Re: A common problem with SLAAC in "renumbering" scenarios

Jan Zorz - Go6 <jan@go6.si> Fri, 01 February 2019 18:14 UTC

Return-Path: <jan@go6.si>
X-Original-To: ipv6@ietfa.amsl.com
Delivered-To: ipv6@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id DF42B131112 for <ipv6@ietfa.amsl.com>; Fri, 1 Feb 2019 10:14:46 -0800 (PST)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -2.001
X-Spam-Level:
X-Spam-Status: No, score=-2.001 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, DKIM_SIGNED=0.1, DKIM_VALID=-0.1, DKIM_VALID_AU=-0.1, SPF_PASS=-0.001] autolearn=ham autolearn_force=no
Authentication-Results: ietfa.amsl.com (amavisd-new); dkim=pass (1024-bit key) header.d=go6.si
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id k9NeiuMEBljY for <ipv6@ietfa.amsl.com>; Fri, 1 Feb 2019 10:14:43 -0800 (PST)
Received: from mx.go6lab.si (mx.go6lab.si [IPv6:2001:67c:27e4::23]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id 8E82A13113A for <ipv6@ietf.org>; Fri, 1 Feb 2019 10:14:43 -0800 (PST)
Received: from localhost (localhost [IPv6:::1]) by mx.go6lab.si (Postfix) with ESMTP id AA4DA6608C for <ipv6@ietf.org>; Fri, 1 Feb 2019 19:14:38 +0100 (CET)
X-Virus-Scanned: amavisd-new at go6.si
Received: from mx.go6lab.si ([IPv6:::1]) by localhost (mx.go6lab.si [IPv6:::1]) (amavisd-new, port 10024) with LMTP id TinSv3Wz6w-y for <ipv6@ietf.org>; Fri, 1 Feb 2019 19:14:36 +0100 (CET)
Received: from mail.go6.si (mail.go6.si [IPv6:2001:67c:27e4::61]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (Client CN "mail.go6.si", Issuer "Let's Encrypt Authority X3" (not verified)) by mx.go6lab.si (Postfix) with ESMTPS id A5CFD60227 for <ipv6@ietf.org>; Fri, 1 Feb 2019 19:14:36 +0100 (CET)
Received: from haktar.local (unknown [IPv6:2001:67c:27e4:5::19]) (using TLSv1.2 with cipher ECDHE-RSA-AES128-GCM-SHA256 (128/128 bits)) (Client CN "Jan Zorz", Issuer "COMODO RSA Client Authentication and Secure Email CA" (not verified)) (Authenticated sender: jan) by mail.go6.si (Postfix) with ESMTPSA id 69795809E6 for <ipv6@ietf.org>; Fri, 1 Feb 2019 19:14:36 +0100 (CET)
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/simple; d=go6.si; s=mail; t=1549044876; bh=eiJqVoE/r24J/rFOc4Iv248FZF5ChJnHwXDT1SWYCrc=; h=Subject:To:References:From:Date:In-Reply-To:From; b=rYcuekKnhiJA0EZ/hPRIrQdVS1atcowkEjzLxLj+zztNQbUh15slSQEjYpGauf0dW Bhq+vP3QOOW+J5iGbYvbG4TZMeDiPheswh3NJpReLmI6O32f7DgdiQtBaz90dwsHCK gEWp9JSF2B26t6KV3/yUNnJ67nhVMgRN495agcqs=
Subject: Re: A common problem with SLAAC in "renumbering" scenarios
To: ipv6@ietf.org
References: <60fabe4b-fd76-4b35-08d3-09adce43dd71@si6networks.com> <alpine.DEB.2.20.1901311236320.5601@uplift.swm.pp.se> <35adea8e-704a-76f2-857f-a83a9ad689ef@si6networks.com>
From: Jan Zorz - Go6 <jan@go6.si>
Message-ID: <c40020c9-b9ef-adef-144d-5e077bf6d1e3@go6.si>
Date: Fri, 01 Feb 2019 19:14:35 +0100
User-Agent: Mozilla/5.0 (Macintosh; Intel Mac OS X 10.14; rv:60.0) Gecko/20100101 Thunderbird/60.5.0
MIME-Version: 1.0
In-Reply-To: <35adea8e-704a-76f2-857f-a83a9ad689ef@si6networks.com>
Content-Type: text/plain; charset="utf-8"; format="flowed"
Content-Language: en-US
Content-Transfer-Encoding: 7bit
Archived-At: <https://mailarchive.ietf.org/arch/msg/ipv6/7JLJvqfyA0n_awVTaqzhUb9GREU>
X-BeenThere: ipv6@ietf.org
X-Mailman-Version: 2.1.29
Precedence: list
List-Id: "IPv6 Maintenance Working Group \(6man\)" <ipv6.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/ipv6>, <mailto:ipv6-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/ipv6/>
List-Post: <mailto:ipv6@ietf.org>
List-Help: <mailto:ipv6-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/ipv6>, <mailto:ipv6-request@ietf.org?subject=subscribe>
X-List-Received-Date: Fri, 01 Feb 2019 18:14:47 -0000

Hi,

On 31/01/2019 13:11, Fernando Gont wrote:
>> Doesn't RFC7084 already say this? L-13.
> 
> Yes, and we missed this (thanks!). -- that said, we added this bullet
> for completeness sake. The case we care about in this doc is the reboot
> scenario.

However, RFC7084 is Informational and not Standard. I think this should 
make it into Standard. I've seen many CPE vendors saying "we found 
relevant standard documents and implemented whatever was a MUST and 
shipped the product."

A bit irresponsible in my view, but still a "valid" behaviour.

That being said - we need to be cautious that most probably just a MUST 
requirements will make it into CPEs at the end of the day.

>> When the new prefix is received it'll most likely have a higher
>> preferred and valid lifetime, so hosts should use the new prefix just by
>> means of them preferring the higher preferred lifetime of that PIO. So
>> the problem is a bit less than you write in the draft.
> 
> Nothing in the spec says preference is related to the "Preferred
> Lifetime" timer. i.e., an address is preferred, or it is not...

Exactly. We've observed all possible sort of behaviour in different 
stack implementations and lifetime is rarely taken into account.

If lifetime is > 0 then the address is valid, if lifetime == 0 then it's 
invalid and removed.

Not very useful in our case ;)

>> So while I am generally sympathetic to this draft and what it tries to
>> achieve (especially the part where it ties the router announcing
>> something to what it's later announcing, and lack of something means
>> it's implicitly zero preferred time for that), we need to figure out a
>> few more things first. RFC7084 was informational which made it fairly
>> easy to get through, now you're proposing a standards track document so
>> we need to make sure everything works. Changing all hosts is a big thing.
> 
> FWIW, I personally think the way to go is the host-side fix. You do want
> hosts to get smarter about this, and obviously cannot rely on the CPE to
> solve this for you.

Both places needs to be fixed. At the end of the day - CPE is in most 
cases your only device that is forwarding/routing packets towards the 
world and you need to rely that even old and ancient devices behind it 
can still function properly.

Cheers, Jan