Re: A common problem with SLAAC in "renumbering" scenarios

Ole Troan <otroan@employees.org> Mon, 04 February 2019 11:29 UTC

Return-Path: <otroan@employees.org>
X-Original-To: ipv6@ietfa.amsl.com
Delivered-To: ipv6@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id DA822130E9B for <ipv6@ietfa.amsl.com>; Mon, 4 Feb 2019 03:29:08 -0800 (PST)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -1.901
X-Spam-Level:
X-Spam-Status: No, score=-1.901 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, SPF_PASS=-0.001] autolearn=ham autolearn_force=no
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id Or3y9I92mppP for <ipv6@ietfa.amsl.com>; Mon, 4 Feb 2019 03:29:06 -0800 (PST)
Received: from bugle.employees.org (accordion.employees.org [IPv6:2607:7c80:54:3::74]) (using TLSv1.2 with cipher AECDH-AES256-SHA (256/256 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id 9039E130E99 for <ipv6@ietf.org>; Mon, 4 Feb 2019 03:28:55 -0800 (PST)
Received: from astfgl.hanazo.no (77.16.50.157.tmi.telenormobil.no [77.16.50.157]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by bugle.employees.org (Postfix) with ESMTPSA id D6DEFFECBEBC; Mon, 4 Feb 2019 11:28:23 +0000 (UTC)
Received: from [IPv6:::1] (localhost [IPv6:::1]) by astfgl.hanazo.no (Postfix) with ESMTP id 3B0C2DFB6FB; Mon, 4 Feb 2019 12:28:19 +0100 (CET)
Content-Type: text/plain; charset="utf-8"
Mime-Version: 1.0 (Mac OS X Mail 12.2 \(3445.102.3\))
Subject: Re: A common problem with SLAAC in "renumbering" scenarios
From: Ole Troan <otroan@employees.org>
In-Reply-To: <d40b41c3-ff1b-cab4-a8de-16692a78e8fd@go6.si>
Date: Mon, 04 Feb 2019 12:28:18 +0100
Cc: 6man WG <ipv6@ietf.org>
Content-Transfer-Encoding: quoted-printable
Message-Id: <D1E45CAD-08D0-43D4-90F7-C4DD44CB32C0@employees.org>
References: <60fabe4b-fd76-4b35-08d3-09adce43dd71@si6networks.com> <alpine.DEB.2.20.1901311236320.5601@uplift.swm.pp.se> <m1gpCcz-0000FlC@stereo.hq.phicoh.net> <ddd28787-8905-bafd-3546-2ceef436c8b0@si6networks.com> <m1gptWx-0000G3C@stereo.hq.phicoh.net> <69609C58-7205-4519-B17A-4FBC8AE2EA16@employees.org> <d40b41c3-ff1b-cab4-a8de-16692a78e8fd@go6.si>
To: Jan Zorz - Go6 <jan@go6.si>
X-Mailer: Apple Mail (2.3445.102.3)
Archived-At: <https://mailarchive.ietf.org/arch/msg/ipv6/CfsDHRpC_aCeiedT8bTtZcV28LQ>
X-BeenThere: ipv6@ietf.org
X-Mailman-Version: 2.1.29
Precedence: list
List-Id: "IPv6 Maintenance Working Group \(6man\)" <ipv6.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/ipv6>, <mailto:ipv6-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/ipv6/>
List-Post: <mailto:ipv6@ietf.org>
List-Help: <mailto:ipv6-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/ipv6>, <mailto:ipv6-request@ietf.org?subject=subscribe>
X-List-Received-Date: Mon, 04 Feb 2019 11:29:09 -0000

Jan,

>>> One question is whether it makes sense for routers to have valid lifetimes of
>>> more than a day for prefixes that are obtained using DHCP-PD.
>>> 
>>> Another is whether general purpose hosts should accept lifetimes of more
>>> than a day. Maybe hosts should just truncate.
>> The (original) intended lifetime for DHCP PD is a lifetime equal to the length of the contract with your ISP.
>> Lifetimes become meaningless with “flash renumbering”. Neither SLAAC nor DHCP PD is designed for that.
>> The simple solution to this problem is “if it hurts, stop doing it”.
> 
> Ole, in theory, I agree with you.
> 
> In practice - "if it hurts, stop doing it" means that ISPs declares IPv6 as not functioning and switch it off for good.
> 
> Is this what we want?

One doesn’t follow from the other.
Neither do we want an IPv6 deployment where TCP connections break arbitrarily or IPv6 users cannot conveniently run servers in their homes.
Short lived, arbitrary changing prefixes dumps most of the baby out with the bath water (ouch that put some awful pictures in my head).

> CPE power-cycle is something that ISP has no control of. Now, if provisioning vendors would play our game, then they would never implement a provisioning mechanism that allows flash renumbering, as you call it.

Of course no mechanism here has ever been contingent on the CPE rebooting or not.
One reason we have RFC4649 for example, for deployments where the interface ot user binding isn’t obvious.

> 
> Ole, I would ask you a favour. Can you ask internally at your employer why provisioning at BRAS allows creating "pools" of IPv6 addresses and dynamic prefix delegations? Basically, this is the core root of a problem and if we can fix it in provisioning platforms, then we are all set and there is no need for changing CPE or host.
> 
> But I'm afraid that the answer that you'll get will be "customers demanded this and we had to implement it". Money talks. Do you think we can change that? Talk VendorC, VendorJ, VendorX and all others into turning their behaviour into one that actually give ISPs even an option to honour their "contract" with a customer, even in case of unintended event with the CPE?
> 
> Should we write a Standard RFC that neatly defines all the MUSTS for provisioning platforms?

The provisioing platforms have all that they require. This is only policy.
Now, I know there are cases where huge swats of users are moved from one aggregation point in the network to another, where routing would end up very messed up if customer weren’t renumbered, and also that in those cases that flash renumbering is a lot easier to do, but those are typically known events.

> If yes - good. If not - then we have to change the host and CPE.

If we want to keep the benefits of IPv6, and solve the problem of arbitrary addresses being ripped out from underneath the host stack, we need to do quite a bit more than what is proposed in this draft. The reason why we need to push against this kind of network behaviour is that the transport protocols, host stack and applications aren’t ready, and they’re not going to be for a while.

Ole