Re: [dhcwg] WGLC for draft-ietf-dhc-addr-notification - Respond by September 13, 2023

"rob@deepdivenetworklng.com" <rob@deepdivenetworking.com> Mon, 25 September 2023 15:14 UTC

Return-Path: <rob@deepdivenetworking.com>
X-Original-To: dhcwg@ietfa.amsl.com
Delivered-To: dhcwg@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 249F0C1522A4 for <dhcwg@ietfa.amsl.com>; Mon, 25 Sep 2023 08:14:59 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: 1.102
X-Spam-Level: *
X-Spam-Status: No, score=1.102 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, HTML_MESSAGE=0.001, PDS_FROM_2_EMAILS=3.004, RCVD_IN_DNSWL_BLOCKED=0.001, RCVD_IN_MSPIKE_H4=0.001, RCVD_IN_MSPIKE_WL=0.001, RCVD_IN_ZEN_BLOCKED_OPENDNS=0.001, SPF_HELO_NONE=0.001, SPF_PASS=-0.001, T_SCC_BODY_TEXT_LINE=-0.01, URIBL_BLOCKED=0.001, URIBL_DBL_BLOCKED_OPENDNS=0.001, URIBL_ZEN_BLOCKED_OPENDNS=0.001] autolearn=no autolearn_force=no
Received: from mail.ietf.org ([50.223.129.194]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id 3H3LAD6IzBpT for <dhcwg@ietfa.amsl.com>; Mon, 25 Sep 2023 08:14:55 -0700 (PDT)
Received: from sender3-op-o18.zoho.com (sender3-op-o18.zoho.com [136.143.184.18]) (using TLSv1.3 with cipher TLS_AES_256_GCM_SHA384 (256/256 bits) key-exchange ECDHE (P-256) server-signature RSA-PSS (2048 bits) server-digest SHA256) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id 6152FC14E513 for <dhcwg@ietf.org>; Mon, 25 Sep 2023 08:14:55 -0700 (PDT)
ARC-Seal: i=1; a=rsa-sha256; t=1695654890; cv=none; d=zohomail.com; s=zohoarc; b=EGcHuhKebBBDlzvVzkd8Avh2L1cgDfwAYHLJKptBkBUK52X+9j9LV9JyHMTn5TpM7y8WRqKRONKIWpyw6Nu7V5QEBZ5ep533X/07aqzUwtk/Fm3d0IOOm0HDXTsDNEvK6sHdekmdLsJCXekdwrVgZvEFOeAlGvSbULBkeuuXWKc=
ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=zohomail.com; s=zohoarc; t=1695654890; h=Content-Type:Cc:Date:From:In-Reply-To:MIME-Version:Message-ID:References:Subject:To; bh=nzqhW+1bvZWjy4Yq8bLQHYQYFqFdErFkmiPtMCRaphY=; b=hD21VB0PV8B9hQbc1mmIfYnM7zAAhKIbu/K+1ngG6zWXLkOrSEm8M8zZGEEhcxAVnchjxVnJIqB2sbdOCdERe3oMRzb0UaC5ERuUecKUT2/cnxBMp7+OwxDsosgh5bI5e4KgpZT68kkeH/pBWzpR9Kh+EvKYeqjKmjRPpwtLFyQ=
ARC-Authentication-Results: i=1; mx.zohomail.com; spf=pass smtp.mailfrom=rob@deepdivenetworking.com; dmarc=pass header.from=<rob@deepdivenetworking.com>
Received: from smtpclient.apple (c-67-171-133-203.hsd1.or.comcast.net [67.171.133.203]) by mx.zohomail.com with SMTPS id 1695654888341232.326413581397; Mon, 25 Sep 2023 08:14:48 -0700 (PDT)
From: "rob@deepdivenetworklng.com" <rob@deepdivenetworking.com>
Message-Id: <95D965CF-36AE-4E4B-8F11-3030B227BDA9@deepdivenetworking.com>
Content-Type: multipart/alternative; boundary="Apple-Mail=_917C2FD6-F6F4-4EAC-963A-445516911556"
Mime-Version: 1.0 (Mac OS X Mail 16.0 \(3731.700.6\))
Date: Mon, 25 Sep 2023 08:14:37 -0700
In-Reply-To: <CAN-Dau3NUUxjFsEJeo8qB+1w0Y3C48e_82UC0WqQeiJaHMpUkQ@mail.gmail.com>
Cc: Timothy Winters <tim@qacafe.com>, dhcwg <dhcwg@ietf.org>, Ted Lemon <mellon@fugue.com>
To: David Farmer <farmer=40umn.edu@dmarc.ietf.org>
References: <CAJgLMKvATJP78ONPc8f6kG2eNWq83XCTSdvRLVGKWB26JGrANQ@mail.gmail.com> <1E185C09-B45E-4B1E-81F8-3CB6141B9881@employees.org> <CAJgLMKtYy2U1vScQoW4eWD3sLipeUTak7BqkELXZ61=6_cKJDQ@mail.gmail.com> <CAN-Dau3NUUxjFsEJeo8qB+1w0Y3C48e_82UC0WqQeiJaHMpUkQ@mail.gmail.com>
X-Mailer: Apple Mail (2.3731.700.6)
X-ZohoMailClient: External
Archived-At: <https://mailarchive.ietf.org/arch/msg/dhcwg/3T91LLf7PfZoTgNTzlme5BW_Pgs>
Subject: Re: [dhcwg] WGLC for draft-ietf-dhc-addr-notification - Respond by September 13, 2023
X-BeenThere: dhcwg@ietf.org
X-Mailman-Version: 2.1.39
Precedence: list
List-Id: Dynamic Host Configuration <dhcwg.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/dhcwg>, <mailto:dhcwg-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/dhcwg/>
List-Post: <mailto:dhcwg@ietf.org>
List-Help: <mailto:dhcwg-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/dhcwg>, <mailto:dhcwg-request@ietf.org?subject=subscribe>
X-List-Received-Date: Mon, 25 Sep 2023 15:14:59 -0000

