Re: I-D Action: draft-ietf-6man-ipv6only-flag-03.txt

Toerless Eckert <tte@cs.fau.de> Wed, 24 October 2018 09:29 UTC

Return-Path: <eckert@i4.informatik.uni-erlangen.de>
X-Original-To: ipv6@ietfa.amsl.com
Delivered-To: ipv6@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id BC76D12D4F0 for <ipv6@ietfa.amsl.com>; Wed, 24 Oct 2018 02:29:28 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -3.952
X-Spam-Level:
X-Spam-Status: No, score=-3.952 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, HEADER_FROM_DIFFERENT_DOMAINS=0.249, RCVD_IN_DNSWL_MED=-2.3, SPF_PASS=-0.001] autolearn=ham autolearn_force=no
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id 3bODNiT9CTBf for <ipv6@ietfa.amsl.com>; Wed, 24 Oct 2018 02:29:25 -0700 (PDT)
Received: from faui40.informatik.uni-erlangen.de (faui40.informatik.uni-erlangen.de [IPv6:2001:638:a000:4134::ffff:40]) (using TLSv1.2 with cipher ADH-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id 897B812958B for <ipv6@ietf.org>; Wed, 24 Oct 2018 02:29:25 -0700 (PDT)
Received: from faui48f.informatik.uni-erlangen.de (faui48f.informatik.uni-erlangen.de [131.188.34.52]) by faui40.informatik.uni-erlangen.de (Postfix) with ESMTP id 8D4AA54817A for <ipv6@ietf.org>; Wed, 24 Oct 2018 11:29:21 +0200 (CEST)
Received: by faui48f.informatik.uni-erlangen.de (Postfix, from userid 10463) id 7D361440210; Wed, 24 Oct 2018 11:29:21 +0200 (CEST)
Date: Wed, 24 Oct 2018 11:29:21 +0200
From: Toerless Eckert <tte@cs.fau.de>
To: ipv6@ietf.org
Subject: Re: I-D Action: draft-ietf-6man-ipv6only-flag-03.txt
Message-ID: <20181024092921.jbf3q5vzsdgozgyd@faui48f.informatik.uni-erlangen.de>
MIME-Version: 1.0
Content-Type: text/plain; charset="us-ascii"
Content-Disposition: inline
User-Agent: NeoMutt/20170113 (1.7.2)
Archived-At: <https://mailarchive.ietf.org/arch/msg/ipv6/AMpWlmKpa9C3_hJylrd3VCjJW50>
X-BeenThere: ipv6@ietf.org
X-Mailman-Version: 2.1.29
Precedence: list
List-Id: "IPv6 Maintenance Working Group \(6man\)" <ipv6.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/ipv6>, <mailto:ipv6-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/ipv6/>
List-Post: <mailto:ipv6@ietf.org>
List-Help: <mailto:ipv6-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/ipv6>, <mailto:ipv6-request@ietf.org?subject=subscribe>
X-List-Received-Date: Wed, 24 Oct 2018 09:29:29 -0000

Some more opinions:

I do like the goal of this draft, but not for the long list of mostly wifi
reasons given, but because the link-local IPv4 autoconfiguration
is an operational and diagnostics painpoint when its not necessary.

For example, most users wouldn't even be able to recognize when link-local
IPv4 addresses are being used. Much easier network diagnostics/behavior
to completely disable it automatically when not needed. Whatever the subnet type.

But: Why not simply write a draft stating that RFC3927 should not be performed
or even shut-down when the host has a routed IPv6 address on certain
type of subnets. Such as infrastructure mode WiFi. But maybe not on 
ad-hoc wifi ? In any case, the draft should discuss the benefit of this
RA bit over such non-RA but just host-local heuristics.

I think the assesment of "overload switches in multi-segment wireless network"
is not applicable for normal L2 switches as also said by others on the thread.
However i wouldn't dare to talk to all those convoluted wifi networks with protocols
like CAPWAP (RFC5415). 

The RFC3927 wifi multicast/broadcast send and receive cost should
be quantified. Maybe one can start with the RFC7772 assumption of
7 broadcast/hour = 0.1mA = reasonable limit for background multicast
and see how many order of magnitude one above that line the RFC3927
traffic might be.

Godot will arrive earlier than any randomn set of IP host stacks
would implement a new RA option even if its required to help the
host stacks battery to survive. I am not saying this to discourage the
draft, but rather to say that if the wifi problems can be quantified as
real problematic, then its more important to look for more short term
effective solution options first. Such as operational practices, if not
feature requirements for L2 broadcast filter recommendations on WiFi APs.
That at least seems like the most important short term fix for the
broadcast reception battery cost issue.

Overall, discussion about the wifi problems might better be suited for
analysis in drafts like draft-ietf-mboned-ieee802-mcast-problems first
before drawing conclusions at only the fud/may level. But as said
above, i'd be happy to see steps taken to minimize use of unnecessary
rfc3927 in the absence of wifi or batteries.

Wrt to security: I could not find a description of the case where
an attacker sends the new RA option to kill IPv4 in the presence of
a legitimate IPv4 only & DHCP capable router. How would client
recognize this condition and prohibit the attack ?

"a host SHOULD also choose to not attempt IPv4 operations until an
application asks it to, specifically delay performing DHCPV4 until
it gets a request from an application to use IPv4"

I think this is wishfull thinking wrt. to how applications interact
with available addressing. I am not aware of any API where apps 
can ask the host to get a local IPv4 address if non-yet exist,
and trying to enable IPv4 for example because of the first time when
an app asks the DNS resolver for a name with only A but no AAAA RRs
sounds like a cool project. But in the abence of any such known code
or spec how to do it, the draft should not allude to such wishfull
mechanisms. That should really be an ask from a draft specifically
for that goal: "IPv4 on demand to reach non-IPv6 peers".

Cheers
   Toerless