Re: [v6ops] PI [ULA draft revision #2 Regarding isolated networks]

Gert Doering <gert@space.net> Mon, 02 June 2014 17:49 UTC

Return-Path: <gert@Space.Net>
X-Original-To: v6ops@ietfa.amsl.com
Delivered-To: v6ops@ietfa.amsl.com
Received: from localhost (ietfa.amsl.com [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 1109A1A0320 for <v6ops@ietfa.amsl.com>; Mon, 2 Jun 2014 10:49:14 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -2.551
X-Spam-Level:
X-Spam-Status: No, score=-2.551 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, RP_MATCHES_RCVD=-0.651] autolearn=ham
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id GO4KHxUePiZQ for <v6ops@ietfa.amsl.com>; Mon, 2 Jun 2014 10:49:12 -0700 (PDT)
Received: from mobil.space.net (mobil.space.net [IPv6:2001:608:2:81::67]) (using TLSv1 with cipher DHE-RSA-AES256-SHA (256/256 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id D5B941A01ED for <v6ops@ietf.org>; Mon, 2 Jun 2014 10:49:11 -0700 (PDT)
X-Original-To: v6ops@ietf.org
Received: from mobil.space.net (localhost [IPv6:::1]) by mobil.space.net (Postfix) with ESMTP id B2A6160B32 for <v6ops@ietf.org>; Mon, 2 Jun 2014 19:49:04 +0200 (CEST)
X-SpaceNet-Relay: true
Received: from moebius3.space.net (moebius3.Space.Net [IPv6:2001:608:2:2::250]) by mobil.space.net (Postfix) with ESMTPS id 733E96038F for <v6ops@ietf.org>; Mon, 2 Jun 2014 19:49:04 +0200 (CEST)
Received: (qmail 32207 invoked by uid 1007); 2 Jun 2014 19:49:04 +0200
Date: Mon, 02 Jun 2014 19:49:04 +0200
From: Gert Doering <gert@space.net>
To: Philip Homburg <pch-v6ops-3a@u-1.phicoh.com>
Message-ID: <20140602174904.GF46558@Space.Net>
References: <2A4B72CD-EDF3-4D11-AC39-B65892F9173F@nominum.com> <CAKD1Yr2NH4Kca4EvhjN2XnDbt8F2eS56ipxu3npH9yOh1bmQaA@mail.gmail.com> <F12F173B-9FF2-4EF8-B11E-33AEDA24961F@nominum.com> <CAKD1Yr1cGx7UfxZaEhm7oHA5PLvghVc52oPVkEQF90_7Vm__vw@mail.gmail.com> <1FDC3A7F-15EC-4397-AF3E-10F86EA04228@nominum.com> <538BDA84.6030800@bogus.com> <37D09BEE-FEDF-4514-8CEB-62959A89C3FF@nominum.com> <538BE13C.7050900@bogus.com> <20140602081743.GP46558@Space.Net> <m1WrVQF-0000BcC@stereo.hq.phicoh.net>
MIME-Version: 1.0
Content-Type: text/plain; charset="us-ascii"
Content-Disposition: inline
In-Reply-To: <m1WrVQF-0000BcC@stereo.hq.phicoh.net>
X-NCC-RegID: de.space
User-Agent: Mutt/1.5.23 (2014-03-12)
Archived-At: http://mailarchive.ietf.org/arch/msg/v6ops/3ZdUzTbr01LY-dq3lwn5UuRCh18
Cc: V6 Ops List <v6ops@ietf.org>
Subject: Re: [v6ops] PI [ULA draft revision #2 Regarding isolated networks]
X-BeenThere: v6ops@ietf.org
X-Mailman-Version: 2.1.15
Precedence: list
List-Id: v6ops discussion list <v6ops.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/v6ops>, <mailto:v6ops-request@ietf.org?subject=unsubscribe>
List-Archive: <http://www.ietf.org/mail-archive/web/v6ops/>
List-Post: <mailto:v6ops@ietf.org>
List-Help: <mailto:v6ops-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/v6ops>, <mailto:v6ops-request@ietf.org?subject=subscribe>
X-List-Received-Date: Mon, 02 Jun 2014 17:49:14 -0000

Hi,

On Mon, Jun 02, 2014 at 06:49:13PM +0200, Philip Homburg wrote:
> One philosophical question is whether it is the host or network that is
> responsible for dealing with such brokenness?

I'm not so much concerned about philosophy, I'm an engineer.

> The nice thing about the IPv4 architecture is the split between the network
> and the transport layer on the hosts: the network transports packets from
> source to destination, occasionally dropping packets, reordering them and 
> in extreme cases duplicating them.
> 
> The host transport layer retransmits and reorders packets and filters out
> duplicates. Host do not know about the network, they just pass packets to 
> the default router (or other routers in case of ICMP redirects).
> 
> Making the host resposible for good source address selection in case network
> failures violates that model. 

This theory is very nice.  Unfortunately, it's, uh, theory, and today's
Internet does not really know very much about this.  

It *does* know about budget ISPs that are too cheap to pay engineers to 
properly monitor their network, about de-coupled control and data planes 
that advertise reachability but sink the data packets, extremely overloaded
links between ISPs fighting (de-)peering wars, and other unfriendlyness.

> If we make the router responsible dealing with failures, then it helps to 
> separate mechanism from policy.

In the failure scenario I described, there is no (reasonable) way a home 
router can know that "ISP C" has messed up their MPLS network (again!) 
and it's no use sending packets out ISP A to reach host Z.

Even if it knew, other targets might work perfectly well via ISP A, while
yet other parts are broken via ISP B.  So "withdraw a prefix as soon as
something is broken upstream" will usually give you "zero working prefixes",
given that something is always broken somewhere.


[..]
> For policy, even if you would have to tell a router manually that link is 
> broken, it would help already enormously if entire site would then reconfigure
> automatically. 

Please understand that it's not "the link" that is broken, or even "ISP A"
- these cases are trivial, and reconfiguring the site is also quite trivial,
except - to some extent - for externally published DNS records.

[..]
> Beyond that, many different types of pluggable detectors are possible.
> If for me, say, github is important, then having a module that can poll a
> website regularly would do the trick.

Yeah.  I can easily see *end users* do that, or router vendors update their
gear two years after it has been solved to monitor the Next Big Thing on
the Internet.

The *host* knows where it wants to connect to, and that it has multiple
options in case one doesn't work.


Coming back to your example and extending it a bit: what do you do if 
github is broken via ISP A, while netflix is broken via ISP B?  If you 
can solve that with prefix announcements, I'm all ears.  Until then, I
maintain that "dual prefixes with source address failover *plus* a way
to present the prefix selection to the application(!) user" is a more
workable way in that scenario.

(There are a number of ways such a "magic CPE" could achieve the end result
with dirty tricks, like involving NPT66 to circumvent non-working paths, but
I can't see a way to make it work without resolving to those)

Gert Doering
        -- NetMaster
-- 
have you enabled IPv6 on something today...?

SpaceNet AG                        Vorstand: Sebastian v. Bomhard
Joseph-Dollinger-Bogen 14          Aufsichtsratsvors.: A. Grundner-Culemann
D-80807 Muenchen                   HRB: 136055 (AG Muenchen)
Tel: +49 (0)89/32356-444           USt-IdNr.: DE813185279