Re: [IPv6] Thoughts on draft-thubert-6man-ipv6-over-wireless-15

"Joe Clarke (jclarke)" <jclarke@cisco.com> Mon, 07 August 2023 13:04 UTC

Return-Path: <jclarke@cisco.com>
X-Original-To: ipv6@ietfa.amsl.com
Delivered-To: ipv6@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 4F52CC1519B1 for <ipv6@ietfa.amsl.com>; Mon, 7 Aug 2023 06:04:52 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -9.604
X-Spam-Level:
X-Spam-Status: No, score=-9.604 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, DKIMWL_WL_HIGH=-0.001, DKIMWL_WL_MED=-0.001, DKIM_SIGNED=0.1, DKIM_VALID=-0.1, DKIM_VALID_AU=-0.1, DKIM_VALID_EF=-0.1, HTML_MESSAGE=0.001, RCVD_IN_MSPIKE_H4=0.001, RCVD_IN_MSPIKE_WL=0.001, RCVD_IN_ZEN_BLOCKED_OPENDNS=0.001, SPF_NONE=0.001, T_SCC_BODY_TEXT_LINE=-0.01, URIBL_BLOCKED=0.001, URIBL_DBL_BLOCKED_OPENDNS=0.001, URIBL_ZEN_BLOCKED_OPENDNS=0.001, USER_IN_DEF_DKIM_WL=-7.5] autolearn=unavailable autolearn_force=no
Authentication-Results: ietfa.amsl.com (amavisd-new); dkim=pass (1024-bit key) header.d=cisco.com header.b="Imcen4Uj"; dkim=pass (1024-bit key) header.d=cisco.com header.b="m+6KhlcT"
Received: from mail.ietf.org ([50.223.129.194]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id SnQFpYhtSiCx for <ipv6@ietfa.amsl.com>; Mon, 7 Aug 2023 06:04:47 -0700 (PDT)
Received: from rcdn-iport-1.cisco.com (rcdn-iport-1.cisco.com [173.37.86.72]) (using TLSv1.2 with cipher DHE-RSA-SEED-SHA (128/128 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id A8387C15109C for <6man@ietf.org>; Mon, 7 Aug 2023 06:04:47 -0700 (PDT)
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/simple; d=cisco.com; i=@cisco.com; l=15099; q=dns/txt; s=iport; t=1691413487; x=1692623087; h=from:to:subject:date:message-id:references:in-reply-to: mime-version; bh=s63E5OJP7Y7t6vBwtXSHCJzJY6ndYwe3nPElJ3a6x7Y=; b=Imcen4UjBwLVV/VqGtONjlNzSnhSsyKGxyOKbCCS0F2YuN7QdiM2QoBm lLC4w2YY1hMqxwp6+2tdRZwPD1aappFyVKwnpPVe08MoSfdWEDDfWqJdy M5bE7h0+uUXnnHYEXPTBGLQLnmJjL0Gc/TdBTS2ihkueoSxBKrd4rmIdx U=;
X-IPAS-Result: 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
IronPort-PHdr: A9a23:281huhG4AUM5efNeiZ4Wc51Gfu0Y04WdBeZdwpMjj7QLdbys4NG7e kfe/v5qylTOWNaT5/FFjr/Ourv7ESwb4JmHuWwfapEESRIfiMsXkgBhSM6IAEH2NrjrOgQxH d9JUxlu+HToeVNNFpPGbkbJ6ma38SZUHxz+MQRvIeGgGIXWht602si5+obYZENDgz/uKb93J Q+9+B3YrdJewZM3M7s40BLPvnpOdqxaxHg9I1WVkle06pK7/YVo9GJbvPdJyg==
