Re: I-D Action: draft-ietf-6man-ipv6only-flag-03.txt

Ola Thoresen <ola@nlogic.no> Sat, 20 October 2018 17:35 UTC

Return-Path: <ola@nlogic.no>
X-Original-To: ipv6@ietfa.amsl.com
Delivered-To: ipv6@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id DEBB9130E7B for <ipv6@ietfa.amsl.com>; Sat, 20 Oct 2018 10:35:21 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -1.12
X-Spam-Level:
X-Spam-Status: No, score=-1.12 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, HTML_MESSAGE=0.001, SPF_NEUTRAL=0.779] autolearn=no autolearn_force=no
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id 2HfnjguiD1Ih for <ipv6@ietfa.amsl.com>; Sat, 20 Oct 2018 10:35:20 -0700 (PDT)
Received: from mail.nytt.no (poseidon.nytt.no [178.62.243.165]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id BE966130E7C for <ipv6@ietf.org>; Sat, 20 Oct 2018 10:35:19 -0700 (PDT)
Received: from dhcp-94.olen.net (host-77-234-50-66.lynet.no [77.234.50.66]) (authenticated bits=0) by mail.nytt.no (8.15.2/8.15.2) with ESMTPSA id w9KHYFAK027422 (version=TLSv1.2 cipher=ECDHE-RSA-AES128-GCM-SHA256 bits=128 verify=NO) for <ipv6@ietf.org>; Sat, 20 Oct 2018 19:34:16 +0200
Subject: Re: I-D Action: draft-ietf-6man-ipv6only-flag-03.txt
To: ipv6@ietf.org
References: <CAFU7BASO_ByzbanhLKnWV280O_fASd-8W+ujpj3sN6d2-whw2w@mail.gmail.com> <CACWOCC-u7aAPwAOcixYvt2On=-o_8X25GhqdXTfA+tWRC1o2XA@mail.gmail.com> <3beca72e-19c5-10af-02e5-c21a90d77100@gmail.com> <20181019.223739.271916573.sthaug@nethelp.no> <CAO42Z2z3zMcQSG2QpEhKByRr73BnEFC7xwayHe7p86TQpUvQYg@mail.gmail.com> <82E7C4FD-AD73-4697-9FC6-F61FBCB50375@employees.org>
From: Ola Thoresen <ola@nlogic.no>
Message-ID: <38c6f05a-349a-2124-0052-aed032e450eb@nlogic.no>
Date: Sat, 20 Oct 2018 19:34:15 +0200
User-Agent: Mozilla/5.0 (X11; Linux x86_64; rv:60.0) Gecko/20100101 Thunderbird/60.0
MIME-Version: 1.0
In-Reply-To: <82E7C4FD-AD73-4697-9FC6-F61FBCB50375@employees.org>
Content-Type: multipart/alternative; boundary="------------3A936A1A65D8186307F2007B"
Content-Language: en-US
Archived-At: <https://mailarchive.ietf.org/arch/msg/ipv6/LUkuXCQXlqfPXL2PQ8t0Nh0HzFo>
X-BeenThere: ipv6@ietf.org
X-Mailman-Version: 2.1.29
Precedence: list
List-Id: "IPv6 Maintenance Working Group \(6man\)" <ipv6.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/ipv6>, <mailto:ipv6-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/ipv6/>
List-Post: <mailto:ipv6@ietf.org>
List-Help: <mailto:ipv6-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/ipv6>, <mailto:ipv6-request@ietf.org?subject=subscribe>
X-List-Received-Date: Sat, 20 Oct 2018 17:35:22 -0000

On 20/10/2018 00:12, Ole Troan wrote:

>>
>>     Whatever happened to "We believe in rough consensus and running
>>     code"?
>>
>>
>> It isn't "We require ..."
>
> It isn’t. But it’s quite a big span between “it’s a hint” and “though 
> shall disable ipv4 unless you have bloody good reason not to”.
>
> In my view, I don’t see much purpose in the bit unless it’s 
> prescriptive. As in the last category.
>

On this, we can agree. Having a flag as a "hint" does not make much 
sense.  You can't trust it, so you would STILL need to verify if the 
flag is actually telling the truth, or if it is just set - either 
malicious, or by mistake.

On the other hand, I do not see how this can be a hard requirement.  Or 
at least I can not see operating systems actually obyeing such a flag.  
IF the client administrator has configured IPv4 dhcp client settings, 
why should the OS trust a flag in an RA-packet more than the OS-admins 
configuration?

Just look at the already defined flags "O" and "M" - which are not even 
breaking the barrier between the IP-protocols.  I know at least a couple 
of implementations which will send a DHCPv6-request no matter what the 
RA is signaling in its M and O-flags.  And I know implementations that 
will not automatically send dhcp-requests no matter what flags are set 
in the RA-packets.

We don't need even more flags that might or might not be ignored by the 
operating systems.  And which have a somewhat vague definition.

We don't have a flag to tell the OS to not run DECnet, Appletalk or 
IPX.  We simply disable these on the clients.  And even if we had such a 
flag in DHCPv4 or RA, I - as an admin - would prefer the clients to not 
rely on such a flag, but try to get some kind of network access on any 
enabled network protocol in the client.


Rgds.

Ola (T)