Re: WG Review: IDentity Enabled Networks (ideas)

[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]

 



I was a bit surprised to see this come out of the IESG for 
review, given that we had fairly serious discussions about the
problems of the proposed approaches at the BOF, but I see little 
attention on those issues in the charter.

But, to state my opinion about working group being created with this
charter, I have comments from two directions.

First, from the point of view of “do we need this” or “do I need this”,
I’m a “meh”. If the HIP and LISP folk and everyone else were
screaming for this, and we had enough deployment that we saw the 
issues that the charter proposes, then sure. Not sure that’s case.

Secondly, I’m have similar concerns to Christian, Lars, Stephen and others.
More specifically, at the BOF the goal seemed to be creation of infrastructures
to manage and track identities, and to bind them to entities that assigned
them. I am not at all sure that’s a desirable direction. And the charter
says little about the assumptions behind the work.

To expand a bit on these concerns, the proposed work doesn’t consider
at all the types of identifier operations that work on ephemeral identities
(e.g., HIP, MP-TCP). It would be sad if we created systems that
forced us to manage identifiers from some infrastructure when all
we needed to do in a particular case was “prove that you are the
same entity as in the other connection”, which can be done e2e and
requires no infrastructure, or permanent identifiers.

The charter text also mentions “identifier changes” in what feels
like a special case for what I would think is rather the default.

I find concept of firewalls checking identity troublesome.

Now, I’m not opposed to creating a working group in the IETF in this
area, and to support various infrastructure needs of say mobility or
multihoming or anycast protoocols, but if we do it, we need to do
it right. Dino’s suggestion of mapping systems without the manage/
create aspect might be one potential useful direction. Another
way to think about this space is to consider nodes to have autonomy
in how they manage and create their identities, when they reveal
or do not reveal identities. Then we could ask what
helpful tasks might an infrastructure provide on top of that, e.g., 
mapping services or forwarding agent type designs.

Jari





[Index of Archives]     [IETF Annoucements]     [IETF]     [IP Storage]     [Yosemite News]     [Linux SCTP]     [Linux Newbies]     [Fedora Users]