Re: [IPv6] ULA vs. 1918

"Pascal Thubert (pthubert)" <pthubert@cisco.com> Mon, 19 June 2023 07:00 UTC

Return-Path: <pthubert@cisco.com>
X-Original-To: ipv6@ietfa.amsl.com
Delivered-To: ipv6@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 68CE8C14CEF9; Mon, 19 Jun 2023 00:00:42 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -11.895
X-Spam-Level:
X-Spam-Status: No, score=-11.895 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, DKIMWL_WL_HIGH=-0.001, DKIMWL_WL_MED=-0.001, DKIM_SIGNED=0.1, DKIM_VALID=-0.1, DKIM_VALID_AU=-0.1, DKIM_VALID_EF=-0.1, HTML_MESSAGE=0.001, RCVD_IN_DNSWL_MED=-2.3, RCVD_IN_MSPIKE_H5=0.001, RCVD_IN_MSPIKE_WL=0.001, RCVD_IN_ZEN_BLOCKED_OPENDNS=0.001, SPF_NONE=0.001, URIBL_DBL_BLOCKED_OPENDNS=0.001, URIBL_ZEN_BLOCKED_OPENDNS=0.001, USER_IN_DEF_DKIM_WL=-7.5] autolearn=ham autolearn_force=no
Authentication-Results: ietfa.amsl.com (amavisd-new); dkim=pass (1024-bit key) header.d=cisco.com header.b="Zpfd3dRo"; dkim=pass (1024-bit key) header.d=cisco.com header.b="GRTsGbR3"
Received: from mail.ietf.org ([50.223.129.194]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id 5oTyP0zNtbu7; Mon, 19 Jun 2023 00:00:38 -0700 (PDT)
Received: from rcdn-iport-1.cisco.com (rcdn-iport-1.cisco.com [173.37.86.72]) (using TLSv1.2 with cipher DHE-RSA-SEED-SHA (128/128 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id 838B4C14CF09; Mon, 19 Jun 2023 00:00:17 -0700 (PDT)
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/simple; d=cisco.com; i=@cisco.com; l=53386; q=dns/txt; s=iport; t=1687158017; x=1688367617; h=from:to:cc:subject:date:message-id:references: in-reply-to:mime-version; bh=+vEnEK9L7p7hpsuoHTtHUZtMdqtmvE6xTiMoC8gYK/A=; b=Zpfd3dRoHTf4+30Fue9mtvZriaTKjOJfUBrMGqWhO65Z6ub5Hjhxf7LV MlLsntCwoIlRCZKdDlmxhxRAWx6XpMRXMDsWT09/YDAqC559Hq5d6mRv5 +Ydg3IfUA5xCXgSTrJOlRPTPh8BFjqXuv2mitJEiyDvH8ReXoDjBTyjuF M=;
X-IPAS-Result: A0ACAACQ+49kmJNdJa1XAxkBAQEBAQEBAQEBAQEBAQEBAQESAQEBAQEBAQEBAQEBZYEWBAEBAQEBCwGBKwEwUnMCWRMXEkeEUYNMA4ROX4hVA4tVkhqBJQNRBQ8BAQENAQEuAQoLBAEBhQYCFoVnAiU0CQ4BAgICAQEBAQMCAwEBAQEBAQMBAQUBAQECAQcEFAEBAQEBAQEBHhkFDhAnhWgNhgQBAQEBAgEBARAIAQgEGQEBKwECCQENAgIBCBEEAQEBIAEGAwICAhkGBgsUCQgCBAENBQgaglwBghUNBgMOIwMBEKBmAYFAAoolen8zgQGCCAEBBgQFgU5BmkENgkkDBgWBPQGHVYFiAQGDXheEMScbgUlEgRVDgWaBAj6CIEIBAQIBgUUaBg8KDAkRgxQ5gi6JIT6BVw0MgmGDCYIWGC4HizmBKG+BHoEiegIJAhFngQgIX4FxQAINVQsLY4EcUjqBRgICEToUUngbAwcDgQUQLwcELwkWCQYJGC8lBlEHLSQJExVBBINYCoENPxUOEYJaIgIHNj8bUYFyBzYDRB1AAwtwPTUGDh8FBCMBSYFXMECBDQIhJJ9fLQM/FIFPEBUHAzwGAg9TBB0mEBQMAiQVIBEMKwIVCwYBARABBAEFFw0LQJIWERUBBwomgyqKZ4QTngdwCoQIi3yPE4YnF4QBjGyGbZEcYpgZIIIviwyDc5ZBAgQCBAUCDgEBBoFjOoFbcBU7gjMBATJSGQ+OChYMDQmDUoJkgXU7imV1AjsHAQuLVQEB
IronPort-PHdr: A9a23:SC8osxLXD791MoOD6tmcuakyDhhOgF28FhQe5pxijKpBbeH5uZ/jJ 0fYo/5qiQyBUYba7qdcgvHN++D7WGMG6Iqcqn1KbpFWVhEEhMlX1wwtCcKIEwv6edbhbjcxG 4JJU1o2t2qjPx1tEd3lL0bXvmX06DcTHhvlMg8gPvj1B4Tfldif3OGp8JqVaAJN13KxZLpoJ 0CupB7K/okO1JJ/I7w4zAfIpHYAd+VNkGVvI1/S1xqp7car95kl+CNV088=
