Skip to main content

Unmanaged Networks IPv6 Transition Scenarios
RFC 3750

Revision differences

Document history

Date Rev. By Action
2004-04-16
03 Amy Vezza [Note]: 'RFC 3750' added by Amy Vezza
2004-04-16
03 Amy Vezza State Changes to RFC Published from RFC Ed Queue by Amy Vezza
2004-04-13
03 (System) RFC published
2003-11-28
03 Amy Vezza State Changes to RFC Ed Queue from Approved-announcement sent by Amy Vezza
2003-11-26
03 Amy Vezza IESG state changed to Approved-announcement sent
2003-11-26
03 Amy Vezza IESG has approved the document
2003-11-26
03 (System) Ballot writeup text was added
2003-11-26
03 (System) Last call text was added
2003-11-26
03 (System) Ballot approval text was added
2003-11-26
03 Dinara Suleymanova State Changes to Approved-announcement to be sent from Publication Requested by Dinara Suleymanova
2003-11-24
03 Bert Wijnen Bert (as AD) is checking with IESG and secretariat.
Seems that status should be "approved".
2003-11-24
03 Bert Wijnen Shepherding AD has been changed to Bert Wijnen from Randy Bush
2003-11-24
03 Bert Wijnen Status date has been changed to 2003-11-24 from 2003-06-26
2003-11-10
03 Dinara Suleymanova State Changes to Publication Requested from IESG Evaluation by Dinara Suleymanova
2003-11-07
03 Randy Bush State Changes to IESG Evaluation from IESG Evaluation::Revised ID Needed by Randy Bush
2003-11-07
03 Randy Bush Allison and Ted say latest draft meets their issues.
Asked secretariat to process as INFO
2003-10-17
03 Randy Bush
State Change Notice email list have been change to <bob@thefinks.com>,  <pekkas@netcore.fi>,<jonne.soininen@nokia.com> from <bob@thefinks.com>, <mrw@windriver.com>, < …
State Change Notice email list have been change to <bob@thefinks.com>,  <pekkas@netcore.fi>,<jonne.soininen@nokia.com> from <bob@thefinks.com>, <mrw@windriver.com>, <pekkas@netcore.fi>
2003-10-16
03 (System) New version available: draft-ietf-v6ops-unman-scenarios-03.txt
2003-07-16
03 Randy Bush
Date: Wed, 16 Jul 2003 09:56:40 +0200
To: Randy Bush <randy@psg.com>, Harald Tveit Alvestrand <harald@alvestrand.no>
From: hardie@qualcomm.com
Subject: Re: draft-ietf-v6ops-unman-scenarios-02.txt
Cc: …
Date: Wed, 16 Jul 2003 09:56:40 +0200
To: Randy Bush <randy@psg.com>, Harald Tveit Alvestrand <harald@alvestrand.no>
From: hardie@qualcomm.com
Subject: Re: draft-ietf-v6ops-unman-scenarios-02.txt
Cc: iesg <iesg@ietf.org>

Hi,
The issues I had were related to characterization of
peer-to-peer applications.  The draft currently says this:

    Peer-to-peer applications are a restricted subset of "server
    applications" (discussed in section 3.4), in which the services are
    only meant to be used by well-identified peers outside the unmanaged
    network. These applications are often facilitated by a server
    outside the unmanaged networks. Examples of peer-to-peer
    applications would be a video-conference over IP, facilitated by a
    Session Invitation Protocol (SIP) server, or a distributed game
    application, facilitated by a "game lobby".
 
    Peer-to-peer applications often don't work well in unmanaged IPv4
    networks. Application developers often have to enlist the help of a
    "relay server", in effect restructuring the peer-to-peer connection
    into a pair of back-to-back client/server connections.

The first statement implies that peer-to-peer applications
are always closed systems  ("well-identified peers").  While "well-identified"
is not spelled out in detail, this doesn't seem true, even for those
facilitated by a server (think of BitTorrent, for example).  Presuming
that this is the case may give you a very skewed sense of the requirements.
Calling them "a restricted subset of server applications" is also likely
to alienate that community, even if this fits into this particular conceptual
framework.  The focus on the rendezvous systems might also
indicate the key problems here are on the interaction between peer
and rendezvous systems, when that's only one part of the problem space.
I'm also not sure whether the last sentence means back-to-back user
agent solutions or connections that occur one after the other (as in
"back to back wins
at Wimbledon" ).

Inside the requirements section, here's the text on naming
systems:

    Peer-to-peer applications often use ad hoc naming systems, sometimes
    derived from an "instant messaging" service. (Peer-to-peer
    applications that rely on the DNS for name resolution have the same
    naming requirements as server applications, which are discussed in
    the next section.) Many of these systems are proprietary; an example
    of a standard system is the session invitation protocol (SIP)
    [RFC3261]. In these systems, the peers register their presence to a
    "rendezvous" server, using a name specific to the service; the case
    of SIP, they would use a SIP URL, of the form
    "sip:user@example.com". A peer-to-peer session typically starts with
    an exchange of synchronization messages through the rendezvous
    servers, during which the peers exchange the addresses that will be
    used for the session.

This characterization concerns me as well, as one of the common
cases is that an application has configured peers that are exchanged
out of band to the protocol or configured in "chaining" mechanisms that
don't have this hierarchy.  Even where "rendezvous" servers are used,
they may not be consulted after configuration (and so aren't a constant part
of the name resolution).  Referring to these "ad hoc" naming systems
and then giving an example ofa  "SIP URL" also doesn't make sense to
me, since it has well-defined addresses.

