Re: [v6ops] Fwd: New Version Notification for draft-linkova-v6ops-ipmaclimi-00.txt

"Eric Levy- Abegnoli (elevyabe)" <elevyabe@cisco.com> Thu, 10 November 2022 19:56 UTC

Return-Path: <elevyabe@cisco.com>
X-Original-To: v6ops@ietfa.amsl.com
Delivered-To: v6ops@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id B7A99C15259D for <v6ops@ietfa.amsl.com>; Thu, 10 Nov 2022 11:56:04 -0800 (PST)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -10.174
X-Spam-Level:
X-Spam-Status: No, score=-10.174 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, DKIMWL_WL_HIGH=-0.571, DKIMWL_WL_MED=-0.001, DKIM_SIGNED=0.1, DKIM_VALID=-0.1, DKIM_VALID_AU=-0.1, DKIM_VALID_EF=-0.1, HTML_MESSAGE=0.001, RCVD_IN_MSPIKE_H3=0.001, RCVD_IN_MSPIKE_WL=0.001, RCVD_IN_ZEN_BLOCKED_OPENDNS=0.001, SPF_NONE=0.001, T_SCC_BODY_TEXT_LINE=-0.01, URIBL_BLOCKED=0.001, URIBL_DBL_BLOCKED_OPENDNS=0.001, URIBL_ZEN_BLOCKED_OPENDNS=0.001, USER_IN_DEF_DKIM_WL=-7.5] autolearn=ham autolearn_force=no
Authentication-Results: ietfa.amsl.com (amavisd-new); dkim=pass (1024-bit key) header.d=cisco.com header.b=e91hixwI; dkim=pass (1024-bit key) header.d=cisco.com header.b=l2629KLj
Received: from mail.ietf.org ([50.223.129.194]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id lTaRatoIaLKR for <v6ops@ietfa.amsl.com>; Thu, 10 Nov 2022 11:56:00 -0800 (PST)
Received: from rcdn-iport-5.cisco.com (rcdn-iport-5.cisco.com [173.37.86.76]) (using TLSv1.2 with cipher DHE-RSA-SEED-SHA (128/128 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id 49B30C1522C9 for <v6ops@ietf.org>; Thu, 10 Nov 2022 11:56:00 -0800 (PST)
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/simple; d=cisco.com; i=@cisco.com; l=28393; q=dns/txt; s=iport; t=1668110160; x=1669319760; h=from:to:cc:subject:date:message-id:references: in-reply-to:mime-version; bh=E0wq81ePsc5zqajWw06n4MFoGCBzh4VgNUb3NoCVkYY=; b=e91hixwI2Ko4EVNH9nCudardexKizs1YwdUkIT5A4cl1qn3chuErFySe U+BT5+c8LGC+8eLnc5p/ZFq44XQPP7TkFqG4g1mKpJkmn57GVPsmvuHk0 OrASSVhc2h8ieXxcfispMnTQGxpjIefnXxPfzB9FVPH6NVX1IJvNAOKUB k=;
X-IPAS-Result: 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
IronPort-PHdr: A9a23:Gc1ImRRh2kR4T5yqZIFVqKbfldpso7vLVj580XJvo75Nc6H2+ZPkM QSf4Ph2l1bGUM3d7O4MkOvZta3sGAliqZaMuXwPatpAAhkCj8hFkwkpGsXQD0r9IbbjZDA7G 8IXUlhj8jm7PEFZFdy4aUfVpyi57CUZHVP0Mg8mTtk=
