le...@ietf.org
_______________________________________________
Int-area mailing list -- int-area@ietf.org
To unsubscribe send an email to int-area-le...@ietf.org

Reply via email to