Re: [IPv6] Suggestion for multi homed clients without NAT/NPT

"Pascal Thubert (pthubert)" <pthubert@cisco.com> Wed, 04 January 2023 08:49 UTC

Return-Path: <pthubert@cisco.com>
X-Original-To: ipv6@ietfa.amsl.com
Delivered-To: ipv6@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id DBBDEC14CF1A for <ipv6@ietfa.amsl.com>; Wed, 4 Jan 2023 00:49:56 -0800 (PST)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -11.896
X-Spam-Level:
X-Spam-Status: No, score=-11.896 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, DKIMWL_WL_HIGH=-0.001, DKIMWL_WL_MED=-0.001, DKIM_SIGNED=0.1, DKIM_VALID=-0.1, DKIM_VALID_AU=-0.1, DKIM_VALID_EF=-0.1, RCVD_IN_DNSWL_MED=-2.3, RCVD_IN_MSPIKE_H3=0.001, RCVD_IN_MSPIKE_WL=0.001, RCVD_IN_ZEN_BLOCKED_OPENDNS=0.001, SPF_NONE=0.001, URIBL_DBL_BLOCKED_OPENDNS=0.001, URIBL_ZEN_BLOCKED_OPENDNS=0.001, USER_IN_DEF_DKIM_WL=-7.5] autolearn=ham autolearn_force=no
Authentication-Results: ietfa.amsl.com (amavisd-new); dkim=pass (1024-bit key) header.d=cisco.com header.b=lVGr3uwq; dkim=pass (1024-bit key) header.d=cisco.com header.b=niz75miE
Received: from mail.ietf.org ([50.223.129.194]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id HqjrYEJijD6J for <ipv6@ietfa.amsl.com>; Wed, 4 Jan 2023 00:49:53 -0800 (PST)
Received: from rcdn-iport-5.cisco.com (rcdn-iport-5.cisco.com [173.37.86.76]) (using TLSv1.2 with cipher DHE-RSA-SEED-SHA (128/128 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id D243AC14CE22 for <ipv6@ietf.org>; Wed, 4 Jan 2023 00:49:52 -0800 (PST)
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/simple; d=cisco.com; i=@cisco.com; l=26082; q=dns/txt; s=iport; t=1672822192; x=1674031792; h=from:to:cc:subject:date:message-id:references: in-reply-to:content-transfer-encoding:mime-version; bh=ejR+cEvp2351ve/CgMddDg7sKmM3qqwMiDHvqMPu9zk=; b=lVGr3uwqSKzhvV2VLJGC4f4gffvRzeKNctFe+pFpttAlqpEsLcSUfWji QZi5xuiysp+dWC8hkAAmbpDu0EvPo/L+TqwVF3Y8EyeRfFyaZMhUargz4 FpRTPt0V9VAILa+9JFIg374ZbXCp+xOmDeQp+xT7nov2v4sOFe4IM90Fe g=;
X-IPAS-Result: A0AGAADkPLVjmIQNJK1aGgEBAQEBAQEBAQEDAQEBARIBAQEBAgIBAQEBQIE7BQEBAQELAYFaUoEFAlABCDpFhE6DTAOEUF+IIQOBE49ziweBLBSBEQNWDwEBAQ0BAS4LCwQBAYISgnMCFoR6AiU0CQ4BAgQBAQEBAwIDAQEBAQEBAwEBBQEBAQIBBwQUAQEBAQEBAQEeGQUOECeFaA2GVgEBAQEDAQEQEREMAQEjCQUGAQsEAgEGAhEEAQEBAgISARADAgICJQsUAQIBBQgCBAENBQgTB4JcAYMiAwEPkU+PPAGBPwKKH3qBMoEBgggBAQYEBIFOQZ0PAwaBFCwBhzp2XogUJxyBSUSBFUOBZkoHMD6CYgEBAgGBHxknFTECgw05gi6CNo8Yh0cKgT18gScOUBw3A0QdQAMLOzIKQDUGBQtLIgkaGweBCioJHxUDBAQDAgYTAyICDSgxFAQpEw0nJmsJAgMiYQUDAwQoLQkgBBwHFREkPAdWEiUBBAMCDx83BgMJAwIeT3ALJSQFAwsVKkcECDYFBhw2EgIIDxIPBiZDDkI3NhMGXAEqCw4TA1CBTgQvRIEZCgIEKSiaC12BLhBbBgE/KDsYBBAGBgEBLAILCxUKDAcBAioZDRIHBQQSGAYLAgQpkiwKOYMgmFCUAAqDbotTjV6HSxaDeYxal3Nel0YggiuKe5RWJAQPDQiEbQIEAgQFAg4BAQaBYjqBW3AVO4JnUhkPjiAMDQmDUIUUhUp1AgE4AgcBCgEBAwmJTA8XgjEBAQ
IronPort-PHdr: A9a23:YXPJnRShGhtcEtSeZnCm0KX7mNpso7vLVj580XJvo75Nc6H2+ZPkM QSf4Ph2l1bGUM3d7O4MkOvZta3sGAliqZaMuXwPatpAAhkCj8hFkwkpGsXQD0r9IbbjZDA7G 8IXUlhj8jm7PEFZFdy4aUfVpyi57CUZHVP0Mg8mTtk=