IronPort-Data: A9a23:a0cB3anz3DG1G3wjAGt6GcHo5gz/JkRdPkR7XQ2eYbSJt1+Wr1Gzt xJKXWCGO/nZN2WneNxwOoSwo0sPsZHQyNE2SAY9pSFmRFtH+JHPbTi7wugcHM8zwunrFh8PA xA2M4GYRCwMZiaA4E/raNANlFEkvU2ybuKU5NXsZGYpHGeIdA970Ug4w75h3dYx6TSEK1rlV e3a8pW31GCNg1aYAkpMg05UgEoy1BhakGpwUm0WPZinjneH/5UmJM53yZWKEpfNatI88thW6 Ar05OrREmvxp3/BAz4++1rxWhVirrX6ZWBihpfKMkSvqkAqm8A87ko0HOE4QnoO2m/Wo4ls5 eVyt4CgQx0kLKKZzYzxUzEAe81/FaRC/LmCKn+lvInKlQvNcmDnxLNlC0Re0Y8wo7ksRzoQs 6VDbmlWMnhvhMruqF6/Yutngs05L8TDN4IEsXYmxjbcZRojacGTGfiTuoAHtNs2ruF2TdTuR ZFGUiZIYQnbUl4QYxQHMKtryY9EgVGmI2EH9zp5v5EfvW3ayiRw3aTjdt3PdbS3qd59l0Kco CfN+H70R0hActee0jGCtHmrg4cjgB8XRqoJMJaFr68w32HK20EjNx8KRVGhrOu23xvWt81kF 2QY/S8nrK4X/UOtT8XgUxDQnJJilkNHMza3O7BkgDxh2pY48C7CXTBVFG4phMgO8Z5oG2B3i jdlivu0XVRSXKuppWVxH1t+hRq2PSUTRYPpTXBZFVNfizUPTX1as/4iZt9nFKjwhdrvFHSpm XaBrTM1gPMYistjO0SHEbLv3WzESnvhF1FdCuDrsoSNtVwRiGmNPN3A1LQjxawcRLt1t3HY1 JT+p+CQ7foVEbaGnzGXTeMGEdmBvqjUaWaA3wA0RMR4r1xBHkJPm6gNsFmSw283aq45lcPBO yc/RCsIvsYIZSv2BUOJS9LuUKzGMpQM5fy8BqyLMbKik7B6dRSM+2l1dFWM0mX2+HXAYolhU ap3hf2EVC5AYYw+lWLeb75EjdcDmHtkrUuNHs+T8vhS+efEDJJjYe1bYALmgyFQxP7snTg5B P4Da5bSl0gPALKWj+u+2dd7EG3m5EMTXPjeg8dWbeWEZAFhHQkc5zX5mtvNp6QNc3xpq9r1
IronPort-HdrOrdr: A9a23:9eSMAq5SQySMD/s3lQPXwXOBI+orL9Y04lQ7vn2ZFiY1TiXIra 6TdaoguiMc0AxhJE3I+errBEDyewKiyXcV2/haAV7GZmnbUQSTXflfBOfZsljd8mjFh5NgPM RbAuVD4b/LfCNHZK/BiWHSf6dCsbu6GeKT9J3jJhxWPGZXgtRbnn5E43GgYytLrWd9dP4E/Z yni/Zvln6FQzA6f867Dn4KU6zovNvQjq/rZhYAGloO9BSOpSnA0s+0LzGomjMlFx9fy7Yr9m bI1ybj4L+4jv29whjAk0fO8pVtnsf7wNcrPr3DtiFVEESstu+bXvUjZ1SwhkF2nAhp0idurD D4mWZhAy200QKUQoj6m2qr5+Cq6kdR15ar8y7ovZKkm720eNr/YPAx3L6wtXDimgwdlcA536 RR022DsZ1LSRvGgSTm/tDNEwpnj0yuvBMZ4KcuZlFkIPwjgYVq3Poi1VIQFI1FEDPx6YghHu UrBMbA5OxOeVffa3zCpGFgzNGlQ3x2R369MwM/k93Q1yITkGFyzkMeysBalnAc9IglQ50B4+ jfKKxnmLxHU8dTZ6NgA+UKR9exFwX2MFrxGXPXJU6iGLAMOnrLpZKy6LIp5PuycJhN15c2kI SpaiItiYfzQTOaNSSj5uw4zvmWehTMYd3E8LAs26RE
X-Talos-CUID: 9a23:thXD1GwFQTUga/hUnSIVBgUPPusYKyyHk0uJPmKINmR1WLePRE2frfY=
X-Talos-MUID: 9a23:LSHvwg6oABRi/aU95y9rKNwlxoxJ2/SMOGJWzq4anMSZLh0zZG7enAyOF9o=
X-IronPort-Anti-Spam-Filtered: true
Received: from alln-core-12.cisco.com ([173.36.13.134]) by rcdn-iport-1.cisco.com with ESMTP/TLS/ECDHE-RSA-AES256-GCM-SHA384; 07 Aug 2023 13:04:46 +0000
