Re: [v6ops] Scope of Unique Local IPv6 Unicast Addresses (Fwd: New Version Notification for draft-gont-6man-ipv6-ula-scope-00.txt)

Philip Homburg <pch-ipv6-ietf-7@u-1.phicoh.com> Thu, 07 January 2021 14:55 UTC

Return-Path: <pch-b9D3CB0F5@u-1.phicoh.com>
X-Original-To: ipv6@ietfa.amsl.com
Delivered-To: ipv6@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 5EF753A11DC; Thu, 7 Jan 2021 06:55:28 -0800 (PST)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -1.897
X-Spam-Level:
X-Spam-Status: No, score=-1.897 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, RCVD_IN_DNSWL_BLOCKED=0.001, SPF_HELO_NONE=0.001, SPF_NONE=0.001] autolearn=ham autolearn_force=no
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id sCImI63Zm8-s; Thu, 7 Jan 2021 06:55:26 -0800 (PST)
Received: from stereo.hq.phicoh.net (stereo6-tun.hq.phicoh.net [IPv6:2001:888:1044:10:2a0:c9ff:fe9f:17a9]) (using TLSv1.2 with cipher ECDHE-RSA-CHACHA20-POLY1305 (256/256 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id 1F9E03A11D8; Thu, 7 Jan 2021 06:55:25 -0800 (PST)
Received: from stereo.hq.phicoh.net (localhost [::ffff:127.0.0.1]) by stereo.hq.phicoh.net with esmtp (TLS version=TLSv1.2 cipher=ECDHE-RSA-CHACHA20-POLY1305) (Smail #157) id m1kxWh9-0000ImC; Thu, 7 Jan 2021 15:55:23 +0100
Message-Id: <m1kxWh9-0000ImC@stereo.hq.phicoh.net>
To: ipv6@ietf.org
Cc: Ted Lemon <mellon@fugue.com>, IPv6 Operations <v6ops@ietf.org>
Subject: Re: [v6ops] Scope of Unique Local IPv6 Unicast Addresses (Fwd: New Version Notification for draft-gont-6man-ipv6-ula-scope-00.txt)
From: Philip Homburg <pch-ipv6-ietf-7@u-1.phicoh.com>
Sender: pch-b9D3CB0F5@u-1.phicoh.com
References: <160989494094.6024.7402128068704112703@ietfa.amsl.com> <6fe3a45e-de65-9f88-808d-ea7e2abdcd16@si6networks.com> <m1kx98E-0000EhC@stereo.hq.phicoh.net> <b53b5d62-0334-f791-f56a-f2122767ecdb@si6networks.com> <m1kxAVC-0000KhC@stereo.hq.phicoh.net> <CAHL_VyD85e9=taY1XENf7hc=BXRyD_7JJFDCW2Oq_a0z3hYqUA@mail.gmail.com> <bc29edad-b57b-bb53-141b-8f58c5ca2526@si6networks.com> <91424EEE-EF12-4B5B-ADE4-38230E049290@isc.org> <m1kxTmy-0000KhC@stereo.hq.phicoh.net> <6F3726EE-F089-4F26-BB30-F22686617C03@fugue.com>
In-reply-to: Your message of "Thu, 7 Jan 2021 08:08:05 -0500 ." <6F3726EE-F089-4F26-BB30-F22686617C03@fugue.com>
Date: Thu, 07 Jan 2021 15:55:21 +0100
Archived-At: <https://mailarchive.ietf.org/arch/msg/ipv6/yL2Tn6i0L4zxUe8EgaEggrraAno>
X-BeenThere: ipv6@ietf.org
X-Mailman-Version: 2.1.29
Precedence: list
List-Id: "IPv6 Maintenance Working Group \(6man\)" <ipv6.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/ipv6>, <mailto:ipv6-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/ipv6/>
List-Post: <mailto:ipv6@ietf.org>
List-Help: <mailto:ipv6-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/ipv6>, <mailto:ipv6-request@ietf.org?subject=subscribe>
X-List-Received-Date: Thu, 07 Jan 2021 14:55:29 -0000

>    And for that matter how hard it would be to implement, and what
>    the benefit would be, versus the drawbacks. Most of the time
>    when people do split DNS, it's because they want information
>    behind the firewall to be invisible globally not so much for
>    operational reasons (because they wouldn't work) but because
>    they don't want to reveal the inner workings of the network
>    behind the firewall. So even if this feature Mark's proposing
>    were widely implemented in host resolvers (which it would have
>    to be to be useful), and even if we had the technology to actually
>    populate this sort of information accurately in the DNS, I think
>    most people who operate DNS servers that could in principle
>    advertise non-global addresses this way would choose not to. So
>    yeah, I'd predict not much uptake.

I can see a few benefits of Mark's proposal. One is that it is good to
have a standard representation of information. In particular,
Mark's proposal would make it possible to have a master zone file that has
both public and private DNS entries. Then a split-DNS server could serve
only the public data to the outside world. 

At the same time, I think it would be great if we can put link-local addresses
in DNS. 

There may be more applications, for example in the context of VPNs. 

It may tie in nicely with scope IDs in socket addresses. If a DNS
record specifies that is valid only on a VPN link, then maybe we can already
tie the address to that link. No need to change applications, it can be
hidden in the stub resolver.