Re: L=0 [was draft-pioxfolks-6man-pio-exclusive-bit-02.txt]

Mark Smith <markzzzsmith@gmail.com> Sat, 03 February 2018 23:07 UTC

Return-Path: <markzzzsmith@gmail.com>
X-Original-To: ipv6@ietfa.amsl.com
Delivered-To: ipv6@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id D2D15124B18 for <ipv6@ietfa.amsl.com>; Sat, 3 Feb 2018 15:07:25 -0800 (PST)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -1.497
X-Spam-Level:
X-Spam-Status: No, score=-1.497 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, DKIM_SIGNED=0.1, DKIM_VALID=-0.1, DKIM_VALID_AU=-0.1, FREEMAIL_FROM=0.001, FROM_LOCAL_NOVOWEL=0.5, HK_RANDOM_ENVFROM=0.001, HTML_MESSAGE=0.001, RCVD_IN_DNSWL_NONE=-0.0001, SPF_PASS=-0.001, URIBL_BLOCKED=0.001] autolearn=no autolearn_force=no
Authentication-Results: ietfa.amsl.com (amavisd-new); dkim=pass (2048-bit key) header.d=gmail.com
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id 4JdFzHM0UJRU for <ipv6@ietfa.amsl.com>; Sat, 3 Feb 2018 15:07:24 -0800 (PST)
Received: from mail-ua0-x236.google.com (mail-ua0-x236.google.com [IPv6:2607:f8b0:400c:c08::236]) (using TLSv1.2 with cipher ECDHE-RSA-AES128-GCM-SHA256 (128/128 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id C623D1204DA for <ipv6@ietf.org>; Sat, 3 Feb 2018 15:07:23 -0800 (PST)
Received: by mail-ua0-x236.google.com with SMTP id j23so16475510uak.13 for <ipv6@ietf.org>; Sat, 03 Feb 2018 15:07:23 -0800 (PST)
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=gmail.com; s=20161025; h=mime-version:in-reply-to:references:from:date:message-id:subject:to :cc; bh=PIYxG7Mg5BaIjStJW2zYi3a3JY9JeL3PUnuQXXJ7XrI=; b=HJrOWnQ2+hndack3gIC9YwPdiE7aBffNvf1VnqPxth3emKmroCGPB5cXWpWEQ8/IkA qfToIV3JGc4GJq05GQNE+/97YDcPb+WslWj/34NBoAql5JiirQ5LlKdbsccsVRU+jp2z o5sDF+fNE8cQ5QdSrmp5LfeIfwtSQrXF9EzTdWYRS4IJVrLO0R3yVHGNA1BXymi1lDHJ G+dt3BoBILJXUP3/o2vRF0fmpoN2Qd6cgOP4vUW1sD+KYxEur+/ytnNShTGrEPLzjUHY zvrsnKPnMWS8Mz3ym5oq77yyDMik9ZJVRoMdAOzlBSl+b1X9Bb7W74yCqXFQabY2bhQa foqQ==
X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20161025; h=x-gm-message-state:mime-version:in-reply-to:references:from:date :message-id:subject:to:cc; bh=PIYxG7Mg5BaIjStJW2zYi3a3JY9JeL3PUnuQXXJ7XrI=; b=f42S7KEdHiDmAXjmstXzKHYqKnV/r7Vi2DRwph8WUR+vBy+H0CcQbWC6I2iTESzKcB ncjlrxDmQrAh7kRsBBdWDddEoNSO+jiJ0AsCGhmeDf87NFmlgXk5IuayqXraiZCDV8rP 48cwaZrarsxVdKbYsO6LkStksimftUDAS4PSmRo7i271aO5BAKBeaoNp/O6i6LDhrxJP zEjN/1AKK7ZbVlpgw6zwIWkXwPeREDFDJks0axBP9T8tRQE5epM5CviTFJ+1Q8yy3+e0 hgVcqtKRxmv8pc4erO21d8itlqC2AXxGL212JrZexng4qgEO0l4CCynRpmU6nPFDPzad gUYQ==
X-Gm-Message-State: AKwxyte3QmfZaYpRTC3ZH4u6ORbZ4+dyQa1KbIBHaqNJ6bVjxiNb39et 7/Ola/KcImkhkOaRDrbDeOGqlqO5RxytbrfYFq7sSw==
X-Google-Smtp-Source: AH8x224/eC5Xaj8JSY0Ubz9tTSji6waNagckriVjItOLRCg+3yKCT7AQvaQTdNPeBHNAdxStBQHZwVeMq/FxvvYFJWU=
X-Received: by 10.159.54.74 with SMTP id s10mr38452051uad.57.1517699242670; Sat, 03 Feb 2018 15:07:22 -0800 (PST)
MIME-Version: 1.0
Received: by 10.176.3.248 with HTTP; Sat, 3 Feb 2018 15:06:52 -0800 (PST)
In-Reply-To: <alpine.DEB.2.20.1802010956570.8884@uplift.swm.pp.se>
References: <91953634-9B4A-405B-AB36-FBB2079A0A40@gmail.com> <CAN-Dau3dVKG_Dfg6ttWJEvd+VF_kzAC84Gu6dpZTVWXvY1NB1w@mail.gmail.com> <A0E57571-045C-4BA0-85D1-6BD41CE47BBE@google.com> <1cb807ddcfb7402681d3361c7f0cf7b9@XCH15-06-08.nw.nos.boeing.com> <CAKD1Yr3fSUt0jf71m+v6MBfxadsiUtemJKhpazFbZFk1a1DASw@mail.gmail.com> <1CBC2CBA-8076-46BC-A24D-5920C32111F0@google.com> <205AB90F-2B9A-4E3E-B2C9-792E4FAEFEEB@google.com> <18854.1517233055@obiwan.sandelman.ca> <1345.1517236806@obiwan.sandelman.ca> <a57696ee-47c3-5de1-c5b4-223c8b11d912@gmail.com> <CAO42Z2w0gd6C7qGpF2rhRAPaMG1nZMU9cPm0yRD6cZBr53EhgA@mail.gmail.com> <44C1900B-5CAA-4EF8-A405-EBE87871DCAC@employees.org> <CAO42Z2worXnmmTEx7_g_R1kuoywc40O0Yo7b6Bf4cdLJ70=rFA@mail.gmail.com> <alpine.DEB.2.20.1801300611070.8884@uplift.swm.pp.se> <CAO42Z2ydjfsvL0ita9TW8Hgrqfd30E6BSPAf0DmLn0cZaCt3tg@mail.gmail.com> <alpine.DEB.2.20.1801311042240.8884@uplift.swm.pp.se> <CAO42Z2zRRnV-Uc2PAg3KOYGyDTer7beWMXev_jYn1Lx5uRi9vw@mail.gmail.com> <alpine.DEB.2.20.1802010956570.8884@uplift.swm.pp.se>
From: Mark Smith <markzzzsmith@gmail.com>
Date: Sun, 04 Feb 2018 10:06:52 +1100
Message-ID: <CAO42Z2y0eWRcNDuSkXg8FQ1XiFMkmU50xRVrqkWKTs-KmBXqAg@mail.gmail.com>
Subject: Re: L=0 [was draft-pioxfolks-6man-pio-exclusive-bit-02.txt]
To: Mikael Abrahamsson <swmike@swm.pp.se>
Cc: 6man WG <ipv6@ietf.org>
Content-Type: multipart/alternative; boundary="001a114959ae3c3e35056456e4b5"
Archived-At: <https://mailarchive.ietf.org/arch/msg/ipv6/omeYJGQs-6vbNmiO2uFPJZmGSgo>
X-BeenThere: ipv6@ietf.org
X-Mailman-Version: 2.1.22
Precedence: list
List-Id: "IPv6 Maintenance Working Group \(6man\)" <ipv6.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/ipv6>, <mailto:ipv6-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/ipv6/>
List-Post: <mailto:ipv6@ietf.org>
List-Help: <mailto:ipv6-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/ipv6>, <mailto:ipv6-request@ietf.org?subject=subscribe>
X-List-Received-Date: Sat, 03 Feb 2018 23:07:26 -0000