IronPort-Data: A9a23:hXJd5q1njciYo0CTYPbD5cpxkn2cJEfYwER7XKvMYLTBsI5bp2MGn 2VNWDrTP62DY2b3KoggbYni80sF78WAxt5nHABo3Hw8FHgiRegpqji6wuYcGwvIc6UvmWo+t 512huHodZxyFjmGzvuUGuCJQUNUjclkfZKiTracUsxNbVU8Enx510syw7dRbrNA2LBVPSvc4 bsenOWHULOV82Yc3rU8sv/rRLtH5ZweiRtA1rAMTakjUGz2yxH5OKkiyZSZdBMUdGX78tmSH I4vxJnhlo/QEoxE5tmNyt4XeWVSKlLe0JTnZnd+A8CfbhZ+SiMaj6cyBv0sbGls0BrRmsFrx u5EsruycFJ8VkHMsLx1vxhwCSpyO+hN/6XKZCHm98eS1EbBNXDrxp2CDmlvYtZeobkxUDoIr KBHQNwORkjra+ae2K67V+NhnNgLJ8jwN4RZsXZlpd3cJal7GcuTGP2bjTNe9CoMl+8eGMz9X cccMStXdUjFPANRZlhCXfrSm8/x1iWgLFW0smm9qbA+7XSWxhFr2bfpMd2QZIKNXd4Qg0KR4 3/d8iHyCwoXL5qW1CaF9Wi3ru7CgS29X5gdfJW57uA0qFye2mJVDwcZPWZXutGjgUK4HtlYM UFRo3Nopqkp/0vtRd74N/GlnJKalkMdUuhXI+gU01qikq/F+QiiD28jTAcUPbTKq/QKbTAt0 1aImfbgCjpurKCZRBqhGlG88Gva1c89cDJqWMMUcecWy4K8/9xr33ojWv4mQfHl1ISkcd3l6 2nS9HBWulkFsSIcO0yGEb3vmTmgoN3CSRQ4o1yOGGmk9Qh+IoWiYuRECGQ3D94ecO51rXHY7 BDofvRyCshVUPlhcwTWEY0w8EmBvartDdElqQcH82Md3zqs4WW/Wotb/StzIkxkWu5dJ2+2O RaI4VgLvMMLVJdPUUORS9/vYyjN5fa4fekJqtiPBjazSsErLVTerH0GibC4hjm8zCDAbp3Ty b/CIZrzUh72+IxszSG9QK8GwKQ3yyUlrV4/trilpylLJYG2PSbPIZ9caQPmRrlgsMus/l6Pm /4BbJTi9vmqeLCkCsUh2dRNfQliwLlSLc2elvG7gcbcfVY3RDB4VJc8A9oJIuRYokicrc+Rl lmVUU5Dw125jnrCQThmoFg6AF8zdf6TdU4GABE=
IronPort-HdrOrdr: A9a23:qa7656AlvMDpu/HlHegFsceALOsnbusQ8zAXPh9KKCC9I/b3qy nxppsmPEfP+UkssREb8+xpOMG7MBThHO1OkPcs1NaZLUXbUQ6TTL2KgrGSuAEIdxeOk9K1kJ 0QD5SWa+eAQmSS7/yKmjVQeuxIqLLqgcPY59s2jU0dMD2CAJsQiTuRfzzranGeMzM2fKbReq DsgvavoQDMRV0nKuCAQlUVVenKoNPG0Lj8ZwQdOhIh4A6SyRu19b/TCXGjr1YjegIK5Y1n3X nOkgT/6Knmmeq80AXg22ja6IkTsMf9y+FEGNeHhqEuW3XRY0eTFcdcso+5zXUISdKUmRIXeR 730lAd1vFImjHsl6eO0F3QMkfboW8TAjTZuC6laDPY0LzErXQBeoR8bUYzSGqD16Lm1+sMiJ 6i0w+ixulqJAKFkyLn69fSURZ20kKyvHo5iOYWy2dSSI0EddZq3MciFW5uYd499RjBmcgaOf grCNuZ6OddcFucYXyctm5zwMa0VnB2GhudWEANtsGczjATxRlCvgYl7d1amm1F+IM2SpFC6e iBOqN0lKtWRstTaa5mHu8OTca+F2SISxPRN2CZJ0jhCcg8Sjjwgo+y5K9w6PCheZQOwpd3kJ PdUElAvWp3YE7qAd3m5uw8zvkMehTLYd3A8LAr23EigMyPeFPCC1z3dGwT
X-Talos-CUID: 9a23:1Xi+iWx7enh5PJm+PNm0BgVJG8kXdU3Y4kyLDBe9GHxnc7SSbl2prfY=
X-Talos-MUID: 9a23:bu4s1QxlgE6qhCXOfZOArNpoMASaqLmSGW9dlK8lgcSBbT1IImuY0yqpHoByfw==
X-IronPort-Anti-Spam-Filtered: true
Received: from rcdn-core-11.cisco.com ([173.37.93.147]) by rcdn-iport-1.cisco.com with ESMTP/TLS/DHE-RSA-SEED-SHA; 19 Jun 2023 07:00:15 +0000
Received: from rcdn-opgw-2.cisco.com (rcdn-opgw-2.cisco.com [72.163.7.163]) by rcdn-core-11.cisco.com (8.15.2/8.15.2) with ESMTPS id 35J708OH017320 (version=TLSv1.2 cipher=DHE-RSA-AES256-GCM-SHA384 bits=256 verify=OK); Mon, 19 Jun 2023 07:00:13 GMT
Authentication-Results: rcdn-opgw-2.cisco.com; dkim=pass (signature verified) header.i=@cisco.com; spf=Pass smtp.mailfrom=pthubert@cisco.com; dmarc=pass (p=quarantine dis=none) d=cisco.com
X-IronPort-AV: E=Sophos;i="6.00,254,1681171200"; d="scan'208,217";a="3129891"
