Re: [IPv6] I-D Action: draft-ietf-6man-rfc6724-update-00.txt

Brian E Carpenter <brian.e.carpenter@gmail.com> Fri, 20 October 2023 22:33 UTC

Return-Path: <brian.e.carpenter@gmail.com>
X-Original-To: ipv6@ietfa.amsl.com
Delivered-To: ipv6@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 0215FC14CEFE for <ipv6@ietfa.amsl.com>; Fri, 20 Oct 2023 15:33:13 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -2.196
X-Spam-Level:
X-Spam-Status: No, score=-2.196 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, DKIM_SIGNED=0.1, DKIM_VALID=-0.1, DKIM_VALID_AU=-0.1, DKIM_VALID_EF=-0.1, FREEMAIL_FROM=0.001, NICE_REPLY_A=-0.091, RCVD_IN_ZEN_BLOCKED_OPENDNS=0.001, SPF_HELO_NONE=0.001, SPF_PASS=-0.001, T_SCC_BODY_TEXT_LINE=-0.01, URIBL_BLOCKED=0.001, URIBL_DBL_BLOCKED_OPENDNS=0.001, URIBL_ZEN_BLOCKED_OPENDNS=0.001] autolearn=ham autolearn_force=no
Authentication-Results: ietfa.amsl.com (amavisd-new); dkim=pass (2048-bit key) header.d=gmail.com
Received: from mail.ietf.org ([50.223.129.194]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id TJM0rml_eq6b for <ipv6@ietfa.amsl.com>; Fri, 20 Oct 2023 15:33:08 -0700 (PDT)
Received: from mail-pg1-x52d.google.com (mail-pg1-x52d.google.com [IPv6:2607:f8b0:4864:20::52d]) (using TLSv1.3 with cipher TLS_AES_128_GCM_SHA256 (128/128 bits) key-exchange X25519 server-signature RSA-PSS (2048 bits) server-digest SHA256) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id D4B4FC14F748 for <ipv6@ietf.org>; Fri, 20 Oct 2023 15:33:08 -0700 (PDT)
Received: by mail-pg1-x52d.google.com with SMTP id 41be03b00d2f7-5a9bc2ec556so947686a12.0 for <ipv6@ietf.org>; Fri, 20 Oct 2023 15:33:08 -0700 (PDT)
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=gmail.com; s=20230601; t=1697841188; x=1698445988; darn=ietf.org; h=content-transfer-encoding:in-reply-to:from:references:cc:to :content-language:subject:user-agent:mime-version:date:message-id :from:to:cc:subject:date:message-id:reply-to; bh=oLJT4IrTDo8QLPcC4jMAcy5fWuKFHEgnuz5ON/nmWwM=; b=JGQHfdbieFFwbjMb1AmZj/OIA5ni7wGRxtVTVlaVl9AvU2F/nkCDxXci5q3AgCZyYd s5Et5c72yRrkIscLpViaym7dVRVc3/qZ6TWuyIGerXeT4T/WV1S8vFvVYKKR8cK0vmO1 nlA44m9JCsjBmFXkse85rVvqXNjyzjEtiPCfPzH5QsgNQBFm66Gw6e2IxM8yixoRigtr oR/TU3shR2kKbqohUIdFQFg9hjI9vPKimraL7lVOKJsf/nEflTX9btR79MJ/sMv/aKhl fAFe9WKeFYQH8weCCH95B+TiHDaee/YCjvXp/bS+h9aiEI1+OfdTYT+JqK447BR82Heh Iu5w==
X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20230601; t=1697841188; x=1698445988; h=content-transfer-encoding:in-reply-to:from:references:cc:to :content-language:subject:user-agent:mime-version:date:message-id :x-gm-message-state:from:to:cc:subject:date:message-id:reply-to; bh=oLJT4IrTDo8QLPcC4jMAcy5fWuKFHEgnuz5ON/nmWwM=; b=K3Z1ElXeCZ12DpAdOWokM0xHiW2llMPXd/CbRjs0VvspM5jwwCmIZmmIgubYEudYDD ANKR7UhI+HlkyyZjxpKZ46uwp/678yTiKDN3D8xyvN54orWTqbS23eK6iPaG++6ObLac 0HiM9IdkFs37pJsIakPh+DsnZ4GNSqr39K9hJ4NI+uknXAQ+73YwbHtSSj53pYt8A/d2 xraJ71xi4PNEpZklJfH73gI+/hK0WL7Lir0oSFBME1s15+/qURMsmlYKUoTCVPZGUMtx GCo51aBPFHmsjlTeo3KBHbQe5yjFXND/TiJ0MApIzDNhlf8rai4peRnvEeeHI1dQbpFS hryQ==
X-Gm-Message-State: AOJu0Yxlhtmr4gNAnAKkl8xvfj2kcjsVKPmYOlpW2SpH4xgPZQSPVBwI zJ6nf9XQLI4xRO6BLf3Stk0=
X-Google-Smtp-Source: AGHT+IE1ZtHnTZKyVRn4+KAfVhBrQrDD8YWohfchghRCe8cUMz9c3Jf39ExzDsOFTIqN+hM0aJTEqQ==
X-Received: by 2002:a17:902:ce92:b0:1c9:e774:58e1 with SMTP id f18-20020a170902ce9200b001c9e77458e1mr3516572plg.8.1697841188082; Fri, 20 Oct 2023 15:33:08 -0700 (PDT)
Received: from ?IPV6:2406:e003:110d:5301:8cb6:a2c:7461:4047? ([2406:e003:110d:5301:8cb6:a2c:7461:4047]) by smtp.gmail.com with ESMTPSA id o2-20020a170902d4c200b001c61df93afdsm1997447plg.59.2023.10.20.15.33.06 (version=TLS1_3 cipher=TLS_AES_128_GCM_SHA256 bits=128/128); Fri, 20 Oct 2023 15:33:07 -0700 (PDT)
Message-ID: <c724c76c-0d01-43d9-a3df-6d1c8b21d3c6@gmail.com>
Date: Sat, 21 Oct 2023 11:33:03 +1300
MIME-Version: 1.0
User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:91.0) Gecko/20100101 Thunderbird/91.10.0
Content-Language: en-US
To: David Farmer <farmer@umn.edu>, Ole Troan <otroan@employees.org>
Cc: 6man WG <ipv6@ietf.org>
References: <169686229022.13380.1151518565582812589@ietfa.amsl.com> <b6e5c407-c50c-4834-b5df-d7362b764fe2@Spark> <PH0PR11MB4966868276813E0C8A1AACABA9D5A@PH0PR11MB4966.namprd11.prod.outlook.com> <CAN-Dau26C0dqXvr3i_VdZJtbkRes4APjXY1xHsbFw3zpWzj8Aw@mail.gmail.com> <92A814D5-FA86-4FAB-8843-7B3D7DDB23E8@employees.org> <CAN-Dau1=+hG-oK+cN49xJ2Ru+mm57Cfai3HNrLcO1fqEDaMarQ@mail.gmail.com>
From: Brian E Carpenter <brian.e.carpenter@gmail.com>
In-Reply-To: <CAN-Dau1=+hG-oK+cN49xJ2Ru+mm57Cfai3HNrLcO1fqEDaMarQ@mail.gmail.com>
Content-Type: text/plain; charset="UTF-8"; format="flowed"
Content-Transfer-Encoding: base64
Archived-At: <https://mailarchive.ietf.org/arch/msg/ipv6/_cNMWkUMJySreztwaRObL1QKe68>
Subject: Re: [IPv6] I-D Action: draft-ietf-6man-rfc6724-update-00.txt
X-BeenThere: ipv6@ietf.org
X-Mailman-Version: 2.1.39
Precedence: list
List-Id: "IPv6 Maintenance Working Group \(6man\)" <ipv6.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/ipv6>, <mailto:ipv6-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/ipv6/>
List-Post: <mailto:ipv6@ietf.org>
List-Help: <mailto:ipv6-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/ipv6>, <mailto:ipv6-request@ietf.org?subject=subscribe>
X-List-Received-Date: Fri, 20 Oct 2023 22:33:13 -0000

