Re: [IPv6] Second Working Group Last Call for <draft-ietf-6man-rfc6724-update>

Ted Lemon <mellon@fugue.com> Mon, 15 April 2024 18:25 UTC

Return-Path: <mellon@fugue.com>
X-Original-To: ipv6@ietfa.amsl.com
Delivered-To: ipv6@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id F3155C14CE4A for <ipv6@ietfa.amsl.com>; Mon, 15 Apr 2024 11:25:08 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -1.895
X-Spam-Level:
X-Spam-Status: No, score=-1.895 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, DKIM_SIGNED=0.1, DKIM_VALID=-0.1, HTML_MESSAGE=0.001, RCVD_IN_ZEN_BLOCKED_OPENDNS=0.001, SPF_HELO_NONE=0.001, SPF_PASS=-0.001, URIBL_BLOCKED=0.001, URIBL_DBL_BLOCKED_OPENDNS=0.001, URIBL_ZEN_BLOCKED_OPENDNS=0.001] autolearn=unavailable autolearn_force=no
Authentication-Results: ietfa.amsl.com (amavisd-new); dkim=pass (2048-bit key) header.d=fugue-com.20230601.gappssmtp.com
Received: from mail.ietf.org ([50.223.129.194]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id rA-DpGjhhAby for <ipv6@ietfa.amsl.com>; Mon, 15 Apr 2024 11:25:04 -0700 (PDT)
Received: from mail-yb1-xb2b.google.com (mail-yb1-xb2b.google.com [IPv6:2607:f8b0:4864:20::b2b]) (using TLSv1.3 with cipher TLS_AES_128_GCM_SHA256 (128/128 bits) key-exchange X25519 server-signature RSA-PSS (2048 bits) server-digest SHA256) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id 81FCAC14CE2C for <ipv6@ietf.org>; Mon, 15 Apr 2024 11:25:04 -0700 (PDT)
Received: by mail-yb1-xb2b.google.com with SMTP id 3f1490d57ef6-dcbcea9c261so3513600276.3 for <ipv6@ietf.org>; Mon, 15 Apr 2024 11:25:04 -0700 (PDT)
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=fugue-com.20230601.gappssmtp.com; s=20230601; t=1713205503; x=1713810303; darn=ietf.org; h=cc:to:subject:message-id:date:from:in-reply-to:references :mime-version:from:to:cc:subject:date:message-id:reply-to; bh=i8v4W/LM4yQa4RxGDMgC+1Da2UIOlKiFQiozswwYeTQ=; b=JZjDg0EKrAI5PqVH9UPnKq0vNaw1GSjy5H+zKqTnOT/TMcaYJGjS9UXymKX0eLemW0 5vjt+0e6xf4wjY3ii4nc9CX/MvIooHwHlVqCFC2OazPbDkzgKCYZGLcGnkMXaXmvb9+m In+YhUMSzg/qVIxH1/7DbOqA8U7y43cObL4UPILISiqZrdlVfs+HwoRBUnMcG6ePLHQ0 G4gRXKX2m2DvXg7XU/sKgFewQlEdaJTgkMohEskL370TzbvLyP2hILfxfPZXuV5IOd2V 1RxsXB0AYGDO6O4v0BHYQT0WX+d3DgtSU/iybxI12BaEs6Phaf8Pr59GwpDUvOdKajTN iCSA==
X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20230601; t=1713205503; x=1713810303; h=cc:to:subject:message-id:date:from:in-reply-to:references :mime-version:x-gm-message-state:from:to:cc:subject:date:message-id :reply-to; bh=i8v4W/LM4yQa4RxGDMgC+1Da2UIOlKiFQiozswwYeTQ=; b=Jgf//nAso1pcDy5y4O9dkNcUnVkUoRO5tpDrmgiKpZnIIauU7nehRGB/vxBvdOOvz0 6pfhYhPisrqKQEpT1zC9oMVZR1vyIXXIhshlSIPRlwqLMgrBX2Ma5KbK5aev9wPPxW0l jyq/Eq3bDQpbCILWJN+gbA7/k6afko9zwwdSEPCSiKk713TOIIK1X9saAkURp5k9ecdq lY5ojt0hpKSBz4osp0B2ys8qt2RdQeExsAPwBmrO55gTvpvhG6wf5T7B0vZNbQhoyry9 SrwEv9PGmD0bFW1jmm1GYmsB8g1sqtmiVkrHVJGuwaKzvF/POZC9hXzS+k+A7l5nTh83 fNYQ==