On 1 February 2018 at 20:02, Mikael Abrahamsson <swmike@swm.pp.se> wrote:

>
> I can only guess what you wrote down here. So I'm going to guess that you
> wrote "You're saying hosts that have a common LL prefix *aren't* on the
> same link?" and answer that.
>
> Your definition if "link" is too rigid. There can be lots of things done
> on L2 that would mean the answer to your question is "well, kind of".
>

It  doesn't matter what my definition is, what matters is what IPv6's
definition is.

IPv6 expects a link supports multicast, so that RAs, ND and DAD work. If
the link doesn't support multicast, it is to be emulated per IPv6 over NBMA.

IPv6 expects any to any unicast, because the Link Local Prefix is marked as
On-link, and that cannot be changed.

IPv6 expects Link-Locals to work for applications when GUAs/ULAs won't,
because IPv6 src/dest selection prefers LLAs over GUA/ULA when given a
choice.

(A perverse situation is that src/dst address selection prefers LLAs over
GUA/ULAs, yet on these types of links, as LLA L=1 (and cannot be changed),
and GUA/ULA is set to L=0 via RA PIO, application connectivity will fail
even though hosts on the link are reachable via the GUA/ULA addresses.
Preferring LLAs makes sense, smaller scope and more local addresses should
be more reliable than greater and less local addresses.)



