Re: “DHCPv6, SLAAC, Static Day X - 17 year interoperability issue” 2nd issue

Ca By <cb.list6@gmail.com> Tue, 10 November 2020 03:15 UTC

Return-Path: <cb.list6@gmail.com>
X-Original-To: ipv6@ietfa.amsl.com
Delivered-To: ipv6@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 45CCE3A15CE; Mon, 9 Nov 2020 19:15:52 -0800 (PST)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -1.847
X-Spam-Level:
X-Spam-Status: No, score=-1.847 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, DKIM_SIGNED=0.1, DKIM_VALID=-0.1, DKIM_VALID_AU=-0.1, DKIM_VALID_EF=-0.1, FREEMAIL_ENVFROM_END_DIGIT=0.25, FREEMAIL_FROM=0.001, HTML_MESSAGE=0.001, SPF_HELO_NONE=0.001, SPF_PASS=-0.001, URIBL_BLOCKED=0.001] autolearn=ham autolearn_force=no
Authentication-Results: ietfa.amsl.com (amavisd-new); dkim=pass (2048-bit key) header.d=gmail.com
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id 655CYiYVDQCQ; Mon, 9 Nov 2020 19:15:49 -0800 (PST)
Received: from mail-il1-x130.google.com (mail-il1-x130.google.com [IPv6:2607:f8b0:4864:20::130]) (using TLSv1.2 with cipher ECDHE-RSA-AES128-GCM-SHA256 (128/128 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id 697CE3A15CC; Mon, 9 Nov 2020 19:15:49 -0800 (PST)
Received: by mail-il1-x130.google.com with SMTP id x20so10403605ilj.8; Mon, 09 Nov 2020 19:15:49 -0800 (PST)
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=gmail.com; s=20161025; h=mime-version:references:in-reply-to:from:date:message-id:subject:to :cc; bh=+uL1O0xisV+k6nRbKWQZztYB2L/X7U/0oBf+decN5+Q=; b=FojU6/ZgeT6u7ytRuFDbKZ+x4wiw6IDY0P1G/VjHeZ22ashxFDgbZtXr8EAB0Mf3jE lvH3EeUQGf4LkOS0akirsYMOhK6DQ6amvLD7sXM8pepuTTfKVl+qbIuKfvdYH++b8mbO lSL8wRl6oJILpqG8AGjXm2dbIjaAhy0IISVU9kfzYJYfSWvMVYqB6rhJnSphe57e6ftu F09CA+yrwsJQpJ10kw/1I0jODnDX5phoAkvc7/4IvlsU2EdKDv1FjgnOcFChK2c2d+BE hAohJ+lbQMJo6SjE7MT6SgFZsOTvLhV64M8kdFujE8vvx4ZxD3PLXmCNA1GUk0zp7PyU ZEqw==
X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20161025; h=x-gm-message-state:mime-version:references:in-reply-to:from:date :message-id:subject:to:cc; bh=+uL1O0xisV+k6nRbKWQZztYB2L/X7U/0oBf+decN5+Q=; b=aBwuK2vmJdoVkNtbuSEH+4O/pcTtiuH17EdwtN4vV0edzyjJvmQCieAXUD4lKV4lIF f0WIgBdk2Vlw/vPgFz1qQvSHVMXnieR1L39kEtrUz1gBQ7GdZREj/yeJJmTJufG7A+XB l89lgRV2wigNxzwqTvM5dmiYj7rpGUYkpTgdBSfZZuULuw2HJKCFwg/zbWxiK8u3oDKj ECwMgGMGz3zBRTndlyiaCeGPyYKFi9z6ODnMCZDs/IABlrfw+dtk9+cdFDSEPknJMcVU EO0cE9o1tyOGs5Di/XtJKrnEbkjKLdz92iNbVsVjIMAGLNN0ByP0Tgr3CSXoOkVKV0JY o/nA==
X-Gm-Message-State: AOAM533v5hNB7Dqvj8HhncMcRYgepitsY+jhHw2PTH18ggRBu6pl0CkJ AgWMpaSAKttgSFM/s3iz06o5abuO96XhXZTPZ4o=
X-Google-Smtp-Source: ABdhPJxwLlmV++z9aCcnz9rrNgJcoVCxfH37nHTAIp1Tx15J649fuMCf76MvM+/k9mGoeu5dSuLmJ5+btf5WKr47x/Q=
X-Received: by 2002:a05:6e02:12ab:: with SMTP id f11mr12302823ilr.89.1604978148324; Mon, 09 Nov 2020 19:15:48 -0800 (PST)
MIME-Version: 1.0
References: <3A94E3B6-EA5A-453A-8CB1-C11BBDF88B53@gmail.com> <CAD6AjGTcy3eo=4P52fOjCKRLDveVMUJcD7Y_u9JzJtpq3RAj0Q@mail.gmail.com> <636E07D5-2554-40A7-9C3B-C699EA29BD52@isc.org>
In-Reply-To: <636E07D5-2554-40A7-9C3B-C699EA29BD52@isc.org>
From: Ca By <cb.list6@gmail.com>
Date: Mon, 09 Nov 2020 19:15:37 -0800
Message-ID: <CAD6AjGSnw+DG+sDb1ddHVudZdHsGWcN+8GgJd2DKrqpBG3WWUg@mail.gmail.com>
Subject: Re: “DHCPv6, SLAAC, Static Day X - 17 year interoperability issue” 2nd issue
To: Mark Andrews <marka@isc.org>
Cc: 6man WG <ipv6@ietf.org>, Alexandre Petrescu <alexandre.petrescu@cea.fr>, Bob Hinden <bob.hinden@gmail.com>, Dmytro Shytyi <dmytro@shytyi.net>, Dusan Mudric <dmudric@avaya.com>, Gyan Mishra <hayabusagsm@gmail.com>, draft-mishra-6man-variable-slaac@ietf.org
Content-Type: multipart/alternative; boundary="000000000000673ca105b3b81800"
Archived-At: <https://mailarchive.ietf.org/arch/msg/ipv6/G_ytykjKs0wNQqyJzJkA51V4W0M>
X-BeenThere: ipv6@ietf.org
X-Mailman-Version: 2.1.29
Precedence: list
List-Id: "IPv6 Maintenance Working Group \(6man\)" <ipv6.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/ipv6>, <mailto:ipv6-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/ipv6/>
List-Post: <mailto:ipv6@ietf.org>
List-Help: <mailto:ipv6-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/ipv6>, <mailto:ipv6-request@ietf.org?subject=subscribe>
X-List-Received-Date: Tue, 10 Nov 2020 03:15:52 -0000

