Re: [v6ops] A common problem with SLAAC in "renumbering" scenarios

Nick Hilliard <nick@foobar.org> Fri, 22 February 2019 12:37 UTC

Return-Path: <nick@foobar.org>
X-Original-To: ipv6@ietfa.amsl.com
Delivered-To: ipv6@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id EB68912D84D; Fri, 22 Feb 2019 04:37:21 -0800 (PST)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -4.201
X-Spam-Level:
X-Spam-Status: No, score=-4.201 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, RCVD_IN_DNSWL_MED=-2.3, SPF_PASS=-0.001] autolearn=unavailable autolearn_force=no
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id w_f-Hjpi7l14; Fri, 22 Feb 2019 04:37:20 -0800 (PST)
Received: from mail.netability.ie (mail.netability.ie [IPv6:2a03:8900:0:100::5]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-SHA (256/256 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id 83264124BF6; Fri, 22 Feb 2019 04:37:20 -0800 (PST)
X-Envelope-To: v6ops@ietf.org
Received: from crumpet.local (089-101-070074.ntlworld.ie [89.101.70.74] (may be forged)) (authenticated bits=0) by mail.netability.ie (8.15.2/8.15.2) with ESMTPSA id x1MCauMN028797 (version=TLSv1.2 cipher=ECDHE-RSA-AES256-SHA bits=256 verify=NO); Fri, 22 Feb 2019 12:36:56 GMT (envelope-from nick@foobar.org)
X-Authentication-Warning: cheesecake.ibn.ie: Host 089-101-070074.ntlworld.ie [89.101.70.74] (may be forged) claimed to be crumpet.local
Subject: Re: [v6ops] A common problem with SLAAC in "renumbering" scenarios
To: Christian Huitema <huitema@huitema.net>
Cc: JORDI PALET MARTINEZ <jordi.palet=40consulintel.es@dmarc.ietf.org>, Tom Herbert <tom@herbertland.com>, Mark Smith <markzzzsmith@gmail.com>, IPv6 Operations <v6ops@ietf.org>, "6man@ietf.org" <6man@ietf.org>
References: <6D78F4B2-A30D-4562-AC21-E4D3DE019D90@consulintel.es> <B6E2EC33-EEAF-40D0-AFCC-BDAFA9134ACD@consulintel.es> <20190220113603.GK71606@Space.Net> <28fbc2c305c640c9afb3704050f6e8d7@boeing.com> <20190220213107.GS71606@Space.Net> <019c552eb1624d348641d6930829fd1f@boeing.com> <CAKD1Yr0HBG+rhyFWg9zh0t3mW486Mjx9umjn+CRqAZg4z9r0dg@mail.gmail.com> <20190221073530.GT71606@Space.Net> <CAO42Z2wmB2W52b4MZ2h9sW5E9cQKm-HRjyf--q8C26jezS7LXQ@mail.gmail.com> <a73818d31db7422b99a524bc431b00ed@boeing.com> <CAO42Z2z9-48Gbb_Exf+oWUqDO=axSLpZBtqeDcxkAoFq5OziGw@mail.gmail.com> <CALx6S3624hnGauG1HaSWPMvQw0t2Q5R3gb8W4R8w3kuK7dcrWQ@mail.gmail.com> <1F07F2BB-2F37-4D12-9731-7892DF4E3D88@consulintel.es> <0a582916-af14-bd82-a4cd-002a36f8830b@huitema.net>
From: Nick Hilliard <nick@foobar.org>
Message-ID: <67515a73-26a5-3ed0-da88-1a4ce64550d3@foobar.org>
Date: Fri, 22 Feb 2019 12:36:55 +0000
User-Agent: Mozilla/5.0 (Macintosh; Intel Mac OS X 10.14; rv:52.0) Gecko/20100101 PostboxApp/6.1.10
MIME-Version: 1.0
In-Reply-To: <0a582916-af14-bd82-a4cd-002a36f8830b@huitema.net>
Content-Type: text/plain; charset="utf-8"; format="flowed"
Content-Language: en-GB
Content-Transfer-Encoding: 7bit
Archived-At: <https://mailarchive.ietf.org/arch/msg/ipv6/-8hqmZDpyTPQtyncIirZ98uskdU>
X-BeenThere: ipv6@ietf.org
X-Mailman-Version: 2.1.29
Precedence: list
List-Id: "IPv6 Maintenance Working Group \(6man\)" <ipv6.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/ipv6>, <mailto:ipv6-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/ipv6/>
List-Post: <mailto:ipv6@ietf.org>
List-Help: <mailto:ipv6-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/ipv6>, <mailto:ipv6-request@ietf.org?subject=subscribe>
X-List-Received-Date: Fri, 22 Feb 2019 12:37:22 -0000

Christian Huitema wrote on 22/02/2019 07:44:
> Debating the beauty of NAT on an IPv6 list is surely good fun for some,
> but could we get some progress on the original issue, which could be
> summed up as a "bug in SLAAC"? Fernando filed that bug 3 weeks ago, I
> saw hundreds of messages on the mailing list, but I did not see much
> progress.

There seems to be lack of consensus on whether this can be thrown into 
the "bug in SLAAC" category.

Ole declared that the root cause was "misconfiguration/error".

Fernando and others feel that it's the compound outcome of several 
independent protocol and design-choice behaviours, none of which, 
incidentally, is inherently broken per se.

> Do we agree that this is indeed a bug, or do we think that having users
> disconnected from the Internet after a home router reboots is just a
> desirable feature of IPv6?

Most people feel the outcome is undesirable when it happens.  Some 
people feel that it's not worth getting too excited about because 
assignment stickiness tends to ensure that prefix assignments are 
long-lived enough that it probably won't cause too much difficulty. 
Others noted that long SLAAC lifetimes and lack of application 
workarounds (HE, etc) would make it a noticeable problem, when it 
happens, but didn't comment on how frequently it happened.

> Do we agree that it would be good if routers that reboot could just
> reacquire the same prefix from DHCPv6 PD?

Most operators seem to provision their networks such that they will not 
commit to prefix stability over the lifetime of a customer contract 
unless the customer coughs up more money for it.  Hand in hand with 
this, static ip addressing is routinely handled differently to dynamic 
IP addressing on service provider networks.

> Do we also agree that there
> will always be a significant fraction of deployment in which that won't
> be possible?

This is a complex question which interplays with cost, network design 
and long term network complexity.  There is no easy answer to it.

> Do we agree that the working group should actually start working on some
> improvement in SLAAC that would mitigate the issue? Not excluding of
> course solutions that would also mitigate related egress filtering issue?

Fixing or updating SLAAC is likely to take years to roll out and at 
least one person was of the opinion that SLAAC was basically unfixable 
in this regard.  This ignores whether it would be useful or viable for 
the IETF to issue advice to CPE vendors and service providers about how 
to avoid the problem from happening in the first place.

Ultimately, your email shows why the discussion ended up in a discussion 
about NAT.  There's no single cause of the problem and no quick fix; 
declaring the problem to be solely the domain of any particular 
stakeholder may cause CPE vendors to deploy NPTv6 in the long term to 
work around the issue, because this would make the problem mostly 
disappear from the point of view of the user. There is a cost, of 
course, but it's a cost which most end users are already familiar with, 
and accept.  It would be sad and unfortunate if this were to be the 
outcome of this discussion.

Nick