Re: [v6ops] [E] Re: How New Version of draft-ietf-v6ops-nd-considerations-01.txt can help discussion of other drafts

"Mishra, Gyan S" <gyan.s.mishra@verizon.com> Sat, 06 May 2023 05:31 UTC

Return-Path: <gyan.s.mishra@verizon.com>
X-Original-To: v6ops@ietfa.amsl.com
Delivered-To: v6ops@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id E4EB5C151B33 for <v6ops@ietfa.amsl.com>; Fri, 5 May 2023 22:31:22 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -1.085
X-Spam-Level:
X-Spam-Status: No, score=-1.085 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, DKIM_SIGNED=0.1, DKIM_VALID=-0.1, DKIM_VALID_AU=-0.1, DKIM_VALID_EF=-0.1, HTML_MESSAGE=0.001, NEW_PRODUCTS=1, RCVD_IN_DNSWL_NONE=-0.0001, RCVD_IN_MSPIKE_H2=-0.001, RCVD_IN_ZEN_BLOCKED_OPENDNS=0.001, SPF_HELO_NONE=0.001, SPF_NONE=0.001, T_REMOTE_IMAGE=0.01, URIBL_DBL_BLOCKED_OPENDNS=0.001, URIBL_ZEN_BLOCKED_OPENDNS=0.001] autolearn=no autolearn_force=no
Authentication-Results: ietfa.amsl.com (amavisd-new); dkim=pass (1024-bit key) header.d=verizon.com
Received: from mail.ietf.org ([50.223.129.194]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id DycCaRYUnUey for <v6ops@ietfa.amsl.com>; Fri, 5 May 2023 22:31:18 -0700 (PDT)
Received: from mx0a-0024a201.pphosted.com (mx0a-0024a201.pphosted.com [148.163.149.93]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id C365FC151549 for <v6ops@ietf.org>; Fri, 5 May 2023 22:31:18 -0700 (PDT)
Received: from pps.filterd (m0114267.ppops.net [127.0.0.1]) by mx0a-0024a201.pphosted.com (8.17.1.19/8.17.1.19) with ESMTP id 345KlZVo014611 for <v6ops@ietf.org>; Sat, 6 May 2023 01:31:18 -0400
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=verizon.com; h=mime-version : references : in-reply-to : from : date : message-id : subject : to : cc : content-type; s=corp; bh=/wO6vBkQZiPkYrPJMC6BflF0UcbKriaoj4eJafK/00Q=; b=AwXBNIs7N9MyHBUjxBwPJcVaspXG548vCe5qPOM7m4/o9BBK7pxbfWu+1MiZqzIWRxvw c/WJM3AxRxUu0R4xZkOIG4noMDBJlBLNbms70Recto5n4gQDYOjet3EhTsrMhexrS4i5 ZeZ7OlzOf1I3RzAzqvoz4H5WGszuriUu/y4=
Received: from mail-vs1-f72.google.com (mail-vs1-f72.google.com [209.85.217.72]) by mx0a-0024a201.pphosted.com (PPS) with ESMTPS id 3qcktsq7h9-1 (version=TLSv1.2 cipher=ECDHE-RSA-AES128-GCM-SHA256 bits=128 verify=NOT) for <v6ops@ietf.org>; Sat, 06 May 2023 01:31:17 -0400
Received: by mail-vs1-f72.google.com with SMTP id ada2fe7eead31-43484b68d2fso155771137.2 for <v6ops@ietf.org>; Fri, 05 May 2023 22:31:16 -0700 (PDT)