IronPort-Data: A9a23:+ZsJnKh4hk+3eGwJT+vcKfV7X161vBAKZh0ujC45NGQN5FlHY01je htvUWiGPf/cN2CjLox3boqzoUIB68XXndFkT1E+rCExFiNjpJueD7x1DKtf0wB+jyHnZBg6h ynLQoCYdKjYdleF+lH1dOKJQUBUjclkfJKkYAL/En03FFEMpBsJ00o5wLZg2tIw2LBVPivU0 T/Mi5yHULOa82Yc3lI8s8pvfzs24ZweEBtB1rAPTagjUG32zhH5P7pDTU2FFEYUd6EPdgKMq 0kv+5nilo/R109F5tpICd8XeGVSKlLZFVDmZna7x8FOjzAazhHe3JrXO9ICTF5lkxKvrup8y YlH6sfqbAw0MrblzbF1vxlwS0mSPIVP/LvBZHO4q8HWlhWAeHr3yPIoB0YzVWEa0r8oWicVq 7pBc3ZUNUrra+GemNpXTsF0msQ+JsTxIKsUu2prynfSCvNOrZXrGvSQv44CjWdYasZmMK+AS ekAcxhTZzfaQyZWMFA3OLk+k7L97pX4W2QI9A3KzUYt2EDNxRdw1LXrM92Td9CXTN9ZyxrAp n/P4Gn4RBodMfSTzDOf+TSti/PB2yThV+o6FaWmqNZrjUGdgGsJB3U+Vl+yvOL/hFS3XdF3M 0sP5icp66Q/nGShVNj0WVu15nWNpAYRXcZdCcU17QiMzuzf5APxO4QfZjdFbNpjv8gsSHlzj hmCnsjiAnpkt7j9pW+hGqm8sxarCzAyC144aC5YR1ReufzovY0op0eaJjp8K5KdgtrwEDD25 jmFqikimrke5fLnMY3moTgrZBrx/fD0oh4JChb/BTj6sFIgDGKxT8n5twaDsK0owJOxEwHpg ZQSpySJAAni57momTeUXeQREdlFDN7abWSA0DaD83TdnglBFlaqeYRWpTp5Pkosa55Ccj7ya 0iVsgRUjHOyAJdIRfMmC25SI511pUQFKTgDfquIBjapSsMrHDJrBAk0OSatM5nFySDAa50XN 5aBatqLBn0HE6lhxzfeb75DjuV0mXhgnjuKFMiTI/GbPVy2OSH9pVAtbQXmUwzFxPjsTPj9q owGbJLal32zrsWnOXSPmWLsEbz6BSFrWc+pwyCmXuWCOQFhUHowEOPcxKhJRmCWt/o9qws8x VnkAhUw4AOm3RXvcFzWAlg9M+mHdcgk8hoG0dkEYAzAN44LO9j/tc/ytvIfINEayQCU5aUvF 6VUI53fW6knp/au0211UKQRZbdKLHyD7T9i9QL8CNTjV/aMnzD0x+I=
IronPort-HdrOrdr: A9a23:Oo9nSa25mNqjIZ+Erfs/6AqjBRlyeYIsimQD101hICG9Lfb3qy n+ppsmPEHP5Ar5AEtQ5uxpOMG7MBfhHO1OkPcs1NCZLUbbUQqTXc1fBO7ZogEIdBeOjtK0W8 1bAtND4bHLfDpHZIPBkXWF+rUbsZe6GcKT9J3jJh5WJGkAAcwBnmRE40SgYzBLrWJ9dP0E/e +nl7N6Tk2bCBIqh6qAdxw4dtmGg+eOuIPtYBYACRJiwhKJlymU5LnzFAXd9gsCUhtUqI1SsF Ttokjc3OGOovu7whjT2yv49JJNgubszdNFGYilltUVEDPxkQylDb4RG4Fq/QpF491H2mxa1e UkkC1Qe/ibLEmhOV1dlCGdmTUIFgxerUMKh2Xo2EcL6vaJNQ7SQ/Ax9b6xNCGps3bJeLpHof h2N6XzjesNMfqIplWP2/HYEx5tjUa6unwkjKoaiGFeS5IXbPtLoZUY5149KuZKIMvW0vFvLA BVNrCV2N9GNVeBK3zJtGhmx9KhGnw1AxedW0AH/siYySJfknx1x1YRgJV3pAZMyLstD51fo+ jUOKVhk79DCscQcKJmHe8EBc+6EHbETx7AOH+bZV7nCKYEMXTQrIOf2sR+2Mi6PJgTiJcikp XIV11V8WY0ZkL1EMWLmIZG9xjcKV/NKwgFCvsukKSRloeMMIYDaxfzOmzGu/HQ1skiPg==
X-IronPort-Anti-Spam-Filtered: true
X-IronPort-AV: E=Sophos;i="5.96,299,1665446400"; d="scan'208";a="19229298"
Received: from alln-core-10.cisco.com ([173.36.13.132]) by rcdn-iport-5.cisco.com with ESMTP/TLS/DHE-RSA-SEED-SHA; 04 Jan 2023 08:49:51 +0000
Received: from mail.cisco.com (xfe-aln-005.cisco.com [173.37.135.125]) by alln-core-10.cisco.com (8.15.2/8.15.2) with ESMTPS id 3048npOG005054 (version=TLSv1.2 cipher=AES256-SHA bits=256 verify=OK); Wed, 4 Jan 2023 08:49:51 GMT
Received: from xfe-aln-002.cisco.com (173.37.135.122) by xfe-aln-005.cisco.com (173.37.135.125) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id 15.2.1118.15; Wed, 4 Jan 2023 02:49:50 -0600
Received: from NAM12-DM6-obe.outbound.protection.outlook.com (173.37.151.57) by xfe-aln-002.cisco.com (173.37.135.122) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id 15.2.1118.9 via Frontend Transport; Wed, 4 Jan 2023 02:49:50 -0600
ARC-Seal: i=1; a=rsa-sha256; s=arcselector9901; d=microsoft.com; cv=none; b=StCEnVN6/ewyyz0EeTNSOeIoq4xUd6bYvZ4N2ZUXPvCng0CGnwQ7fShriMV9v3Ee7XHvGwD2mzo4aZDH3rPn7d7nKm0Gz/5mjWa5RkXrvTkJbdQ4nYKHeV2in8JT9S7smvD4/0m2TX5QjinIhBLyTjVNWRnx/1LDk9ym8AKn2gDtNvKcTsNQL97+U50H6mm2w14e/3iQuTlpR1+bUhdUKSnQegol6a9O/3NjuCBaYJggAtHLZsiqlXO4QN3EuFG9hPHNuz6iaWObkETqIJs2inLxhT8EbFFucyy800AB2pwuWyVLIVg0feJ2wiyc+oUGI1XEhmqnG1EHYnTHmofjjw==
ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=microsoft.com; s=arcselector9901; h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-AntiSpam-MessageData-ChunkCount:X-MS-Exchange-AntiSpam-MessageData-0:X-MS-Exchange-AntiSpam-MessageData-1; bh=ejR+cEvp2351ve/CgMddDg7sKmM3qqwMiDHvqMPu9zk=; b=Ba/Y9Y9aGzmvTxmbt0stkixhwbAveraFzVz72mzj9hAihwVmYWQm3rMswYEIEwpv4p6AQ4yvyffgksmU11kE/bXPcz2xd3mJKzeH43U7kEKAtRf71X8jbGKp3XgTNrfxwrViSyC4Z7BJqgooOixt5mD76Dz8RHpzjMVDeBUxQFxKv59wmV1Z5N7+b+NkTEyNVKzUNVJMGYSqD/Tcw8KAG/OoH39WX6Mid3fWxUdV6zVvzivBWjWNGe4447EY0eDsCvjntiIECSvBIbQl/97Nc0LxeqDKBOulBe00J9nrFXtjjMIq+qItK2SM6L2xxTxauwGgbrUkHA9O+ExlCmb4qw==
ARC-Authentication-Results: i=1; mx.microsoft.com 1; spf=pass smtp.mailfrom=cisco.com; dmarc=pass action=none header.from=cisco.com; dkim=pass header.d=cisco.com; arc=none
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=cisco.com; s=selector1; h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-SenderADCheck; bh=ejR+cEvp2351ve/CgMddDg7sKmM3qqwMiDHvqMPu9zk=; b=niz75miEXAErKHy8geLduoS4B9Ymhs9LyBCDm/FHKE8Ekv7J3bNbsHB07fztLscWV7rI4W4Dwhga6tjlA/GDa/dxSOuG0DwCHDRuMoKaqU/+aCt749/iIa6u2ApUNPvBpADzC/KY0FEqnbxOT3G8S9MIhSmySaGhot9aa5cp/sU=
Received: from CO1PR11MB4881.namprd11.prod.outlook.com (2603:10b6:303:91::20) by SJ1PR11MB6081.namprd11.prod.outlook.com (2603:10b6:a03:48c::5) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id 15.20.5944.19; Wed, 4 Jan 2023 08:49:48 +0000
Received: from CO1PR11MB4881.namprd11.prod.outlook.com ([fe80::f631:7aba:3218:2625]) by CO1PR11MB4881.namprd11.prod.outlook.com ([fe80::f631:7aba:3218:2625%4]) with mapi id 15.20.5944.019; Wed, 4 Jan 2023 08:49:48 +0000
From: "Pascal Thubert (pthubert)" <pthubert@cisco.com>
To: Brian E Carpenter <brian.e.carpenter@gmail.com>, Klaus Frank <klaus.frank@posteo.de>, "ipv6@ietf.org" <ipv6@ietf.org>
CC: "Eric Levy- Abegnoli (elevyabe)" <elevyabe@cisco.com>, Vasilenko Eduard <vasilenko.eduard=40huawei.com@dmarc.ietf.org>
Thread-Topic: [IPv6] Suggestion for multi homed clients without NAT/NPT
Thread-Index: AQHZHOy10tlyITpfgU2tmThhOIcSga6K2mQAgADdL4CAAKMEUIAAeUwAgABMQICAANdtYA==
Date: Wed, 04 Jan 2023 08:49:33 +0000
Deferred-Delivery: Wed, 4 Jan 2023 08:49:07 +0000
Message-ID: <CO1PR11MB48818870BD773C8CE5A5505CD8F59@CO1PR11MB4881.namprd11.prod.outlook.com>
References: <b3742e2b-6472-9eb4-bee2-507fa8cdf4c6@posteo.de> <7db68981c1b1414da9ef213ace220d66@huawei.com> <9a40eeb5-df46-9c05-2cb4-08b77db66a98@gmail.com> <CO1PR11MB4881FC720FF4D6FCD6509EA4D8F49@CO1PR11MB4881.namprd11.prod.outlook.com> <e0b3f267-2c5c-8d98-293e-2e2e3e039c03@posteo.de> <5f46fc23-a4de-51e5-7c5d-d4b9fd7f4eb7@gmail.com>
In-Reply-To: <5f46fc23-a4de-51e5-7c5d-d4b9fd7f4eb7@gmail.com>
Accept-Language: fr-FR, en-US
Content-Language: en-US
X-MS-Has-Attach:
X-MS-TNEF-Correlator:
authentication-results: dkim=none (message not signed) header.d=none;dmarc=none action=none header.from=cisco.com;
x-ms-publictraffictype: Email
x-ms-traffictypediagnostic: CO1PR11MB4881:EE_|SJ1PR11MB6081:EE_
x-ms-office365-filtering-correlation-id: 03d5420c-984d-4568-f577-08daee30a2fd
