Re: [IPv6] Thoughts on draft-thubert-6man-ipv6-over-wireless-15

"Pascal Thubert (pthubert)" <pthubert@cisco.com> Thu, 03 August 2023 10:00 UTC

Return-Path: <pthubert@cisco.com>
X-Original-To: ipv6@ietfa.amsl.com
Delivered-To: ipv6@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 56BDAC15108B for <ipv6@ietfa.amsl.com>; Thu, 3 Aug 2023 03:00:30 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -9.604
X-Spam-Level:
X-Spam-Status: No, score=-9.604 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, DKIMWL_WL_HIGH=-0.001, DKIMWL_WL_MED=-0.001, DKIM_SIGNED=0.1, DKIM_VALID=-0.1, DKIM_VALID_AU=-0.1, DKIM_VALID_EF=-0.1, HTML_MESSAGE=0.001, RCVD_IN_MSPIKE_H3=0.001, RCVD_IN_MSPIKE_WL=0.001, RCVD_IN_ZEN_BLOCKED_OPENDNS=0.001, SPF_NONE=0.001, T_SCC_BODY_TEXT_LINE=-0.01, URIBL_BLOCKED=0.001, URIBL_DBL_BLOCKED_OPENDNS=0.001, URIBL_ZEN_BLOCKED_OPENDNS=0.001, USER_IN_DEF_DKIM_WL=-7.5] autolearn=unavailable autolearn_force=no
Authentication-Results: ietfa.amsl.com (amavisd-new); dkim=pass (1024-bit key) header.d=cisco.com header.b="ADP2PrM5"; dkim=pass (1024-bit key) header.d=cisco.com header.b="k3N3cfBD"
Received: from mail.ietf.org ([50.223.129.194]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id K07I74aGhajh for <ipv6@ietfa.amsl.com>; Thu, 3 Aug 2023 03:00:25 -0700 (PDT)
Received: from rcdn-iport-2.cisco.com (rcdn-iport-2.cisco.com [173.37.86.73]) (using TLSv1.2 with cipher DHE-RSA-SEED-SHA (128/128 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id A1C24C135DEC for <6man@ietf.org>; Thu, 3 Aug 2023 03:00:25 -0700 (PDT)
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/simple; d=cisco.com; i=@cisco.com; l=17647; q=dns/txt; s=iport; t=1691056825; x=1692266425; h=from:to:subject:date:message-id:references:in-reply-to: mime-version; bh=P/xN6DceBe9usZ85xzPaBAMh9+q0TP+4rncGhtYK1d8=; b=ADP2PrM5U6M9WZijz7Q1RWDjVFkpbq5v2ZJ00uoKK2keuQjlt7CLWmt0 uhXJryrgTAvAmcdSy7Mn17MeWx4FOWZOWVzxCt4a/9MF7+8ZtW/dFTmF7 EKaTFZzw7YIH/ZKoE4orJ4vcXzPpeU8vNTb6+Cn54hV0INYb7kQG1GZTR I=;
X-IPAS-Result: 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
IronPort-PHdr: A9a23:hzNnQxUWDmZxAcg69oDj6UWFmCPV8K0yAWYlg6HPw5pUeailupP6M 1Oav7NmjUTCWsPQ7PcXw+bVsqW1QWUb+t7Bq3ENdpVQSgUIwdsbhQ0uAcOJSAX7IffmYjZ8H ZFqX15+9Hb9Ok9QS47lf1OHmnSp9nYJHwnncw98J+D7AInX2tyr1/249ofPSw5JnzG6J7h1K Ub+oQDYrMJDmYJ5Me5x0k7Qv3JScuJKxGVlbV6ShEP64cG9vdZvpi9RoPkmscVHVM3H
