Re: draft-gont-6man-slaac-renum-00

Fernando Gont <fgont@si6networks.com> Sat, 23 February 2019 09:59 UTC

Return-Path: <fgont@si6networks.com>
X-Original-To: ipv6@ietfa.amsl.com
Delivered-To: ipv6@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 1CBF913106F for <ipv6@ietfa.amsl.com>; Sat, 23 Feb 2019 01:59:20 -0800 (PST)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -1.9
X-Spam-Level:
X-Spam-Status: No, score=-1.9 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, RCVD_IN_DNSWL_NONE=-0.0001, SPF_PASS=-0.001, URIBL_BLOCKED=0.001] autolearn=ham autolearn_force=no
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id wMWCsXTuZaPK for <ipv6@ietfa.amsl.com>; Sat, 23 Feb 2019 01:59:16 -0800 (PST)
Received: from fgont.go6lab.si (fgont.go6lab.si [91.239.96.14]) (using TLSv1.2 with cipher AECDH-AES256-SHA (256/256 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id 69B121274D0 for <ipv6@ietf.org>; Sat, 23 Feb 2019 01:59:16 -0800 (PST)
Received: from [192.168.3.66] (unknown [186.137.76.21]) (using TLSv1.2 with cipher ECDHE-RSA-AES128-GCM-SHA256 (128/128 bits)) (No client certificate requested) by fgont.go6lab.si (Postfix) with ESMTPSA id 1D7B383809; Sat, 23 Feb 2019 10:59:12 +0100 (CET)
Subject: Re: draft-gont-6man-slaac-renum-00
To: Lee Howard <lee@asgard.org>, ipv6@ietf.org
References: <da050573-8a39-5dd1-c54f-d5faf2da469b@asgard.org>
From: Fernando Gont <fgont@si6networks.com>
Openpgp: preference=signencrypt
Autocrypt: addr=fgont@si6networks.com; prefer-encrypt=mutual; keydata= mQINBE5so2gBEACzBQBLUy8nzgAzSZn6ViXT6TmZBFNYNqTpPRvTVtUqF6+tkI+IEd9N2E8p pXUXCd0W4dkxz6o7pagnK63m4QSueggvp881RVVHOF8oTSHOdnGxLfLeLNJFKE1FOutU3vod GK/wG/Fwzkv9MebdXpMlLV8nnJuAt66XGl/lU1JrNfrKO4SoYQi4TsB/waUQcygh7OR/PEO0 EttiU8kZUbZNv58WH+PAj/rdZCrgUSiGXiWUQQKShqKnJxLuAcTcg5YRwL8se/V6ciW0QR9i /sr52gSmLLbW5N3hAoO+nv1V/9SjJAUvzXu43k8sua/XlCXkqU7uLj41CRR72JeUZ4DQsYfP LfNPC98ZGTVxbWbFtLXxpzzDDT8i3uo7w1LJ2Ij/d5ezcARqw01HGljWWxnidUrjbTpxkJ9X EllcsH94mer728j/HKzC9OcTuz6WUBP3Crgl6Q47gY5ZIiF0lsmd9/wxbaq5NiJ+lGuBRZrD v0dQx9KmyI0/pH2AF8cW897/6ypvcyD/1/11CJcN+uAGIrklwJlVpRSbKbFtGC6In592lhu7 wnK8cgyP5cTU+vva9+g6P1wehi4bylXdlKc6mMphbtSA+T3WBNP557+mh3L62l4pGaEGidcZ DLYT2Ud18eAJmxU3HnM8P3iZZgeoK7oqgb53/eg96vkONXNIOwARAQABtCVGZXJuYW5kbyBH b250IDxmZ29udEBzaTZuZXR3b3Jrcy5jb20+iQJBBBMBAgArAhsjBQkSzAMABgsJCAcDAgYV CAIJCgsEFgIDAQIeAQIXgAUCTmylpQIZAQAKCRCuJQ1VHU50kv7wD/9fuNtTfxSLk3B3Hs3p ixTy8YXVjdkVwWlnJjFd7BOWmg7sI+LDhpjGfT6+ddOiwkumnvUZpObodj4ysH0i8c7P4C5t F9yu7WjklSlrB5Rth2CGChg5bKt541z2WHkFFxys9qBLmCSYDeKQkzLqhCjIUJizY2kOJ2GI MnSFDzJjhSFEh//oW830Y8fel1xnf/NVF+lBVtRMtMOfoWUqDjvP3sJ1G4zgkDCnF0CfncLx +hq2Mv26Uq9OTzvLH9aSQQ/f067BOkKAJKsfHdborX4E96ISTz57/4xECRSMr5dVsKVm4Y// uVIsb+L5z+a32FaiBZIAKDgnJO7Z8j6CV5e5yfuBTtX52Yi9HjYYqnYJGSDxYd6igD4bWu+7 