>
> If two hosts can't talk to each other directly over L2 (all traffic is
> forwarded via the router),

the router (perhaps) defends their respective LLA and does forwarding
> between these LLA addresses, the L2 (perhaps) enforces LLA/MAC address
> mapping (using SAVI) etc, are they on the same link? The router sees all
> their traffic coming in on the same interface.
>


I think having a device pretend to be another is a hack. The better
solution would be to indicate to hosts that they are to reach LLAs via the
router(s) on the link - "Indicating Link-Local Unicast Destinations are
Off-Link"  -
https://www.ietf.org/archive/id/draft-smith-6man-link-locals-off-link-00.txt

Then you still have the multicast reachability issue, meaning that ND and
DAD don't work.

The answer would appear to be DAD Proxy (RFC6957). Trouble is, that is also
a hack because it is one device pretending to be another. DAD Proxy doesn't
specify how two routers on the link for redundancy are to work either.
(There's some discussion of this multicast issue in the draft towards the
end of the "IPv6 over CBMA Links" section.)

When you're down a complexity, hacks and work arounds rat hole like this, I
think it is worth stepping back and asking "what problem are you trying to
solve"?

So what is all this hackery trying to achieve? To overcome link layer
constraints imposed by the same people who chose put them there in the
first place?!

Why are people trying to put multiple entirely untrusted hosts within the
same IPv6 subnet/on the same link that assumes implicit host trust?

Why are people, in one part of the network, likely using subnets/virtual
links to group together trusted hosts, meaning they're using network layer
subnets to create trusted host security domains to implement security
policy, yet in another part of the network, choose to group together
entirely untrusted hosts in the same subnet/link?!

Regards,
Mark.



>
> The answer is: "Well, kind of, but not really".
>
> It's complicated.
>
> On Thu, 1 Feb 2018, Mark Smith wrote:
>
> On 31 Jan 2018 20:49, "Mikael Abrahamsson" <swmike@swm.pp.se> wrote:
>>
>> On Wed, 31 Jan 2018, Mark Smith wrote:
>>
>> RFC8273 fails the proper layer 2 isolation/per-host link/LAN requirement
>>
>>> too.
>>>
>>>
>> No, it doesn't. It just doesn't specify how this is to be achieved. I am
>> of
>> the opinion that it doesn't need to, and it shouldn't. Yes, someone
>> implementing this should make sure that L2 assures that customers can't
>> spoof each other, that source validation etc is in place, but I am of the
>> opinion that RFC8273 doesn't need to specify how that should be done.
>>
>>
>> The hosts are all sharing the same Link-Local prefix, rather than each
>> host
>>
>>> having its own instance of the Link-Local prefix. They're all using the
>>> same router interface, rather than each host having its own dedicated
>>> router interface. There is sharing of IP layer resources between multiple
>>> hosts, so the hosts are not on separate links.
>>>
>>>
>> Sure.
>>
>>
>> Per RFC4291, in the Addressing Model section,
>>
>>>
>>> "Currently, IPv6 continues the IPv4 model in that a subnet prefix is
>>>   associated with one link."
>>>
>>> multiple hosts that share just one common IPv6 subnet of possibly a
>>> number on the link are members of the same one link.
>>>
>>>
>> But the GUA prefix isn't the same, just the LLA.
>>
>>
>>
>> You're saying hosts that have a common LL prefix *aren't* on the same
>> link?
>>
>>
>>
>>
>> So when a host attaches to a port, the layer 2 device allocates a new
>>
>>> virtual link, dedicated to the host, and then signals the router, which
>>> then allocates a new Link-Local prefix, new GUA and possibly ULA prefix,
>>> and then creates a new router interface for that individual host?
>>>
>>>
>> No. Those are your requirements, it's you who are saying all of those are
>> needed. Not me.
>>
>>
>> I don't have any experience or detailed knowledge of it , however I'm
>>
>>> reminded of Access Node Control Protocol - RFC6320. Perhaps a generalised
>>> version of that for other types of layer 2 edge devices might be an
>>> option.
>>>
>>>
>> PPPoE doesn't solve the mac address duplication problem, either. Only
>> separate L2 per user solves that.
>>
>> So what I have been proposing for lots of years is to keep the 1:N model
>> for IPv4 (because that's what a lot of people do), but create
>> one-vlan-per-user for IPv6, using ethertype based vlans. This requires no
>> host changes.
>>
>>
> --
> Mikael Abrahamsson    email: swmike@swm.pp.se
>