IronPort-Data: A9a23:XHhkXqt/SMVCC3UTWs5QwgcEKufnVCleMUV32f8akzHdYApBsoF/q tZmKT3TM/6NZGL3ett1YIzl9U1Sv8TSyIBhSVE/+SAzFC0XgMeUXt7xwmUckM+xwmwvaGo9s q3yv/GZdJhcokf0/0vrav67xZVF/fngqoDUUIYoAQgvA1c9IMsdoUg7wbVh0tYz2YHR7z6l4 LseneWOYDdJ5BYsWo4kw/rrRMRH5amaVJsw5zTSVNgT1LPsvyB94KE3ecldG0DFrrx8RYZWc QpsIIaRpQs19z91Yj+sfy2SnkciGtY+NiDW4pZatjTLbhVq/kQPPqgH2PU0W2hF12yFh9pNy tRJrJKhSx4xF/eUsbFIO/VYO3kW0axu8bvDJz20ttaeihGAeHr3yPIoB0YzVWEa0r8oWicVq 7pBc3ZUNU/ra+GemNpXTsF0msQ+JsTxIKsUu2prynfSCvNOrZXrEvqTuoMFgW1YasZmR8/xf 8A2YANTZjvZWT4UYwglIoIhg7L97pX4W2QI9A3KzUYt2ECNyQV3+LngLNSTfcaFLfi5hW6Ro mbAum/+GBxfaJqUyCGO9TSngeqncT7HtJw6JpKqqqdmmFevxG0XERMHV0KjiKPhoxvrMz5AE HA89i0rpKk00UWkSNjhQhG1yEJoWDZBBLK89MVntmmwJrroDxWxXTNcH2QRADAynIpnG2J2i wPhc8bBWGQHjVGDdZ6KGl54RxubPSwYKwfujgdbEFNdubEPTGzP5y8jo/5qFKqzy9byAzy1n 3aBrTM1gPMYistjO0SHEbLv3mLESnvhF1FdCuDrsoSNtVMRiGmNPNzA1LQjxawcRLt1t3HY1 JT+p+CQ7foVEbaGnzGXTeMGEdmBvqjUaWWE2AY0RMV5r1xBHkJPm6gOuVmSw283aq45lcPBO yc/RCsIvsYIZSv2BUOJS9LoUqzGMpQM5fy8BqyLMbKik7B6dRSM+2l1dFWM0mX2+HXAYolhU ap3hf2EVC5AYYw+lWLeb75EjdcDmHtkrUuNHs+T8vhS+efEDJJjYe1bYALmgyFQxP7snTg5B P4FaZfRkkQBALWnCsQVmKZKRW03wbEALcmeg+Rcd/WIJUxtH2RJNhMb6epJl1BN90iNqtr1w w==
IronPort-HdrOrdr: A9a23:+yZxv62NqRtwv4tUlZJm1wqjBQByeYIsimQD101hICG9Lfb4qy n+ppomPEHP5wr5AEtQ5uxoWJPrfZquz+8K3WBxB8buYOCCgguVxe5ZnPPfK7OLIVyEygcw79 YET0E6MqyNMbEYt7e33ODbKadb/DDvysnB7ouurAYOcegpUdAc0+4TMHf9LqQCfng+OXNPLu v72iMonUvFRZ0QVKmGL0hAe9KGi8zAlZrgbxJDLQUg8hOygTSh76O/OwSE3z8FOgk/j4sKwC zgqUjU96+ju/a0xlv3zGnI9albn9Pn159qGNGMsM4IMT/h4zzYJbiJGofy/AzdktvfqmrCo+ O85ivI+P4Dr085S1vF4icFHTOQlwrGpUWSj2NwykGT0PARDAhKe/apw7gpPScwLyEbzYlBOG Uh5RPBi7NHSRzHhyjz/N7OSlVjkVe1u2MrlaoJg2VYSpZ2Us4YkWUzxjIiLH47JlOy1Kk3VO 11SM3M7vdfdl2XK3jfo2l02dSpGnA+BA2PTEQOstGcl2E+pgEy82IIgMgE2nsQ/pM0TJdJo+ zCL6RzjblLCssbd7h0CusNSda+TmbNXRXPOmSPJkmPLtBNB1vd75rspLkl7uCjf5IFiJM0hZ TaSVtd8XU/fkr/YPf+q6GjMiq9NFlVcQ6dv/22vaIJyYEUbICbQxG+dA==
X-Talos-CUID: 9a23:CV8f2Gig0wXdpOBjcQngU24JqTJuQFLPkC7cO0WEC2dtUbOES0aI0fk8up87
X-Talos-MUID: 9a23:F/rQdQnuw1eDwxsk8JDudno4Dehw6YunMXwHvow8mJLdah5aKyiC2WE=
X-IronPort-Anti-Spam-Filtered: true
Received: from alln-core-4.cisco.com ([173.36.13.137]) by rcdn-iport-2.cisco.com with ESMTP/TLS/ECDHE-RSA-AES256-GCM-SHA384; 03 Aug 2023 10:00:24 +0000
Received: from rcdn-opgw-2.cisco.com (rcdn-opgw-2.cisco.com [72.163.7.163]) by alln-core-4.cisco.com (8.15.2/8.15.2) with ESMTPS id 373A0M8E005022 (version=TLSv1.2 cipher=DHE-RSA-AES256-GCM-SHA384 bits=256 verify=OK) for <6man@ietf.org>; Thu, 3 Aug 2023 10:00:23 GMT
Authentication-Results: rcdn-opgw-2.cisco.com; dkim=pass (signature verified) header.i=@cisco.com; spf=Pass smtp.mailfrom=pthubert@cisco.com; dmarc=pass (p=quarantine dis=none) d=cisco.com
X-IronPort-AV: E=Sophos;i="6.01,251,1684800000"; d="scan'208,217";a="5036087"
Received: from mail-bn8nam04lp2048.outbound.protection.outlook.com (HELO NAM04-BN8-obe.outbound.protection.outlook.com) ([104.47.74.48]) by rcdn-opgw-2.cisco.com with ESMTP/TLS/ECDHE-RSA-AES256-GCM-SHA384; 03 Aug 2023 10:00:21 +0000
