Re: Running code (Was: I-D Action: draft-ietf-6man-ipv6only-flag-03.txt)

Toerless Eckert <tte@cs.fau.de> Wed, 31 October 2018 15:30 UTC

Return-Path: <eckert@i4.informatik.uni-erlangen.de>
X-Original-To: ipv6@ietfa.amsl.com
Delivered-To: ipv6@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id B62C1130DE5 for <ipv6@ietfa.amsl.com>; Wed, 31 Oct 2018 08:30:55 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: 1.049
X-Spam-Level: *
X-Spam-Status: No, score=1.049 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, GB_SUMOF=5, HEADER_FROM_DIFFERENT_DOMAINS=0.249, RCVD_IN_DNSWL_MED=-2.3, SPF_PASS=-0.001, URIBL_BLOCKED=0.001] autolearn=no autolearn_force=no
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id FEVEUwkSzXzu for <ipv6@ietfa.amsl.com>; Wed, 31 Oct 2018 08:30:53 -0700 (PDT)
Received: from faui40.informatik.uni-erlangen.de (faui40.informatik.uni-erlangen.de [131.188.34.40]) (using TLSv1.2 with cipher ADH-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id 571B0130E2A for <ipv6@ietf.org>; Wed, 31 Oct 2018 08:30:53 -0700 (PDT)
Received: from faui48f.informatik.uni-erlangen.de (faui48f.informatik.uni-erlangen.de [IPv6:2001:638:a000:4134::ffff:52]) by faui40.informatik.uni-erlangen.de (Postfix) with ESMTP id 02CDB548054; Wed, 31 Oct 2018 16:30:49 +0100 (CET)
Received: by faui48f.informatik.uni-erlangen.de (Postfix, from userid 10463) id E69BC440210; Wed, 31 Oct 2018 16:30:48 +0100 (CET)
Date: Wed, 31 Oct 2018 16:30:48 +0100
From: Toerless Eckert <tte@cs.fau.de>
To: Brian E Carpenter <brian.e.carpenter@gmail.com>
Cc: ipv6@ietf.org
Subject: Re: Running code (Was: I-D Action: draft-ietf-6man-ipv6only-flag-03.txt)
Message-ID: <20181031153048.wz7mx5p2txhwpshn@faui48f.informatik.uni-erlangen.de>
References: <8C587906-F0EE-4A61-9046-2BFAC52588C0@isc.org> <E8DE18B5-94FC-411C-A310-E49A382E0079@thehobsons.co.uk> <e0fa8fad1b4249c9af79788323b0a922@boeing.com> <3A03A073-72E2-43A8-90A4-5C29DF445361@thehobsons.co.uk> <27fdbd71125842d888c5136684bf6e7b@boeing.com> <9A4368D6-E4B1-474C-9838-B584AF6D70C8@thehobsons.co.uk> <m1gHUMI-0000I6C@stereo.hq.phicoh.net> <9e3f31a2-2a38-cb47-a7b0-73a4c3cbf21b@gmail.com> <20181030210331.rnwwn6sh23bgo4ot@faui48f.informatik.uni-erlangen.de> <97ce4bf9-ae09-653f-b161-6c5e5456ff68@gmail.com>
MIME-Version: 1.0
Content-Type: text/plain; charset="us-ascii"
Content-Disposition: inline
In-Reply-To: <97ce4bf9-ae09-653f-b161-6c5e5456ff68@gmail.com>
User-Agent: NeoMutt/20170113 (1.7.2)
Archived-At: <https://mailarchive.ietf.org/arch/msg/ipv6/ByJH4w_kXVeYbYhRrtNjmWX3zrs>
X-BeenThere: ipv6@ietf.org
X-Mailman-Version: 2.1.29
Precedence: list
List-Id: "IPv6 Maintenance Working Group \(6man\)" <ipv6.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/ipv6>, <mailto:ipv6-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/ipv6/>
List-Post: <mailto:ipv6@ietf.org>
List-Help: <mailto:ipv6-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/ipv6>, <mailto:ipv6-request@ietf.org?subject=subscribe>
X-List-Received-Date: Wed, 31 Oct 2018 15:30:56 -0000

Ok, so more generalized, the argument is 

"Trust the sum of all IPv6 router on a subnet more than a possible
IPv4 router" may not apply in cases where the host wants to try all
it can do to communicate. Example: emergency communications.

