Re: 6MAN WG Last Call: draft-ietf-6man-rfc3484-revise-05.txt

Arifumi Matsumoto <arifumi@nttv6.net> Tue, 14 February 2012 17:03 UTC

Return-Path: <arifumi@nttv6.net>
X-Original-To: ipv6@ietfa.amsl.com
Delivered-To: ipv6@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 4077621F8729 for <ipv6@ietfa.amsl.com>; Tue, 14 Feb 2012 09:03:29 -0800 (PST)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -102.339
X-Spam-Level:
X-Spam-Status: No, score=-102.339 tagged_above=-999 required=5 tests=[AWL=0.260, BAYES_00=-2.599, USER_IN_WHITELIST=-100]
Received: from mail.ietf.org ([12.22.58.30]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id PLrp1Pw2HDmS for <ipv6@ietfa.amsl.com>; Tue, 14 Feb 2012 09:03:28 -0800 (PST)
Received: from leo.nttv6.net (leo.nttv6.net [192.47.162.93]) by ietfa.amsl.com (Postfix) with ESMTP id 11D4521F84B3 for <ipv6@ietf.org>; Tue, 14 Feb 2012 09:03:25 -0800 (PST)
Received: from [127.0.0.1] (localhost.nttv6.net [IPv6:::1]) by leo.nttv6.net (8.14.5/8.14.4) with ESMTP id q1EH4LuT035970; Wed, 15 Feb 2012 02:04:21 +0900 (JST) (envelope-from arifumi@nttv6.net)
References: <4EB3F3D6.4090302@innovationslab.net> <CAC1-dtnas++ahkBmpdyq7DbyAEg0W6bZY16qGzKmsP10vC39FQ@mail.gmail.com> <4EEA3D20.7020603@innovationslab.net> <CAKFn1SFvs0PzBXtEWWo814Oe5TJmbQEJBm5FeYJY5xzrr=KFSw@mail.gmail.com> <4EEA5793.8080800@gmail.com> <CAKFn1SHA-=cQ_=5rJVLVMvQYXoTL_D1dCR=uWZK-qFrcGp6P-w@mail.gmail.com> <4EEA7AF8.2090508@gmail.com> <CAC1-dtn9M8-9cPAmkhCiGV0Gi5+Gfs8GAssTOaA-ZFhyUY3feg@mail.gmail.com> <9B57C850BB53634CACEC56EF4853FF653B3C3777@TK5EX14MBXW601.wingroup.windeploy.ntdev.microsoft.com> <9B57C850BB53634CACEC56EF4853FF653B3EDB9E@TK5EX14MBXW601.wingroup.windeploy.ntdev.microsoft.com> <9B57C850BB53634CACEC56EF4853FF653B3F1DD6@TK5EX14MBXW601.wingroup.windeploy.ntdev.microsoft.com> <9B57C850BB53634CACEC56EF4853FF653B3F3557@TK5EX14MBXW601.wingroup.windeploy.ntdev.microsoft.com>
In-Reply-To: <9B57C850BB53634CACEC56EF4853FF653B3F3557@TK5EX14MBXW601.wingroup.windeploy.ntdev.microsoft.com>
Mime-Version: 1.0 (Apple Message framework v1084)
Content-Type: text/plain; charset="us-ascii"
Message-Id: <1D57B1DC-79A4-4935-961E-830277F29715@nttv6.net>
Content-Transfer-Encoding: quoted-printable
From: Arifumi Matsumoto <arifumi@nttv6.net>
Subject: Re: 6MAN WG Last Call: draft-ietf-6man-rfc3484-revise-05.txt
Date: Wed, 15 Feb 2012 02:02:01 +0900
To: Dave Thaler <dthaler@microsoft.com>
X-Mailer: Apple Mail (2.1084)
Cc: 'Bob Hinden' <bob.hinden@gmail.com>, 'Brian Haberman' <brian@innovationslab.net>, "'ipv6@ietf.org'" <ipv6@ietf.org>
X-BeenThere: ipv6@ietf.org
X-Mailman-Version: 2.1.12
Precedence: list
List-Id: "IPv6 Maintenance Working Group \(6man\)" <ipv6.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/ipv6>, <mailto:ipv6-request@ietf.org?subject=unsubscribe>
List-Archive: <http://www.ietf.org/mail-archive/web/ipv6>
List-Post: <mailto:ipv6@ietf.org>
List-Help: <mailto:ipv6-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/ipv6>, <mailto:ipv6-request@ietf.org?subject=subscribe>
X-List-Received-Date: Tue, 14 Feb 2012 17:03:29 -0000

Dave,

another point below.

