Re: Generic anycast addresses...

Joel Jaeggli <joelja@bogus.com> Sat, 01 June 2019 02:05 UTC

Return-Path: <joelja@bogus.com>
X-Original-To: ipv6@ietfa.amsl.com
Delivered-To: ipv6@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 40EB712014E for <ipv6@ietfa.amsl.com>; Fri, 31 May 2019 19:05:50 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -6.897
X-Spam-Level:
X-Spam-Status: No, score=-6.897 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, RCVD_IN_DNSWL_HI=-5, SPF_HELO_NONE=0.001, SPF_NONE=0.001, URIBL_BLOCKED=0.001] autolearn=ham autolearn_force=no
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id fV84Yu2XpJUR for <ipv6@ietfa.amsl.com>; Fri, 31 May 2019 19:05:48 -0700 (PDT)
Received: from nagasaki.bogus.com (nagasaki.bogus.com [IPv6:2001:418:1::81]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id 2E29712014A for <6man@ietf.org>; Fri, 31 May 2019 19:05:48 -0700 (PDT)
Received: from [IPv6:2600:1700:3ec0:7bc0:18b2:174a:7f93:704c] ([IPv6:2600:1700:3ec0:7bc0:18b2:174a:7f93:704c]) (authenticated bits=0) by nagasaki.bogus.com (8.15.2/8.15.2) with ESMTPSA id x5125jnS040639; Sat, 1 Jun 2019 02:05:45 GMT (envelope-from joelja@bogus.com)
Content-Type: text/plain; charset="utf-8"
Mime-Version: 1.0 (1.0)
Subject: Re: Generic anycast addresses...
From: Joel Jaeggli <joelja@bogus.com>
X-Mailer: iPhone Mail (16F203)
In-Reply-To: <CAO42Z2yHJJ5TsuhP2C2i+XpUcMG=3dBNo6u9SSOw-KRpzywVkA@mail.gmail.com>
Date: Fri, 31 May 2019 19:05:39 -0700
Cc: Sander Steffann <sander@steffann.nl>, Michael Richardson <mcr+ietf@sandelman.ca>, "6man@ietf.org" <6man@ietf.org>, Dave Thaler <dthaler@microsoft.com>
Content-Transfer-Encoding: quoted-printable
Message-Id: <2C0D1106-C957-4580-AA7D-508ACC99D026@bogus.com>
References: <7A9560FC-0393-45DF-8389-B868455AC6DD@fugue.com> <20190530005734.7d2alod2zoaemmhc@faui48f.informatik.uni-erlangen.de> <D6E27B45-437F-45BE-A305-47DD460BCE02@fugue.com> <26144.1559226966@localhost> <1DD451A7-D898-4105-974C-53776A3DA9F2@fugue.com> <20190530152902.l2nmyhadr4e4kt7x@faui48f.informatik.uni-erlangen.de> <0FF19D6D-1A45-41EF-BE34-CC35B5E51E1E@steffann.nl> <D91629F6-73AC-4A80-80EF-16644F73DA36@fugue.com> <701687d4-842c-6a16-3c97-349125324e3f@gmail.com> <D648647D-60E1-4DCE-B0BE-11002E0AE5A4@fugue.com> <20190530220838.g2hshonsjxmfnd55@faui48f.informatik.uni-erlangen.de> <632BE7EC-26A6-44E9-9CCD-F0AE143D4256@fugue.com> <AF1967FC-526D-47FB-98BE-F9B949F26796@steffann.nl> <CAO42Z2yY=z-wKCUaCYZqJLHfT+LdyDOWz9bLG8QTh9C8sJCx3g@mail.gmail.com> <aa405734-b2dd-c21f-7377-2faaa24165e6@bogus.com> <CAO42Z2yHJJ5TsuhP2C2i+XpUcMG=3dBNo6u9SSOw-KRpzywVkA@mail.gmail.com>
To: Mark Smith <markzzzsmith@gmail.com>
Archived-At: <https://mailarchive.ietf.org/arch/msg/ipv6/FTYrsrd5E8lQ8Zwbfk5aXsyIdvM>
X-BeenThere: ipv6@ietf.org
X-Mailman-Version: 2.1.29
Precedence: list
List-Id: "IPv6 Maintenance Working Group \(6man\)" <ipv6.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/ipv6>, <mailto:ipv6-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/ipv6/>
List-Post: <mailto:ipv6@ietf.org>
List-Help: <mailto:ipv6-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/ipv6>, <mailto:ipv6-request@ietf.org?subject=subscribe>
X-List-Received-Date: Sat, 01 Jun 2019 02:05:50 -0000


