[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]

RE: [BEHAVE] RE: Firewall control



>  > <Hannes.Tschofenig@gmx.net> wrote:
>  > > Another one would be: "Why do the IPv4 solutions don't 
>  > work given that they
>  > > are designed with extensibility in mind?"
>  > 
>  > The only work I saw the Soliman draft reference was NSIS, which
>  > uses a different signaling model.  There's been a lot more work
>  > done closer to the client-server model, which is what they're
>  > proposing also, and I gather that they're not familiar with it.
> 
> => I would appreciate a link to something that I can read 
> about similar proposals in this area. I'm aware of James' work 
> and probably should have added it to the references but 
> unintentionally didn't. 

draft-eggert-middlebox-control-survey-01.txt surveys most of
the efforts around NAT (and firewall) control including NAT-PMP,
NSIS NATFW NSLP, UPnP IGD, and James Woodyatt's ALD.  There are
placeholders for MIDCOM, RSIP, STUN Control, NLS, AFWC, and 
RSIP.

>  > I think that you're closer to right about what the real question
>  > is.  Nearly any solution to any problem introduces new problems,
>  > and I think in general the new problems introduced by both path-
>  > coupled and path-decoupled middlebox signaling are sufficiently
>  > intractible that we either end up resisting doing them at all or
>  > choose instead to go with a bunch of hacked-up messy stuff that's
>  > very situational.  
> 
> => I find it difficult to discuss a wide range of problems in 
> different deployments on such generic level. Of course every 
> solution introduces new problems but that is never a reason to 
> dismiss a solution IMHO.  There is also a wide range of 
> firewall deployment scenarios as you know and while I
> can think of some that don't need this approach, others 
> definitely do. 
> 
> So I agree with one aspect of Hannes question, which is: what was the
> problem with other proposals.  Lets discuss that.

draft-eggert-middlebox-control-survey-01.txt describes them, but
doesn't get into what's wrong with them.  The original SAFE BoF 
request hits on a few things that are wrong (an updated description
of the SAFE BoF will be available shortly, but here was the earlier
version):
  http://www.employees.org/safe/bof-request.html

Some of those might be applicable to v6 incarnations of those
protocols, too; I haven't thought about that aspect enough to
comment intelligently.

-d


> The first part of the
> question is not really useful because it doesn't tell us what those
> solutions are that we're supposed to compare with. 
> 
> Hesham
> 
>  > 
>  > I realize that the IETF doesn't do architecture but it seems to
>  > me that somehow this bigger question needs to be handled before
>  > putting effort into a different version of the same old thing.
>  > 
>  > Melinda
>  >