Received: from mail-bn1nam02lp2040.outbound.protection.outlook.com (HELO NAM02-BN1-obe.outbound.protection.outlook.com) ([104.47.51.40]) by rcdn-opgw-2.cisco.com with ESMTP/TLS/ECDHE-RSA-AES256-GCM-SHA384; 19 Jun 2023 07:00:08 +0000
ARC-Seal: i=1; a=rsa-sha256; s=arcselector9901; d=microsoft.com; cv=none; b=CvLGt6bJYs6LGTb4Fr9qRV0yFdMzV3gkHmSvlhulEddiASx3ERA6b8nsa1kY6U7sPs9VEQRlSWHVn+nLjAL7l+3O936yYQ+lc79qImWrRCuoNif8KryGMLATsFzwNw3Rb+77E4WWPtjf6WQH3ZzP1kFRh1cSN4AB0Wn7S80tF+FSkzpJCjJQRGqtj1MAOIpuG05BguvJf0Coe+U60msT4Z8JIutPrquT29hLQ1ETg6xrSp3Utdp2053Z7BZC3uwNWpUax0OW9h20Bu7mJ1KcHf0C/h8fu1I2Eyt1JhYXs6Fv5zuTzlfhRHGHokHHHMQj+w+jI2Mh8KJrvozk24LBQA==
ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=microsoft.com; s=arcselector9901; h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-AntiSpam-MessageData-ChunkCount:X-MS-Exchange-AntiSpam-MessageData-0:X-MS-Exchange-AntiSpam-MessageData-1; bh=+vEnEK9L7p7hpsuoHTtHUZtMdqtmvE6xTiMoC8gYK/A=; b=IWiu6EvYbta7xL+8namAaeEaccu/hOwoZEVZYaXY3wLcDz6q7sfuWRPxLI4x6GNr2q0OTgPpHctuTAHOxM5uvEMsjEbwf5lW+ZYyIGGNNuGC/zoaWb7/ysRK/PMkaHslS4KY1qEJltCGZa44eQP2mw2Z0qmgkBiFMXOQppkdVmP7922FEv+jXVBr7j/UFsUseTk3TiW+deo1KjoH1udrVDBON82Tbf8Qxvp+JLvrVpwBlJe91RP7ZpBtpctuKfZaVp0j11U2N7X3ofnGpMzCvGa3fLhRwFsCs6lpfiGDyiDkesorz7MJcayH6tKy2M/NMaG3IEcEMKT2Kl/MiVBuNw==
ARC-Authentication-Results: i=1; mx.microsoft.com 1; spf=pass smtp.mailfrom=cisco.com; dmarc=pass action=none header.from=cisco.com; dkim=pass header.d=cisco.com; arc=none
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=cisco.com; s=selector1; h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-SenderADCheck; bh=+vEnEK9L7p7hpsuoHTtHUZtMdqtmvE6xTiMoC8gYK/A=; b=GRTsGbR35lAz5VigwgifUDh2Ajo/14WHDmuYGzMeUYPRlJvQJAtTxOapupyHfsNORMmtvigwNU6Sa54joNWRXhwPraXsfG+M9uhv1DWnkpiBYw+LCyw9u9BeRd1zu10fZl2dx7JluL9tkAuV2xTzJPOQeJMFqihRJcq3e3DXM4Q=
Received: from CO1PR11MB4881.namprd11.prod.outlook.com (2603:10b6:303:91::20) by BL3PR11MB6436.namprd11.prod.outlook.com (2603:10b6:208:3bc::11) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id 15.20.6500.36; Mon, 19 Jun 2023 07:00:05 +0000
Received: from CO1PR11MB4881.namprd11.prod.outlook.com ([fe80::140c:d7a2:4d4c:8739]) by CO1PR11MB4881.namprd11.prod.outlook.com ([fe80::140c:d7a2:4d4c:8739%7]) with mapi id 15.20.6500.036; Mon, 19 Jun 2023 07:00:05 +0000
From: "Pascal Thubert (pthubert)" <pthubert@cisco.com>
To: Brian E Carpenter <brian.e.carpenter@gmail.com>, Mark Andrews <marka@isc.org>, Ted Lemon <mellon@fugue.com>
CC: 6man list <ipv6@ietf.org>, "draft-buraglio-v6ops-ula-use-cases.authors@ietf.org" <draft-buraglio-v6ops-ula-use-cases.authors@ietf.org>
Thread-Topic: [IPv6] ULA vs. 1918
Thread-Index: AQHZnh6QpEvEDttOvkqs/AsdkMKBiq+JFu6AgAAlP4CAAFAGAIAAC+AAgACBsgCAAE9HgIAApKcAgAAJ5L+AABHrAIABYDYAgAABeACAAFxmAIABHFAAgAO0a5U=
Date: Mon, 19 Jun 2023 07:00:05 +0000
Message-ID: <CO1PR11MB48814737B06D969386957834D85FA@CO1PR11MB4881.namprd11.prod.outlook.com>
