Re: [IPv6] Architectural comments on draft-ietf-6man-ipv6-over-wireless-

"Pascal Thubert (pthubert)" <pthubert@cisco.com> Thu, 27 July 2023 21:24 UTC

Return-Path: <pthubert@cisco.com>
X-Original-To: ipv6@ietfa.amsl.com
Delivered-To: ipv6@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 02545C15153E for <ipv6@ietfa.amsl.com>; Thu, 27 Jul 2023 14:24:42 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -9.604
X-Spam-Level:
X-Spam-Status: No, score=-9.604 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, DKIMWL_WL_HIGH=-0.001, DKIMWL_WL_MED=-0.001, DKIM_SIGNED=0.1, DKIM_VALID=-0.1, DKIM_VALID_AU=-0.1, DKIM_VALID_EF=-0.1, HTML_MESSAGE=0.001, RCVD_IN_MSPIKE_H3=0.001, RCVD_IN_MSPIKE_WL=0.001, RCVD_IN_ZEN_BLOCKED_OPENDNS=0.001, SPF_NONE=0.001, T_SCC_BODY_TEXT_LINE=-0.01, URIBL_BLOCKED=0.001, URIBL_DBL_BLOCKED_OPENDNS=0.001, URIBL_ZEN_BLOCKED_OPENDNS=0.001, USER_IN_DEF_DKIM_WL=-7.5] autolearn=ham autolearn_force=no
Authentication-Results: ietfa.amsl.com (amavisd-new); dkim=pass (1024-bit key) header.d=cisco.com header.b="ESr82in8"; dkim=pass (1024-bit key) header.d=cisco.com header.b="Qw7aUaPh"
Received: from mail.ietf.org ([50.223.129.194]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id IBSjuqSplycN for <ipv6@ietfa.amsl.com>; Thu, 27 Jul 2023 14:24:38 -0700 (PDT)
Received: from rcdn-iport-6.cisco.com (rcdn-iport-6.cisco.com [173.37.86.77]) (using TLSv1.2 with cipher DHE-RSA-SEED-SHA (128/128 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id 3979FC151530 for <ipv6@ietf.org>; Thu, 27 Jul 2023 14:24:38 -0700 (PDT)
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/simple; d=cisco.com; i=@cisco.com; l=16947; q=dns/txt; s=iport; t=1690493078; x=1691702678; h=from:to:cc:subject:date:message-id:references: in-reply-to:mime-version; bh=0Zlffk1iXhrnTDy7FManif+LspjxV4HUptDZcTaDGmM=; b=ESr82in8vZaXdhkcT+E24F+Uir+E4QI56fUw6YryPDT7VVVaA1uD21ev flmmrZZkgl608fw+lbtBHO4JRfX4p4CtDaioZk7EZthytrk7OhIA1u9gP iD1meV9HZsKWj3Xc3rVXB3+Kg296aXo9tiRgpuCMFCHd7KtbAphBwg7jk 8=;
X-IPAS-Result: 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
IronPort-PHdr: A9a23:13jVHRHrc2YvSRXUX4usLJ1Gfu4Y04WdBeZdwoAsh7QLdbys4NG7e kfe/v5qylTOWNaT5/FFjr/Ourv7ESwb4JmHuWwfapEESRIfiMsXkgBhSM6IAEH2NrjrOgQxH d9JUxlu+HToeVNNFpPGbkbJ6ma38SZUHxz+MQRvIeGgApLSks66zfya8JzIaAIOjz24Mvt+K RysplDJv9INyct6f78swwHApGdJfekeyWJzcFSUmRu9rsvl9594+CMWsPUkn/M=
