[comp.protocols.appletalk] AppleTalk in large diverse networks

xxss520@CHPC.BRC.UTEXAS.EDU ("L. Stuart Vance") (05/12/88)

As many of you already are aware, the current boom in the EtherTalk product
market has brought to the forefront two significant shortcomings of AppleTalk:
the limited number of hosts on a network, and the lack of security across
network boundaries.

I do realize that the developers AppleTalk never envisioned that it would be
as widely used as it is today.  This, however, is not a valid excuse for not
NOW addressing the limitations of an 8-bit host address space.  Being limited
to 254 active AppleTalk hosts on an Ethernet is becoming not only an
inconvenience, but a severe problem for large organizations such as the
University of Texas.

The greater problem that I am faced with now, however, is one of network
security.  When dealing in an environment where multiple (dozens) different
organizations (departments) are using AppleTalk routers to interconnect their
LocalTalk networks over the same Ethernet, the difficulty quickly becomes
evident.  Most of you in university environments realize that staff in the
Zoology department don't really want people in the Law School to be able to
access their file servers or print on their laser (or other) printers.  And,
while you can (in most cases) password protect file servers, there is no
practical way to protect printers.

Now, some might suggest that we force departments to use private Ethernets to
interconnect their LocalTalk networks.  This purist approach is impractical
(not to mention unenforceable), as some departments are scattered across
several buildings which are distant from each other, where the broadband cable
(Ethernet) system provides the only affordable means of connectivity.  Also,
many departments use NCSA Telnet for local and Internet TCP/IP access, which
requires access to the campus Ethernet.  Others might suggest that we assign
multiple AppleTalk network numbers to the Ethernet, one number for each group
of routers people wish associated with each other, thus partitioning the
departmental networks from each other.  In point of fact, this is how we are
currently handling the problem.  This solution breaks down, unfortunately, as
soon as someone attaches a Macintosh directly to the Ethernet.  When the Mac
boots, it first establishes its host address and then sends out a broadcast
packet asking any available routers to tell it what network it's attached to.
Thirty routers respond with fifteen different network numbers, and the Mac joins
the network of whichever router responded most quickly.  Also, given that
Kinetics' FastPath routers currently have no configuration password capability,
enforcement of network number assignments can be difficult.

My suggestions to Apple and the various router manufacturers are as follows:
(1) Increase the host number address space from 8 bits to (at least) 16 bits.
(2) Establish a standard for network (or zone) security based on something like
    the following:
    (a) Implement password protection of router parameters to enforce centrally
        assigned network numbers.
    (b) Network (zone) passwords should be specified by Mac users from within
        the Chooser.  A password field, possibly encrypted somehow, should be
        added to the AppleTalk packet format, with the proper user supplied
        password (for a given destination network or zone) placed in all
        outbound packets.
    (c) Implement a variety of options for network (zone) security: allow any
        access with or without a password; allow access to users on a specific
        list of networks (zones) with or without a password; disallow access to
        users on specific networks (zones); disallow all external AppleTalk
        access (allow only IP access).  Each packet a router receives destined
        for one of the networks the router is connected to should be examined.
        If the password set in the packet matches the password assigned to the
        network (zone), forward the packet.  Otherwise issue a NAK of some kind.
        If a packet is destined for a network not directly connected to the
        router, forward the packet automatically.

Note that if passwords for all the networks in a given zone are set the same,
the concept of zone passwords may be used (which is significantly more intuitive
to the naive user than network passwords).

Comments?  Flames?  I make no claim that the above is the best way of handling
the problems.  There may, in fact, be no best way.  The simple fact is that
some solution must be found, since AppleTalk networks will continue to get
larger and more "organizationally heterogeneous".  And, if anyone has developed
workarounds better than those we are using, I would definitely like to talk to
them.  And, finally, I would really like to hear something from the folks at
Apple, Kinetics, etc...

