Re: you have running code ... I-D Action: draft-ietf-6man-ipv6only-flag-03.txt

"Bjoern A. Zeeb" <bzeeb-lists@lists.zabbadoz.net> Wed, 31 October 2018 10:08 UTC

Return-Path: <bzeeb-lists@lists.zabbadoz.net>
X-Original-To: ipv6@ietfa.amsl.com
Delivered-To: ipv6@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 7E65F12958B for <ipv6@ietfa.amsl.com>; Wed, 31 Oct 2018 03:08:45 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -1.901
X-Spam-Level:
X-Spam-Status: No, score=-1.901 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, SPF_PASS=-0.001] autolearn=ham autolearn_force=no
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id qY-mRUG7Kpw2 for <ipv6@ietfa.amsl.com>; Wed, 31 Oct 2018 03:08:43 -0700 (PDT)
Received: from mx1.sbone.de (cross.sbone.de [195.201.62.131]) (using TLSv1.2 with cipher AECDH-AES256-SHA (256/256 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id 6E79B128A6E for <ipv6@ietf.org>; Wed, 31 Oct 2018 03:08:43 -0700 (PDT)
Received: from mail.sbone.de (mail.sbone.de [IPv6:fde9:577b:c1a9:31::2013:587]) (using TLSv1 with cipher ADH-CAMELLIA256-SHA (256/256 bits)) (No client certificate requested) by mx1.sbone.de (Postfix) with ESMTPS id B77208D4A24D; Wed, 31 Oct 2018 10:08:41 +0000 (UTC)
Received: from content-filter.sbone.de (content-filter.sbone.de [IPv6:fde9:577b:c1a9:31::2013:2742]) (using TLSv1 with cipher DHE-RSA-AES256-SHA (256/256 bits)) (No client certificate requested) by mail.sbone.de (Postfix) with ESMTPS id 12CDBD1F879; Wed, 31 Oct 2018 10:08:41 +0000 (UTC)
X-Virus-Scanned: amavisd-new at sbone.de
Received: from mail.sbone.de ([IPv6:fde9:577b:c1a9:31::2013:587]) by content-filter.sbone.de (content-filter.sbone.de [fde9:577b:c1a9:31::2013:2742]) (amavisd-new, port 10024) with ESMTP id Vg0S8lLO4cpn; Wed, 31 Oct 2018 10:08:37 +0000 (UTC)
Received: from [192.168.1.88] (fresh-ayiya.sbone.de [IPv6:fde9:577b:c1a9:f001::2]) (using TLSv1 with cipher AES256-SHA (256/256 bits)) (No client certificate requested) by mail.sbone.de (Postfix) with ESMTPSA id 68039D1F878; Wed, 31 Oct 2018 10:08:36 +0000 (UTC)
From: "Bjoern A. Zeeb" <bzeeb-lists@lists.zabbadoz.net>
To: Nick Hilliard <nick@foobar.org>
Cc: 6man WG <ipv6@ietf.org>
Subject: Re: you have running code ... I-D Action: draft-ietf-6man-ipv6only-flag-03.txt
Date: Wed, 31 Oct 2018 10:08:35 +0000
X-Mailer: MailMate (2.0BETAr6125)
Message-ID: <1F725FA2-1A2F-42E3-8C2A-4EE7F3AB9D4F@lists.zabbadoz.net>
In-Reply-To: <97ba35ff-b4a7-314c-3010-297d06be645d@foobar.org>
References: <153973137181.9473.10666616544238076833@ietfa.amsl.com> <6264F7A1-59EB-467D-A576-E5F2F0DEE7DD@lists.zabbadoz.net> <CACWOCC-xL0PfkNHgCqhB28GE-jCWUUagQE4PukdpXK+YHgWpyg@mail.gmail.com> <97ba35ff-b4a7-314c-3010-297d06be645d@foobar.org>
MIME-Version: 1.0
Content-Type: text/plain; charset="utf-8"; format="flowed"
Content-Transfer-Encoding: 8bit
Archived-At: <https://mailarchive.ietf.org/arch/msg/ipv6/XCMmlKuaI-L3UWfg06-YfLSdspk>
X-BeenThere: ipv6@ietf.org
X-Mailman-Version: 2.1.29
Precedence: list
List-Id: "IPv6 Maintenance Working Group \(6man\)" <ipv6.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/ipv6>, <mailto:ipv6-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/ipv6/>
List-Post: <mailto:ipv6@ietf.org>
List-Help: <mailto:ipv6-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/ipv6>, <mailto:ipv6-request@ietf.org?subject=subscribe>
X-List-Received-Date: Wed, 31 Oct 2018 10:08:45 -0000

On 31 Oct 2018, at 9:24, Nick Hilliard wrote:

> Job Snijders wrote on 30/10/2018 22:27:
>> Can you (or others running FreeBSD EXPERIMENTAL) share reports on how
>> this pans out in practise?
> Looking at the code, it acts by blocking outbound ipv4 frames from 
> being transmitted on ethernet interfaces.

and wifi and all other kinds that use the common code.  Yes.

> This would mean - for example - that if there were a default route 
> already configured on the receiving device, any userland code 
> attempting to use ipv4 services would block until ARP times out for 
> the default route (default 20 minutes on freebsd).

That would have to be a manual configuration as on an IPv6-only link you 
would not have that at the time the flag turns up; otherwise it is a one 
time event and the admins  could do a better job.

And no an app wouldn’t block; it gets an immediate EAFNOTSUPPORT when 
it tries to send something and can got into normal error handling as for 
any socket code, try another address, or core dump if it’s that kind 
of software quality.

The point is: the noise is contained and not spread.

/bz