[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]

Re: about Wedgelayer 3.5 / Fat IP approaches




El 28/06/2004, a las 10:09, Jukka Ylitalo escribió:

Thanks for bringing this out. Yes, the initiator would use, WIMP kind of,
ephemeral identifiers (random numbers), and the responder,
NOID kind of, routable IP-addresses at the application layer.



The problem is that some apps may need to make a refferal of the initiator, which AFAIU is using an ephemeral id.
I mean, by using a stable id for the receiver you solve the problem of the initial cntact, but imho not the refferal problem, since the initiator can also be reffered. I mean, apps that are not client/server wouldn't be properly supported by this model, afaics


Furthermore, we definitely need to be concerned about #1 for existing applications. But it migth also make sense to think about applications
that have been modified to be multi6-aware.


I feel that we should use routable identifiers with the connect()
and sento() kind of function calls in any case. This makes it possible to be
backward compatible with existing applications. However, the client
side may use non-routable application identifiers. (Thus, the context
establishment is asymmetric process, and two host may finally have two
diferent context-pairs with them.)


It would be also possible to change HIP in a way that the applications
were to see routable IP-addresses, instead of HITs. Basically, the Multi6
enhanced HIP would implement a NOID kind of AID-locator split. In this way,
it would be possible to use HIP in an opportunistic mode, like SSH.
I believ that the application layer will be the key element when combining different
wedge3.5 proposals.


Finally, the application identifier type is related to security properties of
any Multi6 protocol. As Marcelo wrote, we should analyze those
properties of different AIDs better and apply them with context
ownership properties.



what about cgas?
They are locators, so you can use them for refferals to non multi6 apps and hosts, they allow to map from id to locators using reverse dns, and they are crypto in nature
seems a good candidate to me :-)


regards, marcelo

PS: i will reread the CB64 draft


For instance, calling the getpeername() API might return what is essentially
a designated locator for the peer, which provides support for unmodified
applications. But we could decide to crate getpeerid() and getpeerlocators()
which would return more information to modified applications.
This might mean that unmodified applications would receive limited support for callbacks and referrals when a locator becomes unreachable,
but the modified applications would be robust against such failures.


Erik





-- Jukka