x-ms-exchange-senderadcheck: 1
x-ms-exchange-antispam-relay: 0
x-microsoft-antispam: BCL:0;
x-microsoft-antispam-message-info: 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
x-forefront-antispam-report: CIP:255.255.255.255; CTRY:; LANG:en; SCL:1; SRV:; IPV:NLI; SFV:NSPM; H:CO1PR11MB4881.namprd11.prod.outlook.com; PTR:; CAT:NONE; SFS:(13230022)(4636009)(39860400002)(366004)(136003)(376002)(396003)(346002)(451199015)(83380400001)(66574015)(9686003)(26005)(55016003)(7696005)(6506007)(33656002)(6666004)(86362001)(38070700005)(122000001)(53546011)(38100700002)(186003)(4326008)(478600001)(41300700001)(66899015)(2906002)(52536014)(5660300002)(8936002)(30864003)(8676002)(66556008)(966005)(71200400001)(76116006)(66476007)(316002)(66946007)(64756008)(54906003)(66446008)(110136005); DIR:OUT; SFP:1101;
x-ms-exchange-antispam-messagedata-chunkcount: 1
x-ms-exchange-antispam-messagedata-0: NX5WlBA8Fm4KqWamkwNm51wPilXLLcYkuqeTc/cMfJqul7a8EqJWNPWZ894Z1IlzI/fDTULAbMA3R1B9zr1QhuigZ5XqfSXpijSPL6VhzDxD6fxYhzQXzYV1Wh51Ryk6+bVtqRnVvP0nYGtpz+tknN2XTBI3weTQ8AXrY6j7hQanu911uZm6bE6PCeCUFI3ZO2Lq3SkO2cu78qv32gGCLQYLS620nN2ntXFxJTI6fGkk+KlD58Zu4C1UaBC1CE0PM/mwjssuj4Xe+dgpMTtKm9x/L7O//tZ73RpGBLxSNVLHaEVEoI+PaQVkARFff881kNRn/NFmySe8pwinYFRz0GOiNHoflvURdM5FiEEBFzg5JeevJ/1O6qboYMAltmrU8AnJEHSnDhM8i2B+aE5rF+xh59G1O0xmqjBk0IPr0lLsxOswlc/fA1D0h8W37CGGHaERRqUopvCtzH6vtkYi5cJh0/+pPkyccBVMgtNaBU66Io/SgAI9qtXxI3iuQFe4LUaBXlYNPvwsdUcFxDRU7zBHNlSg/yBLQTePVp3uO7Ao1H3iwZVTOa5WhnkctOhDm73G/BCWKpymsy1SOXQWeaNVl1tUiPJi4dVUs8LDmAHOiKmdqzmdAnKRZxk26Tic99cy9mIZNg+hoWyK7aSODa/do0UHiRAtlrV0Rvpg85/trHvEIZpl29DAGX04oAi+d5JVjeOPXhuXT5udyeI+QNFh3Nl1qghWe1iVmNVbG+oWcXRcM0bpH6VOUDWTyHoNKqx+SkgyYl6PGQD1TTZhASqcQUtydt5NLAZfYAdhtxswQt+ZzyeS+KxNqppMo6WNAv+j14tBfbUWlemH7Zn5ztrPwEcbiusYx/H/WMi3P2WYvBsPUNsGesSwNNiHJgeGIWa1nsRQhK/+ZrKs5yG1JoJi7m5hG9acH0jA1u4Rfpxg7BhHSfO3KJ5ll+YVnRubrGczqOT88rOU9ZdBQHeeTJntEllv1t8NCfsqviHt0dtVfCcSyfdoDri/n28N3SrPnmUyg+oJ15GcQZs607vT1eehU0FfSpapxKkcAU6DYP0ITlKCmFfzgzhaEekGSwuaT5uppb2TiAIKWe8glDfb6VuLSIKYK+GHiuCKOj5zwXv8u1dILTSZBGNbYPCTKbTZ/syjB7TeWDXW43gn8Dm16LKMtZ7RB1agNq1O+j6UHdFLiL8Zk7UPOObqnFCmEl5Pbj2OSQvJYLi2GbJe6R16Xfn9Go9LN9lQMRCj57fFvh3uSvJzftwEHyQSAEWle7OhipWWdCDEJ4FMZCTIxJyQe5G2C+jG/UvfDqJTcOy+xZ6mqVIQV2bpOFtZUmMVgIiuHuMjldCmnv1sUhcPVKZvxViaoKKqGVPEqX5i6+bXU0tYxWmQO86pbpYNkAjUEBcy7WONSFDMBvOrClDS3LtCqgyR21+SknS9yivhu1rw9iKp/nSpHEGkXcuZKlb6nv17C2eFYtg5PVSP0bFJ+ttqiIpIfoTDGA1sI+2NqpogKOPuxS7WzY4wKzCx1rDE1ZzeeIa1/583n/6OPePvcngpJEBUxYu1Cnr+MfByrCsqjePBwTnYx7gojFlj0+yKnYp3
Content-Type: text/plain; charset="utf-8"
Content-Transfer-Encoding: base64
MIME-Version: 1.0
X-MS-Exchange-CrossTenant-AuthAs: Internal
X-MS-Exchange-CrossTenant-AuthSource: CO1PR11MB4881.namprd11.prod.outlook.com
X-MS-Exchange-CrossTenant-Network-Message-Id: 03d5420c-984d-4568-f577-08daee30a2fd
X-MS-Exchange-CrossTenant-originalarrivaltime: 04 Jan 2023 08:49:48.6271 (UTC)
X-MS-Exchange-CrossTenant-fromentityheader: Hosted
X-MS-Exchange-CrossTenant-id: 5ae1af62-9505-4097-a69a-c1553ef7840e
X-MS-Exchange-CrossTenant-mailboxtype: HOSTED
X-MS-Exchange-CrossTenant-userprincipalname: zFM2gSpPEjg5asLcGyR2XHrRK1dktmKPmKl60OmGz7mBbxzl+131CK6DyFg0ASJDDi/CFFGzkW9y1fI4nxFoWw==
