[IPv6] Thoughts on draft-thubert-6man-ipv6-over-wireless-15

"Joe Clarke (jclarke)" <jclarke@cisco.com> Wed, 02 August 2023 18:10 UTC

Return-Path: <jclarke@cisco.com>
X-Original-To: ipv6@ietfa.amsl.com
Delivered-To: ipv6@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 3F671C15152D for <ipv6@ietfa.amsl.com>; Wed, 2 Aug 2023 11:10:00 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -11.904
X-Spam-Level:
X-Spam-Status: No, score=-11.904 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, DKIMWL_WL_HIGH=-0.001, DKIMWL_WL_MED=-0.001, DKIM_SIGNED=0.1, DKIM_VALID=-0.1, DKIM_VALID_AU=-0.1, DKIM_VALID_EF=-0.1, HTML_MESSAGE=0.001, RCVD_IN_DNSWL_MED=-2.3, RCVD_IN_MSPIKE_H5=0.001, RCVD_IN_MSPIKE_WL=0.001, RCVD_IN_ZEN_BLOCKED_OPENDNS=0.001, SPF_NONE=0.001, T_SCC_BODY_TEXT_LINE=-0.01, URIBL_BLOCKED=0.001, URIBL_DBL_BLOCKED_OPENDNS=0.001, URIBL_ZEN_BLOCKED_OPENDNS=0.001, USER_IN_DEF_DKIM_WL=-7.5] autolearn=ham autolearn_force=no
Authentication-Results: ietfa.amsl.com (amavisd-new); dkim=pass (1024-bit key) header.d=cisco.com header.b="K9hNPxxC"; dkim=pass (1024-bit key) header.d=cisco.com header.b="mKjW22iT"
Received: from mail.ietf.org ([50.223.129.194]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id ZHz4qNjr4UpN for <ipv6@ietfa.amsl.com>; Wed, 2 Aug 2023 11:09:56 -0700 (PDT)
Received: from alln-iport-5.cisco.com (alln-iport-5.cisco.com [173.37.142.92]) (using TLSv1.2 with cipher DHE-RSA-SEED-SHA (128/128 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id 32F1AC151099 for <6man@ietf.org>; Wed, 2 Aug 2023 11:09:56 -0700 (PDT)
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/simple; d=cisco.com; i=@cisco.com; l=5896; q=dns/txt; s=iport; t=1690999796; x=1692209396; h=from:to:subject:date:message-id:mime-version; bh=9G1HZPnyoAIsGjv7hSwp6gFY2D0B9njsxo2yY/8PLDc=; b=K9hNPxxCp8RLcRRRHDbt3m1Uj+ZUjzowjBC32aJ6PSgbxchNEFQ2cLtu xwBi91i3w5mY5XtuNuf4ycHrCilm9w9vNLLmX9GMOFtxPfCvcYgL3l0m5 bDDcGN0sffu3OF9HfaUW2h5WpOcOTA4PM0qiH8SAVlzCZ4q1CnNqOKcWX s=;
X-IPAS-Result: A0BQAgDsmspkmIsNJK1agQklgSqBMDFScwJZKhJHiB0DhS2GPIIjgRaWFYZPgSUDVg8BAQENAQFEBAEBhQYChkcCJTQJDgECAgIBAQEBAwIDAQEBAQEBAwEBBQEBAQIBBwQUAQEBAQEBAQEeGQUOECeFaAEMhh0uAQEmBQ0RAYEAJwQbGoJcAYIVRwMBoV4BgUACiiZ4gTSBAYIJAQEGBAWybAmBQoRWgysBgUmDeIQ3JxuBSUSBFUOCMINYAoFihBKCLol1hUwHjFgrgQgIXoFvPQINVAsLZYEXgkgCAhE6E0pzHQMHA4EFEC8HBDIiBgkYLyUGUQctJAkTFUAEg04KgQY/FQ4Rgk4iAgc2OBtLgmoJFQY6UHgQLgQUGIEMCHYfGh49ERIZDQUIfx0CESc/AwUDBDcKFQ0LHwNEHUADC3A9NRQbBQSBQwWcXguCUmtuZw5jDA8lFSo5knUWjkCjHQqECwWhMxeEAZNZkR9imCggp3cCBAIEBQIOAQEGgWM6gVtwFYMiUhkPjiwNCYNSj3l2OwIHCwEBAwmLSAEB