IronPort-Data: A9a23:QCFwHqKLiMqFNtrLFE+R/JUlxSXFcZb7ZxGr2PjKsXjdYENSgTJSz zRNDD2DbPeNMWrxLY0iaYy3pEIH7MCHyNdkTwsd+CA2RRqmiyZq6fd1j6vUF3nPRiEWZBs/t 63yUvGZcIZsCCW0Si6FatANl1EkvU2zbue6WbCs1hxZH1c+En540Eo7wIbVv6Yx6TSHK1LV0 T/Ni5W31G+Ng1aY5UpNtspvADs21BjDkGtwUm4WPJinj3eC/5UhN6/zEInqR5fOria4KcbhL wrL5OnREmo0ZH7BAPv9+lrwWhVirrI/oWFih1IOM5VOjCSuqQQj7voLE/caaX5TghOUk9Z0y M5H5JmZHFJB0q3kwIzxUjFCGC14eKZB4rKCeCH5us2IxEqAeHzpqxlsJBhpZstDpaAmWicXq aNwxDMlNnhvg8q7xL+lW+Bmi+woLdLgO8UUvXQIITTxVqx+EMibK0nMzd9A/D0wxYdMIfydW PhBRh1qZj39WxIabz/7D7pnzLv32RETaQZwtgySvbEf4mXPwkp2yreFGN3JYNuDQ+1Ym16co XPL8n+/BQsVXPSbziCI9GCrruDImiz/VcQZE7jQ3vB3mkeCnzc7BxgfVF/9qv684nNSQPpFI EASvyEpt6V3rRXtRdjmVBr+q3mB1vIBZzZOO/wGtDGqx6zU2gKQIHUISDtBc9Z3seZjEFTGy WS1t9/uADVutpicRnSc6qqYoFuOBMQFEYMRTXReHFdaubEPtKl230yQFow8eEKgpoetcQwc1 Qxmu8TXa187t88A16yh8UvAhVpATbCWE1Zlv207so9Zhz6Viaa/bICurFPc9/sFdd/fRViat 39CkM+bhAzvMX1vvHHcKAnuNOj5jxpgDNE6qQU1d3XG32/2k0NPhagKvFlDyL5Ba67ogwPBb k7Joh9275ROJnasZqIfS9vvVZRzlfW4T4S1DKq8gj9yjn5ZKV/vEMZGOB744owRuBNEfVwXY M3CKp/8UR7294w2kWfeqxghPU8Dn3Bimjy7qWHTxBW82r3Wf2+OVboAKzOzghMRssu5TPHu2 48HbaOikkwHOMWnO3W/2dBIdzgicyNkba0aXuQKLIZv1CI8RjF4YxIQqJt8E7FYc1N9zb6Vr y3lBBUJkDISRxTvcG23V5yqU5u3Nb4XkJ7xFXVE0YqAs5T7XbuS0Q==
IronPort-HdrOrdr: A9a23:nqNKfqDOMWrlrh/lHekZ55DYdb4zR+YMi2TDGXoRdfUzSL3/qy nOpoV96faaslsssR0b9exofZPwIk81G/ZOkPUs1PSZLXTbUFLBFvAc0WKa+UyfJ8SdzI5gPN ZbAsxD4YbLfCFHZK/BiWHSeerIguP3kpxA492w854Hd3AOV0gP1WlE4y+gYzxLbTgDK5olNY aWovFKryCnfh0sH76GL0hAcejfhsHB0Knrax4eBxIh9WC1/EiVwY+/PRiE/wsUFwhCy7c68W TDjkjQ66i5v+ugoyWsp1P73tB5mMbB1tAGPsCKh8QPQw+c8jpBoO9aKs+/VPdfmpDd1GoX
X-IronPort-Anti-Spam-Filtered: true
X-IronPort-AV: E=Sophos;i="5.96,154,1665446400"; d="scan'208,217";a="320900"
Received: from rcdn-core-11.cisco.com ([173.37.93.147]) by rcdn-iport-5.cisco.com with ESMTP/TLS/DHE-RSA-SEED-SHA; 10 Nov 2022 19:55:58 +0000
Received: from mail.cisco.com (xfe-aln-003.cisco.com [173.37.135.123]) by rcdn-core-11.cisco.com (8.15.2/8.15.2) with ESMTPS id 2AAJtwPg024289 (version=TLSv1.2 cipher=AES256-SHA bits=256 verify=OK); Thu, 10 Nov 2022 19:55:58 GMT
Received: from xfe-aln-001.cisco.com (173.37.135.121) by xfe-aln-003.cisco.com (173.37.135.123) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id 15.2.1118.9; Thu, 10 Nov 2022 13:55:58 -0600
Received: from NAM10-MW2-obe.outbound.protection.outlook.com (173.37.151.57) by xfe-aln-001.cisco.com (173.37.135.121) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id 15.2.1118.15 via Frontend Transport; Thu, 10 Nov 2022 13:55:58 -0600
ARC-Seal: i=1; a=rsa-sha256; s=arcselector9901; d=microsoft.com; cv=none; b=dwgM/HWDyxI4Phs8wkS4Gbs7UZKrwEnSH7LNREK5Ehtm3lOuTQk2xi0fMveGorADeKr6hsj4bH6TM1VOIBEsj3oPRvsnbEkK3Bjof54aeN3IUA+l4Xe0jh2cCy0ogrBPJHVxdwE1UjgIkSJp9YYhVRm/E15ydtVT6AcPF37PtbKMYgzTIP0dUQ+Jj5R+2KY/72zQR1/hG8LRpYwfjd2doRBxP10dvwhNraRidE9tCusUlSEPLUx4xqHMFIxhUu7447iqC234eu+jX+obG6qPwBQqxj66bVhEMYq3HupD/Z6cdaFNCSLh6KzDbQBIk0TKADkCRnrCufXgXmyhgMMRZg==
ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=microsoft.com; s=arcselector9901; h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-AntiSpam-MessageData-ChunkCount:X-MS-Exchange-AntiSpam-MessageData-0:X-MS-Exchange-AntiSpam-MessageData-1; bh=E0wq81ePsc5zqajWw06n4MFoGCBzh4VgNUb3NoCVkYY=; b=lcc27letCOs1zJllpv3KO4V+WvuVnbpcGKWJj9u0z0LwcQKycAQvooOwF4jxEBkLNobil6aKJDxF56M71F0KD77L+7y840Mi6CILaaC+4Wy4jYoEj5pjLjrzheW116TI+SRaBfyeO3DyXBf5tkwNLEt9IZk2vK7HHs7twjn9LcTPPZOff1ioL+mkBNO4zW5UbT/FHZ7EemnZotuaLQ2OP120ImxOK0erM4UPJqdF96N848H5+nkoJ85Mr9JFHDrvf5CDy5dbof6GDtCvMqebu3tU9uDNHpsacm1qkJAjkET7P0qE2BequsFkRbRL1TW9/KEznFq/a76J95zY1t3hbw==
ARC-Authentication-Results: i=1; mx.microsoft.com 1; spf=pass smtp.mailfrom=cisco.com; dmarc=pass action=none header.from=cisco.com; dkim=pass header.d=cisco.com; arc=none
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=cisco.com; s=selector1; h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-SenderADCheck; bh=E0wq81ePsc5zqajWw06n4MFoGCBzh4VgNUb3NoCVkYY=; b=l2629KLjio4r/YW1xRJ89OOiZYbcdgKrh6VUmnkF8UC7AaybisX1XEx/vKZdCoMLIeDx5OqSyiCWSE+dHjQ2aDA+bGFG2R+NJNNm/0JdUzWAhEY1SPr1pQcN9ZpCgK/z091CE+FapxPNwN/ivUWMrMnuQaGqBctFXP3xzxl+aFc=
Received: from PH0PR11MB5063.namprd11.prod.outlook.com (2603:10b6:510:3d::9) by SJ0PR11MB5086.namprd11.prod.outlook.com (2603:10b6:a03:2d1::11) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id 15.20.5813.13; Thu, 10 Nov 2022 19:55:56 +0000
Received: from PH0PR11MB5063.namprd11.prod.outlook.com ([fe80::5b0e:f318:8f71:29ef]) by PH0PR11MB5063.namprd11.prod.outlook.com ([fe80::5b0e:f318:8f71:29ef%8]) with mapi id 15.20.5791.027; Thu, 10 Nov 2022 19:55:56 +0000
From: "Eric Levy- Abegnoli (elevyabe)" <elevyabe@cisco.com>
To: Jen Linkova <furry13@gmail.com>
CC: Lorenzo Colitti <lorenzo@google.com>, Ole Troan <otroan@employees.org>, V6 Ops List <v6ops@ietf.org>
Thread-Topic: [v6ops] Fwd: New Version Notification for draft-linkova-v6ops-ipmaclimi-00.txt
Thread-Index: AQHY9T5ybLIWKuaJAUO0kzectf1jWw==
Date: Thu, 10 Nov 2022 19:55:56 +0000
Message-ID: <F96C3683-76B3-41B8-ACBE-8304D3429844@cisco.com>
References: <CAFU7BAQmSqaZhrQ0YH-1ryp2DfZH6z5B1icR=Wc_W=sdBExuEA@mail.gmail.com> <EE3F6D3C-EC05-4B23-917D-46BA7E49BC61@employees.org> <CAKD1Yr2ZonxFr2jX5bc6eNdPfixsjSheSRDTesaPxE_3WWPF0Q@mail.gmail.com> <DE0A9B08-C1A4-42CC-8817-C67BBEFC2A14@cisco.com> <CAFU7BARM=Ey-Np4o_LUMvJZ1xQcmT4coywKpJohPUZY9LjZvEA@mail.gmail.com>
In-Reply-To: <CAFU7BARM=Ey-Np4o_LUMvJZ1xQcmT4coywKpJohPUZY9LjZvEA@mail.gmail.com>
Accept-Language: en-US
Content-Language: fr-FR
X-MS-Has-Attach:
X-MS-TNEF-Correlator:
user-agent: Microsoft-MacOutlook/16.66.22101101
authentication-results: dkim=none (message not signed) header.d=none;dmarc=none action=none header.from=cisco.com;