X-MS-Exchange-Transport-CrossTenantHeadersStamped: SJ1PR11MB6081
X-OriginatorOrg: cisco.com
X-Outbound-SMTP-Client: 173.37.135.125, xfe-aln-005.cisco.com
X-Outbound-Node: alln-core-10.cisco.com
Archived-At: <https://mailarchive.ietf.org/arch/msg/ipv6/nTodVl0e1HKMETw08TwoUSaz38M>
Subject: Re: [IPv6] Suggestion for multi homed clients without NAT/NPT
X-BeenThere: ipv6@ietf.org
X-Mailman-Version: 2.1.39
Precedence: list
List-Id: "IPv6 Maintenance Working Group \(6man\)" <ipv6.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/ipv6>, <mailto:ipv6-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/ipv6/>
List-Post: <mailto:ipv6@ietf.org>
List-Help: <mailto:ipv6-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/ipv6>, <mailto:ipv6-request@ietf.org?subject=subscribe>
X-List-Received-Date: Wed, 04 Jan 2023 08:49:56 -0000

Hello Brian

Eric and I tested the proposal in the RFC on Cisco IOS, adding a few lines of code here and there on the MIP base. It did the multihoming trick quite fine.
For all I know the MIP and NEMO code is still in IOS so you can play with it, but I doubt that there's appropriate tunneling optimization for use in production.
There was a early code in Windows till some intermediate MIP draft then MSFT dropped it. I've never seen it in a phone but others will know better.

The most important thing that MIPv6 is missing for this purpose would be a control message from the HA saying that the Home Address is usable or not (PE/CE up/down). 
This way the host can select the HA and associated Home Address based on the avail/usability of that address. 
Without it I guess the host could still play happy eyeballs between the multihomed v6 home addresses as it does between v4 and v6 addresses already.

All the best for this new year!

Pascal

> -----Original Message-----
> From: ipv6 <ipv6-bounces@ietf.org> On Behalf Of Brian E Carpenter
> Sent: mardi 3 janvier 2023 20:53
> To: Klaus Frank <klaus.frank@posteo.de>; Pascal Thubert (pthubert)
> <pthubert@cisco.com>; Vasilenko Eduard
> <vasilenko.eduard=40huawei.com@dmarc.ietf.org>; ipv6@ietf.org
> Subject: Re: [IPv6] Suggestion for multi homed clients without NAT/NPT
> 
> On 04-Jan-23 04:20, Klaus Frank wrote:
> >
> > On 03.01.2023 09:28, Pascal Thubert (pthubert) wrote:
> >> Hello Brian:
> >>
> >> Quadrature du cercle, catch 22, whatever we call it, as you explain,
> changing the standards for hosts will not work. Left is to change the
> routers and tether phones.
> >>
> >> Combine that with SNAC where routers serving different prefixes must
> be aware of one another and you get something that's closer to ND than
> to a routing protocol where routers learn about each other and relay to
> the prefix owner based on the source address. And if the owner dies,
> then there's PAT as a plan B; though it's disruptive for existing
> connections, it's something that your communication software usually
> handles well and the disruption is often very short. At SNAC I suggested
> the phone could take over a home network that way when the ISP
> connection goes down.
