Re: [IPv6] SADR for MHMP is useless yet

Ole Troan <otroan@employees.org> Mon, 21 November 2022 15:17 UTC

Return-Path: <otroan@employees.org>
X-Original-To: ipv6@ietfa.amsl.com
Delivered-To: ipv6@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 1E877C0717B9 for <ipv6@ietfa.amsl.com>; Mon, 21 Nov 2022 07:17:11 -0800 (PST)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -1.203
X-Spam-Level:
X-Spam-Status: No, score=-1.203 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, DKIM_SIGNED=0.1, DKIM_VALID=-0.1, DKIM_VALID_AU=-0.1, DKIM_VALID_EF=-0.1, HTML_MESSAGE=0.001, MIME_HTML_ONLY=0.1, MIME_HTML_ONLY_MULTI=0.001, MIME_QP_LONG_LINE=0.001, MPART_ALT_DIFF=0.79, RCVD_IN_DNSWL_BLOCKED=0.001, RCVD_IN_ZEN_BLOCKED_OPENDNS=0.001, SPF_PASS=-0.001, URIBL_BLOCKED=0.001, URIBL_DBL_BLOCKED_OPENDNS=0.001, URIBL_ZEN_BLOCKED_OPENDNS=0.001] autolearn=no autolearn_force=no
Authentication-Results: ietfa.amsl.com (amavisd-new); dkim=pass (2048-bit key) header.d=employees.org
Received: from mail.ietf.org ([50.223.129.194]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id TXXYP3T-HLNF for <ipv6@ietfa.amsl.com>; Mon, 21 Nov 2022 07:17:05 -0800 (PST)
Received: from vesa01.kjsl.com (vesa01.kjsl.com [IPv6:2607:7c80:54:6::11]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id D007FC071497 for <6man@ietf.org>; Mon, 21 Nov 2022 07:17:05 -0800 (PST)
DKIM-Signature: v=1; a=rsa-sha256; c=simple/simple; d=employees.org; i=@employees.org; q=dns/txt; s=vesa202009; t=1669043826; x=1700579826; h=content-transfer-encoding:from:mime-version:subject:date: message-id:references:cc:in-reply-to:to; bh=yrIP94ZFwIqPBamFq5oZ21omRrTWIXPSzm2svRXKXjg=; b=XFqg2Dh6BlLdgi2QIoYUjVu5tr62R/Pu2e7NneRVQR0OONgBUMS5lIfJ Q6+vMURi/DaQhBr2QcO7QPPFUwag50hVcDRIdG6Ma9BowT0GczOhAw1T3 GaXhL08SBpPm/mBgyCCe+M8BftH6SPJGqtQlOagMxKGjPWumQ6TWpFNuT EkLegy0Yo7f1UJDyTt4RnCxcurGwIwubIJqxlTg7nyctRBxPg8tQ8SrnX At6Y1aQvbztETQZcSPerrG8hnR+Gam/FXK3+UJn1CJuv2mSL+Ld18AsXP seztLxPf2Ux7KOAW9IdDtTdbgBNfHR4AMEamZ+aprlX3SjGvl3f+bxPHT Q==;
Received: from clarinet.employees.org ([IPv6:2607:7c80:54:3::74]) by vesa01.kjsl.com with ESMTP; 21 Nov 2022 15:17:04 +0000
Received: from smtpclient.apple (ti0389q160-5811.bb.online.no [95.34.2.246]) (using TLSv1.3 with cipher TLS_AES_128_GCM_SHA256 (128/128 bits) key-exchange X25519 server-signature RSA-PSS (2048 bits) server-digest SHA256) (No client certificate requested) by clarinet.employees.org (Postfix) with ESMTPSA id 6A1474E11B0F; Mon, 21 Nov 2022 15:17:03 +0000 (UTC)
Content-Type: multipart/alternative; boundary="Apple-Mail-D4577CD5-E0BC-45AA-B815-78D1232ACE13"
Content-Transfer-Encoding: 7bit
From: Ole Troan <otroan@employees.org>
Mime-Version: 1.0 (1.0)
Date: Mon, 21 Nov 2022 16:16:51 +0100
Message-Id: <B39A4ACE-776F-49ED-AEC2-601197136051@employees.org>
References: <d68d2a015e274602bff34a4dc9dbaf2b@huawei.com>
Cc: 6man@ietf.org
In-Reply-To: <d68d2a015e274602bff34a4dc9dbaf2b@huawei.com>
To: Vasilenko Eduard <vasilenko.eduard@huawei.com>
X-Mailer: iPhone Mail (20B101)
Archived-At: <https://mailarchive.ietf.org/arch/msg/ipv6/z75dfWDRcOFuoXqimRLl59MkRtY>
Subject: Re: [IPv6] SADR for MHMP is useless yet
X-BeenThere: ipv6@ietf.org
X-Mailman-Version: 2.1.39
Precedence: list
List-Id: "IPv6 Maintenance Working Group \(6man\)" <ipv6.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/ipv6>, <mailto:ipv6-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/ipv6/>
List-Post: <mailto:ipv6@ietf.org>
List-Help: <mailto:ipv6-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/ipv6>, <mailto:ipv6-request@ietf.org?subject=subscribe>
X-List-Received-Date: Mon, 21 Nov 2022 15:17:11 -0000

