Re: [v6ops] Updating RFC 7084

Vasilenko Eduard <vasilenko.eduard@huawei.com> Mon, 21 November 2022 17:51 UTC

Return-Path: <vasilenko.eduard@huawei.com>
X-Original-To: v6ops@ietfa.amsl.com
Delivered-To: v6ops@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 18B9BC14CF19 for <v6ops@ietfa.amsl.com>; Mon, 21 Nov 2022 09:51:47 -0800 (PST)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -6.896
X-Spam-Level:
X-Spam-Status: No, score=-6.896 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, HTML_MESSAGE=0.001, RCVD_IN_DNSWL_HI=-5, RCVD_IN_MSPIKE_H2=-0.001, RCVD_IN_ZEN_BLOCKED_OPENDNS=0.001, SPF_HELO_NONE=0.001, SPF_PASS=-0.001, URIBL_BLOCKED=0.001, URIBL_DBL_BLOCKED_OPENDNS=0.001, URIBL_ZEN_BLOCKED_OPENDNS=0.001] autolearn=ham autolearn_force=no
Received: from mail.ietf.org ([50.223.129.194]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id oIJaVKqUgXuG for <v6ops@ietfa.amsl.com>; Mon, 21 Nov 2022 09:51:43 -0800 (PST)
Received: from frasgout.his.huawei.com (frasgout.his.huawei.com [185.176.79.56]) (using TLSv1.2 with cipher AECDH-AES256-SHA (256/256 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id BBDE5C14F73D for <v6ops@ietf.org>; Mon, 21 Nov 2022 09:51:42 -0800 (PST)
Received: from frapeml500002.china.huawei.com (unknown [172.18.147.201]) by frasgout.his.huawei.com (SkyGuard) with ESMTP id 4NGFHx2Ms9z688G2 for <v6ops@ietf.org>; Tue, 22 Nov 2022 01:49:01 +0800 (CST)
Received: from mscpeml100002.china.huawei.com (7.188.26.75) by frapeml500002.china.huawei.com (7.182.85.205) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256) id 15.1.2375.31; Mon, 21 Nov 2022 18:51:39 +0100
Received: from mscpeml500001.china.huawei.com (7.188.26.142) by mscpeml100002.china.huawei.com (7.188.26.75) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256) id 15.1.2375.31; Mon, 21 Nov 2022 20:51:39 +0300
Received: from mscpeml500001.china.huawei.com ([7.188.26.142]) by mscpeml500001.china.huawei.com ([7.188.26.142]) with mapi id 15.01.2375.031; Mon, 21 Nov 2022 20:51:39 +0300
From: Vasilenko Eduard <vasilenko.eduard@huawei.com>
To: Ted Lemon <mellon@fugue.com>
CC: IETF v6ops WG <v6ops@ietf.org>
Thread-Topic: [v6ops] Updating RFC 7084
Thread-Index: AQHY+1zN9qjGTF7iKUuZ5LFbbY25UK5E6EIAgARGIYCAADpgUP//6mWAgAAzb5D//9MDgIAAMt7g///ZQwAAByahIP//zqmA///NYOCAADVHgP//zPNAgAA2b4D//816wAAGhWUA///NURD//8qbAP//Ykng
Date: Mon, 21 Nov 2022 17:51:39 +0000
Message-ID: <9a6dee6666164aafa5cf9833f7ddff26@huawei.com>
References: <0595eeaa9312460782253b7b465edf7e@huawei.com> <B1B0F1F6-DEEA-4043-9771-4BE3407E0D71@employees.org> <255cbeefc23e4ab9bd714a68266a73b4@huawei.com> <CAPt1N1=J5YG1onG-KX5cjZ6y5zrdQLmmY4g1Zog8RybLKzNn-Q@mail.gmail.com> <c0217ef65d06404696434e26e56c8557@huawei.com> <CAPt1N1mehaFD9utDe=V2i_T4qEmtp4LVMmCeEYPAk4jUBX1m_A@mail.gmail.com> <455fbc3182c246a997c8d0921e80886f@huawei.com> <CAPt1N1mDUQ=59GHE4CsQTYZyL_NWnCbvbeUaF0VuMaR4BWMAaA@mail.gmail.com> <ad35b35ceba1422fbfd6b58dfa37adef@huawei.com> <CAPt1N1n868WyxkUT3S8qZ1t2WxhTrzEFjYAGn3iiHq1VWzuSjA@mail.gmail.com> <7f16883210b44f1788988ee04ec27ae5@huawei.com> <CAPt1N1mRU1pfQDSn2RCeb6uP8EE742WfR2XYFktNN=FpW0Q+RQ@mail.gmail.com> <329f5f653d694d79a465352895660455@huawei.com> <CAPt1N1=1wT1W7b-LWjRcpdV=2aqP9TP0k1GBSt3j_g-8XU95wA@mail.gmail.com>
In-Reply-To: <CAPt1N1=1wT1W7b-LWjRcpdV=2aqP9TP0k1GBSt3j_g-8XU95wA@mail.gmail.com>
Accept-Language: en-US, zh-CN
Content-Language: en-US
X-MS-Has-Attach:
X-MS-TNEF-Correlator:
x-originating-ip: [10.195.33.77]
Content-Type: multipart/alternative; boundary="_000_9a6dee6666164aafa5cf9833f7ddff26huaweicom_"
MIME-Version: 1.0
X-CFilter-Loop: Reflected
Archived-At: <https://mailarchive.ietf.org/arch/msg/v6ops/HKONGOhVU2gd_J_3oo2mIhcrNGw>
Subject: Re: [v6ops] Updating RFC 7084
X-BeenThere: v6ops@ietf.org
X-Mailman-Version: 2.1.39
Precedence: list
List-Id: v6ops discussion list <v6ops.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/v6ops>, <mailto:v6ops-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/v6ops/>
List-Post: <mailto:v6ops@ietf.org>
List-Help: <mailto:v6ops-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/v6ops>, <mailto:v6ops-request@ietf.org?subject=subscribe>
X-List-Received-Date: Mon, 21 Nov 2022 17:51:47 -0000