x-ms-publictraffictype: Email
x-ms-traffictypediagnostic: PH0PR11MB5063:EE_|SJ0PR11MB5086:EE_
x-ms-office365-filtering-correlation-id: c4cddf9e-c5d6-4c79-ade4-08dac355950a
x-ms-exchange-senderadcheck: 1
x-ms-exchange-antispam-relay: 0
x-microsoft-antispam: BCL:0;
x-microsoft-antispam-message-info: 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
x-forefront-antispam-report: CIP:255.255.255.255; CTRY:; LANG:en; SCL:1; SRV:; IPV:NLI; SFV:NSPM; H:PH0PR11MB5063.namprd11.prod.outlook.com; PTR:; CAT:NONE; SFS:(13230022)(4636009)(39860400002)(346002)(396003)(376002)(136003)(366004)(451199015)(966005)(6486002)(71200400001)(316002)(6916009)(54906003)(478600001)(66899015)(5660300002)(41300700001)(8936002)(2616005)(186003)(21615005)(64756008)(4326008)(66476007)(66946007)(66556008)(8676002)(66446008)(2906002)(26005)(6512007)(55236004)(6506007)(91956017)(53546011)(76116006)(83380400001)(33656002)(38100700002)(166002)(122000001)(36756003)(86362001)(38070700005)(45980500001); DIR:OUT; SFP:1101;
x-ms-exchange-antispam-messagedata-chunkcount: 1
x-ms-exchange-antispam-messagedata-0: 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
Content-Type: multipart/alternative; boundary="_000_F96C368376B341B8ACBE8304D3429844ciscocom_"
MIME-Version: 1.0
X-MS-Exchange-CrossTenant-AuthAs: Internal
X-MS-Exchange-CrossTenant-AuthSource: PH0PR11MB5063.namprd11.prod.outlook.com
X-MS-Exchange-CrossTenant-Network-Message-Id: c4cddf9e-c5d6-4c79-ade4-08dac355950a
X-MS-Exchange-CrossTenant-originalarrivaltime: 10 Nov 2022 19:55:56.6331 (UTC)
X-MS-Exchange-CrossTenant-fromentityheader: Hosted
X-MS-Exchange-CrossTenant-id: 5ae1af62-9505-4097-a69a-c1553ef7840e
X-MS-Exchange-CrossTenant-mailboxtype: HOSTED
X-MS-Exchange-CrossTenant-userprincipalname: mE9lhyp+3J6VOGuqltvpQM/vaO9DnHSti2uYS+PWhg+mrhDgSyw6S84Gx878sr5BAkkzp55fx3PGh7whybrAkQ==
X-MS-Exchange-Transport-CrossTenantHeadersStamped: SJ0PR11MB5086
X-OriginatorOrg: cisco.com
X-Outbound-SMTP-Client: 173.37.135.123, xfe-aln-003.cisco.com
X-Outbound-Node: rcdn-core-11.cisco.com
Archived-At: <https://mailarchive.ietf.org/arch/msg/v6ops/CM6m4ZgdfTeK1rXm95QG1d_r_U4>
Subject: Re: [v6ops] Fwd: New Version Notification for draft-linkova-v6ops-ipmaclimi-00.txt
X-BeenThere: v6ops@ietf.org
X-Mailman-Version: 2.1.39
Precedence: list
List-Id: v6ops discussion list <v6ops.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/v6ops>, <mailto:v6ops-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/v6ops/>
List-Post: <mailto:v6ops@ietf.org>
List-Help: <mailto:v6ops-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/v6ops>, <mailto:v6ops-request@ietf.org?subject=subscribe>
X-List-Received-Date: Thu, 10 Nov 2022 19:56:04 -0000