Thanks,
L. Stuart Vance
Network Systems Specialist
University of Texas System Office of Telecommunication Services

THEnet:   UTCHPC::XXSS520		  BITNET:  XXSS520@UTCHPC
Internet: XXSS520@CHPC.BRC.UTEXAS.EDU	  Ma Bell: (512) 471-2416
------

dorourke@polyslo.UUCP (05/12/88)

In article <Added.8WWB2jy00Ui3IbeU9m@andrew.cmu.edu> "L. Stuart Vance" <xxss520@chpc.brc.utexas.edu> writes:

   Some excellent idea's.

   All of the idea's expressed are very good.  But in my opinion would
complicate the simplicity and elegance of the Appletalk protocol suite.

   But I do realize the security problem and I also had to cope with it.  I 
was involved in a project to bring Appletalk to a major Mainframe company
and our implmentation had to deal with the problems of Appletalk security.
We took a very simple approach, and basicly it simply requires more 
intelligent bridges.  Appletalk says that every bridge on the network 
reports the names that that bridge knows about, but it doesn't say that
all of the bridges have to be completly honest.
   Since most software uses NBP to find things, if it can't find a name then
it's can't find the socket, so now you have effectivly removed access to that
device for people in different zones.  Also you can have the bridge check
all internet traffic and if someone is triing to send information to a
socket that the bridge hasn't published then it just doesn't let the packets
through.  This model is also easily extended so that the "active" bridge as
we called it reports different sets of names depending on where the request
came from, so that a Network administrator can allow select groups of
people access while not allowing others.  Also we are/will have implemented
a scheme that allows the bridge to "collect" Laser Jobs and then at some
time during the day someone can look at the jobs in the queue and determine
what is allowed to go through.  Sometimes it's convient to allow traffic to
go through, for instance allow payroll to send a report to accounting by
just having payroll print to accounting laserprinter, it's make a real nice
way to "transfer" information thru the use of Apple's standard print drivers,
and keeps the training time down to a minimum.
   I realize this isn't a perfect solution and requires some extensive
hardware, but we found it works quite well, and we didn't have to modify 
the protocol to implement it.
   But I agree some modifications might be nice. But I fear it's too late in
the game.  I am open for comments, flames, whatever.  Maybe in about 3 months
I can tell you who the company is, we've done some neat stuff with it.  I
wish I could post it on the board.


David M. O'Rourke

+++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++
| dorourke@polyslo | Disclaimer:  All opinions in this message are mine, but  |
|                  |              if you like them they can be yours too.     |
|                  |              Besides I'm just a student so what do I     |
|                  |              know!                                       |
|-----------------------------------------------------------------------------|
|    When you have to place a disclaimer in your mail you know it's a sign    |
| that there are TOO many Lawyer's.                                           |
+++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++

jeff@tc.fluke.COM (Jeff Stearns) (05/14/88)

In article <Added.8WWB2jy00Ui3IbeU9m@andrew.cmu.edu>, xxss520@CHPC.BRC.UTEXAS.EDU ("L. Stuart Vance") writes:
> As many of you already are aware, the current boom in the EtherTalk product
> market has brought to the forefront two significant shortcomings of AppleTalk:
> the limited number of hosts on a network, and the lack of security across
> network boundaries. ...

It's commonly stated that there is a limit of 254 hosts on an AppleTalk
network, but we should recall that the actual limit is generally worse:

	127 user nodes
	127 server nodes

Now allow me to include a third drawback, and then pose the Big Question...

    AppleTalk protocols have another undesirable trait, probably also a result
    of their "small-network" heritage:  They depend heavily upon broadcast
    packets when acquiring a nodeID and when locating other network entities
    via the Name Binding Protocol.

    This may be tolerable in the LocalTalk universe where small networks are
    the norm.  But running the AppleTalk protocols on EtherTalk looks ominous.

    Consider: a MINIMUM of 20 broadcast packets when acquiring a nodeID at
    reboot time.  (Reading of the AcquireAddress() alogrithm in Inside
    AppleTalk suggests that things may be much worse in practice; there
    is NO upper bound on the number of broadcast packets emitted when
    nearly 127 user nodes are already in use.)

Now the Big Question:

    I have an extended Ethernet of moderate size: five bridged segments
    supporting about 100 computers running TCP/IP.  In the wings, several
    hundred PC's and Macintoshes awaiting connection, eager to run TOPS or
    AppleShare.  What's going to happen when I try to connect, say, two hundred
    micros speaking EtherTalk?  
    