The problem does not exist currently.

The current situation with DHCP-PD is not a problem because the DHCP-PD state is strictly connected to uplink (to the carrier).
If the uplink is down then DHCP-PD could be cleared (and PIO with depreciation may be propagated).
It is not many hops away as you propose.

No mechanism for prefix delegation propagation over the site (multi-hop) has been adopted (HNCP is not adopted).
By the way, HNCP was some sort of routing where it was possible to inform that some prefix is not valid anymore.
HNCP propagates positive and negative messages the same effectively.

If you would become successful with DHCP-PD propagation over the site
Then you would create the problem of stale prefixes.
People would start to complain exactly in situations when they have redundant carriers connections to improve reliability.
They would be very disappointed because they made some efforts (redundant Carrier) to avoid the problem.

Eduard
From: Ted Lemon [mailto:mellon@fugue.com]
Sent: Monday, November 21, 2022 8:42 PM
To: Vasilenko Eduard <vasilenko.eduard@huawei.com>
Cc: IETF v6ops WG <v6ops@ietf.org>
Subject: Re: [v6ops] Updating RFC 7084

So, a host on the link would have the same problem, and hence this has nothing to do with DHCPv6 PD.

Op ma 21 nov. 2022 om 12:40 schreef Vasilenko Eduard <vasilenko.eduard@huawei.com<mailto:vasilenko.eduard@huawei.com>>
> independent of that, the stub router can see if the ra from the router that delegated a particular prefix indicates that the router is no longer preferred.

No. the connection between routers on site is fine (it is LAN). RA is available without problems.
The upstream connection on the infrastructure router has been lost.
It is more probable because the upstream connection is WAN/MAN.
DSL was not between on-site routers. DSL was on the upstream of the infrastructure router.

By the way, RA absence in general is a bad indication because it is 900 sec by default. Users with the real-time application (even youtube) would be not happy.

> We can say that the server is required to support notification
It needs investigation why DHCP notification is not popular.
DHCP has not been intended for this initially.

Eduard
From: Ted Lemon [mailto:mellon@fugue.com<mailto:mellon@fugue.com>]
Sent: Monday, November 21, 2022 8:32 PM
To: Vasilenko Eduard <vasilenko.eduard@huawei.com<mailto:vasilenko.eduard@huawei.com>>
Cc: IETF v6ops WG <v6ops@ietf.org<mailto:v6ops@ietf.org>>
Subject: Re: [v6ops] Updating RFC 7084

We’re writing a new specification here. We can say that the server is required to support notification. But independent of that, the stub router can see if the ra from the router that delegated a particular prefix indicates that the router is no longer preferred.

Op ma 21 nov. 2022 om 12:30 schreef Vasilenko Eduard <vasilenko.eduard@huawei.com<mailto:vasilenko.eduard@huawei.com>>
How?
The prefix has been delegated by the DHCP request from the stub router.
Evidently, the stub router could not ping periodically for a refresh.
Hence, the infrastructure router should “notify”.
You said, “DHCP has notification”.
I know that it is not used widely. Why?
Would every built-in server support it?
Eduard
From: Ted Lemon [mailto:mellon@fugue.com<mailto:mellon@fugue.com>]
Sent: Monday, November 21, 2022 8:26 PM
To: Vasilenko Eduard <vasilenko.eduard@huawei.com<mailto:vasilenko.eduard@huawei.com>>
Cc: IETF v6ops WG <v6ops@ietf.org<mailto:v6ops@ietf.org>>
Subject: Re: [v6ops] Updating RFC 7084

In this scenario the stub router knows the router is deprecated. Why would it not deprecate the prefix?

