Re: Confirmation to advance: draft-ietf-6man-ipv6only-flag-05

Gyan Mishra <hayabusagsm@gmail.com> Sat, 04 May 2019 04:05 UTC

Return-Path: <hayabusagsm@gmail.com>
X-Original-To: ipv6@ietfa.amsl.com
Delivered-To: ipv6@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 12CC11202AA for <ipv6@ietfa.amsl.com>; Fri, 3 May 2019 21:05:27 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -1.999
X-Spam-Level:
X-Spam-Status: No, score=-1.999 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, DKIM_SIGNED=0.1, DKIM_VALID=-0.1, DKIM_VALID_AU=-0.1, FREEMAIL_FROM=0.001, RCVD_IN_DNSWL_NONE=-0.0001, SPF_PASS=-0.001, URIBL_BLOCKED=0.001] autolearn=ham autolearn_force=no
Authentication-Results: ietfa.amsl.com (amavisd-new); dkim=pass (2048-bit key) header.d=gmail.com
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id zoMIbv3o28lM for <ipv6@ietfa.amsl.com>; Fri, 3 May 2019 21:05:25 -0700 (PDT)
Received: from mail-qt1-x82d.google.com (mail-qt1-x82d.google.com [IPv6:2607:f8b0:4864:20::82d]) (using TLSv1.2 with cipher ECDHE-RSA-AES128-GCM-SHA256 (128/128 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id E00C51201CE for <ipv6@ietf.org>; Fri, 3 May 2019 21:05:24 -0700 (PDT)
Received: by mail-qt1-x82d.google.com with SMTP id g4so9055914qtq.10 for <ipv6@ietf.org>; Fri, 03 May 2019 21:05:24 -0700 (PDT)
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=gmail.com; s=20161025; h=mime-version:subject:from:in-reply-to:date:cc :content-transfer-encoding:message-id:references:to; bh=jrtdykqrAd6q3mXWJheNCACjag70YyldIKWau/jrcBI=; b=AOtVMVgXnogDG/04aW631qX2PpT8d1mXL5RXF07Uyb7UjjO7/zOEC7xr9ZXOJ56kzl 4GYDZhZ7rsjlZvKTeWRyglV6TGkQ/dTjECOyUZUor4/cJvoIxUGs5Z01WmkCnP+y0WeL gNOHvXnijbH8JmMOa1qtnfzaI47PzB9lpnDH12vwWlhaq2k3uyavYvfXi//EsUI/rpt4 /f/1vvEbItyTF6KAwc1vW9jcHi6LNdlmh0ZqfjxC9CCxWlrEAdn8kddt4i02sj1J1hKx eu2i1ewsUfQIAbv+tHDSEcYIKUJKdUd6u3PX5wxKNSu1haOJXnHrWIy7YRdsgo3CnFkQ 1j/Q==
X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20161025; h=x-gm-message-state:mime-version:subject:from:in-reply-to:date:cc :content-transfer-encoding:message-id:references:to; bh=jrtdykqrAd6q3mXWJheNCACjag70YyldIKWau/jrcBI=; b=FQJJKYefgiKDsIvmXBo9dE/fdV7K8DFmvTPR3oRKxkPAfC5QKw0uamvTI41LxnM66W jF/RnqTjNIC2i0PKRCWPNj/AaDK+wCL7tnzJqSYES7sslTo+9Fibf1i+rytHH9GvdTqq Us7x/irMQMpdHjSTUUHgWtAoAegqmJ1VjBIn79E+BMK5jVJodRSpdiwOn6YngKSE5hJi ll/FnAuy/5z0SIK4g3SDZA6v7obR8SmPEA9ekv+WW6t8T/za6Ysr4pXW3L0BlMjkLS/W PkHkzNZwq9EmUd1poMUmneGg7VPnFszURjBAFz9aVkSEo9sciMp1vXGoya5hYLlOyFpG 15aA==
X-Gm-Message-State: APjAAAXTMxc4D9No0lry///1j//6yBU1rUS0GZIIUKmloJJDhXW3yWWp shxakSJzetqyFuaKW+2qov1Eoea8PsU=
