Re: [IPv6] Second Working Group Last Call for <draft-ietf-6man-rfc6724-update>

Kyle Rose <krose@krose.org> Thu, 11 April 2024 12:17 UTC

Return-Path: <krose@krose.org>
X-Original-To: ipv6@ietfa.amsl.com
Delivered-To: ipv6@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id E77DDC14F68F for <ipv6@ietfa.amsl.com>; Thu, 11 Apr 2024 05:17:38 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -2.096
X-Spam-Level:
X-Spam-Status: No, score=-2.096 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, DKIM_SIGNED=0.1, DKIM_VALID=-0.1, DKIM_VALID_AU=-0.1, DKIM_VALID_EF=-0.1, HTML_MESSAGE=0.001, RCVD_IN_DNSWL_NONE=-0.0001, RCVD_IN_ZEN_BLOCKED_OPENDNS=0.001, SPF_HELO_NONE=0.001, SPF_PASS=-0.001, URIBL_DBL_BLOCKED_OPENDNS=0.001, URIBL_ZEN_BLOCKED_OPENDNS=0.001] autolearn=ham autolearn_force=no
Authentication-Results: ietfa.amsl.com (amavisd-new); dkim=pass (1024-bit key) header.d=krose.org
Received: from mail.ietf.org ([50.223.129.194]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id Q2XqPIztaQaZ for <ipv6@ietfa.amsl.com>; Thu, 11 Apr 2024 05:17:34 -0700 (PDT)
Received: from mail-ej1-x636.google.com (mail-ej1-x636.google.com [IPv6:2a00:1450:4864:20::636]) (using TLSv1.3 with cipher TLS_AES_128_GCM_SHA256 (128/128 bits) key-exchange X25519 server-signature RSA-PSS (2048 bits) server-digest SHA256) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id DA167C14F682 for <ipv6@ietf.org>; Thu, 11 Apr 2024 05:17:34 -0700 (PDT)
Received: by mail-ej1-x636.google.com with SMTP id a640c23a62f3a-a520410b7c0so266059966b.0 for <ipv6@ietf.org>; Thu, 11 Apr 2024 05:17:34 -0700 (PDT)
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=krose.org; s=google; t=1712837852; x=1713442652; darn=ietf.org; h=cc:to:subject:message-id:date:from:in-reply-to:references :mime-version:from:to:cc:subject:date:message-id:reply-to; bh=36UWq2RmghHvO7PXi3z8lOh5dOXdSTXEEE2TDAOnN4s=; b=AU8FWMmsB7Gj4m16MHQ8Hs2eCtl3LIC5zUM9uOMTMYNc3W7MWTzeBzDgzQa2JseR97 2QBgJlqTQi30+vVvxbZrzXjPINuGMR8fCCA76fYUSFiGW8PrO+J2JGk6oz6DS2xYjMP6 +AVb9OSfaWwgiXNWNLHavfYCqO/e093rxAX+U=
X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20230601; t=1712837852; x=1713442652; h=cc:to:subject:message-id:date:from:in-reply-to:references :mime-version:x-gm-message-state:from:to:cc:subject:date:message-id :reply-to; bh=36UWq2RmghHvO7PXi3z8lOh5dOXdSTXEEE2TDAOnN4s=; b=JNIPoFbZ4zp0IHQJwMolJ8nbX2TVxw6GwUDvRtJWeMqfL4aoh2LJmyXFC/NXlAj71P 1Z1DjwJNDT6KGEn4EBaTygmIJzn7ktbFgfJsBQ4rWmDW+mO1Bzzq3l+ucyQllw7/w+5/ Zl4fbG4cQ85asNzGaoz9/z9nTwDUPyzxjSdkVU1J7sggnOrlcufQ5lvrkicvnKVRHIFa GNdI9DTGRlRVZV2edIMHtAcohuAFeUvwSvKmoxVmXua8AgPFUS3sc0zmJc+Pq1wMSdE/ 22iN8X9W6AZwuCQnpU/xJ3gDk1eLpsz7ZMBfh+/7KKptnvaTJCuSXCuUl8P9u2sxk2y/ VKoA==
