Re: [v6ops] Fwd: New Version Notificationfor draft-troan-v6ops-6to4-to-historic-00

Fred Baker <fred@cisco.com> Mon, 07 February 2011 19:12 UTC

Return-Path: <fred@cisco.com>
X-Original-To: v6ops@core3.amsl.com
Delivered-To: v6ops@core3.amsl.com
Received: from localhost (localhost [127.0.0.1]) by core3.amsl.com (Postfix) with ESMTP id 4152C3A6E5C for <v6ops@core3.amsl.com>; Mon, 7 Feb 2011 11:12:02 -0800 (PST)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -109.999
X-Spam-Level:
X-Spam-Status: No, score=-109.999 tagged_above=-999 required=5 tests=[BAYES_00=-2.599, J_CHICKENPOX_13=0.6, RCVD_IN_DNSWL_HI=-8, USER_IN_WHITELIST=-100]
Received: from mail.ietf.org ([64.170.98.32]) by localhost (core3.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id u3eQr-M87ugw for <v6ops@core3.amsl.com>; Mon, 7 Feb 2011 11:11:56 -0800 (PST)
Received: from sj-iport-5.cisco.com (sj-iport-5.cisco.com [171.68.10.87]) by core3.amsl.com (Postfix) with ESMTP id E46923A6E4E for <v6ops@ietf.org>; Mon, 7 Feb 2011 11:11:53 -0800 (PST)
Authentication-Results: sj-iport-5.cisco.com; dkim=neutral (message not signed) header.i=none
X-IronPort-Anti-Spam-Filtered: true
X-IronPort-Anti-Spam-Result: AvsEACrTT02rR7Hu/2dsb2JhbAClNXOeSpsMhVoEhHqGbYMu
Received: from sj-core-5.cisco.com ([171.71.177.238]) by sj-iport-5.cisco.com with ESMTP; 07 Feb 2011 19:11:58 +0000
Received: from Freds-Computer.local (stealth-10-32-244-222.cisco.com [10.32.244.222]) by sj-core-5.cisco.com (8.13.8/8.14.3) with ESMTP id p17JBrb5003478; Mon, 7 Feb 2011 19:11:58 GMT
Received: from [127.0.0.1] by Freds-Computer.local (PGP Universal service); Mon, 07 Feb 2011 11:11:58 -0800
X-PGP-Universal: processed; by Freds-Computer.local on Mon, 07 Feb 2011 11:11:58 -0800
Mime-Version: 1.0 (Apple Message framework v1082)
From: Fred Baker <fred@cisco.com>
In-Reply-To: <E1829B60731D1740BB7A0626B4FAF0A65C6839FA3C@XCH-NW-01V.nw.nos.boeing.com>
Date: Mon, 07 Feb 2011 11:11:43 -0800
Message-Id: <403A8B8B-169C-48B8-BD2F-81B2C61176D9@cisco.com>
References: <371579432.25658.1297097008610.JavaMail.root@claudius.linpro.no> <61983A9F-7871-4DB8-9BB8-C4CF6691850D@network-heretics.com> <20110207175624.GA929@srv03.cluenet.de> <E1829B60731D1740BB7A0626B4FAF0A65C6839FA3C@XCH-NW-01V.nw.nos.boeing.com>
To: "Templin, Fred L" <Fred.L.Templin@boeing.com>
X-Mailer: Apple Mail (2.1082)
Content-Type: text/plain; charset="us-ascii"
Content-Transfer-Encoding: quoted-printable
Cc: IPv6 Operations <v6ops@ietf.org>
Subject: Re: [v6ops] Fwd: New Version Notificationfor draft-troan-v6ops-6to4-to-historic-00
X-BeenThere: v6ops@ietf.org
X-Mailman-Version: 2.1.9
Precedence: list
List-Id: v6ops discussion list <v6ops.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/listinfo/v6ops>, <mailto:v6ops-request@ietf.org?subject=unsubscribe>
List-Archive: <http://www.ietf.org/mail-archive/web/v6ops>
List-Post: <mailto:v6ops@ietf.org>
List-Help: <mailto:v6ops-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/v6ops>, <mailto:v6ops-request@ietf.org?subject=subscribe>
X-List-Received-Date: Mon, 07 Feb 2011 19:12:02 -0000

On Feb 7, 2011, at 10:04 AM, Templin, Fred L wrote:
> Why not something better? Why not IRON:

"Better" is a value judgement, a comparison of a proposed solution with a set of requirements, and is often somewhat in the eye of the beholder.

I think it would be fair to say that the objective of v6ops is to deploy, operate, and maintain a ubiquitous IPv6 network comparable to the IPv4 network of today and independent of any underlying infrastructure. There may well be underlying infrastructure of various kinds - ATM, MPLS, various WAN technologies, or "Ethernet" in whatever form it may appear at the moment. However, the networks that the operators on this list operate are not networks in which one expects hosts to dynamically place circuits on an infrastructure of a different kind to provide service, but to operate as a ubiquitous and stable service. 

It may be fair to ask each type of technology to describe its relationship to that kind of service, and to carefully consider the operational implications of running it. That's where Ole is coming from in suggesting that RFC 3056 be retired; it depends on an underlying infrastructure (IPv4 addressing and anycast servers), and has been a source of problems for ISPs trying to deploy native IPv6 service as noted in RFCs 3964 and 4472, and in the drafts draft-ietf-v6ops-tunnel-loops, draft-ietf-v6ops-tunnel-security-concerns, draft-kuarsingh-v6ops-6to4-provider-managed-tunnel, and draft-vandevelde-v6ops-harmful-tunnels. That is also at least in part where questions of other overlay networks like Teredo come in.

If I can summarize Keith's concern with 6rd, it is not that it doesn't deploy an IPv6-capable service; it is that the service has a smaller Path MTU than the native MTU of links he uses, often has a broken PMTU implementation due to ICMPv6 filtering, and is not native. If I can summarize the views of those using it (such as a Dutch provider I spoke with Wednesday in London), it's not that they don't want or expect to deploy a native IPv6 service, it's that they want to deploy an IPv6 service now and have infrastructure that they can't immediately upgrade (such as, in the Dutch case I mentioned, a service network that they have to use that is IPv4-only for the foreseeable future).

Similar exchanges can be described around dIVI, 4rd, and ds-lite. Fundamentally, if my bread and butter today is IPv4 and my shiny new IPv6 network will in the nature of the case require some time to harden, why would I disrupt my bread and butter to deploy the new, and while doing so make my present business model dependent on the not-yet-hardened network? They are very reasonable ways to remove IPv4 from a dual stack network, but from the perspective of risk an odd way to deploy the IPv6 network.

If you want to make the case that IRON is "better" than something else, I think the thing to do is write the applicability statement. The networks on this list operate as a ubiquitous and stable service comparable to the present IPv4 network and independent of any underlying infrastructure; anything else needs to help them move toward that goal, and needs by nature to be effortlessly removed from the network as native IPv6 deployment settles in. What is the applicability of IRON to such a network?