Re: Comments on draft-yourtchenko-colitti-nd-reduce-multicast

Erik Nordmark <nordmark@acm.org> Wed, 26 February 2014 20:02 UTC

Return-Path: <nordmark@acm.org>
X-Original-To: ipv6@ietfa.amsl.com
Delivered-To: ipv6@ietfa.amsl.com
Received: from localhost (ietfa.amsl.com [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id A00361A08BD for <ipv6@ietfa.amsl.com>; Wed, 26 Feb 2014 12:02:23 -0800 (PST)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -1.235
X-Spam-Level:
X-Spam-Status: No, score=-1.235 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, RCVD_IN_DNSWL_NONE=-0.0001, SPF_SOFTFAIL=0.665] autolearn=no
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id B86qGQqiM6hE for <ipv6@ietfa.amsl.com>; Wed, 26 Feb 2014 12:02:22 -0800 (PST)
Received: from c.mail.sonic.net (c.mail.sonic.net [64.142.111.80]) by ietfa.amsl.com (Postfix) with ESMTP id 4C2061A07FF for <ipv6@ietf.org>; Wed, 26 Feb 2014 12:02:21 -0800 (PST)
Received: from [192.168.10.18] ([78.204.24.4]) (authenticated bits=0) by c.mail.sonic.net (8.14.4/8.14.4) with ESMTP id s1QK2Cjw029032 (version=TLSv1/SSLv3 cipher=DHE-RSA-AES128-SHA bits=128 verify=NOT); Wed, 26 Feb 2014 12:02:14 -0800
Message-ID: <530E4844.2010302@acm.org>
Date: Wed, 26 Feb 2014 12:02:12 -0800
From: Erik Nordmark <nordmark@acm.org>
User-Agent: Mozilla/5.0 (Macintosh; Intel Mac OS X 10.8; rv:24.0) Gecko/20100101 Thunderbird/24.3.0
MIME-Version: 1.0
To: Ralph Droms <rdroms.ietf@gmail.com>, Ole Troan <otroan@employees.org>
Subject: Re: Comments on draft-yourtchenko-colitti-nd-reduce-multicast
References: <5305AF13.5060201@acm.org> <7461F3DA-FB05-400D-9C54-2F30C73DE2B9@employees.org> <530BCF83.4090500@acm.org> <F401125A-6D2F-4306-85E2-F13DDDCAA7F3@employees.org> <530CAC9D.1040105@acm.org> <2CFB5723-A676-4ADD-B555-83752997CFD7@employees.org> <530D10C2.3080208@acm.org> <847BE1A6-1A6F-4265-BF4A-67AD87504EDC@employees.org> <4D7A18D1-70AB-423D-8E61-DD50BBF2CFB5@gmail.com>
In-Reply-To: <4D7A18D1-70AB-423D-8E61-DD50BBF2CFB5@gmail.com>
Content-Type: text/plain; charset="ISO-8859-1"; format="flowed"
Content-Transfer-Encoding: 7bit
X-Sonic-ID: C;QgzQ4SCf4xGR2iGQCY+HFQ== M;ikJv4iCf4xGR2iGQCY+HFQ==
Archived-At: http://mailarchive.ietf.org/arch/msg/ipv6/h9TVkEkQMajIsgbm5XNB98XnpkU
Cc: Andrew Yourtchenko <ayourtch@cisco.com>, 6man WG <ipv6@ietf.org>
X-BeenThere: ipv6@ietf.org
X-Mailman-Version: 2.1.15
Precedence: list
List-Id: "IPv6 Maintenance Working Group \(6man\)" <ipv6.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/ipv6>, <mailto:ipv6-request@ietf.org?subject=unsubscribe>
List-Archive: <http://www.ietf.org/mail-archive/web/ipv6/>
List-Post: <mailto:ipv6@ietf.org>
List-Help: <mailto:ipv6-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/ipv6>, <mailto:ipv6-request@ietf.org?subject=subscribe>
X-List-Received-Date: Wed, 26 Feb 2014 20:02:23 -0000

On 2/26/14 5:44 AM, Ralph Droms wrote:
>
> Or, the ND messages could be relayed to the DHCP server...
Ralph,

To support DHCP relays with off-link servers and handle legacy hosts 
doing DAD, then we need a relay-to-server extension. One way to do that 
would be to relay the ND messages. But we might need some additional 
info with those. At least we'd want a response with "OK" vs. "duplicate" 
from the server, which doesn't exist in today's ND. And we'd want to 
have DUIDs for the legacy hosts to fit in with what the server does - 
might make sense creating the MAC address-based DUIDs on the relay and 
passing them along to the server.

Supporting relays is solvable - but it requires some new protocol 
mechanisms.
>
> The relay could even snoop the assigned addresses (which is already done now [?] for other purposes.
The relay would be required to build "registered NCEs" based on the 
assigned/verified addresses from the server, and use those plus the 
associated MAC addresses in the forwarding plane. (And somehow ensure 
that other routers on the link have the same info.)
>
> So, legacy hosts can be assigned addresses w/o hints while registering hosts send in the hint to indicate address registration.
Yep - just requires code change on the hosts.
>
> ...and DHCP already has tackled the problem of restoring state through leasequery.
But here the state needs to to be distributed differently. The servers 
(plural) and all the routers (which might be all the DHCP relays) need 
to have consistent state. The leasequery mechanism allows a relay to 
rebuild its gleaned state from a server.

Would we be comfortable mandating that all the routers on a link also be 
DHCP relays, so they can use leasequery?
> I don't see how you can support legacy hosts without that. We can't assume that legacy hosts do DHCP address registrations for RFC 4941 temporary addresses when the A flag is set. Clearing the A flag means that some legacy hosts will not work on those links.
> Hosts with no DHCP implementation at all?
Even if they host implementation contains DHCP, the DHC client code 
(like ISC's) doesn't have a way to request specific addresses (but has 
the ability to renew IA_TA addresses already part of a lease).
Unless other DHC client code has very different support, I don't see how 
deployed host code can handle RFC 4941 addresses using DHCP.

> There may be something to learn about the sync protocol from work on DHCP sync.  We thought it was pretty straightforward until we got to the problem of simultaneous updates between different host/server pairs.

For address registration it would be better to look at software like 
Zookeeper which does quorum election. The would outside of the IETF 
isn't about simple active/standby or active/active network elements.

Regards,
    Erik