X-Google-Smtp-Source: APXvYqzQHJdDVL9XntV78SCdP8Xu3H2qsZ46KGIVAKxCpIroqhv6Q4/Yf2caQ1UHbudjL08/ikSAsA==
X-Received: by 2002:a0c:ae43:: with SMTP id z3mr6641702qvc.241.1556942723249; Fri, 03 May 2019 21:05:23 -0700 (PDT)
Received: from [192.168.1.213] (pool-72-83-194-140.washdc.fios.verizon.net. [72.83.194.140]) by smtp.gmail.com with ESMTPSA id g189sm2555352qkd.60.2019.05.03.21.05.21 (version=TLS1_2 cipher=ECDHE-RSA-AES128-GCM-SHA256 bits=128/128); Fri, 03 May 2019 21:05:21 -0700 (PDT)
Content-Type: text/plain; charset="utf-8"
Mime-Version: 1.0 (1.0)
Subject: Re: Confirmation to advance: draft-ietf-6man-ipv6only-flag-05
From: Gyan Mishra <hayabusagsm@gmail.com>
X-Mailer: iPhone Mail (16E227)
In-Reply-To: <CAO42Z2zCYEHtyKyrWEw8n95c0jiGqLikFesPHqrd4p+zcsA24g@mail.gmail.com>
Date: Sat, 04 May 2019 00:05:20 -0400
Cc: Brian E Carpenter <brian.e.carpenter@gmail.com>, 6man WG <ipv6@ietf.org>
Content-Transfer-Encoding: quoted-printable
Message-Id: <9E8C1F9D-7B75-44F9-8D7A-76FA57D2E0E9@gmail.com>
References: <F8BFFCAD-E58E-4736-8A1C-56579B6F6032@employees.org> <a2465e81-a17f-ab48-efda-20fe12a70077@foobar.org> <30239E0C-C444-4A7E-8342-AEE47BF8A2BB@employees.org> <8b9fd743-bfcc-525c-98f6-154f3fa713cc@foobar.org> <CAO42Z2zEWvt9NyemMb8H0AEvPvmNSDGa4wcXiS6n5yRxNFCHQg@mail.gmail.com> <c7e18765-be04-6494-8193-984dbccb520b@foobar.org> <CANMZLAYh+V57yrWOzmUyjSMK0g95u1D5_GZmyZBMOMKAZnrnCg@mail.gmail.com> <3F474511-6FE3-4A0A-9B84-7C37F08FBB5D@steffann.nl> <E352C226-C708-4418-BCDE-10525CAB109A@jisc.ac.uk> <652fb10e-b8ce-0151-a9a0-62d2378caed2@gmail.com> <0079c716-d56c-7199-f493-f5e56e1307ae@foobar.org> <b33de303-eaca-f7f6-804e-2c9343eb92a1@gmail.com> <6C4ABEF1-2565-4BA9-9FC5-5B3C45A719AD@gmail.com> <c2222416-6491-1906-a403-d012777a4b38@gmail.com> <CABNhwV0-SdKZqQa4z9jhpc8h1Eq=8UxRhtvHt1==BYEMTVRjug@mail.gmail.com> <CAO42Z2zCYEHtyKyrWEw8n95c0jiGqLikFesPHqrd4p+zcsA24g@mail.gmail.com>
To: Mark Smith <markzzzsmith@gmail.com>
Archived-At: <https://mailarchive.ietf.org/arch/msg/ipv6/6mCrkZEJY9QiokWuYJYmVkoUgzQ>
X-BeenThere: ipv6@ietf.org
X-Mailman-Version: 2.1.29
Precedence: list
List-Id: "IPv6 Maintenance Working Group \(6man\)" <ipv6.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/ipv6>, <mailto:ipv6-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/ipv6/>
List-Post: <mailto:ipv6@ietf.org>
List-Help: <mailto:ipv6-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/ipv6>, <mailto:ipv6-request@ietf.org?subject=subscribe>
X-List-Received-Date: Sat, 04 May 2019 04:05:27 -0000

Thanks Bob

Thanks for enlightening me on that.  Maybe we should add FB and Microsoft as use cases to the draft as I didn’t see it mentioned.

