RE: [EXTERNAL] Comments on presentation of draft-lemon-stub-networks-ps-00

"Templin (US), Fred L" <Fred.L.Templin@boeing.com> Tue, 28 July 2020 17:48 UTC

Return-Path: <Fred.L.Templin@boeing.com>
X-Original-To: ipv6@ietfa.amsl.com
Delivered-To: ipv6@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id E63DB3A0A8F for <ipv6@ietfa.amsl.com>; Tue, 28 Jul 2020 10:48:42 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -2.099
X-Spam-Level:
X-Spam-Status: No, score=-2.099 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, DKIM_SIGNED=0.1, DKIM_VALID=-0.1, DKIM_VALID_AU=-0.1, DKIM_VALID_EF=-0.1, HTML_MESSAGE=0.001, RCVD_IN_MSPIKE_H2=-0.001, SPF_HELO_NONE=0.001, SPF_PASS=-0.001, URIBL_BLOCKED=0.001] autolearn=ham autolearn_force=no
Authentication-Results: ietfa.amsl.com (amavisd-new); dkim=pass (2048-bit key) header.d=boeing.com
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id dktO_OWFlPl6 for <ipv6@ietfa.amsl.com>; Tue, 28 Jul 2020 10:48:40 -0700 (PDT)
Received: from clt-mbsout-02.mbs.boeing.net (clt-mbsout-02.mbs.boeing.net [130.76.144.163]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id C49603A0AD3 for <ipv6@ietf.org>; Tue, 28 Jul 2020 10:48:39 -0700 (PDT)
Received: from localhost (localhost [127.0.0.1]) by clt-mbsout-02.mbs.boeing.net (8.15.2/8.15.2/DOWNSTREAM_MBSOUT) with SMTP id 06SHmYx2020674; Tue, 28 Jul 2020 13:48:37 -0400
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=boeing.com; s=boeing-s1912; t=1595958517; bh=QNnEktYjoGXHsubtNJxEWZaKRvJdYrjjo+/hSaXSsmc=; h=From:To:Subject:Date:References:In-Reply-To:From; b=NXqkSOT+CVipqcRB9Yaga9Y3/jsijanFLzxb5c/nRIQ4KTYXUL3Dtosa6Pj0XozbK nbSV0dkQjrEU/FyOPiO8U51dT95vOSR7uisimn64J5nmkEBQRxIJBuI2bahuqXJ3iU SrA7TNVeIbMXTI2E3kJzY46WyA8rQddn3rPhz9oTj8uSimsvBo2EcBjwDWUYHIAQt3 YyuGi+rpaYbJ3bJdoZaB65jNTXJ8Zps7TaCFbBSz1WpHf+N+S0ceDp0KsG1TClLQvs +x9nV8yFr9IUZSVy2i1fi9O7vn3JF5mb7XFwg3fbXPoCQbp4U7q1LRcMo5XUNOUl8T XGerONa56GSvQ==
Received: from XCH16-07-10.nos.boeing.com (xch16-07-10.nos.boeing.com [144.115.66.112]) by clt-mbsout-02.mbs.boeing.net (8.15.2/8.15.2/8.15.2/UPSTREAM_MBSOUT) with ESMTPS id 06SHmTYN019295 (version=TLSv1.2 cipher=ECDHE-RSA-AES256-SHA384 bits=256 verify=OK); Tue, 28 Jul 2020 13:48:29 -0400
Received: from XCH16-07-10.nos.boeing.com (144.115.66.112) by XCH16-07-10.nos.boeing.com (144.115.66.112) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA384) id 15.1.1979.3; Tue, 28 Jul 2020 10:48:27 -0700
Received: from XCH16-07-10.nos.boeing.com ([fe80::1522:f068:5766:53b5]) by XCH16-07-10.nos.boeing.com ([fe80::1522:f068:5766:53b5%2]) with mapi id 15.01.1979.003; Tue, 28 Jul 2020 10:48:27 -0700
From: "Templin (US), Fred L" <Fred.L.Templin@boeing.com>
To: Ted Lemon <mellon@fugue.com>, IPv6 <ipv6@ietf.org>
Subject: RE: [EXTERNAL] Comments on presentation of draft-lemon-stub-networks-ps-00
Thread-Topic: [EXTERNAL] Comments on presentation of draft-lemon-stub-networks-ps-00
Thread-Index: AQHWZQdMCS+aFF/gFkO/6KVW22QwJw==
Date: Tue, 28 Jul 2020 17:48:27 +0000
Message-ID: <f1d49b14b75c4eb49b997845b49ccf84@boeing.com>
References: <031d58ccb8af4d38ac204396fcf1b7d1@boeing.com> <AC5C229A-CC9E-4799-81DA-A7001EDB25FE@fugue.com> <14fbad24ee734a529213044cc912d626@boeing.com> <D037ED22-3E46-4B51-92FD-B60678192AB9@fugue.com>
In-Reply-To: <D037ED22-3E46-4B51-92FD-B60678192AB9@fugue.com>
Accept-Language: en-US
Content-Language: en-US
X-MS-Has-Attach:
X-MS-TNEF-Correlator:
x-originating-ip: [137.137.12.6]
x-tm-snts-smtp: C24C360151DD3A8B6BA4D2E885C8E97EBC833B2422B31463B874EBDE72ED55342000:8
Content-Type: multipart/alternative; boundary="_000_f1d49b14b75c4eb49b997845b49ccf84boeingcom_"
MIME-Version: 1.0
X-TM-AS-GCONF: 00
Archived-At: <https://mailarchive.ietf.org/arch/msg/ipv6/x6m3YI1U8t8WjIkFynEeIpAtKsQ>
X-BeenThere: ipv6@ietf.org
X-Mailman-Version: 2.1.29
Precedence: list
List-Id: "IPv6 Maintenance Working Group \(6man\)" <ipv6.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/ipv6>, <mailto:ipv6-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/ipv6/>
List-Post: <mailto:ipv6@ietf.org>
List-Help: <mailto:ipv6-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/ipv6>, <mailto:ipv6-request@ietf.org?subject=subscribe>
X-List-Received-Date: Tue, 28 Jul 2020 17:48:50 -0000

Ø  I think we are talking past each other. This technology is not present on the networks

Ø  I want to attach my stub network to. That’s pretty much the end of the story.

