Re: A common problem with SLAAC in "renumbering" scenarios

Nick Hilliard <nick@foobar.org> Thu, 07 February 2019 09:24 UTC

Return-Path: <nick@foobar.org>
X-Original-To: ipv6@ietfa.amsl.com
Delivered-To: ipv6@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id B41DF131102 for <ipv6@ietfa.amsl.com>; Thu, 7 Feb 2019 01:24:11 -0800 (PST)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -4.2
X-Spam-Level:
X-Spam-Status: No, score=-4.2 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, RCVD_IN_DNSWL_MED=-2.3, SPF_PASS=-0.001, URIBL_BLOCKED=0.001] autolearn=ham autolearn_force=no
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id sEGGifaa-uTe for <ipv6@ietfa.amsl.com>; Thu, 7 Feb 2019 01:24:09 -0800 (PST)
Received: from mail.netability.ie (mail.netability.ie [IPv6:2a03:8900:0:100::5]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-SHA (256/256 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id 370C0131101 for <ipv6@ietf.org>; Thu, 7 Feb 2019 01:24:08 -0800 (PST)
X-Envelope-To: ipv6@ietf.org
Received: from cupcake.local ([194.88.241.232]) (authenticated bits=0) by mail.netability.ie (8.15.2/8.15.2) with ESMTPSA id x179NuCd078198 (version=TLSv1.2 cipher=ECDHE-RSA-AES256-SHA bits=256 verify=NO); Thu, 7 Feb 2019 09:23:58 GMT (envelope-from nick@foobar.org)
X-Authentication-Warning: cheesecake.ibn.ie: Host [194.88.241.232] claimed to be cupcake.local
Subject: Re: A common problem with SLAAC in "renumbering" scenarios
To: Brian E Carpenter <brian.e.carpenter@gmail.com>
Cc: Christian Huitema <huitema@huitema.net>, ipv6@ietf.org
References: <60fabe4b-fd76-4b35-08d3-09adce43dd71@si6networks.com> <m1gptWx-0000G3C@stereo.hq.phicoh.net> <69609C58-7205-4519-B17A-4FBC8AE2EA16@employees.org> <d40b41c3-ff1b-cab4-a8de-16692a78e8fd@go6.si> <D1E45CAD-08D0-43D4-90F7-C4DD44CB32C0@employees.org> <alpine.DEB.2.20.1902041330531.23912@uplift.swm.pp.se> <77ecf321-b46e-4f25-7f68-05b15714a99e@si6networks.com> <CAHL_VyDdHuEAc9UdeiRp9f+c0tdzyoLwPY1rJbZmbWAuq96Uuw@mail.gmail.com> <alpine.DEB.2.20.1902051127510.23912@uplift.swm.pp.se> <m1gqyJC-0000FkC@stereo.hq.phicoh.net> <CAO42Z2wKh-vXmv=dNmr6oEmGnw09ajrr2geYJ=H1DbSYSm=VuQ@mail.gmail.com> <m1gqzYT-0000F5C@stereo.hq.phicoh.net> <e8eabf0f-191a-a293-8051-35268a62a2bd@go6.si> <37ae87fb-93f5-4ec4-6e55-e35ce308f91c@asgard.org> <2aa19534-4856-f01d-8184-6c7ed125ca1b@go6.si> <9cdf8405-e777-6769-4d4f-f123c13a9456@asgard.org> <f4eaaf13-aff3-439f-4426-d32d3722abfe@huitema.net> <d714d577-74f8-6f1a-76a7-94811b615078@foobar.org> <81ab4307-efb8-c04e-7acb-a6f7f0ec839f@gmail.com>
From: Nick Hilliard <nick@foobar.org>
Message-ID: <e96be5dc-a1e9-a418-c77d-bbb3c6f10fa0@foobar.org>
Date: Thu, 07 Feb 2019 09:23:54 +0000
User-Agent: Mozilla/5.0 (Macintosh; Intel Mac OS X 10.14; rv:52.0) Gecko/20100101 PostboxApp/6.1.9
MIME-Version: 1.0
In-Reply-To: <81ab4307-efb8-c04e-7acb-a6f7f0ec839f@gmail.com>
Content-Type: text/plain; charset="utf-8"; format="flowed"
Content-Language: en-GB
Content-Transfer-Encoding: 7bit
Archived-At: <https://mailarchive.ietf.org/arch/msg/ipv6/zI8CrhnYQ6ddkCpEMwLTNgRRasU>
X-BeenThere: ipv6@ietf.org
X-Mailman-Version: 2.1.29
Precedence: list
List-Id: "IPv6 Maintenance Working Group \(6man\)" <ipv6.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/ipv6>, <mailto:ipv6-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/ipv6/>
List-Post: <mailto:ipv6@ietf.org>
List-Help: <mailto:ipv6-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/ipv6>, <mailto:ipv6-request@ietf.org?subject=subscribe>
X-List-Received-Date: Thu, 07 Feb 2019 09:24:12 -0000

Brian E Carpenter wrote on 06/02/2019 19:31:
> On 2019-02-06 23:15, Nick Hilliard wrote:
> In the general case we can't "ensure" that. Firstly it may be against
> business policy or privacy policy for some ISPs. Secondly even if it
> was the intended policy, there can always be failure scenarios. Thirdly,
> a host might be disconnected from one LAN and reconnected to another
> one without knowing it. So even if this is the recommended practice,
> no host can rely on it.

It's not ensuring that the customer gets the same lease all the time; 
it's ensuring that if a customer is disconnected where their previous 
lease is still active, and then they reconnect within the lifetime of 
that lease, that they can still use that lease for as long as it's active.

In other words - as some other people put it - it's about ensuring that 
ISP leases are honoured even if a customer disconnects and reconnects.

This is probably the least difficult option but requires a level of 
centralised provisioning, so will mean some push-back from service 
providers.  This option also has the smallest footprint.

>> 2) the intermediate device remembers the old lease, compares it with the
>> new lease and if they're different, invalidates the old prefix by
>> issuing an updated PIO,
> 
> Again, we can't rely in this, due to legacy equipment and the possibility
> of failures or reconnections.

I don't necessarily see why we can't rely on this to work in most cases.

>> 3) pushing the smarts down to the host layer and detecting / monitoring
>> whether any particular prefix is still valid
> 
> https://tools.ietf.org/html/rfc6059 ?
> 
> In any case, because neither of the preceding options is guaranteed,
> I think there is no choice: hosts must be able to recover from
> dead addresses.

This is potentially the boil-the-ocean option.  It's hard not to think: 
"perfect is the enemy of good enough".

Nick