Re: [IPv6] I-D Action: draft-ietf-6man-rfc6724-update-00.txt

Vasilenko Eduard <vasilenko.eduard@huawei.com> Tue, 24 October 2023 12:22 UTC

Return-Path: <vasilenko.eduard@huawei.com>
X-Original-To: ipv6@ietfa.amsl.com
Delivered-To: ipv6@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id A7FDFC151548 for <ipv6@ietfa.amsl.com>; Tue, 24 Oct 2023 05:22:08 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -4.204
X-Spam-Level:
X-Spam-Status: No, score=-4.204 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, HTML_MESSAGE=0.001, RCVD_IN_DNSWL_MED=-2.3, RCVD_IN_MSPIKE_H5=0.001, RCVD_IN_MSPIKE_WL=0.001, RCVD_IN_ZEN_BLOCKED_OPENDNS=0.001, SPF_HELO_NONE=0.001, SPF_PASS=-0.001, T_SCC_BODY_TEXT_LINE=-0.01, URIBL_DBL_BLOCKED_OPENDNS=0.001, URIBL_ZEN_BLOCKED_OPENDNS=0.001] autolearn=unavailable autolearn_force=no
Received: from mail.ietf.org ([50.223.129.194]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id DfYb67l62X2R for <ipv6@ietfa.amsl.com>; Tue, 24 Oct 2023 05:22:07 -0700 (PDT)
Received: from frasgout.his.huawei.com (frasgout.his.huawei.com [185.176.79.56]) (using TLSv1.2 with cipher AECDH-AES256-SHA (256/256 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id 9C735C14CE45 for <ipv6@ietf.org>; Tue, 24 Oct 2023 05:22:06 -0700 (PDT)
Received: from mscpeml500002.china.huawei.com (unknown [172.18.147.200]) by frasgout.his.huawei.com (SkyGuard) with ESMTP id 4SFB4L5RSCz67MmR; Tue, 24 Oct 2023 20:21:22 +0800 (CST)
Received: from mscpeml500001.china.huawei.com (7.188.26.142) by mscpeml500002.china.huawei.com (7.188.26.138) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256) id 15.1.2507.31; Tue, 24 Oct 2023 15:22:02 +0300
Received: from mscpeml500001.china.huawei.com ([7.188.26.142]) by mscpeml500001.china.huawei.com ([7.188.26.142]) with mapi id 15.01.2507.031; Tue, 24 Oct 2023 15:22:02 +0300
From: Vasilenko Eduard <vasilenko.eduard@huawei.com>
To: Ted Hardie <ted.ietf@gmail.com>, Kyle Rose <krose@krose.org>
CC: Ole Trøan <otroan=40employees.org@dmarc.ietf.org>, Vasilenko Eduard <vasilenko.eduard=40huawei.com@dmarc.ietf.org>, 6man WG <ipv6@ietf.org>
Thread-Topic: [IPv6] I-D Action: draft-ietf-6man-rfc6724-update-00.txt
Thread-Index: AQHaAfXpFuCY5GhUzEu1f6dU1bosobBS/U0AgAAXQ4CAAD/6AIAA4IMAgABI3YCAAgDiAIAAi3zw///RjgCAADqdgP//0MIAgAAzc+D//9PZgAAKKjxQ///hyYD//8wEQIAARKCAgAAjcwCAAA55AP/+gDYQ
Date: Tue, 24 Oct 2023 12:22:02 +0000
Message-ID: <d8144032b7ac42ef9818a31130301a1a@huawei.com>
References: <e1c50f43dac34ee296be60ef97acf06f@huawei.com> <1A5F2950-22F6-4F48-B528-00368B6898EF@employees.org> <CAJU8_nXsZfTQx8JFobt=p14O78RqrcOicB5V4Z1N3pHojOkzEw@mail.gmail.com> <CA+9kkMAx67VcPy6q5s0naREQ5YASq1AG2W93fF2JffsYnTX4nQ@mail.gmail.com>
In-Reply-To: <CA+9kkMAx67VcPy6q5s0naREQ5YASq1AG2W93fF2JffsYnTX4nQ@mail.gmail.com>
Accept-Language: en-US, zh-CN
Content-Language: en-US
X-MS-Has-Attach:
X-MS-TNEF-Correlator:
x-originating-ip: [10.199.56.242]
Content-Type: multipart/alternative; boundary="_000_d8144032b7ac42ef9818a31130301a1ahuaweicom_"
MIME-Version: 1.0
X-CFilter-Loop: Reflected
Archived-At: <https://mailarchive.ietf.org/arch/msg/ipv6/_IX2rsHxO2zey2ebiAgCJ-kwM1k>
Subject: Re: [IPv6] I-D Action: draft-ietf-6man-rfc6724-update-00.txt
X-BeenThere: ipv6@ietf.org
X-Mailman-Version: 2.1.39
Precedence: list
List-Id: "IPv6 Maintenance Working Group \(6man\)" <ipv6.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/ipv6>, <mailto:ipv6-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/ipv6/>
List-Post: <mailto:ipv6@ietf.org>
List-Help: <mailto:ipv6-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/ipv6>, <mailto:ipv6-request@ietf.org?subject=subscribe>
X-List-Received-Date: Tue, 24 Oct 2023 12:22:08 -0000