On Mon, Nov 9, 2020 at 6:45 PM Mark Andrews <marka@isc.org> wrote:

>
>
> > On 10 Nov 2020, at 12:53, Ca By <cb.list6@gmail.com> wrote:
> >
> >
> >
> > On Mon, Nov 9, 2020 at 4:36 PM Gyan Mishra <hayabusagsm@gmail.com>
> wrote:
> >
> > This may have gotten lost in all the threads so starting a new thread.
> The issue is interoperability related issue between the 3 IPv6 addressing
> options that had been broken for 17 years.
> >
> > Problem Statement:
> >
> > The main point I am trying to make is that static address configuration
> and DHCPV6 stateful RFC 8415, you can have any prefix length prefix.
>  SLAAC with A flag set requires a  64 bit IID and that stems from RFC 4291
> modified EUI64 mac based IID generation.  However, now with random IID
> generation schemes with RFC 4941 privacy extension and RFC 7217 stable IID
> you can generate any length IID.
> >
> > The operational issue with SLAAC not supporting any prefix length in PIO
> and requirement for the 64 bit boundary is that in a deployment scenario
> where you would like to deploy longer prefix length subnets with a mix of
> server hosts with static address and mix of client hosts with managed
> address M=1 that get their 128 bit address from the DHCPv6 server pool, the
> fear has always been that if a device came up on the subnet that only
> supports SLAAC it would not work due to the SLAAC A flag set and 64 bit IID
> requirement.  In that case the SLAAC host would not be able to communicate
> with any of the devices with a longer prefix including the router.
> >
> > So that fear of interoperability of SLAAC hosts not being able to
> support longer prefix lengths has prevented operators from being able to
> deploy subnets with longer prefix lengths, as it’s hard to predict that all
> hosts will be able to support static or stateful and so you may end up in a
> situation where a device type may only support SLAAC so then you are in
> trouble deploying longer prefix lengths.
> >
> > Due to the SLAAC 64 bit IID restrictions it has prevented operators from
> deploying “host” subnets with >64 bit prefix lengths.
> >
> > f you go to the “root” of the problem the root is the original IPv6
> specification RFC 1884 dated 1995, RFC 2373 dated 1998, RFC 3513 dated 2003
> and now the present RFC 4291 dated 2006.  As soon EUI64 mac based IID
> become not recommendedR and obsolete the standard should have immediately
> updated RFC 4291 as the dependency on fixed IID is no longer as now random
> IID generation schema starting with RFC 4941 privacy extension dated 2007
> soon became standard for all OS vendors and later RFC 7217 stable IID
> became an alternative option to provide a “random” IID.
> >
> > Once random IID became mainstream in all Host Operating Systems it was
> at that moment that the standard should have changed to update RFC 4291 to
> permanently remove in all RFCs any mention of 64 bit boundary.
> >
> > So this change if I do the math is now 13 years past due.  Even if you
> gave a few years for host operating systems to adopt the new standard which
> I believe back then was fairly quickly the standard should have changed
> eliminating the 64 bit boundary.
> >
> > Think of all the problems “Day 17 years” this has caused and even now
> all of these threads.
> >
> > This is clearly an IETF standards issue and needs to be fixed.
> >
> > We can’t pass the blame to operators to dole out shorter prefixes or
> support PD.  The IETF really needs to take onus end fix the broken standard.
> >
> > Not going to happen for PDP as their are technical issue related to the
> Mobile Network Gateway to support PD.   I will try to dig up the exact
> reason but the network element is very different then a BNG broadband
> gateway which supports most all L3 features.
> >
> > As far as 3GPP operators they are following the well documented RIPE-690
> which only requires allocation of /64.  The main reason mobile operators
> are not making shorter prefix a standard is that is overkill from their
> perspective as you may have many mobile
> >
> > No
> >
> > handsets in a household and there  is no reason for everyone at a single
> location to have shorter prefixes per PDP.  When you are at honme you use
> your wired broadband and when are away from home on the road on 3GPP on PDP
> is when the segmentation comes into play to subdivide the /64 prefix to
> downstream devices but in a household is only needed to be provided by one
> of the devices.
> > Bottom line is from a 3GPP provider standpoint it does not make sense to
> provide a shorter prefix and I don’t think that will ever change even with
> 5G PDP.
> >
> > I am 3gpp network operator.  None of the above thinking has entered my
> head.
> >
> > I have never read any ripe docs, so you cant say i am beholden to them.
> >
> > 3gpp operators only provide /64 because that is all that the standards
> allow for without dhcpv6. No other reason, please avoid creating narratives
> to explain what is clearly documented in the standards.
> >
> > https://tools.ietf.org/html/rfc6459#section-5.3
>
> What’s not explained is why operators haven’t deployed DHCPv6 servers.
> One is already allocating /64 per customer just increase the prefix to a
> /48 and use the first /64 for the downstream link.  A stub DHCPv6 server
> can look for the Prefix Delegation and Prefix Exclude Option in the request
> and if present return a delegation to the already allocated /48 carving out
> the downstream /64.  You don’t need much more.
>
> Are people really incapable of working out minimal implementations?  Or
> are they just not bothering to ask their vendors for them?  Its been 8
> years since RFC 6459 was published.
>


