Re: [v6ops] The bottom is /112

Alexandre Petrescu <alexandre.petrescu@gmail.com> Mon, 23 November 2020 18:02 UTC

Return-Path: <alexandre.petrescu@gmail.com>
X-Original-To: ipv6@ietfa.amsl.com
Delivered-To: ipv6@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 7D91C3A0BF2 for <ipv6@ietfa.amsl.com>; Mon, 23 Nov 2020 10:02:29 -0800 (PST)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: 3.155
X-Spam-Level: ***
X-Spam-Status: No, score=3.155 tagged_above=-999 required=5 tests=[DKIM_ADSP_CUSTOM_MED=0.001, FORGED_GMAIL_RCVD=1, FREEMAIL_FROM=0.001, NICE_REPLY_A=-0.001, NML_ADSP_CUSTOM_MED=1.2, RCVD_IN_MSPIKE_H3=-0.01, RCVD_IN_MSPIKE_WL=-0.01, SPF_HELO_NONE=0.001, SPF_SOFTFAIL=0.972, URIBL_BLOCKED=0.001] autolearn=no autolearn_force=no
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id c1Hl2xFna5GC for <ipv6@ietfa.amsl.com>; Mon, 23 Nov 2020 10:02:27 -0800 (PST)
Received: from cirse-smtp-out.extra.cea.fr (cirse-smtp-out.extra.cea.fr [132.167.192.148]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id 548AD3A0BF5 for <ipv6@ietf.org>; Mon, 23 Nov 2020 10:02:27 -0800 (PST)
Received: from pisaure.intra.cea.fr (pisaure.intra.cea.fr [132.166.88.21]) by cirse-sys.extra.cea.fr (8.14.7/8.14.7/CEAnet-Internet-out-4.0) with ESMTP id 0ANI2PqT011231 for <ipv6@ietf.org>; Mon, 23 Nov 2020 19:02:25 +0100
Received: from pisaure.intra.cea.fr (localhost [127.0.0.1]) by localhost (Postfix) with SMTP id 23C662074FC for <ipv6@ietf.org>; Mon, 23 Nov 2020 19:02:25 +0100 (CET)
Received: from muguet2-smtp-out.intra.cea.fr (muguet2-smtp-out.intra.cea.fr [132.166.192.13]) by pisaure.intra.cea.fr (Postfix) with ESMTP id 193772072E7 for <ipv6@ietf.org>; Mon, 23 Nov 2020 19:02:25 +0100 (CET)
Received: from [10.11.240.70] ([10.11.240.70]) by muguet2-sys.intra.cea.fr (8.14.7/8.14.7/CEAnet-Internet-out-4.0) with ESMTP id 0ANI2OXl027899 for <ipv6@ietf.org>; Mon, 23 Nov 2020 19:02:24 +0100
Subject: Re: [v6ops] The bottom is /112
To: ipv6@ietf.org
References: <CABNhwV3fj-e9bEemivcNovnD3SZvKm8ZjFKp7BmusnPcgyznFQ@mail.gmail.com> <7ED24CC7-A719-4E9B-A5DC-3BA8EA7E3929@consulintel.es> <CABNhwV19neE3U_AisNp2nDUF4bWB8P8xHNEznDevZLE9amFTRA@mail.gmail.com> <0F78C18B-7AD6-4AC7-AF1F-CA1ADCDEA6AB@employees.org> <CABNhwV3bCss9y7cT6w2i+LKWBh1viPSXBM-CTaK+GVDyPS2D8w@mail.gmail.com> <9D7C4A75-ABB6-4194-9834-9BC898EAC8A9@employees.org> <CABNhwV0-FZpPs84+RVB81=5H5QCEaxF0EUj9tcV+bdOu00RE2A@mail.gmail.com> <a8306401-3f2d-9284-804e-ab703d837426@gmail.com> <CO1PR11MB488152661E56DEE4EED016FAD8FC0@CO1PR11MB4881.namprd11.prod.outlook.com>
From: Alexandre Petrescu <alexandre.petrescu@gmail.com>
Message-ID: <b9422cff-fa45-aa26-4af4-721e99fb5d07@gmail.com>
Date: Mon, 23 Nov 2020 19:02:24 +0100
User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:78.0) Gecko/20100101 Thunderbird/78.5.0
MIME-Version: 1.0
In-Reply-To: <CO1PR11MB488152661E56DEE4EED016FAD8FC0@CO1PR11MB4881.namprd11.prod.outlook.com>
Content-Type: text/plain; charset="utf-8"; format="flowed"
Content-Language: fr
Content-Transfer-Encoding: 8bit
Archived-At: <https://mailarchive.ietf.org/arch/msg/ipv6/iGoSYNcBBx4tVuAHyJzCYckfaXA>
X-BeenThere: ipv6@ietf.org
X-Mailman-Version: 2.1.29
Precedence: list
List-Id: "IPv6 Maintenance Working Group \(6man\)" <ipv6.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/ipv6>, <mailto:ipv6-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/ipv6/>
List-Post: <mailto:ipv6@ietf.org>
List-Help: <mailto:ipv6-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/ipv6>, <mailto:ipv6-request@ietf.org?subject=subscribe>
X-List-Received-Date: Mon, 23 Nov 2020 18:02:29 -0000