IronPort-Data: A9a23:YPtel6PDZuCtEbXvrR3Il8FynXyQoLVcMsEvi/4bfWQNrUog0mdWm mdNUW/TPf7cYDTwLop0bYm18htV7MTVnNRgHHM5pCpnJ55oRWUpJjg4wmPYZX76whjrFRo/h ykmQoCcaphyFBcwnz/1WlTbhSEUOZqgGPykUYYoBggrHVU/EHh71ko48wIEqtcAbeaRUlvlV eza+6UzCHf9s9KjGjtJg04rgEoHUMXa4Fv0jHRnDRx4lAO2e00uMX4qDfrZw00U7WVjNrXSq +7rlNlV945ClvsnIovNfr3TKiXmTlNOVOSDoiI+ZkSsvvRNjjMCw4EBC9ElU0oUjTSWncFd0 fdm8pPlHG/FPoWU8AgcewNTHyc7Nqpc9fqeez60sNeYyAvNdH6EL/dGVR5te9ZHvLcsRzgSp ZT0KxhVBvyHr/qqwK+xR/Nwrs8iN8LseogYvxmMyBmIVqd+G82SHs0m4/cI9To71sRnJ83kY ulIN2BxSw7mQQVAbwJ/5JUWxbf02SaXnydjgFONu/Qf4mXPwkp2yreFDTbOUsaBScMQlUGCq yefpSLyAwoRM5qUzj/tHm+QavHnghPqf7gtP4SC+71sgUKR10AKKjZRWg7uyRWmsXKWV9VaI k0S3yMhq6ku6UCmJuURuTXl/hZoWTZBBbJt//0GBBKlkfWLvl7IboQQZnsQN4x87Z5eqSkCj wfRx7vU6SpTXKp5oE9xG5+Opj+0fCMSN2JHPHVCRgoe6N6lq4Y25v4ucjqBOPDv5jEWMWigq 9xvkMTYr+lI5SLs//nilW0rexr2+vD0ovcdv207pF6N4AJjf5KCbIe181Xd5vsoBN/HHwHd7 CJax5DBtrFm4XSxeMqlHr1l8FaBua7tDdEgqQUH82QJrm70oCfzIei8Hhkufx4B3jk4lc/BO R+P5lw5CG57N3qxZqg/eJOqF8kv1sDd+SfNCJjpgi51SsEpLmevpXg2DWbJhjyFuBZ3y8kXZ 8zEGftA+F5HU8yLOhLsGbdEuVLqrwhjrV7uqWfTlkX4iOPANCbIEN/o8jKmN4gE0U9Nmy2Mm /53PMqRwBIZW+r7ChQ7O6ZJRbzWBRDX3azLlvE=
IronPort-HdrOrdr: A9a23:tskn2KrFNkrS80/4sVq8n0IaV5uZL9V00zEX/kB9WHVpm5Oj9v xGzc506farslkssSkb6K+90cm7K0819fZOkO4s1MSZLXfbUQqTXcxfBO7ZowEIdBeOjdK1uZ 0QFpSWTeeAcWSS7vyKrDVQcexQuuVvmZrA7YyzvhQdLz2CKZsQkjuRYTzrdHGeMTM2fabRY6 Dsn/avyQDQHUj/aP7XOlA1G8z44/HbnpPvZhALQzQ97hOVsD+u4LnmVzCFwxY3SVp0sPkf2F mAtza8yrSosvm9xBOZ/XTU9Y5qlNzozcYGLNCQi/ISNi7nhm+TFcVcsvy5zXAISdOUmRQXee r30lId1gNImjfsl1SO0FjQMs/boXETAjHZuBmlaDDY0L3ErXoBerp8bMRiA1TkA45KhqAl7E qNtFjp7qZ/HFfOmj/w6MPPUAwvnk2ooWA6mepWlHBHV5ACAYUh5bD30XklZqvoJhiKobwPAa 1rFoXR9fxWeVSVYzTQuXRu2sWlWjA2Eg2dSkYPt8SJ23wO9UoJhXcw1YgahDMN5Zg9Q55L66 DNNblpjqhHSosTYbhmDOkMTMOrAijGQA7KMmiVPVP7fZt3cE7lutry+vE49euqcJsHwN87n4 nASkpRsSood0fnGaS1rep2G9D2MRGAtBjWu7RjDsJCy87BrZLQQF++dGw=
X-Talos-CUID: 9a23:iM960WgedkSOA1lcvNIPU7VroDJubU3M603vCHaCBCVvSaKXWHOJ2ogjnJ87
X-Talos-MUID: 9a23:s+E75QmjBpybxWSgposzdnoyHcpjs6CHMns3lLZX5ZOaEjZWGS+S2WE=
X-IronPort-Anti-Spam-Filtered: true
Received: from rcdn-core-12.cisco.com ([173.37.93.148]) by rcdn-iport-6.cisco.com with ESMTP/TLS/ECDHE-RSA-AES256-GCM-SHA384; 27 Jul 2023 21:24:36 +0000
Received: from rcdn-opgw-1.cisco.com (rcdn-opgw-1.cisco.com [72.163.7.162]) by rcdn-core-12.cisco.com (8.15.2/8.15.2) with ESMTPS id 36RLOZ5A022091 (version=TLSv1.2 cipher=DHE-RSA-AES256-GCM-SHA384 bits=256 verify=OK) for <ipv6@ietf.org>; Thu, 27 Jul 2023 21:24:36 GMT
Authentication-Results: rcdn-opgw-1.cisco.com; dkim=pass (signature verified) header.i=@cisco.com; spf=Pass smtp.mailfrom=pthubert@cisco.com; dmarc=pass (p=quarantine dis=none) d=cisco.com
X-IronPort-AV: E=Sophos;i="6.01,236,1684800000"; d="scan'208,217";a="4752937"
Received: from mail-bn8nam11lp2169.outbound.protection.outlook.com (HELO NAM11-BN8-obe.outbound.protection.outlook.com) ([104.47.58.169]) by rcdn-opgw-1.cisco.com with ESMTP/TLS/ECDHE-RSA-AES256-GCM-SHA384; 27 Jul 2023 21:24:34 +0000
