Re: [Snac] M/O Bit reflection behavior of draft-hui-stub-router-ra-flag-02

Ole Troan <otroan@employees.org> Thu, 18 April 2024 06:46 UTC

Return-Path: <otroan@employees.org>
X-Original-To: snac@ietfa.amsl.com
Delivered-To: snac@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 8E09EC151089 for <snac@ietfa.amsl.com>; Wed, 17 Apr 2024 23:46:31 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -7.097
X-Spam-Level:
X-Spam-Status: No, score=-7.097 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, DKIM_SIGNED=0.1, DKIM_VALID=-0.1, DKIM_VALID_AU=-0.1, DKIM_VALID_EF=-0.1, RCVD_IN_DNSWL_HI=-5, RCVD_IN_ZEN_BLOCKED_OPENDNS=0.001, SPF_HELO_NONE=0.001, SPF_PASS=-0.001, URIBL_DBL_BLOCKED_OPENDNS=0.001, URIBL_ZEN_BLOCKED_OPENDNS=0.001] autolearn=ham autolearn_force=no
Authentication-Results: ietfa.amsl.com (amavisd-new); dkim=pass (2048-bit key) header.d=employees.org
Received: from mail.ietf.org ([50.223.129.194]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id guvh0no6-Uhu for <snac@ietfa.amsl.com>; Wed, 17 Apr 2024 23:46:27 -0700 (PDT)
Received: from proxmox01.kjsl.com (proxmox01.kjsl.com [IPv6:2607:7c80:54:6::6]) (using TLSv1.3 with cipher TLS_AES_256_GCM_SHA384 (256/256 bits) key-exchange X25519 server-signature RSA-PSS (2048 bits) server-digest SHA256) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id E1924C14CE3B for <snac@ietf.org>; Wed, 17 Apr 2024 23:46:27 -0700 (PDT)
Received: from proxmox01.kjsl.com (localhost.localdomain [127.0.0.1]) by proxmox01.kjsl.com (Proxmox) with ESMTP id 4BF62E25D5; Thu, 18 Apr 2024 06:46:27 +0000 (UTC)
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=employees.org; h=cc:cc:content-transfer-encoding:content-type:content-type :date:from:from:in-reply-to:message-id:mime-version:references :reply-to:subject:subject:to:to; s=prox2023; bh=y3C68gmE1+puZlKD Fp0Rbh3sQ8Ml7pPloY2eDBWX1hM=; b=Ta0gQ5EY7gKINKCLYwGMb+LlaVXFkcky doJKGBDljRxb810+/sMSG5OuaFgDShB/F8ChEiH7eowVP7zEplKjYV7JdYoaPdFI KZi5Xhq3xBsthftg0V5CLFlFwG5uz/23BH4hkv6YOoS4lo5mSSu9iGktb6Isy5rQ X0dIscPoVAAc7g0M1yKM/yDpz+75Kkj+29QXf5R3o5nFgdy1w/2F+dJ8OdYh5wyX +uWwzmd1ZT6otJpx71AlPVFgmVgfApwr5RQhxuWu5/V2KZGFCFsJLatXLDJg+wjp lml7P/imqH8kC2VbhrfjN38uc7ZKOQ1cprIUQz9USl4Vm5kbGcrB0g==
