[comp.protocols.tcp-ip] Final comments, Rabid Bite.

don@SRI-LEWIS.ARPA (Donald Holman) (12/15/87)

To the collective body:

I recently sent a note out requesting information on a few (4)
items of interest which appeared to lack a clear standard solution.
These were SLIP Link establishment, setting the security bit in
the IP header, routing metric determination and DDN Leased lines.
Below is a summary of the several comments I received pertaining 
to all but DDN Leased lines.

1) SLIP LINK ESTABLISHMENT

Comment summary:
---------------------
From: Charles Hedrick alias hedrick@athos.rutgers.edu
	- About routing.  Most protocols allow the system administrator to set
	  the link cost.  Even RIP now allows this.  The algorithm is still 
	  the same as min hop, but you can in effect simulate a certain line
	  counting as more than one hop.  This lets you take into account
	  cost, line speed, or whatever.  DECnet has been doing this for
	  years, as have various similar protocols.
From: Bill Graves alias Graves@mathcom.cisco.com
	- cisco Systems has developed a SLIP server which performs 
          negotiation for IP addresses. This server is presently 
	  in alpha test and is being prepared for shipping as a 
	  standard feature of their terminal servers.
From: James B. VanBokkelen alias JBVB@AI.AI.MIT.EDU
	- there was interest expressed in a Birds Ofa Feather session
	  hospitality suite in just this issue. This BOF consisted of
	  considerable discussion of what to do next, and there were some
	  basic agreements reached regarding direction and basic structure.
	  There is a new mailing list being formed to discuss /evolve/resolve
	  serial lines and dialup IP.  
From: Russ Hoby alias ccruss@deneb.ucdavis.edu
	- The BOF was too large to get any protocol work done, however
	  various input was received with regard to potential uses of SLIP.
	  One use is the connection of isolated computers without access to
	  a LAN. The second is SLIP in support of temporary network links.
	  Some work was done toward and RFC, this is what was covered:
	     1) The RFC will cover both connection and line protocols 
	     2) Connection specifications will cover negotiation of items such 
	     as  network  addresses,  authentication,  line speed, compression 
	     used, and probably other items. 
	     3)  The line  protocol will  contain one  byte in  the header  to 
	     indicate  the protocol in the packet. This allows the use of line 
	     control  packets  for  maintaining  the  serial  link, as well as 
	     allowing  other protocols in addition to  IP and the line control 
	     to use the connection. 
From: Michael A. Patton alias map@GAAK.LCS.MIT.EDU
	- There was an extensive session at the "High Speed SLIP" 
	  demonstration at which an upgraded SLIP was designed.  
	  I believe that Drew Perkins (ddp+@Andrew.CMU.EDU) is going 
	  to write up an RFC for it.

MY COMMENTS (for what they are worth): 
	I missed the BOF session, and thus am not well read-in on 
	what specifically has been proposed or what was considered
	for the RFC. Can I get more information on what was discussed?  
	I am interested in the IP address validation & data compression
	techniques and the general content of the RFC. I would appreciate
	anything that is passed in my direction pertaining to SLIP.

2) SETTING THE IP SECURITY OPTION

Comment summary:
---------------------
From: Bill Graves alias Graves@mathcom.cisco.com
	- This is probably a key management issues and should be referred 
	  to the appropriate government agency as they are the only ones 
	  able to authorize the setting of this bit. 
From: Michael A. Patton alias map@GAAK.LCS.MIT.EDU
	- The problem is that if you let the application set it arbitrarily,
	  then it doesn't offer security (everybody just turns it on), 
	  it needs to be connected with some security mechanism in the 
	  hosts, and you have to trust the security of ALL the hosts.
From: John A. Shriver alias jas@monk.proteon.com
	- Our security features (in the p4200) do NOT depend on the IP
	security option. They depend on origins and destinations.  You specify
	two masks, two results, and a sense.  The source and destination are
	and-ed with the appropriate mask (a 32-bit integer).  This is then
	compared to the results.  If both results match, the packet is (or is
	not) forwarded as per the sense. This appeared to be as 
	all-encompassingly flexible as we could imagine without being 
	lethal to performance.

