Re: [IPv6] Second Working Group Last Call for <draft-ietf-6man-rfc6724-update>

Kyle Rose <krose@krose.org> Mon, 15 April 2024 16:19 UTC

Return-Path: <krose@krose.org>
X-Original-To: ipv6@ietfa.amsl.com
Delivered-To: ipv6@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 75E4CC14F69E for <ipv6@ietfa.amsl.com>; Mon, 15 Apr 2024 09:19:51 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -2.095
X-Spam-Level:
X-Spam-Status: No, score=-2.095 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, DKIM_SIGNED=0.1, DKIM_VALID=-0.1, DKIM_VALID_AU=-0.1, DKIM_VALID_EF=-0.1, HTML_MESSAGE=0.001, RCVD_IN_ZEN_BLOCKED_OPENDNS=0.001, SPF_HELO_NONE=0.001, SPF_PASS=-0.001, URIBL_BLOCKED=0.001, URIBL_DBL_BLOCKED_OPENDNS=0.001, URIBL_ZEN_BLOCKED_OPENDNS=0.001] autolearn=ham autolearn_force=no
Authentication-Results: ietfa.amsl.com (amavisd-new); dkim=pass (1024-bit key) header.d=krose.org
Received: from mail.ietf.org ([50.223.129.194]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id b6Df7awJ82FS for <ipv6@ietfa.amsl.com>; Mon, 15 Apr 2024 09:19:47 -0700 (PDT)
Received: from mail-lf1-x134.google.com (mail-lf1-x134.google.com [IPv6:2a00:1450:4864:20::134]) (using TLSv1.3 with cipher TLS_AES_128_GCM_SHA256 (128/128 bits) key-exchange X25519 server-signature RSA-PSS (2048 bits) server-digest SHA256) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id 58B66C14F60D for <ipv6@ietf.org>; Mon, 15 Apr 2024 09:19:47 -0700 (PDT)
Received: by mail-lf1-x134.google.com with SMTP id 2adb3069b0e04-516d2600569so4237641e87.0 for <ipv6@ietf.org>; Mon, 15 Apr 2024 09:19:47 -0700 (PDT)
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=krose.org; s=google; t=1713197985; x=1713802785; darn=ietf.org; h=cc:to:subject:message-id:date:from:in-reply-to:references :mime-version:from:to:cc:subject:date:message-id:reply-to; bh=sjpd2jXIMW/V0b/aTikg6A9hMfXKyaInxJbE43gNbs4=; b=jDP3sfiedknLsbuZxBT26YPIks5HdnAjxVQgaTMJWSo2cwCCl7mDteYbypFzBZbQ0g uvAHi6yDUF6HT5NtGFDYghwRaeamXvz7+4CxtUYb8p7d66f1I0mif8BUlt1WY8OudZP9 qAhsOl8lj4XAu5dcxUU1RPMVCPI+Oxm6LBo2A=
X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20230601; t=1713197985; x=1713802785; h=cc:to:subject:message-id:date:from:in-reply-to:references :mime-version:x-gm-message-state:from:to:cc:subject:date:message-id :reply-to; bh=sjpd2jXIMW/V0b/aTikg6A9hMfXKyaInxJbE43gNbs4=; b=cRMj5gESW8mjoh9rqycHEMHAOsbeECRe/WQ/6/cmkaxldum4o3KmijxtKz7F13CDLX 9eXJ/ekiIBRWUiSV6ROGumOwMqAiYB4lWr34zWxWWiXPZs51ZbizmEYDQCm450HCsbRa HawN2hobleLKLUD/pDojjqCRcfczEU9jnk8nDXW9336n5vsfnRrF4EHkNE4kvX9/ZBBz 76QWFK5IpHQazhdiV8CV88Gi9Y+78dup4FWgCD0kHCqzXUPmASDiZT7qNZpc9/ed38AJ OQZGXkvxIWfuANdSyEkKzgA4Dppv2VlIRfu3ox3HbhPPdZdldQKGkrJ3k3tDwRULO3+k wATA==
X-Forwarded-Encrypted: i=1; AJvYcCUK0LT4rHRDB7juRLFiC26W5unVxwbJek+wQAu3P+PhWIWkj0fRBknr8UcSbi4XY8UKO2dH/7in18TU69Gr
X-Gm-Message-State: AOJu0YxYkaDcGS7YPlaPbBGRYTzmE8Tb2SJf5i8/GTLNobNvR10CxDk5 uy8t2KJzWsQ2TWi9xTtjAYIefb9mT2N5o+9q0SRkJ0s1MS1iPqBRv70eath1ST+3DxslkLlV3KV VovC3RLqAlu2AMUpFNPkgvWN6KVbP4oKDBHJ2fw==
X-Google-Smtp-Source: AGHT+IHPn0adxhEaodY+wmkfr6av+zqGG5R0g6loH/xW4NfzV1W2eSKGQlmis8kDyEi4sGsJMIcmcUJOoRceMkx4WPg=
X-Received: by 2002:a19:915e:0:b0:516:d4c2:53eb with SMTP id y30-20020a19915e000000b00516d4c253ebmr6888107lfj.58.1713197985150; Mon, 15 Apr 2024 09:19:45 -0700 (PDT)
MIME-Version: 1.0
References: <6A5E5F35-B35F-4358-8EE1-3BD82329141E@jisc.ac.uk> <6FBC1B5A-BF28-4B05-B2B2-A60DA4707755@gmail.com> <CAPt1N1m-Ye8vfOVnsPesFshLMV5QuVoxWqM=HVZiJ37zaBg6AA@mail.gmail.com> <CAKD1Yr1NTvFj0zB0=+nnUKck7TBtwHFz2XoFkD1smx4yCuZohQ@mail.gmail.com> <1EFB11CD-544F-4AD7-B414-6A626075975D@employees.org> <CAPt1N1kJFgu6FhFaVhhkPnEY2dofcLF2ZuKDBHJFF5UU6R+x2g@mail.gmail.com> <F301BC19-2D6D-42F5-9C94-0516A765B97C@jisc.ac.uk> <CAPt1N1k4FGbTVVk1QTw0-or0PxkhSPqGda8fHrJKb2t4shNGkw@mail.gmail.com> <CFFA3926-583D-4DA0-B981-3D58048DE894@jisc.ac.uk> <CAJU8_nXpC4ZmcbpuVoTxykf2KEO1zpdThA=VQKM8iXRjTAgHiQ@mail.gmail.com> <CAPt1N1mGn2E2-d9PkvTWePSPUkVik7UO-75ryTa2EkjfR_4ZmQ@mail.gmail.com>
In-Reply-To: <CAPt1N1mGn2E2-d9PkvTWePSPUkVik7UO-75ryTa2EkjfR_4ZmQ@mail.gmail.com>
From: Kyle Rose <krose@krose.org>
Date: Mon, 15 Apr 2024 12:19:33 -0400
Message-ID: <CAJU8_nXXSsJa6ycMZuSmTeNoma1HrBdQ5bD1feb7DDDK5b_dVA@mail.gmail.com>
To: Ted Lemon <mellon@fugue.com>
Cc: Tim Chown <Tim.Chown=40jisc.ac.uk@dmarc.ietf.org>, Bob Hinden <bob.hinden@gmail.com>, Lorenzo Colitti <lorenzo=40google.com@dmarc.ietf.org>, 6man WG <ipv6@ietf.org>
Content-Type: multipart/alternative; boundary="00000000000055dc68061624fd01"
Archived-At: <https://mailarchive.ietf.org/arch/msg/ipv6/f7GT_HqKuszVkOeaSbOenkUt4is>
Subject: Re: [IPv6] Second Working Group Last Call for <draft-ietf-6man-rfc6724-update>
X-BeenThere: ipv6@ietf.org
X-Mailman-Version: 2.1.39
Precedence: list
List-Id: "IPv6 Maintenance Working Group \(6man\)" <ipv6.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/ipv6>, <mailto:ipv6-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/ipv6/>
List-Post: <mailto:ipv6@ietf.org>
List-Help: <mailto:ipv6-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/ipv6>, <mailto:ipv6-request@ietf.org?subject=subscribe>
X-List-Received-Date: Mon, 15 Apr 2024 16:19:51 -0000