X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20221208; t=1683351075; x=1685943075; h=cc:to:subject:message-id:date:from:in-reply-to:references :mime-version:x-gm-message-state:from:to:cc:subject:date:message-id :reply-to; bh=/wO6vBkQZiPkYrPJMC6BflF0UcbKriaoj4eJafK/00Q=; b=hrWtwhqUAcaQVXlEJJxMXpegyBRiP2vkNlkzuWvqwJwy0y7wix/vlFblB9XcBA9yxe ExagR2AwW4hOBvZ+BmrZNEXfxzS3Xi7HMaDUoOkLw/BF9rxg58ehaTanIxD0WckSd2+V g1Eqqi7d9sMjAS/GOxSOzO9ayc41gQ5wVE05Pyh662sAnwQsJWF19WdwiiYpjSVBWYej h0VEhZW/n7ZqdJGb3bLkA6iAyfv6CU/C9V3FkVvYsPjRkLNGFRqTtlS8Qqc3AShzswPn YnnMMqQSJ4IwJDHX9Fr4jzycSmXyQXNN2KNFKcSTml/5dYOSrUwkPJ9WvPQ3MTj8uW9A bnbw==
X-Gm-Message-State: AC+VfDx7kAHyNzfaGVva4Fk8nwmhhuUBU7jLx5Lmy8fUs+wYmjjbGg9R H/Z+JORN/ep5OQf6UTw2+g83dapQLk7S6SYxlAZ8tvNtTRwfBWhxOYnTMjMn0lgPdOZtQ4qk5xN sKQd4LKTSrV6UV/JsBr931w==
X-Received: by 2002:a67:ad04:0:b0:434:77e9:571f with SMTP id t4-20020a67ad04000000b0043477e9571fmr994659vsl.26.1683351075171; Fri, 05 May 2023 22:31:15 -0700 (PDT)
X-Google-Smtp-Source: ACHHUZ7gHIy0kQpCSli3czJgekbULFsYXQngNAKd5QdpRkw5MYvVbNvYoDiFE6nX77iYBJpkh+VMtjibcpLetbmPwYM=
X-Received: by 2002:a67:ad04:0:b0:434:77e9:571f with SMTP id t4-20020a67ad04000000b0043477e9571fmr994654vsl.26.1683351074606; Fri, 05 May 2023 22:31:14 -0700 (PDT)
MIME-Version: 1.0
References: <40d46fcacbbf48c394f70bccca2a147b@huawei.com> <36b87757-2ad8-587d-ce4e-5f3f9b00b47d@gmail.com>
In-Reply-To: <36b87757-2ad8-587d-ce4e-5f3f9b00b47d@gmail.com>
From: "Mishra, Gyan S" <gyan.s.mishra@verizon.com>
Date: Sat, 06 May 2023 01:31:03 -0400
Message-ID: <CAJhXr9-xLUqz+Zobws92LVxC-egWq3t2wL8ciOvJXeGmszQQ9A@mail.gmail.com>
To: Brian E Carpenter <brian.e.carpenter@gmail.com>
Cc: IPv6 Ops WG <v6ops@ietf.org>, Xipengxiao <xipengxiao@huawei.com>
Content-Type: multipart/alternative; boundary="000000000000d5b7e705faffb64c"
X-mailroute: internal
X-Proofpoint-ORIG-GUID: bjFuXEqPweMSKkdyen3QcmXxk6MSCT1W
X-Proofpoint-GUID: bjFuXEqPweMSKkdyen3QcmXxk6MSCT1W
Archived-At: <https://mailarchive.ietf.org/arch/msg/v6ops/HDZ9Cc60z1YzEdVchm0u4L5sGek>
Subject: Re: [v6ops] [E] Re: How New Version of draft-ietf-v6ops-nd-considerations-01.txt can help discussion of other drafts
X-BeenThere: v6ops@ietf.org
X-Mailman-Version: 2.1.39
Precedence: list
List-Id: v6ops discussion list <v6ops.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/v6ops>, <mailto:v6ops-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/v6ops/>
List-Post: <mailto:v6ops@ietf.org>
List-Help: <mailto:v6ops-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/v6ops>, <mailto:v6ops-request@ietf.org?subject=subscribe>
X-List-Received-Date: Sat, 06 May 2023 05:31:23 -0000

Hi Brian

Good point.  As you mentioned SOHO or Campus WIFi can avoid all problems
and the main focus of the draft is FBB, MBB and Enterprise networks.

