Re: [v6ops] Éric Vyncke's No Objection on draft-ietf-v6ops-nat64-deployment-06: (with COMMENT)

"Mudric, Dusan (Dusan)" <dmudric@avaya.com> Mon, 08 July 2019 17:05 UTC

Return-Path: <dmudric@avaya.com>
X-Original-To: v6ops@ietfa.amsl.com
Delivered-To: v6ops@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id D553D120288; Mon, 8 Jul 2019 10:05:48 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -6.899
X-Spam-Level:
X-Spam-Status: No, score=-6.899 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, DKIM_SIGNED=0.1, DKIM_VALID=-0.1, RCVD_IN_DNSWL_HI=-5, SPF_HELO_NONE=0.001, SPF_PASS=-0.001, URIBL_BLOCKED=0.001] autolearn=ham autolearn_force=no
Authentication-Results: ietfa.amsl.com (amavisd-new); dkim=pass (1024-bit key) header.d=avaya365.onmicrosoft.com
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id QN8GguAy-F-w; Mon, 8 Jul 2019 10:05:45 -0700 (PDT)
Received: from p-us1-iereast-outbound.us1.avaya.com (p-us1-iereast-outbound.us1.avaya.com [135.11.29.13]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id CE46212029B; Mon, 8 Jul 2019 10:05:28 -0700 (PDT)
X-IronPort-Anti-Spam-Filtered: true
X-IronPort-Anti-Spam-Result: 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
X-IPAS-Result: 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
X-IronPort-AV: E=Sophos;i="5.63,466,1557201600"; d="scan'208";a="354786397"
Received: from unknown (HELO co300216-co-erhwest.avaya.com) ([198.152.7.5]) by p-us1-iereast-outbound.us1.avaya.com with ESMTP; 08 Jul 2019 13:05:25 -0400
X-OutboundMail_SMTP: 1
Received: from unknown (HELO AZ-US1EXHC02.global.avaya.com) ([135.11.85.13]) by co300216-co-erhwest-out.avaya.com with ESMTP/TLS/DHE-RSA-AES256-GCM-SHA384; 08 Jul 2019 13:05:26 -0400
Received: from PWEXCVMAP02.global.avaya.com (135.11.85.81) by AZ-US1EXHC02.global.avaya.com (135.11.85.13) with Microsoft SMTP Server (TLS) id 14.3.439.0; Mon, 8 Jul 2019 13:05:24 -0400
Received: from PWEXCVMAP01.global.avaya.com (135.11.85.80) by PWEXCVMAP02.global.avaya.com (135.11.85.81) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256) id 15.1.1531.3; Mon, 8 Jul 2019 13:05:24 -0400
Received: from PW365VMAP01.avaya.com (135.11.29.21) by PWEXCVMAP01.global.avaya.com (135.11.85.80) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256) id 15.1.1531.3 via Frontend Transport; Mon, 8 Jul 2019 13:05:24 -0400
Received: from NAM05-BY2-obe.outbound.protection.outlook.com (104.47.50.54) by PW365VMAP01.avaya.com (135.11.29.21) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA384_P256) id 15.1.1531.3; Mon, 8 Jul 2019 12:05:24 -0500
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=Avaya365.onmicrosoft.com; s=selector1-Avaya365-onmicrosoft-com; h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-SenderADCheck; bh=qWZBVMXmKdAqewZLwGlRQcoG18MUbUPcITG6yY6fpGw=; b=Q72BmmY1yoBCI9XDuWXxdKXy5WYGSNMAsAf1n6v+eUrZPiDko7rZAm0IpePh0IcNk3icTI+aQhiZCh/Kkhitl//mtR4tyJFnJb/3mHfEjAfuOif0MgUVBv9dzcceMH3Pld1PXqfhJYqcDtOZ+jGNFiCESxnlstMTwZ2C6mqYXzQ=
Received: from DM6PR15MB2506.namprd15.prod.outlook.com (20.176.71.32) by DM6PR15MB2218.namprd15.prod.outlook.com (20.176.66.148) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id 15.20.2052.16; Mon, 8 Jul 2019 17:05:22 +0000
Received: from DM6PR15MB2506.namprd15.prod.outlook.com ([fe80::e0dd:fb47:323c:d5ac]) by DM6PR15MB2506.namprd15.prod.outlook.com ([fe80::e0dd:fb47:323c:d5ac%7]) with mapi id 15.20.2052.020; Mon, 8 Jul 2019 17:05:22 +0000
From: "Mudric, Dusan (Dusan)" <dmudric@avaya.com>
To: JORDI PALET MARTINEZ <jordi.palet=40consulintel.es@dmarc.ietf.org>, Éric Vyncke <evyncke@cisco.com>, The IESG <iesg@ietf.org>
CC: "v6ops@ietf.org" <v6ops@ietf.org>, "draft-ietf-v6ops-nat64-deployment@ietf.org" <draft-ietf-v6ops-nat64-deployment@ietf.org>, "v6ops-chairs@ietf.org" <v6ops-chairs@ietf.org>
Thread-Topic: [v6ops] Éric Vyncke's No Objection on draft-ietf-v6ops-nat64-deployment-06: (with COMMENT)
