Ron,

On 20-Oct-24 12:21, Ron Bonica wrote:
Folks,

Thanks for writing this draft. The following are a few comments:

 1.
    This document should include the following statement:
     1.
        In the future, the IETF MUST NOT standardize any fail-open protocols 
that are designed for deployment in limited domains
 2.
    While the ethertype and extended ethertype solutions work, they may not be 
very popular with IEEE. The IETF is producing limited domain protocols by the 
dozen. IEEE may not want to provide that many  ethertypes.

I think it's worse than that. If you think in terms of domains that are purely 
nested inside one another, you would presumably need one new Ethertype per 
level of nesting. But if you think of domains that are both nested and 
overlapped, you would need a more complex solution.

Operators might not see a Venn diagram of domains as necessary, but some 
application designers might. And I'm pretty sure they wouldn't consider a 
multitude of Ethertypes as a solution.

Again, it isn't relevant to operators, but I'm impressed with way the DFINITY 
people are handling their version of large numbers of secure domains:

https://medium.com/dfinity/secure-scalability-the-internet-computers-peer-to-peer-layer-6662d451f2cc
https://youtu.be/HOQb0lKIy9I

    Brian

 3.
    Other solutions are available. For example, the IETF could:
     1.
        Assign an identifier to each limited domain protocol
     2.
        Define a new IPv6 hop-by-hop option. The opt bits of the new option are 
01, so the packet will be dropped if the option is not recognized. The new 
option contains the identifier of each limited domain protocol in which the 
packet participates

        The ingress router will drop an incoming packet if the new option is 
present and it has not been explicitly configured to pass every limited 
protocol identifier in the option. Routers participating in the limited domain 
protocol will drop the packet if the option is absent of if it does not contain 
the relevant limited protocol identifier.
 4.
    Section 3 could be modified as follows:

Protocols can be broadly classified as either "fail-open" or "fail-   closed".  
Fail-closed protocols are those that require explicit   interface or device-wide configuration to 
enable them to be accepted   or processed when received on an interface.  A classic example of a   
fail-closed protocol is MPLS ([RFC3031]): In order to allow MPLS to   transit an interface, the 
operator must enable the MPLS protocol on   that interface and on the device itself.  This ensures 
that outside   MPLS traffic does not leak in.

Fail-open protocols are those that do not require explicit   interface or 
device-wide configuration to enable them to be accepted   or processed when 
received on an interface.   Therefore, fail-open protocols
require explicit configuration in   order to ensure that they do not leak out 
of a domain, for example,   through the application of filters.

An example of a fail-open   protocol is SRv6 - in order to ensure that SRv6 traffic does not leak   out of a network, the operator must explicitly filter this traffic,   and, in order to ensure that SRv6 traffic does not leak in, the   operator must explicitly filter SRv6 traffic.   Fail-open protocols are inherently riskier than fail-closed   protocols, as they rely on perfect configuration of filters on all   interfaces at the boundary of a domain, and, if the filters are   removed for any reason (for example, during troubleshooting), there   is a risk of inbound or outbound leaks.  In addition, some devices or   interfaces may have limitations in the size and complexity of filters   that can be applied, and so adding new filter entries to limit leaks   of a new protocol may not be possible.   Fail-closed protocols, on the other hand, do not require any explicit   filtering.  In order for the protocol to be accepted and processed   when received on an interface, the operator must explicitly enable   the protocol on that interface and on the device itself.  In   addition, there is less risk of operational mistakes, as it does not   rely on filters that may be limited in number and complexity.   Finally, fail-closed protocols do not require that operators of   networks outside of the limited domain implement filters to protect   their networks from the limited domain traffic.

                                                   Ron

------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------


Juniper Business Use Only


_______________________________________________
Int-area mailing list -- int-area@ietf.org
To unsubscribe send an email to int-area-le...@ietf.org
_______________________________________________
Int-area mailing list -- int-area@ietf.org
To unsubscribe send an email to int-area-le...@ietf.org

Reply via email to