Le 23/11/2020 à 10:03, Pascal Thubert (pthubert) a écrit :
> Hello Brian
> 
> Please note that RFC 8929 would work there too -that's proxy ND with
>  the backbone on the Wi-Fi link and the wireless access on the 3GPP 
> link-, used in the routing proxy mode - that's when the links are not
> bridgeable-.. Basically the phone as a routing proxy installs host
> (connected) routes towards the 3GPP link for the addresses present
> there, and defends those addresses over the Wi-Fi Link. On paper the
> result is similar to RFC 7278, but the method is a bit different
> since internally it relies on ND proxy as opposed to anycast.

Fair enough.  It would work up to a point.

I note that I dont think RFC7278 '64share' uses anycast.

And, like 64share, I dont think 'backbone router' would support multiple
/64s in a vehicle; or a /64 on WiFi plus a another /64 on the USB ifaces
of a 3GPP-connected smartphone.

> Arguably the phone would self-assign another global address on the
> Wi-Fi link, if it cares to have one at all on that link. Bottom line
> is yes, I agree we should consider the applicability of what we have
> before we start breaking things down.

If pursuing, one would consider adding a reference to this RFC8929
method 'backbone router' to the problem statement draft of Variable
SLAAC.  Because in there we also list '64share'.

Alex

> 
> Keep safe;
> 
> Pascal
> 
>> -----Original Message----- From: v6ops <v6ops-bounces@ietf.org> On
>>  Behalf Of Brian E Carpenter Sent: jeudi 19 novembre 2020 23:50 To:
>>  Gyan Mishra <hayabusagsm@gmail.com>; otroan@employees.org Cc: IPv6
>>  Operations <v6ops@ietf.org>; 6MAN <6man@ietf.org>; JORDI PALET 
>> MARTINEZ <jordi.palet=40consulintel.es@dmarc.ietf.org> Subject: Re:
>> [v6ops] The bottom is /112
>> 
>> And if we had left the boundary at /80, as it was in 1995 
>> (RFC1884), would you now be arguing for /96, since in that case 
>> 3GPP would have settled on /80?
>> 
>> Sorry, but this is exactly and precisely a 16-bit jump in the race
>>  to the bottom. And it breaks all existing SLAAC hosts on the way.
>> 
>> The problem here is caused by 3GPP, but a solution like Cameron's 
>> should work for everybody with minimal changes.
>> 
>> Regards Brian
>> 
>> On 20-Nov-20 11:03, Gyan Mishra wrote:
>>> 
>>> 
>>> On Thu, Nov 19, 2020 at 10:33 AM <otroan@employees.org
>> <mailto:otroan@employees.org>> wrote:
>>> 
>>> 
>>> 
>>>> On 19 Nov 2020, at 14:58, Gyan Mishra <hayabusagsm@gmail.com
>> <mailto:hayabusagsm@gmail.com>> wrote:
>>>> 
>>>> You would need a new option. It would likely be useful for the
>>>>  requesting
>> router to indicate interest in the option. Even hinting at what 
>> prefix size it was expecting.
>>>> Now can you explain to me again the reasons why this approach 
>>>> is better
>> than using the existing DHPCv6 protocol packets?
>>>> 
>>>> 3GPP gateway does not support DHCPv6
>>> 
>>> 3GPP gateway doesn't support new option. What's your point?
>>> 
>>> 
>>> 
>>> The point of the v6ops presentation and this email thread is how
>>>  to “extend
>> a /64” in the 3GPP use case  in slide 1 of the deck you compiled a
>>  list of options and of the two I had highlighted in red were the 
>> 64share v2 Cameron’s option and the variable slaac option.  So on 
>> the call this morning Lorenzo shot down 64share v2 shorter prefix 
>> option as even if the 3GPP architecture was updated to support 
>> longer prefixes and even is the 3GPP gateway was able to send a 
>> shorter prefix with A flag not set, all mobile devices per 
>> Lorenzo’s point would be broken as they would not accept the 
>> shorter let’s say /56 prefix to build the slaac 128 bit address.
>> So the bottom line is the 64share v2 won’t work unless we update
>> RFC 4291 and remove the 64 bit boundary.
>>> 
>>> So we are back to square uno - no viable solution