IronPort-PHdr: A9a23:loHuYRRtHylNvLL3qKUoi54EGtpso3DLVj580XJvo7tKdqLm+IztI wmGo/5sl1TOG47c7qEMh+nXtvX4UHcbqdaasX8EeYBRTRJNl8gMngIhDcLEQU32JfLndWo7S exJVURu+DewNk0GUN3maQjqq2appSUXBg25MAN0IurvHYuHjc+z3vqx9rXYYh5Dg3y2ZrYhZ BmzpB/a49EfmpAqar5k0wbAuHJOZ+VQyCtkJEnGmRH664b48Mto8j9bvLQq8MsobA==
IronPort-Data: A9a23:ZxXayapg5ZBZBQAs1I//bnrTPI1eBmJkZRIvgKrLsJaIsI4StFCzt garIBnSO66DMWb8e4xxYY2xphtSuZDSy9FkHFA6+3g8FS9H9+PIVI+TRqvS04x+DSFioGZPt Zh2hgzodZhsJpPkjk7xdOCn9xGQ7InQLlbGILas1htZG0k8EU/NtTo5w7Ri2t4w24Dga++wk YqaT/P3aQfNNwFcagr424rbwP+4lK2v0N+wlgVWicFj5DcypVFMZH4sDf3Zw0/Df2VhNrXSq 9AvY12O1jixEx8FUrtJm1tgG6EAaua60QOm0hK6V0U+6/RPjnRa70o1CBYTQUILlSuJo+oh9 OcX6Ky5EiMSB53llPtIBnG0EwkmVUFH0LbDJX76usuJwgiYNXDt2P5pSkoxOOX0+M4uXjoIr qJecWtLN0vS7w616OrTpu1EhM8nJdPoMasUu2prynfSCvNOrZXrGv6UvYQJgWxo7ixINfOFQ ulIS31WVTXBe0BCYUwwVpE6pPj90xETdBUB+A7K+sLb+VP7kgl41pDsPcbbPNuQSq1ocl2wr 2bC+SHyBQsXcYLZwjue+XXqjejK9c/mZG4MPLjk6OBqvGfD+l5JVS0fDn+AmMmQhlHrDrqzN Hco0iYpqKEz8mmiQd/8QwC0rRa4Uvg0BoQ4/woStV/l90bE3+qKLjNfFm8bOLTKoOdzFGJ0i gLV9z/8LWE32IB5X05x4Vt9QdmaECwRIGlqicQsElZdu4OLTG3ecnvyojtLGaqxiJj+Hiv9h m7MpykljLJVhskOv0lawbwlq2z1znQqZldqjukyYo5Dxl8hDGJCT9f5gWU3Fd4acO6koqCp5 RDoYfS24uEUFo2qnyeQWugLF7zBz6/bYWWN2AIxRMZ/p2jFF5ufkWZ4vmkWyKBBbJ5sRNMVS BS7Vf55vcUKZyL6McebnarhU59CIVfc+STND6CIMYUmjmlZfw6c9yYmfl+Lw23oiyARfVIXZ /+mnTKXJS9CU8xPlWPuL89EiOND7n5lnwv7G8ukpylLJJLDPhZ5v59fbgvXBg34hYvZyDjoH yF3ZpLUlk0HDryvCsQVmKZKRW03wbEALcmeg+Rcd/WIJUxtH2RJNhMb6epJl1BN90iNqtr1w w==
IronPort-HdrOrdr: A9a23:Ptjp9aM+DvyePsBcT07155DYdb4zR+YMi2TDiHoRdfUFSKKlfp 6V88jzjSWE8gr5OEtLpTnyAtj8fZq8z+883WB1B9eftWbdyROVxe1ZnO7fKl7bambDH4xmpN xdmsFFYbWaYSkY/KTHCWKDYrEdKay8gdmVbJDlvhFQpG9RGsVdBgFCZzqzIwlTfk1rFJA5HJ 2T6o5svDy7Y0kaacy9Gz0sQ/XDj8ejruOqXTc2QzocrCWehzKh77D3VzKC2A0Fbj9JybA+tU DYjg3C4Lm5uf3T8G6R64aT1eUYpDLS8KoDOCW+sLlUFtwqsHfqWG1VYczNgNnympDs1L9lqq iIn/5qBbUO15qYRBDLnfKq4Xir7N7rgEWSjmNxRhDY0IjEbSN/BMxbiY1DdBzFr0ImodFnya pOm3mUrpxNEHr77VPADvXzJmRXf3CP0A4fuP9Wi2YaXZoVabdXo4Ba9ERJEI0YFCa/7Iw8Cu FhAMzV+f4TKDqhHjnkl3gqxMbpUmU4Hx+ATERHssuJ0yJOlHQ8y0cD3sQQknoJ6Zp4QZhZ4O bPNLhuidh1P7krRLM4AP1ETdq8C2TLTx6JOGWOIU7/HKVCIH7Jo46f2sRG2AhrQu168HIfou WwbLoDjx9NR6vHM7z+4KF2
X-Talos-CUID: 9a23:iURzRWFLFKnhGQAwqmJiqFAKGvwfIkHvlirgKhScMl9ZYbGKHAo=
X-Talos-MUID: 9a23:P4JHhwlsg9VEgTnlmH1jdnpnb+JLsobpMXkskI1btpKfEnJzPw+C2WE=
X-IronPort-Anti-Spam-Filtered: true
Received: from alln-core-6.cisco.com ([173.36.13.139]) by alln-iport-5.cisco.com with ESMTP/TLS/ECDHE-RSA-AES256-GCM-SHA384; 02 Aug 2023 18:09:55 +0000
