Re: I-D Action: draft-ietf-6man-ipv6only-flag-03.txt

David Farmer <farmer@umn.edu> Mon, 22 October 2018 22:29 UTC

Return-Path: <farmer@umn.edu>
X-Original-To: ipv6@ietfa.amsl.com
Delivered-To: ipv6@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 4BF06130E51 for <ipv6@ietfa.amsl.com>; Mon, 22 Oct 2018 15:29:26 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -4.3
X-Spam-Level:
X-Spam-Status: No, score=-4.3 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, DKIM_SIGNED=0.1, DKIM_VALID=-0.1, DKIM_VALID_AU=-0.1, HTML_MESSAGE=0.001, RCVD_IN_DNSWL_MED=-2.3, SPF_PASS=-0.001] autolearn=ham autolearn_force=no
Authentication-Results: ietfa.amsl.com (amavisd-new); dkim=pass (2048-bit key) header.d=umn.edu
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id OxitbA40cYKi for <ipv6@ietfa.amsl.com>; Mon, 22 Oct 2018 15:29:23 -0700 (PDT)
Received: from mta-p7.oit.umn.edu (mta-p7.oit.umn.edu [134.84.196.207]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id 5801E12F18C for <ipv6@ietf.org>; Mon, 22 Oct 2018 15:29:23 -0700 (PDT)
Received: from localhost (unknown [127.0.0.1]) by mta-p7.oit.umn.edu (Postfix) with ESMTP id D60D8955 for <ipv6@ietf.org>; Mon, 22 Oct 2018 22:29:22 +0000 (UTC)
X-Virus-Scanned: amavisd-new at umn.edu
Received: from mta-p7.oit.umn.edu ([127.0.0.1]) by localhost (mta-p7.oit.umn.edu [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id K3UmA1RD-a1X for <ipv6@ietf.org>; Mon, 22 Oct 2018 17:29:22 -0500 (CDT)
Received: from mail-wm1-f70.google.com (mail-wm1-f70.google.com [209.85.128.70]) (using TLSv1.2 with cipher AES128-GCM-SHA256 (128/128 bits)) (No client certificate requested) by mta-p7.oit.umn.edu (Postfix) with ESMTPS id 5C54C853 for <ipv6@ietf.org>; Mon, 22 Oct 2018 17:29:21 -0500 (CDT)
Received: by mail-wm1-f70.google.com with SMTP id y203-v6so10617397wmg.9 for <ipv6@ietf.org>; Mon, 22 Oct 2018 15:29:21 -0700 (PDT)
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=umn.edu; s=google; h=mime-version:references:in-reply-to:from:date:message-id:subject:to :cc; bh=e1u8D51G8NMtIhOtLB77en7bWfqWRoLjQW2z9BjqA2g=; b=cm24I5W2toM0gNq+3jChkcMNqYGP34hzuj3M+dKlJ0lv2bDOhiVi1uAH3qyx6aRCxW +8ZtjkXPv+QTRFv8FwKUTdDvPd/kSyCGcV3b3zfqMXHdg/GDahzP8aOxK+iFSEb/aGUh eJGmh2+eQB0TGFgLXqncUsHzVyqk0hC8a77Kk6Bp3PQgCbvfzVoahGlzVfn0h3taAGb+ LU2g5bkguVmp2UpGrOMM7BQYVoxudKf+3NpW5M0BjM6JEuszY+W8z+h8CV9Iv+8PltM4 4IuGyl8T2raK9T76Mik3InGnq+0vt6wkLfl9MecoF3JS8BphOSKKzSsnYNBxQhOMoa96 Bd/A==
X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20161025; h=x-gm-message-state:mime-version:references:in-reply-to:from:date :message-id:subject:to:cc; bh=e1u8D51G8NMtIhOtLB77en7bWfqWRoLjQW2z9BjqA2g=; b=FPSPLN0xupxMhlNIaJNF/94PufxUE4Pc/iKGAfEcAuuqPLWeTE+KD53CzxS17jsfTI ppHarU2jv6x/tFkZwVnL3B7SWnQ2LyJE/d5n6kYFw5/WH7jRkgACa5FEkIQR0lvTRy3R IAW+eZrbweU1FnwC8Ll6kl+ORzO4lHIY9NTx5EC+5Cp2fm6aeh+JzxDIukvb7xIim+UC Duk8fcntA4lThXT/JSF7cwe1RhhNKx9d7SZTXYPYIQ5bBeC40fwx+HtM7hnzSyq+mwlu UGwgN+D37OLwPNieibG9jiyfXCTid84ZBsJHjetuCDXZDt3oXI3JJerOWE/vpcIjxNUv CelQ==
X-Gm-Message-State: ABuFfoiLwozGB/VsCqQs+21x2THiIyVy5rdQQfMsJZNfe6a6evEj7dwd h7qXJ/d+RZIidB8IS+ITKdEFIiO1Had4UD6a1dYpWKpyIU4HpKzXyU0UWgijbvL7eUVUait3UG1 HiZ3GeqRVDYthh4/4+Z5MO+J4
X-Received: by 2002:adf:90ee:: with SMTP id i101-v6mr46434677wri.181.1540247359631; Mon, 22 Oct 2018 15:29:19 -0700 (PDT)
X-Google-Smtp-Source: ACcGV60YTaekNGit+ZTClYm9EKIwPmXSXdF97CGuLe4Jhc9025wUy8UX043kPm3Lri/YuwhpFHQBRGYxLwEvmHswwRU=
X-Received: by 2002:adf:90ee:: with SMTP id i101-v6mr46434659wri.181.1540247359224; Mon, 22 Oct 2018 15:29:19 -0700 (PDT)
MIME-Version: 1.0
References: <CAFU7BASO_ByzbanhLKnWV280O_fASd-8W+ujpj3sN6d2-whw2w@mail.gmail.com> <CACWOCC-u7aAPwAOcixYvt2On=-o_8X25GhqdXTfA+tWRC1o2XA@mail.gmail.com> <3beca72e-19c5-10af-02e5-c21a90d77100@gmail.com> <20181019.223739.271916573.sthaug@nethelp.no> <4f58643c-272e-507e-3282-c87befd42395@gmail.com>
In-Reply-To: <4f58643c-272e-507e-3282-c87befd42395@gmail.com>
From: David Farmer <farmer@umn.edu>
Date: Mon, 22 Oct 2018 17:29:03 -0500
Message-ID: <CAN-Dau0di=CQaAYnsP8GKtBov5259rO=eNTzuFFuP8wEG5Jc0A@mail.gmail.com>
Subject: Re: I-D Action: draft-ietf-6man-ipv6only-flag-03.txt
To: Brian E Carpenter <brian.e.carpenter@gmail.com>
Cc: sthaug@nethelp.no, 6man WG <ipv6@ietf.org>, Alan Whinery <whinery@hawaii.edu>
Content-Type: multipart/alternative; boundary="000000000000b693720578d8c866"
Archived-At: <https://mailarchive.ietf.org/arch/msg/ipv6/8vK879oL4xvSqUIEPniBE0j2aP4>
X-BeenThere: ipv6@ietf.org
X-Mailman-Version: 2.1.29
Precedence: list
List-Id: "IPv6 Maintenance Working Group \(6man\)" <ipv6.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/ipv6>, <mailto:ipv6-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/ipv6/>
List-Post: <mailto:ipv6@ietf.org>
List-Help: <mailto:ipv6-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/ipv6>, <mailto:ipv6-request@ietf.org?subject=subscribe>
X-List-Received-Date: Mon, 22 Oct 2018 22:29:27 -0000