References: <CAJU8_nWQo_p6U_89Rj-ktj4meJumQzaD4h3hKMSc3b1AJt=JVA@mail.gmail.com> <317CA10B-09AC-4BFA-8B38-394BE47754C3@gmail.com> <EDEB755D-0B6D-4B37-A875-BE5FA683FE7C@isc.org> <bd0fd531-ee19-195c-0b4b-02df553e39d3@gmail.com> <5DE1EC8B-950A-4285-B96F-AE8A8F02115B@isc.org> <CAPt1N1kxryaPOXnBk+Z5Xp7P-zv5eYpMUeuH99M4nnHD6ckctQ@mail.gmail.com> <FC7FF634-C030-4680-841F-78B4704C694D@isc.org> <a555100d-fb0d-9118-fc34-fa40d3a7cbfa@gmail.com>
In-Reply-To: <a555100d-fb0d-9118-fc34-fa40d3a7cbfa@gmail.com>
Accept-Language: fr-FR, en-US
Content-Language: fr-FR
X-MS-Has-Attach:
X-MS-TNEF-Correlator:
msip_labels:
x-ms-publictraffictype: Email
x-ms-traffictypediagnostic: CO1PR11MB4881:EE_|BL3PR11MB6436:EE_
x-ms-office365-filtering-correlation-id: 34963802-564b-4994-5023-08db7092cfd5
x-ms-exchange-senderadcheck: 1
x-ms-exchange-antispam-relay: 0
x-microsoft-antispam: BCL:0;
x-microsoft-antispam-message-info: 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
x-forefront-antispam-report: CIP:255.255.255.255; CTRY:; LANG:en; SCL:1; SRV:; IPV:NLI; SFV:NSPM; H:CO1PR11MB4881.namprd11.prod.outlook.com; PTR:; CAT:NONE; SFS:(13230028)(376002)(136003)(39860400002)(346002)(396003)(366004)(451199021)(186003)(8676002)(8936002)(66946007)(66556008)(66446008)(66476007)(64756008)(66899021)(5660300002)(76116006)(110136005)(54906003)(4326008)(71200400001)(7696005)(40140700001)(33656002)(316002)(38100700002)(478600001)(41300700001)(966005)(26005)(53546011)(9686003)(6506007)(55016003)(91956017)(122000001)(66574015)(30864003)(38070700005)(86362001)(2906002)(83380400001)(19627405001)(166002)(52536014); DIR:OUT; SFP:1101;
x-ms-exchange-antispam-messagedata-chunkcount: 1
x-ms-exchange-antispam-messagedata-0: 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
Content-Type: multipart/alternative; boundary="_000_CO1PR11MB48814737B06D969386957834D85FACO1PR11MB4881namp_"
MIME-Version: 1.0
X-OriginatorOrg: cisco.com
X-MS-Exchange-CrossTenant-AuthAs: Internal
X-MS-Exchange-CrossTenant-AuthSource: CO1PR11MB4881.namprd11.prod.outlook.com
X-MS-Exchange-CrossTenant-Network-Message-Id: 34963802-564b-4994-5023-08db7092cfd5
X-MS-Exchange-CrossTenant-originalarrivaltime: 19 Jun 2023 07:00:05.7342 (UTC)
X-MS-Exchange-CrossTenant-fromentityheader: Hosted
X-MS-Exchange-CrossTenant-id: 5ae1af62-9505-4097-a69a-c1553ef7840e
X-MS-Exchange-CrossTenant-mailboxtype: HOSTED
X-MS-Exchange-CrossTenant-userprincipalname: 7LKbz+FuKKrRX8Q6Ikj0D2uFvvL+mCfNAIs6IfxHAqdKT5d5XYICyEwPj0IdN/bnKzvn0IrXRVhIkgNj4tjH0g==
X-MS-Exchange-Transport-CrossTenantHeadersStamped: BL3PR11MB6436
X-Outbound-SMTP-Client: 72.163.7.163, rcdn-opgw-2.cisco.com
X-Outbound-Node: rcdn-core-11.cisco.com
Archived-At: <https://mailarchive.ietf.org/arch/msg/ipv6/bMBhkef8_b0irjUcOyuRJGBV45g>
Subject: Re: [IPv6] ULA vs. 1918
X-BeenThere: ipv6@ietf.org
X-Mailman-Version: 2.1.39
Precedence: list
