Re: Adoption Call for "Improving the Robustness of Stateless Address Autoconfiguration (SLAAC) to Flash Renumbering Events"

Fernando Gont <fgont@si6networks.com> Fri, 24 July 2020 19:01 UTC

Return-Path: <fgont@si6networks.com>
X-Original-To: ipv6@ietfa.amsl.com
Delivered-To: ipv6@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 922C13A0AA6 for <ipv6@ietfa.amsl.com>; Fri, 24 Jul 2020 12:01:44 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -1.898
X-Spam-Level:
X-Spam-Status: No, score=-1.898 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, NICE_REPLY_A=-0.001, SPF_HELO_NONE=0.001, SPF_NONE=0.001, URIBL_BLOCKED=0.001] autolearn=ham autolearn_force=no
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id PJxWvXNp76kK for <ipv6@ietfa.amsl.com>; Fri, 24 Jul 2020 12:01:32 -0700 (PDT)
Received: from fgont.go6lab.si (fgont.go6lab.si [IPv6:2001:67c:27e4::14]) (using TLSv1.2 with cipher ADH-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id BBEFB3A0A0B for <ipv6@ietf.org>; Fri, 24 Jul 2020 12:01:20 -0700 (PDT)
Received: from [IPv6:2800:810:464:1f7:109:b9be:a52:530c] (unknown [IPv6:2800:810:464:1f7:109:b9be:a52:530c]) (using TLSv1.2 with cipher ECDHE-RSA-AES128-GCM-SHA256 (128/128 bits)) (No client certificate requested) by fgont.go6lab.si (Postfix) with ESMTPSA id 587BA2838B5; Fri, 24 Jul 2020 19:01:16 +0000 (UTC)
Subject: Re: Adoption Call for "Improving the Robustness of Stateless Address Autoconfiguration (SLAAC) to Flash Renumbering Events"
From: Fernando Gont <fgont@si6networks.com>
To: Jen Linkova <furry13@gmail.com>, Bob Hinden <bob.hinden@gmail.com>
Cc: IPv6 List <ipv6@ietf.org>
References: <CC295D49-5981-41C3-B4DB-E064D66616CE@gmail.com> <CAFU7BAQX8B2n3FFjQ3h-9VLP7zR=zy0nO0z7bEtz3KXZ7wp=eg@mail.gmail.com> <0831ad0d-c19b-119f-48ca-1a6c39c66731@si6networks.com>
Message-ID: <d7bc4459-3e25-6006-7d45-e6d71c69a909@si6networks.com>
Date: Fri, 24 Jul 2020 15:45:39 -0300
User-Agent: Mozilla/5.0 (X11; Linux x86_64; rv:60.0) Gecko/20100101 Thunderbird/60.9.1
MIME-Version: 1.0
In-Reply-To: <0831ad0d-c19b-119f-48ca-1a6c39c66731@si6networks.com>
Content-Type: text/plain; charset="utf-8"; format="flowed"
Content-Language: en-US
Content-Transfer-Encoding: 8bit
Archived-At: <https://mailarchive.ietf.org/arch/msg/ipv6/9J7ATrf3Ts_NxeI7LJex_-se_6Q>
X-BeenThere: ipv6@ietf.org
X-Mailman-Version: 2.1.29
Precedence: list
List-Id: "IPv6 Maintenance Working Group \(6man\)" <ipv6.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/ipv6>, <mailto:ipv6-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/ipv6/>
List-Post: <mailto:ipv6@ietf.org>
List-Help: <mailto:ipv6-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/ipv6>, <mailto:ipv6-request@ietf.org?subject=subscribe>
X-List-Received-Date: Fri, 24 Jul 2020 19:01:45 -0000

Hi, Jen,

Ping?


