Re: [v6ops] Fwd: New Version Notification for draft-collink-v6ops-ent64pd-01.txt

Vasilenko Eduard <vasilenko.eduard@huawei.com> Fri, 16 December 2022 10:40 UTC

Return-Path: <vasilenko.eduard@huawei.com>
X-Original-To: v6ops@ietfa.amsl.com
Delivered-To: v6ops@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id E792BC14CE56 for <v6ops@ietfa.amsl.com>; Fri, 16 Dec 2022 02:40:14 -0800 (PST)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -1.896
X-Spam-Level:
X-Spam-Status: No, score=-1.896 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, RCVD_IN_DNSWL_BLOCKED=0.001, RCVD_IN_MSPIKE_H2=-0.001, RCVD_IN_ZEN_BLOCKED_OPENDNS=0.001, SPF_HELO_NONE=0.001, SPF_PASS=-0.001, URIBL_BLOCKED=0.001, URIBL_DBL_BLOCKED_OPENDNS=0.001, URIBL_ZEN_BLOCKED_OPENDNS=0.001] autolearn=ham autolearn_force=no
Received: from mail.ietf.org ([50.223.129.194]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id Wf-7AKWuH_Mn for <v6ops@ietfa.amsl.com>; Fri, 16 Dec 2022 02:40:13 -0800 (PST)
Received: from frasgout.his.huawei.com (frasgout.his.huawei.com [185.176.79.56]) (using TLSv1.2 with cipher AECDH-AES256-SHA (256/256 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id EBE08C185B94 for <v6ops@ietf.org>; Fri, 16 Dec 2022 02:40:12 -0800 (PST)
Received: from mscpeml100002.china.huawei.com (unknown [172.18.147.206]) by frasgout.his.huawei.com (SkyGuard) with ESMTP id 4NYQWB1hHwz67M49; Fri, 16 Dec 2022 18:36:22 +0800 (CST)
Received: from mscpeml500001.china.huawei.com (7.188.26.142) by mscpeml100002.china.huawei.com (7.188.26.75) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256) id 15.1.2375.34; Fri, 16 Dec 2022 13:40:10 +0300
Received: from mscpeml500001.china.huawei.com ([7.188.26.142]) by mscpeml500001.china.huawei.com ([7.188.26.142]) with mapi id 15.01.2375.034; Fri, 16 Dec 2022 13:40:10 +0300
From: Vasilenko Eduard <vasilenko.eduard@huawei.com>
To: Martin Hunek <martin.hunek@tul.cz>, V6 Ops List <v6ops@ietf.org>, Jen Linkova <furry13@gmail.com>
Thread-Topic: [v6ops] Fwd: New Version Notification for draft-collink-v6ops-ent64pd-01.txt
Thread-Index: AQHZETjbF5bVdeWrNUmrOPEmMfer3q5wUnEA
Date: Fri, 16 Dec 2022 10:40:10 +0000
Message-ID: <b186f9974fc04311b053ad030b49052a@huawei.com>
References: <167107554671.48477.568330207202509840@ietfa.amsl.com> <CAFU7BATp=gEB3S8AzhCYDMN3fzLQrYY9pzcWJ=LQnrjC9bRKEA@mail.gmail.com> <38341414.10thIPus4b@asclepius.adm.tul.cz>
In-Reply-To: <38341414.10thIPus4b@asclepius.adm.tul.cz>
Accept-Language: en-US, zh-CN
Content-Language: en-US
X-MS-Has-Attach:
X-MS-TNEF-Correlator:
x-originating-ip: [10.81.205.1]
Content-Type: text/plain; charset="utf-8"
Content-Transfer-Encoding: base64
MIME-Version: 1.0
X-CFilter-Loop: Reflected
Archived-At: <https://mailarchive.ietf.org/arch/msg/v6ops/AlMJVUwhj1YvKPy-DvLU5GBrSZs>
Subject: Re: [v6ops] Fwd: New Version Notification for draft-collink-v6ops-ent64pd-01.txt
X-BeenThere: v6ops@ietf.org
X-Mailman-Version: 2.1.39
Precedence: list
List-Id: v6ops discussion list <v6ops.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/v6ops>, <mailto:v6ops-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/v6ops/>
List-Post: <mailto:v6ops@ietf.org>
List-Help: <mailto:v6ops-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/v6ops>, <mailto:v6ops-request@ietf.org?subject=subscribe>
X-List-Received-Date: Fri, 16 Dec 2022 10:40:15 -0000