Received: from alln-opgw-1.cisco.com (alln-opgw-1.cisco.com [173.37.147.229]) by alln-core-12.cisco.com (8.15.2/8.15.2) with ESMTPS id 377D4kIW018596 (version=TLSv1.2 cipher=DHE-RSA-AES256-GCM-SHA384 bits=256 verify=OK) for <6man@ietf.org>; Mon, 7 Aug 2023 13:04:46 GMT
Authentication-Results: alln-opgw-1.cisco.com; dkim=pass (signature verified) header.i=@cisco.com; spf=Pass smtp.mailfrom=jclarke@cisco.com; dmarc=pass (p=quarantine dis=none) d=cisco.com
X-IronPort-AV: E=Sophos;i="6.01,262,1684800000"; d="scan'208,217";a="5228098"
Received: from mail-dm6nam10lp2102.outbound.protection.outlook.com (HELO NAM10-DM6-obe.outbound.protection.outlook.com) ([104.47.58.102]) by alln-opgw-1.cisco.com with ESMTP/TLS/ECDHE-RSA-AES256-GCM-SHA384; 07 Aug 2023 13:04:46 +0000
ARC-Seal: i=1; a=rsa-sha256; s=arcselector9901; d=microsoft.com; cv=none; b=PrDmgnPviUUgo74sNjqVmFeKNyqHxVm0YiJfSN3C1mFWmruKF9ql3PocXjSa1GwNNkVzuat71pyIFDNNDWAFLSu1DEb+B+qKeep3z9U40FOjj1nV0DHCRn09K4IDif19BObNw8TU/2RmnucpNUX4i/T44NBLg0MMZVn/EAeus5pCsEJ0A5YCR2tKoNUyRJR094M4uzq9UHtMPFSFNzOt7XvYjJGM4GyRDlfFjchMS2KnDtp1qOPtVo5JZGBWqWykLtdY/TejSwlNTtup2NnH5M0A4EsoBjea89rSSTJOn0z/fx1QGuNG0A/Kihbx5ylJQ6b2jsxBida65sxd+lI+EQ==
ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=microsoft.com; s=arcselector9901; h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-AntiSpam-MessageData-ChunkCount:X-MS-Exchange-AntiSpam-MessageData-0:X-MS-Exchange-AntiSpam-MessageData-1; bh=qAgxxoNkPIK3+1+V+78DEiW3bAZSZMFtnjDqlsTqWvQ=; b=nZg/Dx4yG0ozg6D94GcTxlBJweKJIAgt7aZNhEu4najKiTsH6wHa8SHq4hBrDGbp8vREX5Llq9sL6IDPweB394849/+WAUkB0Ef4QGgaGYS88LJwN7aKLp8k17h2QijXgoSkDrtybOWb/T8OQppUU4uDPWVbdVxn0kISgBJksz9UrRTN00jR+tFL0hbUbKnSKBC+ntLQhYORI/jW/eq1uj/lgIJ6m93i6ceN2iB/9hBDcwrwMEzauUQf7qoe1tbTS/wZIi8GdWSAql60ZbtjGhPy1pwS9w/ht7A5z1jiibREJgLDizEhkGdnaQpJAcqOWCd76sEQDzAVuo45U8QWKg==
ARC-Authentication-Results: i=1; mx.microsoft.com 1; spf=pass smtp.mailfrom=cisco.com; dmarc=pass action=none header.from=cisco.com; dkim=pass header.d=cisco.com; arc=none
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=cisco.com; s=selector1; h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-SenderADCheck; bh=qAgxxoNkPIK3+1+V+78DEiW3bAZSZMFtnjDqlsTqWvQ=; b=m+6KhlcTeQPCSd3nUTpymjFKfJgBa0Xgxd0lUy4bSkFDNtv8lohf85HteM6PJKu57aE+sQrc8swFfr6Vnqq2f+WvPU/lf7BDrq9WMYbip7Q5umE49H+gB71fMyPFZNML5fGwIxrb1pgjiGoERgfNgEiOh1fA+9/AttxRCMzJClY=
