Re: [v6ops] New Version Notification for draft-yourtchenko-ra-dhcpv6-comparison-00.txt (fwd)

Owen DeLong <owen@delong.com> Mon, 09 December 2013 14:52 UTC

Return-Path: <owen@delong.com>
X-Original-To: v6ops@ietfa.amsl.com
Delivered-To: v6ops@ietfa.amsl.com
Received: from localhost (ietfa.amsl.com [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 677A41AE305 for <v6ops@ietfa.amsl.com>; Mon, 9 Dec 2013 06:52:28 -0800 (PST)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -0.991
X-Spam-Level:
X-Spam-Status: No, score=-0.991 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, DKIM_ADSP_ALL=0.8, DKIM_SIGNED=0.1, HTML_MESSAGE=0.001, RP_MATCHES_RCVD=-0.001, SPF_PASS=-0.001, T_DKIM_INVALID=0.01] autolearn=no
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id XzpO-j9hMeI6 for <v6ops@ietfa.amsl.com>; Mon, 9 Dec 2013 06:52:25 -0800 (PST)
Received: from owen.delong.com (owen.delong.com [IPv6:2620:0:930::200:2]) by ietfa.amsl.com (Postfix) with ESMTP id B919A1AE2FC for <v6ops@ietf.org>; Mon, 9 Dec 2013 06:52:24 -0800 (PST)
Received: from [50.94.79.230] ([50.94.79.230]) (authenticated bits=0) by owen.delong.com (8.14.2/8.14.2) with ESMTP id rB9En2Cc031836 (version=TLSv1/SSLv3 cipher=AES128-SHA bits=128 verify=NOT); Mon, 9 Dec 2013 06:49:03 -0800
X-DKIM: Sendmail DKIM Filter v2.8.3 owen.delong.com rB9En2Cc031836
DKIM-Signature: v=1; a=rsa-sha1; c=simple/simple; d=delong.com; s=mail; t=1386600544; bh=7P5zTq1qffMOSF9gZZ8Qpm+omxk=; h=Content-Type:Mime-Version:Subject:From:In-Reply-To:Date:Cc: Message-Id:References:To; b=ZW7ZE33fA/IJOLJg2mOAspnsd+lpv+HS5RgvVTdNk1J8WbX5WIRswA8r+T6WonXRo HyUrRm1v2Phd8/bz16cJhvN3jdqzo7MFbGbkks7GNRpsYeyjeMtH+Js3No5kpydQkU ShUdyFkCnhA/7ZvZE9HjwI1me3sn9SjTY4U58Kcg=
Content-Type: multipart/alternative; boundary="Apple-Mail=_6B7EE679-966D-4962-A456-CAD308A10F3A"
Mime-Version: 1.0 (Mac OS X Mail 7.0 \(1822\))
From: Owen DeLong <owen@delong.com>
In-Reply-To: <1386585684.5001.YahooMailNeo@web161906.mail.bf1.yahoo.com>
Date: Mon, 09 Dec 2013 06:49:10 -0800
Message-Id: <E78FF35E-645F-445E-B9CF-952C53736AF7@delong.com>
References: <alpine.OSX.2.00.1311271353550.3903@ayourtch-mac> <1386274786.29351.YahooMailNeo@web142501.mail.bf1.yahoo.com> <alpine.OSX.2.00.1312060759220.68814@ayourtch-mac> <1386378082.99914.YahooMailNeo@web161901.mail.bf1.yahoo.com> <alpine.OSX.2.00.1312072028290.68814@ayourtch-mac> <F024FF5B-35A6-4221-952C-4A730A68C59D@delong.com> <489D13FBFA9B3E41812EA89F188F018E1ADD7D60@xmb-rcd-x04.cisco.com> <alpine.OSX.2.00.1312080731480.68814@ayourtch-mac> <1386533152.79592.YahooMailNeo@web161905.mail.bf1.yahoo.com> <22BFD8E2-4406-46A8-93F2-702319C32344@delong.com> <1386585684.5001.YahooMailNeo@web161906.mail.bf1.yahoo.com>
To: Mark ZZZ Smith <markzzzsmith@yahoo.com.au>
X-Mailer: Apple Mail (2.1822)
X-Greylist: Sender succeeded SMTP AUTH, not delayed by milter-greylist-4.0rc1 (owen.delong.com [192.159.10.2]); Mon, 09 Dec 2013 06:49:04 -0800 (PST)
Cc: "v6ops@ietf.org" <v6ops@ietf.org>
Subject: Re: [v6ops] New Version Notification for draft-yourtchenko-ra-dhcpv6-comparison-00.txt (fwd)
X-BeenThere: v6ops@ietf.org
X-Mailman-Version: 2.1.15
Precedence: list
List-Id: v6ops discussion list <v6ops.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/v6ops>, <mailto:v6ops-request@ietf.org?subject=unsubscribe>
List-Archive: <http://www.ietf.org/mail-archive/web/v6ops/>
List-Post: <mailto:v6ops@ietf.org>
List-Help: <mailto:v6ops-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/v6ops>, <mailto:v6ops-request@ietf.org?subject=subscribe>
X-List-Received-Date: Mon, 09 Dec 2013 14:52:28 -0000