Thread-Index: AQHVNQqR9AuYKo+zy0GlsxLQOHlx1KbA88Uw
Date: Mon, 08 Jul 2019 17:05:21 +0000
Message-ID: <DM6PR15MB25060E17A5E8CDBF2B01C0B8BBF60@DM6PR15MB2506.namprd15.prod.outlook.com>
References: <156250429326.14626.2912462164177679261.idtracker@ietfa.amsl.com> <75A5EB61-3879-4F83-83BB-D65EE8799AF3@consulintel.es>
In-Reply-To: <75A5EB61-3879-4F83-83BB-D65EE8799AF3@consulintel.es>
Accept-Language: en-US
Content-Language: en-US
X-MS-Has-Attach:
X-MS-TNEF-Correlator:
authentication-results: spf=none (sender IP is ) smtp.mailfrom=dmudric@avaya.com;
x-originating-ip: [104.129.196.166]
x-ms-publictraffictype: Email
x-ms-office365-filtering-correlation-id: 93003c28-52a7-46ba-bbdc-08d703c67671
x-microsoft-antispam: BCL:0; PCL:0; RULEID:(2390118)(7020095)(4652040)(8989299)(4534185)(7168020)(4627221)(201703031133081)(201702281549075)(8990200)(5600148)(711020)(4605104)(1401327)(2017052603328)(7193020); SRVR:DM6PR15MB2218;
x-ms-traffictypediagnostic: DM6PR15MB2218:
x-ms-exchange-purlcount: 2
x-microsoft-antispam-prvs: <DM6PR15MB2218DF755E1DB51A3B643581BBF60@DM6PR15MB2218.namprd15.prod.outlook.com>
x-ms-oob-tlc-oobclassifiers: OLM:7219;
x-forefront-prvs: 00922518D8
x-forefront-antispam-report: SFV:NSPM; SFS:(10009020)(4636009)(136003)(366004)(346002)(39860400002)(396003)(376002)(199004)(189003)(51444003)(13464003)(52536014)(53936002)(71200400001)(3846002)(71190400001)(186003)(110136005)(6116002)(76176011)(25786009)(55016002)(86362001)(7696005)(5024004)(30864003)(76116006)(53546011)(66476007)(102836004)(224303003)(6506007)(54906003)(256004)(99286004)(316002)(9686003)(14444005)(6306002)(966005)(446003)(26005)(8936002)(66574012)(305945005)(66066001)(4326008)(81166006)(7736002)(14454004)(55236004)(66946007)(68736007)(5660300002)(81156014)(6246003)(486006)(2906002)(73956011)(74316002)(33656002)(19627235002)(476003)(66446008)(11346002)(229853002)(66556008)(64756008)(478600001)(6436002); DIR:OUT; SFP:1101; SCL:1; SRVR:DM6PR15MB2218; H:DM6PR15MB2506.namprd15.prod.outlook.com; FPR:; SPF:None; LANG:en; PTR:InfoNoRecords; A:1; MX:1;
received-spf: None (protection.outlook.com: avaya.com does not designate permitted sender hosts)
x-ms-exchange-senderadcheck: 1
x-microsoft-antispam-message-info: jtZFxV+a+WWsbfHjgP2RTg8y8C/eo76JyPCQXwg7mLuT4YqN+whpPI6TPk/GKDsJhalDqjGcoNpvG6ZZpcbMmm6SDNTMcgWBkmdn3PV5ifulRVAk2X19T2w+RZ48qw2VPEcNl3H+94xmamVhb/5j5Zj+OgGi2C2E9IACh3mR1xnS2CApLobRwBFWrvN4Wx3K9E6q6rdMcecQyQkM2dHpZFtKjE+FRFZQ7abDGvrKLg0i7Jny3+NUlsXviHyjERysHFz+80xoszk90mF+NhBMKk/VN1fqK7a3csYzu3N35Tb+MsCyKU8I/CNeV3/qTxQcz+0BmyhdBKanZcoJrnOBjdckPkXThEOwtdb8U//uob4BkGvmSpkuKmgSgI44K9NrQbzMQ9w4y7pa8DpeNmdAo+h7o+zmNKcAAMNYx4CFjsw=
Content-Type: text/plain; charset="utf-8"
Content-Transfer-Encoding: base64
MIME-Version: 1.0
X-MS-Exchange-CrossTenant-Network-Message-Id: 93003c28-52a7-46ba-bbdc-08d703c67671
X-MS-Exchange-CrossTenant-originalarrivaltime: 08 Jul 2019 17:05:21.9978 (UTC)
X-MS-Exchange-CrossTenant-fromentityheader: Hosted
X-MS-Exchange-CrossTenant-id: 04a2636c-326d-48ff-93f8-709875bd3aa9
X-MS-Exchange-CrossTenant-mailboxtype: HOSTED
X-MS-Exchange-CrossTenant-userprincipalname: dmudric@avaya.com
X-MS-Exchange-Transport-CrossTenantHeadersStamped: DM6PR15MB2218
X-OriginatorOrg: avaya.com
Archived-At: <https://mailarchive.ietf.org/arch/msg/v6ops/AnEbM8k8wyL6WoCHEi5HGha6S08>
Subject: Re: [v6ops] Éric Vyncke's No Objection on draft-ietf-v6ops-nat64-deployment-06: (with COMMENT)
X-BeenThere: v6ops@ietf.org
X-Mailman-Version: 2.1.29
Precedence: list
List-Id: v6ops discussion list <v6ops.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/v6ops>, <mailto:v6ops-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/v6ops/>
List-Post: <mailto:v6ops@ietf.org>
List-Help: <mailto:v6ops-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/v6ops>, <mailto:v6ops-request@ietf.org?subject=subscribe>
X-List-Received-Date: Mon, 08 Jul 2019 17:05:56 -0000

