[Roll] draft-thubert-6man-ipv6-over-wireless-06.html -- only you can help stamp out low-speed broadcasts

Michael Richardson <mcr+ietf@sandelman.ca> Thu, 01 October 2020 15:39 UTC

Return-Path: <mcr+ietf@sandelman.ca>
X-Original-To: roll@ietfa.amsl.com
Delivered-To: roll@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 5BD563A0AC3; Thu, 1 Oct 2020 08:39:56 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -1.899
X-Spam-Level:
X-Spam-Status: No, score=-1.899 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, SPF_HELO_NONE=0.001, SPF_PASS=-0.001, URIBL_BLOCKED=0.001] autolearn=ham autolearn_force=no
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id QY5TP0SkZbkR; Thu, 1 Oct 2020 08:39:54 -0700 (PDT)
Received: from tuna.sandelman.ca (tuna.sandelman.ca [IPv6:2607:f0b0:f:3:216:3eff:fe7c:d1f3]) (using TLSv1.2 with cipher AECDH-AES256-SHA (256/256 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id 9D6193A0A7E; Thu, 1 Oct 2020 08:39:53 -0700 (PDT)
Received: from localhost (localhost [127.0.0.1]) by tuna.sandelman.ca (Postfix) with ESMTP id 70269389F2; Thu, 1 Oct 2020 11:44:52 -0400 (EDT)
Received: from tuna.sandelman.ca ([127.0.0.1]) by localhost (localhost [127.0.0.1]) (amavisd-new, port 10024) with LMTP id pcz7zyOwSzix; Thu, 1 Oct 2020 11:44:51 -0400 (EDT)
Received: from sandelman.ca (obiwan.sandelman.ca [IPv6:2607:f0b0:f:2::247]) by tuna.sandelman.ca (Postfix) with ESMTP id B8D20389F1; Thu, 1 Oct 2020 11:44:51 -0400 (EDT)
Received: from localhost (localhost [IPv6:::1]) by sandelman.ca (Postfix) with ESMTP id 045DB4CC; Thu, 1 Oct 2020 11:39:51 -0400 (EDT)
From: Michael Richardson <mcr+ietf@sandelman.ca>
To: man <6man@ietf.org>
reply-to: man <6man@ietf.org>
cc: homenet@ietf.org, roll@ietf.org
X-Attribution: mcr
X-Mailer: MH-E 8.6+git; nmh 1.7+dev; GNU Emacs 26.1
X-Face: $\n1pF)h^`}$H>Hk{L"x@)JS7<%Az}5RyS@k9X%29-lHB$Ti.V>2bi.~ehC0; <'$9xN5Ub# z!G,p`nR&p7Fz@^UXIn156S8.~^@MJ*mMsD7=QFeq%AL4m<nPbLgmtKK-5dC@#:k
MIME-Version: 1.0
Content-Type: multipart/signed; boundary="=-=-="; micalg="pgp-sha512"; protocol="application/pgp-signature"
Date: Thu, 01 Oct 2020 11:39:50 -0400
Message-ID: <9501.1601566790@localhost>
Archived-At: <https://mailarchive.ietf.org/arch/msg/roll/C4PoCFT50BgPhyWEqtvqFIyyoo0>
Subject: [Roll] draft-thubert-6man-ipv6-over-wireless-06.html -- only you can help stamp out low-speed broadcasts
X-BeenThere: roll@ietf.org
X-Mailman-Version: 2.1.29
Precedence: list
List-Id: Routing Over Low power and Lossy networks <roll.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/roll>, <mailto:roll-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/roll/>
List-Post: <mailto:roll@ietf.org>
List-Help: <mailto:roll-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/roll>, <mailto:roll-request@ietf.org?subject=subscribe>
X-List-Received-Date: Thu, 01 Oct 2020 15:39:57 -0000

I hope the reply-to: 6man@ietf.org might survive, but I ask you to verify
when you Reply-All that it goes to that list only.

In https://www.ietf.org/id/draft-thubert-6man-ipv6-over-wireless-06.html
Pascal Thubert provides a well written survey explanation of the challenges
of ND across a wide variety of mesh-under network topologies.

Normally, I think of "mesh-under" to be technologies like 802.15.10,
but in reading it realize that the entire pantheon of 802 technologies
after 10base5 [Big Yellow Coax Cable-1] and 10base2 [Small Grey Coax Cable-2],
actually fall into the category of "mesh-under".

35 years of what I like to call "stupid layer-2 tricks".
 ... They all seemed to make sense at the time
          (to paraphase Douglas Adams's Arthur Dent).


Specifically, they were tricks because IPv4 gave us such pathetic subnet
limitations, and broadcast emulation was costing more and more bandwidth.
We have extensive broadcast mitigation techniques in IPv6.
We use of various multicast groups such that, given we had a
[Big-Yellow-Coax-Cable], we can push multicast filters down into hardware and
avoid waking that overworked Sun-2 20Mhz 68020 CPU for stupid things.
The reality today is that none of that matters: the host registers the
multicast groups it cares about with the switch using MLD, we hope the IGMPv6
snooping works
(I have a closet where IPv6 ND is broken, I think because it isn't working,
and I can't get in due to lockdown rules to investigate in person.  IPv6-LL
works, btw...)

What I'm trying to say is that the model we have about the physical network
has been wrong for 25 to 30 years now.  Yet, we continue to design networks
as if that model is correct, and the folks over at IEEE continue to try to
emulate things.  It's a deadly embrace in which neither party has the guts to
point out that whatever clothing the emperor thinks they are wearing are not
in fact the ones we observe.

Now, in homenet we have talked about putting /128s into our visible and
debuggable routing protocol, vs putting (to-be-randomized) /48 L2 addresses
into the invisible L2 "switching" protocol.
The /128 routing was deemed "too complex" by some, who are somehow content to
do exactly the same thing at L2 using hardware implementations that can't be
upgraded... ever.

We have all sorts of mechanisms to deal with discovery across multiple
networks, given that the wired and wifi networks are bridged, yet half the
devices can see both at the same time.

In ROLL, we have the /128s in the routing protocol, and some profiles have
adopted RFC8505, but not all yet.  So, we got halfway there, but yet all the
way.

So, please read Pascal's draft.   It sat open in a tab on my desktop for too long.
It's a very nice and educational survey.

I am not quite sure what the actionable item in it is yet.
I don't know what 6man should do exactly about it.
It's not yet a loud call to action.

The draft hints that using RFC8505 more is a good idea, but I'm not sure it
actually says this.

To my mind, the question is really about deployment.
If Cisco enterprise class APs supported RFC8505 would any wifi client devices
consider supporting it?  Is there a killer application that makes it worth
it?  Maybe in warehouse/logistics situations. I don't know exactly where it
might take off.

Maybe it can be shown that it helps avoiding dropped packets when roaming
among APs within an Enterprise.  Is there some other situation?

Can routing IPv6 /128s that have mapped IPv4 in them keep all the IPv4 ARP
multicast traffic away from the wireless media?


[Big Yellow Coax Cable-1] https://en.wikipedia.org/wiki/Vampire_tap#/media/File:VampireTap.jpg
                          https://en.wikipedia.org/wiki/10BASE5
[Small Grey Coax Cable-2] https://en.wikipedia.org/wiki/10BASE2

--
Michael Richardson <mcr+IETF@sandelman.ca>   . o O ( IPv6 IøT consulting )
           Sandelman Software Works Inc, Ottawa and Worldwide