Re: [v6ops] Incremental Deployment of IPv6-only Wi-Fi for IETF Meetings

JORDI PALET MARTINEZ <jordi.palet@consulintel.es> Mon, 17 July 2017 19:20 UTC

Return-Path: <prvs=13714351ed=jordi.palet@consulintel.es>
X-Original-To: v6ops@ietfa.amsl.com
Delivered-To: v6ops@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id F1382127B57 for <v6ops@ietfa.amsl.com>; Mon, 17 Jul 2017 12:20:19 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -1.999
X-Spam-Level:
X-Spam-Status: No, score=-1.999 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, DKIM_SIGNED=0.1, DKIM_VALID=-0.1, DKIM_VALID_AU=-0.1, URIBL_BLOCKED=0.001] autolearn=ham autolearn_force=no
Authentication-Results: ietfa.amsl.com (amavisd-new); dkim=pass (1024-bit key) header.d=consulintel.es; domainkeys=pass (1024-bit key) header.from=jordi.palet@consulintel.es header.d=consulintel.es
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id 6wMlCzzqrVE2 for <v6ops@ietfa.amsl.com>; Mon, 17 Jul 2017 12:20:16 -0700 (PDT)
Received: from mail.consulintel.es (mail.consulintel.es [217.126.185.215]) (using TLSv1 with cipher AES128-SHA (128/128 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id 5F37C12F287 for <v6ops@ietf.org>; Mon, 17 Jul 2017 12:20:14 -0700 (PDT)
DKIM-Signature: v=1; a=rsa-sha256; c=simple; d=consulintel.es; s=MDaemon; t=1500319208; x=1500924008; q=dns/txt; h=DomainKey-Signature: Received:User-Agent:Date:Subject:From:To:CC:Message-ID: Thread-Topic:References:In-Reply-To:Mime-version:Content-type: Content-transfer-encoding:Reply-To; bh=rOHqB2NYphwS/9gUgx+/MKFAc ePd0QGEOUVNthF+lv8=; b=a6qFpQliAy8nMgbek+NuV3uvwn7MirO/3dW4S57Mc ZRUNZwB2I1Gi6P1cHCh9cK4noif8I8vFfIa9uIRMkKvySBMtS4D7mDKQCtIoezXz qUb6kJX0m6nUgxhqOU0/XyAYKWWqzpKUqkeYrRuY5NDNptk0ykVyYaY72IJJTw27 kQ=
DomainKey-Signature: a=rsa-sha1; s=MDaemon; d=consulintel.es; c=simple; q=dns; h=from:message-id; b=oY5R4QNPDROCTyFq1jfahj1Vc18TMIocBGgA2KiMYEUGqeKyPFa89BFPT9Vs pX4uGx/1MS3BD0OTFubmVBT7LYhiq1YDmSL9iQbBsKEd4+3F6Y7kPvT+9 OgvTC7Zf6vLPZxVkEzoC2o2+GQSIZK3viMDLKaMSKjIO5ehH3MZvVs=;
X-MDAV-Processed: mail.consulintel.es, Mon, 17 Jul 2017 21:20:08 +0200
X-Spam-Processed: mail.consulintel.es, Mon, 17 Jul 2017 21:20:07 +0200
Received: from [31.133.186.60] by mail.consulintel.es (MDaemon PRO v11.0.3) with ESMTP id md50005478807.msg for <v6ops@ietf.org>; Mon, 17 Jul 2017 21:20:06 +0200
X-MDOP-RefID: re=0.000,fgs=0 (_st=1 _vt=0 _iwf=0)
X-Authenticated-Sender: jordi.palet@consulintel.es
X-HashCash: 1:20:170717:md50005478807::AHF1i+gB7xeNS+AI:00001/s/
X-MDRemoteIP: 31.133.186.60
X-Return-Path: prvs=13714351ed=jordi.palet@consulintel.es