On 7/7/20 15:45, Fernando Gont wrote:
> Hello, Jen,
> 
> Some meta comments/questions:
> 
> Could you please note, explicitly, which of the specific proposals you 
> are arguing against, and which you are in favor?
> 
> It would seem to me that, if anything, you're only arguing against 
> Section 4.5. That's *one* out of 5 sections with proposed mitigations. 
> So I'm curious why, if that's the only part you are arguing against, the 
> result of your assessment would be to not support adoption of this 
> document.
> 
> IN your email, you also argue that you are not sure the proposed 
> mitigation (I assume you're referring to Section 4.5? -- but please 
> specify) is robust to packet loss. Could you please sketch a sample 
> scenario, such that we can confirm what you're suggesting, or otherwise 
> disagree with it?
> 
> Thanks,
> Fernando
> 
> 
> 
> 
> On 7/7/20 07:33, Jen Linkova wrote:
>> On Sat, Jun 27, 2020 at 9:36 AM Bob Hinden <bob.hinden@gmail.com> wrote:
>>> This message starts a two week 6MAN call on adopting:
>>>
>>>   Title:          Improving the Robustness of Stateless Address 
>>> Autoconfiguration (SLAAC) to Flash Renumbering Events
>>>   Authors:        F. Gont, J. Zorz, R. Patterson
>>>   File Name:      draft-gont-6man-slaac-renum-08
>>>   Document date:  2020-05-18>
>>>   https://tools.ietf.org/html/draft-gont-6man-slaac-renum
>>>
>>> as a working group item. Substantive comments and statements of 
>>> support for adopting this document should be directed to the mailing 
>>> list.  Editorial suggestions can be sent to the authors.  This 
>>> adoption call will end on 10 July 2020.
>>
>> First of all I agree that we do have a problem with flash renumbering
>> and it would be desirable to make the protocol more robust.
>> However I have some reservations about the changes proposed by the
>> draft and I do not support the adoption in its current form.
>> (I'd disagree with the argument that 'adopting does not mean the draft
>> will be published as it is so let's adopt it and figure out the
>> content later'. IMHO adopting the draft means that the WG agrees with
>> the proposed standard changes in principle and is willing to work on
>> polishing the details.
>>
>> It's not the case for this draft for me.
>> In particular,
>> - the draft proposes some fundamental changes to the SLAAC. The full
>> impact of those changes, especially if the network can not guarantee
>> all ND packets to be delivered, is unclear.
>> - the draft drastically increases the complexity of the SLAAC state
>> machine. I'm not convinced the potential benefits are worth it.
>> Taking into account introduced complexity and not fully estimated
>> negative impact, it looks like the cure might be worse than the
>> disease. Introducing changes of that scale to *all* hosts to fix a
>> corner case of broken routers/software looks like a drunkard's search
>> principle...
>> - the draft assumes that RFC8028 is widely implemented while it does
>> not seem to be the case.
>> - I also agree with Lorenzo that the draft proposed a kind of
>> inconsistent behaviour by applying the heuristic to PIOs only. Shall
>> the same approach be taken for RIOs?
>> And any other RA option?
>>
>>> There has been a lot of discussion on this draft, the chairs have 
>>> some concerns with this document being adopted, but wanted the w.g. 
>>> to express its opinion.  Our concerns include:
>>>
>>> This document proposes significant changes to SLAAC to fix what could 
>>> be seen as an implementation problem in some edge routers.  This will 
>>> affect all IPv6 nodes, not only the ones communicating with these 
>>> edge routers.  This part of IPv6 is a mature standard.   It is not 
>>> clear we should modify all IPv6 hosts to deal with one corner case 
>>> that may break other things allowed by the standard.
>>>
>>> The changes proposed will make SLAAC more active, the changes include:
>>>
>>>   o Reducing the default Valid Lifetime and Preferred Lifetime of PIOs
>>
>> I fully support this part of the proposal. Reducing the default values
>> for valid and preferred lifetimes so prefix and router lifetimes are
>> of the same magnitude does make sense. It's what I have deployed
>> anyway.
>>
>>>   o Caps the received Valid Lifetime and Preferred Lifetime of PIOs.
>>>   o Frequent retransmission of configuration information
>>>   o Routers send all options in RA messages
>>>
>>> Some additional questions for the w.g. to consider:
>>>   o Are there better approaches to address the underlying issue?
>>
>> Not sure if they are better or not, but off top of my head:
>> - I do not see the reason to force the invalidation of the prefix. If
>> the goal is to be able to communicate to 'new owners' of addresses in
>> that prefix, then
>> it would be enough to clear all on-link information when the prefix
>> gets deprecated.
>> - if we assume that hosts support RFC8028/Rule 5.5 then all the
>> routers need to do is to use the new Link-Local address every time the
>> PIOs set is changing (create a hash of PIOs or smth to generate the 64
>> bits of interfaceID). So as soon as the set of advertized PIOs has
>> changed, the router would send X new RAs from the new LLA. The hosts
>> would detect the old LLA being unreachable via NUD and switch to the
>> new prefix(es).
>> - we already have a mechanism for finding out what address works -
>> it's called Happy Eyeballs.
>> - I'm obviously biased here [1], but why can we not let the source
>> address selection to deal with it?
>> [1] 
>> https://tools.ietf.org/html/draft-linkova-6man-default-addr-selection-update-00 
>>
>>
>>>   o Do the proposed changes work in all deployments?
>>
>> That's my main concern. In multiple RA scenario the proposed mechanism
>> does not seem to be resilient to packet loss
>>
>>>   o Are some proposed changes worth advancing even if the entirety 
>>> may not be? If so, which ones?
>>
>> I'd fully support reducing the default values for the lifetimes.
>>
> 
> 


-- 
Fernando Gont
SI6 Networks
e-mail: fgont@si6networks.com
PGP Fingerprint: 6666 31C6 D484 63B2 8FB1 E3C4 AE25 0D55 1D4E 7492