>>> 
>>> So now we had thrown out the longer >64 due to race to bottom 
>>> worries
>> which I and others believe is Fud and as described in slide 10 of 
>> the v6ops “race to the bottom slide”.
>>> 
>>> So a happy medium /80 fixed boundary I came up with that I think
>>>  solves a lot
>> of the issue and not just the 3GPP initial segmentation of 
>> downstream devices problem statement.
>>> 
>>> Since we have to update RFC 4291 for 64share v2 to work anyways 
>>> to allow
>> for shorter prefixes, why not instead create a new bottom at /80 
>> giving 16 bits more of prefix length and shrinking the IID down to
>>  48 bits.  Doing so you would not even have to update the 3GPP 
>> architecture as I don’t know if that would fly or not.  Also this 
>> solves a few other problems at the same time.
>>> 
>>> 
>>> As I mentioned in the v6ops deck presented that vlsm 0 to 128 is
>>>  mainstream
>> for operators for static addressing on router and switch 
>> infrastructure and dhcpv6 subnets longer prefixes for network 
>> infrastructure appliance clusters, NFV/VNF virtualization and 
>> server farms.  On host subnets where there is a chance of mix of 
>> slaac hosts with dhcpv6  devices the prefix length is stuck at /64.
>> So on these mix addressing host subnets we cannot do longer 
>> prefixes following our ND cache hard limit mantra to prevent ND 
>> cache exhaustion issues as described in RFC 6164.
>>> 
>>> So with the /80 new fixed boundary shifting prefix length 16 bits
>>> longer and
>> shortening the IID by 16 bits gives resolved the 3GPP issue which 
>> 64share can work as is and subtending to downstream devices will 
>> now work as a /64 is now equivalent to a /48 with 64k /80s.  Also 
>> BCP-690 for broadband not all operators have adopted the shorter 
>> prefix lengths /56 or /48 recommendations  and now that’s not an 
>> issue as the /64 would now suffice.
>>> 
>>> From an operators perspective that gain allows at least for 3GPP
>>>  massive
>> growth and subtending with a single /64 allows the operators such 
>> as Verizon with massive subscriber base worldwide can stay with 
>> current allocations and don’t have to ask for /10.
>>> 
>>> As 5G gets rolled out with Enhanced VPN framework and Network 
>>> slicing
>> paradigm, the demand for shorter blocks and wearable multiple /48 
>> will be our new reality.
>>> 
>>> Making that 16 bit shift now to /80 making a /64 the new /48 will
>>> give
>> broadband and 3GPP subscribers a ton of space to subtending their 
>> networks we would be set for the future.  Especially with IOT the 
>> demand for subtending will continue to grow astronomically.
>>> 
>>> Also IANA does not have to get start in allocating the other /3 
>>> and other
>> available blocks.
>>> 
>>> Lots of problems being solved here with a fixed /80 new 
>>> boundary.
>>> 
>>> Also with the existing random IID generation schemes which we 
>>> have tested
>> on Linux kernel can do longer prefixes using RFC 4941 privacy 
>> extension or RFC 7217 stable IID.
>>> 
>>> Win-Win for all.
>>> 
>>> Ole
>>> 
>>> --
>>> 
>>> <http://www.verizon.com/>
>>> 
>>> *Gyan Mishra*
>>> 
>>> /Network Solutions A//rchitect /
>>> 
>>> /M 301 502-1347 13101 Columbia Pike /Silver Spring, MD
>>> 
>>> 
>>> 
>>> _______________________________________________ v6ops mailing 
>>> list v6ops@ietf.org https://www.ietf.org/mailman/listinfo/v6ops
>>> 
>> 
>> _______________________________________________ v6ops mailing list 
>> v6ops@ietf.org https://www.ietf.org/mailman/listinfo/v6ops
> -------------------------------------------------------------------- 
> IETF IPv6 working group mailing list ipv6@ietf.org Administrative 
> Requests: https://www.ietf.org/mailman/listinfo/ipv6 
> --------------------------------------------------------------------
>