Re: RFC4941bis: consequences of many addresses for the network

Alexandre Petrescu <alexandre.petrescu@gmail.com> Thu, 23 January 2020 14:06 UTC

Return-Path: <alexandre.petrescu@gmail.com>
X-Original-To: ipv6@ietfa.amsl.com
Delivered-To: ipv6@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id CB70F1200CE for <ipv6@ietfa.amsl.com>; Thu, 23 Jan 2020 06:06:11 -0800 (PST)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -2.631
X-Spam-Level:
X-Spam-Status: No, score=-2.631 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, DKIM_ADSP_CUSTOM_MED=0.001, FREEMAIL_FROM=0.001, NML_ADSP_CUSTOM_MED=0.9, RCVD_IN_DNSWL_MED=-2.3, SPF_HELO_NONE=0.001, SPF_SOFTFAIL=0.665, URIBL_BLOCKED=0.001] autolearn=ham autolearn_force=no
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id 95bUO0AX4uRL for <ipv6@ietfa.amsl.com>; Thu, 23 Jan 2020 06:06:09 -0800 (PST)
Received: from cirse-smtp-out.extra.cea.fr (cirse-smtp-out.extra.cea.fr [132.167.192.148]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id 896F6120025 for <ipv6@ietf.org>; Thu, 23 Jan 2020 06:06:09 -0800 (PST)
Received: from pisaure.intra.cea.fr (pisaure.intra.cea.fr [132.166.88.21]) by cirse-sys.extra.cea.fr (8.14.7/8.14.7/CEAnet-Internet-out-4.0) with ESMTP id 00NE67RF008927 for <ipv6@ietf.org>; Thu, 23 Jan 2020 15:06:07 +0100
Received: from pisaure.intra.cea.fr (localhost [127.0.0.1]) by localhost (Postfix) with SMTP id C74AE2051EC for <ipv6@ietf.org>; Thu, 23 Jan 2020 15:06:07 +0100 (CET)
Received: from muguet1-smtp-out.intra.cea.fr (muguet1-smtp-out.intra.cea.fr [132.166.192.12]) by pisaure.intra.cea.fr (Postfix) with ESMTP id BCF1C204CB3 for <ipv6@ietf.org>; Thu, 23 Jan 2020 15:06:07 +0100 (CET)
Received: from [10.8.35.150] (is154594.intra.cea.fr [10.8.35.150]) by muguet1-sys.intra.cea.fr (8.14.7/8.14.7/CEAnet-Internet-out-4.0) with ESMTP id 00NE67Xu001398 for <ipv6@ietf.org>; Thu, 23 Jan 2020 15:06:07 +0100
Subject: Re: RFC4941bis: consequences of many addresses for the network
To: ipv6@ietf.org
References: <03C832CE-7282-4320-BF1B-4CB7167FE6BE@employees.org> <MN2PR11MB3565330989D411525D30B90DD80F0@MN2PR11MB3565.namprd11.prod.outlook.com> <80207E17-AE8E-4D19-B516-D2E6AB70721E@employees.org> <8D5610EA-49D3-483E-BB7A-67D67BC89346@jisc.ac.uk>
From: Alexandre Petrescu <alexandre.petrescu@gmail.com>
Message-ID: <0f468ea1-55a8-6526-ab17-931ac7f13f14@gmail.com>
Date: Thu, 23 Jan 2020 15:06:07 +0100
User-Agent: Mozilla/5.0 (Windows NT 10.0; WOW64; rv:68.0) Gecko/20100101 Thunderbird/68.4.1
MIME-Version: 1.0
In-Reply-To: <8D5610EA-49D3-483E-BB7A-67D67BC89346@jisc.ac.uk>
Content-Type: text/plain; charset="utf-8"; format="flowed"
Content-Language: fr
Content-Transfer-Encoding: 8bit
Archived-At: <https://mailarchive.ietf.org/arch/msg/ipv6/PAUcyOXJKkmdzrDuKN_rPZR79yQ>
X-BeenThere: ipv6@ietf.org
X-Mailman-Version: 2.1.29
Precedence: list
List-Id: "IPv6 Maintenance Working Group \(6man\)" <ipv6.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/ipv6>, <mailto:ipv6-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/ipv6/>
List-Post: <mailto:ipv6@ietf.org>
List-Help: <mailto:ipv6-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/ipv6>, <mailto:ipv6-request@ietf.org?subject=subscribe>
X-List-Received-Date: Thu, 23 Jan 2020 14:06:12 -0000



Le 23/01/2020 à 14:32, Tim Chown a écrit :
>> On 23 Jan 2020, at 12:16, otroan@employees.org wrote:
>> 
>> Pascal,
>> 
>> All good points! Before this diverge too far though, can we try to
>> focus on RFC4941bis text. Is there anything that document can say
>> or should say to alleviate some of these issues? Does temporary
>> addresses add to the more general problem that SLAAC has?
> 
> The problem statement section in 4941bis is all about user privacy,
> no mention of operational / management complexity, or other “general
> problems” that SLAAC has.  It seems there are unstated problems here
> :)

Within "general [SLAAC] problems" I also think about "Permission-less 
extensions of the network with new links (and by implications new 
routers) are not supported."

