[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]
Re: about reachability detection draft
Hi Marcelo,
I think it is important to consider one step further then. I mean,
what can a host possibly do when he detects an outage in the incoming
path? If a host detects an outage in the outgoing path, he can change
the address pair that he is using to send packets and see if it solves
the problem, but what can he do if he detects an outage in the
incoming path? I guess that the only option would be to notify the
correspondent node about the failure so that the correspondent uses an
alternative path (Note that we are asuming the the case of
unidirectional connectivity is possible)
So i guess that this mode needs an additional message informing the
failure, which needs to be taken into account when comparing the options.
This is related to the discussion we had in the MOBIKE WG about
the separation between detection and action. As an example,
the IKEv2 initiator could be in charge of all actions, i.e., actual
address pair changes, and the other party would only provide
indications to the initiator regarding its own address status,
current status of the communications, and it would assist in
address pair exploration. But all of this requires some signaling
communications.
I guess it would also make sense to state how the those mechanisms
behave when there are no outgoing packets? i mean, i guess that in any
of the modes signaling is suppressed right?, however, i guess that the
hosts assume that the address pair is reachable, right?
Additionally, i guess that there are other information that needs to
be taken into account when detecting reachability, such as ICMP error
messages, address deprecation, lower layers information (i know that
you state that you assume that addresses are available, but what
happens if an address of the currently used address pair is
deprecated? or if the associated interface goes down?) i guess it
would be important to deal with this cases also
Yes. Of course, it may also be useful to find abstractions, e.g., addresses
having some kind of a state that the lower layers (whatever they are)
indicate
to the shim6 layer. Even so, my sense is that its still complicated enough
that some of the assumed impacts from lower layer need to be specified
in our protocol documents.
Finally, in the security considerations section, i think that there is
closely related problem that perhaps needs to be presented here that
is flooding protection. I mean, the path exploration exchange can be
used for identifying working address pairs but also for preventing
that the shim can be used for flooding attacks. In order to enable the
path exploration exchange to be used for this, you need to include
some additional information in the exchange, some information that
identifies the shim context, so that the receiver of a packet of the
address pair exploration process can determine if this is one of its
own established sessions that are being genuinely rehomed or if this
is a flooding attack.
Good point.
--Jari