Re: IPv6 only host NAT64 requirements?

Ole Troan <otroan@employees.org> Mon, 20 November 2017 11:32 UTC

Return-Path: <otroan@employees.org>
X-Original-To: ipv6@ietfa.amsl.com
Delivered-To: ipv6@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id E89CE127010 for <ipv6@ietfa.amsl.com>; Mon, 20 Nov 2017 03:32:33 -0800 (PST)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -1.901
X-Spam-Level:
X-Spam-Status: No, score=-1.901 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, SPF_PASS=-0.001] autolearn=ham autolearn_force=no
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id 0B74sIHlZo00 for <ipv6@ietfa.amsl.com>; Mon, 20 Nov 2017 03:32:32 -0800 (PST)
Received: from accordion.employees.org (accordion.employees.org [198.137.202.74]) (using TLSv1.2 with cipher AECDH-AES256-SHA (256/256 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id 5588C1200FC for <ipv6@ietf.org>; Mon, 20 Nov 2017 03:32:32 -0800 (PST)
Received: from h.hanazo.no (96.51-175-103.customer.lyse.net [51.175.103.96]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by accordion.employees.org (Postfix) with ESMTPSA id B839D2D508B; Mon, 20 Nov 2017 11:32:30 +0000 (UTC)
Received: from [IPv6:::1] (localhost [IPv6:::1]) by h.hanazo.no (Postfix) with ESMTP id 0E75C200C9D742; Mon, 20 Nov 2017 12:32:29 +0100 (CET)
From: Ole Troan <otroan@employees.org>
Message-Id: <2D7A9BB2-3F7D-4DB7-B574-4596AAE9C0F4@employees.org>
Content-Type: multipart/signed; boundary="Apple-Mail=_6D075E5C-4B11-45DF-BA9B-C58FE33D271B"; protocol="application/pgp-signature"; micalg="pgp-sha512"
Mime-Version: 1.0 (Mac OS X Mail 11.1 \(3445.4.7\))
Subject: Re: IPv6 only host NAT64 requirements?
Date: Mon, 20 Nov 2017 12:32:27 +0100
In-Reply-To: <D2702C6C-911E-49B3-A62A-953C47E1F023@isc.org>
Cc: Mikael Abrahamsson <swmike@swm.pp.se>, 6man WG <ipv6@ietf.org>
To: Mark Andrews <marka@isc.org>
References: <m1eEGbJ-0000EhC@stereo.hq.phicoh.net> <D43E103C-27B8-48CF-B801-ACCF9B42533E@employees.org> <m1eEHPS-0000FyC@stereo.hq.phicoh.net> <59B0BEC0-D791-4D75-906C-84C5E423291B@employees.org> <m1eEIGX-0000FjC@stereo.hq.phicoh.net> <73231F8D-498E-4C77-8DA8-044365368FC9@isc.org> <CAKD1Yr1aFwF_qZVp5HbRbKzcOGqn==MRe_ewaA8Qc8t3+CVu_Q@mail.gmail.com> <44A862B7-7182-4B3A-B46E-73065FC4D852@isc.org> <D42D8D7A-6D19-4862-9BB3-4913058A83B6@employees.org> <CAFU7BARCLq9eznccEtkdnKPAtKNT7Mf1bW0uZByPvxtiSrv6EQ@mail.gmail.com> <183A8772-6FEF-43BD-97F9-DD4A2E21DB90@google.com> <CAFU7BARaJHKOyrD1KAeorbYQwgsmxBLk1QELH+wZ4=HDCP1q-w@mail.gmail.com> <8470b00f-ecc5-0a63-fd8f-a4e2f65a005d@gmail.com> <CFDD8D9E-0726-46C1-9CC7-5C88DD111E9D@employees.org> <alpine.DEB.2.20.1711190939290.32099@uplift.swm.pp.se> <83B04565-4A62-47AE-90FA-13F9254C5A1C@isc.org> <1986EEC9-ED01-40D1-A1E6-3B7703A8ED34@employees.org> <D2702C6C-911E-49B3-A62A-953C47E1F023@isc.org>
X-Mailer: Apple Mail (2.3445.4.7)
Archived-At: <https://mailarchive.ietf.org/arch/msg/ipv6/kFCArhOxep7KTmL3hN2bcjPMpqo>
X-BeenThere: ipv6@ietf.org
X-Mailman-Version: 2.1.22
Precedence: list
List-Id: "IPv6 Maintenance Working Group \(6man\)" <ipv6.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/ipv6>, <mailto:ipv6-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/ipv6/>
List-Post: <mailto:ipv6@ietf.org>
List-Help: <mailto:ipv6-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/ipv6>, <mailto:ipv6-request@ietf.org?subject=subscribe>
X-List-Received-Date: Mon, 20 Nov 2017 11:32:34 -0000

Mark,

>> IPv4aaS offers dual stack to the hosts. Sure, it is typically carried over IPv6, and it allows the access network to use IPv6 transport. But from the perspective of delivering the service, it could as well have been ATM.
> 
> IPv4aaS delivers IPv6 connectivity to the customer net.  That is better than IPv4 only.  It moves the global percentage of IPv6 traffic upwards.  It allows customers to offer services on well known ports.  We need to reach 90 something percent IPv6 traffic before most people will be willing to turn off IPv4.

But for _me_ on my local network, with my applications... I haven't found anything better with it...
examples?

> I’d prefer mechanisms that can be out sourced so ISPs can off the deliver of IPv4 as a service to someone else in the future.  The costs then go back onto only those that need to reach legacy only services.
> 
>> The other coin of IPv4aaS is that it is a mechanism that allows IPv4 to scale indefinitely.
> 
> There are limits to how many customers can share a IP address especially if you are allowing incoming connections by mapping ports to customers.   Even stateless mapping, eyeball only, imposes costs.

Not really. A+P gives you 48 bit addressing. ;-)
And especially not with upcoming new transport layers.
With traditional NAT, you burn one outside NAT port per multiple connections to same external destination:port.
We should ask CAIDA for an analysis.
Continuing to scale IPv4 is possible. It's not going to be free... far from it, but that seems to be where we're backwards walking ourselves into.

>> The tragicomedy of where we are at the moment is that an ISP would offer better service to the end-user network by delivering IPv4 only service over it's IPv4aaS infrastructure... we need to find a way to move off dual-stack.
> 
> Moving off dual stack will come.  It just hard to force it.  Encouraging every small step in the right direction is important.

But I think we should encourage it, we should make it as edible as possible, and we should try to push the burden of interoperability over to the laggards.

> I’m sure there are a couple of Summer of Code projects in going through the existing applications that make network connections and 1) adding IPv6 support if it doesn’t exist and 2) adding happy eyeball style connection creation where the application is {S}TCP based.  Contribute those changes back to the projects.

As I said we didn't find many applications during the hackathon.
The main culprits in my home is bath scale, light bulbs, weather stations.
The other culprits are the plethora of open source projects around VM and container networking, those are largely IPv4 NAT based.

Cheers,
Ole