All,

My $.02. I am coming to this as someone who deals with DHCP and IPAM products daily. I am tasked with regularly solving this problem for Network Operators as my job.

It sounds like what is being asked for is more of an IP Tracking / IPAM solution. I agree with David Farmer. David’s reply is what I hear a lot from Large Network Operators: tracking DHCP lease information can be a piece of the solution and is hardly sufficient for any real IPAM / IP Tracking solution. In any comprehensive solution, some form of network discovery (usually something that talks to the L2/L3 infrastructure) is needed to have a remotely complete picture (ARP scraping in Davids’s example). In short, DHCP is a helpful part, but only a part. 

Maybe we do a better job of saying what it can and can’t do and that it can be used as part of the overall solution of tracking IPv6 assignments, but it is not the whole solution. The products that currently do IP tracking are complex and typically a mix of DHCP and Network Discovery. Simply adding this mechanism to DHCPV6 isn’t going to solve the issues these multi-function IPAM solutions do. As stated earlier, and I think was a critical point (sorry, I forget who said it) is that we (DHCP services) are not in the path. Because of that, we are not positioned to be responsible for better tracking IPv6 address usage, but we could chip in helpful information. Today, that is lease information on the V4 side, and if we could get parity in adding in v6 address information based on the v6 modalities, that would be great. 


My final issue and what leaves me on the fence is complexity. If we aren’t solving the bigger problem and are just helping with providing some info, then is what we are discussing reasonably simple enough to implement so that it will be used? When we start to overload flags and expect clients to do anything new, I tend to think we have gone too far for what it provides. If it is harder to implement than it is to write a simple router scraper, then to me, we haven’t provided value to the Network Operator.

As for the draft itself, I am stuck on whether it has merit. I am not solidly in either camp, so I have stayed quiet. I guess I feel like it could be a helpful part of a solution, but we shouldn’t represent that it does anything more than provide some additional data points. We must keep it simple enough that it has a likelihood of actually being implemented, as there are both products out there and so many homespun scripts that already do a better job of this than we can with DHCP.