X-Envelope-From: jordi.palet@consulintel.es
X-MDaemon-Deliver-To: v6ops@ietf.org
User-Agent: Microsoft-MacOutlook/f.24.0.170702
Date: Mon, 17 Jul 2017 21:20:01 +0200
From: JORDI PALET MARTINEZ <jordi.palet@consulintel.es>
To: IPv6 Ops WG <v6ops@ietf.org>
CC: Randy Bush <randy@psg.com>, Russ Housley <housley@vigilsec.com>, Suresh Krishnan <suresh.krishnan@gmail.com>, Alissa Cooper <alissa@cooperw.in>, Jim Martin <jim@daedelus.com>
Message-ID: <59186F7C-BA8B-485B-8B53-C03E7D0E0223@consulintel.es>
Thread-Topic: [v6ops] Incremental Deployment of IPv6-only Wi-Fi for IETF Meetings
References: <7643C1DC-76A3-4652-9BB1-D0D42801F37E@consulintel.es> <CAEqgTWYOe=jWp=zVZNLx6DjKjNpPTYaq2jmjryudrGZHKZNq6g@mail.gmail.com> <A5D0385C-F755-4B44-86D8-6E618E77193F@consulintel.es> <CAPt1N1kroh2cPkTr8HRfNjLTdG0hkC1oQsUZdhQzQA5tA9-xug@mail.gmail.com> <9AF791E9-1E12-425E-93A4-2913E2D18CBA@consulintel.es> <CAPt1N1kU4cpVCsp7W3XNAZupYqjTWVH+BNp9bwtznnWD_uP2oQ@mail.gmail.com> <CAEqgTWZzZW0wKggDXjY=-aMfDxzd5-GoRqju1829XwY3aHQuYg@mail.gmail.com> <0FAF1E05-DA4B-47BF-95F7-7EFCD1BED9B0@cable.comcast.com> <42188852-BBEB-4D75-967F-4BED79BBBCAE@consulintel.es> <CAFU7BARahTfH_Uy_t22EthGuFMJ=q-N1zxismNAVkHWWJA-Obw@mail.gmail.com> <CBA23B1B-C5A3-413C-B399-93F537C99015@consulintel.es> <CAFU7BARz_u92NweYkTizT2=q420sBRh11m9bqWO9+aexCi3ANA@mail.gmail.com> <2A639918-C6AC-44B8-8D66-5293EE13A7BD@consulintel.es> <CAFU7BASrxoroJVHwxFpwwBxCUC62_VZXsUGgfDOj6y+KVWk6tw@mail.gmail.com> <CAPt1N1n1dVY-WB6Q6jNUf5=a7K57B4GFR4iDXMYc-6UFR9edNg@mail.gmail.com> <9CDFFE8B-DBEC-4059-8E93-44AEC304E31A@consulintel.es> <45A7CDF3-9832-4944-9D77-95E17EAEDB47@apple.com> <CCD6AC47-F4DD-4405-816D-D9221B0A816B@consulintel.es> <D592D17A.7E500%lee@asgard.org>
In-Reply-To: <D592D17A.7E500%lee@asgard.org>
Mime-version: 1.0
Content-type: text/plain; charset="UTF-8"
Content-transfer-encoding: quoted-printable
Reply-To: jordi.palet@consulintel.es
Archived-At: <https://mailarchive.ietf.org/arch/msg/v6ops/1Tk4kWH8wHNXuPR0k7KX9YLKpU0>
Subject: Re: [v6ops] Incremental Deployment of IPv6-only Wi-Fi for IETF Meetings
X-BeenThere: v6ops@ietf.org
X-Mailman-Version: 2.1.22
Precedence: list
List-Id: v6ops discussion list <v6ops.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/v6ops>, <mailto:v6ops-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/v6ops/>
List-Post: <mailto:v6ops@ietf.org>
List-Help: <mailto:v6ops-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/v6ops>, <mailto:v6ops-request@ietf.org?subject=subscribe>
X-List-Received-Date: Mon, 17 Jul 2017 19:20:20 -0000

Below in-line with [Jordi].
    
