Re: Generic anycast addresses...

Ted Lemon <mellon@fugue.com> Thu, 30 May 2019 14:55 UTC

Return-Path: <mellon@fugue.com>
X-Original-To: ipv6@ietfa.amsl.com
Delivered-To: ipv6@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 4AF4B12019D for <ipv6@ietfa.amsl.com>; Thu, 30 May 2019 07:55:09 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -1.898
X-Spam-Level:
X-Spam-Status: No, score=-1.898 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, DKIM_SIGNED=0.1, DKIM_VALID=-0.1, HTML_MESSAGE=0.001, RCVD_IN_DNSWL_NONE=-0.0001, SPF_HELO_NONE=0.001, SPF_PASS=-0.001, URIBL_BLOCKED=0.001] autolearn=ham autolearn_force=no
Authentication-Results: ietfa.amsl.com (amavisd-new); dkim=pass (2048-bit key) header.d=fugue-com.20150623.gappssmtp.com
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id oi2YEFcosP7p for <ipv6@ietfa.amsl.com>; Thu, 30 May 2019 07:55:06 -0700 (PDT)
Received: from mail-pf1-x441.google.com (mail-pf1-x441.google.com [IPv6:2607:f8b0:4864:20::441]) (using TLSv1.2 with cipher ECDHE-RSA-AES128-GCM-SHA256 (128/128 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id E1797120106 for <6man@ietf.org>; Thu, 30 May 2019 07:55:05 -0700 (PDT)
Received: by mail-pf1-x441.google.com with SMTP id u22so4133170pfm.3 for <6man@ietf.org>; Thu, 30 May 2019 07:55:05 -0700 (PDT)
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=fugue-com.20150623.gappssmtp.com; s=20150623; h=from:message-id:mime-version:subject:date:in-reply-to:cc:to :references; bh=jq3aeNKcvgCs/MRBDyh7Z8lCQfCNopg5ZqtwgFlJXws=; b=CX5vmxTiE4HRwuJ5JLNTxvIuyUGsiQvxUoqCgEZsqjJ5lLYykwf7x8H/it/1fhHvRQ 3Xuwa9B6ot/P1+Ks/mgy1uCZWXJBUJFmv8Ecpim4XJvSluQ7Dr+mB6vLWmI7Sp4zU9HB Xbz1FNeDPHl6dZzbYISo6slaT/uHEU2imp1RxzlA2UyhQMoPEtCrbGwM4ggiH7qhyq3+ DwahlEFyhxrBo2VwzjWAbEC0AyH42NvsBTku8QrN7GvWrmkL9/Sf5nvBuuvnN3OrfYhO TBKzecez15RPrpwP2TW4TBqd4b9iWViyXCtZln5gBOyBBj0lS3p6QEtUG8SI8gv2gRNb A8FA==
X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20161025; h=x-gm-message-state:from:message-id:mime-version:subject:date :in-reply-to:cc:to:references; bh=jq3aeNKcvgCs/MRBDyh7Z8lCQfCNopg5ZqtwgFlJXws=; b=oA6ipZyIAe6wOH7ILlCBFkKbu244wlSx6JhbKvBjEzafi9Q2jKRwAvG0oGvdEyxKAr 2o7UNmm+GEtexMVT7xuvIOwp5fouscauuwdctyGhzgQ2ZHuPMhN1R1WWHx2pYOe8aGyl gnFRkKjMt/rqd+++dUeikra5jrGIe3J39myO1weMJbLwgGpDdWsAbFCytwmmvE1Wqnc0 +m3wFAFvQGd7xFN85HMa01wWZ1HkvDWeiW8SORJw+/v2HQj/5PaS9Gug+U5SucXL9pQK 56voUDO4Vpvf/2kmIHX5kHHJENCcfdBSf1S5l3rWfD7bkhGU1TI/YpZjvSjTJfYzvrMS +AHQ==
X-Gm-Message-State: APjAAAV4IafmbRYUTT0cGX/cXYxfCWFotTTQn/LdTlL33LZZdy+jbzHT 77EEBWK5EXTSr9ME/HsZxvrctw==
X-Google-Smtp-Source: APXvYqxAFUUHhG481GTl1kAArdlpi6yOkbFUsM+yvgp6oezO94vbtRieIB8QucKJ410kKMep44OK4Q==
X-Received: by 2002:a63:470e:: with SMTP id u14mr4002749pga.135.1559228105327; Thu, 30 May 2019 07:55:05 -0700 (PDT)
Received: from [10.20.12.34] ([12.217.162.130]) by smtp.gmail.com with ESMTPSA id s28sm2682594pgl.88.2019.05.30.07.55.03 (version=TLS1_2 cipher=ECDHE-RSA-AES128-GCM-SHA256 bits=128/128); Thu, 30 May 2019 07:55:04 -0700 (PDT)
From: Ted Lemon <mellon@fugue.com>
Message-Id: <1DD451A7-D898-4105-974C-53776A3DA9F2@fugue.com>
Content-Type: multipart/alternative; boundary="Apple-Mail=_3C671EFB-2DA7-422A-826D-2EEE58D46968"
Mime-Version: 1.0 (Mac OS X Mail 12.4 \(3445.104.11\))
Subject: Re: Generic anycast addresses...
Date: Thu, 30 May 2019 07:55:03 -0700
In-Reply-To: <26144.1559226966@localhost>
Cc: Toerless Eckert <tte@cs.fau.de>, "6man@ietf.org" <6man@ietf.org>, Dave Thaler <dthaler@microsoft.com>
To: Michael Richardson <mcr+ietf@sandelman.ca>
References: <D22E680C-3EE3-4AD7-90C0-9339DA2E5A29@fugue.com> <BN6PR21MB04978DB375C05CB3CE4C914EA31F0@BN6PR21MB0497.namprd21.prod.outlook.com> <4EF97F31-1F39-4150-B044-955C46E96FB4@fugue.com> <20190530002833.wfvjfbj2lv2ig664@faui48f.informatik.uni-erlangen.de> <7A9560FC-0393-45DF-8389-B868455AC6DD@fugue.com> <20190530005734.7d2alod2zoaemmhc@faui48f.informatik.uni-erlangen.de> <D6E27B45-437F-45BE-A305-47DD460BCE02@fugue.com> <26144.1559226966@localhost>
X-Mailer: Apple Mail (2.3445.104.11)
Archived-At: <https://mailarchive.ietf.org/arch/msg/ipv6/pVzqszxbHVRZ9CM2j1klDbLquoQ>
X-BeenThere: ipv6@ietf.org
X-Mailman-Version: 2.1.29
Precedence: list
List-Id: "IPv6 Maintenance Working Group \(6man\)" <ipv6.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/ipv6>, <mailto:ipv6-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/ipv6/>
List-Post: <mailto:ipv6@ietf.org>
List-Help: <mailto:ipv6-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/ipv6>, <mailto:ipv6-request@ietf.org?subject=subscribe>
X-List-Received-Date: Thu, 30 May 2019 14:55:09 -0000