</$.02>


Rob

Robert Nagy
- - - - - - - - - -
Senior Dive Master | Deep Dive Networking Inc
p: 408.480.5133 | aim/icq: 95091173 | e:rob@deepdivenetworking.com
www.deepdivenetworking.com

> On Sep 25, 2023, at 7:13 AM, David Farmer <farmer=40umn.edu@dmarc.ietf.org> wrote:
> 
> So, even with IPv4, DHCP isn't completely authoritative. Static assignments are missing. Nevertheless, many people find DHCP tracking to be operationally sufficient. However, we both scrap ARPs out of routers and use DHCP logging. DHCP logging provides additional information that is not easily available from the routers even though it is not completely authoritative. 
> 
> It's only speculation, but seems like this could also be operationally sufficient for many. However, similar to DHCP, adding to ARP information, I believe this would provide additional information not easily available from ND scraping of the routers, even though it is only voluntary.
> 
> Thanks.
> 
> On Mon, Sep 25, 2023 at 8:44 AM Timothy Winters <tim@qacafe.com <mailto:tim@qacafe.com>> wrote:
>> Hi Ole,
>> 
>> We have had some operators' interests in this solution over scrapping switches and routers.   I think it would be helpful to hear from network operators or DHCPv6 server solutions about how viable and deployable this solution is. 
>> 
>> ~Tim
>> 
>> On Sat, Sep 23, 2023 at 4:08 AM Ole Trøan <otroan@employees.org <mailto:otroan@employees.org>> wrote:
>>> Thanks Tim,
>>> 
>>> I do wonder if it’s not worth doing a complete retake of this proposal.
>>> 
>>> If the operator requirement is to know which address has been in use in the network by which device at any point in time, then that cannot be guaranteed with this mechanism. Existing first-hop security mechanisms in switches and routers would be much more robust. 
>>> 
>>> O. 
>>> 
>>>> On 22 Sep 2023, at 22:22, Timothy Winters <tim@qacafe.com <mailto:tim@qacafe.com>> wrote:
>>>> 
>>>> 
>>>> Hi Everyone,
>>>> 
>>>> The working group had some great discussion about this document during the WGLC.    Based on the discussion it didn't pass WGLC at this time.  It will mostly need another round of discussion and potentially a revision based on those discussions. 
>>>> 
>>>> Additionally, Bernie and I discussed and think it's a good idea to wait to ask IANA for a early code points until we have passed WGLC.
>>>> 
>>>> Regards,
>>>> Tim
>>>> 
>>>> On Thu, Sep 14, 2023 at 3:16 PM Bernie Volz <bevolz@gmail.com <mailto:bevolz@gmail.com>> wrote:
>>>>> An interesting question may be do we need new messages at all? Using Information Request / Reply with new option is perhaps cleanest?
>>>>> - existing clients can do what they do today
>>>>> - existing servers (and relays or other snoopers) will not know option so ignore (hopefully silently)
>>>>> - existing servers only see “more” Information-Request for clients not supporting this new work when enabling O-bit to request address registrations
>>>>> - “new” clients that do SLAAC when O-bit set and did support Information-Request can do initial registration in first message (or send when address assigned) and do periodic updates (perhaps even ask for other options via ORO to refresh information) … they may actually have no more messages than today (well, except if they have multiple SLAAC addresses as need to use a separate Information-Request for each) … they could also decouple previous and new behavior at increase in traffic.
>>>>> - registration only clients that did not use Information-Request previously add new traffic … which is exactly what we want
>>>>> 
>>>>> The only downside is it kind of overloads Information-Request as it is now also a client to server communication. Though the client already can send information to server in Information-Request (user class, vendor class, vendor information, …). And, we could say the client is asking whether the server supports registration (by getting new option in Reply).
>>>>> 
>>>>> Note: It may be worth thinking about making use of the new “registration address” option’s encapsulated options field if client wants to send other information (such as fqdn). This isn’t really bad as this is likely address specific and any server that wanted to do something with this data needs updating anyway. This keeps all of the registration information hidden from those devices that don’t that registration option.
>>>>> 
>>>>> Anyway, this is now a very good reason to hold off on early assignment for message types (and likely say WGLC failed).
>>>>> 
>>>>> - Bernie (from iPad)