I think we could add a ND deployment considerations section to help
operators and in there we could have a table that categorizes the issues in
section 2 as to which are the ones to focus on by the different use cases
you mentioned honing in on the main issue map to the particular use case.

Hi Xipeng

>From Brian’s really good point as we are biased here and want to advocate
for IPv6 deployment and proliferation we want to maybe have that twist in
the draft that we consciously in the back of our minds we want to help and
not make it more difficult for operators deploying IPv6 and wherever
possible can throw in a benefit of IPv6 over IPv4 where applicable so this
draft can really pave the way for operators stuck in the mud trying to
decide, and now we can push them over the fence to deploy IPv6.

..here is a good example..

In section 2.1 you may want to mention one of the major advantages in a L2
environment with IPv6 as compare to IPv4 is that IPv4 has the concept of
all Fs broadcast and unknown unicast  which is also broadcast flooded out
all switch ports where with IPv6 the concept of broadcast does not exist
and so all typical IPv4 broadcast and unknown unicast is done via multicast
constraint of traffic to only interesting ports and not blindly flooding
out all ports as done with IPv4 ARP broadcast which can lead to meltdowns
from ARP storms.  So that is eliminated and constrained to multicast but
requires all L2 switches to have mld snooping enabled globally and if not
enabled the IPv6 multicast traffic still gets broadcasted out.

Most WIFI vendors Aruba, Cisco, Juniper have a workaround that they are
able to keep the upstream join IIL as multicast but can convert all the OIL
downstream MLDv2 requests to Unicast and so you still conserve bandwidth as
the incoming stream is a single multicast steam, however the OIL downstream
joins are all converted to unicast so then you don’t have the performance
hit with lowest common denominator for multicast issue.  So this can apply
to ND optimization for multicast.

Section 2.2

So in public networks like airport or coffee spot hotspots you are using
WIFI and not LAN connections and so in those cases use secure WIFI and not
open unsecured WIFI.

For enterprise LAN using 802.1x for port level access security.  That can
prevent attack vector since now everyone has to authenticate like you do
with secured WIFI to get on the network.

2.3 For DC Space NVO VXLAN and GENEVE maybe mention proxy ARP and proxy ND
 ARP / ND suppression feature which saves on the state info being flooded
in evpn control plane for every flow it’s only for the first packet and
then all subsequent flows to same egress we generate suppression cache
entry.  In what I described here it saves on ND queuing and flood within
the domain but the remote mac are all still learned in the control plane.
This is different then section 3.5 SARP which is traditional non NVO DC.

Thanks

Gyan

On Fri, May 5, 2023 at 7:48 PM Brian E Carpenter <
brian.e.carpenter@gmail.com> wrote:

