Re: [v6ops] A common problem with SLAAC in "renumbering" scenarios

Christian Huitema <huitema@huitema.net> Fri, 22 February 2019 16:45 UTC

Return-Path: <huitema@huitema.net>
X-Original-To: ipv6@ietfa.amsl.com
Delivered-To: ipv6@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 0EC8A130ED6 for <ipv6@ietfa.amsl.com>; Fri, 22 Feb 2019 08:45:16 -0800 (PST)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -2.602
X-Spam-Level:
X-Spam-Status: No, score=-2.602 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, RCVD_IN_DNSWL_LOW=-0.7, RCVD_IN_MSPIKE_H2=-0.001, SPF_PASS=-0.001] autolearn=unavailable autolearn_force=no
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id jcj43tvDJLaz for <ipv6@ietfa.amsl.com>; Fri, 22 Feb 2019 08:45:14 -0800 (PST)
Received: from mx43-out1.antispamcloud.com (mx43-out1.antispamcloud.com [138.201.61.189]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id B138D129741 for <6man@ietf.org>; Fri, 22 Feb 2019 08:45:14 -0800 (PST)
Received: from xsmtp03.mail2web.com ([168.144.250.223]) by mx43.antispamcloud.com with esmtps (TLSv1:AES256-SHA:256) (Exim 4.89) (envelope-from <huitema@huitema.net>) id 1gxDwj-0008Dv-M0 for 6man@ietf.org; Fri, 22 Feb 2019 17:45:12 +0100
Received: from [10.5.2.49] (helo=xmail11.myhosting.com) by xsmtp03.mail2web.com with esmtps (TLS-1.0:DHE_RSA_AES_256_CBC_SHA1:32) (Exim 4.63) (envelope-from <huitema@huitema.net>) id 1gxDwZ-0001br-OG for 6man@ietf.org; Fri, 22 Feb 2019 11:45:03 -0500
Received: (qmail 13420 invoked from network); 22 Feb 2019 16:44:58 -0000
Received: from unknown (HELO [192.168.1.101]) (Authenticated-user:_huitema@huitema.net@[172.56.42.202]) (envelope-sender <huitema@huitema.net>) by xmail11.myhosting.com (qmail-ldap-1.03) with ESMTPA for <6man@ietf.org>; 22 Feb 2019 16:44:57 -0000
Content-Type: text/plain; charset="us-ascii"
Mime-Version: 1.0 (1.0)
From: Christian Huitema <huitema@huitema.net>
X-Mailer: iPhone Mail (16D57)
In-Reply-To: <67515a73-26a5-3ed0-da88-1a4ce64550d3@foobar.org>
Date: Fri, 22 Feb 2019 08:44:55 -0800
Cc: JORDI PALET MARTINEZ <jordi.palet=40consulintel.es@dmarc.ietf.org>, Tom Herbert <tom@herbertland.com>, Mark Smith <markzzzsmith@gmail.com>, IPv6 Operations <v6ops@ietf.org>, "6man@ietf.org" <6man@ietf.org>
Content-Transfer-Encoding: quoted-printable
Message-Id: <A1B1BECB-3A64-437D-8D63-676B24F2340A@huitema.net>