Received: from BN9PR11MB5371.namprd11.prod.outlook.com (2603:10b6:408:11c::11) by CH0PR11MB5329.namprd11.prod.outlook.com (2603:10b6:610:bc::13) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id 15.20.6652.26; Mon, 7 Aug 2023 13:04:44 +0000
Received: from BN9PR11MB5371.namprd11.prod.outlook.com ([fe80::616e:ead1:6cd0:bdbb]) by BN9PR11MB5371.namprd11.prod.outlook.com ([fe80::616e:ead1:6cd0:bdbb%4]) with mapi id 15.20.6652.026; Mon, 7 Aug 2023 13:04:44 +0000
From: "Joe Clarke (jclarke)" <jclarke@cisco.com>
To: "Pascal Thubert (pthubert)" <pthubert=40cisco.com@dmarc.ietf.org>, "6man@ietf.org" <6man@ietf.org>
Thread-Topic: Thoughts on draft-thubert-6man-ipv6-over-wireless-15
Thread-Index: AQHZxWjMl/7sLjlyDkiPCOyaaBqrja/YTfeggAaEizA=
Date: Mon, 07 Aug 2023 13:04:44 +0000
Message-ID: <BN9PR11MB5371384CC2E438DDBF649BCEB80CA@BN9PR11MB5371.namprd11.prod.outlook.com>
References: <BN9PR11MB537101C802FB1F73F307DE79B80BA@BN9PR11MB5371.namprd11.prod.outlook.com> <CO1PR11MB4881A4FBD885A75A14EF2399D808A@CO1PR11MB4881.namprd11.prod.outlook.com>
In-Reply-To: <CO1PR11MB4881A4FBD885A75A14EF2399D808A@CO1PR11MB4881.namprd11.prod.outlook.com>
Accept-Language: en-US
Content-Language: en-US
X-MS-Has-Attach:
X-MS-TNEF-Correlator:
x-ms-publictraffictype: Email
x-ms-traffictypediagnostic: BN9PR11MB5371:EE_|CH0PR11MB5329:EE_
x-ms-office365-filtering-correlation-id: f563c6a4-eabb-4ade-b95f-08db9746dead
x-ms-exchange-senderadcheck: 1
x-ms-exchange-antispam-relay: 0
x-microsoft-antispam: BCL:0;
x-microsoft-antispam-message-info: SBu7HWWpK42aaaWDuvoaFIH5JAiXUonc08smbb4i3SxSd3ru/3ROmu3skT9yhq3NS76vkG1sc2nWawUVMQNriV3XWJt/GM2hvN90W/dq3xAhl8x9Pu8udhUW0Y+4CrqsZQZmju6OHOVBd4rtaobBOAvXxn5aFCvvDt8Ie2uUDSSrWnPlNGw7AOQggTRD2ZIwIAq3aMA9AR48UdgcIQSOwhPHQiqzkIqYVwdn77b8VgWXdg1Jqz7fQYWkMrejrhUnhZENehoNeFFeZs06r5yW40+C53qh87Xq0Bd73oOYqLTU9AgZYPRQhAVIkyVij9KbhwOZrXxuZb5JzycBbYsa2Q5Km/UfcwCGvq9G4MhlkP4iCNMt46AdvOAiKdssZ0O9brVpmLz2Xb14CPKBoCNyd0fomz8gr8Bo8f+GzCIElovG8HE0wm7/GFfDqat0rVkoooGPoKgZvKFYMBcZmS3wuLpWZQkNwubXqGM5hZDxGcIDjZQdCsUlCKHMifYAM87gR5iS+UJG28Oca5IfhQo2C3DsTdVh1kgWr/j6fn5dKnHCeFBw2z9eRv+uzTzsv6IjSyZ72NjDMLQJzWYESsgEimbx44Q18YXucv7Ak4vWayX5hRC4QPkFNfqTTQlTzVdS