X-Forwarded-Encrypted: i=1; AJvYcCW469nVsLOztTIn8B9xk3S0mugMxmuuFAH3J4SlvZqH4T+nLij4P+3m7Qk7oS2fu9oExiiXIR804iFpApba
X-Gm-Message-State: AOJu0YwXhkPJ4zIT+kuaYVwPn1f0Qvm6B/AVpheEsr/RrF6aGBYpNv3y 8M2XZML02D00nZHIgmLZv7khFYsi2eeQ8MmQpngRubD1rYbeEFyUO9NB52pwFEgk5BpFNfX73bY pWGzNsBZDadKDAFJNDUsMG3aDY980hMbUx+Cclw==
X-Google-Smtp-Source: AGHT+IE6nnVm9CproXBbJrsnVFEBwQ1sL29ibE/r9cjc4GjrVHg4Q10YTVdREnZXmkHJ+7COCi88uVpqg7NyZBWXCG0=
X-Received: by 2002:a17:906:2b0d:b0:a51:f7da:a385 with SMTP id a13-20020a1709062b0d00b00a51f7daa385mr3235170ejg.64.1712837852606; Thu, 11 Apr 2024 05:17:32 -0700 (PDT)
MIME-Version: 1.0
References: <6A5E5F35-B35F-4358-8EE1-3BD82329141E@jisc.ac.uk> <6FBC1B5A-BF28-4B05-B2B2-A60DA4707755@gmail.com> <CAJU8_nUX3VFcRtFUoCy+Uxn6UQYsB-wo+64PSufBWxW67Y64bw@mail.gmail.com> <CAPt1N1nDUh=p5x8Kp_fkEYRf9ZktaRo73Hzc40qVQ11X-B-GYw@mail.gmail.com> <CAJU8_nWN+R-bwRPhSpxYPB21qCyJNn6M4jAVtAfDTTYw7c1BGA@mail.gmail.com> <CAPt1N1=Y=+ft-PBjUFTeHxmu9pAkxQmhYepnTJmD4D0-Hyf4Bg@mail.gmail.com>
In-Reply-To: <CAPt1N1=Y=+ft-PBjUFTeHxmu9pAkxQmhYepnTJmD4D0-Hyf4Bg@mail.gmail.com>
From: Kyle Rose <krose@krose.org>
Date: Thu, 11 Apr 2024 08:17:20 -0400
Message-ID: <CAJU8_nWn0P1=XFXg7ZSCUaQVOQ++r2B6afWeiQkzSfHZ=e8iZA@mail.gmail.com>
To: Ted Lemon <mellon@fugue.com>
Cc: Bob Hinden <bob.hinden@gmail.com>, IPv6 List <ipv6@ietf.org>
Content-Type: multipart/alternative; boundary="000000000000c353360615d1231f"
Archived-At: <https://mailarchive.ietf.org/arch/msg/ipv6/riPuLUgDewzqdHf1VpD7iL8N25w>
Subject: Re: [IPv6] Second Working Group Last Call for <draft-ietf-6man-rfc6724-update>
X-BeenThere: ipv6@ietf.org
X-Mailman-Version: 2.1.39
Precedence: list
List-Id: "IPv6 Maintenance Working Group \(6man\)" <ipv6.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/ipv6>, <mailto:ipv6-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/ipv6/>
List-Post: <mailto:ipv6@ietf.org>
List-Help: <mailto:ipv6-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/ipv6>, <mailto:ipv6-request@ietf.org?subject=subscribe>
X-List-Received-Date: Thu, 11 Apr 2024 12:17:39 -0000