Received: from clarinet.employees.org (clarinet.employees.org [198.137.202.74]) (using TLSv1.3 with cipher TLS_AES_256_GCM_SHA384 (256/256 bits) key-exchange X25519 server-signature RSA-PSS (4096 bits)) (No client certificate requested) by proxmox01.kjsl.com (Proxmox) with ESMTPS id 29C3FE25D0; Thu, 18 Apr 2024 06:46:27 +0000 (UTC)
Received: from smtpclient.apple (ti0389q160-2783.bb.online.no [46.9.227.254]) (using TLSv1.2 with cipher ECDHE-ECDSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by clarinet.employees.org (Postfix) with ESMTPSA id 6DDA24E11AF5; Thu, 18 Apr 2024 06:46:26 +0000 (UTC)
Content-Type: text/plain; charset="utf-8"
Mime-Version: 1.0 (Mac OS X Mail 16.0 \(3774.500.171.1.1\))
From: Ole Troan <otroan@employees.org>
In-Reply-To: <20240417214233.GA26096@unix-ag.uni-kl.de>
Date: Thu, 18 Apr 2024 08:46:14 +0200
Cc: Ted Lemon <mellon@fugue.com>, SNAC ML <snac@ietf.org>
Content-Transfer-Encoding: quoted-printable
Message-Id: <ED13CF6B-212A-40A0-83FB-8DAFB3B77AFB@employees.org>
References: <46119458-8B82-4DE0-A5BC-C58F64436FDB@gmail.com> <CAPt1N1mXSPR=7XwyobZhOSZppFohjJd-8DirqM6QFYihQXbvDQ@mail.gmail.com> <DU0P190MB1978F520A848CB9F32AA2385FD082@DU0P190MB1978.EURP190.PROD.OUTLOOK.COM> <CAPt1N1=c5_GHXqqGFzTKrRdg9x1wOgq7Vw=Q0+FsyTHEgSQS8A@mail.gmail.com> <20240417114328.GA18918@unix-ag.uni-kl.de> <CAPt1N1=eyR6f_5UOn2N3g79QyJcur4jw18MJiCy34vMBu9O1SA@mail.gmail.com> <20240417141618.GA5099@unix-ag.uni-kl.de> <CAPt1N1=2Zqw9rSV0F-Mr1+888ht8-_F_Ykg_hABw6h=JJKHZBA@mail.gmail.com> <20240417191858.GA9875@unix-ag.uni-kl.de> <CAPt1N1n74q6nfTjJQ--9nAUb3CHEw8XwtshpyMAzdn4KLa1YoA@mail.gmail.com> <20240417214233.GA26096@unix-ag.uni-kl.de>
To: Erik Auerswald <auerswal@unix-ag.uni-kl.de>
X-Mailer: Apple Mail (2.3774.500.171.1.1)
Archived-At: <https://mailarchive.ietf.org/arch/msg/snac/ZC3fgVC_JgZtNhMyVufuid17kY0>
Subject: Re: [Snac] M/O Bit reflection behavior of draft-hui-stub-router-ra-flag-02
X-BeenThere: snac@ietf.org
X-Mailman-Version: 2.1.39
Precedence: list
List-Id: "Mailing list for discussing problems relating to the automatic connection of stub networks to existing infrastructure networks. " <snac.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/snac>, <mailto:snac-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/snac/>
List-Post: <mailto:snac@ietf.org>
List-Help: <mailto:snac-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/snac>, <mailto:snac-request@ietf.org?subject=subscribe>
X-List-Received-Date: Thu, 18 Apr 2024 06:46:31 -0000