x-forefront-antispam-report: CIP:255.255.255.255; CTRY:; LANG:en; SCL:1; SRV:; IPV:NLI; SFV:NSPM; H:BN9PR11MB5371.namprd11.prod.outlook.com; PTR:; CAT:NONE; SFS:(13230028)(4636009)(396003)(39860400002)(376002)(136003)(346002)(366004)(451199021)(186006)(1800799003)(41300700001)(7696005)(38100700002)(9686003)(71200400001)(122000001)(66574015)(83380400001)(6506007)(53546011)(55016003)(316002)(110136005)(33656002)(86362001)(38070700005)(478600001)(2906002)(66446008)(66476007)(76116006)(66946007)(66556008)(64756008)(8676002)(8936002)(5660300002)(52536014); DIR:OUT; SFP:1101;
x-ms-exchange-antispam-messagedata-chunkcount: 1
x-ms-exchange-antispam-messagedata-0: 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
Content-Type: multipart/alternative; boundary="_000_BN9PR11MB5371384CC2E438DDBF649BCEB80CABN9PR11MB5371namp_"
MIME-Version: 1.0
X-OriginatorOrg: cisco.com
X-MS-Exchange-CrossTenant-AuthAs: Internal
X-MS-Exchange-CrossTenant-AuthSource: BN9PR11MB5371.namprd11.prod.outlook.com
X-MS-Exchange-CrossTenant-Network-Message-Id: f563c6a4-eabb-4ade-b95f-08db9746dead
X-MS-Exchange-CrossTenant-originalarrivaltime: 07 Aug 2023 13:04:44.2151 (UTC)
X-MS-Exchange-CrossTenant-fromentityheader: Hosted
X-MS-Exchange-CrossTenant-id: 5ae1af62-9505-4097-a69a-c1553ef7840e
X-MS-Exchange-CrossTenant-mailboxtype: HOSTED
X-MS-Exchange-CrossTenant-userprincipalname: KBBZKuuC9RCkNEJW47OAylpTAO5JHS7HJJ2VRln+rZsyOof3+asVA3n0Pibnrwvqqpc7Kva9zwpZsgFpjkjcpQ==
X-MS-Exchange-Transport-CrossTenantHeadersStamped: CH0PR11MB5329
X-Outbound-SMTP-Client: 173.37.147.229, alln-opgw-1.cisco.com
X-Outbound-Node: alln-core-12.cisco.com
Archived-At: <https://mailarchive.ietf.org/arch/msg/ipv6/sP7rgtJbOubz1FupUBVSDv3JebE>
Subject: Re: [IPv6] Thoughts on draft-thubert-6man-ipv6-over-wireless-15
X-BeenThere: ipv6@ietf.org
X-Mailman-Version: 2.1.39
Precedence: list
List-Id: "IPv6 Maintenance Working Group \(6man\)" <ipv6.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/ipv6>, <mailto:ipv6-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/ipv6/>
List-Post: <mailto:ipv6@ietf.org>
List-Help: <mailto:ipv6-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/ipv6>, <mailto:ipv6-request@ietf.org?subject=subscribe>
X-List-Received-Date: Mon, 07 Aug 2023 13:04:52 -0000