On Fri, Oct 19, 2018 at 8:42 PM Brian E Carpenter <
brian.e.carpenter@gmail.com> wrote:

> On 2018-10-20 09:37, sthaug@nethelp.no wrote:
> >> Job,
> >> On 2018-10-20 01:35, Job Snijders wrote:
> >>> I think it would be good to have some running code before advancing
> this to
> >>> IESG review and RFC publication.
> >>
> >> Why is this proposal special in that respect? This is not an IETF
> requirement
> >> and despite the BCP advocating an Implementation Status section, very
> few drafts
> >> do this.
> >>
> >> Note, I am all for some trial implementations, but why does *this* draft
> >> need one when so many others don't?
> >
> > Whatever happened to "We believe in rough consensus and running code"?
>
> It hasn't gone away, although formally it only applies for promotion
> above "Proposed Standard" status. And I believe in it, and that's why
> there's running code for GRASP (draft-ietf-anima-grasp-15). But for
> something that has to go into the basic IP stack, it's not so easy to
> prototype, and I am still not seeing why people would raise the barrier
> for this particular minor extension rather than, say, for the extension
> mechanism for RA flags that appears to be completely unimplemented.
>
> In other words: if this is what you want for ipv6only-flag, then
> I'd like the same rule for all the other draft-ietf-6man documents
> from now on, please.
>
>    Brian
>

I don't think "running code" needs to be a requirement for this draft or
generally in 6man. However, in this case, where there doesn't seem to be a
clear and obvious consensus, running code or some sign that there will be
running code could help promote consensus.

Personally, I'm in the probably not camp at this point, I don't see
fundamental flaws in the spec, but I have serious doubts about client
implementations of the spec occurring. And, I'm not excited to use one of
the two remaining native router advertisement flags (not using the RFC 5175
extension option) if there are doubts about there being any host
implementations of the spec.

However, the existence running code or even a few host developers coming
out and saying they intend to implement this spec if published as standards
track would go a long way to dispelling many of my doubts about this draft.

I did ask for at least some commentary about "about taking care to prevent
unsuspecting WiFi users from accidentally connecting IPv4-only WiFi hosts
to IPv6-only WiFi links", such as by using "IPv6" or "IPv6-only" in open
SSIDs, using PSK or other authentication, or using 802.11u Access Network
Query Protocol (ANQP) with "Address type available" for IPv6 and "Address
type not available" for IPv4.  I think my other comments were covered, but
I don't see where this was covered in the new version.

Further, last week at the Internet2 TechEX in Orlando, we ran some
experiments with the RFC2563 option, and the initial unvalidated results
are not good, all clients seemed to not request the option and still
generated IPv4 link-local addresses.  We still have some work to do to
completely understand the results and to ensure it wasn't some kind of
screw up on our part configuring the DHCP server.

Also, as I've been thinking about this situation, and I'd also like to see
a new DHCPv4 option for Dual Stack clients that are capable of utilizing
IPv4AAS on their own, signaling that the provided IPv4 address should be
configured only if they cannot make IPv4AAS work over the IPv6 service
provided. This allows a network to service newer Dual Stack Client in
IPv6-only mode, while still servicing older Dual Stack clients and
IPv4-only clients with a provided IPv4 address. This allows networks to
gracefully transition to IPv6-only and have data to determine when IPv4 can
be safely be turned off on a link and then maybe eventually turning on the
IPv6-only flag for the link, assuming we can find consensus to do the
IPv6-only flag.

Thanks

-- 
===============================================
David Farmer               Email:farmer@umn.edu
Networking & Telecommunication Services
Office of Information Technology
University of Minnesota
2218 University Ave SE        Phone: 612-626-0815
Minneapolis, MN 55414-3029   Cell: 612-812-9952
===============================================