Re: [homenet] Support for RFC 7084 on shipping devices...

Alexandre Petrescu <alexandre.petrescu@gmail.com> Mon, 07 October 2019 09:34 UTC

Return-Path: <alexandre.petrescu@gmail.com>
X-Original-To: homenet@ietfa.amsl.com
Delivered-To: homenet@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 0AA7912006F for <homenet@ietfa.amsl.com>; Mon, 7 Oct 2019 02:34:04 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -2.632
X-Spam-Level:
X-Spam-Status: No, score=-2.632 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, DKIM_ADSP_CUSTOM_MED=0.001, FREEMAIL_FROM=0.001, NML_ADSP_CUSTOM_MED=0.9, RCVD_IN_DNSWL_MED=-2.3, SPF_HELO_NONE=0.001, SPF_SOFTFAIL=0.665] autolearn=ham autolearn_force=no
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id iUMncwEWkBJ5 for <homenet@ietfa.amsl.com>; Mon, 7 Oct 2019 02:34:02 -0700 (PDT)
Received: from sainfoin-smtp-out.extra.cea.fr (sainfoin-smtp-out.extra.cea.fr [132.167.192.228]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id D576E120052 for <homenet@ietf.org>; Mon, 7 Oct 2019 02:34:01 -0700 (PDT)
Received: from pisaure.intra.cea.fr (pisaure.intra.cea.fr [132.166.88.21]) by sainfoin-sys.extra.cea.fr (8.14.7/8.14.7/CEAnet-Internet-out-4.0) with ESMTP id x979Y0nj015765 for <homenet@ietf.org>; Mon, 7 Oct 2019 11:34:00 +0200
Received: from pisaure.intra.cea.fr (localhost [127.0.0.1]) by localhost (Postfix) with SMTP id F0A92204C0D for <homenet@ietf.org>; Mon, 7 Oct 2019 11:33:59 +0200 (CEST)
Received: from muguet1-smtp-out.intra.cea.fr (muguet1-smtp-out.intra.cea.fr [132.166.192.12]) by pisaure.intra.cea.fr (Postfix) with ESMTP id E6275203171 for <homenet@ietf.org>; Mon, 7 Oct 2019 11:33:59 +0200 (CEST)
Received: from [10.8.35.150] (is154594.intra.cea.fr [10.8.35.150]) by muguet1-sys.intra.cea.fr (8.14.7/8.14.7/CEAnet-Internet-out-4.0) with ESMTP id x979XxU4025858 for <homenet@ietf.org>; Mon, 7 Oct 2019 11:33:59 +0200
From: Alexandre Petrescu <alexandre.petrescu@gmail.com>
To: "homenet@ietf.org" <homenet@ietf.org>
References: <56255ECF-9002-4440-BA0D-665EFC4BA9C6@fugue.com>
Message-ID: <173c6dc4-b3de-b85c-1cd7-7a1ea254f7f8@gmail.com>
Date: Mon, 7 Oct 2019 11:33:59 +0200
User-Agent: Mozilla/5.0 (Windows NT 10.0; WOW64; rv:68.0) Gecko/20100101 Thunderbird/68.1.1
MIME-Version: 1.0
In-Reply-To: <56255ECF-9002-4440-BA0D-665EFC4BA9C6@fugue.com>
Content-Type: text/plain; charset=utf-8; format=flowed
Content-Language: fr
Content-Transfer-Encoding: 8bit
Archived-At: <https://mailarchive.ietf.org/arch/msg/homenet/0j-Lw1eVj9EnYo49vjA-RX1_kPY>
Subject: Re: [homenet] Support for RFC 7084 on shipping devices...
X-BeenThere: homenet@ietf.org
X-Mailman-Version: 2.1.29
Precedence: list
List-Id: IETF Homenet WG mailing list <homenet.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/homenet>, <mailto:homenet-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/homenet/>
List-Post: <mailto:homenet@ietf.org>
List-Help: <mailto:homenet-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/homenet>, <mailto:homenet-request@ietf.org?subject=subscribe>
X-List-Received-Date: Mon, 07 Oct 2019 09:34:04 -0000