List-Id: "IPv6 Maintenance Working Group \(6man\)" <ipv6.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/ipv6>, <mailto:ipv6-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/ipv6/>
List-Post: <mailto:ipv6@ietf.org>
List-Help: <mailto:ipv6-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/ipv6>, <mailto:ipv6-request@ietf.org?subject=subscribe>
X-List-Received-Date: Mon, 19 Jun 2023 07:00:42 -0000

I can imagine the complexity. We live through it every time 2 companies with an RFC 1918 private network in the same range merge. And it happens all the time. This is actually one of the arguments for going v6. Now, that argument would only work for GUAs.
With NEMO we had that use case called nested NEMO where cars own prefixes and attach to one another in a daisy chain or a MANET to reach the internet. a car would build a CoA from another car's network.
The there's a home gateway with its RFC 1918 prefix out of the box. I guess we'd like to translate that into ULAs. What if I have 2 of them? Seems to me that SLAC is probably taking us to scenarios where there are more than 1 ULA prefix at home.
Bottom line is that I cannot see that we can avoid having more than one ULA prefix in a site, and interconnecting sites with different ULA prefixes.
If we cannot take the complexity, there's probably no point wasting time on ULAs.

regards,

Pascal
________________________________
De : ipv6 <ipv6-bounces@ietf.org> de la part de Brian E Carpenter <brian.e.carpenter@gmail.com>
Envoyé : samedi 17 juin 2023 00:15
À : Mark Andrews <marka@isc.org>; Ted Lemon <mellon@fugue.com>
Cc : 6man list <ipv6@ietf.org>; draft-buraglio-v6ops-ula-use-cases.authors@ietf.org <draft-buraglio-v6ops-ula-use-cases.authors@ietf.org>
Objet : Re: [IPv6] ULA vs. 1918

On 16-Jun-23 17:17, Mark Andrews wrote:
> I don’t think what I wrote is in disagreement with Kyle.  Kyle has a simplified scenario.  Every ULA is in the same site.  This is not always the case.  In fact every CPE router lives in two (or more) sites regardless of whether ULA are in use or not.  Bastion hosts often live in multiple sites.
>
> I’d actually like to publish ULAs tied to a globally unique site identifier in the DNS and have getaddrinfo optionally filter out non local ULAs.  Yes it would require moving to something other that AAAA records.

That would be a gross misuse of ULAs and would create unimaginable operational complexities. ULAs don't cross site boundaries, and every CE router is supposed to enforce that (RFC 7084, recommendation ULA-4).

ULAs are site-local, end of story.

    Brian

>
>> On 16 Jun 2023, at 09:47, Ted Lemon <mellon@fugue.com> wrote:
>>
>> Mark, I think you should reread what Kyle wrote. I agree with it 100%. The reason to black hole fc00::/7 is to avoid losing when there is a misconfiguration. It is unnecessary when things are configured correctly. I think Kyle’s analysis of the failure modes was spot on.