MY COMMENTS (for what they are worth): 
	Since there will be a real security requirement sooner than
	most would like, this is something that should be resolved ASAP.
	I agree that there are some real headaches when one begins to
	consider security. I tend to believe that the upper layer
	protocols MUST have the mechanics for passing this information to
	the network layer (anyone done this?). I realize the implications 
	of adding this to the the upper layers, but if the IP security bit
	is the way to go the setting of the bit has to be supported.
	I agree that as soon as this is supported that every hacker 
	and their brother will be TRYING to use this as a way of 
	breaking into a secure system. It seems to me that this bit 
	(in the IP header) is not really for security but is to assist 
	in the routing and or discrimination of the datagram. 
	The only real security might be network isolation via some 
	form of encryption. 

3) ROUTING METRICS.

Comment summary:
---------------------
From: Bill Graves alias Graves@mathcom.cisco.com
	- Routing metrics are an exceedingly complex set of issues and
	  cannot be effectively addressed in this message.
From: Paul F. Tsuchiya alias tsuchiya@gateway.mitre.org
	- The techniques for routing with something more sophisticated than
	  hop-count are well known.  ARPANET uses a delay calculation which
	  many people, including myself, believe is over-kill in the sense
	  that the filtering required on the delay measurements to avoid
	  oscillations wipes out most of the benefit gained.  The current
	  IS-IS (gateway to gateway) routing proposal in ISO uses a static
	  value that can mean anything the system administrator wants.  It
	  usually is related to the bandwidth of the link.  The IS-IS protocol
	  uses this value in its update messages if the link is up, or
	  declares it down otherwise.  Finally, BBN has done a fair amount
	  of work in the area of multiple metrics (Type of Service routing).
From: Michael A. Patton alias map@GAAK.LCS.MIT.EDU
	- cisco systems uses a much more elaborate scheme (I believe it's a five
	  dimensional metric, and hop count isn't one of them).
From: Ross Callon alias rcallon@PARK-STREET.BBN.COM
	- The BBN Butterfly gateways do NOT use a simple hop count 
	  for routing decisions, for essentially the reason that you
	  gave.  Instead we use a cost which is administratively set as 
	  a function of the network characteristics. The IS to IS routing
	  proposal being developed by the X3S3.3 folks also uses 
	  administratively set costs. BBN is intending to publish 
	  a description of their SPF, while there is a semi available
	  version of the ANSI proposal.
From: John A. Shriver alias jas@monk.proteon.com
	- DECnet uses cost as a metric of goodness.  They also keep a hop
	  count, but this exists SOLELY to implement the count-to-infinity
	  speedup on the routing loops that form in broadcast routing protocols
	  when a node goes away.  The same logic exists in the ANSI IS-IS
	  proposal to ISO, which is essentially DECnet Phase V.
    
MY COMMENTS (for what they are worth): 
	It seems to me that (simply stated) if the best 
	route can be determined the best route should be used. I
	don't argue with the complexity of determining the best route. 
	I am minimally aware of the five determining factors which cisco
	Systems uses in route selection (from what I know of this five
	factor method it seems sound, it would be nice if it had broader
	support thru the community). I guess that the best of 
	all worlds would be nice, what about a standard? To be capable 
	of garnishing the route determination with a mix of all information 
	available would be the best way to go as long as looping is avoided
	and the overhead of doing so is not a burden. It would seem to me that
	6 or 7 of the items mentioned below would be good input for route
	selection, but then again I have not considered this for long and may
	be in left field.

		MINIMUM_HOP 
		BANDWIDTH
		MINIMUM_DELAY
		MINIMUM_MTU  
		FRAGMENTATION_REQUIRED
		RELIABILITY
		ADMINISTRATIVE DISTANCE

	I will looking forward to any published information on routing 
	algorithms (hope it becomes available to the general public soon).

Thanks for the time spent on responses!

The thoughts and comments within, unless specified, are my own.

TIA, 
Don