> Hi XiPeng,
>
> One question I have arises from this remark:
>
> > If someone is to deploy IPv6, especially in an enterprise (i.e. IPv6
> 1st-hop), going through this draft to find out what ND issues one may
> encounter
>
> How does an enterprise operator know whether their network is subject to
> the issues described in the draft? We know the two extremes (a small office
> network can probably ignore all of this, and a large campus WiFi with BYOD
> access probably needs to worry about all of it). But an individual network
> designer, even with the careful presentation in this draft, has to decide
> which issues to worry about, if any, before considering a solution.
>
> I'm not sure how to resolve this, but I am a bit concerned that the
> document could have a "freezing" effect on IPv6 deployment unless we can
> give such guidance.
>
> Regards
>     Brian Carpenter
>
> On 29-Apr-23 10:14, Xipengxiao wrote:
> > Hi folks,
> >
> > We just released a new version of draft-ietf-v6ops-nd-considerations.
> The main changes are:
> >
> > •New title: Selectively Isolating Hosts to Prevent Potential Neighbor
> Discovery Protocol Issues
> >
> > •Add a New Section: 4.3. Applicability of Subnet Isolation with Shared
> Medium
> >
> > •Tidy-up Section 4
> >
> > So far, this draft gets little attention and review.  We think it’s
> because this draft is like a “ND issues and solutions manual”.  When you
> are not doing THAT thing, reading a manual can be boring, especially
> because the draft gets into a fair amount of details about ND issues and
> solutions.  So we would like to highlight the value of this draft and call
> for more reviews:
> >
> >  1. It summarized various ND issues and solutions from 30+ RFCs into a
> 1-stop reference;
> >  2. It’s the first draft to point out that the 15 ND issues are
> triggered by just 3 causes.  This makes future protocol solution or
> operations solution much easier – it’s easier and more effective to handle
> 3 causes than 15 individual issues;
> >  3. This draft tabulates the solutions for each issue, and the
> applicability of the commonly used solutions. This can be handy for future
> draft discussion.  For example, lately draft-collink receives a lot of
> discussions.  This draft can help draft-collink’s development & discussion
> in the following ways:
> >      1. The problem that draft-collink is trying to solve, a host has
> more IPv6 addresses than the NCEs its router keeps -> packet loss, is
> essentially a “NCE exhaustion” issue described in our draft.  From the
> “issue-solution” table (Table 1) you can quickly find that among the
> solutions for this issue, Unique Prefix Per Host is one of the most
> suitable for this situation.  Draft-collink is indeed a flavor of Unique
> Prefix Per Host;
> >      2. Several people on the mailing list are concerned that the
> draft-collink solution has limitations, and want the co-authors to point
> out where the solutions are applicable and where it is not.  Several people
> have pointed out some limitations.  But all are done in an ad-hoc way (i.e.
> you think about it, you may find some limitations, but you may also miss
> some limitations).  In comparison, our draft already has systematic
> coverage of the advantages, disadvantages and applicability of Unique