I have a mesh VPN connecting three sites. RAs in each site advertise their
own site ULA prefix, along with a default v6 route that works for both GUA
and ULA. A site's router itself has v6 routes over the VPN to each of the
other sites, but the other devices on each network are oblivious to those
prefixes being local or not, or indeed what "local" even means. Their
ULA/ULA traffic does wind up transiting the VPN when addressed to prefixes
from other sites, which is precisely what I want.

What mechanism exactly would cause these prefixes to be regarded as
known-local?

Moreover, this seems to imply that attached devices need state space and
management to scale with the number of sites, akin to source routing,
rather than having the same property most devices on the Internet have,
which is to have a single default route and to let the network get the
packet to the right destination.

(Finally, I'll note that my site has a catch-all firewall role to
ICMP-reject packets sent to unroutable ULA prefixes, which partly solves
the problem of ULA in global DNS, at least for applications that can
mitigate by falling back to a different address pair. I might also try to
figure out a way to have my recursive filter ULA AAAA records from external
sources, since I can think of no legitimate reason my devices would want to
see them, anyway.)

Kyle

On Mon, Apr 15, 2024, 11:58 AM Ted Lemon <mellon@fugue.com> wrote:

> I think we've already clearly defined what it means for a prefix to be
> "known-local." Possibly the document needs to be updated to make it more
> clear. But this isn't a situation where we're speculating. We know how to
> determine that a prefix is local. Of course we could add more mechanisms
> for doing so, but realistically RA and DHCP are the ways it's going to
> happen, so we don't have a difficult bit of text to write. If we think that
> RA and DHCP aren't adequate to the task, that's a case to be made, but I
> think they are, and I haven't see any non-hand-wavey argument to the
> contrary.
>
> On Mon, Apr 15, 2024 at 11:24 AM Kyle Rose <krose@krose.org> wrote:
>
>> This:
>>
>> Well, if we agree to the MUST (with the usual caveat of any IETF ‘MUST’
>>> for an implementor :) then we need to review the rest of the text, which
>>> would include the default policy table, and the section David contributed.
>>> I think you’re right, that proposed default table as is would have to
>>> change.
>>>
>>
>> is part of the reason I'm uneasy with a blanket MUST for known-local.
>>
>> I would be 100% fine with normative language that essentially says "IF
>> (via some future proposed mechanism) you learn known-local prefixes and
>> insert them into your policy table, THEN you may prefer v4/v4 to
>> not-known-local ULA/ULA; but if you do not, then you must prefer ULA/ULA to
>> v4/v4." My reasoning is that currently there is no specified mechanism for
>> learning and managing known-local ULA prefixes; and it will be a long time
>> before the long tail of stacks respond to yet-to-be-specified network
>> signals for managing those prefixes; yet, in the absence of such an
>> ecosystem I want ULA/ULA to take precedence over v4/v4, because under 6724
>> they are currently mostly useless, and I want ULA to be useful now¹, not in
>> some distant future.
>>
>> Kyle
>>
>> ¹ As it happens to be on glibc deployments, which don't comply with
>> either 3484 or 6724.
>>
>>
>>