Re: [Snac] Review of draft-hui-stub-router-ra-flag-02

Esko Dijk <esko.dijk@iotconsultancy.nl> Tue, 19 March 2024 16:14 UTC

Return-Path: <esko.dijk@iotconsultancy.nl>
X-Original-To: snac@ietfa.amsl.com
Delivered-To: snac@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id DA0D1C14F704 for <snac@ietfa.amsl.com>; Tue, 19 Mar 2024 09:14:31 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -2.107
X-Spam-Level:
X-Spam-Status: No, score=-2.107 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, DKIM_SIGNED=0.1, DKIM_VALID=-0.1, DKIM_VALID_AU=-0.1, DKIM_VALID_EF=-0.1, HTML_MESSAGE=0.001, RCVD_IN_MSPIKE_H2=-0.001, RCVD_IN_ZEN_BLOCKED_OPENDNS=0.001, SPF_PASS=-0.001, T_SCC_BODY_TEXT_LINE=-0.01, URIBL_BLOCKED=0.001, URIBL_DBL_BLOCKED_OPENDNS=0.001, URIBL_ZEN_BLOCKED_OPENDNS=0.001] autolearn=ham autolearn_force=no
Authentication-Results: ietfa.amsl.com (amavisd-new); dkim=pass (1024-bit key) header.d=iotconsultancy.nl
Received: from mail.ietf.org ([50.223.129.194]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id HVJTgG1SdHHm for <snac@ietfa.amsl.com>; Tue, 19 Mar 2024 09:14:27 -0700 (PDT)
Received: from EUR04-DB3-obe.outbound.protection.outlook.com (mail-db3eur04on2105.outbound.protection.outlook.com [40.107.6.105]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id AEDABC151080 for <snac@ietf.org>; Tue, 19 Mar 2024 09:14:26 -0700 (PDT)
ARC-Seal: i=1; a=rsa-sha256; s=arcselector9901; d=microsoft.com; cv=none; b=hR29Zqo6yBo22OIWv1y+o4Eu2AlDys1EAPep2KNq9Yt965pv16Paslv3+dfkNJFH4JJrLWnIstxlTV+qelO1lixOqrjVSDmZ/JWQV1ZYubz0iZoNjocQD6ci+R+bcwfMt+lWW8JZXdJ2iYZJni0WzOv5hv3dFihnJ1vH8wb6ty8RSj/HKpQBXiOAbZiZW8xSHOTsACvUGe0Ud7xim+Ew16K9LjT3/ktvXWUsCX84ttgv9YBmpHauVRSzhqfOyRXaeovQkm1K6Lv5SkSBoos3pMViz3hZHIOxhJ69kV8/7EmL/kP1OySl66hM+ggsg6e8Xsxwa8QkIdN4OLPk8XSyFA==
ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=microsoft.com; s=arcselector9901; h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-AntiSpam-MessageData-ChunkCount:X-MS-Exchange-AntiSpam-MessageData-0:X-MS-Exchange-AntiSpam-MessageData-1; bh=20pI/DG5eC0y3hsbWc3D7OK0aRMtKkk+RyvHsqjfrMM=; b=Ytnu37Eoa8FzlhqtY/HBHmTBtZHuHhaf7Nrd68m9QXv3UnIh6XPdsc2TR5xhYt/6JOOgWNS63jT6Pi4NSY0FFvEvomXQv+SerHknIY03kUKyFBFKa6GspAlqLbPIyICU4LiYIYYmRLQeVrDnEvt+7PbePerxcWbrJZuIY0Uk8YONJC5SHUnMC4i7PK0gLsIjVfCZGeJvIunY48CvwzGDIEGlhhnaPYiiDtKhx+OXY/F1bNt5JlPoAVnoqiCFxZ/YJYgXZ8uMV52L+fLdISoU/RlUzyvsO11AzDOPcgRdVra39OjZK6xXV+xqQI3d75UndsS0GSAe7EXGklxngK9HEA==
ARC-Authentication-Results: i=1; mx.microsoft.com 1; spf=pass smtp.mailfrom=iotconsultancy.nl; dmarc=pass action=none header.from=iotconsultancy.nl; dkim=pass header.d=iotconsultancy.nl; arc=none
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=iotconsultancy.nl; s=selector1; h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-SenderADCheck; bh=20pI/DG5eC0y3hsbWc3D7OK0aRMtKkk+RyvHsqjfrMM=; b=HjC7+69iVy4qBVTcy5AZyzmBxwt8JPLN0bnd6KT777Ez0RkKNLnX5cMsqpODw0O30IEun/VPC/TXWd3tJOYF2coZ+jGp3mhelOMEg7WQ4mVDMw+BXdQyq5zQLWM95kEDmBzDg7PGOK8hpIOspKnaRgrY8SJwKb47fUSqgeAKWz0=
Received: from DU0P190MB1978.EURP190.PROD.OUTLOOK.COM (2603:10a6:10:3b9::20) by DB8P190MB0684.EURP190.PROD.OUTLOOK.COM (2603:10a6:10:12f::14) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id 15.20.7386.28; Tue, 19 Mar 2024 16:14:23 +0000
Received: from DU0P190MB1978.EURP190.PROD.OUTLOOK.COM ([fe80::2058:88ab:2f5a:8c02]) by DU0P190MB1978.EURP190.PROD.OUTLOOK.COM ([fe80::2058:88ab:2f5a:8c02%7]) with mapi id 15.20.7386.025; Tue, 19 Mar 2024 16:14:23 +0000