X-Forwarded-Encrypted: i=1; AJvYcCWSxzg+utasGRPgjDDF6z9PaT72CRofbRJOE31yesT0Zvhh3sBqFuQn/2td5lbvxV0JEBgJmevijGbgStTn
X-Gm-Message-State: AOJu0YzMiQrRjsot8LmsoM4bpt5mpRE2MwiJ05cP8LQo4ZXG7E9CkLrN Akj2zIeDGrZB7ktcS9aRtiuB6xxxZIybFfYyM37l4NnQZ8CHgElyERegRcVsAmIvbLzPlsnwlan CBzCY+hHAu0xEH6hGfgJjE0LzHYCaAtruCEYwzA==
X-Google-Smtp-Source: AGHT+IGgBsiqBZSfhvccQav1JrZ/TqbJW393k7oJA9xPmFy+iukFRiI0TPmc2oBRhyeKoZEss6ZTSXR9AjYWhDIhZis=
X-Received: by 2002:a25:8685:0:b0:dc6:4713:bbf1 with SMTP id z5-20020a258685000000b00dc64713bbf1mr8144628ybk.21.1713205503289; Mon, 15 Apr 2024 11:25:03 -0700 (PDT)
MIME-Version: 1.0
References: <6A5E5F35-B35F-4358-8EE1-3BD82329141E@jisc.ac.uk> <6FBC1B5A-BF28-4B05-B2B2-A60DA4707755@gmail.com> <CAPt1N1m-Ye8vfOVnsPesFshLMV5QuVoxWqM=HVZiJ37zaBg6AA@mail.gmail.com> <CAKD1Yr1NTvFj0zB0=+nnUKck7TBtwHFz2XoFkD1smx4yCuZohQ@mail.gmail.com> <1EFB11CD-544F-4AD7-B414-6A626075975D@employees.org> <CAPt1N1kJFgu6FhFaVhhkPnEY2dofcLF2ZuKDBHJFF5UU6R+x2g@mail.gmail.com> <F301BC19-2D6D-42F5-9C94-0516A765B97C@jisc.ac.uk> <CAPt1N1k4FGbTVVk1QTw0-or0PxkhSPqGda8fHrJKb2t4shNGkw@mail.gmail.com> <CFFA3926-583D-4DA0-B981-3D58048DE894@jisc.ac.uk> <CAJU8_nXpC4ZmcbpuVoTxykf2KEO1zpdThA=VQKM8iXRjTAgHiQ@mail.gmail.com> <CAPt1N1mGn2E2-d9PkvTWePSPUkVik7UO-75ryTa2EkjfR_4ZmQ@mail.gmail.com> <CAJU8_nXXSsJa6ycMZuSmTeNoma1HrBdQ5bD1feb7DDDK5b_dVA@mail.gmail.com> <CAPt1N1mESFzHsK3XyE8DD_mhZjWvMuh=pf9RMmT6BgyO6LryWQ@mail.gmail.com> <CAJU8_nU=pV7L8nFTMMf2nC-koXftLmQEOLnGAv+2MkOT+KHwoA@mail.gmail.com>
In-Reply-To: <CAJU8_nU=pV7L8nFTMMf2nC-koXftLmQEOLnGAv+2MkOT+KHwoA@mail.gmail.com>
From: Ted Lemon <mellon@fugue.com>
Date: Mon, 15 Apr 2024 14:24:26 -0400
Message-ID: <CAPt1N1mo8N28YMdVY-BV0pT6mW0bs_Oq5tMY+TRXu1PzjaUKwg@mail.gmail.com>
To: Kyle Rose <krose@krose.org>
Cc: Tim Chown <Tim.Chown=40jisc.ac.uk@dmarc.ietf.org>, Bob Hinden <bob.hinden@gmail.com>, Lorenzo Colitti <lorenzo=40google.com@dmarc.ietf.org>, 6man WG <ipv6@ietf.org>
Content-Type: multipart/alternative; boundary="00000000000073899e061626bdf6"
Archived-At: <https://mailarchive.ietf.org/arch/msg/ipv6/-9koUksRt6l5yokL2n_kFf1lBpo>
Subject: Re: [IPv6] Second Working Group Last Call for <draft-ietf-6man-rfc6724-update>
X-BeenThere: ipv6@ietf.org
X-Mailman-Version: 2.1.39
Precedence: list
List-Id: "IPv6 Maintenance Working Group \(6man\)" <ipv6.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/ipv6>, <mailto:ipv6-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/ipv6/>
List-Post: <mailto:ipv6@ietf.org>
List-Help: <mailto:ipv6-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/ipv6>, <mailto:ipv6-request@ietf.org?subject=subscribe>
X-List-Received-Date: Mon, 15 Apr 2024 18:25:09 -0000