Not at all; you need to look at the drafts in conjunction with one another and then realize that
they already establish a framework for stub networks that has been in the public eye for years
now. If you want to introduce new access methods they could go as new sub-sections of the
existing documents. Note that we have also been investigating RIOs in the public domain for
a long time:

https://datatracker.ietf.org/doc/draft-templin-v6ops-pdhost/
https://datatracker.ietf.org/doc/draft-templin-6man-dhcpv6-ndopt/
https://datatracker.ietf.org/doc/draft-templin-6man-rio-redirect/

Contrary to popular belief, just because I wrote these documents does not make
them invalid.

Fred

From: ipv6 [mailto:ipv6-bounces@ietf.org] On Behalf Of Ted Lemon
Sent: Tuesday, July 28, 2020 10:13 AM
To: IPv6 <ipv6@ietf.org>
Subject: Re: [EXTERNAL] Comments on presentation of draft-lemon-stub-networks-ps-00




On Jul 28, 2020, at 11:14 AM, Templin (US), Fred L <Fred.L.Templin@boeing.com<mailto:Fred.L.Templin@boeing.com>> wrote:
Ted, please take a look at the document – in particular its structure and diagrams. There
is nothing complicated being proposed there, but certainly establishes the framework
for stub networks.

I think we are talking past each other. This technology is not present on the networks I want to attach my stub network to. That’s pretty much the end of the story.

On Jul 28, 2020, at 10:41 AM, otroan@employees.org<mailto:otroan@employees.org> wrote:
1) HNCP / Homenet

This technology is not present on any network I care about. If router vendors (ahem!) want to start pushing it, great, but until then it doesn’t help me.


2) Multilink subnet routing with proxy ND (RFC4903)

This sounds simple, but is actually really complicated.


3) Hierarchical PD (e.g. draft-gmann-homenet-relay-autoconf-00)

I think it’s unfortunate that we didn’t do this, although IIRC the details at the time weren’t quite right. The working group didn’t adopt the proposal, so we never got to fix that. What I’m suggesting actually does something similar.


4) L2 bridging

Can’t work for constrained networks.

5) 64share (RFC7278)

This is really just a more detailed description of the IPv6 portion of RFC 4903, if I’m reading it right. It could certainly be made to work, but seems unnecessarily complicated.


6) NPT66/NAT66

This is probably easier than 64share, but I think we’d prefer not to have NAT if possible.


7) Evolution of ILNP

This is really heavyweight. Why would we want to do this when IPv6 routing will do just fine?


8) PMIP6?

Really complicated


9) Multi-link subnet routing - shared /64 + host routes

Really complicated


10) Backbone router (draft-ietf-6lo-backbone-router etc)

This works, but requires that every stub router have a complete list of hosts on the stub network.  Depending on the stub network technology, this isn’t actually a viable solution. E.g., if the stub network is a mesh, keeping all of that data centralized is a lot of extra work. It’s equivalently complicated to options 7, 8 and 9.


These solutions vary with:
- the level of "permissionlessness"
- support for arbitrary topology
  (or essentially end up with implementing a spanning tree protocol with ND or DHCP)
- multiple sources of information
- deployment and implementation considerations

Yup.

Perhaps I should have said at the start, the point of this exercise is to figure out the minimal solution that solves the very simple stub network problem, not a general solution to the problem of automatically configuring arbitrary subnet topologies. The motivation for this is that the stub network problem turns out to be a very common use case (e.g., it’s the problem that the 6lo backbone router draft solves). A simple solution that works on an unmodified network is therefore worthwhile.

So what I’ve prototyped pretty much relies solely on RIO and PIO in a non-default router, uses ULAs for addressing on the stub network, and uses ULA if no IPv6 is present on the infrastructure network, otherwise uses what the infrastructure provides. This allows hosts on the stub network and infrastructure network to communicate transparently with no administrator intervention. There is no centralized device inventory, and hence none of the problems that come with maintaining such an inventory.

There isn’t actually any new protocol to write for this in 6man—it works using existing RA functionality.  However, there are some issues that come up when doing this, and that’s really what impacts 6man. For example, “routers” aren’t supposed to listen to RAs. But a stub router has to, or it won’t see the PIO that’s already present on the infrastructure network. Is that an okay thing to do? Is there a reason why that’s not allowed?

Separately, a lot of the suggestions you mention above try really hard to preserve stability of IP addresses on end-nodes. For some end-nodes, this is quite important: you don’t want your servers changing IP addresses all the time. For devices on home networks, this kind of stability is not all that useful, particularly for portable devices. This is not to say that stability is not good, but it’s not that important that my iPhone have the same exact IP address every time it connects, for example. So protocols that try to keep stable IP addresses are doing work that I don’t need done for my iPhone. This is why I say that things like ILNP and PMIP6 are “really complicated.” If you want to solve the problem they solve, they are no more complicated than needed. But this isn’t a problem that really needs to be solved for a lot of use cases, so it’s added cost that adds no value.