From: Esko Dijk <esko.dijk@iotconsultancy.nl>
To: Ted Lemon <mellon@fugue.com>
CC: "snac@ietf.org" <snac@ietf.org>, Jonathan Hui <jonhui@google.com>
Thread-Topic: [Snac] Review of draft-hui-stub-router-ra-flag-02
Thread-Index: Adpu297/C0GwL06LQnaC41jTnQKg7wKEP9oAAAxWT0AAHdXiAAAb7t1w
Date: Tue, 19 Mar 2024 16:14:23 +0000
Message-ID: <DU0P190MB1978CA8EF722E345C7248DDFFD2C2@DU0P190MB1978.EURP190.PROD.OUTLOOK.COM>
References: <DU0P190MB1978D43765330931DCAF197FFD222@DU0P190MB1978.EURP190.PROD.OUTLOOK.COM> <CAPt1N1mUDGa6ueTQtDw7Np8ONoup-nxBjBzD-w_XiccE6OVqPw@mail.gmail.com> <DU0P190MB1978AECBC56E3D789297E066FD2D2@DU0P190MB1978.EURP190.PROD.OUTLOOK.COM> <CAPt1N1ng5YthXSs3idWj4344BPC=W2aLcs_1iVZz8qN=1tkjsw@mail.gmail.com>
In-Reply-To: <CAPt1N1ng5YthXSs3idWj4344BPC=W2aLcs_1iVZz8qN=1tkjsw@mail.gmail.com>
Accept-Language: en-US
Content-Language: en-US
X-MS-Has-Attach:
X-MS-TNEF-Correlator:
authentication-results: dkim=none (message not signed) header.d=none;dmarc=none action=none header.from=iotconsultancy.nl;
x-ms-publictraffictype: Email
x-ms-traffictypediagnostic: DU0P190MB1978:EE_|DB8P190MB0684:EE_
x-ms-office365-filtering-correlation-id: 71314ead-3884-4db6-e932-08dc482fa40b
x-ms-exchange-senderadcheck: 1
x-ms-exchange-antispam-relay: 0
x-microsoft-antispam: BCL:0;
x-microsoft-antispam-message-info: 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
x-forefront-antispam-report: CIP:255.255.255.255; CTRY:; LANG:en; SCL:1; SRV:; IPV:NLI; SFV:NSPM; H:DU0P190MB1978.EURP190.PROD.OUTLOOK.COM; PTR:; CAT:NONE; SFS:(13230031)(366007)(1800799015)(376005)(38070700009); DIR:OUT; SFP:1102;
x-ms-exchange-antispam-messagedata-chunkcount: 1
x-ms-exchange-antispam-messagedata-0: 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
Content-Type: multipart/alternative; boundary="_000_DU0P190MB1978CA8EF722E345C7248DDFFD2C2DU0P190MB1978EURP_"
MIME-Version: 1.0
X-OriginatorOrg: iotconsultancy.nl
X-MS-Exchange-CrossTenant-AuthAs: Internal
X-MS-Exchange-CrossTenant-AuthSource: DU0P190MB1978.EURP190.PROD.OUTLOOK.COM
X-MS-Exchange-CrossTenant-Network-Message-Id: 71314ead-3884-4db6-e932-08dc482fa40b
X-MS-Exchange-CrossTenant-originalarrivaltime: 19 Mar 2024 16:14:23.2620 (UTC)
X-MS-Exchange-CrossTenant-fromentityheader: Hosted
X-MS-Exchange-CrossTenant-id: 58bbf628-15d2-46bc-820b-863b6774d44b
X-MS-Exchange-CrossTenant-mailboxtype: HOSTED
X-MS-Exchange-CrossTenant-userprincipalname: 6OsqLcqZCfRd2V1uPeynIiCE8MqzWqvsD+78WmCcbC7XCc+jK4izs9uBVPIp8+11NHsby1QXIjLzFn+Ja28GSymGf9ZxVEJQNq9923brDTE=
X-MS-Exchange-Transport-CrossTenantHeadersStamped: DB8P190MB0684
Archived-At: <https://mailarchive.ietf.org/arch/msg/snac/TrBCijJ5sH5W9AXeYS_RuaBl7zw>
Subject: Re: [Snac] Review of draft-hui-stub-router-ra-flag-02
X-BeenThere: snac@ietf.org
X-Mailman-Version: 2.1.39
Precedence: list
List-Id: "Mailing list for discussing problems relating to the automatic connection of stub networks to existing infrastructure networks. " <snac.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/snac>, <mailto:snac-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/snac/>
List-Post: <mailto:snac@ietf.org>
List-Help: <mailto:snac-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/snac>, <mailto:snac-request@ietf.org?subject=subscribe>
X-List-Received-Date: Tue, 19 Mar 2024 16:14:31 -0000