>>
>> Op do 15 jun 2023 om 19:42 schreef Mark Andrews <marka@isc.org>
>>
>>
>>> On 15 Jun 2023, at 12:41, Brian E Carpenter <brian.e.carpenter@gmail.com> wrote:
>>>
>>> On 15-Jun-23 13:36, Mark Andrews wrote:
>>>> Local to where?  ULAs leak.  They are published in the global DNS.  They end up in other places like /etc/hosts. They end up being used on sites they are not local too.
>>>
>>> Where they cannot possibly work. So it really doesn't matter if such misconfigurations don't work with whatever we do under the banner of RFC6724bis - they are irretrievably broken and not worth discussing in 6man.
>>>
>>>     Brian
>>
>> We have most of ::/0 reachable.  We have most of fc00::/7 that is unreachable (actively null routed).  We have some local parts of fc00::/7 that we know are reachable.
>>
>> We have every node being multi-homed in multiple ways.  IPv4 (maybe partitioned), LL (multiple scopes), ULA (multiple sites), GUA (maybe partitioned).
>>
>> Now we can have every node run a routing protocol so that we know which parts of fc00::/7 are reachable via which interfaces or we can distribute tables or we can build up approximate tables from the interfaces.  We need tables even if we have no leaks of addresses as longest match will produce the WRONG match on nodes connected to multiple sites of you treat ULA as a single entity.  We also need rules for how to combine tables learnt from different interfaces.
>>
>>>>> On 15 Jun 2023, at 11:05, Fred Baker <fredbaker.ietf@gmail.com> wrote:
>>>>>
>>>>> Under what circumstances would a Unique Local Address not be local?
>>>>>
>>>>> Sent using a machine that autocorrects in interesting ways...
>>>>>
>>>>>> On Jun 14, 2023, at 6:02 PM, Kyle Rose <krose@krose.org> wrote:
>>>>>>
>>>>>> Thanks, but boy, am I sorry I kicked the hornet's nest. ;-)  I was not aiming to reignite what appears to be a long-running debate, but maybe it's unavoidable.
>>>>>>
>>>>>> I'm thinking an explanation of my particular (I think pretty natural?) use case would provide context for what I'm looking to solve.
>>>>>>
>>>>>> Here are my priors:
>>>>>>
>>>>>> (1) Machines on my LAN are assigned 1918 addresses either statically or by DHCP, but IPv4 may be broken on any particular client for unstated reasons.
>>>>>>
>>>>>> (2) Machines on my LAN self-assign IPv6 addresses using SLAAC, both with my network's ULA prefix and with my provider's (cascaded) PD assignment. (But I think this could be replaced by static assignment or via DHCPv6 without changing any of the analysis, as long as the addresses are assigned with the same prefixes.) As with IPv4, IPv6 could be broken for unstated reasons: a client could lack either a ULA or a GUA or both.
>>>>>>
>>>>>> (3) I run my own internal DNS that resolves internal service names only to other internal nodes: all others get denied.
>>>>>>
>>>>>> (4) If I see a ULA in a DNS response, that is either some reachable node, or is a misconfiguration. (I.e., I should not encounter a ULA that is unreachable via my internal network routing topology, and if I do, I screwed up.)
>>>>>>
>>>>>> Here are my goals:
>>>>>>
>>>>>> (a) Resolve internal service names to both IPv4 and IPv6 addresses, and do so statically (without the use of ddns).
>>>>>>
>>>>>> (b) Internal connections should not fail because of a change in provider PD.
>>>>>>
>>>>>> (c) Always connect successfully when either IPv4 or IPv6 (or both) is working.
>>>>>>
>>>>>> (d) Nice-to-have: Prefer IPv6 when available.
>>>>>>
>>>>>> If internal service names have A records to 1918 addresses and AAAA records to ULAs, goals (a) and (b) are satisfied. However, goals (c) and (d) are not satisfied so long as ULA has a different label than GUA and lower precedence than IPv4:
>>>>>>
>>>>>> * IPv4 will be preferred internally because of the GUA/ULA label mismatch and the lower precedence of ULA compared to IPv4. This violates goal (d).
>>>>>>
>>>>>> * Happy eyeballs will consider only IPv4 destinations for the same reason, so if IPv4 is broken in some unknown way, the client will never even try IPv6. This violates goal (c).
>>>>>>
>>>>>> My contention is that removing the lower precedence while keeping the distinct label for ULA resolves this issue by putting ULA and IPv4 back on the same footing for internal connections.
