Re: Running code (Was: I-D Action: draft-ietf-6man-ipv6only-flag-03.txt)

Ole Troan <otroan@employees.org> Wed, 24 October 2018 06:14 UTC

Return-Path: <otroan@employees.org>
X-Original-To: ipv6@ietfa.amsl.com
Delivered-To: ipv6@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id DD21D130DE5 for <ipv6@ietfa.amsl.com>; Tue, 23 Oct 2018 23:14:59 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -1.901
X-Spam-Level:
X-Spam-Status: No, score=-1.901 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, RCVD_IN_DNSWL_NONE=-0.0001, SPF_PASS=-0.001] autolearn=ham autolearn_force=no
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id LuZpaFFAYtBT for <ipv6@ietfa.amsl.com>; Tue, 23 Oct 2018 23:14:57 -0700 (PDT)
Received: from bugle.employees.org (accordion.employees.org [198.137.202.74]) (using TLSv1.2 with cipher AECDH-AES256-SHA (256/256 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id A738812958B for <ipv6@ietf.org>; Tue, 23 Oct 2018 23:14:57 -0700 (PDT)
Received: from [192.168.10.187] (30.51-175-112.customer.lyse.net [51.175.112.30]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by bugle.employees.org (Postfix) with ESMTPSA id 5C9EEFECC07D; Wed, 24 Oct 2018 06:14:56 +0000 (UTC)
Content-Type: text/plain; charset="us-ascii"
Mime-Version: 1.0 (1.0)
Subject: Re: Running code (Was: I-D Action: draft-ietf-6man-ipv6only-flag-03.txt)
From: Ole Troan <otroan@employees.org>
X-Mailer: iPhone Mail (16A404)
In-Reply-To: <37ba23b3-df19-9c2a-bdbe-ba7a99d72d05@si6networks.com>
Date: Wed, 24 Oct 2018 08:14:53 +0200
Cc: Brian E Carpenter <brian.e.carpenter@gmail.com>, Lee Howard <lee@asgard.org>, ipv6@ietf.org
Content-Transfer-Encoding: 7bit
Message-Id: <10F6EE0D-EFAD-439A-B7B8-64E8AA57BF93@employees.org>
References: <CAFU7BASO_ByzbanhLKnWV280O_fASd-8W+ujpj3sN6d2-whw2w@mail.gmail.com> <CACWOCC-u7aAPwAOcixYvt2On=-o_8X25GhqdXTfA+tWRC1o2XA@mail.gmail.com> <3beca72e-19c5-10af-02e5-c21a90d77100@gmail.com> <20181019.223739.271916573.sthaug@nethelp.no> <4f58643c-272e-507e-3282-c87befd42395@gmail.com> <0927741c-4e8e-fcf7-ddd6-3ba500ba4c3d@si6networks.com> <7B48A11D-31DE-443C-B73A-14642EA0A397@jisc.ac.uk> <7526af75-4359-6fc6-e39b-eb94024a04de@si6networks.com> <E1BB1232-C1A2-496A-8157-0682D91EED42@steffann.nl> <5E75F3CA-F1D2-4F4F-9CF7-EEEE59634C1E@gmail.com> <C46C990E-0A4F-4731-8CB1-FD204858935E@consulintel.es> <9B53019C-3506-4C9E-AFCF-D6125FA1A65B@gmail.com> <1157b739-3a66-8d45-e3e1-e5f904dfb9bc@asgard.org> <a00607f9-7ced-f889-b5cb-c2fe16367d73@si6networks.com> <66759b73-0a22-e1a9-49db-21154e8e1267@gmail.com> <37ba23b3-df19-9c2a-bdbe-ba7a99d72d05@si6networks.com>
To: Fernando Gont <fgont@si6networks.com>
Archived-At: <https://mailarchive.ietf.org/arch/msg/ipv6/yBFwYDfqPAEaQmrjMgBqNh4felA>
X-BeenThere: ipv6@ietf.org
X-Mailman-Version: 2.1.29
Precedence: list
List-Id: "IPv6 Maintenance Working Group \(6man\)" <ipv6.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/ipv6>, <mailto:ipv6-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/ipv6/>
List-Post: <mailto:ipv6@ietf.org>
List-Help: <mailto:ipv6-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/ipv6>, <mailto:ipv6-request@ietf.org?subject=subscribe>
X-List-Received-Date: Wed, 24 Oct 2018 06:15:00 -0000


> On 24 Oct 2018, at 05:20, Fernando Gont <fgont@si6networks.com> wrote:
> 
>> On 10/24/18 4:54 AM, Brian E Carpenter wrote:
>> On 2018-10-24 11:13, Fernando Gont wrote:
>> 
>> <snip>
>> 
>>> 
>>> In this particular case (ipv6-only flag), what goes on the wire is
>>> simple enough that..I don't think having an implementation will buy much
>>> wrt how different implementations interoperate with each other. And the
>>> insights you'll gain from an implementation are most likely "out of the
>>> scope of the I-D", since how you disable the IPv4 stack is certainly
>>> going to be very implementation-dependent. (me thinking out loud)
>>> 
>> 
>> Exactly right. There isn't actually an interop requirement of any kind.
>> This is a one-way signal from the routers to each host, and each host
>> may choose what to do with that information. Legacy hosts will ignore
>> it, for example. A host with a sophisticated connection manager might
>> use a complicated heuristic, and there are many possibilities in
>> between, which is the reason that the draft uses SHOULD language.
> 
> Without endorsing or opposing to the proposal what I would expect is
> that it's quite clear what is expected from hosts in response to the bit.
> 
> If, when sending the bit set you get each node doing it's own thing (one
> reduces timers, another disables the stack forever, another disables it
> but might re-enable it when the bit is no longer set, etc.), that would
> be an undesirable outcome. Me, I think it should be clear what to do
> with the bit, and the exceptions (the corner cases when you might go
> against the advice) should be spelled out.
> 
> (things like e.g. what we have with SLAAC/DHCPv6 interaction ar, IMO,
> quite undesirable)

+1

Ole