[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]

Re: TE & SHIM6 (was Re: comments on draft-ietf-shim6-proto-03



Hi Tony,

El 17/02/2006, a las 0:23, Tony Li escribió:
Let me try to correct your impression.  Some of us are very much aware
of the issues involved and are very interested in supporting more
functionality at the enterprise boundary.  However, over the years, it
has been made very clear that performing that type of locator selection
or route selection at the enterprise border is also seen very much as a
form of NAT.

While I happen to disagree with that particular assessment, the simple
fact of the matter is that the political situation within the IETF at
present makes any non-host-based solution intractable.  This is
_precisely_ what drove us towards the shim6 solution.  It is not an
optimal answer, by any means, IMHO.  It is only the best solution that
we have been able to reach consensus on.

Personally, i agree with Erik that the current solution is not very far 
from supporting prefix rewriting by site exit routers.
We have talked about this point several times on this list and i can 
see three possible approaches (not all of them being so easy to obtain 
using the shim)
1) the current scheme where the host performs all the functions of the 
shim
2) a full proxy approach where a middle box performs all the shim6 
stuff on behalf of a set of hosts that don't know anything about the 
shim and even that they are not aware of multiple addresses. This is 
the approach most similar to the original GSE. This approach seems to 
have quite a lot of complexity, mainly because the proxy needs to store 
all the shim state related to each ongoing communication.
3) it would also be possible to have a hybrid approach, where the host 
is shim enabled and the routers are allowed to rewrite the source 
address prefixes. In this approach, the security negotiation would be 
end to end, but the exit path selection would be performed by the 
routers. So, the shim context is established end to end between the 
shim capable hosts. In this context the hosts securely negotiate the 
full set of prefixes available for each end. Once that the shim context 
is set up by the peers, then the routers can rewrite the prefix of the 
source address. this approach would allow the intra site routing system 
to actually determine the exit path and would somehow restore the TE 
capabilities of the routers. Moreover, fault tolerance can be performed 
using BGP rather than using the failure detection mechanism of the 
shim. (probably there will be some failure modes that won't be detected 
through this mean)
The resulting approach would restore part of the BGP based fault 
tolerance and TE capabilities lost in the current shim6 approach.
Of course there a few things that need to be changed for this to work, 
like no privacy support, all the routers need to know all the prefixes 
and all the shim6 sessions must have all the prefixes avaialble and so 
on, but perhaps it may be interesting to explore it a bit more.
Regards, marcelo



Regards,
Tony