ARC-Seal: i=1; a=rsa-sha256; s=arcselector9901; d=microsoft.com; cv=none; b=BXEmo75wjO7hFPSBu8Zav6SZisve7/Wb1gVAAb0/qhsn60EQfH+uZkR6CncWYjKOtq+vvvkMiTIHMjSScyqrwHPMafAINNteblN/+9DYwNkTKfZDBpKAk3xq3HOUzz5tJ5Cn69qh1MimpYoBGQcnN1Y1AcLk08Csn8TcDOba95rNJJVtVIMh8FP3k3cA8NXpGR254jDEzGhbwU+/OYyC9mTtTlFLy52KqKwcFefU0Xe1JExRpRt/PTmrTEGndFd+Akhp7/glXdlimkI23+cawsyNnNJWzYMmujNziQlybvuSyFzIZ1QHfGV5HAihVmwCbW0Du/GJRVzgdrEPYfP6ag==
ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=microsoft.com; s=arcselector9901; h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-AntiSpam-MessageData-ChunkCount:X-MS-Exchange-AntiSpam-MessageData-0:X-MS-Exchange-AntiSpam-MessageData-1; bh=0Zlffk1iXhrnTDy7FManif+LspjxV4HUptDZcTaDGmM=; b=aOh9pVL3XRW2yZIpteCvJ7pP2lMWeI8IN5V/X055eKjL3fFs2dPmg/YwymCWW16XCJ4OIPqq05+MSQ4qXNR+3riM55Ep7mMewomaYAHixMESaAZ73EZ/b3/1+6MkXEJgu8o3g2aZP2MwFGal1aQpCNB55pso7PKcF5p0FkNvE3ED6kw3k9FBpCk68g9bptEx5jPto8+uJ4VdhOqZvbqdpIFcA4IsIsU5ouYm5jhS0mSILNiJKMtlezeP0h5jit8mr+uA8GYX4vwdSd42d1mCE5jbFZo8d2daIBrbS9eUMlrOKpjbfqoKHvxKM12uDZvuL0scY1lUxL8Og5M56A+sFw==
ARC-Authentication-Results: i=1; mx.microsoft.com 1; spf=pass smtp.mailfrom=cisco.com; dmarc=pass action=none header.from=cisco.com; dkim=pass header.d=cisco.com; arc=none
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=cisco.com; s=selector1; h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-SenderADCheck; bh=0Zlffk1iXhrnTDy7FManif+LspjxV4HUptDZcTaDGmM=; b=Qw7aUaPhtIxZi5ZXHq2m4HwGuyxB1Sf5VvRd4MgLrsi+Me1h0Gp+qf7j1Q1cH3oD7fr/9b+boNhF0VNzLL+BcOyyXMVwIy6NG+MQl2QVKLm4XvauET9a2GGQCCKFDdfubR6D2pQqTnYfoO/P/F+Dg+ZzjvuC4BbJ2HjRFlTbqUQ=
Received: from CO1PR11MB4881.namprd11.prod.outlook.com (2603:10b6:303:91::20) by IA0PR11MB7354.namprd11.prod.outlook.com (2603:10b6:208:434::17) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id 15.20.6631.29; Thu, 27 Jul 2023 21:24:32 +0000
Received: from CO1PR11MB4881.namprd11.prod.outlook.com ([fe80::17aa:6ac2:4ac6:4841]) by CO1PR11MB4881.namprd11.prod.outlook.com ([fe80::17aa:6ac2:4ac6:4841%7]) with mapi id 15.20.6631.026; Thu, 27 Jul 2023 21:24:32 +0000
From: "Pascal Thubert (pthubert)" <pthubert@cisco.com>
To: Ted Lemon <mellon@fugue.com>
CC: Lorenzo Colitti <lorenzo=40google.com@dmarc.ietf.org>, IETF IPv6 Mailing List <ipv6@ietf.org>
Thread-Topic: [IPv6] Architectural comments on draft-ietf-6man-ipv6-over-wireless-
Thread-Index: AQHZwMlB3E+v7xx5/06THcbuxRSRq6/OEvaAgAAM75o=
Date: Thu, 27 Jul 2023 21:24:32 +0000
Message-ID: <9728BA13-FE88-478D-B44F-6D9A4DDAA67F@cisco.com>
References: <CAKD1Yr1piLMJEh_hqpBi1a559qKD41B7Pb4Fi2U0aPEMSosNTw@mail.gmail.com> <CAPt1N1nAedaCVfxD7pn+2DsA1nrXZkKYpjS_qLN8gVCMdM=NRg@mail.gmail.com>
In-Reply-To: <CAPt1N1nAedaCVfxD7pn+2DsA1nrXZkKYpjS_qLN8gVCMdM=NRg@mail.gmail.com>
Accept-Language: fr-FR, en-US
Content-Language: fr-FR
