Re: Confirmation to advance: draft-ietf-6man-ipv6only-flag-05

Philip Homburg <pch-ipv6-ietf-6@u-1.phicoh.com> Fri, 10 May 2019 17:37 UTC

Return-Path: <pch-b9D3CB0F5@u-1.phicoh.com>
X-Original-To: ipv6@ietfa.amsl.com
Delivered-To: ipv6@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id CC5E612009E for <ipv6@ietfa.amsl.com>; Fri, 10 May 2019 10:37:44 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -4.2
X-Spam-Level:
X-Spam-Status: No, score=-4.2 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, RCVD_IN_DNSWL_MED=-2.3] autolearn=ham autolearn_force=no
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id kobNlemar6s0 for <ipv6@ietfa.amsl.com>; Fri, 10 May 2019 10:37:43 -0700 (PDT)
Received: from stereo.hq.phicoh.net (stereo.hq.phicoh.net [130.37.15.35]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id 95CDA120019 for <ipv6@ietf.org>; Fri, 10 May 2019 10:37:41 -0700 (PDT)
Received: from stereo.hq.phicoh.net (localhost [::ffff:127.0.0.1]) by stereo.hq.phicoh.net with esmtp (TLS version=TLSv1.2 cipher=ECDHE-RSA-AES256-GCM-SHA384) (Smail #157) id m1hP9Sk-0000IaC; Fri, 10 May 2019 19:37:38 +0200
Message-Id: <m1hP9Sk-0000IaC@stereo.hq.phicoh.net>
To: ipv6@ietf.org
Subject: Re: Confirmation to advance: draft-ietf-6man-ipv6only-flag-05
From: Philip Homburg <pch-ipv6-ietf-6@u-1.phicoh.com>
Sender: pch-b9D3CB0F5@u-1.phicoh.com
References: <F8BFFCAD-E58E-4736-8A1C-56579B6F6032@employees.org> <alpine.DEB.2.20.1905091054560.1824@uplift.swm.pp.se> <m1hOfjp-0000IdC@stereo.hq.phicoh.net> <924a4e34-e5f9-9872-bd4a-c0f68fd5387f@gmail.com> <m1hP1uA-0000EhC@stereo.hq.phicoh.net> <12F17008-16C5-4E58-89DB-BC7D01341CD7@lists.zabbadoz.net> <f1210218-9a51-805f-df31-d96dc9381c91@foobar.org> <F5BC870A-0853-43A3-A493-DC7DF8701B50@lists.zabbadoz.net> <C5A98D65-ABC9-4728-82C5-CF81F8FE53D8@steffann.nl> <CAN-Dau3F+Z94aC1fAohZDz81z=Kg4u1TZGiuMH_L4yVUCH1sMg@mail.gmail.com> <CAN-Dau3dqML64G5gG+Rh9nwC-JHDNH_sfeK8C-cqis1n5bswCg@mail.gmail.com>
In-reply-to: Your message of "Fri, 10 May 2019 09:52:54 -0500 ." <CAN-Dau3dqML64G5gG+Rh9nwC-JHDNH_sfeK8C-cqis1n5bswCg@mail.gmail.com>
Date: Fri, 10 May 2019 19:37:34 +0200
Archived-At: <https://mailarchive.ietf.org/arch/msg/ipv6/-YYnBZP1xT971-S3M-ZuvbYtC0I>
X-BeenThere: ipv6@ietf.org
X-Mailman-Version: 2.1.29
Precedence: list
List-Id: "IPv6 Maintenance Working Group \(6man\)" <ipv6.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/ipv6>, <mailto:ipv6-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/ipv6/>
List-Post: <mailto:ipv6@ietf.org>
List-Help: <mailto:ipv6-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/ipv6>, <mailto:ipv6-request@ietf.org?subject=subscribe>
X-List-Received-Date: Fri, 10 May 2019 17:37:45 -0000

>So really the effect we needed is not necessarily a "hard off" for the IPv4
>stack or even RFC 3927. 

One thing that could work is to turn the flag into a 'no IPv4 link local
in the absence of DHCPv4' flag.

As far as I know, networks that rely on IPv4 link local are quite rare and
in general you would not expect an untrused host to show up on such a network.
That should kill any unwanted service discovery.

Then the flag can be used as a heuristic to reduce the DHCPv4 DISCOVER rate.
That should be safe as long the host just reduces the rate to something
reasonable instead of completely stopping DHCPv4.

Anybody who is worried about the flag would then only have to run a DHCPv4
server, which is what the vast majority of the IPv4 networks already have.