On a different note, but probably of interest for ops, RFC 8929 provides both a routing and a bridging proxy variation. In routing proxy, the BBR answers NSs on behalf of the registered nodes with its own link layer address, and it installs a /128 route towards the registering node. IOW it routes the packets . This is required when the node is, say, on an IEEE 802.15.4 link that has non-bridgeable MACs. But that could be very cool for ops as well as the wireless MACs do not need to show on the backbone, at least for IPv6 operations. Conversely, the bridging proxy lets the registering node answer the NAs (unless the BBR is a sleep proxy of sorts),  meaning that the data packets are bridged by the AP as usual. The broadcasts NS are turned to unicast on the wireless hop, which makes it both faster and reliable, so there’s a clean win there.

JMC: Indeed.  And we aren’t as concerned about the wire so much (though others may be).

The bridging proxy operation is probably the one that the .11 people had in mind but in the end, it is up to the ops people to use either one. The RAs can still be generated by the real routers though the RS could be turn to unicast by the 6BBR, or at least not copied on the wireless side. I hope this helps alleviate the concerns about layer violations. They are limited, required (by .11), and better understood now that we made them a standard vs the art of existing but proprietary variations.

JMC: I like the flexibility.  I can see the IETF NOC crew wanting more of a bridge on the AP/WLC such that routing is left to the routers (at least initially), but more and more we see the attractiveness of decentralizing some of the routing.  Ultimately, seeing a standards approach instead of today’s Magick is very appealing.

JMC: That said, and this is outside the scope of what I typically see in the IETF, vendors are still left to implement the visibility into such standardized flows as they see fit (i.e., think logging and debugging).  Everything is great when the proxy shows the STA is registered.  When the proxy isn’t doing what one thinks it should, it can still be as bad as a proprietary solution to understand why</rant>.

Joe

All the best,

Pascal
From: ipv6 <ipv6-bounces@ietf.org> On Behalf Of Joe Clarke (jclarke)
Sent: Wednesday, August 2, 2023 8:10 PM
To: 6man@ietf.org
Subject: [IPv6] Thoughts on draft-thubert-6man-ipv6-over-wireless-15

I had a chance to read through this draft with the hat of an IETF NOC member.  Given the number of wireless (and IPv6 wireless) issues we’ve seen over the years, Sections 2.1 and 2.2 really speaks to me.  We have seen issues with failing stateful proxies, incomplete learning of IPv6 addresses, and snooping holes.  These have led to extended onboarding time for IPv6-only clients and times when certain clients can pass traffic.  Things have gotten better, but it’s still a moving target.  This is a real problem, and I’m glad focus is being given to it.

While not IPv6-specific, the IETF conference network currently uses public IPv4 addresses without a firewall (to provide an “Open Internet™”), and this leads to other operational challenges that have required us to use ARP proxies to tamp down the broadcast onslaught.  Not having standards means to do some of these functions has been challenging.

Therefore, I support the spirit of this draft in that a more proactive approach to address registration and use of standardized means to do so and query the registrar would aid in overall network operation..

The concern I have is turning the AP into a BBR.  I can already hear some of the conversations in the NOC about this “layer violation”.  That said, I can imagine a case where AP suppresses the multicast over the air and redirects RS or NS requests directly to the registrar (e.g., campus router).  As you mention, the true wired side of the network is not as susceptible to the shortcomings of NBMA, so pushing this traffic out onto the wire is not such a bad thing, plus it gives less “Magick” for the AP to handle.

Joe