Re: [mif] draft-ietf-mif-dhcpv6-route-option-04 published

Alexandru Petrescu <alexandru.petrescu@gmail.com> Tue, 27 March 2012 11:47 UTC

Return-Path: <alexandru.petrescu@gmail.com>
X-Original-To: mif@ietfa.amsl.com
Delivered-To: mif@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id F40DA21E81A3 for <mif@ietfa.amsl.com>; Tue, 27 Mar 2012 04:47:38 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -3.599
X-Spam-Level:
X-Spam-Status: No, score=-3.599 tagged_above=-999 required=5 tests=[BAYES_00=-2.599, RCVD_IN_DNSWL_LOW=-1]
Received: from mail.ietf.org ([12.22.58.30]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id Yk4vjkl+G3KE for <mif@ietfa.amsl.com>; Tue, 27 Mar 2012 04:47:38 -0700 (PDT)
Received: from mail-wi0-f172.google.com (mail-wi0-f172.google.com [209.85.212.172]) by ietfa.amsl.com (Postfix) with ESMTP id 66C6621E81A4 for <mif@ietf.org>; Tue, 27 Mar 2012 04:47:37 -0700 (PDT)
Received: by wibhj6 with SMTP id hj6so4299446wib.13 for <mif@ietf.org>; Tue, 27 Mar 2012 04:47:36 -0700 (PDT)
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=gmail.com; s=20120113; h=message-id:date:from:user-agent:mime-version:to:cc:subject :references:in-reply-to:content-type:content-transfer-encoding; bh=D4umMIzWzEv6i25ZlpDo2+MKcc+iDZ9g1utHPNQKoYk=; b=HXlzCkJqnRsCbbBK+IlqlFP+r/MAiGTIJxYPHJ7/3tBmCWhFo1VhxfWWS/CGSiqKmB DLF8eTtr2hOygX8eaKhRQDZyoLHgDB+9yxH6sOZf8jdflTqCGBiLWtgjn9ml3JNlHzpl caXoqWbBGjwQJKLP12AI5CcQSCJfCnft13E0w9epvXItPA6Sis5T7Ay1OyGY/ziPaT4O Tr5t+k5r3GHVCfeEWZfnoay+vml13Y+mR+/BvyNLfjNM6rt9fJkw0L7fJE/YcyBt1ixF UxL3wBJYRT6jE4aknUjxq40nKGZ1UcEnzR0jiqpl3zkwKvHfNqRhWsyODydeTl4kc8MK eLLw==
Received: by 10.180.103.35 with SMTP id ft3mr26761770wib.0.1332848856595; Tue, 27 Mar 2012 04:47:36 -0700 (PDT)
Received: from [130.129.22.135] (dhcp-1687.meeting.ietf.org. [130.129.22.135]) by mx.google.com with ESMTPS id l5sm48862531wia.11.2012.03.27.04.47.35 (version=TLSv1/SSLv3 cipher=OTHER); Tue, 27 Mar 2012 04:47:36 -0700 (PDT)
Message-ID: <4F71A8D1.6000807@gmail.com>
Date: Tue, 27 Mar 2012 13:47:29 +0200
From: Alexandru Petrescu <alexandru.petrescu@gmail.com>
User-Agent: Mozilla/5.0 (Windows NT 6.1; rv:11.0) Gecko/20120312 Thunderbird/11.0
MIME-Version: 1.0
To: Erik Kline <ek@google.com>
References: <20120224101611.22703.52041.idtracker@ietfa.amsl.com> <4F47688B.10508@gmail.com> <4F5E2F61.9040009@gmail.com> <CAAedzxqSPqPp1f34Z1Fm1h87mOB0aESfivZQMZmYAh7DNLv1ZQ@mail.gmail.com>
In-Reply-To: <CAAedzxqSPqPp1f34Z1Fm1h87mOB0aESfivZQMZmYAh7DNLv1ZQ@mail.gmail.com>
Content-Type: text/plain; charset="UTF-8"; format="flowed"
Content-Transfer-Encoding: 8bit
Cc: mif@ietf.org
Subject: Re: [mif] draft-ietf-mif-dhcpv6-route-option-04 published
X-BeenThere: mif@ietf.org
X-Mailman-Version: 2.1.12
Precedence: list
List-Id: Multiple Interface Discussion List <mif.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/mif>, <mailto:mif-request@ietf.org?subject=unsubscribe>
List-Archive: <http://www.ietf.org/mail-archive/web/mif>
List-Post: <mailto:mif@ietf.org>
List-Help: <mailto:mif-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/mif>, <mailto:mif-request@ietf.org?subject=subscribe>
X-List-Received-Date: Tue, 27 Mar 2012 11:47:39 -0000