Section 3.3:

"if the network must
   support applications using any of the following:

   o  IPv4-only hosts or applications

   Then, only the scenarios with 464XLAT, a CLAT function, or equivalent
   built-in local address synthesis features, will provide a valid
   solution."

Which document explains how 464XLAT and a CLAT function provide connectivity from IPv4only-host to IPv6only-host?

Thanks,
Dusan.


> -----Original Message-----
> From: v6ops <v6ops-bounces@ietf.org> On Behalf Of JORDI PALET
> MARTINEZ
> Sent: Sunday, July 7, 2019 5:24 PM
> To: Éric Vyncke <evyncke@cisco.com>; The IESG <iesg@ietf.org>
> Cc: v6ops@ietf.org; draft-ietf-v6ops-nat64-deployment@ietf.org; v6ops-
> chairs@ietf.org
> Subject: Re: [v6ops] Éric Vyncke's No Objection on draft-ietf-v6ops-nat64-
> deployment-06: (with COMMENT)
> 
> Hi Eric,
> 
> Thanks a lot for your review!
> 
> Comments in-line below. Most of them I will reword some text or correct
> nits, but there are a couple of questions for you to clarify.
> 
> Regards,
> Jordi
> @jordipalet
> 
> 
> 
> El 7/7/19 14:59, "v6ops en nombre de Éric Vyncke via Datatracker" <v6ops-
> bounces@ietf.org en nombre de noreply@ietf.org> escribió:
> 
>     Éric Vyncke has entered the following ballot position for
>     draft-ietf-v6ops-nat64-deployment-06: No Objection
> 
>     When responding, please keep the subject line intact and reply to all
>     email addresses included in the To and CC lines. (Feel free to cut this
>     introductory paragraph, however.)
> 
> 
>     Please refer to https://urldefense.proofpoint.com/v2/url?u=https-
> 3A__www.ietf.org_iesg_statement_discuss-
> 2Dcriteria.html&d=DwIGaQ&c=BFpWQw8bsuKpl1SgiZH64Q&r=UT3Bk9cbLeaJ
> xhf3iCrhIoUWB8YLZU23029sMQGQ2kY&m=_E9ZufQAIc5wlVLDWKPA2DvW0t
> rvZwSDh5SnT8LOzdg&s=LwRXKT1d-8SS5QiUbHNrp33o3TBAeLqgs9RN-
> UwC0Yg&e=
>     for more information about IESG DISCUSS and COMMENT positions.
> 
> 
>     The document, along with other ballot positions, can be found here:
>     https://urldefense.proofpoint.com/v2/url?u=https-
> 3A__datatracker.ietf.org_doc_draft-2Dietf-2Dv6ops-2Dnat64-
> 2Ddeployment_&d=DwIGaQ&c=BFpWQw8bsuKpl1SgiZH64Q&r=UT3Bk9cbLe
> aJxhf3iCrhIoUWB8YLZU23029sMQGQ2kY&m=_E9ZufQAIc5wlVLDWKPA2DvW
> 0trvZwSDh5SnT8LOzdg&s=PHW-
> a847Dg670Srlft54euH86mfhpwcaNiqzcBPS8v4&e=
> 
> 
> 
>     ----------------------------------------------------------------------
>     COMMENT:
>     ----------------------------------------------------------------------
> 
>     Hello Jordi,
> 
>     Thank you  for the work put into this clear and well-written document.
> 
>     I only wonder whether section 3 and section 4 should be swapped for a
> more
>     logical flow: explain the issues, then describe working solutions. Probably
> too
>     late in the publication to change though.
> 
> I think that will be a major change, because I've a lot of references to the
> "possible" deployment scenarios to explain the different issues. My "flow"
> was thinking in how you can deploy it, and then what are the issues that you
> need to consider.
> 
>     The underlying message of "464XLAT solves everything" is annoying but I
> must
>     admit that this is true ;-)
> 
> This document started as 464XLAT deployment guidelines, and the WG asked
> me to turn it also to "NAT64". I think that explains it, but in any case, as you
> well say, it is true ... and there is explicit text to indicate that if you're sure
> that everything inside the network is supporting IPv6, no literals, etc., then it
> may be fine with just NAT64. However we all know that this is a non-realistic
> scenario.
> 
>     Please find below many COMMENTs in the hope of improving the
