Re: [dhcwg] WGLC for draft-ietf-dhc-addr-notification - Respond by September 13, 2023

Lorenzo Colitti <lorenzo@google.com> Thu, 14 September 2023 03:07 UTC

Return-Path: <lorenzo@google.com>
X-Original-To: dhcwg@ietfa.amsl.com
Delivered-To: dhcwg@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id B5257C1516F8 for <dhcwg@ietfa.amsl.com>; Wed, 13 Sep 2023 20:07:47 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -22.607
X-Spam-Level:
X-Spam-Status: No, score=-22.607 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, DKIMWL_WL_MED=-0.001, DKIM_SIGNED=0.1, DKIM_VALID=-0.1, DKIM_VALID_AU=-0.1, DKIM_VALID_EF=-0.1, ENV_AND_HDR_SPF_MATCH=-0.5, HTML_MESSAGE=0.001, RCVD_IN_DNSWL_HI=-5, RCVD_IN_ZEN_BLOCKED_OPENDNS=0.001, SPF_HELO_NONE=0.001, SPF_PASS=-0.001, T_SCC_BODY_TEXT_LINE=-0.01, URIBL_DBL_BLOCKED_OPENDNS=0.001, URIBL_ZEN_BLOCKED_OPENDNS=0.001, USER_IN_DEF_DKIM_WL=-7.5, USER_IN_DEF_SPF_WL=-7.5] autolearn=ham autolearn_force=no
Authentication-Results: ietfa.amsl.com (amavisd-new); dkim=pass (2048-bit key) header.d=google.com
Received: from mail.ietf.org ([50.223.129.194]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id 9Fip_p7VMlWj for <dhcwg@ietfa.amsl.com>; Wed, 13 Sep 2023 20:07:43 -0700 (PDT)
Received: from mail-qv1-xf2c.google.com (mail-qv1-xf2c.google.com [IPv6:2607:f8b0:4864:20::f2c]) (using TLSv1.3 with cipher TLS_AES_128_GCM_SHA256 (128/128 bits) key-exchange X25519 server-signature RSA-PSS (2048 bits) server-digest SHA256) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id 0FAD8C151099 for <dhcwg@ietf.org>; Wed, 13 Sep 2023 20:07:43 -0700 (PDT)
Received: by mail-qv1-xf2c.google.com with SMTP id 6a1803df08f44-655d25f3678so3218526d6.3 for <dhcwg@ietf.org>; Wed, 13 Sep 2023 20:07:42 -0700 (PDT)
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=20230601; t=1694660862; x=1695265662; darn=ietf.org; h=cc:to:subject:message-id:date:from:in-reply-to:references :mime-version:from:to:cc:subject:date:message-id:reply-to; bh=5iGkoXHYiSUmqSRbP6DOFd8fYngBFZiqk1VzzGj9GUo=; b=zBS+VSamisOIuijrBDcLo5jyBLwgxfjxKGVmU1oTKjlZT/QHU4wxTfCwEXgc50Apol MKwNrh2/yQIUZyQ8oYwRgRZ338kfEv04WfyMJR1jpvTRd9CnFfNqxTZm8ygkIvkXrhgh 0ofhwxLwoUZpuJ2Iy8kYu9j1qWyPibCfuZpGx6dxOhovKbmdfXKxTKNQdR0ix8pV3D4m MeaHykVxjgfB1r1riQUSav92es+KGvz6PtGdM/4xxBzJnFjsTQM32tL5obM0WXKl7WpA vvF6HxKAc9xfiA8SNZHEr2I0wRNv3VehqJGBoFpD8XOE6Ze0wvd2fdnHsYeQd6R5NBHO SyeA==