>>>>>>
>>>>>> Among the side-effect implications of this change are:
>>>>>>
>>>>>> * Under normal circumstances a client will never try to connect GUA->ULA or ULA->GUA, as v4 would be preferred via the ULA/GUA label mismatch. The former would be benign, but the latter would run into the lack of NAT66 at the network boundary, which I don't implement and I get the feeling is not very common. If both GUA and IPv4 are broken, a client would try and probably fail; but at that point you're in best effort territory anyway.
>>>>>>
>>>>>> * ULA->ULA will always be preferred over other possibilities, which means services exposing both a ULA and a GUA via DNS (or some other means of rendezvous) had better be reachable via ULA. If they aren't, go back to prior (4): this is a misconfiguration. Don't expose addresses clients can't reach under the assumption that address selection will somehow prevent connection failures (!!)
>>>>>>
>>>>>> Does this make sense?
>>>>>>
>>>>>> Thanks,
>>>>>> Kyle
>>>>>>
>>>>>>
>>>>>>
>>>>>> On Wed, Jun 14, 2023 at 11:12 AM Nick Buraglio <buraglio@forwardingplane.net> wrote:
>>>>>> FWIW with the collaboration of one of the original authors, there is a completed update draft for 6724 that will be submitted for input to 6man that addresses some of these issues very, very soon.
>>>>>>
>>>>>> nb
>>>>>>
>>>>>> On Wed, Jun 14, 2023 at 1:28 PM Vasilenko Eduard <vasilenko.eduard@huawei.com> wrote:
>>>>>> The fixed table may work:
>>>>>> “Rule 5: Prefer matching label” would not permit to use ULA to connect GUA
>>>>>> And
>>>>>> “Rule 6: Prefer higher precedence” could prioritize ULA below GUA but above IPv4
>>>>>>   It would cover the situation with many /48 in one organization.
>>>>>>   If destination has only ULA DNS record (for internal host) – then connection would happen over ULA.
>>>>>> Ed/
>>>>>> From: ipv6 [mailto:ipv6-bounces@ietf.org] On Behalf Of Mark Andrews
>>>>>> Sent: Wednesday, June 14, 2023 5:45 AM
>>>>>> To: Lorenzo Colitti <lorenzo=40google.com@dmarc.ietf.org>
>>>>>> Cc: ipv6@ietf.org; draft-buraglio-v6ops-ula-use-cases.authors@ietf.org
>>>>>> Subject: Re: [IPv6] ULA vs. 1918
>>>>>>   We need to stop thinking about ULA as a single thing but rather ULA  scoped addressed /10 and directly connected (reachable) ULA prefixes /48s.
>>>>>>    A FIXED table does not work if the node has ULA addresses. The stack needs to add entries based on the contents of the RAs the node sees.
>>>>>>    The light bulb needs a little bit of smarts.
>>>>>> --
>>>>>> Mark Andrews
>>>>>>
>>>>>>
>>>>>> On 14 Jun 2023, at 12:02, Lorenzo Colitti <lorenzo=40google.com@dmarc.ietf.org> wrote:
>>>>>>  I think the problem is that if we just remove ULA from the table, then ULA-to-GUA (or GUA-to-ULA) will be preferred over IPv4-to-IPv4, which is not what we want because IPv4 addresses have global reachability but ULAs do not. So ULA needs to remain in the table because it needs its own label.
>>>>>>    On Wed, Jun 14, 2023 at 6:16 AM Kyle Rose <krose@krose.org> wrote:
>>>>>> Thanks, Ed. I've added the draft authors pseudo-address to this reply.
>>>>>>    I read the draft. I *believe* one bit of confusion I initially ran into is cleared up by the destination address selection rules in RFC 6724 section 6, but I'd like some confirmation. If the local dual-stack machine has a 1918 address (NATed by the site's firewall) and only a ULA for v6 (*not* NATed), and attempts to connect to a dual-stack server on the public internet, destination address selection would prefer the server's v4 address because label(dest_v4)=label(src_v4) while label(dest_v6) != label(src_v6) under the rules that assign GUA and ULA addresses different labels.
>>>>>>    Is that right?
>>>>>>    If so, I think the implication here bears stating in the document: that simply removing the reduced precedence for ULA addresses specified in section 2.1 of 6724 would typically result in dual stack clients connecting to dual stack servers via:
>>>>>>     * v6 when the client has GUA and the server is available via GUA, or when the client has ULA and the server is available via ULA
>>>>>>   * v4 otherwise
>>>>>>    which AFAICT is the behavior I want for my site with GUA via DHCPv6 PD:
>>>>>>     * Use GUA when server offers GUA and the client has GUA
>>>>>>   * Use ULA when server offers ULA but not GUA (e.g., service is internal and DNS is static and therefore has only ULA and 1918 records) or when server offers both ULA and GUA but client lacks GUA
>>>>>>   * Use v4 when server offers GUA but not ULA and client lacks GUA (i.e., assume ULA will be blackholed at the firewall)
>>>>>>    I'll note that I already observe this behavior in my Debian bookworm installations, which suggests the defaults specified in comments in /etc/gai.conf (which matches the gai.conf quoted in the draft) accurately represent the default behavior of Debian's getaddrinfo build.
