Re: Adoption Call for "Improving the Robustness of Stateless Address Autoconfiguration (SLAAC) to Flash Renumbering Events"

Fernando Gont <fgont@si6networks.com> Tue, 30 June 2020 18:00 UTC

Return-Path: <fgont@si6networks.com>
X-Original-To: ipv6@ietfa.amsl.com
Delivered-To: ipv6@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 67B0F3A0840 for <ipv6@ietfa.amsl.com>; Tue, 30 Jun 2020 11:00:16 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -1.897
X-Spam-Level:
X-Spam-Status: No, score=-1.897 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, SPF_HELO_NONE=0.001, SPF_NONE=0.001, URIBL_BLOCKED=0.001] autolearn=unavailable autolearn_force=no
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id 36a68q66LjpI for <ipv6@ietfa.amsl.com>; Tue, 30 Jun 2020 11:00:14 -0700 (PDT)
Received: from fgont.go6lab.si (fgont.go6lab.si [91.239.96.14]) (using TLSv1.2 with cipher ADH-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id 6EB923A0CCD for <ipv6@ietf.org>; Tue, 30 Jun 2020 11:00:00 -0700 (PDT)
Received: from [192.168.4.130] (unknown [186.19.8.47]) (using TLSv1.2 with cipher ECDHE-RSA-AES128-GCM-SHA256 (128/128 bits)) (No client certificate requested) by fgont.go6lab.si (Postfix) with ESMTPSA id B3A71283940; Tue, 30 Jun 2020 17:59:56 +0000 (UTC)
Subject: Re: Adoption Call for "Improving the Robustness of Stateless Address Autoconfiguration (SLAAC) to Flash Renumbering Events"
To: Erik Kline <ek.ietf@gmail.com>, Tim Chown <tjc.ietf@gmail.com>
Cc: Bob Hinden <bob.hinden@gmail.com>, Lorenzo Colitti <lorenzo=40google.com@dmarc.ietf.org>, Fernando Gont <fernando@gont.com.ar>, IPv6 List <ipv6@ietf.org>
References: <CC295D49-5981-41C3-B4DB-E064D66616CE@gmail.com> <adddbd07-2262-b585-68a1-00fc28207a84@gmail.com> <CABNhwV0MFe-d6-DL2SuhuyPSq7Mn0-TS=poDn9ynAqn1ZWXOKA@mail.gmail.com> <CAKD1Yr3zEcZ5=1ttDbZGDtN86qy+wRbFXmOHXqngqu6NuYYJ5g@mail.gmail.com> <2759b55c-871f-dc41-c180-47c1ebd1135d@gont.com.ar> <CAKD1Yr2Uv=2PaoJschS_a6KSE_V8CgL=WkUxnUnBFqQ9Rkoe4Q@mail.gmail.com> <201C51F9-B196-4EE1-82BE-2312FD70E217@gmail.com> <CAMGpriXfDn_zyKAaiDSE1OAhB_yqR_22U_UxfJQ7k+3PU=apTg@mail.gmail.com>
From: Fernando Gont <fgont@si6networks.com>
Message-ID: <a885c5e4-dab4-ac44-bf08-0e7361b41629@si6networks.com>
Date: Tue, 30 Jun 2020 14:59:50 -0300
User-Agent: Mozilla/5.0 (X11; Linux x86_64; rv:60.0) Gecko/20100101 Thunderbird/60.9.1
MIME-Version: 1.0
In-Reply-To: <CAMGpriXfDn_zyKAaiDSE1OAhB_yqR_22U_UxfJQ7k+3PU=apTg@mail.gmail.com>
Content-Type: text/plain; charset="utf-8"; format="flowed"
Content-Language: en-US
Content-Transfer-Encoding: 8bit
Archived-At: <https://mailarchive.ietf.org/arch/msg/ipv6/VCKA5xvpN45CufgYMGgNrJgV_ZY>
X-BeenThere: ipv6@ietf.org
X-Mailman-Version: 2.1.29
Precedence: list
List-Id: "IPv6 Maintenance Working Group \(6man\)" <ipv6.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/ipv6>, <mailto:ipv6-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/ipv6/>
List-Post: <mailto:ipv6@ietf.org>
List-Help: <mailto:ipv6-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/ipv6>, <mailto:ipv6-request@ietf.org?subject=subscribe>
X-List-Received-Date: Tue, 30 Jun 2020 18:00:16 -0000

On 30/6/20 01:16, Erik Kline wrote:
> On Mon, Jun 29, 2020 at 1:50 AM Tim Chown <tjc.ietf@gmail.com> wrote:
>>
>> On 29 Jun 2020, at 08:49, Lorenzo Colitti <lorenzo=40google.com@dmarc.ietf.org> wrote:
>>>
>>> <snip>
>>>
>>> Yup. Like I said, most of the document consists of simple tweaks that in many cases are already allowed by existing standards. That definitely seems publishable.
>>
>> I don’t think adoption means we would include everything in the document in the final version that is published.  If “most of the document” contains advice you think is publishable, then should we not adopt and work on consensus on what is in the final version?
>>
>> I do agree that data on evidence of the problem would be welcomed.  The user experience may be protected by other mechanisms such as happy eyeballs.
>>
>>> Another much simpler approach that could be taken to solve this problem is to recommend that if a host receives an RA where previous prefix(es) - or more in general, previous options - have disappeared, then it should attempt to re-check that information's validity in some way (e.g., by attempting off-link connectivity).
>>
>> That would seem to be one good bit of advice to include.
> 
> <no hats>
> 
> I'll repeat my previous recommendation that a host can unicast an NS
> from any of its GUAs in a suspected lost PIO for the router's
> link-local address to the link-local address of the router.  Treat it
> like NUD -- RRUD, return routing unreachability detection.

That's indeed possible. In fact, we did consider this, but were so far 
relying on subsequent unsolicited RAs (for actually invalidating an 
address).

One can certainly augment the current algorithm, and recommend that 
e.g., such an NS is sent at the very same time a missing option is 
detected, and one might even also recommend that another one be sent 
upon LTA_INVALID/2 seconds (i.e., before an address is actually eliminated).




> And an alternative to timer manipulation might be 6724 policy table
> manipulation (e.g. something like add an entry for the PIO with
> precedence "precedenceOf(::/0) - 1" and/or a new label, given the
> table in 6724#2.1)?  I have not spent enough time thinking through the
> implications of this, though.

I'd need to give this more proper thought, but, of the top of my head:

* In the context of RFC8028, you need still need to dis-associate the 
prefix with the router that has ceased to advertise it. i.e., if you 
have multiple routers advertising the prefix, if one of them ceases to 
advertise it you don't need to stop using it for new connections, but 
just e.g. stop sending such packets to the router that has ceased to 
advertise the prefix (send them to any other router that has advertised it).

* I believe that the "preferred/unpreferred" status already provide what 
we need. The underlying issue is that, in practice, the 
"preferred/unpreferred" status is meaningless, because it's associated 
with timers that are set to such long values that they will never go off 
in any meaningful timeframe.

Thanks,
-- 
Fernando Gont
SI6 Networks
e-mail: fgont@si6networks.com
PGP Fingerprint: 6666 31C6 D484 63B2 8FB1 E3C4 AE25 0D55 1D4E 7492