Re: [v6ops] A common problem with SLAAC in "renumbering" scenarios

Erik Kline <ek@loon.co> Thu, 21 February 2019 01:17 UTC

Return-Path: <ek@google.com>
X-Original-To: ipv6@ietfa.amsl.com
Delivered-To: ipv6@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 81F9C130E25 for <ipv6@ietfa.amsl.com>; Wed, 20 Feb 2019 17:17:42 -0800 (PST)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -9.498
X-Spam-Level:
X-Spam-Status: No, score=-9.498 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, DKIM_SIGNED=0.1, DKIM_VALID=-0.1, DKIM_VALID_AU=-0.1, HEADER_FROM_DIFFERENT_DOMAINS=0.001, HTML_MESSAGE=0.001, RCVD_IN_DNSWL_NONE=-0.0001, SPF_PASS=-0.001, URIBL_BLOCKED=0.001, USER_IN_DEF_SPF_WL=-7.5] autolearn=unavailable autolearn_force=no
Authentication-Results: ietfa.amsl.com (amavisd-new); dkim=pass (1024-bit key) header.d=loon.co
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id RuGHQVmU53iB for <ipv6@ietfa.amsl.com>; Wed, 20 Feb 2019 17:17:40 -0800 (PST)
Received: from mail-io1-xd2e.google.com (mail-io1-xd2e.google.com [IPv6:2607:f8b0:4864:20::d2e]) (using TLSv1.2 with cipher ECDHE-RSA-AES128-GCM-SHA256 (128/128 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id 35C2D128B33 for <6man@ietf.org>; Wed, 20 Feb 2019 17:17:40 -0800 (PST)
Received: by mail-io1-xd2e.google.com with SMTP id p17so107868iol.7 for <6man@ietf.org>; Wed, 20 Feb 2019 17:17:40 -0800 (PST)
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=loon.co; s=google; h=mime-version:references:in-reply-to:reply-to:from:date:message-id :subject:to:cc; bh=+Jz4elpDt78QYPTgTHydZ44Z6BarODUJeWMt/jYfgb0=; b=CFJkShv7C8GqVP8eDaFEJ5jHnTFLeN5+PjN7Gexz45tyFFhy5AFnnYa6hcpGG+t8Jq 6l1ZfZMAs5ps5bVYpB65BvqbwFaHIpz9LVeu4k94Nql//RIYVk1MZDGkH+CD77ElqZmI rOlHTFHGnePTK+UB7U41XLQAmNdTfY3P3QnFk=
X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20161025; h=x-gm-message-state:mime-version:references:in-reply-to:reply-to :from:date:message-id:subject:to:cc; bh=+Jz4elpDt78QYPTgTHydZ44Z6BarODUJeWMt/jYfgb0=; b=ll7bgvmgKvy9kiEkHL079zwUCpsiKUXvNyo0rI70s5hHH+h6ykOOiEKp9l7WYD7Ir7 OhHPECgABO7ybZn2XjDD8zxikJNxCF31qPAiicthwmgKaQftnpSzjfodZTcsBmemGOm5 JW+fxHJoYA6T0nOt8xNc9BNX87c3IwmLjLLFSa8AkPH1KcH/JFUSKEG1oK1wUF85A21J 81lFj6tBOVKATD+7JwKAim3W8eQcio3rUxCSUOdkFW945aiOcbopdtbgJlUh+aMO6v9N 6Ha4ZmMsG/jjZy7Skm3zuvxvK8cHlumyvjN41IYsq5EMdLGZ6FGMOMLkTq7y4cjPYxEv 3yFA==
X-Gm-Message-State: AHQUAubqzk3axbgco9YWwN0Tfdwlm8W3K7a6pccDwz5wmvZwer6p/7QY sJQA1KhyxLEJuHtd2L7qD9AsIuBLVRAMALk4st75eA==
X-Google-Smtp-Source: AHgI3IZ/ID1Pg1HEv7Rai16qQjFkNMUM3p2j77xu4xlzhAmmiE3qmvyq9PJgRWOQ9TdJC/Pj1yca/fP6W7JOIrSDVYY=
X-Received: by 2002:a6b:5913:: with SMTP id n19mr23554618iob.62.1550711858754; Wed, 20 Feb 2019 17:17:38 -0800 (PST)
MIME-Version: 1.0
References: <6D78F4B2-A30D-4562-AC21-E4D3DE019D90@consulintel.es> <B6E2EC33-EEAF-40D0-AFCC-BDAFA9134ACD@consulintel.es> <20190220113603.GK71606@Space.Net> <28fbc2c305c640c9afb3704050f6e8d7@boeing.com> <20190220213107.GS71606@Space.Net> <019c552eb1624d348641d6930829fd1f@boeing.com> <c6409f1a-a7f6-810e-625d-a2912bf15c7e@gmail.com> <6cc7e8ac9c7e4a898018f117aabf1a88@boeing.com>
In-Reply-To: <6cc7e8ac9c7e4a898018f117aabf1a88@boeing.com>
Reply-To: ek@loon.co
From: Erik Kline <ek@loon.co>
Date: Wed, 20 Feb 2019 17:17:27 -0800
Message-ID: <CAAedzxo1rXv+tupAL=HsNN34M33_uq9=JCh9O0_pMAHoXU1N8w@mail.gmail.com>
Subject: Re: [v6ops] A common problem with SLAAC in "renumbering" scenarios
To: "Manfredi (US), Albert E" <albert.e.manfredi@boeing.com>
Cc: Brian E Carpenter <brian.e.carpenter@gmail.com>, IPv6 Operations <v6ops@ietf.org>, "6man@ietf.org" <6man@ietf.org>
Content-Type: multipart/alternative; boundary="0000000000007de09405825d3d0e"
Archived-At: <https://mailarchive.ietf.org/arch/msg/ipv6/lhDuy9Lm9EgoInFNAUXc3oYwVXQ>
X-BeenThere: ipv6@ietf.org
X-Mailman-Version: 2.1.29
Precedence: list
List-Id: "IPv6 Maintenance Working Group \(6man\)" <ipv6.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/ipv6>, <mailto:ipv6-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/ipv6/>
List-Post: <mailto:ipv6@ietf.org>
List-Help: <mailto:ipv6-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/ipv6>, <mailto:ipv6-request@ietf.org?subject=subscribe>
X-List-Received-Date: Thu, 21 Feb 2019 01:17:42 -0000