ARC-Seal: i=1; a=rsa-sha256; s=arcselector9901; d=microsoft.com; cv=none; b=NduCYMDfPJO881us6PbVBWiOtJvctsHRorw+EIGpnC98L3Rg4COTqpbsRrEQ7u5v5C4UuDi2rnQD6BeSwZcNs5GichFBVLQ6JoBkC+OT5hyTWVITQ9k+x0yjXYl7ypsUQ4GATROXtVVZg6FNtRRhtoY4tSQSffesdwggcn6gjPYDWqF8j8LM5K5JAZ9TAECGhcyMQt+SUQDxe+gD8xnRnh0MzkIwrFePll+lqjPEVAaVgzBI0qD9qULvKmqnXOO3Om/5IeEu8ZnAkui8zvwK5Jl+Gd7NW9hHd5rNCZDYXqcTlqf3mBbARquJDL9YS6nddMNCmiGl0NN9p69P0mRsAQ==
ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=microsoft.com; s=arcselector9901; h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-AntiSpam-MessageData-ChunkCount:X-MS-Exchange-AntiSpam-MessageData-0:X-MS-Exchange-AntiSpam-MessageData-1; bh=oA6EA18cmBGoxNRt/GM2TuIMCG2wtz/KXQlfKCyh2eM=; b=Rp6Y4lRMumPSWCRHw+3JHRBqP7nexnKtC5IkhMeaztltu+pFs4N/nKCcjucHCL8cbC7wCiXybi1PmnXO/uQkXl/sJu+1FWfE6FuzY/02GSiFy4XqUIRSE6u9zpfKfzOTfryw/WYiQOfvmSomZzKq/HXD7Cx0/3tDe5RJ5bA1tDCD5AgK3hsGVm060twh7nsK8qNPWxSFOyFtVZbTxwcoQCS7ULdRJE+izeQ9q5RH8WCdB2JSu3eMtEM6xfo3gYPLvRR8pNhc73Btldv0F8kq/+rJ9HCzl7tyZr42MyWfshpmn3WgA8HHWO2cYOo/mBhUy2DRoGfleButTWJLqqJ9vA==
ARC-Authentication-Results: i=1; mx.microsoft.com 1; spf=pass smtp.mailfrom=cisco.com; dmarc=pass action=none header.from=cisco.com; dkim=pass header.d=cisco.com; arc=none
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=cisco.com; s=selector1; h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-SenderADCheck; bh=oA6EA18cmBGoxNRt/GM2TuIMCG2wtz/KXQlfKCyh2eM=; b=k3N3cfBDMTowuCX0YdqtZ8WyN1z31CBgr5hz6UiAp1IaQZPD6FJ9SmSuqD375gw5Q1wcQobqrA1/YWvgQjuMdYlF/s+AYdHWSJwRpHaSrZz5XLQ9Kcvq3bmzEZjc5nZuq3tVBqYpOz/AYV8hsKTLOgKZ8O78GD7XlsIGTY9cT48=
Received: from CO1PR11MB4881.namprd11.prod.outlook.com (2603:10b6:303:91::20) by PH8PR11MB6732.namprd11.prod.outlook.com (2603:10b6:510:1c8::10) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id 15.20.6631.47; Thu, 3 Aug 2023 10:00:20 +0000
Received: from CO1PR11MB4881.namprd11.prod.outlook.com ([fe80::9ca3:7661:4c9a:3561]) by CO1PR11MB4881.namprd11.prod.outlook.com ([fe80::9ca3:7661:4c9a:3561%6]) with mapi id 15.20.6631.046; Thu, 3 Aug 2023 10:00:19 +0000
From: "Pascal Thubert (pthubert)" <pthubert@cisco.com>
To: "Joe Clarke (jclarke)" <jclarke=40cisco.com@dmarc.ietf.org>, "6man@ietf.org" <6man@ietf.org>
Thread-Topic: Thoughts on draft-thubert-6man-ipv6-over-wireless-15
Thread-Index: AQHZxWjMl/7sLjlyDkiPCOyaaBqrja/YTfeg
Date: Thu, 03 Aug 2023 10:00:04 +0000
Deferred-Delivery: Thu, 3 Aug 2023 09:59:41 +0000
Message-ID: <CO1PR11MB4881A4FBD885A75A14EF2399D808A@CO1PR11MB4881.namprd11.prod.outlook.com>
References: <BN9PR11MB537101C802FB1F73F307DE79B80BA@BN9PR11MB5371.namprd11.prod.outlook.com>
In-Reply-To: <BN9PR11MB537101C802FB1F73F307DE79B80BA@BN9PR11MB5371.namprd11.prod.outlook.com>
Accept-Language: fr-FR, en-US