On May 30, 2019, at 7:36 AM, Michael Richardson <mcr+ietf@sandelman.ca> wrote:
> I think if using the ULA space, that it should be allocated in ULA-"C" space.
> It seems that we'd really be asking IANA to carve out a /48 out of ULA-C
> space, give it a new name, and create a new IANA registry.
> This leaves the rest of ULA-C space undefined, which is the current state.
> I think that the IESG can approve such a thing.

That seems reasonable.  Even if at some point we want to have a mechanism for allocating ULAs globally, this would just be one that was allocated globally.

> So maybe site-local space can be used for scoped anycast?

How are site-local addresses routed now?   If a packet with a site-local address as a destination escapes to the backbone, does it go anywhere, or is it blackholed immediately?

> and I think you want an address which is synatically distinguishable from
> unicast.  Maybe something that does not get caught by default route; although
> I'm not sure about that.

I don’t actually care for my application whether the address is semantically distinct from unicast.   However, I think from an internet architecture standpoint we do care, and we want the behavior to be scoped.   Mark’s proposal is quite a bit more heavyweight than what I’m looking for; not necessarily the wrong thing to do, just more than I need. I’m wary of “more than I need” solutions because it’s hard to get traction with them, as Mark has rather aptly demonstrated on this thread.

I do care that the anycast be routed edge-ward, so in fact I want it to be routed toward a default route.  My expectation would be that like a ULA destination, a packet heading for this anycast destination would be discarded by a border router if it reached one, unless the border router is where it’s consumed.   In the specific application I have in mind, the constrained-network border router, which would be on the way to the edge router but would be reached first, would either consume the anycast or direct it to the right destination, which would be within the operational domain containing the originating host.

I can see value in Mark’s idea of a scope that’s wider than this, but I think it’s problematic because for a multiply-homed network, it’s not going to be clear which ISP is the correct destination for the anycast.   Could be either, neither or both.   No way to know without configuration, which is what I’m trying to avoid requiring.   So that’s why I’m not leaping enthusiastically at Mark’s proposal, interesting though it is.

> Ted, having read through the thread, maybe you can do this with a multicast address which
> typically has only one listener :-)

I don’t know enough about non-local multicast to know whether or not this is a good idea, but it’s certainly a plausible idea.  My worry would be that it would actually be treated as a multicast.   That might produce some interesting side effects given that the application I have in mind involves DNS updates, which are not idempotent.

> Or maybe you want a more radical rethink. There's one at https://tools.ietf.org/html/draft-jiang-service-oriented-ip <https://tools.ietf.org/html/draft-jiang-service-oriented-ip>. We hadn't thought of it for constrained devices, but I don't see an issue there.

Like Mark’s proposal, this is quite a bit more ambitious than I want to be, although it would definitely address my use case.   The security/privacy implications alone of this proposal make it look like a decade or more of work to make real, even if it winds up seeing widespread deployment eventually.