Qualitatively this is not wrong, i am just not sure if this should
really be considered for standards track behavior now.

One argument is that it does not make sense to introduce this level
of complexity before an even more important level of resiliency is
not done either. For example IMHO it would be even more important
to rethink resilience in the presence of multiple routers of the
same address family first and for example make such a device/app
try in parallel to reach the remote server in parallel across all of
the found IPv6 routers. Unless there is a different IPv6
prefix assigned to the host for each such router, there is no
way for a host stack to do this because the standard transport APIs do not
offer knowledge about the different routers (You would have to hack
this). 

So, in my book this means that we should not bother about third priority
considerations unless we've resolved all second tier priorities,
and then we can still write an update of this document.

Aka: KISS to make the approach more attractive.

Cheers
    Toerless


On Wed, Oct 31, 2018 at 01:36:44PM +1300, Brian E Carpenter wrote:
> On 2018-10-31 10:03, Toerless Eckert wrote:
> > Brian,
> > 
> > I think i would be happier with a stronger goal of the flag
> > relying less or not at all on heuristics of hosts.
> > 
> > Give me a reason why dual-stack hosts should want to do IPv4
> > on a subnet if there is no IPv4-only host and no router routing IPv4. 
> 
> The example I've used is a an IP-based smoke detector trying to connect
> to an IP-based central fire alarm system. Because human safety is
> involved it needs to try every possible type of connectivity in any case,
> so giving up on IPv4 because the IPv6 routers say so is not the right
> answer. IMHO, a perfect case for an RFC2119 SHOULD:
>   "... there
>    may exist valid reasons in particular circumstances to ignore a
>    particular item, but the full implications must be understood and
>    carefully weighed before choosing a different course."
> 
>       Brian
> 
> 
> 
> > 
> > This seems like the most simple case to discuss about and agree
> > what to do for it. TO me it seems that it would be great to
> > recognize this case and automatically disable IPv4 stack/interface
> > because of a flag from routers on all dual-stack hosts.
> > 
> > Cheers
> >     Toerless
> > 
> > On Wed, Oct 31, 2018 at 08:43:40AM +1300, Brian E Carpenter wrote:
> >> On 2018-10-31 02:47, Philip Homburg wrote:
> >>>> So, here's the challenge which you seem to be holding back from,
> >>>> write down the actual rules. No hand waving that "that's a good
> >>>> clue", but actual rules that "if you see <some observable state>
> >>>> then <do some specific action>".
> >>
> >> If by "rules" you mean "a typical heuristic", sure. But there will
> >> be hosts that follow a different logic for their own good reasons.
> >> That simply isn't the IETF's business.
> >>
> >> The draft is quite clear on this:
> >>
> >>    Dual stack hosts that have a good reason to use IPv4, for example for
> >>    a specific IPv4 link-local service, can attempt to do so.  Therefore
> >>    respect of the IPv6-Only flag is recommended, not mandatory, for
> >>    hosts.
> >>
> >> On 2018-10-31 04:18, Toerless Eckert wrote:
> >> ....
> >>> IMHO:
> >>>
> >>> If the host sees the ipv6only flag from all IPv6 routers, it MUST NOT
> >>> perform IPv4 DHCP.
> >>
> >> Who cares? Legacy hosts will try DHCP anyway. We don't want an updated
> >> host to waste spectrum on this, but that's a SHOULD NOT, because such
> >> traffic won't actually break anything.
> >>
> >>     Brian
> >>
> >> --------------------------------------------------------------------
> >> IETF IPv6 working group mailing list
> >> ipv6@ietf.org
> >> Administrative Requests: https://www.ietf.org/mailman/listinfo/ipv6
> >> --------------------------------------------------------------------
> > 

-- 
---
tte@cs.fau.de