> Prefix Per Host.  Reading and referencing our draft can save the community
> time in discussing draft-collink and future drafts.  We acknowledge that
> our draft may not be 100% complete either, but we argue that reviewing and
> completing it is a good investment, because the community will save time in
> future ND-related draft discussion.
> >  4. If someone is to deploy IPv6, especially in an enterprise (i.e. IPv6
> 1^st -hop), going through this draft to find out what ND issues one may
> encounter and follow the guidelines to pick a suitable solution can save
> him/her a lot of time than doing his/her own study.
> >
> > Thank you very much if you read to this point.  We hope you can review
> this draft to further improve it. We believe it’s a good investment for the
> WG.
> >
> > XiPeng & the co-authors
> >
> > -----Original Message-----
> > From: internet-drafts@ietf.org <internet-drafts@ietf.org>
> > Sent: Thursday, April 27, 2023 10:09 AM
> > To: Vasilenko Eduard <vasilenko.eduard@huawei.com>; Eduard Metz <
> eduard.metz@kpn.com>; Vasilenko Eduard <vasilenko.eduard@huawei.com>;
> Gyan Mishra <gyan.s.mishra@verizon.com>; Nick Buraglio <buraglio@es.net>;
> Xipengxiao <xipengxiao@huawei.com>
> > Subject: New Version Notification for
> draft-ietf-v6ops-nd-considerations-01.txt
> >
> > A new version of I-D, draft-ietf-v6ops-nd-considerations-01.txt
> >
> > has been successfully submitted by XiPeng Xiao and posted to the IETF
> repository.
> >
> > Name:                       draft-ietf-v6ops-nd-considerations
> >
> > Revision:       01
> >
> > Title:              Selectively Isolating Hosts to Prevent Potential
> Neighbor Discovery Protocol Issues
> >
> > Document date:     2023-04-27
> >
> > Group:                       v6ops
> >
> > Pages:                        31
> >
> > URL:
> https://urldefense.proofpoint.com/v2/url?u=https-3A__www.ietf.org_archive_id_draft-2Dietf-2Dv6ops-2Dnd-2Dconsiderations-2D01.txt&d=DwIGaQ&c=udBTRvFvXC5Dhqg7UHpJlPps3mZ3LRxpb6__0PomBTQ&r=DnUkF34wu4mqq0UY8nn2rxBBO7qOW_D-RfNVLML28ZU&m=iotgBWTCFFWPOK6Psd06xuO4j8mIPUNqVXdxxCKgyjj2hisgbVsfmGvN6UBO4Opm&s=Ywtd7saGyuAHA43gP6EMvGuKaldKelZBDgRlHkXGN8E&e=
> <
> https://urldefense.proofpoint.com/v2/url?u=https-3A__www.ietf.org_archive_id_draft-2Dietf-2Dv6ops-2Dnd-2Dconsiderations-2D01.txt&d=DwIGaQ&c=udBTRvFvXC5Dhqg7UHpJlPps3mZ3LRxpb6__0PomBTQ&r=DnUkF34wu4mqq0UY8nn2rxBBO7qOW_D-RfNVLML28ZU&m=iotgBWTCFFWPOK6Psd06xuO4j8mIPUNqVXdxxCKgyjj2hisgbVsfmGvN6UBO4Opm&s=Ywtd7saGyuAHA43gP6EMvGuKaldKelZBDgRlHkXGN8E&e=
> >
> >
> > Status:
> https://urldefense.proofpoint.com/v2/url?u=https-3A__datatracker.ietf.org_doc_draft-2Dietf-2Dv6ops-2Dnd-2Dconsiderations_&d=DwIGaQ&c=udBTRvFvXC5Dhqg7UHpJlPps3mZ3LRxpb6__0PomBTQ&r=DnUkF34wu4mqq0UY8nn2rxBBO7qOW_D-RfNVLML28ZU&m=iotgBWTCFFWPOK6Psd06xuO4j8mIPUNqVXdxxCKgyjj2hisgbVsfmGvN6UBO4Opm&s=ZsaoEH8o-7cZunTY45Q_50uy_e5msk0sfTsndGiyQFY&e=
> <
> https://urldefense.proofpoint.com/v2/url?u=https-3A__datatracker.ietf.org_doc_draft-2Dietf-2Dv6ops-2Dnd-2Dconsiderations_&d=DwIGaQ&c=udBTRvFvXC5Dhqg7UHpJlPps3mZ3LRxpb6__0PomBTQ&r=DnUkF34wu4mqq0UY8nn2rxBBO7qOW_D-RfNVLML28ZU&m=iotgBWTCFFWPOK6Psd06xuO4j8mIPUNqVXdxxCKgyjj2hisgbVsfmGvN6UBO4Opm&s=ZsaoEH8o-7cZunTY45Q_50uy_e5msk0sfTsndGiyQFY&e=
> >
> >