Based on that I am on board with the IPv6 only flag and support the draft.

Regards

Gyan

Sent from my iPhone

> On May 3, 2019, at 8:04 PM, Mark Smith <markzzzsmith@gmail.com> wrote:
> 
>> On Sat., 4 May 2019, 08:54 Gyan Mishra, <hayabusagsm@gmail.com> wrote:
>> 
>> Do we or anyone in the WG know of any enterprise that is thinking of going IPv6 only.  I don't.
> 
> Case Study: Facebook Moving To An IPv6-Only Internal Network, 6 June 2014
> https://www.internetsociety.org/resources/deploy360/2014/case-study-facebook-moving-to-an-ipv6-only-internal-network/
> 
> Microsoft making progress towards IPv6-only, 17 Sep 2018
> https://blog.apnic.net/2018/09/17/microsoft-making-progress-towards-ipv6-only/
> 
> 
>> 
>> I agree you have nat64 and dns64 and 6to4 proxy  for IPv6 only enterprises to access IPv4 content but if I was an enterprise customer I would go with dual stack over IPv6 only as that is the recommended mainstream deployment of IPv6
> 
> It's debatable.
> 
>> and IPv6 only is a few and far between  extreme exception that I don't think will gain traction till we are close to 100% of all internet content being dual stacked.
>> 
>> 
> 
> Further to what Bob said, we have to expect it may take 3 to 5 years,
> perhaps sometimes longer, for our work to become widely available in
> implementations.
> 
> For example, the current IPv6 Flow Label specification (RFC 6438) was
> published in November of 2011. Yet it took somewhere in the order of 2
> to 3 years for Mac OS X to be updated to support it, 4 years for Linux
> to be updated, and 6 years for Windows to be updated.
> 
> We also need to try to have solutions that may last and can be in use
> for decades in many different contexts (ideally with one solution
> being able to be used in all possible use contexts), not just ISP or
> corporate/enterprise networks. We need to have solutions that can and
> will be implemented on billions of hosts, because that is literally
> how many IPv6 capable hosts are already in end-users' hands.
> 
> Here we're doing medium to long term engineering, in contrast to the
> relatively short to medium term engineering that takes place when
> building and operating production networks.
> 
> 
> 
> 
> 
>> 
>> Regards
>> 
>> Gyan
>> 
>>> On Fri, May 3, 2019, 4:12 PM Brian E Carpenter <brian.e.carpenter@gmail.com> wrote:
>>> 
>>>> So bottom line here is that until the internet content is 100% IPv6 there is no way any broadband provider would pull back IPv6 thus in essence making this IPv6 flag literally useless and added on way to early in the game which brings me to my next point.
>>> 
>>> Sorry but you miss the point. An enterprise might choose to provide only IPv6 service (and presumably some variant of NAT64) this year. What a broadband service provider might decide is a different matter; of course they are driven by their own market.
>>> 
>>> Regards
>>>   Brian
>>> 
>>>> On 04-May-19 04:17, Gyan Mishra wrote:
>>>> Brian
>>>> 
>>>> IPv6 penetration is honestly really defined by the percentage of content on the internet that is dual stacked which is still pretty far off and has a long ways to go to even get to a tipping point 50/50 mark.
>>>> 
>>>> As far as cable and broadband providers for end users they are now starting to dual stack but it will be a long time as I said not until we hit the 100% mark that all content on the internet is dual stacked would broadband providers start thinking about pulling back and disabling IPv6.
>>>> 
>>>> The internet really drives the local corporations and intranet which lags behind so that would be even further down the pike.
>>>> 
>>>> All broadband providers small and the big ones like Comcast Verizon Time Warner etc would not want to risk losing customers to their competitors if they pulled back IPv4 early and the internet content was not 100% IPv6.
>>>> 
>>>> If they did so god forbid they may be in for a a lot of class action suits as the entire internet majority being IPv4 would now not be accessible..
>>>> 