X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20230601; t=1694660862; x=1695265662; h=cc:to:subject:message-id:date:from:in-reply-to:references :mime-version:x-gm-message-state:from:to:cc:subject:date:message-id :reply-to; bh=5iGkoXHYiSUmqSRbP6DOFd8fYngBFZiqk1VzzGj9GUo=; b=H7gnDqyYE2DBiRmx4K14By9fvdXUTTQWJZgBJ5hqRNKA5stTBWGxV+q56h4YaBi2si hbAg0JWjEmhuGWR9ZolxcvpVfGP+Ke5riDGdyaqoBCWDS9YagU+TVHO6LgzX/APVhqvr nI2eZyg7dd1o+2mgzOp8sgmShG61NpWu+deftSvMjh/6sWsJRrmA4hi/6QudD5erOOJk cbnWiuj/AdFE7VcEqak2fZ83EjZDQcXrCBXN12NDCroEFAtg8eC3E7stKNQA4HolTHe+ hVEyyUL1Y0j/p/IydrkCX9nA9MT3soYSaenoGE07E8BZXR8KIVMSmOW2Gls+CXBLtjrU LWqg==
X-Gm-Message-State: AOJu0YwAj5McDQht/dv1Id0efOQP08bx/jeRINHo5ynClW6YPMQbW0+W VgBoxxdxUczgRsH+H4kBZ+bNnLfYjqTkGOScU9v9IA==
X-Google-Smtp-Source: AGHT+IGEs/QblQQMyHaf5h4twmgiytLjyXGN67qyRF7KWAAhWdB/fbN7V6teF2wx9XYBOMGUU9wlEPHSYBP632FX9bM=
X-Received: by 2002:a05:6214:4a90:b0:64f:92dc:3de2 with SMTP id pi16-20020a0562144a9000b0064f92dc3de2mr4785003qvb.53.1694660861447; Wed, 13 Sep 2023 20:07:41 -0700 (PDT)
MIME-Version: 1.0
References: <A174EAA0-678A-42FE-A24D-C697BE8D50E4@employees.org> <F0493518-E929-470C-818C-A07D814ED46C@gmail.com>
In-Reply-To: <F0493518-E929-470C-818C-A07D814ED46C@gmail.com>
From: Lorenzo Colitti <lorenzo@google.com>
Date: Thu, 14 Sep 2023 12:07:23 +0900
Message-ID: <CAKD1Yr3AEOa_7dKM15g+z6ZPDApZz08vgCS4kn9Uvi=+B9Dthg@mail.gmail.com>
To: Bernie Volz <bevolz@gmail.com>
Cc: Ole Trøan <otroan@employees.org>, Michael Richardson <mcr+ietf@sandelman.ca>, dhcwg <dhcwg@ietf.org>
Content-Type: multipart/alternative; boundary="000000000000a9c79c060548fa7c"
Archived-At: <https://mailarchive.ietf.org/arch/msg/dhcwg/VupAB35fGt67OEu8PbFFnXBZdOs>
Subject: Re: [dhcwg] WGLC for draft-ietf-dhc-addr-notification - Respond by September 13, 2023
X-BeenThere: dhcwg@ietf.org
X-Mailman-Version: 2.1.39
Precedence: list
List-Id: Dynamic Host Configuration <dhcwg.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/dhcwg>, <mailto:dhcwg-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/dhcwg/>
List-Post: <mailto:dhcwg@ietf.org>
List-Help: <mailto:dhcwg-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/dhcwg>, <mailto:dhcwg-request@ietf.org?subject=subscribe>
X-List-Received-Date: Thu, 14 Sep 2023 03:07:47 -0000