Le 25/03/2012 20:31, Erik Kline a écrit :
>>> Motivation and uses cases are now significant part of this draft
>>>  itself. If the group believes that it would be cleaner, it may
>>> be split into separate draft. But please, don't use this
>>> possibility as a way to delay this work. There are many networks
>>> that want this option deployed asap.
>
> With respect to motivations...I think we need to weed out all the
> specious ones first, to what's really left and worthy of interest.
> IMHO, most, if not all, are specious.  (And I suspect that Suresh's
> Line-ID may be useful to address whatever else is left.)
>
> [3.1-1]
>
> "and the Service Provide would like to avoid routing on the CPE,
> there is a need to provision static route entries on RGs/CPEs"
>
> I read this as "we don't want to do routing so here's how we're going
> to do routing".  If it's dynamic versus static, then saying that
> might be more clear.
>
> [3.1-2]
>
> Is there an external source for this claim?  It is not at all the
> case for the two large IPv6 deployments with which I've been directly
> involved. Furthermore, the current deployments to O(millions) of
> existing IPv6 users make it seem like this isn't actually an issue.
>
> [3.1-4]
>
> Perhaps this has been discussed elsewhere, and I'm out of my depth,
> but I thought DHCPv6 wasn't really spec'd until R10, and even then
> only DHCPv6-PD.
>
> It looks to me like the 3GPP link goes to a draft for R11.
> Additionally, this 3GPP draft seems to reference this MIF draft. This
> makes it look like the references are circular (you can't cite IDs),
> which is a bad justification.
>
> [3.1-6]
>
> The thing about these walled-garden arguments is that they seem to
> imply that deployments don't want to give a route to a walled-garden
>  network to non-customers.  But surely the existence of a route is
> not alone sufficient for valid access?
>
> IOW, is there harm if a non-customer has a route a walled-garden
> network of which they are not a customer?  Unless the walled-garden
> is advertising a default route, I wonder what the real harm is.

Allow me to take advantage of this conversation to mention that this
brings up another issue.

When setting up routes one would like to make sure they're right and
they lead somewhere at least most of the time.  At the smart end node
and dumb network, there should always exist a fallback and that fallback
is typically the default route ("when everything else fails").

In this sense, if the end node sets up its routes with DHCP, it would
like to be sure they're right most of the time, otherwise use the
default route.

But when the default route _and_ the other more specific routes are
provided by DHCP, and if failing, then there is a risk of misconfiguration.

Something that could be done about this is the use of different Types in
DHCP (ORO) for specific routes and a different Type for default routes.
  This would mean not only that the config file owuld have different
sections for default routes vs specific routes (thus guide  the Server's
administrator to double check the default part) but also the DHCP Client
implementation to have separate software sections for specific routes vs
default routes.  Some lighter DHCP Clients may choose to implement
_only_ the default route option part (and not the specific route part).

With respect to this there was also a question about compliance with
specs - if a stack doesn implement eg ICMP Redirect then it's not
compliant.  Do we want to ensure the same level of strength in
compliance with DHCP?   Even for low end devices?

Alex

>
> But a potentially more important consideration is why walled garden
> arguments appear anywhere within a Motivation section.  Quoting from
>  the IAB in 2000, section 4.2.1 of RFC3002
> (http://tools.ietf.org/html/rfc3002#section-4.2):
>
> """ It was strongly recommended that independent of the ubiquity of
> the "walled garden" deployment scenario that protocols and
> architectural decisions should not target this model.  To continue
> the success of Internet protocols at operating across a highly
> diverse and heterogeneous environment the IETF must continue to
> foster the adoption of an "open model".  IETF protocol design must
> address seamless, secure, and scalable access. """
>
> In the spirit of the above, I would like to see all discussion
> pertaining to walled gardens unequivocally removed. This removes at
> least use cases 1, 6, and 8.
>
> [3.1-7]
>
> Do you have any metrics on the support situation WRT 4191?  Both
> DHCPv6 and RIOs are SHOULDs in the IPv6 Node Requirements RFC (6434),
> and both are pretty old by now (from 2005?).
>
> [3.1-10]
>
> s/home network with/home networks/, I think
>
> I think the "solve the rogue RA problem" is not a valid argument.
> You're just trading a rogue RA problem for a rogue DHCPv6 server
> problem.  You can claim some security association with the DHCPv6
> server, but you can equally claim some security association with the
>  router(s) (e.g., SEND).
>
> Also, I think this is specious:
>
> "forced to run two protocols increasing complexity and
> troubleshooting, where we have proof of concept in IPv4 that only one
> protocol (DHCP) should be needed."
>
> In networks where you want run reliable IPv4, you still need 2
> protocols: DHCPv4 and VRRP.  Just because they're operated by two
> different groups doesn't mean you don't need them both.
>
> [3.1-11]
>
> If this is a use case that is not "investigated further" then I would
> question why it's needed at all in what is fundamentally a
> "Motivation" discussion.  It also seems circular to propose as a
> motivation that the option be used to break a tie when the option is
>  coexisting with RAs.
>
> [3.1-12]
>
> I'm not sure that a "different failure mode" is much of a
> motivation.
>
> I would take exception with a claim like a "rogue DHCP server will
> cause no immediate harm".  If someone gives me different DNS servers
>  they can still hijack all my traffic.  Only in this case I think
> it's even worse: I am aware of no provision in DHCP for the real
> server to send out messages that can nullify the bad information.
> Once a host is misconfigured that's pretty much it until the lease
> lifetime is up or a network change event happens.
>
> [3.1-concluding paragraphs]
>
> I disagree with the assertion "It is better to have a generic option
>  then [sic] a bunch of competing vendor options".  *IF* the decision
> of the IETF is that this constitutes a "You're Doing It Wrong (TM)"
> situation, then NO, a standardized option is not better; it would in
>  fact send the opposite message.  Also, like Microsoft's RADIUS
> extension for DNS servers, I don't think you would see multiple
> competing definitionsーthe first to publish would become the de facto
>  standard.
>
> Fundamentally, I think the core issue to be decided is whether there
>  should be a standardized way for hosts on the same network to learn
>  different routes from their neighbors.  I would think this
> constitutes a fundamental architectural change, and therefore ought
> to be considered in 6man (regardless of history and charters).
>