Eduard,

Two border routers and a stub router is the scenario presented in snac and that triggered the discussion about updating rfc7084. 

Up to you if you “believe” in the use case or not of course. But that’s a use case that would require SADR.
(Personally I think it’s highly unlikely that we will get MPMH to work.)

O. 

On 21 Nov 2022, at 15:58, Vasilenko Eduard <vasilenko.eduard@huawei.com> wrote:



Hi Ole,

 

Let’s define “the simple topology”. It means that any host sees both MHMP routers on one link.

SADR would not apply here. The host should properly choose “the default router” at ND.

 

Let’s define “the more complex topology” that has 2 routers in a short chain: 1st router is connected directly to Carrier, 2nd the router is connected to 1st router (and host after this).

For this topology to start working with PA addresses should be some protocol on routers to split and re-distribute prefixes received from FBB Carrier. It does not exist yet (HNCP is not adopted). Hence, the second router does not have PA addresses. Hence, no need for SADR yet.

 

In general, PA prefixes need to be automatically propagated deeper (at least one additional hop) in the site for SADR to become needed.

SADR should follow HNCP, not vice versa. No HNCP -> no SADR, it is simple.

Hence, https://www.rfc-editor.org/rfc/rfc7084" rel="nofollow"> RFC 8678 is completely useless yet. We could not have a situation.

Of course, the lab can appoint PA prefixes manually to test that https://www.rfc-editor.org/rfc/rfc7084" rel="nofollow">RFC 8678 is right.

It is not relevant for any production network yet.

 

Additionally, It is possible to mention that Mobile carrier is not capable to deliver prefix in general.
DHCP is blocked at the modem level on all smartphones.

For the mobile environment, the problem is double protected.

 

Hence, no need yet for the SADR. It is a far future, if ever.

 

Eduard

From: Ole Troan [mailto:otroan@employees.org]
Sent: Monday, November 21, 2022 4:57 PM
To: Vasilenko Eduard <vasilenko.eduard@huawei.com>
Cc: 6man@ietf.org
Subject: Re: SADR for MHMP is useless yet

 

Eduard,

 

What was discussed here was a topology with two independent border routers and a stub router attached to them, with a stub link southbound. 

 

The stub router has to, as far as I can tell, do SADR.

(Or other similar policy approaches to routing)

 

Do you see it differently?

 

O. 



On 21 Nov 2022, at 14:32, Vasilenko Eduard <vasilenko.eduard@huawei.com> wrote:



Hi Ole,

 

SADR is not important yet. Maybe in the far future (5+) it would become important.

It is useless for the PA case yet because it is not possible to come to this situation.

How PA prefix would be split and distributed between many routers and links on the complex site?

(something like HNCP or DHCP-PD). Automation here is mandatory, PA could be dynamic.

The need for SADR would happen only after this.

 

SADR is not needed in principle for other use cases: PI, NAT+ULA, NPT+ULA. Normal destanation-based routing is enough.

 

Eduard

 

Ole Troan <otroan@employees.org> Fri, 18 November 2022 14:52 UTC

Ted,

 

There are a few reasons why MHMP have failed. 

 

1) it requires SADR routing in the intermediate routers. SNAC routers in young case

2) It leaves the choice of egress path to the hosts. Expecting every host/application to be smart enough to handle that correctly especially given the hosts on a SNAC link sounds optimistic. 

3) Hosts selecting exit is often at odds with network policy.

 

PVDs doesn’t seem to be particularly important to the problem, but I don’t mind if you think it is.

Great if you can make MHMP happen.

It might be a distraction for this group and not necessarily something that can be limited to v6ops. 

 

Anyway, I think this is something for the chairs/ADs. 

O.