X-MS-Has-Attach:
X-MS-TNEF-Correlator:
x-ms-publictraffictype: Email
x-ms-traffictypediagnostic: CO1PR11MB4881:EE_|IA0PR11MB7354:EE_
x-ms-office365-filtering-correlation-id: 83427aba-abe7-492b-0a22-08db8ee7de6d
x-ms-exchange-senderadcheck: 1
x-ms-exchange-antispam-relay: 0
x-microsoft-antispam: BCL:0;
x-microsoft-antispam-message-info: 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
x-forefront-antispam-report: CIP:255.255.255.255; CTRY:; LANG:en; SCL:1; SRV:; IPV:NLI; SFV:NSPM; H:CO1PR11MB4881.namprd11.prod.outlook.com; PTR:; CAT:NONE; SFS:(13230028)(4636009)(346002)(396003)(366004)(136003)(376002)(39860400002)(451199021)(2906002)(316002)(8936002)(8676002)(5660300002)(86362001)(38070700005)(41300700001)(33656002)(36756003)(53546011)(166002)(6512007)(966005)(6506007)(478600001)(71200400001)(6486002)(83380400001)(66574015)(186003)(2616005)(4326008)(76116006)(6916009)(38100700002)(64756008)(66476007)(66946007)(66556008)(66446008)(54906003)(122000001)(45980500001)(244885003); DIR:OUT; SFP:1101;
x-ms-exchange-antispam-messagedata-chunkcount: 1
x-ms-exchange-antispam-messagedata-0: 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
Content-Type: multipart/alternative; boundary="_000_9728BA13FE88478DB44F6D9A4DDAA67Fciscocom_"
MIME-Version: 1.0
X-OriginatorOrg: cisco.com
X-MS-Exchange-CrossTenant-AuthAs: Internal
X-MS-Exchange-CrossTenant-AuthSource: CO1PR11MB4881.namprd11.prod.outlook.com
X-MS-Exchange-CrossTenant-Network-Message-Id: 83427aba-abe7-492b-0a22-08db8ee7de6d
X-MS-Exchange-CrossTenant-originalarrivaltime: 27 Jul 2023 21:24:32.3300 (UTC)
X-MS-Exchange-CrossTenant-fromentityheader: Hosted
X-MS-Exchange-CrossTenant-id: 5ae1af62-9505-4097-a69a-c1553ef7840e
X-MS-Exchange-CrossTenant-mailboxtype: HOSTED
X-MS-Exchange-CrossTenant-userprincipalname: oxmnv0+Sy/xyq3lodK2w8chND8uhOKaShNOv66OpjjBVMkaxJVNQSUF9FCfsl1Dc64qH0RPodxKsCfaZ25g3ww==
X-MS-Exchange-Transport-CrossTenantHeadersStamped: IA0PR11MB7354
X-Outbound-SMTP-Client: 72.163.7.162, rcdn-opgw-1.cisco.com
X-Outbound-Node: rcdn-core-12.cisco.com
Archived-At: <https://mailarchive.ietf.org/arch/msg/ipv6/v9vVszofsl0xuOdya8oHPy9qWMI>
Subject: Re: [IPv6] Architectural comments on draft-ietf-6man-ipv6-over-wireless-
X-BeenThere: ipv6@ietf.org
X-Mailman-Version: 2.1.39
Precedence: list
List-Id: "IPv6 Maintenance Working Group \(6man\)" <ipv6.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/ipv6>, <mailto:ipv6-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/ipv6/>
List-Post: <mailto:ipv6@ietf.org>
List-Help: <mailto:ipv6-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/ipv6>, <mailto:ipv6-request@ietf.org?subject=subscribe>
X-List-Received-Date: Thu, 27 Jul 2023 21:24:42 -0000

