Re: I-D Action: draft-ietf-6man-ipv6only-flag-03.txt

Ole Troan <otroan@employees.org> Mon, 22 October 2018 07:07 UTC

Return-Path: <otroan@employees.org>
X-Original-To: ipv6@ietfa.amsl.com
Delivered-To: ipv6@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id D6E52130E5D for <ipv6@ietfa.amsl.com>; Mon, 22 Oct 2018 00:07:16 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -1.901
X-Spam-Level:
X-Spam-Status: No, score=-1.901 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, RCVD_IN_DNSWL_NONE=-0.0001, SPF_PASS=-0.001] autolearn=ham autolearn_force=no
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id QYFbWDDdeDJs for <ipv6@ietfa.amsl.com>; Mon, 22 Oct 2018 00:07:14 -0700 (PDT)
Received: from bugle.employees.org (accordion.employees.org [198.137.202.74]) (using TLSv1.2 with cipher AECDH-AES256-SHA (256/256 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id 4FCCC130E91 for <ipv6@ietf.org>; Mon, 22 Oct 2018 00:07:13 -0700 (PDT)
Received: from astfgl.hanazo.no (219.103.92.62.static.cust.telenor.com [62.92.103.219]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by bugle.employees.org (Postfix) with ESMTPSA id 4BD15FECC106; Mon, 22 Oct 2018 07:07:12 +0000 (UTC)
Received: from [IPv6:::1] (localhost [IPv6:::1]) by astfgl.hanazo.no (Postfix) with ESMTP id 5E39E849F9C; Mon, 22 Oct 2018 09:07:09 +0200 (CEST)
Content-Type: text/plain; charset="utf-8"
Mime-Version: 1.0 (Mac OS X Mail 12.0 \(3445.100.39\))
Subject: Re: I-D Action: draft-ietf-6man-ipv6only-flag-03.txt
From: Ole Troan <otroan@employees.org>
In-Reply-To: <61706f85-cf3a-1a03-0371-30fe3eaaec6f@foobar.org>
Date: Mon, 22 Oct 2018 09:07:09 +0200
Cc: 6man WG <ipv6@ietf.org>
Content-Transfer-Encoding: quoted-printable
Message-Id: <FC01E137-2D9F-4240-BAA7-EE563214B705@employees.org>
References: <153973137181.9473.10666616544238076833@ietfa.amsl.com> <092346e1-6350-e54e-e711-9c5ee6dc4e6b@gmail.com> <4a883ed6-c0d7-5d3f-9657-3ba0476919e0@foobar.org> <6952EE88-B3D6-48BC-ACFF-C5248965EDC9@employees.org> <61706f85-cf3a-1a03-0371-30fe3eaaec6f@foobar.org>
To: Nick Hilliard <nick@foobar.org>
X-Mailer: Apple Mail (2.3445.100.39)
Archived-At: <https://mailarchive.ietf.org/arch/msg/ipv6/TMY05p6iQK91-vvPWJzZp5UGW20>
X-BeenThere: ipv6@ietf.org
X-Mailman-Version: 2.1.29
Precedence: list
List-Id: "IPv6 Maintenance Working Group \(6man\)" <ipv6.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/ipv6>, <mailto:ipv6-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/ipv6/>
List-Post: <mailto:ipv6@ietf.org>
List-Help: <mailto:ipv6-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/ipv6>, <mailto:ipv6-request@ietf.org?subject=subscribe>
X-List-Received-Date: Mon, 22 Oct 2018 07:07:17 -0000

Hi Nick,

[deleting all text apart from the technical point]

> Here's an example.  Drafts -00 to -02 contained the following:
> 
>>   o  In particular, this may overload switches in multi-segment
>>      wireless networks because it will create IPv4 state for every dual
>>      stack host.
> 
> I posted an analysis on Sep 8 (https://mailarchive.ietf.org/arch/msg/ipv6/Yoy1Bo8A6WiRryqogTfr_R7FH9I) which went into some nuances about how switches work in the context of forwarding ipv4 frames, but the summary was:
> 
> "...layer 2 switches do not carry ipv4 state in any meaningful sense. It is technically misleading, bordering on flat-out incorrect, to suggest otherwise."
> 
> The draft was then updated from:
> 
> > this may overload switches [...] because it will create IPv4 state
> 
> to:
> 
> > this may overload switches [...] if the switches create IPv4 state
> 
> I'm at a loss as to how to respond to this other than to say that switches don't create ipv4 state and that it is disturbing to have to explicitly state something so fundamental in an IETF working group, particularly in the context of statements like: "the authors think that all your points are in fact dealt with in the text”.


Firstly, this seems to be background information, provided in the draft to justify the solution.
I say this to distinguish the point from the real technical issues with the protocol mechanism itself.

To your point. You are right of course. Maybe the authors have conflated bridges and routers? And that they are really talking about a router (aka L3 switch) that has limited TCAM space for forwarding state? Regardless I think this is a weak point, given that IPv6 in those terms use far more state. Easily an order of magnitude.

If no-one else in the working group feels strongly for this point, I would suggest we simply remove that bullet.
Or make a very vague statement about "disabling IPv4 completely on a link, ensures that no IPv4 state is required in the network or in hosts."

Best regards,
Ole