On 21-Oct-23 10:09, David Farmer wrote:
> 
> On Wed, Oct 18, 2023 at 2:03 PM Ole Troan <otroan=40employees.org@dmarc.ietf.org <mailto:40employees.org@dmarc.ietf.org>> wrote:
> 
>      > An IPv6 ULA address will only be preferred over an IPv4 address; IFF, both IPv6 ULA source and destination addresses are available. As discussed in this thread and section 7 of this update, with rule 5 of section 6 of RFC6724 and the ULA label added in RFC6724, an IPv4 source and destination will be preferred over an IPv6 ULA source and an IPv6 GUA destination address, even though generally IPv6 ULA addresses are preferred over IPv4 in the policy table as proposed in this update.
>      >
>      > Furthermore, in order for the scenario you describe, ULA used with NPTv6, NAT66, or NAPT66 and to be preferred over IPv4, the separate ULA label actually MUST be removed from the policy table.
>      >
>      > Therefore, the policy table, as proposed, discourages the use of ULA with NPTv6, NAT66, or NAPT66, which, if I'm understanding you correctly, is what you would like.
> 
>     The behaviour _I_ would like is for RFC1918 and ULA sources to be treated equally for global DA.
>     Expecting HE / host heuristics would deprioritize one or the other as the host learns the SAs actual reachability.
> 
>     I don’t think the answer to that problem is a separate block of IPv6 space for ULA with global reachability (how many address classes are we going to have) or to per-network modify the host SAS policy.
>     Operators are then instead solving it by using an address space that does behave that way. E.g. 2001:db8::/32.
> 
> 
> Using ULA for global communications and reachability conflicts with the very definition of ULA in RFC4193. From the Intro of RFC 4193, "This document defines an IPv6 unicast address format that is globally unique and is intended for local communications [IPV6]... They are not expected to be routable on the global Internet."

That's true, but (Experimental) RFC 6296 explains how ULA<-->GUA can work. If a user chooses ULA<-->GUA and there is no NPTv6 or NAT66 present, the user loses. More rational address selection is possible if the host has access to a "NPTv6 (or NAT66) present" flag. (Actually, the same is true in IPv4 - if there was a "NAT44 present" flag, it could be tested before trying to use an RFC1918 source address. But it isn't needed in practice because NAT44 is so widespread.)

> 
> As currently defined, if the host only has a ULA source address, the host can expect only to have local connectivity. If the host also has a GUA source address, the host can expect global connectivity. Just because we blurred this distinction in IPv4 doesn't mean we should also blur the distinction in IPv6. We have plenty of IPv6 addresses to have separate local and global address formats, and that is why ULA was defined as a separate address format.
> 
> There is no good way to maintain the distinction between local names and global names in the DNS. If we can't maintain a clear distinction between local and global IPv6 addresses, then we are doomed to confuse the local and global domains forever. Let's not do that!

I think we're pretty close to that abyss already, and we can't pull back from it without replacing getaddrinfo(). This fix to RFC6724 is the best we can for current running code, however.

Also, it turns out that the IESG holdup on draft-ietf-6man-rfc6874bis-09 is closely related to this very question. Over in Webland, they really don't know how to handle the issue of locally scoped IP addresses. See https://wicg.github.io/private-network-access/

    Brian