Re: [v6ops] Please review the No IPv4 draft

Nick Hilliard <nick@foobar.org> Tue, 15 April 2014 17:15 UTC

Return-Path: <nick@foobar.org>
X-Original-To: v6ops@ietfa.amsl.com
Delivered-To: v6ops@ietfa.amsl.com
Received: from localhost (ietfa.amsl.com [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 9CE301A01F8 for <v6ops@ietfa.amsl.com>; Tue, 15 Apr 2014 10:15:47 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -0.001
X-Spam-Level:
X-Spam-Status: No, score=-0.001 tagged_above=-999 required=5 tests=[BAYES_20=-0.001] autolearn=ham
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id KJjeZN6yuigY for <v6ops@ietfa.amsl.com>; Tue, 15 Apr 2014 10:15:45 -0700 (PDT)
Received: from mail.netability.ie (mail.netability.ie [IPv6:2a03:8900:0:100::5]) by ietfa.amsl.com (Postfix) with ESMTP id 5E1541A04E9 for <v6ops@ietf.org>; Tue, 15 Apr 2014 10:15:41 -0700 (PDT)
X-Envelope-To: v6ops@ietf.org
Received: from crumpet.dyn.netability.ie (089-101-195154.ntlworld.ie [89.101.195.154] (may be forged)) (authenticated bits=0) by mail.netability.ie (8.14.8/8.14.5) with ESMTP id s3FHFb16090999 (version=TLSv1/SSLv3 cipher=DHE-RSA-AES128-SHA bits=128 verify=NO); Tue, 15 Apr 2014 18:15:37 +0100 (IST) (envelope-from nick@foobar.org)
X-Authentication-Warning: cheesecake.netability.ie: Host 089-101-195154.ntlworld.ie [89.101.195.154] (may be forged) claimed to be crumpet.dyn.netability.ie
Message-ID: <534D6957.5000900@foobar.org>
Date: Tue, 15 Apr 2014 18:16:07 +0100
From: Nick Hilliard <nick@foobar.org>
User-Agent: Mozilla/5.0 (Macintosh; Intel Mac OS X 10.9; rv:24.0) Gecko/20100101 Thunderbird/24.4.0
MIME-Version: 1.0
To: Simon Perreault <simon.perreault@viagenie.ca>
References: <534BF5A5.5010609@viagenie.ca> <CAKD1Yr0j5+r6K8APoFageJz2RESKj5vkk10Ybom0p3Vec_G0YQ@mail.gmail.com> <534D319C.3030800@viagenie.ca> <534D4E85.5040104@foobar.org> <534D5452.4080300@viagenie.ca>
In-Reply-To: <534D5452.4080300@viagenie.ca>
X-Enigmail-Version: 1.6
Content-Type: text/plain; charset="UTF-8"
Content-Transfer-Encoding: 7bit
Archived-At: http://mailarchive.ietf.org/arch/msg/v6ops/2Pse0rQEigay6cWak1X_dO9SjwM
Cc: "v6ops@ietf.org WG" <v6ops@ietf.org>
Subject: Re: [v6ops] Please review the No IPv4 draft
X-BeenThere: v6ops@ietf.org
X-Mailman-Version: 2.1.15
Precedence: list
List-Id: v6ops discussion list <v6ops.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/v6ops>, <mailto:v6ops-request@ietf.org?subject=unsubscribe>
List-Archive: <http://www.ietf.org/mail-archive/web/v6ops/>
List-Post: <mailto:v6ops@ietf.org>
List-Help: <mailto:v6ops-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/v6ops>, <mailto:v6ops-request@ietf.org?subject=subscribe>
X-List-Received-Date: Tue, 15 Apr 2014 17:15:47 -0000

On 15/04/2014 16:46, Simon Perreault wrote:
> This was a mistake on my part. We're trying to do much more. We're
> trying to create an IPv4 kill switch.

then you need to rewrite sections 1 and 3 from scratch before any other
comments from v6ops would be of any relevance.  As it stands, you have
provided justification for a dhcpv4 client kill switch, but no more.
Killing ipv4 on an interface - particularly given the semantics defined in
e.g. 5.3.3.h - is a substantial undertaking which will require substantial
justification.  Killing ipv4 system-wide, as suggested at the end of
section 5.3, is something which will be extraordinarily difficult to envisage.

> It does not. Did you read our draft? We specify how the No-IPv4 option
> is to be processed in multiple interfaces settings.

I did read the draft and it does talk about killing ipv4 system-wide, and
across all interfaces:

>       The intent is to remove all traces of IPv4 activity.  Once the No-
>       IPv4 option with value 3 is activated, the network stack should
>       behave as if IPv4 functionality had never been present.  For
>       example, a modular kernel implementation could accomplish the
>       above by unloading the IPv4 kernel module at run time.

No way, Jose.

Simon, I think you need to go back to the drawing board on this draft.  As
I said before, stopping v4 DHCPREQUEST packets is a good idea and it would
be feasible to design a mechanism to implement it.  Beyond that, you're on
shaky ground.

Nick