Re: Network merge [Re: RFC6724-bis?]

Ted Lemon <mellon@fugue.com> Mon, 26 September 2022 23:46 UTC

Return-Path: <mellon@fugue.com>
X-Original-To: ipv6@ietfa.amsl.com
Delivered-To: ipv6@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id A2CDDC14CF1C for <ipv6@ietfa.amsl.com>; Mon, 26 Sep 2022 16:46:25 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -1.905
X-Spam-Level:
X-Spam-Status: No, score=-1.905 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, DKIM_SIGNED=0.1, DKIM_VALID=-0.1, HTML_MESSAGE=0.001, RCVD_IN_DNSWL_NONE=-0.0001, RCVD_IN_ZEN_BLOCKED_OPENDNS=0.001, SPF_HELO_NONE=0.001, SPF_PASS=-0.001, T_SCC_BODY_TEXT_LINE=-0.01, URIBL_BLOCKED=0.001, URIBL_DBL_BLOCKED_OPENDNS=0.001, URIBL_ZEN_BLOCKED_OPENDNS=0.001] autolearn=ham autolearn_force=no
Authentication-Results: ietfa.amsl.com (amavisd-new); dkim=pass (2048-bit key) header.d=fugue-com.20210112.gappssmtp.com
Received: from mail.ietf.org ([50.223.129.194]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id 7yvDSAYlWEvP for <ipv6@ietfa.amsl.com>; Mon, 26 Sep 2022 16:46:21 -0700 (PDT)
Received: from mail-ed1-x536.google.com (mail-ed1-x536.google.com [IPv6:2a00:1450:4864:20::536]) (using TLSv1.3 with cipher TLS_AES_128_GCM_SHA256 (128/128 bits) key-exchange X25519 server-signature RSA-PSS (2048 bits) server-digest SHA256) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id CCAEBC14CF0F for <ipv6@ietf.org>; Mon, 26 Sep 2022 16:46:21 -0700 (PDT)
Received: by mail-ed1-x536.google.com with SMTP id x21so11060354edd.11 for <ipv6@ietf.org>; Mon, 26 Sep 2022 16:46:21 -0700 (PDT)
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=fugue-com.20210112.gappssmtp.com; s=20210112; h=cc:to:subject:message-id:date:from:in-reply-to:references :mime-version:from:to:cc:subject:date; bh=d93YkyHcFN2pILEKAtAx637lu3CZbILxJ1tHbIVjsVE=; b=GFFqB786nM1824axFAV98WddMI+5lRb6cbB8RKF5vgz5y1QokzNLKqHMYtU1plOYPg RsQfuRMOwtZplgbuaj21kux/3kAuNAwHFBzkAXVGmOYfrEHEOpp+Y5zVmXoeViKyb7TO nGzxntQq+L/78fv9ypvEU+t4Oinj0y8xM/6buCWoFD3SwZkmMQRb2ihGy9zUM5PsE4FW aQlL6vYhDQ6DZHqKE5CT/3Rjl252HKcKMM+JcKuLJeT503j1deIb2q71szk5+29bWtDf PzazqIQTo9klvJ5alFCRh0svMJ0Nvprz+SwTz1frJAnct1/Wh4nNBC4Z79y1kolsygXV 3iSQ==
X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20210112; h=cc:to:subject:message-id:date:from:in-reply-to:references :mime-version:x-gm-message-state:from:to:cc:subject:date; bh=d93YkyHcFN2pILEKAtAx637lu3CZbILxJ1tHbIVjsVE=; b=Q6hM9pExfga7o4YAwqSR/nGtmEfe8mU7JZseTqF1awZEk9g7GQ9IFXOpDb87gIgj/R NcOi6+GmIS3lyIsAlFdH30B1vouB/B8zdeO11QU8T5ggfrFstO4V8bPSY6/egrFRPalr 2HTGNIRZJfVGenZT4hxSqT9j02fN19Z2SgAF0/OLn8mXnZ0n0rygOzN3NBeslyxZGf36 QR6sAaiCQ154ll8YXZrKJBiG0juJgfqOJn9ynIXjv6DXb540Ll+wt3dRr2NwpXaSvuXl RccsevF14jlflDLFxZwQ7mTvd6sBjqg5EXhw9DF4rHYl1Bmwf24NFT5RckoWCjfFQZXI 93rg==