Last December, we heard half-joking topics.  A further half of that half
might be related to SLAAC:

>>   - 64 bit boundary
>>   - M/O bits
>>   - ULA or not ULA
>>   - Extension headers
>>   - Defining new mechanisms for IID formats

Alex
> 
> Tim
> 
>> 
>> Cheers, Ole
>> 
>> 
>>> On 23 Jan 2020, at 11:26, Pascal Thubert (pthubert)
>>> <pthubert@cisco.com> wrote:
>>> 
>>> Hello Ole
>>> 
>>> There are a number of cases where the address creates a state in
>>> the network: - in case there's routing taking place within the
>>> subnet (e.g., RPL in the an IOT LLN and RIFT or eVPN in a data
>>> center) - in case the network protects the address ownership
>>> since ND doesn't (SEND being what it is) and does minimal SAVI -
>>> in case the network tries to implement ND proxy which is mandated
>>> by IEEE std 802.11 - in case Jen's draft is used to proactively
>>> assign ND state in the routers
>>> 
>>> In order to protect itself, the network blocks excessive amounts
>>> of addresses for a same device. It would serve this list to
>>> recognize it as a fact of life.
>>> 
>>> Sadly it is very hard with IPv6 ND alone to decide which
>>> address(es) to keep and which to remove. For the temporary
>>> addresses, LRU seems to work most of the time, with  a reasonable
>>> count of like 8 as suggested below. But some nodes like printers
>>> (silently) keep a permanent addresses that should survive the
>>> churn of other temporary addresses.
>>> 
>>> To serve the hosts correctly, the network is missing a classical
>>> but so useful information of lifetime that allows the state
>>> associated to the address to age out if not renewed. It is also
>>> classical in many IPv6-based standards (e.g., MIPv6, NEMO and
>>> RPL) that the nodes have  a chance to release a binding by
>>> indicating a lifetime of zero. The shortest path to get that is
>>> generalizing RFC 8505 to all MAC layers. *Is there any reason we
>>> do not?*
>>> 
>>> Conversely the network cannot signal how many addresses per node
>>> will be served properly in parallel. It cannot recommend lifetime
>>> values for temporary addresses and quasi-permanent addresses. It
>>> cannot signal that it rebooted and that all state need to be
>>> rebuilt. We need new RA information for that. I can write the
>>> draft within a few days if the group is willing to progress the
>>> work.
>>> 
>>> All the best,
>>> 
>>> Pascal
>>> 
>>>> -----Original Message----- From: ipv6 <ipv6-bounces@ietf.org>
>>>> On Behalf Of otroan@employees.org Sent: jeudi 23 janvier 2020
>>>> 09:59 To: 6man WG <ipv6@ietf.org> Subject: RFC4941bis:
>>>> consequences of many addresses for the network
>>>> 
>>>> While reviewing RFC4941bis
>>>> (https://tools.ietf.org/html/draft-ietf-6man- rfc4941bis) I
>>>> think I found one gap.
>>>> 
>>>> A discussion of the consequences of a host having many (active)
>>>> addresses on the network.
>>>> 
>>>> A 4941bis implementation following the defaults, would at the
>>>> maximum use 8 active addresses. (Valid lifetime of one week and
>>>> one new address per day.)
>>>> 
>>>> Shorter regeneration intervals or other approaches like a new
>>>> address per connection could lead to dramatic numbers.
>>>> 
>>>> If we use Ethernet as an example, each new address requires
>>>> state in the network. In the ND cache in first-hop routers, and
>>>> in SAVI binding tables in bridges. Given ND's security
>>>> properties these tables must be policed by the network. A host
>>>> with a very liberal address regeneration policy might be viewed
>>>> as performing an attack.
>>>> 
>>>> There is no signal available in SLAAC apart from DAD to reject
>>>> an address. If the network runs out of resources (or prohibits
>>>> the additional address by policy) the address will not be
>>>> served. The host has to be deal with that situation.
>>>> 
>>>> SLAAC is also missing a mechanism to release an address. Which
>>>> leads me to think that the address regeneration interval must
>>>> not be shorter than the ND cache scavenger timeout (which in
>>>> many networks is high to avoid cache churn and high level of
>>>> address re-resolutions).
>>>> 
>>>> I would like to hear from other network-side implementors and
>>>> operators. Is there an issue here?
>>>> 
>>>> Best regards, Ole
>>>> 
>>>> --------------------------------------------------------------------
>>>>
>>>> 
IETF IPv6 working group mailing list
>>>> ipv6@ietf.org Administrative Requests:
>>>> https://www.ietf.org/mailman/listinfo/ipv6 
>>>> --------------------------------------------------------------------
>>
>>
>>>> 
--------------------------------------------------------------------
>> IETF IPv6 working group mailing list ipv6@ietf.org Administrative
>> Requests: https://www.ietf.org/mailman/listinfo/ipv6 
>> --------------------------------------------------------------------
>>
>
>> 
> -------------------------------------------------------------------- 
> IETF IPv6 working group mailing list ipv6@ietf.org Administrative
> Requests: https://www.ietf.org/mailman/listinfo/ipv6 
> --------------------------------------------------------------------
>