Re: Confirmation to advance: draft-ietf-6man-ipv6only-flag-05

David Farmer <farmer@umn.edu> Fri, 10 May 2019 14:53 UTC

Return-Path: <farmer@umn.edu>
X-Original-To: ipv6@ietfa.amsl.com
Delivered-To: ipv6@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id B50FD12024F for <ipv6@ietfa.amsl.com>; Fri, 10 May 2019 07:53:19 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -4.299
X-Spam-Level:
X-Spam-Status: No, score=-4.299 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, DKIM_SIGNED=0.1, DKIM_VALID=-0.1, DKIM_VALID_AU=-0.1, HTML_MESSAGE=0.001, RCVD_IN_DNSWL_MED=-2.3, SPF_PASS=-0.001, URIBL_BLOCKED=0.001] autolearn=ham autolearn_force=no
Authentication-Results: ietfa.amsl.com (amavisd-new); dkim=pass (2048-bit key) header.d=umn.edu
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id ETj3tWOGLLvF for <ipv6@ietfa.amsl.com>; Fri, 10 May 2019 07:53:17 -0700 (PDT)
Received: from mta-p6.oit.umn.edu (mta-p6.oit.umn.edu [134.84.196.206]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id F208F1201E9 for <ipv6@ietf.org>; Fri, 10 May 2019 07:53:13 -0700 (PDT)
Received: from localhost (unknown [127.0.0.1]) by mta-p6.oit.umn.edu (Postfix) with ESMTP id 563FD75A for <ipv6@ietf.org>; Fri, 10 May 2019 14:53:13 +0000 (UTC)
X-Virus-Scanned: amavisd-new at umn.edu
Received: from mta-p6.oit.umn.edu ([127.0.0.1]) by localhost (mta-p6.oit.umn.edu [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id qk01Y7iJOrAx for <ipv6@ietf.org>; Fri, 10 May 2019 09:53:13 -0500 (CDT)
Received: from mail-vk1-f197.google.com (mail-vk1-f197.google.com [209.85.221.197]) (using TLSv1.2 with cipher AES128-GCM-SHA256 (128/128 bits)) (No client certificate requested) by mta-p6.oit.umn.edu (Postfix) with ESMTPS id EDCA3950 for <ipv6@ietf.org>; Fri, 10 May 2019 09:53:12 -0500 (CDT)
Received: by mail-vk1-f197.google.com with SMTP id 203so2544159vkj.10 for <ipv6@ietf.org>; Fri, 10 May 2019 07:53:12 -0700 (PDT)
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=umn.edu; s=google; h=mime-version:references:in-reply-to:from:date:message-id:subject:to :cc; bh=gm//lxGCDgwm8uV75ebgwJj7MzpRa6sHz5Ch5kHacNc=; b=PdmAZEBUyE/f9SO2Y/n5iI8yPVCV3SF48HVwvr+4CPXN9lD4VuacCXS7TueJSRhCw1 cN/N6RlFZr4x9OS9RjAa1d4cJ0NTa++86ZCM/7HbPow4Ksj1O89aoa50k1sXXu0TNPmH jjkmSp5dGPXtFPP1TwZyCji4yiN5WcUWbeUp63nDukt3rVpbvJszEN2bpZrZvNFxx+om swBDhcUdp+431bGdK7Xy3F2r5rsW93sIuvorOPoThmGe3ErqoPjTqgjKELMrfy/ldX0T 83kM1Su4IDOwjzioTKyUe5RrV4XHAWHWQzpMvZexmylLJdbTtY5fqy0xI1N1XRAbh0JW kh6A==