>>>>>>    Kyle
>>>>>>      On Tue, Jun 13, 2023 at 3:02 PM Ed Horley <ed@hexabuild.io> wrote:
>>>>>> Kyle,
>>>>>> Nick and Russ did some work around this in a draft, please see: https://datatracker.ietf.org/doc/draft-buraglio-v6ops-ula-use-cases/
>>>>>> The goal was to define the problem so that a reasonable approach to addressing the issue could be done because everyone has a common understanding of the issue.
>>>>>> I know that Brian was also working with Nick around seeing if it makes sense to update RFC 6724 (In my opinion it likely does) but it still does not solve the problem for the short to medium term (5 years or less - is that medium term?)
>>>>>> Regards,
>>>>>> Ed
>>>>>>    On Tue, Jun 13, 2023 at 10:43 AM Kyle Rose <krose@krose.org> wrote:
>>>>>> After recently learning that default address selection recommended by RFC 6724 prefers (v4) 1918 addresses to (v6) ULA addresses, I did a brief list archive search and found what I think is the most recent discussion of this on the list, from September of last year:
>>>>>>    https://mailarchive.ietf.org/arch/msg/ipv6/tGYV3jeKDOKH-BcQu7uRXIJcaY8/
>>>>>>    It doesn't seem to have been resolved one way or the other, unless some discussions happened off-list that weren't later captured there. Does 6man have an official position on whether or not to rev default address selection? I know there is significant interest in at least preferring ULA to 1918, i.e., vs. treating ULA as equivalent to GUA and therefore preferring ULA to all of IPv4; but I don't want to reopen something that has been definitively rejected by the WG for good reasons.
>>>>>>    Thanks,
>>>>>> Kyle
>>>>>>    --------------------------------------------------------------------
>>>>>> IETF IPv6 working group mailing list
>>>>>> ipv6@ietf.org
>>>>>> Administrative Requests: https://www.ietf.org/mailman/listinfo/ipv6
>>>>>> --------------------------------------------------------------------
>>>>>>
>>>>>>    --
>>>>>> Ed Horley
>>>>>> ed@hexabuild.io | (925) 876-6604
>>>>>> Advancing Cloud, IoT, and Security with IPv6
>>>>>> https://hexabuild.io
>>>>>> And check out the IPv6 Buzz Podcast at https://packetpushers.net/series/ipv6-buzz/
>>>>>> --------------------------------------------------------------------
>>>>>>
>>>>>> IETF IPv6 working group mailing list
>>>>>> ipv6@ietf.org
>>>>>> Administrative Requests: https://www.ietf.org/mailman/listinfo/ipv6
>>>>>> --------------------------------------------------------------------
>>>>>> --------------------------------------------------------------------
>>>>>> IETF IPv6 working group mailing list
>>>>>> ipv6@ietf.org
>>>>>> Administrative Requests: https://www.ietf.org/mailman/listinfo/ipv6
>>>>>> --------------------------------------------------------------------
>>>>>> --------------------------------------------------------------------
>>>>>> IETF IPv6 working group mailing list
>>>>>> ipv6@ietf.org
>>>>>> Administrative Requests: https://www.ietf.org/mailman/listinfo/ipv6
>>>>>> --------------------------------------------------------------------
>>>>>> --------------------------------------------------------------------
>>>>>> IETF IPv6 working group mailing list
>>>>>> ipv6@ietf.org
>>>>>> Administrative Requests: https://www.ietf.org/mailman/listinfo/ipv6
>>>>>> --------------------------------------------------------------------
>>
>> --
>> Mark Andrews, ISC
>> 1 Seymour St., Dundas Valley, NSW 2117, Australia
>> PHONE: +61 2 9871 4742              INTERNET: marka@isc.org
>>
>> --------------------------------------------------------------------
>> IETF IPv6 working group mailing list
>> ipv6@ietf.org
>> Administrative Requests: https://www.ietf.org/mailman/listinfo/ipv6
>> --------------------------------------------------------------------
>
--------------------------------------------------------------------
IETF IPv6 working group mailing list
ipv6@ietf.org
Administrative Requests: https://www.ietf.org/mailman/listinfo/ipv6
--------------------------------------------------------------------