> > With only NAT the connection will fail in almost all cases anyway
> > because of statefull firewalls on the other side. With my suggestions
> > applications (or the operating system) could establish multiple
> > connections one per source IP and transparently failover.
> >> This is something I've presented at various WGs including SNAP in
> London at the last IETF meeting. The draft is
> https://datatracker.ietf.org/doc/draft-thubert-6lo-prefix-registration/.
> It is also a fine complement to the prefix delegation to the host, and
> to the SNAC solution. Both are missing the little magic between DHCP and
> the routers.
> >>
> >> Alt: we've had like forever an MIPv6-based solution whereby the
> internal network is ULA only, and the hosts that need to go outside must
> obtain a home address from the egress routers, the public prefix serving
> as Home Network, the ULA as careof. This was hinted sections 3.4 and 4.7
> of RFC 4864, yes, 15 years ago (and a patent of mine BTW ;). Either
> unaware hosts are either cut from internet, or there's a conscious
> decision to PAT the ULA  prefix at the router as in plan B above.
> >
> > I never thought about it this way, but I kinda like this approach. But
> > sadly MIPv6 doesn't have that great software and documentation
> > coverage (yet)...
> 
> Strangely enough I quite like the proposal in RFC 4864, but my working
> assumption has been that MIPv6 is a mythical protocol. Is there actually
> running code?
> 
> (The patent really isn't an issue, IMHO, since the license is reciprocal
> RAND.)
> 
>     Brian
> 
> >
> > If we were still in the early phases of IPv6 standardization, I'd
> > suggest for making this the default/recommended setup. Probably would
> > also eliminate many of these "but it has a public IPv6 so it is
> > publicly reachable and therefore insecure" nonsense discussions...
> >
> > Speaking of which, UPnPv6 is another issue that should be addressed
> > someday. In many environments there is currently no way to open ports
> > for inbound connections dynamically through statefull firewalls with
> > IPv6 addresses (as UPnPv6 almost always doesn't work even if it is
> > present). Providing the same issue as NAT. But that's a topic for
> > another day...
> >
> >> All the best,
> >>
> >> Pascal
> >>
> >>> -----Original Message-----
> >>> From: ipv6 <ipv6-bounces@ietf.org> On Behalf Of Brian E Carpenter
> >>> Sent: lundi 2 janvier 2023 23:23
> >>> To: Vasilenko Eduard <vasilenko.eduard=40huawei.com@dmarc.ietf.org>;
> >>> Klaus Frank <klaus.frank@posteo.de>; ipv6@ietf.org
> >>> Subject: Re: [IPv6] Suggestion for multi homed clients without
> >>> NAT/NPT
> >>>
> >>> On 02-Jan-23 22:10, Vasilenko Eduard wrote:
> >>>> Hi Klaus,
> >>>> It is already possible:
> >>>> 1. Use RIO (RFC 4191) to prioritize the choice of the next hop 2.
> >>>> Then use rule 5.5 RFC 6724 to restrict the choice of PIO among
> >>>> those
> >>> advertised by this router only.
> >>>
> >>> Let's not forget that (as pointed out previously) there is no
> >>> standardized way to update RFC 6724 behaviour in all nodes in a
> network.
> >>> Even if we issued RFC6724bis today with rule 5.5 raised to a MUST,
> >>> and changed the recommended default table, or suggested dynamic
> >>> updates to that table, nothing would change in existing hosts that
> >>> don't support rule 5.5.
> >>>
> >>> There's a bit the same problem in Klaus's proposal. It describes
> >>> some changes that would (I assume) work in Linux hosts, but they
> >>> would be different in non-Linux hosts, especially Windows, and there
> >>> is nothing a typical NOC could do that would deploy them.
> >>>
> >>> We need a holistic solution, and for now I'm not sure what that
> >>> could be.
> >>>
> >>> (I agree with you, BTW, that the question of when source address
> >>> selection occurs is also worth discussion. These problems are all
> >>> intertwined.)
> >>>
> >>>       Brian
> >>>
> >>>> The above is a little bit less powerful than the proposed below
> >>>> because If the router (advertised RIO) has many PIOs then which one
> >>>> to
> >>> use?
> >>>> Your answer below this question too.
> >>>> (RFC 7157 was discussing that it is possible to use RFC 7078 for
> >>>> this
> >>>> - it is extremely complex)
> >>>>
> >>>> I see your proposal as an extension of RFC 4191.
> >>>> I still like the reverse of decision logic in RFC 6724 (choose
> >>>> source address first then next hop), But your proposal looks
> >>>> reasonable to me
> >>> too.
> >>>> Eduard
> >>>> -----Original Message-----
> >>>> From: ipv6 [mailto:ipv6-bounces@ietf.org] On Behalf Of Klaus Frank
> >>>> Sent: Saturday, December 31, 2022 10:51 AM
> >>>> To: ipv6@ietf.org
> >>>> Subject: [IPv6] Suggestion for multi homed clients without NAT/NPT
> >>>>
> >>>> Hi,
> >>>>
> >>>> a few weeks ago I was part of a discussion about how to do IPv6
> >>>> without
> >>>> NAT66/NPT66 in a network with multiple up-links. And the result was
> >>> that it is currently not reasonably possible for a number of
> >>> limitations imposed by ISPs to end users (or global routing table
> size).
