Re: you have running code ... I-D Action: draft-ietf-6man-ipv6only-flag-03.txt

Brian E Carpenter <brian.e.carpenter@gmail.com> Fri, 02 November 2018 19:20 UTC

Return-Path: <brian.e.carpenter@gmail.com>
X-Original-To: ipv6@ietfa.amsl.com
Delivered-To: ipv6@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id CE608130E1E for <ipv6@ietfa.amsl.com>; Fri, 2 Nov 2018 12:20:27 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -1.999
X-Spam-Level:
X-Spam-Status: No, score=-1.999 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, DKIM_SIGNED=0.1, DKIM_VALID=-0.1, DKIM_VALID_AU=-0.1, FREEMAIL_FROM=0.001, RCVD_IN_DNSWL_NONE=-0.0001, SPF_PASS=-0.001, URIBL_BLOCKED=0.001] autolearn=ham autolearn_force=no
Authentication-Results: ietfa.amsl.com (amavisd-new); dkim=pass (2048-bit key) header.d=gmail.com
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id c6S3Hwt1no3A for <ipv6@ietfa.amsl.com>; Fri, 2 Nov 2018 12:20:23 -0700 (PDT)
Received: from mail-pg1-x541.google.com (mail-pg1-x541.google.com [IPv6:2607:f8b0:4864:20::541]) (using TLSv1.2 with cipher ECDHE-RSA-AES128-GCM-SHA256 (128/128 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id 1FEB9126BED for <ipv6@ietf.org>; Fri, 2 Nov 2018 12:20:22 -0700 (PDT)
Received: by mail-pg1-x541.google.com with SMTP id z17-v6so1391967pgv.3 for <ipv6@ietf.org>; Fri, 02 Nov 2018 12:20:22 -0700 (PDT)
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=gmail.com; s=20161025; h=subject:to:references:from:message-id:date:user-agent:mime-version :in-reply-to:content-language:content-transfer-encoding; bh=FqzvqyXBW0Y19+YNgaKkjDvmCtdb6kW+i0jPJ3IA7ZQ=; b=R5hyOKrDKhxbkds8kcAPihuQ8RbXS/qh7O+0JO4RUSzx2AnGY8IbdVkgCCEFMUeqX5 1C8bRadgsesIy3vIJrLot37+spd5OEAffGUdldhFTW+dLFgXmX0QTn05t2xdg5m1YZ1N xVnSMB33hGFQm0DiPEevxtzgbtyEpk6ZzhXMoQNAle6ykvNAhrd2WRkygvEpeVlI8Wvq JKJK+v+dJv7iIABcDOYSvv1PnGSpZW6ShOod/7b5Uh9xvCdbxSlr8uhBdWnexUoVHdGL rdwOZ32OIOwOxBGoqQ95qRjs41KUvYGhDAG+DuaD5LtzixSAyfStavYx5OfcbCkEK0G4 xuDA==
X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20161025; h=x-gm-message-state:subject:to:references:from:message-id:date :user-agent:mime-version:in-reply-to:content-language :content-transfer-encoding; bh=FqzvqyXBW0Y19+YNgaKkjDvmCtdb6kW+i0jPJ3IA7ZQ=; b=dvEhwAICHcZISiV/UF1FdYWfRuI12VFjyoDVGc0I1iD+bE4Sdke0OKisOdsAxeOw+C bY805kCAYBMbAQOazxhvjuIrfizhFGiMJ2HaPznG17t8j3FtPQfWi60o3g3PZc3hVcQc 3xq+bJ2IcQ1OR140OoIYx8wsS6m7G8tmurRLhnYer+akdNQOkunzRGxgOiBOcAn2PArK XvNoPlX5nb4t9zXYGOGT3Jb2eaXkFHSBgh3PzGQmiodtgBy6Uj4XMVJLhgpXGDZATym9 h48tUz4FwvRIxreSeuNRJZgxM7uJ0TBH9pzXWIUQiPhWWJiiJ3uqYgswcN3CtiGzTH/O 8zFg==
X-Gm-Message-State: AGRZ1gLM9m9d1F/gA7bVxZS6QAPFv5Ty+7gPNCkuUhTsTdkS04kjIj0V YMaKLFvZIQOZeoAF9twJNvSi5AIz
X-Google-Smtp-Source: AJdET5fifqBzFPqcwPRonRXUD0RPNSWHLa86/xeXRlbsNVxMtU+l2pFoGfVZ+sGDg/ZdvQYWFYXBRg==
X-Received: by 2002:a63:e04d:: with SMTP id n13-v6mr12223574pgj.426.1541186421194; Fri, 02 Nov 2018 12:20:21 -0700 (PDT)
Received: from [192.168.178.30] ([118.148.76.40]) by smtp.gmail.com with ESMTPSA id m5-v6sm43336335pfc.188.2018.11.02.12.20.18 (version=TLS1_2 cipher=ECDHE-RSA-AES128-GCM-SHA256 bits=128/128); Fri, 02 Nov 2018 12:20:20 -0700 (PDT)
Subject: Re: you have running code ... I-D Action: draft-ietf-6man-ipv6only-flag-03.txt
To: Lee Howard <lee@asgard.org>, ipv6@ietf.org
References: <153973137181.9473.10666616544238076833@ietfa.amsl.com> <6264F7A1-59EB-467D-A576-E5F2F0DEE7DD@lists.zabbadoz.net> <CACWOCC-xL0PfkNHgCqhB28GE-jCWUUagQE4PukdpXK+YHgWpyg@mail.gmail.com> <97ba35ff-b4a7-314c-3010-297d06be645d@foobar.org> <01c2a55e-1888-3ebc-3252-11b9005b8272@gmail.com> <0abd7b4d-b0e0-b1bc-2468-678befbc7cac@asgard.org>
From: Brian E Carpenter <brian.e.carpenter@gmail.com>
Message-ID: <3e155df0-5799-8788-5fbe-767a7421828c@gmail.com>
Date: Sat, 03 Nov 2018 08:20:16 +1300
User-Agent: Mozilla/5.0 (Windows NT 10.0; WOW64; rv:52.0) Gecko/20100101 Thunderbird/52.9.1
MIME-Version: 1.0
In-Reply-To: <0abd7b4d-b0e0-b1bc-2468-678befbc7cac@asgard.org>
Content-Type: text/plain; charset="utf-8"
Content-Language: en-US
Content-Transfer-Encoding: quoted-printable
Archived-At: <https://mailarchive.ietf.org/arch/msg/ipv6/FhlXLsWM8Cq3fdGa-zVVrsIW33w>
X-BeenThere: ipv6@ietf.org
X-Mailman-Version: 2.1.29
Precedence: list
List-Id: "IPv6 Maintenance Working Group \(6man\)" <ipv6.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/ipv6>, <mailto:ipv6-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/ipv6/>
List-Post: <mailto:ipv6@ietf.org>
List-Help: <mailto:ipv6-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/ipv6>, <mailto:ipv6-request@ietf.org?subject=subscribe>
X-List-Received-Date: Fri, 02 Nov 2018 19:20:33 -0000