Hello Ted

My message did not land as intended.
The intent is this:

I have a large building or campus. I want to enter anywhere and obtain an address that I can use throughout the campus without renumbering when I go to the next building/ level/room.

Otoh I want that bonjour always finds the nearest printer and that printer is in the same room as me or in a closeby room. Certainly not anywhere in the campus.

For the latter the admin sets the broadcast domain to be limited to a small area in the building.

For the former your subnet must still be reachable in the room you’re in. So the desired range / coverage of the subnet does not match the physical space covered by the broadcast domain you’re in.

From there you have to choices. 1)  Tunnel selected packets like MIPv6 does to where you entered the building. Or 3) route. Obviously since the use case is a real customer situation we implemented 1) and that’s an awful hack.

The architecture provides a model that allows decoupling the broadcast domain that you link local address will reach from the subnet where your address will be topologically correct and reachable.

Regards,

Pascal

Le 27 juil. 2023 à 13:40, Ted Lemon <mellon@fugue.com> a écrit :


The question that's been making me scratch my head as I listen to this presentation is, "for whom is this proposal a solution to their problem?" Like, not "people with this class of network," but rather "who specifically needs this on their actual physical network?"

I found the mDNS locality argument not at all persuasive. The idea that we would solve an application problem at Layer 3 seems like a terrible idea.
In any case, I have the same impression you do: this is really complicated and it's hard for me to imagine that it's actually going to improve things. Why do we still have giant (multi-thousand-host) broadcast domains? What is the problem that is being solved by making broadcast domains so large?

On Thu, Jul 27, 2023 at 1:30 PM Lorenzo Colitti <lorenzo=40google.com@dmarc.ietf.org<mailto:40google.com@dmarc.ietf.org>> wrote:
I mentioned this v6ops at the mic, but never sent it here, so...

tl;dr - While this architecture may be a slightly better fit for wireless links, it does so at the cost of greater complexity, reduced resilience, reduction in the ability for hosts to autonomously form addresses, and the loss of an abstraction that is useful for application developers. I also don't think that the scalability and power improvements are necessary in most networks.

======

More in detail: while the proposed architecture is a good fit for low power networks (which is where it originates from), I don't think the new architecture is a good trade-off for general purpose networks like 802.11, for several reasons.

First: the draft is very focused on ND, but ND is just one of the protocols that rely on the broadcast link abstraction. It's arguably the _most important_ protocol, because it is required for all other communications, but it's definitely not the only protocol, and it's most certainly not the protocol that sends the most packets or bytes. For example, MDNS is much chattier.

The reason we have a broadcast abstraction over links like 802.11 wifi is that it's a _useful_ abstraction. Developers of applications like MDNS (and many other discovery applications) benefit greatly from a simple abstraction. And even if we change the architecture of ND, the link layer will still need to provide this useful abstraction.

Second: the current architecture has several good properties that the proposed architecture lacks, and I think it's arguably a good trade-off for most general purpose use cases. For example, it is robust to state loss, because any entity that crashes will trivially recover state without needing a complex recovery procedure. And it allows nodes to form their own addresses without requesting them from the network. This is recommended by RFC 7934, which also documents several cases where hosts were able to autonomously add functionality without changing the network at all.

Third: from a network scalability and power perspective, I think the current architecture scales quite well. In terms of traffic, ND is almost never a scaling problem except in extreme cases (e.g., tens of thousands of nodes on a link). And because ND uses multicast, these problems are easily solved using L2 optimizations like multicast snooping and, in the case of 802.11, things like multicast-to-unicast conversion. Even currently-specified things like ND proxying aren't really necessary for this purpose. From a power perspective, ND is a negligible cost for pretty much any general purpose device, and definitely for *anything* the size of a phone or larger.
--------------------------------------------------------------------
IETF IPv6 working group mailing list
ipv6@ietf.org<mailto:ipv6@ietf.org>
Administrative Requests: https://www.ietf.org/mailman/listinfo/ipv6
--------------------------------------------------------------------
--------------------------------------------------------------------
IETF IPv6 working group mailing list
ipv6@ietf.org
Administrative Requests: https://www.ietf.org/mailman/listinfo/ipv6
--------------------------------------------------------------------