    For starters, do I have to create several separate AppleTalk networks,
    just to handle the puny 127-node limit?  (How do I do this on one extended
    LAN?)

    My Ethernet is bridged with DEC LAN Bridges, so broadcasts sail right
    through to all segments.  Am I going to regret this?

    Am I going to regret EtherTalk, period?

I'd especially love to hear from those of you who have EtherTalk networks in
place.  Respond by mail or news, as you see fit.  Thanks!
-- 
		 Jeff Stearns
	 Domain: jeff@tc.fluke.COM
	  Voice: +1 206 356 5064
    If you must: {uw-beaver,microsoft,sun}!fluke!jeff
	   USPS: John Fluke Mfg. Co. / P.O. Box C9090 / Everett WA  98206

deering@PESCADERO.STANFORD.EDU (Steve Deering) (05/15/88)

Any possibility of getting Apple to specify an Ethernet *multicast*
address, rather than the broadcast address, for Appletalk broadcasts?
That would at least allow non-Appletalk systems to protect themselves
from the interrupt load of all those gratuitous broadcasts.

Steve Deering

morgan@JESSICA.STANFORD.EDU (05/17/88)

> Any possibility of getting Apple to specify an Ethernet *multicast*
> address, rather than the broadcast address, for Appletalk broadcasts?
> That would at least allow non-Appletalk systems to protect themselves
> from the interrupt load of all those gratuitous broadcasts.

We suggested this recently to some AppleTalk people at Apple.  They
admitted that RTMP broadcasts are a problem on a large net (though
they didn't think the address-acquisition broadcasts are), and said
they would think about it.  

As I reported before, *my* impression is that so many things in the
AppleTalk stack need changing to work well in a large internet
environment that they'll probably only come via a Major New Version.
Are you ready for AppleTalk II?  Or maybe OSITalk?

- RL "Bob"

jmg@cernvax.UUCP (jmg) (05/18/88)

We have all of the problems mentioned in various articles with this
subject: many Ethernet segments linked by bridges, hundreds of TCP/IP
hosts, hundreds of PCs and vaxes, over 1000 Macs screaming for
communications. We too are fed up with use of broadcast, frequency
of broadcast, lack of security etc etc., and I have written to Apple
to say much this.

If I am not mistaken, there are plenty of people inside Apple who
read this newsgroup. How come none of them have commented, if only to
say that they are aware of the problems? A guy came here from Cupertino
to talk about communications futures from Apple, and he claimed not to
know about any dissatisfaction with EtherTalk!!!

Come on, Apple, get your act together and tell us which way you are
heading and when you might get there.

ps. maybe Kinetics read this too: they would need to be compatible
with any more intelligent LocalTalk bridging, management protocols
and so on.
-- 
 _ _  o |             __                    |    jmg@cernvax.uucp
| | |   |     _      /  \  _   __  _   __  _|    jmg@cernvax.bitnet
| | | | |_)  /_)     |  __/_) | (___\ | (_/ |  J. M. Gerard, Div. DD, CERN,
| | |_|_| \_/\___    \__/ \___|   (_|_|   \_|_ 1211 Geneva 23, Switzerland

kwe@bu-cs.BU.EDU (kwe@bu-it.bu.edu (Kent W. England)) (05/21/88)

In article <685@cernvax.UUCP> jmg@cernvax.UUCP () writes:
>
>If I am not mistaken, there are plenty of people inside Apple who
>read this newsgroup. How come none of them have commented, if only to
>say that they are aware of the problems? A guy came here from Cupertino
>to talk about communications futures from Apple, and he claimed not to
>know about any dissatisfaction with EtherTalk!!!
>
>Come on, Apple, get your act together and tell us which way you are
>heading and when you might get there.
>
	It could be that Apple isn't quite ready to talk about where
they are going with large networking.  I don't think it's with an
extended AppleTalk.  Why reinvent the wheel?