On Dec 9, 2013, at 2:41 AM, Mark ZZZ Smith <markzzzsmith@yahoo.com.au> wrote:

> 
> 
> 
> 
> 
>> ________________________________
>> From: Owen DeLong <owen@delong.com>
>> To: Mark ZZZ Smith <markzzzsmith@yahoo.com.au> 
>> Cc: Andrew Yourtchenko <ayourtch@cisco.com>; Bernie Volz (volz) <volz@cisco.com>; "v6ops@ietf.org" <v6ops@ietf.org> 
>> Sent: Monday, 9 December 2013 4:20 PM
>> Subject: Re: [v6ops] New Version Notification for draft-yourtchenko-ra-dhcpv6-comparison-00.txt (fwd)
>> 
>> 
>> 
>> Technical people like choice and flexibility, because I think they think about "what ifs" - "what if I was in this situation, what if I was in that situation, and what would I like to tweak to make it work." Non-technical end-users (usually our customers or at least our relatives), who far surpass us in numbers, don't care, shouldn't care and shouldn't have to care. They just want it to work, work reliably, and don't want to have to engage technical people to either make it work or call in assistance if it doesn't work or stops working. Choices, options and parameters make things more complex and therefore more fragile and less robust.
>>> 
>> 
>> I don’t mind the flipper door, but I really hate it when people remove all the knobs. (The non-technical users shouldn’t open the flipper door).
>> 
> 
> 
> The knobs are still there, they're called static configuration.

I didn’t mean to imply that the knobs weren’t there. Indeed, RAs have a very large number of knobs for such a lightweight protocol and DHCPv6 has even more.


> 
>> 
>> We currently have a single mechanism to announce a default gateway, and the default gateway announces itself, out of the box. That makes it pretty hard, if not impossible for that information to be wrong. DHCPv6 for default gateways would in the DHCPv6 relay scenario would require human entry of that information, creating the opportunity for human error, and potential conflict with what RAs are announcing.
>>> 
>> 
>> It’s not hard at all. All you have to do is put a router on the network that is connected away from, instead of towards the internet and voila, you have arguably “wrong” RAs.
>> 
> 
> If I understand your scenario, the RAs are right, it is the route table in the router that is broken (or rather, the upstream network is partitioned). I don't see how putting default router information in DHCPv6 is going to prevent the same problem, or lessen the effects of it. Chances are it might increase the likelihood of issues, because it is one more thing for humans to get wrong when they enter it into their DHCPv6 server.
> 

No, the route table in the router is not broken, it just doesn’t have a default route to the upstream routers. There are a number of situations where this could even be desirable (for example, the systems on the back-end network behind this third router are not supposed to send/receive from
networks beyond the LAN in question).

I’m not saying that it does. I’m saying that RAs from routers don’t necessarily guarantee that the routers are telling the truth. Not all routers are valid default route candidates.

However, the current IPv6 implementations seem to assume that they are.

The point is that while RA can be easier and more reliably accurate than routing information from DHCPv6 in many scenarios, this is not necessarily always true. Adding the equivalent of RIOs to DHCPv6 would be harmless to those who wish to use only RAs while allowing operators to choose the solution that works best for them.

> However, this discussion is only about how hosts learn their default gateway/router information, not whether once the packets make it to the router they can be forwarded by the routing domain to their destination successfully.

Yes, but if hosts are learning default routers that aren’t good candidates for that function, one could make the argument that such a scenario is not desirable.

> 
>> 
>> This won’t usually break anything because redirects usually work and even if they don’t, you just put unnecessary load on the network and the router that can’t forward the packets. However, if that router doesn’t know the correct address for the other routers, then your RAs will be truly wrong and things do break.
>> 
> 
> There are a few ways of resolving this.
> 
> Firstly, the routers on the link could be trading routing information using e.g, OSPF via the link the hosts are attached to if that is the only way the two separate upstream networks are interconnected.

Which results in the redirects and hair pinning described in my paragraph you are claiming this solution resolves.

> Secondly, one of the routers could have a High RA preference (RFC4191), and then that router has static routes towards the prefixes behind the other routers. Having the other routers continue to announce lower preference RAs means that if the High preference router fails, hosts still have a level of reachability to the prefixes behind the remaining routers.

Which takes you back to fiddling knobs and the potential for human error in the configuration process.

> Finally, some level of routing information could be pushed to the hosts so they pick the correct first hop router. RAs support providing this information via the Route Information Option (RFC4191).

Which also requires fiddling the knobs and re-inserting the potential for human error.

> There are VRRP options too, however I've limited the above to what can just be done with RAs.

I wasn’t trying to put this forward as an insurmountable problem. I was just pointing out that RAs are not a panacea solution to all possible problems associated with routing information from DHCP.

Owen