> >>>> Therefore after some investigation into this problem I'd like to
> >>> suggest two solutions without NAT that will work without manually
> >>> configuring clients.
> >>>> #1 RAPBR (Router Advertised Policy Based Routing)
> >>>> #2 Restricted source prefix flag within the Route Information
> >>>> Option
> >>>>
> >>>> The first one is more general and could be used independently for
> >>>> all
> >>> kinds of policy based routing, where as the 2nd one is a minimal
> >>> solution to specifically this problem. I'd like to suggest
> >>> standardizing (and adopting) both for exactly that reason.
> >>>> Please let me know what you think.
> >>>>
> >>>> Sincerely,
> >>>> Klaus Frank
> >>>>
> >>>>
> >>>>      Goal
> >>>>
> >>>> A user/small business wants to have redundant network connectivity
> >>>> and
> >>> also have a number of in-house hosted services. While keeping the
> >>> tech- stack simple and costs minimal.
> >>>> With IPv4 the setup looks like:
> >>>> * User buys dedicated DSL up-links from two different ISPs (and
> >>> potentially pays for cables being put into the ground).
> >>>> * User connects each of the DSL lines to the ISP provided CPE
> >>> (Customer-premises equipment).
> >>>> * User connects Load Balancer cluster with one cable each to the
> CPEs.
> >>>> * NAT44 happens twice in this configuration. First at the load
> >>> balancer and another time on the CPE.
> >>>> * (optional) CPEs could be configured to only serve as modems and
> >>>> the
> >>> Load Balancing device could do the login and connection, but that
> >>> doesn't change much except remove one of the two address
> translations.
> >>>> But it is a little bit more complex to setup. And could cause
> >>>> issues
> >>> with support/remote diagnostics. So going to ignore it and using the
> >>> general case.
> >>>> ISP 1 ======> Load Balancer <====== ISP 2
> >>>>                         ||
> >>>>                         ||
> >>>>                         \/
> >>>>                   Local Network
> >>>>
> >>>>
> >>>>      Currently possible setups
> >>>>
> >>>>
> >>>>        #1 peering with multiple ISPs
> >>>>
> >>>>
> >>>>          Cons
> >>>>
> >>>> * Own IP range  and ASN required
> >>>> * ISP needs to offer it. Most don't to normal end users.
> >>>> * Significantly more expensive
> >>>> * Advanced network setup (not for pro-users or non-enterprises
> >>>> admins)
> >>>> * If everyone that wants a dual up-link (or just the possibility to
> >>> have it later) would request a IPv6-PI space and an ASN number we'll
> >>> run into issues with the global routing table size. And a lot of
> >>> people were pushing back on the idea of using IPv6-PI space for
> >>> networks with multiple up-links.
> >>>>
> >>>>          Pros
> >>>>
> >>>> * The way IPv6 was designed to handle this
> >>>> * Conceptually the simplest one.
> >>>>
> >>>>
> >>>>        #2 NAT66/NPT66
> >>>>
> >>>>
> >>>>          Cons
> >>>>
> >>>> * NAT, breaks E2E visibility
> >>>> * Breaks P2P traffic (WebRTC, Torrent, ...)
> >>>> * Same issues as with NAT44, thereby destroys all benefits of
> >>>> simplifying the connection logic within applications (same NAT
> >>>> detection logic and workarounds required as with IPv4)
> >>>> * Issues with inbound traffic in general (not suitable for servers)
> >>>> * Pushes bad network design by using NAT. People will use it way
> >>>> too
> >>> often. It shouldn't be the goto solution for this problem or people
> >>> will start to use it everywhere like with IPv4.
> >>>> * Remote hosts may drop connection as source IP changed within one
> >>> connection and respond with a RST anyway (or get blocked by
> >>> statefull firewalls).
> >>>> * Clients completely unaware of the address translation. Remote
> >>>> sees
> >>> different IP than the client used as source. And that may result in
> >>> connectivity issues.
> >>>>
> >>>>          Pros
> >>>>
> >>>> * Known concept from IPv4. Basically the same network design. NAT
> >>>> at
> >>> the border.
> >>>> * Kinda works for some outbound traffic like web browsing.
> >>>>
> >>>>
> >>>>      Proposed Solutions
> >>>>
> >>>>
> >>>>        RAPBR (Router Advertised Policy Based Routing)
> >>>>
> >>>> RAPBR will basically extend the router advertisement messages to
> >>>> tell clients that a specific route is only valid with a specific
> >>>> source prefix. Now clients can just plug multiple CPE routers into
> >>>> a network and have both advertise their prefix and their routes. A
> >>>> client that receives such a message will configure its address as
> >>>> usual but when adding the route from the message will also add a
> source policy.
> >>>>
> >>>> e.g. `default via fe80::5139:b2ca:e8ad:1234 dev eth2  metric 1004
> >>>> src 2001:db8::1` instead of `default via fe80::5139:b2ca:e8ad:1234
> >>>> dev
> >>>> eth2 metric 1004` will be added to the routing table.