Received: from alln-opgw-1.cisco.com (alln-opgw-1.cisco.com [173.37.147.229]) by alln-core-6.cisco.com (8.15.2/8.15.2) with ESMTPS id 372I9sUj003780 (version=TLSv1.2 cipher=DHE-RSA-AES256-GCM-SHA384 bits=256 verify=OK) for <6man@ietf.org>; Wed, 2 Aug 2023 18:09:55 GMT
Authentication-Results: alln-opgw-1.cisco.com; dkim=pass (signature verified) header.i=@cisco.com; spf=Pass smtp.mailfrom=jclarke@cisco.com; dmarc=pass (p=quarantine dis=none) d=cisco.com
X-IronPort-AV: E=Sophos;i="6.01,249,1684800000"; d="scan'208,217";a="5032560"
Received: from mail-mw2nam04lp2172.outbound.protection.outlook.com (HELO NAM04-MW2-obe.outbound.protection.outlook.com) ([104.47.73.172]) by alln-opgw-1.cisco.com with ESMTP/TLS/ECDHE-RSA-AES256-GCM-SHA384; 02 Aug 2023 18:09:54 +0000
ARC-Seal: i=1; a=rsa-sha256; s=arcselector9901; d=microsoft.com; cv=none; b=VKQB/775UHDv/ZyECbDQq0O0Y/P87ljJA00XWd9nj0bcqxRGT9luAy+0mDd7XuLFNjannmQVVWYPeq/wP6Q8zjLacGaWamJo82bTOgD3OzJfjyBRcGvAbjwxVF3Kit6rOObsH6LJXqNc2fkU+be0Z+8l2uerHUVrobXf/Bp9GACqe5dRrhb1lhhSTrtB+qd2tUKMdBmOzmBeJSkKTXUKHa93R+CH3jJKOL3sTv6qiDTN7k6lbZ9JX3RTrk12Knnqa9lmcl/H4wNPIroavEtWuvtqImisVqQ6NnO8G+wFN8l7Fgy8IglGrGcn9k6XTSYSrZr0EJinyoX3BYy9Mt7kuw==
ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=microsoft.com; s=arcselector9901; h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-AntiSpam-MessageData-ChunkCount:X-MS-Exchange-AntiSpam-MessageData-0:X-MS-Exchange-AntiSpam-MessageData-1; bh=IGo93XPhu0A0cNxCZni4ndlgQ/QQTbjUxTIUdOM3tUs=; b=bkiN28UR0B+Ce2QkXwgtIy9h21Nea6yYsRKi3uBiaiC/RJwUz9zHsmaDYbDi3k9b2Uwa76E0DIa8RDTbCy2Y3YxtPs0yC74ENgB6OycWqDx0d+X9dFV92PPz21AS4ftQn9XFZnuRk9VSjRrcOFNLgMFOenu4iq2zlBC+VeDUUp5QjD+BMBbacUQdLt/bKozBuXkHbyfXe0XI3XsQtNMueUune2I1kiBg3VrR2mZT40lcSMs7A0jKVaV8/1lmmLdpQGHBjyIGaMH7FM+tbdfR49fAj8slGUbo4xd6RGd+leJM6Vv1zrVyPw7WvQjZKKGiMy7JRyqBuXIoKKL4HuftTQ==
ARC-Authentication-Results: i=1; mx.microsoft.com 1; spf=pass smtp.mailfrom=cisco.com; dmarc=pass action=none header.from=cisco.com; dkim=pass header.d=cisco.com; arc=none
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=cisco.com; s=selector1; h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-SenderADCheck; bh=IGo93XPhu0A0cNxCZni4ndlgQ/QQTbjUxTIUdOM3tUs=; b=mKjW22iTDHTfl1OVyGaD8oOYXVRFgB93lr2+aZASYhndqwX/7uut+utf5svsxaX1Tp/ycIUrVOinJS3kySg+Bh3zmzsLnsri8cvEHdNzyvB0lAVteCRCiei7dS1/Kt/plmR50yAZSt3goniPPLIMVRKp6HEQUlebWL93wk1FkN0=
