Re: [v6ops] Review of draft-ietf-v6ops-ula-usage-considerations

"Dale W. Carder" <dwcarder@wisc.edu> Wed, 10 February 2016 20:34 UTC

Return-Path: <dwcarder@wisc.edu>
X-Original-To: v6ops@ietfa.amsl.com
Delivered-To: v6ops@ietfa.amsl.com
Received: from localhost (ietfa.amsl.com [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id A74471B2F93 for <v6ops@ietfa.amsl.com>; Wed, 10 Feb 2016 12:34:17 -0800 (PST)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -4.202
X-Spam-Level:
X-Spam-Status: No, score=-4.202 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, RCVD_IN_DNSWL_MED=-2.3, RP_MATCHES_RCVD=-0.001, SPF_PASS=-0.001] autolearn=ham
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id 53Wi0CRow3rn for <v6ops@ietfa.amsl.com>; Wed, 10 Feb 2016 12:34:16 -0800 (PST)
Received: from smtpauth3.wiscmail.wisc.edu (wmauth3.doit.wisc.edu [144.92.197.226]) (using TLSv1 with cipher DHE-RSA-AES128-SHA (128/128 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id 123211B2F94 for <v6ops@ietf.org>; Wed, 10 Feb 2016 12:34:16 -0800 (PST)
MIME-version: 1.0
Content-transfer-encoding: 7bit
Content-disposition: inline
Content-type: text/plain; CHARSET="US-ASCII"
Received: from avs-daemon.smtpauth3.wiscmail.wisc.edu by smtpauth3.wiscmail.wisc.edu (Oracle Communications Messaging Server 7.0.5.33.0 64bit (built Aug 27 2014)) id <0O2C00F00M1TAF00@smtpauth3.wiscmail.wisc.edu> for v6ops@ietf.org; Wed, 10 Feb 2016 14:34:14 -0600 (CST)
X-Spam-PmxInfo: Server=avs-3, Version=6.2.1.2493963, Antispam-Engine: 2.7.2.2107409, Antispam-Data: 2016.2.10.202416, SenderIP=0.0.0.0
Received: from DOIT-2NW1MRFY-X.doit.wisc.edu (brie.doit.wisc.edu [144.92.67.198]) by smtpauth3.wiscmail.wisc.edu (Oracle Communications Messaging Server 7.0.5.33.0 64bit (built Aug 27 2014)) with ESMTPSA id <0O2C00EHDMGZMT00@smtpauth3.wiscmail.wisc.edu>; Wed, 10 Feb 2016 14:34:13 -0600 (CST)
Date: Wed, 10 Feb 2016 14:34:11 -0600
From: "Dale W. Carder" <dwcarder@wisc.edu>
To: Fernando Gont <fgont@si6networks.com>
Message-id: <20160210203411.GH387@DOIT-2NW1MRFY-X.doit.wisc.edu>
References: <56BB639E.5010505@si6networks.com>
In-reply-to: <56BB639E.5010505@si6networks.com>
User-Agent: Mutt/1.5.23 (2014-03-12)
Archived-At: <http://mailarchive.ietf.org/arch/msg/v6ops/43kl_Pr0I32pEoOEv6m_ZhHjY5E>
Cc: IPv6 Operations <v6ops@ietf.org>, draft-ietf-v6ops-ula-usage-considerations@tools.ietf.org
Subject: Re: [v6ops] Review of draft-ietf-v6ops-ula-usage-considerations
X-BeenThere: v6ops@ietf.org
X-Mailman-Version: 2.1.15
Precedence: list
List-Id: v6ops discussion list <v6ops.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/v6ops>, <mailto:v6ops-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/v6ops/>
List-Post: <mailto:v6ops@ietf.org>
List-Help: <mailto:v6ops-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/v6ops>, <mailto:v6ops-request@ietf.org?subject=subscribe>
X-List-Received-Date: Wed, 10 Feb 2016 20:34:17 -0000

Thus spake Fernando Gont (fgont@si6networks.com) on Wed, Feb 10, 2016 at 01:21:50PM -0300:
> 
> * Section 3.2: Do folks really generate the prefixes as "required"?
> Me, I confess I've used things like fc00:1::/64 because they are simpler
> that some random string of bits.

I absolutely do not believe it can be expected that sites will generate 
random prefixes.   This will result in more NAT and all of the horror
stories from rfc1918 getting copied over.  For a while someone (SixXS?)
was running a ULA registry, but I am not sure what came of it.

In 5.1, the last paragraph states "Another important difference is the 
ability to merge two ULA networks without renumbering (because of the 
uniqueness), which is a big advantage over [RFC1918]."  So, should 
section 5.1 emphasize the importance of this uniqueness, or could 
this fit better somewhere else?

> * Section 4.2.2, page 9:
> > 
> >    o  DNS relevant: if administrators choose not to do reverse DNS
> >       delegation inside of their local control of ULA prefixes, a
> >       significant amount of information about the ULA population may
> >       leak to the outside world.  Because reverse queries will be made
> >       and naturally routed to the global reverse tree, so external
> >       parties will be exposed to the existence of a population of ULA
> >       addresses.  [ULA-IN-WILD] provides more detailed situations on
> >       this issue.  Administrators may need a split DNS to separate the
> >       queries from internal and external for ULA entries and GUA
> >       entries.
> 
> This text seems to imply that someone will do reverse mappings for ULAs.
> Could you please elaboate a bit on the scenario that you envision?

I thought rfc4193 section 4.4 covered DNS adequately, but I think the
claim here is that the recommendations won't be followed (notice a
theme?).  If a site doesn't (or can't) follow them, the recommendation
is to at least run with split dns views to mitigate.

Dale