Re: Confirmation to advance: draft-ietf-6man-ipv6only-flag-05

Nick Hilliard <nick@foobar.org> Tue, 28 May 2019 12:28 UTC

Return-Path: <nick@foobar.org>
X-Original-To: ipv6@ietfa.amsl.com
Delivered-To: ipv6@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 8769512012E for <ipv6@ietfa.amsl.com>; Tue, 28 May 2019 05:28:45 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -4.2
X-Spam-Level:
X-Spam-Status: No, score=-4.2 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, RCVD_IN_DNSWL_MED=-2.3, SPF_HELO_NONE=0.001, SPF_PASS=-0.001] autolearn=ham autolearn_force=no
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id ADjkTV3rGN4W for <ipv6@ietfa.amsl.com>; Tue, 28 May 2019 05:28:43 -0700 (PDT)
Received: from mail.netability.ie (mail.netability.ie [IPv6:2a03:8900:0:100::5]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-SHA (256/256 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id 7E14112004C for <ipv6@ietf.org>; Tue, 28 May 2019 05:28:43 -0700 (PDT)
X-Envelope-To: ipv6@ietf.org
Received: from crumpet.local (089-101-070074.ntlworld.ie [89.101.70.74] (may be forged)) (authenticated bits=0) by mail.netability.ie (8.15.2/8.15.2) with ESMTPSA id x4SCSdFL019571 (version=TLSv1.2 cipher=ECDHE-RSA-AES256-SHA bits=256 verify=NO); Tue, 28 May 2019 13:28:40 +0100 (IST) (envelope-from nick@foobar.org)
X-Authentication-Warning: cheesecake.ibn.ie: Host 089-101-070074.ntlworld.ie [89.101.70.74] (may be forged) claimed to be crumpet.local
Subject: Re: Confirmation to advance: draft-ietf-6man-ipv6only-flag-05
To: Sander Steffann <sander@steffann.nl>
Cc: Mark Smith <markzzzsmith@gmail.com>, 6man WG <ipv6@ietf.org>
References: <F8BFFCAD-E58E-4736-8A1C-56579B6F6032@employees.org> <CAN-Dau040j6U+1CCn0QJiVMy2nVShHqqSFdCkM-FbMAH-2wjRA@mail.gmail.com> <m1hQCYr-0000KBC@stereo.hq.phicoh.net> <561d9dc3-c769-c774-8f65-f975ac2a10a0@gont.com.ar> <m1hT1DZ-0000HEC@stereo.hq.phicoh.net> <ce07ade8-5105-055f-4798-f4ef20a2393c@si6networks.com> <CAN-Dau02MYCrKx2BgyuYJeHBdoz6SHCnp+-byM+LMM8af0S+rA@mail.gmail.com> <40e99171-6dda-29e3-6152-da5ca5219ed9@foobar.org> <CAN-Dau0ALqfAA-Dz56oHAfOtY7E2obx5E7TgoeH357Mckp3t9g@mail.gmail.com> <093ba8e2-6f0a-4c91-9df1-cda33fffea97@foobar.org> <CAN-Dau3kVqb+ZEHB7iPGeRuq1Mu8UHR3FEZv8SgmiqZexaFhuA@mail.gmail.com> <12db9629-f92a-e12a-5ff1-7db2c5d2137e@foobar.org> <F6F0C9DC -545E-4FE5-BB4C-55BB29022E84@steffann.nl> <CAO42Z2yUDi3FHOZsLrHqwLsEWkB1X9FREa8m6dU6ecOr=SsX4g@mail.gmail.com> <E51102E7-D4F0-4469-8888-5072F624EE06@steffann.nl> <CAO42Z2ycyMP4vAM+emyVqsF9GLvzpk1Jf6g-dHL4YOUc_iNzqg@mail.gmail.com> <359DAB5C-B700-45BC-944E-DA1BF2B01B6A@steffann.nl>
From: Nick Hilliard <nick@foobar.org>
Message-ID: <81ffa00c-8159-c5a2-11e4-3c605ec0769b@foobar.org>
Date: Tue, 28 May 2019 13:28:38 +0100
User-Agent: Mozilla/5.0 (Macintosh; Intel Mac OS X 10.14; rv:52.0) Gecko/20100101 PostboxApp/6.1.18
MIME-Version: 1.0
In-Reply-To: <359DAB5C-B700-45BC-944E-DA1BF2B01B6A@steffann.nl>
Content-Type: text/plain; charset="utf-8"; format="flowed"
Content-Language: en-US
Content-Transfer-Encoding: 7bit
Archived-At: <https://mailarchive.ietf.org/arch/msg/ipv6/f0pSZsvf5FS_GQNaKQ3DMPIYxWg>
X-BeenThere: ipv6@ietf.org
X-Mailman-Version: 2.1.29
Precedence: list
List-Id: "IPv6 Maintenance Working Group \(6man\)" <ipv6.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/ipv6>, <mailto:ipv6-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/ipv6/>
List-Post: <mailto:ipv6@ietf.org>
List-Help: <mailto:ipv6-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/ipv6>, <mailto:ipv6-request@ietf.org?subject=subscribe>
X-List-Received-Date: Tue, 28 May 2019 12:28:46 -0000

Sander Steffann wrote on 28/05/2019 09:44:
>> Doesn't solve the problem of hosts needlessly, wastefully and 
>> persistently trying to acquire IPv4 addresses that they'll never
>> get.
>> 
>> It's making hosts into hamsters in wheels, activity with no
>> progress.
> 
> Hosts that persistently keep asking for IPv4 leases despite being
> told "no" can be fixed much easier than by adding a new flag to
> IPv6... And hosts that keep misbehaving can't be expected to
> implement the flag either.

stepping back up the problem stack a bit, no adequate problem 
characterisation has been performed. So far, a single ipv6-only 
deployment case has been identified which merits some examination in the 
context of the draft's problem statement, namely large partially-managed 
wifi networks with BYOD.  Fully managed networks can use host management 
or ACLs to block ipv4 chatter.  Fully unmanaged large wifi networks are 
outside scope.

Last week with the help of some RIPE NCC staff, we did some rough 
characterisation of background chatter on the nat64 network at the RIPE 
meeting in Reykjavik.  The results showed that by packet count, in 
excess of 60% of the background ipv4 traffic was mdns and another 20-25% 
was netbios.  The remainder was a mixture of things (ARP, SSDP, random 
link-local, etc). Less than 1% of packets were DHCP requests.

These are very rough figures btw, i.e. barely anecdote-grade, but they 
suggest that support for the RFC2563 DHCP flag to disable IPv4 LL 
addresses should be sufficient to squish the overwhelming bulk of ipv4 
background noise.  If the numbers are even remotely representative of 
longer term data, then the remaining chatter would be operationally 
irrelevant.

We're planning to set up a more comprehensive set of counters at the 
next ripe meeting to get some better quality numbers.

Nick