RE: Question about RFC6724

Vasilenko Eduard <vasilenko.eduard@huawei.com> Wed, 04 May 2022 08:57 UTC

Return-Path: <vasilenko.eduard@huawei.com>
X-Original-To: ipv6@ietfa.amsl.com
Delivered-To: ipv6@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id DBDF1C159A26 for <ipv6@ietfa.amsl.com>; Wed, 4 May 2022 01:57:06 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -1.896
X-Spam-Level:
X-Spam-Status: No, score=-1.896 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, RCVD_IN_DNSWL_BLOCKED=0.001, RCVD_IN_MSPIKE_H2=-0.001, RCVD_IN_ZEN_BLOCKED_OPENDNS=0.001, SPF_HELO_NONE=0.001, SPF_PASS=-0.001, URIBL_BLOCKED=0.001, URIBL_DBL_BLOCKED_OPENDNS=0.001, URIBL_ZEN_BLOCKED_OPENDNS=0.001] autolearn=ham autolearn_force=no
Received: from mail.ietf.org ([50.223.129.194]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id BJPNMXjbi0vn for <ipv6@ietfa.amsl.com>; Wed, 4 May 2022 01:57:03 -0700 (PDT)
Received: from frasgout.his.huawei.com (frasgout.his.huawei.com [185.176.79.56]) (using TLSv1.2 with cipher AECDH-AES256-SHA (256/256 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id EA19EC159A21 for <ipv6@ietf.org>; Wed, 4 May 2022 01:57:02 -0700 (PDT)
Received: from fraeml708-chm.china.huawei.com (unknown [172.18.147.200]) by frasgout.his.huawei.com (SkyGuard) with ESMTP id 4KtVxD6pVGz6802N; Wed, 4 May 2022 16:53:52 +0800 (CST)
Received: from mscpeml100001.china.huawei.com (7.188.26.227) by fraeml708-chm.china.huawei.com (10.206.15.36) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256) id 15.1.2375.24; Wed, 4 May 2022 10:56:58 +0200
Received: from mscpeml500001.china.huawei.com (7.188.26.142) by mscpeml100001.china.huawei.com (7.188.26.227) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256) id 15.1.2375.24; Wed, 4 May 2022 11:56:58 +0300
Received: from mscpeml500001.china.huawei.com ([7.188.26.142]) by mscpeml500001.china.huawei.com ([7.188.26.142]) with mapi id 15.01.2375.024; Wed, 4 May 2022 11:56:58 +0300
From: Vasilenko Eduard <vasilenko.eduard@huawei.com>
To: Philip Homburg <pch-ipv6-ietf-8@u-1.phicoh.com>, "ipv6@ietf.org" <ipv6@ietf.org>, Brian E Carpenter <brian.e.carpenter@gmail.com>
Subject: RE: Question about RFC6724
Thread-Topic: Question about RFC6724
Thread-Index: AQHYXfmOgGg7Hr3YjkO5FjCYTD2hM60L3fmAgADYVuCAAL3UAIAA4MkfgAAUZoA=
Date: Wed, 04 May 2022 08:56:57 +0000
Message-ID: <6ff3b8b99fde4932af77ee3970dbba65@huawei.com>
References: <m1nlQqC-0000IEC@stereo.hq.phicoh.net> <efffe452-cbcb-e546-972b-e2bb22a98b62@gmail.com> <m1nlmFC-0000JkC@stereo.hq.phicoh.net> <f22f0aed-f3aa-7016-844f-89e5f576440d@gmail.com> <m1nm9Pc-0000KeC@stereo.hq.phicoh.net>
In-Reply-To: <m1nm9Pc-0000KeC@stereo.hq.phicoh.net>
Accept-Language: zh-CN, en-US
Content-Language: en-US
X-MS-Has-Attach:
X-MS-TNEF-Correlator:
x-originating-ip: [10.81.193.93]
Content-Type: text/plain; charset="us-ascii"
Content-Transfer-Encoding: quoted-printable
MIME-Version: 1.0
X-CFilter-Loop: Reflected
Archived-At: <https://mailarchive.ietf.org/arch/msg/ipv6/hxfWCjlJWDrZiU48q-zFFUv7sqA>
X-BeenThere: ipv6@ietf.org
X-Mailman-Version: 2.1.34
Precedence: list
List-Id: "IPv6 Maintenance Working Group \(6man\)" <ipv6.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/ipv6>, <mailto:ipv6-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/ipv6/>
List-Post: <mailto:ipv6@ietf.org>
List-Help: <mailto:ipv6-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/ipv6>, <mailto:ipv6-request@ietf.org?subject=subscribe>
X-List-Received-Date: Wed, 04 May 2022 08:57:06 -0000

It is not an simple errata because it was done on purpose.

>From one point of view, RFC 6724 is very clear that the longest match should happen for IPv4 too.
Look section 3.2 and section 6 of RFC 6724.

But from another point of view
look to appendix B:
"      Changed the definition of CommonPrefixLen() to only compare bits
       up to the source address's prefix length.  The previous
       definition used the entire source address, rather than only its
       prefix.  As a result, when a source and destination addresses had
       the same prefix, common bits in the interface ID would previously
       result in overriding DNS load balancing [RFC1794] by forcing the
       destination address with the most bits in common to be always
       chosen.  The updated definition allows DNS load balancing to
       continue to be used as a tie breaker."
And look to section 2.2 (Common Prefix Length):
"up to the length of S's prefix (i.e., the portion of the address not including the interface ID)"

It looks like Windows implementation is right and fully compliant with RFC 6724 in this respect.
64 border is hardcoded into RFC 6724 on purpose.

Are you going to kill DNS load balancing again? (for IPv6 as well as for IPv4)

Ed/
-----Original Message-----
From: ipv6 [mailto:ipv6-bounces@ietf.org] On Behalf Of Philip Homburg
Sent: Wednesday, May 4, 2022 10:27 AM
To: ipv6@ietf.org
Subject: Re: Question about RFC6724 

>10.1.0.10 printer.mynet.example.com
>192.168.178.99 printer.mynet.example.com
>
>then getaddrinfo() returns this, on a Windows host whose IPv4 address 
>is 192.168.178.20:
>
>(<AddressFamily.AF_INET: 2>, 0, 0, '', ('10.1.0.10', 0))
>(<AddressFamily.AF_INET: 2>, 0, 0, '', ('192.168.178.99', 0))

Thanks for the example.

After careful reading of RFC 6724, I think you are right.

We should update the description of CommonPrefixLen, such that for IPv4-mapped it considers the length of IPv4 prefix.

I thought the reason it mentions 64, is that it is hard to use the real prefix length. For example, in a system that receives addresses using IA_NA and where there are no onlink prefixes, how does one determine "the portion of the address not including the interface ID".

However, that is an IPv6 problem. For IPv4 it should be clear what the prefix length is.

--------------------------------------------------------------------
IETF IPv6 working group mailing list
ipv6@ietf.org
Administrative Requests: https://www.ietf.org/mailman/listinfo/ipv6
--------------------------------------------------------------------