Re: Running code (Was: I-D Action: draft-ietf-6man-ipv6only-flag-03.txt)

Simon Hobson <linux@thehobsons.co.uk> Thu, 25 October 2018 19:47 UTC

Return-Path: <linux@thehobsons.co.uk>
X-Original-To: ipv6@ietfa.amsl.com
Delivered-To: ipv6@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id E1776130F00 for <ipv6@ietfa.amsl.com>; Thu, 25 Oct 2018 12:47:25 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -1.899
X-Spam-Level:
X-Spam-Status: No, score=-1.899 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, URIBL_BLOCKED=0.001] autolearn=ham autolearn_force=no
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id ZJibya991X0z for <ipv6@ietfa.amsl.com>; Thu, 25 Oct 2018 12:47:23 -0700 (PDT)
Received: from patsy.thehobsons.co.uk (patsy.thehobsons.co.uk [80.229.10.150]) (using TLSv1.2 with cipher AECDH-AES256-SHA (256/256 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id B8572130F02 for <ipv6@ietf.org>; Thu, 25 Oct 2018 12:47:22 -0700 (PDT)
X-Quarantine-ID: <9NIzCjKqL1hO>
X-Virus-Scanned: Debian amavisd-new at patsy.thehobsons.co.uk
X-Amavis-Alert: BAD HEADER SECTION, Header line longer than 998 characters: References: <CA[...]
Received: from simons-macbookpro.thehobsons.co.uk (Simons-MacBookPro.thehobsons.co.uk [192.168.137.111]) by patsy.thehobsons.co.uk (Postfix) with ESMTPSA id 3111E1BC37 for <ipv6@ietf.org>; Thu, 25 Oct 2018 19:47:15 +0000 (UTC)
Content-Type: text/plain; charset="utf-8"
Mime-Version: 1.0 (Mac OS X Mail 8.2 \(2104\))
Subject: Re: Running code (Was: I-D Action: draft-ietf-6man-ipv6only-flag-03.txt)
From: Simon Hobson <linux@thehobsons.co.uk>
In-Reply-To: <8C587906-F0EE-4A61-9046-2BFAC52588C0@isc.org>
Date: Thu, 25 Oct 2018 20:47:13 +0100
Content-Transfer-Encoding: quoted-printable
Message-Id: <E8DE18B5-94FC-411C-A310-E49A382E0079@thehobsons.co.uk>
References: <CAFU7BASO_ByzbanhLKnWV280O_fASd-8W+ujpj3sN6d2-whw2w@mail.gmail.com> <CACWOCC-u7aAPwAOcixYvt2On=-o_8X25GhqdXTfA+tWRC1o2XA@mail.gmail.com> <3beca72e-19c5-10af-02e5-c21a90d77100@gmail.com> <20181019.223739.271916573.sthaug@nethelp.no> <4f58643c-272e-507e-3282-c87befd42395@gmail.com> <0927741c-4e8e-fcf7-ddd6-3ba500ba4c3d@si6networks.com> <7B48A11D-31DE-443C-B73A-14642EA0A397@jisc.ac.uk> <7526af75-4359-6fc6-e39b-eb94024a04de@si6networks.com> <E1BB1232-C1A2-496A-8157-0682D91EED42@steffann.nl> <5E75F3CA-F1D2-4F4F-9CF7-EEEE59634C1E@gmail.com> <C46C990E-0A4F-4731-8CB1-FD204858935E@consulintel.es> <9B53019C-3506-4C9E-AFCF-D6125FA1A65B@gmail.com> <1157b739-3a66-8d45-e3e1-e5f904dfb9bc@asgard.org> <a00607f9-7ced-f889-b5cb-c2fe16367d73@si6networks.com> <66759b73-0a22-e1a9-49db-21154e8e1267@gmail.com> <37ba23b3-df19-9c2a-bdbe-ba7a99d72d05@si6networks.com> <0d6008a4-337b-2ccb-2d9f-837f786eca65@gmail.com> <bfa4397a-aa7a-1184-4147-4cbfbfd13603@si6networks.com> <8C587906-F0EE-4A61-9046-2BF AC52588C0@isc.org>
To: 6man WG <ipv6@ietf.org>
X-Mailer: Apple Mail (2.2104)
Archived-At: <https://mailarchive.ietf.org/arch/msg/ipv6/QjplxDOXyD2HDffdKagusZ7HEso>
X-BeenThere: ipv6@ietf.org
X-Mailman-Version: 2.1.29
Precedence: list
List-Id: "IPv6 Maintenance Working Group \(6man\)" <ipv6.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/ipv6>, <mailto:ipv6-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/ipv6/>
List-Post: <mailto:ipv6@ietf.org>
List-Help: <mailto:ipv6-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/ipv6>, <mailto:ipv6-request@ietf.org?subject=subscribe>
X-List-Received-Date: Thu, 25 Oct 2018 19:47:27 -0000