>>>> So bottom line here is that until the internet content is 100% IPv6 there is no way any broadband provider would pull back IPv6 thus in essence making this IPv6 flag literally useless and added on way to early in the game which brings me to my next point.
>>>> 
>>>> With regard to security ICMPv6 is not secure and with a SEND secure neighbor discovery that could be secure the iCMPv6 RFC 4861 RS/RA type 133/134 and NS/NA type 135/136.
>>>> 
>>>> So the RA that has the reserved field 2 flag bits now allocated to the IPv6 only flag can be subject to a man in the middle attack easily with a sniffer and spoofing the packet from the router manipulation of the the bird setting from all sending routers to 0 and now basically you have a massive outage.  Thinking about this on a larger scale let’s say If a router was exposed to an attack that someone gained accesses via a stack overflow or glitch the the attacker could not manipulate the flag to set the IPv6 only flag on all routers and now you have an IPv4 meltdown and a massive outage.
>>>> 
>>>> There are many scenarios of which this is only a few off the top of my head but maybe on a more grand scale since all hosts are talking ICMPv6 let’s say their was malware ddos virus that hit internet wise and was via email or any other type of delivery mechanism that was able to compromise all hosts gain root access and now on the host itself can set this IPv6 only flag to 1 and now you have an internet wide meltdown the  worst in history.
>>>> 
>>>> So I a nutshell this IPv6 only flag in my opinion is way ahead of its time and is a good thought but at this point is way jumping the gun as the entire internet community is not ready for this flag as our penetration numbers are not there yet.
>>>> 
>>>> I really think we should defer this RFC and put on hold for the future..
>>>> 
>>>> Gyan
>>>> 
>>>> Sent from my iPhone
>>>> 
>>>>> On May 2, 2019, at 7:52 PM, Brian E Carpenter <brian.e..carpenter@gmail.com> wrote:
>>>>> 
>>>>> Nick,
>>>>>>> On 01-May-19 09:55, Nick Hilliard wrote:
>>>>>>> Brian E Carpenter wrote on 30/04/2019 21:48:
>>>>>>> So I'd rather understand *why* the costs outweigh the benefits. One
>>>>>>> more thing for an operator to configure and check in each first-hop
>>>>>>> router, vs reduction of pointless traffic on updated hosts.. I'm not
>>>>>>> sure how to make that an objective rather than a subjective
>>>>>>> trade-off.
>>>>>> Hi Brian,
>>>>>> 
>>>>>> Email is being a serious barrier to communication in this discussion :-(
>>>>>> 
>>>>>> The problem statement just isn't there:
>>>>>> 
>>>>>> https://mailarchive.ietf.org/arch/msg/ipv6/GCGYTXhg0V9mQBrcO7zhC5wtnp0
>>>>>> 
>>>>>> The contents of this email largely still apply to the current text in -05.
>>>>> 
>>>>> It's a judgment call. IMHO the problem statement is adequate. In your opinion, it isn't.
>>>>> 
>>>>>> The cost is too high:
>>>>>> 
>>>>>> https://mailarchive.ietf.org/arch/msg/ipv6/NIJ194PI8CLkuZT8U_jKEOY01QI
>>>>>> 
>>>>>> You've shown no analysis of realistic use cases.
>>>>>> 
>>>>>> For something standards track, and this far down the protocol stack and
>>>>>> with such a large security considerations section, the proposal ought to
>>>>>> be thoroughly compelling for a wide variety of deployment scenarios, but
>>>>>> it isn't.  There are better ways of skinning this cat..
>>>>> 
>>>>> Again, a judgment call. We do refer to Layer 2 solutions and this is clearly positioned as a complementary approach.
>>>>> 
>>>>> The authors aren't going to make the final judgment call, obviously.
>>>>> 
>>>>>  Brian
>>>>> 
>>>>> --------------------------------------------------------------------
>>>>> IETF IPv6 working group mailing list
>>>>> ipv6@ietf.org
>>>>> Administrative Requests: https://www.ietf.org/mailman/listinfo/ipv6
>>>>> --------------------------------------------------------------------
>>>> 
>>> 
>> --------------------------------------------------------------------
>> IETF IPv6 working group mailing list
>> ipv6@ietf.org
>> Administrative Requests: https://www.ietf.org/mailman/listinfo/ipv6
>> --------------------------------------------------------------------