> >>>>
> >>>> Additionally to this also using a source prefix should be valid in
> >>>> the future (currently manually configured routes can use the src
> >>>> instruction, but router advertisements cannot; Also the src keyword
> >>>> currently only allows a single address and not a prefix. For a
> >>>> whole prefix a more complex setup using ip rule and tables is
> required).
> >>>>
> >>>> For this to work a new IPv6 Neighbor Discovery Option number is
> >>>> assigned (e.g. the next free one, 42) and using a package format
> of:
> >>>>
> >>>>           0 1                   2                   3
> >>>>            0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7
> >>>> 8 9 0
> >>>> 1
> >>>> +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
> >>>>           |     Type      |    Length     | Prefix Length |
> >>>> SrcPref.Length|
> >>>> +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
> >>>>           |                   Prefix (Variable
> >>> Length)
> >>>> | . .
> >>>> . .
> >>>> +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
> >>>>           |               Src Prefix (Variable
> >>> Length)
> >>>> | . .
> >>>> . .
> >>>> +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
> >>>>
> >>>>        Fields:
> >>>>
> >>>>        Type        42
> >>>>
> >>>>        Length      8-bit unsigned integer. The length of the option
> >>>>                    (including the Type and Length fields) in units
> of 8
> >>>>                    octets.  The Length field is 1, 2, or 3
> >>>> depending on
> >>> the
> >>>>                    Prefix Length.  If Prefix Length is greater than
> >>>> 64,
> >>> then
> >>>>                    Length must be 3.  If Prefix Length is greater
> >>>> than
> >>> 0,
> >>>>                    then Length must be 2 or 3.  If Prefix Length is
> >>> zero,
> >>>>                    then Length must be 1, 2, or 3.
> >>>>
> >>>>        Prefix Length
> >>>>                    8-bit unsigned integer.  The number of leading
> >>>> bits
> >>> in
> >>>>                    the Prefix that are valid.  The value ranges
> >>>> from 0
> >>> to
> >>>>                    128.  The Prefix field is 0, 8, or 16 octets
> >>> depending on
> >>>>                    Length.
> >>>>
> >>>>        SrcPrefix Length
> >>>>                    8-bit unsigned integer.  The number of leading
> >>>> bits
> >>> in
> >>>>                    the Source Address Prefix that are valid.  The
> value
> >>>>                    ranges from 0 to 128.  The Prefix field is 0, 8,
> or
> >>>>                    16 octets depending on Length.
> >>>>
> >>>>        Prefix
> >>>>                    Variable-length field containing an IP address
> or a
> >>>>                    prefix of an IP address.  The Prefix Length
> field
> >>>>                    contains the number of valid leading bits in the
> >>> prefix.
> >>>>        SrcPrefix
> >>>>                    Variable-length field containing an IP address
> or a
> >>>>                    prefix of an IP address.  The SrcPrefix Length
> field
> >>>>                    contains the number of valid leading bits in the
> >>> source
> >>>>                    prefix.
> >>>>
> >>>>
> >>>>        Restricted source prefix flag within the Route Information
> >>>> Option
> >>>>
> >>>> Alternatively to the above solution also using one of the bits of
> >>>> the reserved bits of Router Information Option (Type 24, RFC4191)
> >>>> for telling clients that advertised routes are only valid for the
> >>>> prefixes that are advertised by the same sender/within the same
> message.
> >>>>
> >>>>           0 1                   2                   3
> >>>>            0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7
> >>>> 8 9 0
> >>>> 1
> >>>> +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
> >>>>           |     Type      |    Length     | Prefix Length | Res
> >>>> |Prf|F|Res|
> >>>> +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
> >>>>           |                        Route
> >>> Lifetime
> >>>> |
> >>>> +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
> >>>>           |                   Prefix (Variable
> >>> Length)
> >>>> | . .
> >>>> . .
> >>>> +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
> >>>>
> >>>>        Res (Reserved)
> >>>>                    Two unused fields.  First one is 3-bit and the
> other
> >>>>                    one is 2-bit.  They MUST be initialized to
> >>>>                    zero by the sender and MUST be ignored by the
> >>> receiver.
> >>>>        F (Filtered)
> >>>>                    1-bit flag.  When set to 1 indicates to
> >>>> receivers
> >>> that
> >>>>                    this route must only ever be used with one of
> the
> >>>>                    advertised prefixes (See Type 3, RFC4861 section
> >>> 4.6.2).
> >>>> -------------------------------------------------------------------
> >>>> - IETF IPv6 working group mailing list ipv6@ietf.org Administrative
> >>>> Requests: https://www.ietf.org/mailman/listinfo/ipv6
> >>>> -------------------------------------------------------------------
> >>>> -
> >>> --------------------------------------------------------------------
> >>> IETF IPv6 working group mailing list ipv6@ietf.org Administrative
> >>> Requests: https://www.ietf.org/mailman/listinfo/ipv6
> >>> --------------------------------------------------------------------
> --------------------------------------------------------------------
> IETF IPv6 working group mailing list
> ipv6@ietf.org
> Administrative Requests: https://www.ietf.org/mailman/listinfo/ipv6
> --------------------------------------------------------------------