Re: [v6ops] Please review the No IPv4 draft

Nick Hilliard <nick@foobar.org> Tue, 29 April 2014 12:23 UTC

Return-Path: <nick@foobar.org>
X-Original-To: v6ops@ietfa.amsl.com
Delivered-To: v6ops@ietfa.amsl.com
Received: from localhost (ietfa.amsl.com [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 144E71A08BB for <v6ops@ietfa.amsl.com>; Tue, 29 Apr 2014 05:23:12 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -1.9
X-Spam-Level:
X-Spam-Status: No, score=-1.9 tagged_above=-999 required=5 tests=[BAYES_00=-1.9] autolearn=ham
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id IxxR-2XBd3Dn for <v6ops@ietfa.amsl.com>; Tue, 29 Apr 2014 05:23:09 -0700 (PDT)
Received: from mail.netability.ie (mail.netability.ie [IPv6:2a03:8900:0:100::5]) by ietfa.amsl.com (Postfix) with ESMTP id D032A1A078B for <v6ops@ietf.org>; Tue, 29 Apr 2014 05:23:08 -0700 (PDT)
X-Envelope-To: v6ops@ietf.org
Received: from crumpet.local (089-101-195154.ntlworld.ie [89.101.195.154] (may be forged)) (authenticated bits=0) by mail.netability.ie (8.14.8/8.14.5) with ESMTP id s3TCN5jt071009 (version=TLSv1/SSLv3 cipher=DHE-RSA-AES128-SHA bits=128 verify=NO); Tue, 29 Apr 2014 13:23:06 +0100 (IST) (envelope-from nick@foobar.org)
X-Authentication-Warning: cheesecake.netability.ie: Host 089-101-195154.ntlworld.ie [89.101.195.154] (may be forged) claimed to be crumpet.local
Message-ID: <535F99A9.3030402@foobar.org>
Date: Tue, 29 Apr 2014 13:23:05 +0100
From: Nick Hilliard <nick@foobar.org>
User-Agent: Mozilla/5.0 (Macintosh; Intel Mac OS X 10.9; rv:24.0) Gecko/20100101 Thunderbird/24.4.0
MIME-Version: 1.0
To: Ted Lemon <ted.lemon@nominum.com>
References: <9B4139A3-77F7-4109-93AD-A822395E5007@nominum.com> <m24n1l8i1a.wl%Niall.oReilly@ucd.ie> <3BA3E5A3-4385-43CE-B73F-A0686AA31B4E@nominum.com> <m238gxpgrt.wl%Niall.oReilly@ucd.ie> <73221D87-5F50-4689-AA42-553AF757ABF5@nominum.com> <m2mwf59uht.wl%Niall.oReilly@ucd.ie> <7310412C-64E9-4A11-9812-92A969082131@nominum.com> <20140428190804.GK43641@Space.Net> <446A720E-1128-4FFF-BB3B-780EACA9610B@nominum.com> <535EBC20.10900@foobar.org> <20140428213045.GL511@havarti.local> <19B5B5AB-FF86-408B-8E73-D5350853965B@foobar.org> <3563D9EE-CD40-4E75-A1CB-C3FB50EEEBC4@nominum.com> <535F3624.4020801@foobar.org> <alpine.DEB.2.02.1404290726011.29282@uplift.swm.pp.se> <535F3A8C.2050902@foobar.org> <E68028C1-2E6D-4D07-A113-60757457E286@nominum.com>
In-Reply-To: <E68028C1-2E6D-4D07-A113-60757457E286@nominum.com>
X-Enigmail-Version: 1.6
Content-Type: text/plain; charset="ISO-8859-1"
Content-Transfer-Encoding: 7bit
Archived-At: http://mailarchive.ietf.org/arch/msg/v6ops/AjjsGBo-humHeSdc7LlJV1PPFEI
Cc: "v6ops@ietf.org WG" <v6ops@ietf.org>
Subject: Re: [v6ops] Please review the No IPv4 draft
X-BeenThere: v6ops@ietf.org
X-Mailman-Version: 2.1.15
Precedence: list
List-Id: v6ops discussion list <v6ops.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/v6ops>, <mailto:v6ops-request@ietf.org?subject=unsubscribe>
List-Archive: <http://www.ietf.org/mail-archive/web/v6ops/>
List-Post: <mailto:v6ops@ietf.org>
List-Help: <mailto:v6ops-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/v6ops>, <mailto:v6ops-request@ietf.org?subject=subscribe>
X-List-Received-Date: Tue, 29 Apr 2014 12:23:12 -0000

On 29/04/2014 12:57, Ted Lemon wrote:
> For you it seems to boil down to
> "because virtualization software from VMware and Cisco has serious
> limitations with respect to IPv6." 

No.  I was just clarifying a particular point about a particular question
you had about certain forms of ipv6 support on a specific line of cisco kit
which I happen to be familiar with.

If you do a stack unwind of this conversation:

- it is currently not possible to run large scale ipv6 shared L2 domains on
specific (albeit market leader) hypervisor platforms, which is a subset of
a much bigger problem:

 - dhcpv6 guard / ra guard support is not supported on plenty of types of
kit from a wide variety of vendors (link provided to show the scale of this
problem), which means that:

  - from an operational point of view, the poor support for dhcpv6/ra guard
is a general reason why, given the choice between using either (dhcpv4) or
(dhcpv6 + ra) for ending up with the same outcome, it would be
operationally more attractive to use dhcpv4,

   - which is only one of many reasons that a bunch of people have put
forward to suggest that dhcpv4 might be a better choice as a transport
mechanism for delivering the bits specified in draft-ietf-sunset4-noipv4,

    - assuming that the basic idea of having a signal to shut down ipv4
services as specified in the draft is a sensible idea in the first place.

Nick