+1.

A SNAC router has the potential to end up as a rogue router on the link.
That may be by design, but expected and assumed behaviour must still be described.

O.

> On 17 Apr 2024, at 23:42, Erik Auerswald <auerswal@unix-ag.uni-kl.de> wrote:
> 
> Hi Ted,
> 
> all I do is provide another point of view, based on experience, and make
> suggestions how to possibly improve this point of the SNAC description.
> I don't demand anything.
> 
> But how hard is it to describe that SNAC imagines a host to follow the
> infrastructure router's RA with M&O bits with DHCPv6 for default route
> communications, and the SNAC router's RA for stub network communications?
> Since anything goes, this goes.  This does not prescribe host behavior,
> changes nothing, just states an assumption.  There must be some idea of
> how hosts might behave since you state that they work correctly, even
> if this is not standardized.  The wording could be quite vague, saying
> that host behavior is not standardized, but, e.g., the above would work,
> and hosts are assumed to work in some SNAC-compatible way.
> 
> To put this differently, you want a SNAC router to also do its thing
> on a (perhaps partially) managed network, not only on an unmanaged one.
> A short description of how this is supposed to work seems not that big
> a burden.
> 
> The person troubleshooting could then read how the SNAC stuff is intended
> to work, and compare that to actual behavior.  IMHO this would be much
> better than nothing.
> 
> The SNAC WG tried to find a comprehensive solution by reflecting M&O
> bits from infrastructure routers, but not SNAC routers, but this did not
> pan out.  That is OK for me.  But I do not like the idea of ignoring this
> detail with a silent assumption of "correct" host behavior, without any
> description of what "correct" even is.
> 
> So perhaps if the SNAC WG describes how they assume hosts would work in
> a SNAC environment, this would be shot down by the IETF as out of scope?
> I would describe that as "process failure".  Still, you could just say so,
> and a poor soul digging into how SNAC was supposed to work might be able
> to find this.  This would not provide a solution, but perhaps closure.
> 
> Just not mentioning possible rough edges might seem like an easier way
> to an RFC.  Most reviewers are more likely to notice things written down
> than things not even mentioned.  Again, I'd call this "process failure".
> 
> I only care about the result.  I still do not demand anything.
> 
> ¯\_(ツ)_/¯
> 
> Br,
> Erik
> 
> 
> On Wed, Apr 17, 2024 at 03:46:32PM -0400, Ted Lemon wrote:
>> We've tried to update the documentation on the M&O bits before in the IETF.
>> It's failed because we can't get consensus.
>> 
>> Anyway, you're making a bunch of assertions here about what we have to do,
>> but not backing them with anything but your gut feeling based on
>> 20-year-old experiences. I don't think this is helpful. I'm not trying to
>> minimize the importance of getting this right, and I appreciate your wish
>> to make sure that we do. But it's not clear to me that you are actually
>> talking about a real problem we need to solve. There was a lot of expertise
>> on this in the room when we discussed it, and the general consensus is that
>> the stuff you're describing is old news, and we don't need to worry about
>> it anymore.
>> 
>> It is true that the behavior of hosts is not consistent, because there is
>> no standard that tells them how to behave. But it is not true that there is
>> a problem, as far as we are able to tell. If you have data that suggests
>> otherwise, please share it. But please do not demand that we do very
>> difficult work to solve a problem that you haven't documented.
>> 
>> Also, on a more practical note, making changes to host behavior and the
>> treatment of M&O bits is very much not in charter for SNAC... :)
>> 
>> On Wed, Apr 17, 2024 at 3:18 PM Erik Auerswald <auerswal@unix-ag.uni-kl.de>
>> wrote:
>> 
>>> Hi Ted,
>>> 
>>> On Wed, Apr 17, 2024 at 11:25:42AM -0400, Ted Lemon wrote:
>>>> 
>>>> The behavior of the M and O bits isn’t defined anywhere.  Modern
>>>> hosts have had to adapt to this.  During the discussions we had in
>>>> Brisbane the consensus was that they do now handle inconsistent M&O
>>>> bits correctly.
>>> 
>>> If the handling is not defined, no handling is incorrect.  But SNAC could
>>> describe how exactly hosts need to handle it to be compatible with SNAC.
>>> This would at least allow to troubleshoot the breakage.
>>> 
>>> Alternatively, SNAC could refrain from sending RAs onto a managed link
>>> to prevent incompatibilities leading to problems.
>>> 
>>> Alternatively, SNAC could make an honest effort to adapt to managed links,
>>> even if this does not work in all possible cases, and document the known
>>> problems in a section on operational considerations.
>>> 
>>> Br,
>>> Erik
> 
> -- 
> Snac mailing list
> Snac@ietf.org
> https://www.ietf.org/mailman/listinfo/snac