X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20161025; h=x-gm-message-state:mime-version:references:in-reply-to:from:date :message-id:subject:to:cc; bh=gm//lxGCDgwm8uV75ebgwJj7MzpRa6sHz5Ch5kHacNc=; b=oZ6qBaBAi2Z/r15ErFbrOLD+3OAIh5/Vrjso4cpadtL5XXz/IDoLJI8Sq1eS7Ke/Kz LABV+66zXn43UHotZ4m1kAmM0VS7egV/RIYtQBk2rcDJtCaNXeGDPHK7U0ixP0RxUDJM mjUBOdwSrCcO1cXgn0CF+1EZOqNIVYtq2ZytBu9DRRaHvDi3gy3u8PXr2eOGJdHhhV5H whToDKPxqVScptvsiQgGnx7YCV8oXpJJBZaPA1VaTN6ei52F0gmYbBIigIDQBtGigJgE ksgCiIGoolONaVL37HC05DwTtpmbgTmO+NPEcnOHChu4i30lTQ5fsij120yACjU/OA6K lk2w==
X-Gm-Message-State: APjAAAXZSKTyae5lFKZ3ofQgMULm2Z+duZ5AmDuNlIXdXyXtMUP2gE9e JbsVInDwE1x+WrhK4tFCYdtq5MnLlRcP3OLvhfmJLFnX4p2du2HqQIzn/xpUcPH850eXfXsAXkl BpfaqYUEYg8KDGIUxg5/Wnq55
X-Received: by 2002:a1f:62c7:: with SMTP id w190mr5238824vkb.72.1557499991583; Fri, 10 May 2019 07:53:11 -0700 (PDT)
X-Google-Smtp-Source: APXvYqyVAQpIxW+UO2GyFwnAZ8A2zz8RgebzskzN5Hnptklg85rGoiKp/Ya9WlzFh7divWe6bWmdG0k9MSFH1p8CEUE=
X-Received: by 2002:a1f:62c7:: with SMTP id w190mr5238801vkb.72.1557499991069; Fri, 10 May 2019 07:53:11 -0700 (PDT)
MIME-Version: 1.0
References: <F8BFFCAD-E58E-4736-8A1C-56579B6F6032@employees.org> <alpine.DEB.2.20.1905091054560.1824@uplift.swm.pp.se> <m1hOfjp-0000IdC@stereo.hq.phicoh.net> <924a4e34-e5f9-9872-bd4a-c0f68fd5387f@gmail.com> <m1hP1uA-0000EhC@stereo.hq.phicoh.net> <12F17008-16C5-4E58-89DB-BC7D01341CD7@lists.zabbadoz.net> <f1210218-9a51-805f-df31-d96dc9381c91@foobar.org> <F5BC870A-0853-43A3-A493-DC7DF8701B50@lists.zabbadoz.net> <C5A98D65-ABC9-4728-82C5-CF81F8FE53D8@steffann.nl> <CAN-Dau3F+Z94aC1fAohZDz81z=Kg4u1TZGiuMH_L4yVUCH1sMg@mail.gmail.com>
In-Reply-To: <CAN-Dau3F+Z94aC1fAohZDz81z=Kg4u1TZGiuMH_L4yVUCH1sMg@mail.gmail.com>
From: David Farmer <farmer@umn.edu>
Date: Fri, 10 May 2019 09:52:54 -0500
Message-ID: <CAN-Dau3dqML64G5gG+Rh9nwC-JHDNH_sfeK8C-cqis1n5bswCg@mail.gmail.com>
Subject: Re: Confirmation to advance: draft-ietf-6man-ipv6only-flag-05
To: Sander Steffann <sander@steffann.nl>
Cc: "Bjoern A. Zeeb" <bzeeb-lists@lists.zabbadoz.net>, 6man WG <ipv6@ietf.org>
Content-Type: multipart/alternative; boundary="000000000000b4ae74058889b97a"
Archived-At: <https://mailarchive.ietf.org/arch/msg/ipv6/9aRz8CigPee2LjPOJhRIM9wTthQ>
X-BeenThere: ipv6@ietf.org
X-Mailman-Version: 2.1.29
Precedence: list
List-Id: "IPv6 Maintenance Working Group \(6man\)" <ipv6.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/ipv6>, <mailto:ipv6-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/ipv6/>
List-Post: <mailto:ipv6@ietf.org>
List-Help: <mailto:ipv6-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/ipv6>, <mailto:ipv6-request@ietf.org?subject=subscribe>
X-List-Received-Date: Fri, 10 May 2019 14:53:21 -0000

On Fri, May 10, 2019 at 8:47 AM David Farmer <farmer@umn.edu> wrote:

>
> On Fri, May 10, 2019 at 7:56 AM Sander Steffann <sander@steffann.nl>
> wrote:
>
>> Hi Bjoern,
>>
>> > It also says:
>> >
>> >   A host MAY delay all IPv4 operations at start-up or reconnection
>> >   until a reasonable time has elapsed for RA messages to arrive.  If
>> >   all RAs received have the flag set to 1, a host SHOULD NOT attempt
>> >   IPv4 operations.
>>
>> And that last bit is exactly where the problem is: it is too strong.
>> Something like "If all RAs received have the flag set to 1, a host SHOULD
>> NOT aggressively retry any failed IPv4 operations (like obtaining a DHCP
>> lease) and operate without using IPv4 as much as possible to reduce
>> unwanted/unnecessary IPv4 traffic on the network. Especially operations
>> that transmit broadcast packets should be avoided to save the battery life
>> of other devices on the network."
>>
>> So, as has been suggested before: turn it from an off-flag to a useful
>> heuristic. I will remain strongly opposed to a hard off-flag for the
>> reasons explained previously. I still think Bert is right: "Not necessary,
>> not sufficient, therefore, IMO, not needed." so I'll probably never be a
>> supporter of this draft, but if we are talking about a heuristic then I can
>> at least reevaluate my objections to see if we can reach consensus.
>>
>
> I have to agree that a "hard off" for IPv4, especially global scope
> unicast IPv4 is not necessary, it is not the problem. If a dual-stack host
> doesn't get an IPv4 DHCPOFFER, it won't do global scope unicast IPv4. The
> primary problem described in the problem statement is RFC 3927 and futile
> IPv4 service discovery using Link-Local IPv4 addresses. I am suggesting we
> change the flag to be a "hard off" only for RFC 3927, and then its a
> heuristic hint to fairly quickly stop, or at least severely limit, periodic
> IPv4 DHCPDISCOVERS, or a "soft off" for global scope unicast IPv4.
>
> Furthermore, at least in the near-term, I don't believe IPv6-Only networks
> are going to be very common. Therefore, I don't think delaying the initial
> IPv4 DHCPDISCOVERS until the IPv6 RAs can be analyzed is a good tactic.
> While I think it should be permitted, I don't think it should be
> encouraged, at least until IPv6-Only networks become the dominant solution
> and dual-stack or IPv4-Only networks are rare. Which is by no means the
> case today. Today, delaying initial IPv4 DHCPDISCOVERS is bad advice.
>

I just had an additional thought, should there be any effect on a
statically configured global scope unicast IPv4 address on a host in the
presence of this flag?

This question got me thinking, the problem isn't really having an address
configured on the IPv4 stack or even having the IPv4 stack turned on, the
problem on the wire is IPv4 service discovery and too persistently sending
out periodic IPv4 DHCPDISCOVERS.

So really the effect we needed is not necessarily a "hard off" for the IPv4
stack or even RFC 3927. If the IPv4 stack has an address on it, statically
configured or from RFC 3927, who cares. It is the generation of futile IPv4
service discovery traffic using that address and overly persistently
periodic IPv4 DHCPDISCOVERS that is the issue for local battery and
possibly WiFi airtime.

Therefore, maybe what should be specified is a "hard off" for IPv4 service
discovery in the presence of the flag and limiting IPv4 DHCPDISCOVERS. Then
note depending on the details of the IPv4 stack implementation the
necessary effects can be achieved in several ways;

1. Turn off IPv4 service discovery and limit IPv4 DHCPDISCOVERS.
2. Do not configure an RFC 3927 address, if no IPv4 DHCPOFFER is received
and limit IPv4 DHCPDISCOVERS.
3. Turn off the IPv4 stack altogether.

Noting that the list is in order of preference, but the particulars of the
IPv4 stack implementation will dictate the best solution in each
implementation. Further, option #3 is NOT RECOMMENDED for especially for
general purpose hosts.

Thanks


-- 
===============================================
David Farmer               Email:farmer@umn.edu
Networking & Telecommunication Services
Office of Information Technology
University of Minnesota
2218 University Ave SE        Phone: 612-626-0815
Minneapolis, MN 55414-3029   Cell: 612-812-9952
===============================================