    On 7/17/17, 10:27 AM, "v6ops on behalf of JORDI PALET MARTINEZ"
    <v6ops-bounces@ietf.org on behalf of jordi.palet@consulintel.es> wrote:
    
    >
    >4) The result is the same, but people don’t need to spend time. We
    >configure the Jool so it reports EVERY usage, so we can then process that
    >file to detect WHAT was using the CLAT.
    
    Your proposal is to log the 5-tuple of every connection (using the CLAT)
    on the IETF network?
    Any privacy concerns?

[Jordi] I don’t have privacy concerns myself, but I understand that, and obviously whatever we do, I suggest to be anonymized.

After all if we do the other way, people will need to tell what apps and web sites or whatever are they visiting, so the issue is the same and we add the need for manual reporting.


    
    >5) The result is the same as the suggested experiment, but NOT breaking
    >anything, not asking the participants to report anything, but having
    >BETTER collection of data about what will be broken if the CLAT is not
    >there (anything that goes into the CLAT).
    
    I’m not sure that logging the 5-tuple (if that’s what you mean to log)
    gives you that information.
    For instance, if Outlook for Mac isn’t working, and we don’t know why,
    then you may not see anything; the DNS lookup may happen over IPv6, and
    OfM barfs without ever sending a packet. At most you’ll see a packet to an
    SMTP/POP/IMAP port, but it won’t tell you whether it was the client or the
    server that failed.

[Jordi] I don't think we need to identify “why” something is not working. We just need to tell the “app” or “server” owner (example Microsoft in case of Outlook), what is failing. I don’t think is our job, neither we have, even if voluntary, resources to do more than that. So yes, maybe we need to log some additional data, such as port/protocol failing. We may need even to capture a few packets at the beginning of each traffic flow. I think I mention in one of the earlier emails I’m not a software developer, but I believe that we may figure out a simple way to do that if Jool itself don’t provides all the tools/data that we need.



    I’m not sure how to know of VPN failures where the DNS goes through the
    VPN. 

[Jordi] Of course I was not suggesting to look into “VPN” traffic. My mention about OpenVPN was because first attempts it failed. So I was talking about OpenVPN as one app not surviving the NAT64, which now is sorted out.


    
    >
    >
    >Real world networks (end-users and corporate which are not related to
    >IETF), will not (in 3-5 years), be willing to replace all the apps and
    >devices that fail with just NAT64. They need a CLAT or similar support in
    >their LANs.
    
    I don’t know how many corporate apps/devices fail with IPv6 + NAT64. Maybe
    some legacy business systems, but that’s not the case for all, and won’t
    be in 3-5 years. Even if it is, it may well make more sense for an
    enterprise to use IPv6 on client networks, and surround legacy systems
    with NAT64.

[Jordi] There are many business with VoIP systems that will not work if they don’t have IPv4 (even with private addresses as they have today) in the LAN. Same for security systems (IP cameras), devices that check the time the people come in/out the office, office automation, lighting automation, and I can keep going like that. Same for apps, like business apps (older IBM systems still used very frequently here), banking apps, I’ve been in many situations of web sites with dual-stack (even for governments and banks) that don’t work with NAT64 (and of course, you can tell as many times you want to the bank or government, they will not sort out for you). So end of the history, we like it or not, we can’t have the corporate LANs with just NAT64 for a while, they need to keep private IPv4, even if they turn off IPv4 in the WAN.
    
    No, I don’t expect 90% of users will be doing IPv6-only in their homes or
    corporate LANs in 3 years, but I wouldn’t be surprised if it’s 10-20%.
    
    Lee
    
    
    



**********************************************
IPv4 is over
Are you ready for the new Internet ?
http://www.consulintel.es
The IPv6 Company

This electronic message contains information which may be privileged or confidential. The information is intended to be for the use of the individual(s) named above. If you are not the intended recipient be aware that any disclosure, copying, distribution or use of the contents of this information, including attached files, is prohibited.