X-Gm-Message-State: ACrzQf0hZykm2o5Dh6UiqK5+0ezB00tJL6TD4b3BANid9hOxw8B+PC3f dpBqZ+gn1AEemBWe0LuseAyqoK1AQ3bnUF2aRjZZAw==
X-Google-Smtp-Source: AMsMyM7ft0Mia5Ws/qIuhjI40dDdgyP5Mip5HRK1hnHQsts5CYZ6MAWeW6LLy/CkpGINlV2SLvuuPgpQq7x2n2zc/5g=
X-Received: by 2002:a05:6402:5ca:b0:43b:6e01:482c with SMTP id n10-20020a05640205ca00b0043b6e01482cmr25739730edx.189.1664235979673; Mon, 26 Sep 2022 16:46:19 -0700 (PDT)
MIME-Version: 1.0
References: <66892DC8-6DA4-4DC8-85B0-E1E1647CD9F7@gmail.com> <CAPt1N1=xR_2Xw+1KL6vbzZ69N+vonhcTNvO=DBceeApfoS2bMQ@mail.gmail.com> <e76267b6101146cf8a1bd6fa567c6b77@huawei.com> <CAN-Dau2QO5sxevJwUbOj+_wyiCdOjnPEZM14Jhevvkq4YZqU7Q@mail.gmail.com> <bc85e623-ef89-d2e2-4e33-b8ce0a4ec343@gmail.com> <CAN-Dau0Wbki6xwcEdy8ZK-pO9jeT6+8TKZgbmXWUgnkR+dRhBg@mail.gmail.com> <CAPt1N1=OmC+HNVGWbgj9JtGbpcuzKOgjZ1KXJm5mXgpji-G4Mw@mail.gmail.com> <6edcc5d8-edf1-51de-103c-a4ac6060fef6@gmail.com> <29689d645d22409b962f6c361d71e098@huawei.com> <CAN-Dau3rwi4X4NqLbHMmPQQ=i7y23Kz70JK09ggsXSxkJfT5xA@mail.gmail.com> <bf7c7d74cc7744ef8ded7d043ceb3e5e@huawei.com> <CAN-Dau0=LD9MTYKJQoSw=b9S25nmrNuqRSyLdsztFZscG8ZbUg@mail.gmail.com> <CAPt1N1kjOWh8R70pNO0eH9EJUH-v6HyxGMqxpy0N2hydHN33LQ@mail.gmail.com> <CAM5+tA9mqjrtq3pTggv1pA4fOYXUODkZHy74vs8cffVOrBefbQ@mail.gmail.com> <0b6886d3-5ea9-0a1d-8b16-4e17daeb6924@gmail.com> <CAM5+tA9dAjh0MTRG3922xTe3_aChHFa9AYCFCGmt395KwuvBYA@mail.gmail.com> <395554.1664189125@dooku> <56a897a426084f9381abaf770f1ea35e@huawei.com> <CAO42Z2xgMnVXeH9t0p_u7bg2fY-Gg+AagkFMMRJstX4E-f8FPQ@mail.gmail.com>
In-Reply-To: <CAO42Z2xgMnVXeH9t0p_u7bg2fY-Gg+AagkFMMRJstX4E-f8FPQ@mail.gmail.com>
From: Ted Lemon <mellon@fugue.com>
Date: Mon, 26 Sep 2022 19:46:08 -0400
Message-ID: <CAPt1N1m-1600rghA7mXNm1fvqOp23EOpYcS0E6xnJut+-t-9nQ@mail.gmail.com>
Subject: Re: Network merge [Re: RFC6724-bis?]
To: Mark Smith <markzzzsmith@gmail.com>
Cc: 6man WG <ipv6@ietf.org>, Michael Richardson <mcr+ietf@sandelman.ca>, Vasilenko Eduard <vasilenko.eduard=40huawei.com@dmarc.ietf.org>
Content-Type: multipart/alternative; boundary="0000000000006426fe05e99d22a1"
Archived-At: <https://mailarchive.ietf.org/arch/msg/ipv6/tZ3nAfnOPZDN5yAB7CyPCGcFTKM>
X-BeenThere: ipv6@ietf.org
X-Mailman-Version: 2.1.39
Precedence: list
List-Id: "IPv6 Maintenance Working Group \(6man\)" <ipv6.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/ipv6>, <mailto:ipv6-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/ipv6/>
List-Post: <mailto:ipv6@ietf.org>
List-Help: <mailto:ipv6-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/ipv6>, <mailto:ipv6-request@ietf.org?subject=subscribe>
X-List-Received-Date: Mon, 26 Sep 2022 23:46:25 -0000