I feel like i have answered this question several time in the last 48
hours. Your answer in a word is: inertia. Set aside your pitch fork. I am
explaining the world as i see it

The force required to break the current stasis is more than i have, if i
must use dhcpv6.  Again, many years of proof.

But i believe that i, and other similar mobile operators can get < 64 size
prefix in customers hands and homes with a tweak of the 3gpp spec to allow
RA < 64 and a UE mechanism to break that prefix into many 64s

> Fixed 5G broadband which is a wired broadband replacement will follow
RIPE-690 guidelines and will allocation much shorter prefixes as with
network slicing and other capabilities with 5G offers the requirements
exist for shorter prefixes.  Not so much for PDP.
> r

>
> >
> >
> > I am rolling out 5G broadband using 64share, so your above is not
> correct, at least for me.  Why? No dhcp servers in network.
> >
> > Maybe you can tell us about how vz is deploying ipv6 here ?
> >
> >
> https://www.google.com/amp/s/www.rcrwireless.com/20200612/5g/verizon-expanding-enhancing-5g-fixed-wireless-service/amp
> >
> >
> >
> >
> >
> https://www.ripe.net/publications/docs/ripe-690#4-2-4--considerations-for-cellular-operators
> >
> > 4.2.4. Considerations for Cellular Operators
> >
> > There is a clear exception to the rule described above when assigning
> prefixes in a cellular network. In this case, a /64 will need to be
> provided for each PDP context for cellular phones, whereas for LTE
> modems/routers, i.e. in the case of broadband by means of cellular access,
> it will still be necessary to choose a /48 or /56 in accordance with the
> aforementioned considerations.
> >
> >
> >
> > RFC 3177 for a default /48 allocation which is obsoleted by 6177 which
> takes a step back and is now not making any recommendations and is putting
> the onus on operators to figure it out and do what they feel is best which
> would definitely not be one size fits all approach.
> >
> > Please read the summary section in RFC 6177 below
> >
> > 5.  Summary
> >
> >
> >    The exact choice of how much address space to assign end sites is an
> >    issue for the operational community.  The recommendation in
> > RFC 3177
> >
> >    [
> > RFC3177
> > ] to assign /48s as a default is not a requirement of the
> >    IPv6 architecture; anything of length /64 or shorter works from a
> >    standards perspective.  However, there are important operational
> >    considerations as well, some of which are important if users are to
> >    share in the key benefit of IPv6: expanding the usable address space
> >    of the Internet.  The IETF recommends that any policy on IPv6 address
> >    assignment policy to end sites take into consideration the following:
> >
> >
> > Thanks
> >
> > Gyan
> >
> >
> > Sent from my iPhone
> > --------------------------------------------------------------------
> > IETF IPv6 working group mailing list
> > ipv6@ietf.org
> > Administrative Requests: https://www.ietf.org/mailman/listinfo/ipv6
> > --------------------------------------------------------------------
> > --------------------------------------------------------------------
> > IETF IPv6 working group mailing list
> > ipv6@ietf.org
> > Administrative Requests: https://www.ietf.org/mailman/listinfo/ipv6
> > --------------------------------------------------------------------
>
> --
> Mark Andrews, ISC
> 1 Seymour St., Dundas Valley, NSW 2117, Australia
> PHONE: +61 2 9871 4742              INTERNET: marka@isc.org
>
>