Mark Andrews <marka@isc.org> wrote:

>> I'd expect that, say, you spell out the cases that made you use "SHOULD"
>> rather than "MUST". Put another way: what are the scenarios that you
>> have already envisioned where hosts shouldn't disable the IPv4 stack?
> 
> When you as the administrator of the host know that the administrator of
> router erred.

From the OS vendor PoV, that's not a valid statement. The OS vendor does not know anything about your network - so really this is a case of providing a host specific configuration flag to over-ride something. In that respect, it's no different to manually configuring IPv6 addresses, manually setting routes, etc.

>> Or the network might not use IPv6 itself, but nodes might need IPv4 for
>> "peer to peer" stuff withing the network (whether transferring files,
>> printing documents, etc.). And those services are not provide by "the
>> network", so the networrk admin doesn't have much of a say about them
>> (i.e., he/she might not even know about apps that might require IPv4).
> 
> Then the network is not IPv6-only and you shouldn’t be setting the flag.
> 
> You can do a thousand "what if someone does something stupid”.

Indeed, and if you wanted to cater for all possible such admin errors then you might as well go home because the more you make something foolproof, the more ingenious you find the fools are.



Manfredi (US), Albert E <albert.e.manfredi@boeing.com> wrote:

-----Original Message-----
From: Brian E Carpenter <brian.e.carpenter@gmail.com> 

> So, the network doesn't want to support IPv4. Is it not possible for the devices on the network to use their own updated heuristics? Their own timeout timers, without having to rely on the network admin? This much we already discussed briefly, earlier on. Is it not just as easy to tell device makers that some networks may be dropping IPv4 altogether, and let these device makers do what's right, instead of saying that the network will transit this flag, to achieve that same purpose? Either way, the hosts will need updating. (Some device makers will eventually give IPv6 priority.)


OK, go ahead and state how you think that might work :D
Lets look as some possible clues to look at.

No DHCPv4 service on the network. Well it could be because the network doesn't do IPv4, or it could be that the server is down or unreachable at the moment, or it could be that devices on this network are manually configured, or it could be that this network is using all self-assigned addresses.

So lets look and see if there's already some IPv4 traffic on the network. So we see some mDNS traffic - does that mean we should be using IPv4, or does it mean that the other device got it wrong. So can't use that as a clue since any device transmitting IPv4 traffic would "wake up" IPv4 on all the other hosts - and it's already accepted that there will almost certainly be devices around that won't recognise this flag, and so will continue trying to use IPv4.

I think it's safe to say that any attempt to "figure it out" would be prone to getting it wrong - quite a lot. One thing I can say from <a few years> in IT is that one of the worst things to come across is some bit of software that makes assumptions about how my network runs. Or put another way, I would be really, **really**, **REALLY** p**sed off to find devices randomly turning IPv4 on/off according to what would appear to be about as reliable as reading the tea leaves. Dealing with that problem would be much much more work than dealing with the problems this flag is intended to solve. Like trying to get serious work in done in MS Word without turning off all the "helpful" auto-something features.