Content-Language: en-US
X-MS-Has-Attach:
X-MS-TNEF-Correlator:
x-ms-publictraffictype: Email
x-ms-traffictypediagnostic: CO1PR11MB4881:EE_|PH8PR11MB6732:EE_
x-ms-office365-filtering-correlation-id: 5ea38fcb-ec0c-40e4-517c-08db9408722b
x-ms-exchange-senderadcheck: 1
x-ms-exchange-antispam-relay: 0
x-microsoft-antispam: BCL:0;
x-microsoft-antispam-message-info: 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
x-forefront-antispam-report: CIP:255.255.255.255; CTRY:; LANG:en; SCL:1; SRV:; IPV:NLI; SFV:NSPM; H:CO1PR11MB4881.namprd11.prod.outlook.com; PTR:; CAT:NONE; SFS:(13230028)(4636009)(136003)(396003)(346002)(39860400002)(366004)(376002)(451199021)(66574015)(53546011)(6506007)(83380400001)(186003)(316002)(76116006)(2906002)(66946007)(64756008)(66446008)(66476007)(66556008)(5660300002)(41300700001)(8676002)(8936002)(7696005)(71200400001)(6666004)(52536014)(9686003)(110136005)(478600001)(55016003)(38100700002)(122000001)(166002)(86362001)(33656002)(38070700005); DIR:OUT; SFP:1101;
x-ms-exchange-antispam-messagedata-chunkcount: 1
x-ms-exchange-antispam-messagedata-0: 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
Content-Type: multipart/alternative; boundary="_000_CO1PR11MB4881A4FBD885A75A14EF2399D808ACO1PR11MB4881namp_"
MIME-Version: 1.0
X-OriginatorOrg: cisco.com
X-MS-Exchange-CrossTenant-AuthAs: Internal
X-MS-Exchange-CrossTenant-AuthSource: CO1PR11MB4881.namprd11.prod.outlook.com
X-MS-Exchange-CrossTenant-Network-Message-Id: 5ea38fcb-ec0c-40e4-517c-08db9408722b
X-MS-Exchange-CrossTenant-originalarrivaltime: 03 Aug 2023 10:00:19.8848 (UTC)
X-MS-Exchange-CrossTenant-fromentityheader: Hosted
X-MS-Exchange-CrossTenant-id: 5ae1af62-9505-4097-a69a-c1553ef7840e
X-MS-Exchange-CrossTenant-mailboxtype: HOSTED
X-MS-Exchange-CrossTenant-userprincipalname: In1w9n6HmNj3cjsH/6tBPaOb33j72MxYyNalYd1UDeaTnZxIcLsXONOzNc0T3DnwuHJqJ3cq+kxLzZ9bhvqIhQ==
X-MS-Exchange-Transport-CrossTenantHeadersStamped: PH8PR11MB6732
X-Outbound-SMTP-Client: 72.163.7.163, rcdn-opgw-2.cisco.com
X-Outbound-Node: alln-core-4.cisco.com
Archived-At: <https://mailarchive.ietf.org/arch/msg/ipv6/9USgv_DL0JEIVnIufeHS4TnaaqM>
Subject: Re: [IPv6] Thoughts on draft-thubert-6man-ipv6-over-wireless-15
X-BeenThere: ipv6@ietf.org
X-Mailman-Version: 2.1.39
Precedence: list
List-Id: "IPv6 Maintenance Working Group \(6man\)" <ipv6.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/ipv6>, <mailto:ipv6-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/ipv6/>
List-Post: <mailto:ipv6@ietf.org>
List-Help: <mailto:ipv6-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/ipv6>, <mailto:ipv6-request@ietf.org?subject=subscribe>
X-List-Received-Date: Thu, 03 Aug 2023 10:00:30 -0000

