RE: Adoption Call for <draft-troan-6man-universal-ra-option>

Vasilenko Eduard <vasilenko.eduard@huawei.com> Wed, 22 September 2021 13:22 UTC

Return-Path: <vasilenko.eduard@huawei.com>
X-Original-To: ipv6@ietfa.amsl.com
Delivered-To: ipv6@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 1E4AA3A206C for <ipv6@ietfa.amsl.com>; Wed, 22 Sep 2021 06:22:00 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -1.896
X-Spam-Level:
X-Spam-Status: No, score=-1.896 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, HTML_MESSAGE=0.001, RCVD_IN_MSPIKE_H3=0.001, RCVD_IN_MSPIKE_WL=0.001, SPF_HELO_NONE=0.001, SPF_PASS=-0.001, URIBL_BLOCKED=0.001] autolearn=ham autolearn_force=no
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id keWpWQB0saL1 for <ipv6@ietfa.amsl.com>; Wed, 22 Sep 2021 06:21:55 -0700 (PDT)
Received: from frasgout.his.huawei.com (frasgout.his.huawei.com [185.176.79.56]) (using TLSv1.2 with cipher AECDH-AES256-SHA (256/256 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id D95873A2066 for <ipv6@ietf.org>; Wed, 22 Sep 2021 06:21:54 -0700 (PDT)
Received: from fraeml708-chm.china.huawei.com (unknown [172.18.147.200]) by frasgout.his.huawei.com (SkyGuard) with ESMTP id 4HDzR13bnSz67bjB; Wed, 22 Sep 2021 21:19:25 +0800 (CST)
Received: from mscpeml500001.china.huawei.com (7.188.26.142) by fraeml708-chm.china.huawei.com (10.206.15.36) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256) id 15.1.2308.8; Wed, 22 Sep 2021 15:21:50 +0200
Received: from mscpeml500001.china.huawei.com (7.188.26.142) by mscpeml500001.china.huawei.com (7.188.26.142) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256) id 15.1.2308.8; Wed, 22 Sep 2021 16:21:49 +0300
Received: from mscpeml500001.china.huawei.com ([7.188.26.142]) by mscpeml500001.china.huawei.com ([7.188.26.142]) with mapi id 15.01.2308.008; Wed, 22 Sep 2021 16:21:49 +0300
From: Vasilenko Eduard <vasilenko.eduard@huawei.com>
To: Mark Smith <markzzzsmith@gmail.com>
CC: IPv6 List <ipv6@ietf.org>
Subject: RE: Adoption Call for <draft-troan-6man-universal-ra-option>
Thread-Topic: Adoption Call for <draft-troan-6man-universal-ra-option>
Thread-Index: AQHXmMmhx5HKsbJa9UOIybdgsBIa+6uDHOqAgAAJHwCAAumHAIAgF3UAgAFgcACABmXsgIAAWUGAgACwiACAABBAgIABL9QQ
Date: Wed, 22 Sep 2021 13:21:49 +0000
Message-ID: <e2eacebdf99046e9b24d0cb5679836a4@huawei.com>
References: <FB7CE846-627F-43CF-A54C-35B0EE6D5A2D@gmail.com> <c7a49df3-59a1-ac24-3d6a-8d71896733a1@foobar.org> <84347b3f-8462-4dc6-580d-544b1bf8aaad@gmail.com> <CAKD1Yr0NapC=Hw9WcjZcKi5O0FE0pM413wqSMALS0310Ps3R8g@mail.gmail.com> <cd2b98a8-4f3e-3d1e-4b6b-0d4c7e2745e9@gmail.com> <CAKD1Yr0cYC=g4WhmYvEmn4W9npFu-xjWKf8hd55fwbjAFFo_yA@mail.gmail.com> <109a3287-38da-1ab2-453a-74422a8f75a3@gmail.com> <a0673b6f-9d46-0e6b-976f-bab44f372b9d@edgeuno.com> <17228f7ef1ad4a6f85654f3d1fdea27e@huawei.com> <584325b9-b978-2c0a-c782-12d470809143@gmail.com> <CAO42Z2xCE=xmst1kOJNyiTpbKKBsgZVuxTXrF4zqS7ceGEHgVA@mail.gmail.com>
In-Reply-To: <CAO42Z2xCE=xmst1kOJNyiTpbKKBsgZVuxTXrF4zqS7ceGEHgVA@mail.gmail.com>
Accept-Language: zh-CN, en-US
Content-Language: en-US
X-MS-Has-Attach:
X-MS-TNEF-Correlator:
x-originating-ip: [10.47.192.53]
Content-Type: multipart/alternative; boundary="_000_e2eacebdf99046e9b24d0cb5679836a4huaweicom_"
MIME-Version: 1.0
X-CFilter-Loop: Reflected
Archived-At: <https://mailarchive.ietf.org/arch/msg/ipv6/lfjZYAqh7MykF-HlRESyzeujPeI>
X-BeenThere: ipv6@ietf.org
X-Mailman-Version: 2.1.29
Precedence: list
List-Id: "IPv6 Maintenance Working Group \(6man\)" <ipv6.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/ipv6>, <mailto:ipv6-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/ipv6/>
List-Post: <mailto:ipv6@ietf.org>
List-Help: <mailto:ipv6-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/ipv6>, <mailto:ipv6-request@ietf.org?subject=subscribe>
X-List-Received-Date: Wed, 22 Sep 2021 13:22:00 -0000