	Apple has TCP/IP for EtherTalk and LocalTalk in development
under contract.  (Please note that I have no special inside contacts
for this, just inferences from elsewhere.)  Apple will soon have the
option for supporting TCP/IP, with the usual telnet/ftp/smtp utilities
within the native MacOS on both LocalTalk and EtherTalk.  If Apple
doesn't go for IP, then the developer will bring it out.  You almost
certainly will have the option of going native IP if you want.  But
will it be enough for you?

	What about all those nifty self-configuring features of the
current Apple protocols?  They just might be the cost of going to
large networks, I don't know.  Certainly, TCP/IP doesn't solve the
e-mail PC/server problem.  Maybe Apple will figure out a way to extend
the TCP/IP suite in a clean way or layer the Apple protocols on top of
IP. 

	Do you want to link Macs with IBM-PCs, but you don't want
TOPS?  You might see NETBIOS SMB filer server capability on Macs.
This makes sense if you want to integrate into PC server/LANs.  I
don't think it's the way to go for TCP/IP networks with NFS, et al but
I bet Apple is eyeing the corporate network environment.

	I think Apple is grappling with the "large Mac network"
problem, but they probably aren't thinking "Mac IP network" but "how
do we get into the corporate PC environment" network.  Maybe that will
be an IP network with Netbios on top, as well as AFP/etc from the
current Apple protocol family.

	I wouldn't talk yet either, if I was Apple.

	Kent England, Boston University

jmg@cernvax.UUCP (jmg) (05/24/88)

In article <22769@bu-cs.BU.EDU> kwe@buit13.bu.edu (Kent England) writes:
>	It could be that Apple isn't quite ready to talk about where
>they are going with large networking.  I don't think it's with an
>extended AppleTalk.  Why reinvent the wheel?

But AppleTalk exists (in quite large numbers I believe!) and will have
to be integrated into large networking. The parallel is with Ethernet,
where DEC have had their networking concepts reasonably well established
for a long time: level 1 routers, area routers, bridges, routers and
(their own brand, unfortunately) management.
Thus I do not see that one can avoid extended AppleTalk, and Apple have
implicitly acknowledged this with EtherTalk: they should have realised
immediately where this would give problems.

>	Apple has TCP/IP for EtherTalk and LocalTalk in development
>under contract.  (Please note that I have no special inside contacts
>for this, just inferences from elsewhere.)  Apple will soon have the
>option for supporting TCP/IP, with the usual telnet/ftp/smtp utilities
>within the native MacOS on both LocalTalk and EtherTalk.  If Apple
>doesn't go for IP, then the developer will bring it out.  You almost
>certainly will have the option of going native IP if you want.  But
>will it be enough for you?

My inferences are the same, and I will welcome native TCP/IP, including
some kind of interface (sockets?) allowing us to write programs, rather
than just running applications stand-alone. Until that happy day I will
manage quite well with NCSA telnet and Brown's tn3270. Beyond that we
can look forward to NFS. In fact, the TCP/IP situation is not my main
worry, but rather the EtherTalk and zone bridging/management.

>	What about all those nifty self-configuring features of the
>current Apple protocols?  They just might be the cost of going to
>large networks, I don't know.  Certainly, TCP/IP doesn't solve the
>e-mail PC/server problem.  Maybe Apple will figure out a way to extend
>the TCP/IP suite in a clean way or layer the Apple protocols on top of
>IP. 

As I understand it, the self-configuring applies to AppleTalk node
numbers, not to TCP/IP. Note that we have decided not to use the dynamic
IP addresses: when I have problems with someone on an IP address I want
to know who it is.
I hope Apple will figure out how to layer Apple protocols onto IP. In
fact, I hope that they will figure out a lot of things: the minimal
thought that went into mapping the protocols directly onto Ethernet
has, in my view, backfired on them.

>	Do you want to link Macs with IBM-PCs, but you don't want
>TOPS?  You might see NETBIOS SMB filer server capability on Macs.
>This makes sense if you want to integrate into PC server/LANs.  I
>don't think it's the way to go for TCP/IP networks with NFS, et al but
>I bet Apple is eyeing the corporate network environment.