On Wed, Apr 10, 2024 at 10:13 PM Ted Lemon <mellon@fugue.com> wrote:

> On Wed, Apr 10, 2024 at 8:25 PM Kyle Rose <krose@krose.org> wrote:
>
>> Yes. It would make no difference to how my sites would operate. I am
>> concerned about complexity, however, and the more complex a change that is
>> required, the less widely implemented it is likely to be.
>>
>
> This is sort of a truism, but I don't see why it should affect what we put
> in the document. E.g. PCI certification /still/ does not require TLS 1.2,
> even, much less TLS 1.3 It took a long time for mbedtls to implement TLS
> 1.3. Should we not have published TLS 1.3 because we thought mbedtls
> wouldn't implement it?
>

TLS offers a handshake allowing pairwise interop between versions. This
known-local mandate by contrast would enable many of the configurations
proponents desire, on networks that require more than pairwise
compatibility, only after every device supports it. It's a long ramp to an
uncertain future.

The reason to prefer known ULA<->known ULA over GUA<->GUA is that it
> enables sites to reliably number internally with a ULA and for that ULA to
> then be used for internal communication in preference to GUAs, which may be
> renumbered arbitrarily as ISP contracts change or at the whim of the ISP,
> for that matter.
>
>> That's not the only way to enable this outcome. I solve this problem by
>> using different names internally. Split horizon would also work here, by
>> showing you only ULA internally and only GUA externally.
>>
>
> That's not something that can be done automatically on a home network.
>
"That" = ...split horizon DNS? Surely using different names internally is a
thing that home users would generally do by default, since they tend to
have most services firewalled from outside, except for things like port 22
for power users or services that reach out to provide return connectivity,
e.g., for IoT devices like thermostats and doorbell cams. (I suspect most
home users' internal services are advertised via mDNS, which under 6724 on
a dual stack network generally means the v6 addresses associated with a
.local name will never be used. I and everyone on this list am probably far
out on the tail of home users in that I run my own recursive DNS server.)


> The fact that you can do a heavy lift like that and make it work is a
> credit to your company's operational acumen, but doesn't help implementors
> of RFC7084, for example.
>
Just to be clear, my "sites" are my home networks. My interest in this is
personal/hobbyist, not professional.


> I mean, I *see* the advantages if you have DNS names that map to both, or
> other static configuration that wants to be able to use one or the other
> under a variety of network environments, where there is some policy,
> routing, efficiency, performance, reliability, or other benefit to using
> ULA where it is available. I'm not blind to that. I just haven't been
> convinced that address selection is the best way to solve those problems.
>
> Do you have some other solution to propose that doesn't involve
> maintaining parallel DNS namespaces and training users to operate them? Can
> this solution be deployed transparently and automatically?
>
I guess I'm just not that sympathetic to the goal of optimizing
initial-config simplicity for operators of networks beyond a minimal level
of complexity. IMO, trying to simplify network operations by putting all
possible addresses for a service into a single DNS name and assuming the
client will choose the optimal pair via 6724-style address selection is a
case where seeming simplicity of configuration is likely to lead to
hard-to-diagnose problems later. Lorenzo's open advocacy of publishing
unreachable ULA to global DNS and letting the client sort it out, certainly
much more extreme than any other position I've read on these threads over
the past 10 months, is maybe the perfect example of just the kind of
"theoretically, this should work" thinking that we are likely to come to
regret in ten years' time.


> I think it makes sense that you wouldn't care about this feature—I can't
> imagine it being useful for an ISP—but do you really care so much about
> /not/ requiring this that you'd take this capability away from sites that
> would benefit (greatly, IMHO) from it?
>
>> I want something published. What started as a very simple change to
>> elevate ULA->ULA over IPv4->IPv4 has turned into a major effort I mostly
>> just don't care about. I want the default policy table changed. That's the
>> extent of my interest here. So am I opposed to these other things? Only in
>> the sense that I want something published soon, so stacks will start
>> implementing changes in my lifetime. The simpler, the better from that
>> perspective.
>>
>
> This sounds like it might be your core motivation: you worry that it will
> take longer to publish the document with MUST than SHOULD. Is that the
> case? Given the number of voices in support of making known ULA support
> mandatory, do you think your worry is really justified? Or are you worried
> that implementors will read the document and ignore it because of the MUST,
> and so you won't get the stuff you really want? Or is the issue that you
> don't feel you can write an RFP that requires implementation of the updated
> spec?
>

I don't really have anything to add to my stated justification. It really
boils down to "more complex means greater time-to-done". I want the default
policy table change published 6 months ago.
Kyle