> You raise a good point about the term "stub router," unfortunately. I've proposed some alternatives in today's presentation in SNAC/DNSSD.

It looks like the names did not end up in the slides – I would be interested to see the list of names.
One variant is “sub router” as you mentioned. Or, add a letter and we get “stubb router”, or “stup router” :)

> To my knowledge there are no 6lowpan border routers that do actual routing—they all use Proxy ND. Do you know of any?

There is an open-source 6LBR with RPL routing, where different modes can be selected, including a “Router mode” – this mode doesn’t use ND proxy. See https://github.com/cetic/6lbr/wiki/6LBR-Modes
As for actual products, commonly deployed 6LBRs are Wi-SUN standard border routers (for smart energy/smart city markets) and Thread Border Routers.  For Wi-SUN 6LBRs that include a cellular backhaul and integrate a DHCPv6 server typically, I’m not sure if having ND Proxy would be useful actually – there’s no AIL in that case, only a cellular uplink to the cloud/internet. But I haven’t used any such product so you could be right here.

Esko

From: Ted Lemon <mellon@fugue.com>
Sent: Tuesday, March 19, 2024 01:37
To: Esko Dijk <esko.dijk@iotconsultancy.nl>
Cc: snac@ietf.org; Jonathan Hui <jonhui@google.com>
Subject: Re: [Snac] Review of draft-hui-stub-router-ra-flag-02

You raise a good point about the term "stub router," unfortunately. I've proposed some alternatives in today's presentation in SNAC/DNSSD.

And you are right, I meant "proxy ND," not "proxy ARP." To my knowledge there are no 6lowpan border routers that do actual routing—they all use Proxy ND. Do you know of any?

On Mon, Mar 18, 2024 at 9:00 PM Esko Dijk <esko.dijk@iotconsultancy.nl<mailto:esko.dijk@iotconsultancy.nl>> wrote:
Agree it would be nice if we can just use “stub router” as a term for the unmanaged plug-and-play router that we’re defining in SNAC-simple.
But, I do see potential confusion there because “stub router” is an existing term: just do an internet search on the term or ask the AIs.  In particular there are flavors like “OSPF stub router” and “EIGRP stub router” commonly used. And there’s the existing use of “stub network” (e.g. see Wikipedia article).

Then we might need to say “SNAC stub router”, or “auto-stub router” or so, to be distinguishing enough.
In any case, whatever term it will be, defining that properly as unmanaged/autoconfigured will solve most of the issues raised.