References: <6D78F4B2-A30D-4562-AC21-E4D3DE019D90@consulintel.es> <B6E2EC33-EEAF-40D0-AFCC-BDAFA9134ACD@consulintel.es> <20190220113603.GK71606@Space.Net> <28fbc2c305c640c9afb3704050f6e8d7@boeing.com> <20190220213107.GS71606@Space.Net> <019c552eb1624d348641d6930829fd1f@boeing.com> <CAKD1Yr0HBG+rhyFWg9zh0t3mW486Mjx9umjn+CRqAZg4z9r0dg@mail.gmail.com> <20190221073530.GT71606@Space.Net> <CAO42Z2wmB2W52b4MZ2h9sW5E9cQKm-HRjyf--q8C26jezS7LXQ@mail.gmail.com> <a73818d31db7422b99a524bc431b00ed@boeing.com> <CAO42Z2z9-48Gbb_Exf+oWUqDO=axSLpZBtqeDcxkAoFq5OziGw@mail.gmail.com> <CALx6S3624hnGauG1HaSWPMvQw0t2Q5R3gb8W4R8w3kuK7dcrWQ@mail.gmail.com> <1F07F2BB-2F37-4D12-9731-7892DF4E3D88@consulintel.es> <0a582916-af14-bd82-a4cd-002a36f8830b@huitema.net> <67515a73-26a5-3ed0-da88-1a4ce64550d3@foobar.org>
To: Nick Hilliard <nick@foobar.org>
Subject: Re: [v6ops] A common problem with SLAAC in "renumbering" scenarios
X-Originating-IP: 168.144.250.223
X-Spampanel-Domain: xsmtpout.mail2web.com
X-Spampanel-Username: 168.144.250.0/24
Authentication-Results: antispamcloud.com; auth=pass smtp.auth=168.144.250.0/24@xsmtpout.mail2web.com
X-Spampanel-Outgoing-Class: unsure
X-Spampanel-Outgoing-Evidence: Combined (0.21)
X-Recommended-Action: accept
X-Filter-ID: EX5BVjFpneJeBchSMxfU5mIcSwB5GPBtxo+7Kmp4PGx602E9L7XzfQH6nu9C/Fh9KJzpNe6xgvOx q3u0UDjvOzJhg/Q5krmBhsXyEr7WU2Js1ujulqUFmMITHM77eiVieKkQKvp37RnhDfeqvW450M7i TvJ2/ZGzVWB9scFAaCdIFaUvXN+CI+RGy3Me16pBedseI+0iffshWIcU02XSgB/TBCf6oYXAWGet lavcAjD9ytQxIHf9lN5jjLJaPK8l4YBmPrqPoeRXD34azf1rYZv5uZUEePrXZkexHL9EC3AAJAfA 9MMVcQ9WVjD1q+Rbd9IPG/DQ2p+GU04sTuYFs91jhnM/Mbva2XLV/LIEzaKyLm0zESXAkIAT8ZKA DvsGI5uh86ZVnyOrYkLMWyEaRt9fxN2oReTDHAyOynaY0CmHJLVH4DfVNbPXJmiLfub/IRFsicyJ MEhQFtD8PLoiniWmsFByBoXAuCZEyg59LM/9rUJrEbVA84BZVscMTXpbpuxXJTL417vaJWq5kk+j cuidX4Ts4xdG+C13IyWeZaJVTCM/kg/vVe0IDRSDEWhkisORcpryIrvqgzC+pmbq4TKc67WlO0OK FB4gtULQUthk354Leo8WHhg9Xcph2esmZk4AVtnYApSiFQp1w3dnUjMTi5Xt/sRoctxyu5EZ7wRl sQ6lNTZIrBtlLeoEHaVN0z6bhalFEM/pjPCQA+BAliU20wPuSTm+IJBmdo0FC1ZZYSpQQtCkh8qZ SV0LCxteywSaTPStVT1Q2+ZFoZOgodnJrqo3cd/wMeWcDlsOy5Ehu1/rdU1t/SWu+yxj6TsAzBpI RKEYj3P5LT70ZY4uKxlHEurUN5OnjeiFCqHX+Ta9UshveVgoiypAicYsWUtd8y9Ga5iCmdJFIvDE Jb+pKY4cvttr0tmBjeIn/Z/emtVQvYq5Gwe6V5p1dZXUJLl9UHdlPJIlgYKUOVb4Kg3Ivfi62j4u w/K+m8SGihSRsuS3byv3CjhKpQiDxiH2EAzS5xSvMev/h5X3p2+rThvFRg==
X-Report-Abuse-To: spam@quarantine9.antispamcloud.com
Archived-At: <https://mailarchive.ietf.org/arch/msg/ipv6/TvzR87M2M4E5ynN1K7f2R1ciX18>
X-BeenThere: ipv6@ietf.org
X-Mailman-Version: 2.1.29
Precedence: list
List-Id: "IPv6 Maintenance Working Group \(6man\)" <ipv6.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/ipv6>, <mailto:ipv6-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/ipv6/>
List-Post: <mailto:ipv6@ietf.org>
List-Help: <mailto:ipv6-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/ipv6>, <mailto:ipv6-request@ietf.org?subject=subscribe>
X-List-Received-Date: Fri, 22 Feb 2019 16:45:16 -0000