On Wed, 20 Feb 2019 at 17:12, Manfredi (US), Albert E <
albert.e.manfredi@boeing.com> wrote:

> -----Original Message-----
> From: Brian E Carpenter <brian.e.carpenter@gmail.com>
>
> > NPTv6 is not NAT66, as the NPTv6 *Experimental* RFC explains.
>
> Okay, NPTv6. No port translations. RFC 6296.
>
> >> All of the advantages of the basic NAT come to bear,
> >
> > I'm not sure that that is true, but NPTv6 brings some, but not all,
> of the disadvantages of NAT too, as also explained in RFC6296.
>
> Few of the disadvantages, I'd say. For example, use of IPsec AH is
> compromised. But many people objected to the mandatory use of IPsec in IPv6
> already, because there are other ways of securing content that they prefer
> to deploy. I think that the wide deployment of NAPT in IPv4 has reduced the
> severity of the disadvantages of NPT, as application designers have long
> had to accommodate workarounds?
>
> > NPTv6 as a work-around for a defect in SLAAC when there is an
> unplanned renumbering?
>
> I mentioned SLAAC timers as an example. What I should have said is, as far
> as I can tell, all of the problems we have been discussing in this thread
> would be solved with NPTv6. Privacy in home nets, renumbering, route
> aggregation, SLAAC, what else? I can't think of an issue mentioned here
> that NPTv6 wouldn’t solve.
>
> It should not be all that surprising that the advantages of address
> independence have become entrenched in IP thinking, thanks to IPv4. So it
> should not be surprising if many have come to depend on these advantages,
> and don’t want to give them up.
>

As Lorenzo said, it "solves" some operational pain by pushing that pain
onto those that are not represented in the decision making process to
deploy any variety of NAT (i.e. apps, OSes, ...)

We've been here before <https://www.ietf.org/proceedings/74/6ai.html>, of
course.