> readability and
>     factual data points in the document.
> 
>     -éric
> 
>     == COMMENTS ==
> 
>     Is there a description of the use of DNS64 in the host as it fixes the DNSSEC
>     issues ? (except in section 3.2.2.)
> 
> Not sure to completely understand what you mean here, just trying ... This is
> not something that the service provider can solve, as it is up to the OS (for all
> the devices in that network). That's why I think is not something for this
> document. However, I just realized that this is described in section 7.2 of
> RFC6147. I can add a reference to that in section 3.2.2.
> 
>     -- Section 3.1 --
> 
>     "known to work": can you add references or data backing this statement ?
> 
> Well, those are the models being used today in cellular and broadband
> networks. So I can just say that?
> 
>     -- Section 3.1.1 --
> 
>     When discussing scenarii, please refer to the figure ID in the text for clarity.
> 
> Done (I'm already editing a new version while writing this, pending on some
> that you can provide to my comments).
> 
>     -- Section 3.1.2 --
> 
>     It is unclear to me whether "The support of this scenario" refers to the
>     UE-only or the CPE deployment.
> 
> It is referring to the "service provider network support". Will clarify it.
> 
>     Same demand as above: please refer to the figure ID in the text for clarity.
> 
> Done!
> 
>     -- Sectio 3.2.1 --
> 
>     I really wonder whether it is useful to describe this scenario as 'working
>     under special conditions'... those 'special conditions' will probably never
> met
>     in real life.
> 
>     More generally, I am unsure about the value of the whole section 3.2 (it is
>     more like an academic thing).
> 
> I think some of those scenarios are possible in some networks, may be not
> connecting to Internet, or for example, you may want to configure explicit
> mappings, which can be done with EAM. I just realized that I've not cited
> that. I will do.
> 
>     -- Section 4.1.1. --
> 
>     Can you add reference and/or data for "monitored by some governmental
> bodies
>     and other institutions".
> 
> I believe that was pointed out by somebody in the WG, but it is true that
> some regulators do that. I recall having seen something about that in France,
> but I'm not 100% sure right now.
> 
>     Please add a reference for the use of "ipv4only.arpa". AFAIK
> 
> Right, this is defined by RFC7050, done!
> 
>     draft-cheshire-sudn-ipv4only-dot-arpa appears to be dormant/dead.
> 
> This is one of the issues that I've commented with Warren, responding to
> IANA. I understand he is sponsoring that document.
> 
> 
>     -- Section 4.1.2 --
> 
>     The leading paragraph is a little confusing as it assumed that CLAT exists
>     (stated in the text but not in the section title).
> 
> Will clarify it.
> 
>     -- Section 4.1.5 --
> 
>     The section title is rather misleading "ACL of clients" and I wonder why a
>     dual-stack client would use a DNS64 server as its recursive DNS server. Isn't
>     it an obvious configuration mistake?
> 
> No, I think that text is correct, but I will try to reword it to make it clearer. You
> may have a situation with IPv4-only servers, which are located, in the path
> between the dual-stack hosts and the NAT64. So, if the DNS64 is not
> configured to exclude those servers, it will synthetize the AAAA records and
> they will become unreachable. So that's why bind and other DNS64 servers
> provide this ACL function.
> 
>     -- Section 4.4.1 --
> 
>     Some explanations of the consequences of a foreign DNS would be
> welcome.
> 
> Done!
> 
>     -- Section 4.4.2 --
> 