Thanks all for the constructive discussions here. Let's see if I can try to
summarize/characterize the incremental rollout and traffic quesstion.

For SLAAC-only (A=1, M=0, O=0) or DHCPv6-only (A=0) networks , there will
never be any registrations. Ole, your code will never see any of these
packets :-)

Registrations will occur if A=1 and M/O=1 (i.e., there is SLAAC and a
DHCPv6 server). If the DHCPv6 server supports this protocol, it will ack
the regstrations and there will be at most two packets every 80% of the
address lifetime.

I think that's fine, so the only question is what to do for networks where
A=1, M/O=1, and the DHCPv6 server doesn't support this message type. We
have a few options here:

   1. The host always registers.
   2. The host starts off registering, but if it doesn't receive any ACKs,
   it stops.
   3. The host always registers unless an RA flag enables it.
   4. The host never registers unless an RA flag disables it.

I don't think #3 and #4 are good options because operational experience
deployment of new RA flags is very slow. Our experience with the deployment
of pref64 taught us that changing the content of the RA requires a router
upgrade, which takes years. Also I don't think there is widespread support
for the "RA extended flags" option in RFC 5075 (e.g., Linux doesn't support
it).

Right now the draft assumes #1. Personally I think this is the right way
forward. It's not a lof of traffic, and SLAAC sends multicast traffic
already (DAD, GRAND, multicast NS, etc.). Networks can also control the
amount of traffic by lengthening lifetimes. And Wi-Fi access points where
multicast is expensive can simply not send DHCPv6 packets out on the air.
Many wifi networks are probably doing this already, to prevent chatty and
privacy-sensitive DHCPv6 solicits going to all devices. Even if they don't,
the amount of traffic is way less than other sources of multicast such as
MDNS.

That said, if there is consensus that #1 will create too much traffic and
we really don't want to do it, how about #2? Something like:

=====
If after transmitting AddrRegServerDetect ADDR-REG-INFORM messages on a
given network the client has never received any ADDR-REG-REPLY message, it
SHOULD stop transmitting ADDR-REG-INFORM messages on that network until it
connects to that network again. A suggested value for AddrRegServerDetect
is 8.
=====

or:

=====
If the client never receives any ADDR-REG-REPLY message for a given
address, it SHOULD NOT schedule any refreshes for the address.
=====

On Thu, Sep 14, 2023 at 4:43 AM Bernie Volz <bevolz@gmail.com> wrote:

> While in some ways yes, I would think that is likely a bad idea as
> infrastructure devices are upgraded much more slowly than clients and so it
> might take a long time before it can be used by any clients.
>
> I do worry about the DHCPv6 server loading impacts for large networks, but
> in many cases (such as DOCSIS) it will only be the home gateway that sees
> this traffic … and in DOCSIS CMs use dhcpv6 and not SLAAC on the WAN side.
>
> Flat networks such as trade shows may see a lot of activity, but usually
> there performance isn’t as big a deal. And, most of the clients aren’t
> impacted by a power failure (as they run from battery) so we shouldn’t see
> a huge spike after power is restored. But even here these numbers are not
> as bad as larger SP deployments.
>
> And with the “refresh” algorithm changes recently we hopefully will see
> far less notification traffic, at least when lifetimes are reasonably long.
>
> These are certainly considerations for moving this forward, and maybe more
> analysis is needed to understand the full impact if we leave it for clients
> to default on (and not depending on a new PIO flag to turn this feature on,
> but off).
>
> Yes, in an ideal world having all general purpose clients support dhcp
> would certainly be best, but sadly that is not were we are and not sure
> this has much hope of changing for now.
>
> - Bernie (from iPad)
>
> On Sep 13, 2023, at 3:17 PM, Ole Trøan <otroan@employees.org> wrote:
>
> 
> If the flag is the way to go I was thinking the reverse, that the new
> protocol would require explicit enablement.
> After all most SLAAC networks would not need this and most networks that
> needs network controlled addressing would use normal DHCPv6.
> And isn’t this just a band-aid until all hosts support DHCPv6 address
> assignment anyway?
>
> O.
>
> On 13 Sep 2023, at 20:57, Bernie Volz <bevolz@gmail.com> wrote:
>
> Ok, more understandable.
>
> Maybe if consenus is for a PIO flag (when A bit set) that if set, say’s
> don’t send server “global scope” SLAAC address notifications would be
> something to consider. That means existing routers don’t have to change for
> clients to send notifications (as flag would be clear - meaning to send).
> Market can then determine if implementing this router PIO flag is worth it
> or not. And flag is controllable by administrator for a network which is
> better than client control which is difficult to signal.
>
> And yes, I suspect that lots of servers (and maybe even some relays) will
> log about the unknown packets and could clutter up logs. It may be
> appropriate to suggest “DHCP servers that do not wish to fully support this
> message, way want to consider whether logging an unknown message for the
> registration message is worth it — though minimal support of the message by
> logging details of the notification request and sending a reply may not be
> significantly more work and would eliminate logging retransmissions except
> when a client fails to receive reply.”
>
> - Bernie (from iPad)
>
> On Sep 13, 2023, at 2:42 PM, Ole Trøan <otroan@employees.org> wrote:
>
> 
> Hi Bernie,
>
> Sorry if I was muddying the waters.
> I tried to understand if signaling was needed to inform the client to do
> address notification.
>
> Since it’s only relevant if A-bit is set, then perhaps a new PIO flag
> telling the client to initiate the new address notification protocol.
>
> (Not supporting the proposal at all, but the extra flag would at least
> mean I never needed to see the packets. And yes, my DHCPv6 server writes a
> log line per unknown message.)
>
> Cheers,
> Ole
>
>
> On 13 Sep 2023, at 20:08, Bernie Volz <bevolz@gmail.com> wrote:
>
> I’m confused by this recent set of discussions.
>
> M&O bits in RA say whether client should run dhcpv6 client (M means
> address assignment via dhcpv6).
>
> A-bit in Prefix Information Option in RA say whether client can auto
> generate address.
>
> When M-bit set for RA receiver for interface, if dhcpv6 implemented on
> client it does dhcpv6. If A-bit set, client does SLAAC. So in this case
> either client does both (though may not get address via dhcpv6) or only
> SLAAC if no dhcpv6 support.
>
> But as there were long discussions on these bits, my understanding and
> yours may well be different as the IETF decided to punt on the issue.
>
> Yes there is no only do dhcpv6 if you support it, otherwise do SLAAC (do
> not do both). That might be something to consider if this is a significant
> issue but my understanding is that we have lived in this world for a long
> time.
>
> Also, Ole wrote:
>
> So it sounds like there is a PIO flag missing, that would have to be used
> to signal that a SLAAC client should also do DHCPv6. I really don’t think
> the M-flag or the O-flag should be overloaded to indicate this. But I might
> have misunderstood Lorenzo’s message.
>
>
> The M&O bits are interface specific (run dhcpv6 or not and issue Solicit
> if M set). PIO is prefix specific. So this would be mixing things when
> there is more than one prefix active on an interface. I don’t see that as a
> good thing.
>
> - Bernie
>
> On Sep 13, 2023, at 1:49 PM, Michael Richardson <mcr+ietf@sandelman.ca>
> wrote:
>
> 
> Ole Troan <otroan@employees.org> wrote:
>
> the M-flag is set the host will do
>
> normal dhcp surely?
>
>
> If the host has a dhcpv6 client.
>
>
> Well, this proposal assumes every host has a DHCPv6 client
>
> implementation does it not? :-D
>
>
> I think it really could be a one-shot python script run, perhaps from cron.
> (It might need to bail if renew time hasn't arrived yet)
>
> So it sounds like there is a PIO flag missing, that would have to be
>
>
> Such hosts just fail to get an address today.
>
> --
> Michael Richardson <mcr+IETF@sandelman.ca>   . o O ( IPv6 IøT consulting )
>           Sandelman Software Works Inc, Ottawa and Worldwide
>
>
>
>
> _______________________________________________
> dhcwg mailing list
> dhcwg@ietf.org
> https://www.ietf.org/mailman/listinfo/dhcwg
>
>