xmJPHjkdqZgGV6dQIgiUfqkU+s5Cv350vK48CMaT/ZLo2BdsMhWsmaHmb+waePUMyq6E4E9x 9Js+EJb9ZiCfxS9exgieZQpet1L36IvhiwByvkQM009ywfa30JeMOltUtfLi5V06WQWsTzPL 5C+4cpkguSuAJVDTctjCA0moIeVDOpJ8WH9voQ4IeWapQnX35OIoj1jGJqqYdx65gc1ygbyx b8vw+pJ9E5GLse5TQnYifOWpXzX9053dtbwp/2OVhU4KLlzfCPCEsoTyfu9nIZxdI2PMwiL5 M85BfjX4NmwBLmPGoLkCDQRObKNoARAAqqXCkr250BchRDmi+05F5UQFgylUh10XTAJxBeaQ UNtdxZiZRm6jgomSrqeYtricM9t9K0qb4X2ZXmAMW8o8AYW3RrQHTjcBwMnAKzUIEXXWaLfG cid/ygmvWzIHgMDQKP+MUq1AGQrnvt/MRLvZLyczAV1RTXS58qNaxtaSpc3K/yrDozh/a4pu WcUsVvIkzyx43sqcwamDSBb6U8JFoZizuLXiARLLASgyHrrCedNIZdWSx0z0iHEpZIelA2ih AGLiSMtmtikVEyrJICgO81DkKNCbBbPg+7fi23V6M24+3syHk3IdQibTtBMxinIPyLFF0byJ aGm0fmjefhnmVJyCIl/FDkCHprVhTme57G2/WdoGnUvnT7mcwDRb8XY5nNRkOJsqqLPemKjz kx8mXdQbunXtX9bKyVgd1gIl+LLsxbdzRCch773UBVoortPdK3kMyLtZ4uMeDX3comjx+6VL bztUdJ1Zc9/njwVG8fgmQ+0Kj5+bzQfUY+MmX0HTXIx3B4R1I1a8QoOwi1N+iZNdewV5Zfq+ 29NlQLnVPjCRCKbaz9k6RJ2oIti55YUI6zSsL3lmlOXsRbXN5bRswFczkNSCJxJMlDiyAUIC WOay7ymzvgzPa+BY/mYn94vRaurDQ4/ljOfj6oqgfjts+dJev4Jj89vp8MQI3KJpZPEAEQEA AYkCJQQYAQIADwUCTmyjaAIbDAUJEswDAAAKCRCuJQ1VHU50km4xEACho45PZrUjY4Zl2opR DFNo5a6roTOPpgwO9PcBb3I5F8yX2Dnew+9OhgWXbBhAFq4DCx+9Gjs43Bn60qbZTDbLGJ/m 8N4PwEiq0e5MKceYcbetEdEUWhm5L6psU9ZZ82GR3UGxPXYe+oifEoJjOXQ39avf9S8p3yKP Diil0E79rn7LbJjMcgMLyjFg9SDoJ6pHLtniJoDhEAaSSgeV7Y745+gyMIdtQmrFHfqrFdjq D6G0HE+Z68ywc5KN67YxhvhBmSycs1ZSKAXv1zLDlXdmjHDHkU3xMcB+RkuiTba8yRFYwb/n j62CC4NhFTuIKOc4ta3dJsyXTGh/hO9UjWUnmAGfd0fnzTBZF8Qlnw/8ftx5lt4/O+eqY1EN RITScnPzXE/wMOlTtdkddQ+QN6xt6jyR2XtAIi7aAFHypIqA3lLI9hF9x+lj4UQ2yA9LqpoX 6URpPOd13JhAyDe47cwsP1u9Y+OBvQTVLSvw7Liu2b4KjqL4lx++VdBi7dXsjJ6kjIRjI6Lb WVpxe8LumMCuVDepTafBZ49gr7Fgc4F9ZSCo6ChgQNLn6WDzIkqFX+42KuHz90AHWhuW+KZR 1aJylERWeTcMCGUSBptd48KniWmD6kPKpzwoMkJtEXTuO2lVuborxzwuqOTNuYg9lWDl7zKt wPI9brGzquUHy4qRrA==
Message-ID: <ab7fae17-f620-fb97-01b6-b9a92c73dd0f@si6networks.com>
Date: Sat, 23 Feb 2019 06:18:09 -0300
User-Agent: Mozilla/5.0 (X11; Linux x86_64; rv:60.0) Gecko/20100101 Thunderbird/60.4.0
MIME-Version: 1.0
In-Reply-To: <da050573-8a39-5dd1-c54f-d5faf2da469b@asgard.org>
Content-Type: text/plain; charset="utf-8"
Content-Language: en-US
Content-Transfer-Encoding: 7bit
Archived-At: <https://mailarchive.ietf.org/arch/msg/ipv6/ali3njBj-u3RK0skWCLvFVf4TqM>
X-BeenThere: ipv6@ietf.org
X-Mailman-Version: 2.1.29
Precedence: list
List-Id: "IPv6 Maintenance Working Group \(6man\)" <ipv6.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/ipv6>, <mailto:ipv6-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/ipv6/>
List-Post: <mailto:ipv6@ietf.org>
List-Help: <mailto:ipv6-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/ipv6>, <mailto:ipv6-request@ietf.org?subject=subscribe>
X-List-Received-Date: Sat, 23 Feb 2019 09:59:20 -0000

Hi, Lee,

*Thanks* for providing feedback on the I-D! ;-)  Comments in-line....

