[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]

Re: 2nd part Re: revision of architecture draft is now published



Hi Geoff,

sorry for being unclear,

El 07/07/2004, a las 0:20, Geoff Huston escribió:

(still working through your comments...)

- in section 5.3.3

when considering opportunistic identifiers to initiate the communication.
note that non of the proposals AFAIK, use opportunistic identifiers for the server side. imho this is very difficult, because, the client side needs to know the identifier in order to initiate the communication. It would be possible that the client side would select the servers identity beforehand, but this may imply collisions if the server is already using it. imho opportunistic ids are only suitable for clients (if any), but not for servers.

Hi Marcelo,


I'm unsure of what you are saying here. Could you describe in a bit more detail the point so that I can understand what changes may be necessary for the draft?


In section 5.3.3. it is stated that


   "If opportunistic identities are used, where the identity is not a
   fixed discoverable value but one that is generated in the context of
   a session then additional actions must be performed at session
   startup.  In this case there is still the need for defined locators
   that are used to establish a session, but then an additional step is
   required to generate session keys and exchange these values in order
   to support the identity equivalence of multiple locators within the
   ensuing session.  This may take the form of a capability exchange and
   an additional handshake and associated token value exchange within
   the transport protocol if an in-band approach is being used, or it
   may take the form of a distinct protocol exchange at the level of the
   identity protocol element, performed out-of-band from the transport
   session."

Now, i wonder how such a solution would be, in the case that both initiator and responder use ephemeral ids.

The case where the initiator uses ephemeral ids is clear to me, and wimp_v1 is a example of how this would work.

However, if the receiver wants to use an ephemeral id, things get less clear (at least to me)

In this case, the app at the initiator's end needs to use a stable identifier to indicate the end that it wants to communicate with.

It could be possible to say that the apps will try to communicate with a fqdn.
If this is the case, i guess that the resolver at the initiators end will have to negotiate with the receiver the ephemeral id that the receiver will use, so that the initiator's resolver can return the ephemeral id back to the app, so that the app can use it to initiate the communication. However, if this is the case, i would say that the fqdn is the identifier really being used for initial contact, perhaps in this scenario we are using two identifiers, the fqdn and the ephemeral one?


bottom line is that the receiver always needs a stable identifier that the initiator can refer to, if not the initiator won't be able to indicate the target of the communication.

regards, marcelo



thanks,

Geoff