Le 04/10/2019 à 02:39, Ted Lemon a écrit :
> (If you got this as a Bcc, it’s because I am hoping you can contribute to the discussion, but might not be on the mailing list to which I sent the question, so please answer on-list if you are willing.)
> 
> I’ve been involved in some discussions recently where the question has come up: how good is support for RFC7084 in shipping routers?   And what gaps exist in RFC7084 that could cause problems?   And in cases where RFC7084 support either isn’t present, or isn’t useful because no IPv6 or because ISP is delegating a /64, what things might work and what things might not, if we want bidirectional reachability between two separate network links in the home.
> 
> So for example, suppose we have "CE Router," which supports RFC7084, including prefix delegation.  And we have "Internal Router" on that network requests a delegation, and gets a prefix from the CE router.  Presumably that prefix is out of a larger prefix that CE Router got from the ISP.  Great so far.  Let’s call the network on the southbound interface of Internal Router “South Network”. Let’s call the network on its northbound interface, which is also the network on CE router’s southbound interface, “North Network.”
> 
> viz:
> 
>                                                  ISP
>                                                   |
>                                               CE Router
>                                                   |
> North Network    |-------------------------------+--------------+-----------------|
>                                                   |              |
>                                             Internal Router      +---- Node A
>                                                   |
> South Network    |-----------+-------------------+--------------------------------|
>                               |
>                     Node B ---+

If somebody makes a good solution and easily deployed for the topology
in the above figure, then I am willing to consider it for vehicular
networks as well.  In them, the CE Router is a Mobile Router in the car
and the Internal Router is one of many other routers in the car.  The
ISP is a cellular network and, potentially, an 802.11-OCB network.

At this time, the furthest we can do is a CE Router that runs DHCPv6-PD
and then forms /64s for the Internal Router, and then some 64share (
draft-shytyi-v6ops-danir-04 with URL to implementation).  But it has
inconvenients: it introduces a new class (/56), because it is hardcoded
as much as the exiting class /64 is.

(we tried as much as we could to remove the IPv6 class only to come up
with a new one :-)

Alex

> 
> 
> If I want hosts on South Network to communicate with hosts on North Network, what do I have to do?   Should Internal Router publish an RA on its northbound interface?   What is the likelihood of that being filtered by the network?   If packets for South Network are forwarded through CE Router, will it forward them on to Internal Router, forward them north, or drop them?
> 
> Similarly, suppose we have a network where unfortunately PD Isn’t available internally, but IPv6 is present on the northbound interface of the internal node and southbound interface of the CE router.   Suppose further that Internal Router allocates itself a ULA prefix and advertises that as reachable and on-link on its southbound interface, and as reachable but not on-link on its northbound interface.   Will that be blocked at layer 2 by CE Router?   I’m sort of assuming here that the CE router is managing the North Network link, which is probably WiFi.
> 
> Okay, now what if there’s no IPv6 support on CE Router or being provided by CE router on North Network.   Suppose Internal Router allocates a ULA and allocates two /64s out of the ULA, one of which is advertised as reachable on its northbound interface and on-link on its southbound interface, and a second of which is advertised as on-link on its northbound interface and reachable on its southbound interface.
> 
> Fourth possibility: Node A is manually configured with an IPv6 address on a prefix that Internal router is advertising as reachable on its southbound interface, but which is not advertised on South Network because of filtering.  Node B has an address on a prefix that Internal Router is advertising as on-link on its southbound interface.   Node A has a static route configured through Internal Router to the second prefix.   Is there any reason to think that traffic between Node A and Node B will be filtered at layer 2 by CE Router, assuming that traffic on North Network is all going through CE Router?
> 
> The goal here is to have bidirectional reachability between the two nodes on IPv6 using either a global prefix or a ULA.  The concern is that something could prevent each of these cases from working.   What I’m really curious about is whether people have experience with doing communications of this type using actual routers that ISPs are shipping.   Is this “internal network” scenario part of acceptance testing for these routers?  Is this all a big question mark?   In principle this should all work, unless RA guard is hyperactive in CE Router.   But what about in practice?
> 
> 
> --------------------------------------------------------------------
> IETF IPv6 working group mailing list
> ipv6@ietf.org
> Administrative Requests: https://www.ietf.org/mailman/listinfo/ipv6
> --------------------------------------------------------------------
>