On 18/2/19 15:07, Lee Howard wrote:
> 
> 
> 1. Introduction
> 
> I would prefer "A common deployment scenario" over "Probably the most
> common deployment scenario."
> 
> "tipically" --> "typically"

Done.



> 
> 3.1 Improvement to SLAAC
> 
> The passive voice confused me here. I think you mean, "When a host
> receives an RA from a router from which it has received other RAs, but
> this RA does not include PIO (+A) for the previous prefix, it (the host)
> should set the Preferred Lifetime for addresses in that prefix to 0."

Not at once. The very reason for which we use a flag (LTA) in the
algorithm is so that it requires two consecutive RAs with PIOs that lack
the previously-advertised prefix for any changes to occur.


That is:

1) Two RAs with PIOs without previous prefix -> stale addresses become
un-preferred

2) Two more RAs with PIOs without previous prefix -> stale addresses are
removed.



> This solution assumes that a router will include all prefixes in ever
> RA; rfc4861 (NDP) says that RAs in response to RSs, or during
> initialization, "a router SHOULD include all options so that all
> information (e.g., prefixes) is propagated quickly during system
> initialization." Since it's not a MUST, it's potentially legal for
> routers to send separate RAs with different prefixes. In your proposed
> SLAAC scenario, the host would alternately deprecate each address.

You'd only deprecate (but not remove) the addresses if you get two RAs
with other PIOs. And remove the addresses if you receive a total of four
consecutive RAs with PIOs that do not advertise the
previously-advertised prefix.




> 3.3 Stable prefixes
> 
> Where most of the discussion on the lists has been.
> 
> When I was involved in large networks, we had two problems with stable
> prefixes. First, we had redundant DHCPv6 servers in diverse data
> centers, and no scalable way to share lease information between them. So
> if DHCPv6 server A issued a prefix, but then at renew or reboot or
> whatever DHCPv6 server A was unreachable or DHCPv6 server B just
> responded faster, then server B would issue a prefix from its pools. We
> found some ways to link backend systems such that we could do a few
> stable prefixes based on DUIDs, but it didn't scale (especially
> considering DUIDs are only stable with the gateway).
> 
> The other problem was that the network changes constantly. There is no
> assurance that the edge device to which a customer is currently
> connected will remain the same, or that that edge device will remain in
> the same logical hub. For a variety of reasons, there was the potential
> for many thousands of disaggregated prefixes to be leaked into the IGP,
> and that would not be good for the network.
> 
> I think this option needs to be included in the draft for the sake of
> completeness, but I still disagree with those who want it to be mandatory.

You mean the option to "solve" the problem by making the prefixes stable?

The problem with this option -- as any other option that does not
"happen" on the host -- is it's not under the control of the host.

Stupid example: Say your ISP does not do stable prefixes. Clearly, you
are in trouble. You need your hosts to behave in a way that even if you
ISP doesn't play nice in this respect, things still work for you.



> When a client has learned its address from DHCPv6, does it also have
> this problem? I think it would, until the DHCPv6 lifetime expires. 

I assume it would. But in all scenarios I've seen, addresses on the
local side are generated via SLAAC (not DHCPv6).


> A CE
> router that reboots wouldn't know it needs to send a Reconfigure (and my
> understanding is that there's little support for that option, but I
> haven't tested).

In this case you'd be screwed, I guess, since the server will not send
you a RECONFIGURE (modulo the fact that it was been argued that
RECONFIGURE is not widely supported), but also the client will not send
a RENEW, either.

Forcing the CPE to send RECONFIGUREs upon reboot would need more stable
storage on the CPE side, too.



> Additional suggestion:
> 
> If home gateways implemented RPF, they would simply drop packets from
> invalid (i.e., old) prefixes. We could add a new ICMPv6 message called
> "Invalid Source" which the router would return, notifying the host that
> either that source address prefix is stale, or it was sending to the
> wrong router. Host logic could pretty well sort out whether there was a
> better router to try, might send RSs for more information, and/or might
> deprecate that prefix/address and try a different one, or try DHCPv6.

Problem is: In order for this to work you need both the CPEs and the
hosts to be updated.  The CPE might or might not ever be updated. --
many require manual updates, and are employed as long as they still work.

The host-side improvements solve the problem even if neither the network
nor the CPE play nice.



> I think this draft is important in describing this issue and giving us
> written exploration of solution space, but I don't think the problem
> description needs to advance; ultimately, a solution document should be
> adopted and move forward.

So far we have elaborated on the problem only as much as necessary to
justify why we need a solution. I'd hope that at least by the time we
publish the next rev, the problem is well-understood (if it wasn't) and
it's clear that we should do something to solve it.

Thanks!

Cheers,
-- 
Fernando Gont
SI6 Networks
e-mail: fgont@si6networks.com
PGP Fingerprint: 6666 31C6 D484 63B2 8FB1 E3C4 AE25 0D55 1D4E 7492