>     Rather than using "DNS privacy" please use "DNS request confidentiality"
> as the
>     DNS64 will learn/glean about the client activities.
> 
> I used this terminology as it was suggested as the common one for the
> different protocols in this category. I will try to confirm if is the right one just
> in case. May be rewording the title as "DNS Privacy/Encryption Mechanisms"
> ?
> 
> 
> 
>     -- Section 4.6 --
> 
>     Please explain why older API is a problem (or rather rephrase it into
>     applications using IPv4-only API).
> 
> Done!
> 
>     -- Section 4.10 --
> 
>     draft-ietf-tram-turnbis is also able to support IPv6-only client. It is
>     currently in the same IESG status as this document.
> 
> Definitively, will add a reference to it!
> 
>     -- Section 5 --
> 
>     Please add data/references for "with hundreds of millions of users"
> 
> I can cite several cellular networks, but I will do in a generic way, I don't think
> we should mention explicit providers, right?.
> 
>     -- Section 7 --
> 
>     Not so much about security but about privacy. I would appreciate to have
> some
>     text around the lack of privacy when using an external DNS64 as this server
>     will learn about all clients activities.
> 
> Good point, thanks. Will do!
> 
>     == NITS ==
> 
>     Generally, please refrain from using "HEv2" in place of "Happy Eyeball
> version
>     2".
> 
> Done!
> 
>     -- Section 3.1.1. --
> 
>     Figure 1 shows a box containing both NAT64 and DNS64 while those
> functions
>     could reside in different devices.
> 
> Will clarify it.
> 
>     s/One more equivalent scenario/One additional equivalent scenario/ ?
> 
> Done!
> 
>     -- Section 4.1 --
> 
>     s/to an IPv6-only WAN/to an IPv6-only access network/
> 
> Done!
> 
> 
>     _______________________________________________
>     v6ops mailing list
>     v6ops@ietf.org
>     https://urldefense.proofpoint.com/v2/url?u=https-
> 3A__www.ietf.org_mailman_listinfo_v6ops&d=DwIGaQ&c=BFpWQw8bsuKp
> l1SgiZH64Q&r=UT3Bk9cbLeaJxhf3iCrhIoUWB8YLZU23029sMQGQ2kY&m=_E9
> ZufQAIc5wlVLDWKPA2DvW0trvZwSDh5SnT8LOzdg&s=wOPWzlIjnoqYXR0OM
> bl5dJswrnnMmmTX2ymOmmJ0Rfo&e=
> 
> 
> 
> 
> **********************************************
> IPv4 is over
> Are you ready for the new Internet ?
> https://urldefense.proofpoint.com/v2/url?u=http-
> 3A__www.theipv6company.com&d=DwIGaQ&c=BFpWQw8bsuKpl1SgiZH64
> Q&r=UT3Bk9cbLeaJxhf3iCrhIoUWB8YLZU23029sMQGQ2kY&m=_E9ZufQAIc5
> wlVLDWKPA2DvW0trvZwSDh5SnT8LOzdg&s=DJpxsc514-
> zcfBAFS4ksUO1Az_LzLKo1Da80uIg60JA&e=
> The IPv6 Company
> 
> This electronic message contains information which may be privileged or
> confidential. The information is intended to be for the exclusive use of the
> individual(s) named above and further non-explicilty authorized disclosure,
> copying, distribution or use of the contents of this information, even if
> partially, including attached files, is strictly prohibited and will be considered a
> criminal offense. If you are not the intended recipient be aware that any
> disclosure, copying, distribution or use of the contents of this information,
> even if partially, including attached files, is strictly prohibited, will be
> considered a criminal offense, so you must reply to the original sender to
> inform about this communication and delete it.
> 
> 
> 
> _______________________________________________
> v6ops mailing list
> v6ops@ietf.org
> https://urldefense.proofpoint.com/v2/url?u=https-
> 3A__www.ietf.org_mailman_listinfo_v6ops&d=DwIGaQ&c=BFpWQw8bsuKp
> l1SgiZH64Q&r=UT3Bk9cbLeaJxhf3iCrhIoUWB8YLZU23029sMQGQ2kY&m=_E9
> ZufQAIc5wlVLDWKPA2DvW0trvZwSDh5SnT8LOzdg&s=wOPWzlIjnoqYXR0OM
> bl5dJswrnnMmmTX2ymOmmJ0Rfo&e=