> I think a 6lowpan BR is not a stub router and doesn't send RAs--it uses proxy ARP.
Actually the 6LBR can be made in multiple ways, while the basic IETF definition was in RFC 6775, it was already in literature since 2009 I believe in the book “6Lowpan - The Wireless Embedded Internet”. When the term was coined it was quite generic (see the definition in the RFC 6775 terminology list): a router interfacing between a 6LoWPAN network and some other network (which may be Ethernet, Wi-Fi, 6LoWPAN, or other). The 6LBR provides the IPv6 prefix for the 6LoWPAN network and routes packets to/from that network.  In this interpretation, a Thread Border Router is by definition a 6LBR because Thread uses 6LoWPAN.

So there are particular flavors of 6LBR possible, such as a 6LBR for 6TiSCH networks, which is applicable to a very specific interoperable set of devices that use 802.15.4 TSCH and follow the IETF RFCs for these devices. However, there are many more 6LoWPAN based standards in existence and all of these could use the term “6LBR” for their border router if they want. There’s also extensions like the “6BBR” ND proxying operation defined in RFC 8929, which is maybe what you meant with proxy ARP? The 6BBR would not send RAs indeed but acts like a “set of hosts”.

But since 6LBR is not a very common term today, we can just not mention it to avoid this confusion.

For the rest, agree with your new text proposals!

Regards
Esko

From: Ted Lemon <mellon@fugue.com<mailto:mellon@fugue.com>>
Sent: Monday, March 18, 2024 05:30
To: Esko Dijk <esko.dijk@iotconsultancy.nl<mailto:esko.dijk@iotconsultancy.nl>>
Cc: snac@ietf.org<mailto:snac@ietf.org>; Jonathan Hui <jonhui@google.com<mailto:jonhui@google.com>>
Subject: Re: [Snac] Review of draft-hui-stub-router-ra-flag-02

On Tue, Mar 5, 2024 at 7:16 PM Esko Dijk <esko.dijk@iotconsultancy.nl<mailto:esko.dijk@iotconsultancy.nl>> wrote:
Overall, there's a bit of confusion on what the flag expresses. Its name is "stub router flag" but the flag is only set, I believe, for unconfigured/unmanaged stub routers.  As soon as a stub router becomes managed, it is part of "infrastructure routers". Even though it is still is a stub router per the definition - because it provides connectivity to a stub network. I would be okay to keep the name as is, or to rename it to something like "Unmanaged Stub Router Flag", but it needs to be clarified when the flag is set, and when it is cleared (especially for a stub router!). In the list below are some suggestions that go into this direction.

I think that a device that's managed is not a stub router, and so this doesn't apply. The introduction doesn't make this point clear—it suggests that any router connecting a stub network and an infrastructure network is a stub router, but that's not really the case. The idea of a stub network is just that there's no routing through it, and this is a normal operational thing that happens all the time. A home network is ordinarily a stub network for example, although it's not required to be.

So I think the fix for this is to update the introduction to make this distinction clear: a stub router is an unmanaged device that automatically connects a stub network to an infrastructure network.

So I would change this:

A stub router provides IP connectivity between a stub network and an infrastructure network. A common stub router example is a device that attaches a 6LoWPAN-based network to a home network.
to this:
A stub router is an unmanaged router that automatically connects a stub network [draft-ietf-snac-simple] to an infrastructure network.  A common example of a stub router is a router that attaches a 6lowpan network to a home network without requiring explicit configuration by an operator.

And: do we foresee a case where a managed stub router sends out PIO with a managed ULA prefix (so stub router flag=0); but unfortunately the prefix is not "suitable" so the stub router adds its own self-generated ULA PIO prefix in an unmanaged way - so it also wants to set stub-router-flag=1 ?   Probably not? (sounds like the admin either made a mistake or doesn't want the stub-network & AIL communication to be enabled on purpose). My working assumption is that we don't need per-PIO-prefix granularity for advertising "this is a non-managed prefix", for our current use cases.  Still, it can be considered as a solution alternative because it allows future use cases easier. This would use 1 flag bit in the PIO where flag space is more scarce. So it's not super attractive to go change this now but I'd like to know what others think.

I think the document should make clear that in a situation where the infrastructure router connects a stub network to the infrastructure network, and where that infrastructure router is providing IPv6 addressing and (optionally) routing on the infrastructure network, that device is not a stub router and should not be setting the stub router flag in router advertisements.