Hi Mark,
I strictly disagree that DHCP has no traceability. All servers have logs. 2 examples:
https://support.huawei.com/enterprise/en/doc/EDOC1100008296/39e96b03/dhcp-server-logging
https://helpcenter.netwrix.com/NA/Configure_IT_Infrastructure/Windows_Server/DHCP_Operational_log.html

LLA indeed could not be traced because it could not be assigned by DHCP☹
The good news is that LLA is not interested in billing and most cases not interested in forensic. Troubleshooting could be still the challenge.
Eduard
From: Mark Smith [mailto:markzzzsmith@gmail.com]
Sent: Wednesday, September 22, 2021 1:12 AM
To: Brian E Carpenter <brian.e.carpenter@gmail.com>
Cc: Vasilenko Eduard <vasilenko.eduard@huawei.com>; Fernando Gont <fernando.gont=40edgeuno.com@dmarc.ietf.org>; Lorenzo Colitti <lorenzo@google.com>; IPv6 List <ipv6@ietf.org>
Subject: Re: Adoption Call for <draft-troan-6man-universal-ra-option>


On Wed, 22 Sep 2021, 07:14 Brian E Carpenter, <brian.e.carpenter@gmail.com<mailto:brian.e.carpenter@gmail.com>> wrote:
On 21-Sep-21 19:51, Vasilenko Eduard wrote:
> Hi Fernando,
> The idea "standardize any remaining" looks good but SLAAC and DHCP are so different by architecture that it would not be possible.
> Example: DHCP is the choice for all types of businesses because of traceability (billing, troubleshooting, forensic) but SLAAC is silent in principle.


Can't find Eduard's original, so I'll comment here.

DHCPv6 and DHCPv4 were never designed for billing or forensic uses.

DHCP of both flavours does not record IP addresses in use.

DHCPv4 doesn't record manually configured IPv4 addresses. DHCPv6 doesn't record manually configured IPv6 addresses or link-local addresses.

The only thing DHCP keeps is a database of DHCP clients.

If you want address traceability, you need a solution that works regardless of how IPv6 addresses are configured or generated, be it manually, via SLAAC or via DHCPv6.

Regards,
Mark.


> Hence, SLAAC would be stuck in use cases where it is enforced by one company. If not this support SLAAC would be dead by now.

Absolutely not. It isn't "enforced by one company". It does exactly what it was designed
to do, what we called "the dentist's office scenario" in the early days of IPng design, actually modelled mainly on Appletalk. You can hook a few IPv6 boxes together on a wire and they will start talking to each other using SLAAC and link-local addresses. Add a router with a prefix and they will start talking to the world using SLAAC and RA. DHCPv6 is completely unnecessary until the network reaches a certain level of complexity.

The problem area isn't the simultaneous existence of SLAAC/RA and DHCPv6. It's that they don't play well together. Maybe we should restate the problem as "how to make SLAAC/RA play together better". And task a design team with that problem.

On 22-Sep-21 07:04, Vasilenko Eduard wrote:

> Sorry, I still do not understand why the default router should be on DHCP.
> It is just 1 bit: "I am the router on this link". Almost always activated bit. No choice, no parameters. Easy to demarcate between different teams.

Well indeed, the value comes when there are several routers (hence RFC8028). If you would like an equivalent of that functionality in DHCPv6, please specify it.

(And BTW it is, to my understanding, implemented on the host side. If operators ask for it, no doubt it will appear on the router side.)

>
> What is really a challenge: the prefix announced through the particular interface ("PIO"). The router should know where is this subnet.
> If prefix would be delivered through DHCP then the router should snoop and appoint the appropriate prefix to the interface.
> Probably you mean this challenge under the name "default router".

One thing about RFC8028 is that it shows that the phrase "default router" is insufficient, because the host needs to know the best router for a given prefix, not a general default.

> I propose snooping on the router side to learn prefixes.
> By the way, IPv4 world does not have any automation here (like snooping) - they coordinate it manually between teams.
> The situation is more challenging for IPv6 - many prefixes need to be coordinated. Hence, more importance for automation of this process.

Indeed. I think that is why we had the MIF WG. Any sign of PVDs in the real world?

    Brian

--------------------------------------------------------------------
IETF IPv6 working group mailing list
ipv6@ietf.org<mailto:ipv6@ietf.org>
Administrative Requests: https://www.ietf.org/mailman/listinfo/ipv6
--------------------------------------------------------------------