Okay, let's say your case is "natural." In your setup, you'd need to make
fc00::/6 a "known-local" ULA, and then you would get the behavior you want,
right? And you could do this by always publishing an fc00::/6 route in all
your default routers (or a subset, if that makes more sense).

On Mon, Apr 15, 2024 at 2:00 PM Kyle Rose <krose@krose.org> wrote:

> On Mon, Apr 15, 2024 at 1:33 PM Ted Lemon <mellon@fugue.com> wrote:
>
>> First of all, remember that the point of this is to improve the behavior
>> of the stack. What we have works now, but has some issues we want to
>> resolve. We do not need to achieve perfection here—we just need to make
>> things better than they were.
>>
>> Regarding your VPN setup, I would expect one of two things to be true:
>> either the VPN is giving the device connecting through it a prefix on the
>> known ULA, or it doesn't expect the device to try to use the ULA, and hence
>> it should not be treated as known.
>>
>
> Neither. Each site has its own prefix, and the routers hosting the VPN at
> each site route packets over the VPN to the proper site based on the
> destination prefix. Only the site routers are aware of all three prefixes.
>
> As for the table size question, your VPN setup seems unusual and extreme.
>> Is this a real use case, or something you pulled out of your hat?
>>
>
> My setup is not at all contrived or especially complex. The fact that a
> VPN is involved is somewhat extraneous. So, replace "VPN" with "backbone",
> and imagine that krose.net has acquired a few other companies (
> example1.com through example9.com), each with their own ULA prefixes,
> that it wants to attach to the krose.net backbone to save on transit
> costs. Are you contending that all ten sites need to have every one of
> their ULA prefixes distributed and configured statically on every other
> site in order to achieve the objective of routing traffic over the backbone
> via an internal addressing scheme rather than falling back to the public
> internet? (Presumably the backbone could have higher-preference backbone
> routes for known GUAs, but you quickly run into policy management
> complexity if you want internal traffic to be treated differently, and
> then need to apply different policy to the same address pairs depending on
> which link a packet comes in over, an unsafe network segmentation practice.)
>
> I think it's perfectly reasonable to have three /48s in your known-ULA
>> table, but I agree that hosts shouldn't have to support arbitrarily large
>> ULAs.
>>
>
> It turns out there's already a solution to routing packets from a device
> with a single uplink: a default route. If ULA is preferred to IPv4, the
> packets get where they're supposed to go by going from the client, to the
> default gateway (which happens to be the router), over the VPN to the other
> site, and from there to the destination. All without the clients needing to
> know who owns the destination ULA prefix or how it's managed.
>
> I'm contending mine is a very simple, natural, and *basic* use case that
> should be supported. It in fact works today with the hybrid glibc policy
> table. The proposal to require known-local with reduced preference for
> not-known-local ULA implies that every device, not even every router, needs
> to have what amounts to an enterprise-wide ULA DFZ FIB. That seems absurd
> and unnecessary.
>
> Kyle
>
>