> > Htmlized:
> https://urldefense.proofpoint.com/v2/url?u=https-3A__datatracker.ietf.org_doc_html_draft-2Dietf-2Dv6ops-2Dnd-2Dconsiderations&d=DwIGaQ&c=udBTRvFvXC5Dhqg7UHpJlPps3mZ3LRxpb6__0PomBTQ&r=DnUkF34wu4mqq0UY8nn2rxBBO7qOW_D-RfNVLML28ZU&m=iotgBWTCFFWPOK6Psd06xuO4j8mIPUNqVXdxxCKgyjj2hisgbVsfmGvN6UBO4Opm&s=uG6rb_NKBRlKWU1hAPQLlV-_7C1lA6FdQpN4UN1nzrI&e=
> <
> https://urldefense.proofpoint.com/v2/url?u=https-3A__datatracker.ietf.org_doc_html_draft-2Dietf-2Dv6ops-2Dnd-2Dconsiderations&d=DwIGaQ&c=udBTRvFvXC5Dhqg7UHpJlPps3mZ3LRxpb6__0PomBTQ&r=DnUkF34wu4mqq0UY8nn2rxBBO7qOW_D-RfNVLML28ZU&m=iotgBWTCFFWPOK6Psd06xuO4j8mIPUNqVXdxxCKgyjj2hisgbVsfmGvN6UBO4Opm&s=uG6rb_NKBRlKWU1hAPQLlV-_7C1lA6FdQpN4UN1nzrI&e=
> >
> >
> > Diff:
> https://urldefense.proofpoint.com/v2/url?u=https-3A__author-2Dtools.ietf.org_iddiff-3Furl2-3Ddraft-2Dietf-2Dv6ops-2Dnd-2Dconsiderations-2D01&d=DwIGaQ&c=udBTRvFvXC5Dhqg7UHpJlPps3mZ3LRxpb6__0PomBTQ&r=DnUkF34wu4mqq0UY8nn2rxBBO7qOW_D-RfNVLML28ZU&m=iotgBWTCFFWPOK6Psd06xuO4j8mIPUNqVXdxxCKgyjj2hisgbVsfmGvN6UBO4Opm&s=ePNyyGsiu9RxWfHKJQOxA01TC3YiKdGtlhoidp3WlhA&e=
> <
> https://urldefense.proofpoint.com/v2/url?u=https-3A__author-2Dtools.ietf.org_iddiff-3Furl2-3Ddraft-2Dietf-2Dv6ops-2Dnd-2Dconsiderations-2D01&d=DwIGaQ&c=udBTRvFvXC5Dhqg7UHpJlPps3mZ3LRxpb6__0PomBTQ&r=DnUkF34wu4mqq0UY8nn2rxBBO7qOW_D-RfNVLML28ZU&m=iotgBWTCFFWPOK6Psd06xuO4j8mIPUNqVXdxxCKgyjj2hisgbVsfmGvN6UBO4Opm&s=ePNyyGsiu9RxWfHKJQOxA01TC3YiKdGtlhoidp3WlhA&e=
> >
> >
> > Abstract:
> >
> >     Neighbor Discovery (ND) is a key protocol of IPv6 first-hop. ND uses
> >
> >     multicast extensively and trusts all hosts. In some scenarios like
> >
> >     wireless networks, multicast can be inefficient. In other scenarios
> >
> >     like public access networks, hosts may not be trustable.
> >
> >     Consequently, ND has potential issues in various scenarios. The
> >
> >     issues and the solutions for them are documented in more than 30
> >
> >     RFCs. It is difficult to keep track of all these issues and
> >
> >     solutions. Therefore, an overview and some guidelines are useful.
> >
> >     This document firstly summarizes the known ND issues and
> >
> >     optimization solutions into a one-stop reference. Analyzing these
> >
> >     solutions reveals an insight: isolating hosts is effective in
> >
> >     preventing ND issues. Five isolation methods are proposed and their
> >
> >     applicability is discussed. Guidelines are then described for
> >
> >     selecting a suitable isolation method based on the deployment
> >
> >     scenario.
> >
> > The IETF Secretariat
> >
> >
> > _______________________________________________
> > v6ops mailing list
> > v6ops@ietf.org
> >
> https://urldefense.proofpoint.com/v2/url?u=https-3A__www.ietf.org_mailman_listinfo_v6ops&d=DwIGaQ&c=udBTRvFvXC5Dhqg7UHpJlPps3mZ3LRxpb6__0PomBTQ&r=DnUkF34wu4mqq0UY8nn2rxBBO7qOW_D-RfNVLML28ZU&m=iotgBWTCFFWPOK6Psd06xuO4j8mIPUNqVXdxxCKgyjj2hisgbVsfmGvN6UBO4Opm&s=JTSJnPnU_XZPFiP-DTjKTxl05rWSR7oeRXQ0B4-_ok4&e=
>
-- 

<http://www.verizon.com/>

*Gyan Mishra*

*IT Technologist & Innovations Specialist*

*Associate Fellow-Network Design*

*Network Solutions A**rchitect, *

*R&S, SP SME & Protocol Design Expert*

*Global Technology Services*



*O 240 970-6287M 301 502-1347*