Received: from BN9PR11MB5371.namprd11.prod.outlook.com (2603:10b6:408:11c::11) by SA0PR11MB4672.namprd11.prod.outlook.com (2603:10b6:806:96::24) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id 15.20.6631.45; Wed, 2 Aug 2023 18:09:53 +0000
Received: from BN9PR11MB5371.namprd11.prod.outlook.com ([fe80::616e:ead1:6cd0:bdbb]) by BN9PR11MB5371.namprd11.prod.outlook.com ([fe80::616e:ead1:6cd0:bdbb%4]) with mapi id 15.20.6652.019; Wed, 2 Aug 2023 18:09:52 +0000
From: "Joe Clarke (jclarke)" <jclarke@cisco.com>
To: "6man@ietf.org" <6man@ietf.org>
Thread-Topic: Thoughts on draft-thubert-6man-ipv6-over-wireless-15
Thread-Index: AQHZxWjMl/7sLjlyDkiPCOyaaBqrjQ==
Date: Wed, 02 Aug 2023 18:09:52 +0000
Message-ID: <BN9PR11MB537101C802FB1F73F307DE79B80BA@BN9PR11MB5371.namprd11.prod.outlook.com>
Accept-Language: en-US
Content-Language: en-US
X-MS-Has-Attach:
X-MS-TNEF-Correlator:
x-ms-publictraffictype: Email
x-ms-traffictypediagnostic: BN9PR11MB5371:EE_|SA0PR11MB4672:EE_
x-ms-office365-filtering-correlation-id: f812104b-6d82-4e9c-b219-08db9383ab6c
x-ms-exchange-senderadcheck: 1
x-ms-exchange-antispam-relay: 0
x-microsoft-antispam: BCL:0;
x-microsoft-antispam-message-info: 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
x-forefront-antispam-report: CIP:255.255.255.255; CTRY:; LANG:en; SCL:1; SRV:; IPV:NLI; SFV:NSPM; H:BN9PR11MB5371.namprd11.prod.outlook.com; PTR:; CAT:NONE; SFS:(13230028)(4636009)(39860400002)(346002)(396003)(366004)(136003)(376002)(451199021)(55016003)(186003)(9686003)(316002)(478600001)(122000001)(86362001)(66946007)(66446008)(66476007)(66556008)(71200400001)(7696005)(38100700002)(64756008)(6916009)(76116006)(33656002)(6506007)(41300700001)(38070700005)(8936002)(8676002)(66574015)(83380400001)(52536014)(5660300002)(2906002); DIR:OUT; SFP:1101;
x-ms-exchange-antispam-messagedata-chunkcount: 1
x-ms-exchange-antispam-messagedata-0: 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
Content-Type: multipart/alternative; boundary="_000_BN9PR11MB537101C802FB1F73F307DE79B80BABN9PR11MB5371namp_"
MIME-Version: 1.0
X-OriginatorOrg: cisco.com
X-MS-Exchange-CrossTenant-AuthAs: Internal
X-MS-Exchange-CrossTenant-AuthSource: BN9PR11MB5371.namprd11.prod.outlook.com
X-MS-Exchange-CrossTenant-Network-Message-Id: f812104b-6d82-4e9c-b219-08db9383ab6c
X-MS-Exchange-CrossTenant-originalarrivaltime: 02 Aug 2023 18:09:52.8832 (UTC)
X-MS-Exchange-CrossTenant-fromentityheader: Hosted
X-MS-Exchange-CrossTenant-id: 5ae1af62-9505-4097-a69a-c1553ef7840e
X-MS-Exchange-CrossTenant-mailboxtype: HOSTED
X-MS-Exchange-CrossTenant-userprincipalname: SqrE8WbUuMs8gBZkpTbgbLMl5OCaeIfsjh3BpWvdRBwuGXpBvBtAPsamOmjqjb+fSt1np6ibUJGWKhe3HGvN8Q==