On 2012/02/14, at 8:55, Dave Thaler wrote:

>> -----Original Message-----
>> From: Dave Thaler
>> Sent: Monday, February 13, 2012 2:01 PM
>> To: Dave Thaler; 'Chris Grundemann'; 'Brian E Carpenter'
>> Cc: 'ipv6@ietf.org'; 'Brian Haberman'; 'Bob Hinden'
>> Subject: RE: 6MAN WG Last Call: draft-ietf-6man-rfc3484-revise-05.txt
>> 
>> Yet another problem in draft-ietf-6man-rfc3484-revise...
>> 
>> Section 2.4 (Private IPv4 address scope):
>> [...]
>>>  The algorithm currently specified in RFC 3484 is based on the
>>>  assumption that a source address with a small scope cannot reach a
>>>  destination address with a larger scope.
>> [...]
>> 
>> The above sentence is simply not true, it was NOT based on such an assumption
>> at all.  It was based on the assumption that it was
>> less likely to work.   There's two reasons why it's less likely to work.
>> First, it might or might not be able to reach it (the text overstates by saying it
>> cannot... it was acknowledged that it may or may not).
>> Second, if it goes through a NAT, it might not work for protocols that embed IP
>> addresses in payloads.
>> [...]
>> 
>>>  Due to this assumption, in the presence of both a NATed private IPv4
>>>  address and a transitional address (like 6to4 or Teredo), the host
>>>  will choose the transitional IPv6 address to access dual-stack peers
>>>  [I-D.denis-v6ops-nat-addrsel].  Choosing transitional IPv6
>>>  connectivity over native IPv4 connectivity, particularly where the
>>>  transitional connectivity is unmanaged, is not considered to be
>>>  generally desirable.
>>> 
>>>  This issue can be fixed by changing the address scope of private IPv4
>>>  addresses to global.
>> 
>> Section 10 of RFC 3484 contained many examples.   -revise contains
>> no such example of what it's talking about, so I have to guess.  Let's look at 3
>> cases.
>> 
>> Case 1:
>> D set = { global IPv6, global IPv4 }
>> S set = { Teredo IPv6, RFC1918 IPv4 }
>> 
>> Under RFC 3484 rules, Destination Address Selection would prefer the Teredo
>> connectivity under rule 2 (Prefer matching scope).
>> 
>> Under -revise rules, Destination Address Selection would still prefer the Teredo
>> connectivity under rule 6 (Prefer higher precedence), since the precedence of
>> the (non-Teredo) destination address
>> beats the precedence of the IPv4 address.   Hence -revise
>> does not change the behavior in this case.
> 
> Dmitry Anipko pointed out that rule 5 (Prefer matching label) would cause
> the -revise rules to prefer IPv4.  Still, I'd prefer a solution that doesn't solve
> this problem by creating another one (case 3).   That is, we should fix a problem
> rather than just move it around.
> 
> I'll think about this and  see if I can come back with a proposal.

>> Case 3:
>> D set = { global IPv4 = 1.2.3.4 }
>> S set = { NAT-ed IPv4 = 10.2.3.4, global IPv4 = 128.66.3.4 }
>> 
>> Under RFC 3484 rules, Source Address Selection would prefer the global IPv4
>> address under Rule 2(Prefer appropriate scope).
>> Under -revise rules, Source Address Selection would instead prefer the NAT'ed
>> IPv4 under Rule 8 (Longest matching prefix).
>> 
>> This is broken.   I don't see a real case the proposed change
>> fixes, I only see real cases it breaks.


AFAIK, neither RFC 3484 nor -revise specifies source address selection algorithm
for an IPv4 destination address. Simply, it is out of scope of these documents.

Do you want to cover these issues in the revision ?

Best regards, 

> 
> -Dave
> 
>> 
>> Case 2:
>> D set = { Teredo IPv6, global IPv4 }
>> 
>> Not an interesting case because Teredo addressing should be disabled when a
>> host has a global IPv4 address.
>> 
>> Case 3:
>> D set = { global IPv4 = 1.2.3.4 }
>> S set = { NAT-ed IPv4 = 10.2.3.4, global IPv4 = 128.66.3.4 }
>> 
>> Under RFC 3484 rules, Source Address Selection would prefer the global IPv4
>> address under Rule 2(Prefer appropriate scope).
>> Under -revise rules, Source Address Selection would instead prefer the NAT'ed
>> IPv4 under Rule 8 (Longest matching prefix).
>> 
>> This is broken.   I don't see a real case the proposed change
>> fixes, I only see real cases it breaks.
>> 
>> -Dave
> 
> --------------------------------------------------------------------
> IETF IPv6 working group mailing list
> ipv6@ietf.org
> Administrative Requests: https://www.ietf.org/mailman/listinfo/ipv6
> --------------------------------------------------------------------