Re: [v6ops] draft-palet-v6ops-transition-ipv4aas discussion

"STARK, BARBARA H" <bs7652@att.com> Tue, 24 April 2018 19:13 UTC

Return-Path: <bs7652@att.com>
X-Original-To: v6ops@ietfa.amsl.com
Delivered-To: v6ops@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 9BBCC12D7EC for <v6ops@ietfa.amsl.com>; Tue, 24 Apr 2018 12:13:38 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -2.6
X-Spam-Level:
X-Spam-Status: No, score=-2.6 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, RCVD_IN_DNSWL_LOW=-0.7, SPF_PASS=-0.001, URIBL_BLOCKED=0.001] autolearn=ham autolearn_force=no
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id uayK4I-dUH1Q for <v6ops@ietfa.amsl.com>; Tue, 24 Apr 2018 12:13:36 -0700 (PDT)
Received: from mx0a-00191d01.pphosted.com (mx0b-00191d01.pphosted.com [67.231.157.136]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id EC49F124F57 for <v6ops@ietf.org>; Tue, 24 Apr 2018 12:13:35 -0700 (PDT)
Received: from pps.filterd (m0083689.ppops.net [127.0.0.1]) by m0083689.ppops.net-00191d01. (8.16.0.21/8.16.0.21) with SMTP id w3OJ6JMD011676; Tue, 24 Apr 2018 15:13:24 -0400
Received: from alpi154.enaf.aldc.att.com (sbcsmtp6.sbc.com [144.160.229.23]) by m0083689.ppops.net-00191d01. with ESMTP id 2hja5d8k3b-1 (version=TLSv1.2 cipher=ECDHE-RSA-AES256-GCM-SHA384 bits=256 verify=NOT); Tue, 24 Apr 2018 15:13:24 -0400
Received: from enaf.aldc.att.com (localhost [127.0.0.1]) by alpi154.enaf.aldc.att.com (8.14.5/8.14.5) with ESMTP id w3OJDMuO028450; Tue, 24 Apr 2018 15:13:23 -0400
Received: from zlp30486.vci.att.com (zlp30486.vci.att.com [135.47.91.177]) by alpi154.enaf.aldc.att.com (8.14.5/8.14.5) with ESMTP id w3OJDIhO028288; Tue, 24 Apr 2018 15:13:18 -0400
Received: from zlp30486.vci.att.com (zlp30486.vci.att.com [127.0.0.1]) by zlp30486.vci.att.com (Service) with ESMTP id 5CFC140006BE; Tue, 24 Apr 2018 19:13:18 +0000 (GMT)
Received: from GAALPA1MSGHUBAH.ITServices.sbc.com (unknown [130.8.218.157]) by zlp30486.vci.att.com (Service) with ESMTPS id 46D6940002BE; Tue, 24 Apr 2018 19:13:18 +0000 (GMT)
Received: from GAALPA1MSGUSRBF.ITServices.sbc.com ([169.254.5.170]) by GAALPA1MSGHUBAH.ITServices.sbc.com ([130.8.218.157]) with mapi id 14.03.0361.001; Tue, 24 Apr 2018 15:13:17 -0400
From: "STARK, BARBARA H" <bs7652@att.com>
To: 'Fred Baker' <fredbaker.ietf@gmail.com>
CC: V6 Ops List <v6ops@ietf.org>
Thread-Topic: [v6ops] draft-palet-v6ops-transition-ipv4aas discussion
Thread-Index: AQHT1Hay7VUBTUBP2kS0VeIhOpS7fqQFnGUAgAAUBYCACqCjUA==
Date: Tue, 24 Apr 2018 19:13:17 +0000
Message-ID: <2D09D61DDFA73D4C884805CC7865E6114DD7F981@GAALPA1MSGUSRBF.ITServices.sbc.com>
References: <3A083AA8-41D3-4BF8-BE31-5071975B6F98@gmail.com> <CAHL_VyC1xUDDqZRz1r--u8nyuLaZRnsT0ZR7hzOw4HWUkgwPXg@mail.gmail.com> <52D64464-A1BB-4FFA-AA79-28B8953E3B93@gmail.com>
In-Reply-To: <52D64464-A1BB-4FFA-AA79-28B8953E3B93@gmail.com>
Accept-Language: en-US
Content-Language: en-US
X-MS-Has-Attach:
X-MS-TNEF-Correlator:
x-originating-ip: [135.70.66.27]
Content-Type: text/plain; charset="utf-8"
Content-Transfer-Encoding: base64
MIME-Version: 1.0
X-Proofpoint-Virus-Version: vendor=fsecure engine=2.50.10434:, , definitions=2018-04-24_05:, , signatures=0
X-Proofpoint-Spam-Details: rule=outbound_policy_notspam policy=outbound_policy score=0 priorityscore=1501 malwarescore=0 suspectscore=0 phishscore=0 bulkscore=0 spamscore=0 clxscore=1011 lowpriorityscore=0 mlxscore=0 impostorscore=0 mlxlogscore=999 adultscore=0 classifier=spam adjust=0 reason=mlx scancount=1 engine=8.0.1-1711220000 definitions=main-1804240181
Archived-At: <https://mailarchive.ietf.org/arch/msg/v6ops/Dk63mJCaoZiqRfUZF4dSrGRgPAo>
Subject: Re: [v6ops] draft-palet-v6ops-transition-ipv4aas discussion
X-BeenThere: v6ops@ietf.org
X-Mailman-Version: 2.1.22
Precedence: list
List-Id: v6ops discussion list <v6ops.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/v6ops>, <mailto:v6ops-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/v6ops/>
List-Post: <mailto:v6ops@ietf.org>
List-Help: <mailto:v6ops-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/v6ops>, <mailto:v6ops-request@ietf.org?subject=subscribe>
X-List-Received-Date: Tue, 24 Apr 2018 19:13:38 -0000

> Let me ask an additional question. We have had at least one operator speak
> against adoption of this draft as a working group draft, because she doesn't
> want to add requirements to customer-edge (CE) routers, which potentially
> make them more complex and therefore expensive (every line of code costs
> something and has some probability of containing a bug or attack). It sounds
> like you would support adoption of the draft if it contains the right set of
> features and doesn't contain anything else, and if (as it is currently written)
> that it would be implemented in addition to RFC 7084. "The right set of
> features", from your perspective, includes MAP-T.
> 
> Is that a correct deduction?