>>>>> 
>>>>>> On Sep 14, 2023, at 2:32 PM, Bernie Volz <bevolz@gmail.com <mailto:bevolz@gmail.com>> wrote:
>>>>>> 
>>>>>> Hi:
>>>>>> 
>>>>>> (Just catching up and responding to this as was asked specifically…there could have been more I haven’t yet read.)
>>>>>> 
>>>>>> 8415bis only prohibits IA options in Information-Request
>>>>>> 
>>>>>> 16.12.  Information-request Message
>>>>>> 
>>>>>>    Clients MUST discard any received Information-request messages.
>>>>>> 
>>>>>>    Servers MUST discard any received Information-request message that
>>>>>>    meets any of the following conditions:
>>>>>> 
>>>>>>    *  the message includes a Server Identifier option (see
>>>>>>       Section 21.3), and the DUID in the option does not match the
>>>>>>       server's DUID.
>>>>>> 
>>>>>>    *  the message includes an IA option.
>>>>>> 
>>>>>> I wonder however if having an Address Registration option specifically would be better (the Information-Request and new registration request could use this instead of IA_Addr option). This might avoid an overly aggressive server or relay that checks the Information-Request or its Reply for options from doing odd things if it sees the IAAddr. If we’re trying to make things safe, this may be best. Note also that it may help other devices in the path that may want to snoop for this data. (But it could have downside if any “options” are developed as then those specifications would need to determine if they are also allowed in this new address option).
>>>>>> 
>>>>>> 
>>>>>> On a separate note, one issue the current draft may need to document and is a consideration is that when O-bit (RA) and A-bit (PIO) is set, a registration only server should really support Information-Request as it will also get lots of those from clients that support DHCPv6 - it may just send back a pretty empty Reply.
>>>>>> 
>>>>>> By using Ted’s suggestion of using Information-Request, it would be natural for registration only to be implemented at least sufficiently to send a well formed Reply even when not address registration request.
>>>>>> 
>>>>>> It seems like a clever idea to use Information-Request at least for initial determination of support.
>>>>>> - it avoids extra packets.
>>>>>> - client could honor server’s INF_MAX_RT to reduce frequency of probing (likely periodic probing is not a bad idea).
>>>>>> 
>>>>>> 
>>>>>> - Bernie (from iPad)
>>>>>> 
>>>>>>> On Sep 14, 2023, at 11:29 AM, Lorenzo Colitti <lorenzo@google.com <mailto:lorenzo@google.com>> wrote:
>>>>>>> 
>>>>>>> 
>>>>>>> On Fri, Sep 15, 2023 at 12:22 AM Ted Lemon <mellon@fugue.com <mailto:mellon@fugue.com>> wrote:
>>>>>>>> What I think would be most expedient (if we must use DHCP to probe for support of address registration) would be to do the first address registration as an information request with the additional information in the information request, using the source address being registered. If the reply that comes back confirms the address registration, then all subsequent address registrations on this link would be sent as address registrations.
>>>>>>> 
>>>>>>> Well, but if we can come up with a reasonable way to represent an address registration using an information-request packet, then why not make all registrations be information-request packets?
>>>>>>> 
>>>>>>> +Bernie Volz <mailto:bevolz@gmail.com> any thoughts on using information-request and reply messages, instead of the new addr-reg-inform and addr-reg-reply messages currently defined in the draft?
>>>>> _______________________________________________
>>>>> dhcwg mailing list
>>>>> dhcwg@ietf.org <mailto:dhcwg@ietf.org>
>>>>> https://www.ietf.org/mailman/listinfo/dhcwg
>>>> _______________________________________________
>>>> dhcwg mailing list
>>>> dhcwg@ietf.org <mailto:dhcwg@ietf.org>
>>>> https://www.ietf.org/mailman/listinfo/dhcwg
>> _______________________________________________
>> dhcwg mailing list
>> dhcwg@ietf.org <mailto:dhcwg@ietf.org>
>> https://www.ietf.org/mailman/listinfo/dhcwg
> 
> 
> -- 
> ===============================================
> David Farmer               Email:farmer@umn.edu <mailto:Email%3Afarmer@umn.edu>
> Networking & Telecommunication Services
> Office of Information Technology
> University of Minnesota   
> 2218 University Ave SE        Phone: 612-626-0815
> Minneapolis, MN 55414-3029   Cell: 612-812-9952
> ===============================================
> _______________________________________________
> dhcwg mailing list
> dhcwg@ietf.org
> https://www.ietf.org/mailman/listinfo/dhcwg