The use case we are talking about here is a managed enterprise network. It
should be no problem for the network operator to configure some local ra
options.

Op ma 26 sep. 2022 om 19:17 schreef Mark Smith <markzzzsmith@gmail.com>

>
>
> On Mon, 26 Sept 2022, 21:15 Vasilenko Eduard, <vasilenko.eduard=
> 40huawei.com@dmarc.ietf.org> wrote:
>
>> >    > But how remote ULA prefix would be known to the local router?  If
>> >It can't, which is fine.
>> >If there are multiple ULAs after a merger, then we do what Brian and
>> David described and send RIOs or PIOs.
>>
>> It is evident that A=0 is for something non-local.
>>
>
> A=0 means the opposite of A=1, and A=1 has a specific meaning, nothing to
> do with non-local.
>
> Define another flag if this is going to be the solution to the fault of
> putting ULA AAAAs in global DNS.
>
> (Can it be adapted to the fault of putting link-local addresses in DNS?)
>
>
> It would be especially needed if /64 would be put into the SASA policy
>> table (then the remote prefix would be /64 too).
>> It may be needed for different /48 after the company merge.
>>
>> How to know what to put in this special PIO (A=L=0)? It looks like not
>> automated at all.
>>
>
> A sign that it's not solving the problem where it exists.
>
>
>
>> Ed/
>> -----Original Message-----
>> From: Michael Richardson [mailto:mcr+ietf@sandelman.ca]
>> Sent: Monday, September 26, 2022 1:45 PM
>> To: Vasilenko Eduard <vasilenko.eduard@huawei.com>; 6man WG <
>> ipv6@ietf.org>
>> Subject: Re: Network merge [Re: RFC6724-bis?]
>>
>>
>> Vasilenko Eduard <vasilenko.eduard@huawei.com> wrote:
>>     >> Now as to how to fix this without a global precedence for ULAs, I
>> am
>>     >> wondering about a PIO with L=0 and A=0 (exactly as recommended in
>> RFC
>>     >> 8028, but for other reasons). If a host sees such a PIO for a ULA
>>     >> prefix, it could serve as a signal that the prefix is to be given a
>>     >> suitable precedence, even though it is not on-link and not used for
>>     >> SLAAC.
>>
>>     >> I really like this.  I think it is the best solution.
>>
>>     > But how remote ULA prefix would be known to the local router?  If
>>
>> It can't, which is fine.
>>
>> If there are multiple ULAs after a merger, then we do what Brian and
>> David described and send RIOs or PIOs.
>>
>>     > proper routing is in place then no problem exists in the first
>> place,
>>     > the whole FC/7 could be prioritized.
>>
>> I don't think that non-local ULAs *should* be prioritized.
>> I think that it's actually a problem as more and more sites use ULA for
>> significant internal things, and those addresses leak into other sites.
>>
>>
>> --
>> Michael Richardson <mcr+IETF@sandelman.ca>, Sandelman Software Works  -=
>> IPv6 IoT consulting =-
>>
>>
>>
>> --------------------------------------------------------------------
>> IETF IPv6 working group mailing list
>> ipv6@ietf.org
>> Administrative Requests: https://www.ietf.org/mailman/listinfo/ipv6
>> --------------------------------------------------------------------
>>
> --------------------------------------------------------------------
> IETF IPv6 working group mailing list
> ipv6@ietf.org
> Administrative Requests: https://www.ietf.org/mailman/listinfo/ipv6
> --------------------------------------------------------------------
>