Coming back from vacation and finally responding...

I support adoption of this draft by the WG. 
I believe it will be useful to many operators in driving CE router feature implementation that is needed by several operators today. Operators implementing dual stack today will be glad this document exists when they get ready to shut down IPv4, and I think it's better for them that the document exists sooner rather than later.

But that doesn't mean I believe the draft has exactly the right set of features included. My understanding of "adoption" is that it is still possible post-adoption to discuss whether specific features / requirements do or don't belong. If the precise set of features and requirements must be agreed upon prior to adoption, then I would not be in support of adoption. Hopefully we aren't setting the bar that high?

Here are some items I'd like to discuss (hopefully post-adoption and not as a pre-condition to adoption):
 - Each mechanism included needs to be carefully considered whether it is in or out. Is there significant (multiple providers) deployment support (not just lab trials) for each and every one of the mechanisms listed? [I think the current list looks pretty good, and see support expressed for most of these, but still believe we need additional discussion.]
 - Positioning against RFC7084. Should we bring DS-Lite into this document so there is one place to see all transition technology requirements? What to say about 6rd (I saw other comments on this)? Does this really update RFC7084? Or is it simply a nice companion to it?
 - IPv4 Multicast Support. Most retail routers do a pretty bad job of dealing with IPv4 multicast (especially wrt IPTV) without tunneling it over IPv6. I disagree that we should be encouraging all CE routers to support tunneling of IPv4 multicast over IPv6, when they often don't get native IPv4 multicast right.

So as long as we can still discuss these items post-adoption, I support adoption.
Barbara

> > On Apr 17, 2018, at 12:20 PM, Richard Patterson <richard@helix.net.nz>
> wrote:
> >
> > Hi Fred, et al.
> >
> > Speaking as an Operator who is currently validating MAP-T as a
> > solution, I'm in favour of making sure it itself is included in future
> > versions of this draft.
> >
> > There are multiple vendors offering MAP-T Border Relays, and we've
> > been testing both OpenWRT-based CPEs as well as a custom CPE based on
> > the Broadcom BCM63138 SoC.
> > The Broadcom reference SDK comes with the CERNET kernel module and
> > userland tool, and supports hardware acceleration of MAP-T translated
> > flows with Broadcom's Runner fastpath.
> >
> > I was also quite impressed with OpenWRT's implementation; aside from
> > initially needing internet connectivity to install the map-t module
> > after a fresh install, no further configuration is required to have
> > the CPE dynamically configure itself with MAP-T, given the appropriate
> > DHCPv6 options.  Kudos to the OpenWRT/LEDE devs on their support.
> >
> > Re: the draft's §5.3.4.  It's succinct enough, whilst still directing
> > implementors to the relevant RFCs, however I'm still mulling over the
> > NAT44 and iptables/netfilter concerns that I raised in softwires a few
> > months back.[1]   The address-sharing mode's algorithm for port
> > allocations, isn't easily implementable with the current
> > iptables/netfilter behaviour.  OpenWRT's approach creates rule
> > shadowing and port ranges that never get utilised.
> >
> > -Richard
> >
> >
> > [1]
> > https://www.ietf.org/mail-archive/web/softwires/current/msg06832.html
> >
> > On 15 April 2018 at 06:00, Fred Baker <fredbaker.ietf@gmail.com> wrote:
> >> At IETF 101, Jordi Palet Martinez presented draft-palet-v6ops-transition-
> ipv4aas. The draft is at https://tools.ietf.org/html/draft-palet-v6ops-
> transition-ipv4aas, and his presentation deck is at
> https://datatracker.ietf.org/meeting/101/materials/slides-101-v6ops-
> transition-requirements-for-ipv6-ce-routers-to-support-ipv4-as-a-service-
> 00.
> >>
> >> I would like to invite discussion.
> >>
> >> In particular, this draft derives from draft-ietf-v6ops-rfc7084-bis, and the
> chairs wonder if it should be reposted as the next version of draft-ietf-v6ops-
> rfc7084-bis. That should happen if an only if the working group thinks it
> should be published as an RFC (now or at some point) adding considerations
> for implementors of RFC 7084 and also implementing transition services.
> >>
> >> A key comment at IETF 101 was that there remain far too many transition
> mechanisms listed. It would be helpful, if you hold that opinion, if you could
> give that advice, identify the mechanism or mechanisms you think should be
> listed, and indicate the reasoning behind your viewpoint. For example, if you
> think MAP-T should be listed, it would be helpful to know what operators are
> implementing MAP-T and are looking for CE Routers that support it. The
> same comment applies to any such mechanism or service.
> >>
> >>
> >>
> >> _______________________________________________
> >> v6ops mailing list
> >> v6ops@ietf.org
> >> https://www.ietf.org/mailman/listinfo/v6ops
> >>