X-MS-Exchange-Transport-CrossTenantHeadersStamped: SA0PR11MB4672
X-Outbound-SMTP-Client: 173.37.147.229, alln-opgw-1.cisco.com
X-Outbound-Node: alln-core-6.cisco.com
Archived-At: <https://mailarchive.ietf.org/arch/msg/ipv6/V_FMEcghR0f3cc5xFhnnJMVy8AM>
Subject: [IPv6] Thoughts on draft-thubert-6man-ipv6-over-wireless-15
X-BeenThere: ipv6@ietf.org
X-Mailman-Version: 2.1.39
Precedence: list
List-Id: "IPv6 Maintenance Working Group \(6man\)" <ipv6.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/ipv6>, <mailto:ipv6-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/ipv6/>
List-Post: <mailto:ipv6@ietf.org>
List-Help: <mailto:ipv6-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/ipv6>, <mailto:ipv6-request@ietf.org?subject=subscribe>
X-List-Received-Date: Wed, 02 Aug 2023 18:10:00 -0000

I had a chance to read through this draft with the hat of an IETF NOC member.  Given the number of wireless (and IPv6 wireless) issues we’ve seen over the years, Sections 2.1 and 2.2 really speaks to me.  We have seen issues with failing stateful proxies, incomplete learning of IPv6 addresses, and snooping holes.  These have led to extended onboarding time for IPv6-only clients and times when certain clients can pass traffic.  Things have gotten better, but it’s still a moving target.  This is a real problem, and I’m glad focus is being given to it.

While not IPv6-specific, the IETF conference network currently uses public IPv4 addresses without a firewall (to provide an “Open Internet™”), and this leads to other operational challenges that have required us to use ARP proxies to tamp down the broadcast onslaught.  Not having standards means to do some of these functions has been challenging.

Therefore, I support the spirit of this draft in that a more proactive approach to address registration and use of standardized means to do so and query the registrar would aid in overall network operation..

The concern I have is turning the AP into a BBR.  I can already hear some of the conversations in the NOC about this “layer violation”.  That said, I can imagine a case where AP suppresses the multicast over the air and redirects RS or NS requests directly to the registrar (e.g., campus router).  As you mention, the true wired side of the network is not as susceptible to the shortcomings of NBMA, so pushing this traffic out onto the wire is not such a bad thing, plus it gives less “Magick” for the AP to handle.

Joe