Hi Jen,
@@EL in line.

On Fri, Nov 11, 2022 at 1:28 AM Eric Levy- Abegnoli (elevyabe)
<elevyabe=40cisco.com@dmarc.ietf.org<mailto:40cisco.com@dmarc.ietf.org>> wrote:

The minimum requirement (draft says 20) is definitely not a good idea, as it depends so much on use cases. The value could easily vary from 2 (datacenter, dhcp assigned addresses, 1 LL, one global) to thousands (RFC4389 proxy on the path to the limiting device).

Indeed the actual number does depend on the specific case. The default
value should, IMHO, work for the majority of devices.
I chose '20'  because of RFC7934, but I'm flexible.
I didn't want to really repeat what RFC7934 already said but let's
look at the very minimal numbers for an ordinary host:

- one link-local
- two global (privacy + stable)
- one 464XLAT address.
So it's 4.

That number jumps to 5 when the privacy addresses are rotated.
When I'm doing a graceful remunering, replacing /64 assigned for the
subnet, it would be 7.
Depending on how long the device keeps the addresses in the cache (a
day? a week?) it could see multiple privacy addresses.
So I'd say we shouldn't be recommending anything less than 10 anyway.
@@EL. Well, if you take the case of a VM in a datacenter, one LL and one global are just enough.
No privacy needed there. In fact a VM trying to use more would be a sign of malfunction.
So 2 here is enough in this case. The network of course is sized accordingly.
Don’t take me wrong, I am not trying to generalize, I know many use cases, including  in the DC where you need more. But what I am trying to say is that you can’t come up with any arbitrary number that will work for all use cases, whether a min or a max

That is another thing which is a very bad idea: LRU. These limiting devices are not routers in the vast majority of cases, they are switches (including wireless controllers and APs). This is because they need to sit as close as possible to the offending device.
Typically, these devices can see multicast packets (DAD is the only one that is guaranteed to happen, sort-of…), not unicast.  SAVI switches entirely rely on DAD for instance. Punting unicast ND packets, and even worse data packets to the CPU of a switch so that it can figure out which addresses are LRU may be quite problematic to say the least.  LRU with just DAD would be a joke, as it only tells you when the entry was created. A crystal ball would be better in my opinion.

Well, I'm reading
https://www.cisco.com/c/en/us/td/docs/wireless/controller/8-5/config-guide/b_cg85/ipv6.html
"At any given time, only eight IPv6 addresses are supported per
client. When the ninth IPv6 address is encountered, the controller
removes the oldest stale entry and accommodates the latest one."

So at least one vendor does smth like that already ;)
@@EL Some vendor may have tried very hard to make it work ☺ But the truth is, without the visibility on data traffic (which switches will not do), trying to do LRU is pure speculation. Typically, switches might probe, but probing a temporary address is counter-productive: the device will respond even if it is not the current one, and it will move up in the LRU list!
Only the device knows. It could do the DHCP release that we discuss at DHC, or the ND de-register: I understand “some vendors” don’t like the ND registration approach, but maybe de-registering an address would be acceptable?
Eric

The rest of the draft is fine: logging, configuring, all good common sense. Is it worth a draft? I don’t think so.

The motivation for this is that, based on my discussion with the
vendors, they need some guidance on what the default value should be,
Indeed, I can go and talk to various vendors 1:1, but I might fail
reaching some ;)

A draft that would establish any sort of two way communications between the host and the network would be a lot more valuable.

Please come to the v6ops@ session tomorrow, I'll talk about it.

On Tue, Nov 8, 2022 at 2:13 PM Ole Troan <otroan=40employees.org@dmarc.ietf.org<mailto:40employees.org@dmarc.ietf.org>> wrote:

A requirement like that would be perfectly fine in an RFQ. Less so in an RFC.



Ok, so then let's see *what* would be acceptable to put into an RFC.



The draft says that the hardware must allow the operator to configure the limits that the network places on the hosts, and should do something reasonable when the limit is hit, such as drop the address that was used least recently. I don't see how any of these statements can be controversial and it makes sense for them to be in an RFC. These hosts do exist (example: ChromeOS), and if a network operator (example: Jen) wants to support them, then it should be possible to do so.

The draft also says that if the network does not allow enough addresses per client for current implementations, those implementations will experience user-visible outages. As I see it, that's simply a fact (those implementations do exist, and they do fail), so I don't see how it could be controversial.



The thing that there doesn't seem to be consensus on is whether the IETF can/should place a minimum requirement on the number of addresses.



Did I miss something?

_______________________________________________
v6ops mailing list
v6ops@ietf.org<mailto:v6ops@ietf.org>
https://www.ietf.org/mailman/listinfo/v6ops



--
SY, Jen Linkova aka Furry