Hi Ted, Hi Kyle, Thanks for your explanations – I agree to what you said.

Except “applications”.
IMHO: this flag is not needed per application. “Per host” would be enough.
I proposed to just change the label of the particular ULA PIO (could be /48, /64, or anything in between) to the same as GUA.
It would already permit to have sessions from this ULA PIO (as a source) to any GUA as the destination.

Theoretically, other actions are possible. But I have not heard any other proposal for what to do with the “NAT_or_NTP available” flag.
Eduard
From: ipv6 [mailto:ipv6-bounces@ietf.org] On Behalf Of Ted Hardie
Sent: Monday, October 23, 2023 7:23 PM
To: Kyle Rose <krose@krose.org>
Cc: Ole Trøan <otroan=40employees.org@dmarc.ietf.org>; Vasilenko Eduard <vasilenko.eduard=40huawei.com@dmarc.ietf.org>; 6man WG <ipv6@ietf.org>
Subject: Re: [IPv6] I-D Action: draft-ietf-6man-rfc6724-update-00.txt

Hi Kyle,

On Mon, Oct 23, 2023 at 4:33 PM Kyle Rose <krose@krose.org<mailto:krose@krose.org>> wrote:
On Mon, Oct 23, 2023 at 9:26 AM Ole Trøan <otroan=40employees.org@dmarc.ietf.org<mailto:40employees.org@dmarc.ietf.org>> wrote:
I don’t see your point.
Please give an example where signaling solves something…

I'm not 100% what Vasilenko means, but to me the impasse can be described by two scenarios:

1. ULA is able to reach the public internet via NAT/NPT. No GUA is available (for whatever reason). Either IPv4 or IPv6 can be used to reach the public internet.
2. ULA is not able to reach the public internet, and will be filtered or rejected at the border. No GUA is available (for whatever reason). IPv4 is required to reach the public internet.

Dealing with these two situations in the absence of an explicit signal about ULA->public internet reachability requires mutually exclusive configurations. There is no default policy configuration, much less a default policy table in the 3484 sense, that will accommodate both.

This forces us to make a choice about which of the two behaviors will be made the default. I of course have my preference (as stated elsewhere) but regardless, if we want to make progress we all need to accept that this choice is unavoidable within the existing source address selection framework in the absence of further signaling from the network.

Thanks for this precis of the situation.  I will point out that ULAs, on their creation as a replacement for site-local, were described to the rest of the IETF as following 2 (at the time without any possibility of 1, see RFC 4193 section 4.1 and 5).

There are, as a result, many existing contexts in which the application's presumption is for 2.  Using an explicit signal to indicate a change in the protocol's characteristics permits at least some hope that the application will have access to that signal and can adjust its behavior accordingly (as others have pointed out, this is non-trivial to arrange, but within the realm of possibility).  Without an explicit signal a new default has significant failure modes for the applications that there is no real way for us to address.

I would personal prefer to move to a state where both behaviors are explicitly signaled and the absence of a signal indicates that the upgraded mechanism is not in use.  This is similar to, but distinct from, retaining the original default (in that it lets you identify when a network's choice of signal is deliberate).

Just my personal opinion,

regards,

Ted Hardie




Kyle
--------------------------------------------------------------------
IETF IPv6 working group mailing list
ipv6@ietf.org<mailto:ipv6@ietf.org>
Administrative Requests: https://www.ietf.org/mailman/listinfo/ipv6
--------------------------------------------------------------------