Hi Martin,
Would you have the same concern if DHCP-PD would delegate /96 to every host in the future?
It is an excellent alternative to shut down SLAAC in the far future. The majority of IPv6 problems are revolving around SLAAC.
Eduard
-----Original Message-----
From: v6ops [mailto:v6ops-bounces@ietf.org] On Behalf Of Martin Hunek
Sent: Friday, December 16, 2022 1:26 PM
To: V6 Ops List <v6ops@ietf.org>; Jen Linkova <furry13@gmail.com>
Subject: Re: [v6ops] Fwd: New Version Notification for draft-collink-v6ops-ent64pd-01.txt

Hello,

Even though this proposal has some merit, and it might be useful for some applications (tethering, virtualization, docker, ...), it is certainly not suitable for most devices. For this reason, I think it should not aim for "Best Current Practise" but, at the most, for "Informational" status.

In the introduction, you state that the client needs at least eight addresses even now. However, there is still a difference between 8 addresses and 2^64. Furthermore, even in IPv6, there are simply not enough addresses to cover it - not with current rules, anyway.

In chapter 4, you state that /32 should be enough. However, most organizations would not have /32. Organization != LIR. I do understand that large content providers, ISP, and some other big actors are LIRs, but not every big enterprise need to do business in the Internet domain. Such organizations would gain no benefit in becoming LIR. Because of the IPv4 shortage, we have all moved into a mindset where everyone needs to be an LIR to get address space. This is not true, or at least it should not be true. An LIR is a subject that gets an address space from RIR and assigns it to its customer. Back in the day, even ISPs were not LIRs.

In the RIPE region, a customer should be given at most /48 - if you want to assign more than that, it has to be authorized. The maximum /48 is less than your requirement of /32 or even /29 stated in chapter 4.

If you need examples of such enterprises, I do have two:

The first organization is a university. It does have former class B /16 IPv4 assignment and /48 IPv6 assignment. It actively uses about 100 VLANs and uses SLAAC mostly because it has been an early IPv6 adopter and now because of one mobile phone OS vendor (no DHCPv6 support). The university is slowly running out of IPv4 space as it is not using NAT. Also, it is not using DHCPv6-PD as network policy forbids connecting routers to its network. If all the devices started requiring /64 via PD, the university would be in the same situation as it is in IPv4 (64 - 48 = 16, which is the same as in IPv4 32 - 16 = 16).

The second organization is a small ISP. It has got /29 from RIPE. It has three geographical areas each /32. In every area, every POP has got /40. In every POP, every VLAN has got /48 (/64 for SLAAC, rest for PD). On every VLAN, there are /56s for customers via PD. This gives every customer, in theory, the possibility to assign 256 networks. That is enough for all residential customers right now. However, if the customer is using network segmentation (wired, wireless, guests, mgmt, reserve) and every device would require /64, it would easily limit the customer to 32 devices per VLAN. This is not sufficient. You may argue that ISP can allocate more. That would be true, but do you expect that ISPs would be willing to renumber the whole network?

In chapter 6, you state that the minimum prefix-length hint should be 64. I don't think that there is such a universal minimum value. The device (router) should request prefix length so it can saturate its need for addresses. If it is using the SLAAC, it is the /64 for VLAN, but it may have more than one VLAN. If it is using DHCPv6, it may request less than /64. It depends on the number of interfaces and autoconfiguration method in use.