It's worth noting that there are devices in the field that do both functions independently, and so wind up sending some infrastructure RAs and some stub network RAs. This is technically allowed by RFC4861, but RFC4861 doesn't explain how to do it, and it doesn't really work. So we should probably exclude this use case: a device that behaves in this way simply isn't likely to work, and we shouldn't encourage it.


Abstract
"information sent by stub routers from information sent by infrastructure routers."
--> "information sent by unmanaged stub routers from information sent by infrastructure routers."

We could add the sentence to the abstract, to make it complete and summarize the entire document:
"This flag, if set, indicates that the message is sent by an unmanaged stub router."

There is no such thing as a managed stub router, so no need for this update.

1. Introduction
--> Section should reference the [I-D.ietf-snac-simple] document earlier; and point the reader there for details on the whole described functionality of ULA prefix and tracking infrastructure-provided IPv6 service.

Agree, see above.

"A common stub router example is a device that attaches a 6LoWPAN-based network to a home network."
--> Can mention here the name of such a device: a 6LoWPAN Border Router (6LBR).

I think a 6lowpan BR is not a stub router and doesn't send RAs--it uses proxy ARP. I think it would be cool if that document were updated to advise implementing a stub router instead, but that's out of scope.

"In the second case, the two stub routers could wind up in a cycle of publishing and deprecating their prefixes as they see prefixes from the other stub router show up.
The stub router document [I-D.ietf-snac-simple] explains how two stub routers decide which one has precedence in the event of a conflict."

--> This part is somewhat confusing. Maybe emphasize that we need to distinguish between unconfigured stub routers and all "other" routers here, pointing to snac-simple, instead of focusing on the problem / conflict here.
   The first sentence could be replaced by:
   "The stub router needs a method to distinguish between these two sources."

One way to fix this would be to say:

"In the second case, stub routers need to be able to tell whether an RA is from another stub router or an infrastructure router. Without the stub router RA flag,  two stub routers would not be able to make this distinction. In situations where both stub routers publish their initial RAs relatively simultaneously, this could then result in an endless cycle of deprecations."

"However, the infrastructure prefix always has precedence over a prefix provided by any stub router."
--> "However, a suitable infrastructure-provided prefix always has precedence over a self-generated prefix provided by any stub router."
(Note here that stub routers could be either unconfigured, or configured (managed). The lower precedence is only for the unconfigured ones.)

Not needed, no such thing as a managed stub router.

2. Terminology
--> Include here by reference all the terms of [I-D.ietf-snac-simple]

Sure.

4. Router Advertisement Transmission
--> see my comments on top - to add here the explicit requirement that a stub router that is configured/managed (i.e. part of infrastructure routers) MUST NOT set the stub router flag ?

Again, no such thing.

"How and when a stub router sets the M and O flags in outgoing RAs is specified in [I-D.ietf-snac-simple]."
--> "How a stub router sets the other flags in outgoing RAs, and when these RAs are sent, is specified in [I-D.ietf-snac-simple]. "
(Seems best to generically refer to all other flags. This then requires pulling out the "when" part.)

I tihink this text could be clearer:


Additionally, the RA header includes M and O flags that indicate whether DHCPv6 is available on the link. Section 6.3.4<https://rfc-editor.org/rfc/rfc4861#section-6.3.4> of [RFC4861<https://www.ietf.org/archive/id/draft-hui-stub-router-ra-flag-02.html#RFC4861>] specifies that hosts consider the most recently received information as authoritative. In order to avoid overriding whatever the infrastructure router is advertising, [draft-ietf-snac-simple] requires stub routers to mirror the M and O values in RAs received from infrastructure routers. The Stub Router flag provides a way for stub routers to correctly make this distinction.

"A stub router"
--> should we constrain this specifically to "A stub router implementing [I-D.ietf-snac-simple]" ?

There are no other stub routers yet. Bear in mind that the "infrastructure-supported stub router" draft that we're planning to do after snac-simple is still a case where stub routers are unmanaged; the difference is that stub routers in the second draft will be able to discover and use services on infrastructure.

5. IANA Considerations
--> Table 1 add caption

6. Security Considerations
--> best to expand "NDP" here - I don't see that acronym used in 4861, nor in the draft elsewhere.

We could add that there are no known security issues of setting the new flag, or spoofing it.

Yup. Thanks for the review! Looks like we need another spin of the document before we present it to 6man.