I would love to link Macs and IBM PCs. I don't want TOPS because I don't
want to have to buy LocalTalk cards for all of the IBM PCs, and nobody
ever replied when I asked if TOPS could go onto a PC with an Ethernet
card (which one?). NETBIOS is a possibility, but I would want it to be
on top of TCP/IP according to RFC 1001 and 1002: in the end I would
want it to be able to access something like a Novell file server (yes,
I know that the 3Com 3-server has AppleTalk included).

>	I think Apple is grappling with the "large Mac network"
>problem, but they probably aren't thinking "Mac IP network" but "how
>do we get into the corporate PC environment" network.  Maybe that will
>be an IP network with Netbios on top, as well as AFP/etc from the
>current Apple protocol family.
>
>	I wouldn't talk yet either, if I was Apple.

Even big blue puts out statements of "strategic direction". We need to
know what direction Apple is heading in, and the role of the current
AppleTalk in the future. Remember, we here, as well as many other big
sites, need communications now, not when Apple has put the last icons
into their new comms strategy.
-- 
 _ _  o |             __                    |    jmg@cernvax.uucp
| | |   |     _      /  \  _   __  _   __  _|    jmg@cernvax.bitnet
| | | | |_)  /_)     |  __/_) | (___\ | (_/ |  J. M. Gerard, Div. DD, CERN,
| | |_|_| \_/\___    \__/ \___|   (_|_|   \_|_ 1211 Geneva 23, Switzerland

pz@Apple.COM (Peter Zukoski) (05/25/88)

In article <685@cernvax.UUCP> jmg@cernvax.UUCP () writes:
>If I am not mistaken, there are plenty of people inside Apple who
>read this newsgroup. How come none of them have commented, if only to
>say that they are aware of the problems? A guy came here from Cupertino
>to talk about communications futures from Apple, and he claimed not to
>know about any dissatisfaction with EtherTalk!!!

Well, yes, some of us at Apple do read this newsgroup. Some of us at
Apple have even done something to have caused this newsgroup to exist.
Some of us at Apple are no longer in any position to do anything about it.

Many of the issues brought up are very frustrating for me personally also.
I've been among the first to have to deal with very large networks.
AppleTalk/VMS and MacWorkStation were two projects I was associated with
which tried to address these issues. We may have created more problems than
we originally had, but I feel that they're by and large a help rather than
a hindrance. There's lots of issues inherent here that are just a real bitch
to deal with. So, yes, we (some of us) know. We've got the same problems
to handle here (ever tried planning a world-wide Appletalk network?), and
we learn just the way everyone else does: try it and find out where it
doesn't work. Then kludge a solution. The difference is, we then need to
fix it right for everyone else. Not working in that group is (was - I'm
not doing that stuff now) frustrating to me, because I can't make it happen
faster. It's probably worse, because I don't see the situation as being
hopeless, whereas you _out there_ having no information can just say "Well,
that's the situation, now what can I do to make it work", and you just
make it work. I get caught up in hoping that what's being done will solve
my problems for me. Enough metaphysics. Just look at it this way:
We've got the same problems you do.

Well, I've said more than I should
These are opinions, and have absolutely nothing to do with the
organization I work for. Any similarity is purely coincidence.

tmanos@aocgl.UUCP (Theodore W. Manos) (05/30/88)

In Article <10984@apple.Apple.Com>  pz@Apple.COM (Peter Zukoski) writes:
>Well, yes, some of us at Apple do read this newsgroup. Some of us at
>Apple have even done something to have caused this newsgroup to exist.
>Some of us at Apple are no longer in any position to do anything about it.
>  .....
>Well, I've said more than I should
>These are opinions, and have absolutely nothing to do with the
>organization I work for. Any similarity is purely coincidence.

Well, I, for one, give Peter a lot of credit for saying as much as he did,
even if it wasn't much.  It appeared to me that he was really straining at the
bit to keep from saying more of how he *really* felt about the situation.  I
just can't help but wonder if the AppleTroopers have come and hauled this poor
guy away already.  Upper management at Apple should have as much guts (and
common sense)!

-Ted
---------
Ted Manos   tmanos@aocgl.{COM,UUCP,UU.NET}  or ...!{uunet,mcdchg}!aocgl!tmanos