In chapter 8, you wrote: "When the network supports both /64 per host and SLAAC as address assignment methods, it's highly desirable for the host NOT to use SLAAC and only use the prefix delegated via DHCPv6-PD. " Why?

If the device is, for example, a phone doing tethering, it would have two interfaces: up-facing rmnet0 and down-facing wlan0. What is wrong about the rmnet0 having SLAAC configured or DHCPv6 configured address on it, while routed network segment or wlan0 having DHCPv6-PD obtained prefix? How does it differ from what are routers doing nowadays? The same goes for virtualization or containers. If the device is routing, it is a router, so it should act like one. If it is not routing and it is bridging, then it is a bridge and should act like one. Furthermore, if it is a bridge, it should just act as transparent and forward ND packets and DHCPv6 packets like any other bridge. There is no need for anything in between.

In chapter 9, it is stated:

"The network needs to scale to the number of devices" with /64 per device; it scales worse than with /128 per device. This is the fact as it is limited by prefix length.

"The cost of having multiple addresses is offloaded to the endpoint. Devices are free to create and use as many addresses as they need" for the cost that every device becomes a router.

"Fate sharing: all global addresses used by a given device are routed as a single /64. Either all of them work or not, which makes the failures easier to diagnoze and mitigate" Is it really better to lose connection also for the virtualization host?

Chapter 10: The DHCPv6-PD is not an alternative to SLAAC the DHCPv6 is. This is just moving the router functionality into the client device, and auto-config has to be used inside it.

Let me be clear that I have nothing against a client asking about PD when it has a need for it - when it is routing traffic. So if it has an independent L3 network segment connected to it and it needs to provide Internet access to it, then it is fine by me. However, if every device would ask PD automatically regardless being router or not, that would create quite a mess. This draft actually scares me as a network administrator of the large non-LIR network and also as a netadmin of the small ISP. In both cases, either organization or customers would run out of IPv6 addresses. It is effectively dividing address length by 2.

Sincerely,
Martin Hunek

Dne čtvrtek 15. prosince 2022 4:59:33 CET, Jen Linkova napsal(a):
> Hello,
> 
> We've just submitted -01 version of draft-collink-v6ops-ent64pd, which 
> proposes using DHCPv6-PD to delete /64 per host (the draft was very 
> briefly presented at the last IETF).
> 
> Comments and suggestions are welcome!
> 
> 
> ---------- Forwarded message ---------
> From: <internet-drafts@ietf.org>
> Date: Thu, Dec 15, 2022 at 2:39 PM
> Subject: New Version Notification for 
> draft-collink-v6ops-ent64pd-01.txt
> To: Jen Linkova <furry13@gmail.com>, Lorenzo Colitti 
> <lorenzo@google.com>, Xiao Ma <xiaom@google.com>
> 
> 
> 
> A new version of I-D, draft-collink-v6ops-ent64pd-01.txt
> has been successfully submitted by Jen Linkova and posted to the IETF 
> repository.
> 
> Name:           draft-collink-v6ops-ent64pd
> Revision:       01
> Title:          Using DHCP-PD to Allocate /64 per Host in Broadcast Networks
> Document date:  2022-12-14
> Group:          Individual Submission
> Pages:          11
> URL:
> https://www.ietf.org/archive/id/draft-collink-v6ops-ent64pd-01.txt
> Status:         https://datatracker.ietf.org/doc/draft-collink-v6ops-ent64pd/
> Html:
> https://www.ietf.org/archive/id/draft-collink-v6ops-ent64pd-01.html
> Htmlized:
> https://datatracker.ietf.org/doc/html/draft-collink-v6ops-ent64pd
> Diff:
> https://author-tools.ietf.org/iddiff?url2=draft-collink-v6ops-ent64pd-
> 01
> 
> Abstract:
>    This document discusses the IPv6 deployment scenario when individual
>    hosts connected to broadcast networks (like WiFi hotspots or
>    enterprise networks) are allocated /64 subnets via DHCP-PD.
> 
> 
> 
> 
> The IETF Secretariat
> 
> 
> 
> 
>