 

> On Feb 22, 2019, at 4:36 AM, Nick Hilliard <nick@foobar.org> wrote:
> 
> Christian Huitema wrote on 22/02/2019 07:44:
>> Debating the beauty of NAT on an IPv6 list is surely good fun for some,
>> but could we get some progress on the original issue, which could be
>> summed up as a "bug in SLAAC"? Fernando filed that bug 3 weeks ago, I
>> saw hundreds of messages on the mailing list, but I did not see much
>> progress.
> 
> There seems to be lack of consensus on whether this can be thrown into the "bug in SLAAC" category.
> 
> Ole declared that the root cause was "misconfiguration/error".
> 
> Fernando and others feel that it's the compound outcome of several independent protocol and design-choice behaviours, none of which, incidentally, is inherently broken per se.
> 
>> Do we agree that this is indeed a bug, or do we think that having users
>> disconnected from the Internet after a home router reboots is just a
>> desirable feature of IPv6?
> 
> Most people feel the outcome is undesirable when it happens.  Some people feel that it's not worth getting too excited about because assignment stickiness tends to ensure that prefix assignments are long-lived enough that it probably won't cause too much difficulty. Others noted that long SLAAC lifetimes and lack of application workarounds (HE, etc) would make it a noticeable problem, when it happens, but didn't comment on how frequently it happened.

I think that's a good summary: a problem that does not occur very often, but is very annoying when it does.

> 
>> Do we agree that it would be good if routers that reboot could just
>> reacquire the same prefix from DHCPv6 PD?
> 
> Most operators seem to provision their networks such that they will not commit to prefix stability over the lifetime of a customer contract unless the customer coughs up more money for it.  Hand in hand with this, static ip addressing is routinely handled differently to dynamic IP addressing on service provider networks.
> 
>> Do we also agree that there
>> will always be a significant fraction of deployment in which that won't
>> be possible?
> 
> This is a complex question which interplays with cost, network design and long term network complexity.  There is no easy answer to it.

I think that your response to the previous question also sums up this side of the issue. Many operators do provision fairly stable prefixes. However, for a set of complicated reasons, not all of them will guarantee this stability, not all the time. The answer there could very well be to do nothing, and to not add another mandate to operators.

> 
>> Do we agree that the working group should actually start working on some
>> improvement in SLAAC that would mitigate the issue? Not excluding of
>> course solutions that would also mitigate related egress filtering issue?
> 
> Fixing or updating SLAAC is likely to take years to roll out and at least one person was of the opinion that SLAAC was basically unfixable in this regard.  This ignores whether it would be useful or viable for the IETF to issue advice to CPE vendors and service providers about how to avoid the problem from happening in the first place.

Anything we do in this space can take a long time to roll out, but it does not take forever. In many cases it probably takes less time than it takes to agree on a potential solution in the IETF. For example, security bugs in operating systems can get patched in a matter of weeks or maybe months. Not all devices can be patched quickly, but many can.

As usual, we don't want to see creative solutions popping in different devices. A common standard seems preferable. So, if a subset of the working group wants to work on the solution, we should be happy to let them do that.

-- Christian Huitema