Sent from my iPhone

> On May 31, 2019, at 15:27, Mark Smith <markzzzsmith@gmail.com> wrote:
> 
>> On Sat, 1 Jun 2019 at 02:35, joel jaeggli <joelja@bogus.com> wrote:
>> 
>>> On 5/30/19 16:21, Mark Smith wrote:
>>> 
>>> 
>>> On Fri., 31 May 2019, 08:54 Sander Steffann, <sander@steffann.nl
>>> <mailto:sander@steffann.nl>> wrote:
>>> 
>>>    Hi Ted,
>>> 
>>>>> To me, a non-fuzzy boundary is one where you do something like ACL on
>>>>> a set of links completely isolating some area of the network. Fuzzy
>>>>> could vbe absence of default route causing ULA to stop. Not sure if
>>>>> these are good examples of any actual definition, but both ae
>>>    possible with
>>>>> ULA.
>>>>> 
>>>>> I'd mostly be concerned about non-fuzzy boundaries wrt. security,
>>>>> so not sure if i'd always want to avoid non-fuzzy boundaries.
>>>> 
>>>> The question is, what’s different about the proposed application
>>>    versus typical ULA usage?
>>> 
>>>    I like the scope aspect of Mark's draft. ULA is always organisation
>>>    or site scoped, and should be filtered as such. Anycast that have a
>>>    different scope should have different boundaries. Anycast addresses
>>>    that have ISP scope can cross from the customer's network to the
>>>    ISP's network, while there should be a boundary between that
>>>    customer's ULA addresses and that ISP's ULA addresses (let's assume
>>>    they both use ULA for this example).
>>> 
>>> 
>>> An example use case for a Network Service Provider scope is anycast DNS
>>> resolvers.
>>> 
>>> You can't use ULA because customers don't send their ULA prefixes to
>>> you, and you don't really want them to, as that makes your ISP network
>>> part of their network.
>>> 
>>> Ideally you don't want to use GUA DNS resolver anycast addresses because
>>> that makes the DNS resolver vulnerable to DoS attacks from the Internet.
>> 
>> It is straight forward enough to use a gua prefix which you do not
>> announce to the internet as a whole. we do this with internal
>> anycast(s), address space used for point-to-point links management
>> networks and so forth.
>> 
> 
> Sounds like it isn't a requirement to advertise RIR space globally
> anymore so that RIRs can check if you're using it.

It has never been a requirement. 

RIRs will happily allocate GUA space which is  not intended to appear in the DFZ.

> 
> However, this is just one example of how a scoped formal anycast
> address space could be used. There are others I'm working on in the
> draft.
> 
>> 
>>> When I first ran up anycast DNS resolvers, I ideally wanted to use IPv4
>>> addresses that had these property of globally unique, not globally
>>> reachable, yet reachable from all customers' networks. Internet DoS
>>> attacks on DNS resolvers were common at the time.
>>> 
>>> RFC1918 didn't suit, nor did normal RIR public address space, because
>>> APNIC expected it to be globally reachable. IX space suites, but we
>>> weren't an IX. We could have probably lobbied harder for it, however we
>>> needed to get them going..
>>> 
>>> 
>>> This is also part of my realisation that the forwarding scopes of our
>>> unicast address spaces are quite coarse - global (GUA), organisation
>>> (ULA) and link (Link-Local), and that's it.
>> 
>> We have really bad historical experiences with attempts to define scopes.
>> 
> 
> Can you elaborate?
> 
> Multicast scopes don't seem to have caused any issues, and I think it
> is because they're much more fine grained than the total of 3 coarse
> unicast ones. Multicast scopes better fit the domains people want.
> 
>>> The much more fine grained multicast scopes used with anycast addresses
>>> would be much more flexible for anycast scenarios.
>>> 
>>> I think reintroducing the Site-Locals as a unicast address space, just
>>> to create Site-Local scope anycast addresses, isn't really properly
>>> solving the problem in a general enough way.
>>> 
>>> People will also use them for unicast addressing because they're more
>>> similar to RFC1918s that ULAs - and we also have problems with people
>>> not making ULA unique, despite the word Unique in the name.
>>> 
>>> 
>>> No mention of generating unique ULAs, so people are being trained to use
>>> ULAs that are not unique:
>>> 
>>> https://github.com/leblancd/kube-v6/blob/master/README.md#set-up-node-ip-addresses
>>> 
>>> A CPE vendor got this wrong too in the past:
>>> 
>>> Residential IPv6 CPE - What Not To Do and Other Observations
>>> https://www.ausnog.net/sites/default/files/ausnog-05/presentations/ausnog-05-d02p02-mark-smith.pdf
>>> 
>>> 
>>> Regards,
>>> Mark.
>>> 
>>> 
>>>    Cheers,
>>>    Sander
>>> 
>>>    --------------------------------------------------------------------
>>>    IETF IPv6 working group mailing list
>>>    ipv6@ietf.org <mailto:ipv6@ietf.org>
>>>    Administrative Requests: https://www.ietf.org/mailman/listinfo/ipv6
>>>    --------------------------------------------------------------------
>>> 
>>> 
>>> --------------------------------------------------------------------
>>> IETF IPv6 working group mailing list
>>> ipv6@ietf.org
>>> Administrative Requests: https://www.ietf.org/mailman/listinfo/ipv6
>>> --------------------------------------------------------------------
>>> 
>> 
>> 
>