On 2018-11-02 19:09, Lee Howard wrote:
> 
> On 11/1/18 1:13 AM, Brian E Carpenter wrote:
>> On 2018-10-31 22:24, Nick Hilliard wrote:
>>> Job Snijders wrote on 30/10/2018 22:27:
>>>> Can you (or others running FreeBSD EXPERIMENTAL) share reports on how
>>>> this pans out in practise?
>>> Looking at the code, it acts by blocking outbound ipv4 frames from being
>>> transmitted on ethernet interfaces.  This would mean - for example -
>>> that if there were a default route already configured on the receiving
>>> device, any userland code attempting to use ipv4 services would block
>>> until ARP times out for the default route (default 20 minutes on freebsd).
>>>
>>> The only part of the ipv6only discussion that was uncontroversial was
>>> implementation of the kernel processing side of this flag - there's very
>>> little to go wrong when toggling a single flag.
>>>
>>> The problem area is how to handle the interpretation of this flag in
>>> userland and in the kernel, which is a much more difficult problem.
>> It's a question, but I don't know why it's a problem. It isn't an interop
>> problem, because each host is an independent actor in this. And we now have
>> running code proof that legacy hosts aren't affected. So I'd say that from
>> a protocol spec point of view, it's actually a non-issue.
> 
> Doesn't it mean that user space applications on a host that had/expected 
> IPv4 would fail?

Well yes, but that is presumably the network administrator's intention,
so I'm not sure I'd characterise it as am interop issue exactly, and it's
not an interop issues *involving the RA message itself*. 
 
> I think I described my interop concern: 
> https://mailarchive.ietf.org/arch/browse/ipv6/?qdr=m&so=frm
> 
> IPv4-only hosts, and dual-stack hosts
> that do not recognize the new
>      flag, may continue to attempt IPv4 operations
> 
> If some devices require IPv4 and others disable IPv4, you have lost 
> connectivity between systems on a local network. As written, this is not 
> considered a misconfiguration by the administrator who sets the flag.

Indeed not. The admin will presumably be happy at this result.
I don't think we disagree about the effect, just about whether
it's desirable.

>>> This also disregards the issue of whether the flag was either necessary
>>> or a good idea to start with, and nearly 700 emails into this
>>> discussion, the WG seems to be hopelessly divided on these issues.
>> I'll leave that one to the WG chair who isn't a co-author. But I will
>> say that in my mind the issue is whether the feature is one that will
>> be valuable in 5, 10 or 20 years time rather than whether it's valuable
>> today.
> 
> I've come into the camp that believes that in 10 or 20 years IPv4 will 
> be disabled by default. When people post to stackoverflow complaining 
> that their 10-20 year old devices are unreachable from their brand new 
> devices, the response will be, "The old stuff might be using the old 
> protocol, IPv4. Go into Control Panel, Networking, Protocols, select 
> IPv4, click enable."
> 
> If that's likely, then this flag is only useful in the interim 5 years. 
> During that time, I would like to maximize connectivity.
> 
> If a network administrator wants central control over IPv4/IPv6 
> enablement in hosts, there are better, more centralized tools for that. 
> As a principle, host behavior should be managed by host management 
> tools, and not by hints from a router.

I'm not sure how that can work on a BYOD network. On a fully managed network,
sure, we could "easily" invent a solution.

   Brian