Many thanks for reading the draft, Joe.

About the concept of the BBR / AP collocation, yes, it looks like a layer violation, but it is also a conscious requirement by IEEE std 802.11.

The IEEE 802.11 standard demands (and has demanded for a number of iterations) that the AP has an "arp proxy" function. In their parlance "arp proxy" is for both IPv4 and IPv6. And the intent is to keep a state about the IP addresses in the associated nodes in order to tame L3-induced broadcasts. They want a L3 equivalent of the secure proactive address registration process that they call "association". Everyone know the term but is not necessarily clear on what it really does. It creates a BSS, which is a domain where the ethernet broadcast can be emulated - at a cost - for protocols that existed before Wi-Fi and were not sensitive to broadcast. At the same time, the association tames the broadcasts induced by learning bridges operations.

Till RFC 8929 and the specification of the BBR, there was no IETF spec to match the .11 requirement.

Now, the RFC 8505 registrar that you mention is very abstract. It can be "replicated" in all the BBRs (https://datatracker.ietf.org/doc/draft-thubert-bess-secure-evpn-mac-signaling/), "centralized" (think LISP, meaning that does not have to be a SPoF), or "distributed" with each BBR maintaining the state for its registered addresses only. RFC 8929 specifies  a "distributed" variation that uses IPv6 ND to reactively discover the other addresses over the backbone. This way, RFC 8929 provides a standard for the arp proxy that IEEE 802.11 is after, and allows to cancel the undesirable broadcasts over the wireless access.

But, caveat, it can only suppress the undesirable broadcasts when *all* its associated wireless nodes implement RFC 8505. Which is why a focus was initially given to wireless, still showing in the title of the draft.

On a different note, but probably of interest for ops, RFC 8929 provides both a routing and a bridging proxy variation. In routing proxy, the BBR answers NSs on behalf of the registered nodes with its own link layer address, and it installs a /128 route towards the registering node. IOW it routes the packets . This is required when the node is, say, on an IEEE 802.15.4 link that has non-bridgeable MACs. But that could be very cool for ops as well as the wireless MACs do not need to show on the backbone, at least for IPv6 operations. Conversely, the bridging proxy lets the registering node answer the NAs (unless the BBR is a sleep proxy of sorts),  meaning that the data packets are bridged by the AP as usual. The broadcasts NS are turned to unicast on the wireless hop, which makes it both faster and reliable, so there's a clean win there.

The bridging proxy operation is probably the one that the .11 people had in mind but in the end, it is up to the ops people to use either one. The RAs can still be generated by the real routers though the RS could be turn to unicast by the 6BBR, or at least not copied on the wireless side. I hope this helps alleviate the concerns about layer violations. They are limited, required (by .11), and better understood now that we made them a standard vs the art of existing but proprietary variations.

All the best,

Pascal
From: ipv6 <ipv6-bounces@ietf.org> On Behalf Of Joe Clarke (jclarke)
Sent: Wednesday, August 2, 2023 8:10 PM
To: 6man@ietf.org
Subject: [IPv6] Thoughts on draft-thubert-6man-ipv6-over-wireless-15

I had a chance to read through this draft with the hat of an IETF NOC member.  Given the number of wireless (and IPv6 wireless) issues we've seen over the years, Sections 2.1 and 2.2 really speaks to me.  We have seen issues with failing stateful proxies, incomplete learning of IPv6 addresses, and snooping holes.  These have led to extended onboarding time for IPv6-only clients and times when certain clients can pass traffic.  Things have gotten better, but it's still a moving target.  This is a real problem, and I'm glad focus is being given to it.

While not IPv6-specific, the IETF conference network currently uses public IPv4 addresses without a firewall (to provide an "Open Internet(tm)"), and this leads to other operational challenges that have required us to use ARP proxies to tamp down the broadcast onslaught.  Not having standards means to do some of these functions has been challenging.

Therefore, I support the spirit of this draft in that a more proactive approach to address registration and use of standardized means to do so and query the registrar would aid in overall network operation..

The concern I have is turning the AP into a BBR.  I can already hear some of the conversations in the NOC about this "layer violation".  That said, I can imagine a case where AP suppresses the multicast over the air and redirects RS or NS requests directly to the registrar (e.g., campus router).  As you mention, the true wired side of the network is not as susceptible to the shortcomings of NBMA, so pushing this traffic out onto the wire is not such a bad thing, plus it gives less "Magick" for the AP to handle.

Joe