Re: [Fwd: I-D Action: draft-carpenter-6man-why64-00.txt]

Ray Hunter <v6ops@globis.net> Thu, 09 January 2014 18:40 UTC

Return-Path: <v6ops@globis.net>
X-Original-To: ipv6@ietfa.amsl.com
Delivered-To: ipv6@ietfa.amsl.com
Received: from localhost (ietfa.amsl.com [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id D1B861AE4F3 for <ipv6@ietfa.amsl.com>; Thu, 9 Jan 2014 10:40:09 -0800 (PST)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -1.121
X-Spam-Level:
X-Spam-Status: No, score=-1.121 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, SPF_NEUTRAL=0.779] autolearn=no
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id Wp6zw8bgSxDJ for <ipv6@ietfa.amsl.com>; Thu, 9 Jan 2014 10:40:08 -0800 (PST)
Received: from globis01.globis.net (RayH-1-pt.tunnel.tserv11.ams1.ipv6.he.net [IPv6:2001:470:1f14:62e::2]) by ietfa.amsl.com (Postfix) with ESMTP id 3845D1AE37A for <ipv6@ietf.org>; Thu, 9 Jan 2014 10:40:08 -0800 (PST)
Received: from localhost (localhost [127.0.0.1]) by globis01.globis.net (Postfix) with ESMTP id 3A7808714A3; Thu, 9 Jan 2014 19:39:58 +0100 (CET)
Received: from globis01.globis.net ([127.0.0.1]) by localhost (mail.globis.net [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id 9v7XXMkWum5K; Thu, 9 Jan 2014 19:39:58 +0100 (CET)
Received: from Rays-iMac.local (unknown [192.168.0.3]) (Authenticated sender: Ray.Hunter@globis.net) by globis01.globis.net (Postfix) with ESMTPA id 18990870F98; Thu, 9 Jan 2014 19:39:58 +0100 (CET)
Message-ID: <52CEECFE.8040701@globis.net>
Date: Thu, 09 Jan 2014 19:39:58 +0100
From: Ray Hunter <v6ops@globis.net>
User-Agent: Postbox 3.0.8 (Macintosh/20130427)
MIME-Version: 1.0
To: Tim Chown <tjc@ecs.soton.ac.uk>
Subject: Re: [Fwd: I-D Action: draft-carpenter-6man-why64-00.txt]
References: <52C9D788.8060606@gmail.com> <52CBE0E6.5020107@globis.net> <CAKD1Yr2yPzQHCJHUWBa9-+=nn9BbjLhBB4e896NPWne_Unnwgg@mail.gmail.com> <52CECC76.1030706@globis.net> <79D8AF81-2D90-4FF6-A513-4E4D89429E87@ecs.soton.ac.uk> <EMEW3|093678d74fd5b69942d9d1db9e01d550q08GWE03tjc|ecs.soton.ac.uk|79D8AF81-2D90-4FF6-A513-4E4D89429E87@ecs.soton.ac.uk> <52CED9E9.5000702@globis.net> <5CD4672C-43D5-4CB5-B371-E46AEDEB804C@ecs.soton.ac.uk> <EMEW3|e3fb69c670cb25f3d01c4c03fd18a2d1q08HVO03tjc|ecs.soton.ac.uk|5CD4672C-43D5-4CB5-B371-E46AEDEB804C@ecs.soton.ac.uk>
In-Reply-To: <EMEW3|e3fb69c670cb25f3d01c4c03fd18a2d1q08HVO03tjc|ecs.soton.ac.uk|5CD4672C-43D5-4CB5-B371-E46AEDEB804C@ecs.soton.ac.uk>
Content-Type: text/plain; charset="ISO-8859-1"; format="flowed"
Content-Transfer-Encoding: 7bit
Cc: 6man <ipv6@ietf.org>
X-BeenThere: ipv6@ietf.org
X-Mailman-Version: 2.1.15
Precedence: list
List-Id: "IPv6 Maintenance Working Group \(6man\)" <ipv6.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/ipv6>, <mailto:ipv6-request@ietf.org?subject=unsubscribe>
List-Archive: <http://www.ietf.org/mail-archive/web/ipv6/>
List-Post: <mailto:ipv6@ietf.org>
List-Help: <mailto:ipv6-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/ipv6>, <mailto:ipv6-request@ietf.org?subject=subscribe>
X-List-Received-Date: Thu, 09 Jan 2014 18:40:10 -0000

> Tim Chown <mailto:tjc@ecs.soton.ac.uk>
> 9 January 2014 18:31
> On 9 Jan 2014, at 17:18, Ray Hunter<v6ops@globis.net>  wrote:
>
>>> Tim Chown<mailto:tjc@ecs.soton.ac.uk>
>>> 9 January 2014 17:32
>>>
>>> I;m not sure you're defining what your problem is fully enough here.
>>>
>>> What's wrong with polling network devices to maintain a database of IP/MAC/port bindings? Some reasonably sized campuses with IPv6 deployed do just that, on the assumption devices can effectively pick their own addresses and/or change them over time.
>>>
>>> Tim
>> I'd also probably consider that on a campus, which is geographically limited, there's no latency, network devices are uniform, there's a single management vendor, SNMP access is allowed, and bandwidth is free.
>>
>> DHCP (which is effectively a form of event-triggered central registration) works pretty well today. Two people can support all global IPAM, DHCP, and DNS for 100K users in 50 countries. All you need is the lowest common denominator of a DHCP proxy on any LAN equipment pointing at your regional servers, and a DHCP client on end user devices, which is basically universally supported. And you can lever that information up in all sorts of ways. DHCPv6 would not be cost impacting (part of licensing on existing kit). Anything else would be. You're not going to be able to get any less than 2 support people for this sort of enterprise critical infra. Off topic for this ID, but just saying.
>
> Fair comment, but for a campus style network, I'd argue for the polling approach, and it works well (enough).
>
> There's a distinction though between controlling addresses and being able to observe all addresses that are in use.
Agreed. Many scenarios I have in mind are about knowing all addresses in 
use, and who is using them. Not necessarily limiting them.
>> The bottom line is that sparse addressing in IPv6, as implemented today, also has a down side for enterprise operations; but perhaps that discussion should be held in v6ops.
>
> Well, I think it's relevant to this draft.
>
> I'm not sure it's really down to the sparse addressing per se, rather that there is enough address space in a subnet for there to be a mechanism for hosts to pick multiple addresses to use over time.
>
> Tim
>
>
My point of view is that there's a trade off to be made between "too few 
and too many" when talking about sparse address allocation, and that the 
current fixed /64 boundary allows "too many" IIDs/IPv6 addresses for 
many operational scenarios. So many in fact that it's a potential 
liability. Either that or we need a mechanism that more reliably tracks 
and registers addresses actually in use on a semi-trusted environment, 
so that the actual /128's in use are known (centrally) e.g. for 
improving/extending source address validation and anti-spoofing, 
helpdesk calls, log correlation, QoS tracking etc.

As an example, how many implementations of QoS mechanisms like WFQ do 
you know today that protect their resources used for counting active 
flows on a /48 and /64 boundary? And how many just track session use per 
/128? Or have no limit at all on allowable active sessions per 
address/prefix?

So how many implementations are vulnerable today to flow table size 
exhaustion that could have a global service impact by an attack from a 
single compromised host that can spoof source addresses from an entire 
/64 or /48?

-- 
Regards,
RayH