On security it says:

    There are multiple aspects to the security of peer-to-peer
    applications, many of which relate to the security of the rendezvous
    system. If we assume that the peers have been able to safely
    exchange their IPv6 addresses, the main security requirement is the
    capability to safely exchange data between the peers, without
    interference by third parties.

The main security requirement seems to be peer authentication,
whether it comes through a rendezvous service or not.  The decision
over what constitutes "safe data exchange" for a particular application
varies (confidentiality may be required or not, for example).

    Private conversations by one of the authors with developers of peer-
    to-peer applications suggest that many would be willing to consider
    an "IPv6-only" model if they can get two guarantees:

I really question the value of the section following for this
draft; the draft is supposed to be describing transition scenarios for
unmanaged networks, not describing how peer-to-peer applications
might drive v6 deployment.

On the whole, I found the characterization of peer-to-peer
systems to be weak, and I suspect that the right answer is to punt
most of it, concentrating on the aspects which relate closely to the
unmanaged network aspect.

Peer to Peer applications with participants off the unmanaged
network clearly need 1) global connectivity, 2) access to the naming services
required to identify peers, and 3) sufficient base security services
to verify the
security of those naming services (which might mean something like
secured time to check certificates).  I think the details of  2 might
be a rat-hole
(rendezvous services, address of record, etc.), since I don't think these
actually change the scenarios below in any fundamental way (though there
may, obviously, be a second kind of name resolution after the DNS resolution
that is a focus, it seems likely to be layered in a way that leaves the stages
as they are).

regards,
Ted
2003-06-26
03 Randy Bush
To: iesg@ietf.org
Subject: Comment: draft-ietf-v6ops-unman-scenarios-02.txt
Cc: iesg-secretary@ietf.org
Date: Thu, 26 Jun 2003 06:47:21 -0700
From: Allison Mankin <mankin@psg.com>

The Security Considerations of this …
To: iesg@ietf.org
Subject: Comment: draft-ietf-v6ops-unman-scenarios-02.txt
Cc: iesg-secretary@ietf.org
Date: Thu, 26 Jun 2003 06:47:21 -0700
From: Allison Mankin <mankin@psg.com>

The Security Considerations of this document largely say that security will be
covered in a companion document, but there is a short list of topics covered in
this document.  This list should add one that is very important to the
unmanaged scenarios (related to the recommendation in Section 5.1.2):


  Security considerations are discussed as part of the applications'
  requirements. They include:
 
  - the guarantee that local applications are only used locally,
  - the protection of the privacy of clients
  - the requirement that peer-to-peer connections are only used by
  authorized peers.

Applications in the unmanaged scenarios also need to be protected from
risks associated with the transition tools, for example, access to their
net through an opportunistic tunnel if the IPv6-over-UDP service is not
well-designed.  So I think that it would be reasonable to add to Section
5.1.2 and to the Security Considerations some statement about securing the
recommended tunneling approaches.  Here's some suggested words for the
Security Considerations:

  - the requirement that tunneling protocols used for IPv6 access over
    IPv4 be designed for secure use; the related requirement that servers in
    in the infrastructure supporting this tunneling be designed not to be
    vulnerable to abuse.

(Or something like that).


Nit:

                            In practice, updating
  the DNS can be slow, which implies that server applications will
  have a better chance of being deployed if the IPv6 addresses remain
  stable for a long period.

Oversimplified operational statement.  Does it belong in this document?
2003-06-26
03 Randy Bush State Changes to IESG Evaluation  :: Revised ID Needed from IESG Evaluation by Bush, Randy
2003-06-23
03 Randy Bush Status date has been changed to 2003-06-26 from
2003-06-18
03 Randy Bush
From: Pekka Savola <pekkas@netcore.fi>
To: Randy Bush <randy@psg.com>, Bert Wijnen <bwijnen@lucent.com>
Subject: Request to Advance "Unmanaged Networks IPv6 Transition …
From: Pekka Savola <pekkas@netcore.fi>
To: Randy Bush <randy@psg.com>, Bert Wijnen <bwijnen@lucent.com>
Subject: Request to Advance "Unmanaged Networks IPv6 Transition Scenarios"

Hi,

On behalf of the v6ops WG, we request that the following document be
published as an Informational RFC:

Title          : Unmanaged Networks IPv6 Transition Scenarios
Author(s)      : C. Huitema, R. Austein, S. Satapati, R. van der Pol
Filename        : draft-ietf-v6ops-unman-scenarios-02.txt
Pages          : 19
Date            : 2003-6-17

A working group last call for this document was completed on March 2nd,
2003, and the two subsequent revisions of the draft have resolved the
issues raised during the last call.
2003-06-18
03 Randy Bush State Changes to IESG Evaluation from Publication Requested by Bush, Randy
2003-06-18
03 Natalia Syracuse State Changes to Publication Requested from AD is watching by Syracuse, Natalia
2003-06-17
03 Randy Bush Draft Added by Bush, Randy
2003-06-17
02 (System) New version available: draft-ietf-v6ops-unman-scenarios-02.txt
2003-06-04
01 (System) New version available: draft-ietf-v6ops-unman-scenarios-01.txt
2003-01-15
00 (System) New version available: draft-ietf-v6ops-unman-scenarios-00.txt