Op ma 21 nov. 2022 om 12:23 schreef Vasilenko Eduard <vasilenko.eduard@huawei.com<mailto:vasilenko.eduard@huawei.com>>
In-line

From: Ted Lemon [mailto:mellon@fugue.com<mailto:mellon@fugue.com>]
Sent: Monday, November 21, 2022 8:14 PM
To: Vasilenko Eduard <vasilenko.eduard@huawei.com<mailto:vasilenko.eduard@huawei.com>>
Cc: IETF v6ops WG <v6ops@ietf.org<mailto:v6ops@ietf.org>>
Subject: Re: [v6ops] Updating RFC 7084

You’ve described a situation, not a real world scenario. How did the host wind up in this situation?
[EV] his stub router just joined some infrastructure where connections to 2 carriers were available. Hence, the stub router received 2 prefixes and announced 2 PIOs to the host
Why is the network configured this way?
[EV] The person managing infrastructure would like resiliency. He has connected one router to 2 Carriers. Then received /56 prefixes from both.
It is not MHMP – It is one router connected to different carriers.
Why is it that only by deprecating the prefix can the host experience reliable connectivity?
[EV] The host may use the PIO as the source address that is not connected anymore to the owner (Carrier).
The different carrier would always do a uRPF check to drop the packet from the wrong source address (belonging to the different carrier).

Op ma 21 nov. 2022 om 12:11 schreef Vasilenko Eduard <vasilenko.eduard@huawei.com<mailto:vasilenko.eduard@huawei.com>>
The host had many PIOs (from many PA prefixes).
One prefix has become outdated somewhere upstream (because the connection to the carrier is lost), but the information has not been propagated to the host (DHCP is not the best for negative information propagation).
The host may still try to use a dead PIO despite the same host having another alive PIO.
The end user is unhappy, he could not open the site, and he calls you for help.
Ed
From: Ted Lemon [mailto:mellon@fugue.com<mailto:mellon@fugue.com>]
Sent: Monday, November 21, 2022 8:04 PM
To: Vasilenko Eduard <vasilenko.eduard@huawei.com<mailto:vasilenko.eduard@huawei.com>>
Cc: IETF v6ops WG <v6ops@ietf.org<mailto:v6ops@ietf.org>>
Subject: Re: [v6ops] Updating RFC 7084

Try to give us an example of an actual user experience that would be affected by the behavior you are concerned about. Describe the network configuration.

The reason I am skeptical of your concern is that I have no idea what real world scenario is motivating it.

Op ma 21 nov. 2022 om 12:02 schreef Vasilenko Eduard <vasilenko.eduard@huawei.com<mailto:vasilenko.eduard@huawei.com>>
Hi Ted,
I do not want to ignore you.
But I am not capable to explain it differently.
It looks so obvious…
Eduard
From: Ted Lemon [mailto:mellon@fugue.com<mailto:mellon@fugue.com>]
Sent: Monday, November 21, 2022 7:36 PM
To: Vasilenko Eduard <vasilenko.eduard@huawei.com<mailto:vasilenko.eduard@huawei.com>>
Cc: IETF v6ops WG <v6ops@ietf.org<mailto:v6ops@ietf.org>>; Ole Troan <otroan=40employees.org@dmarc.ietf.org<mailto:40employees.org@dmarc.ietf.org>>
Subject: Re: [v6ops] Updating RFC 7084

What’s the problem you’re trying to solve here?

Op ma 21 nov. 2022 om 10:59 schreef Vasilenko Eduard <vasilenko.eduard@huawei.com<mailto:vasilenko.eduard@huawei.com>>
It was not about routing.
DHCP-PD propagates prefixes that would be used for PIOs.
If Carrier is not available anymore, hosts should stop using these PIOs for source addresses.
But the stub router should be informed that particular prefixes should not be used anymore.
How?
Then stub router could deprecate PIO (zero preferred lifetime).
Ed/
From: Ole Troan [mailto:otroan<mailto:otroan>=40employees.org@dmarc.ietf.org<mailto:40employees.org@dmarc.ietf.org>]
Sent: Monday, November 21, 2022 6:53 PM
To: Vasilenko Eduard <vasilenko.eduard@huawei.com<mailto:vasilenko.eduard@huawei.com>>
Cc: Ted Lemon <mellon@fugue.com<mailto:mellon@fugue.com>>; IETF v6ops WG <v6ops@ietf.org<mailto:v6ops@ietf.org>>
Subject: Re: [v6ops] Updating RFC 7084

Eduard,

I think you confuse addressing with routing.

O.

On 21 Nov 2022, at 16:39, Vasilenko Eduard <vasilenko.eduard=40huawei.com@dmarc.ietf.org<mailto:vasilenko.eduard=40huawei.com@dmarc.ietf.org>> wrote:

Imagine that the uplink to the Carrier (DSL for example) is down.
All hosts on the site should stop using the /48 prefix received from this carrier. It should happen preferably sub-second.
How this negative information would propagate over the site? (multi-hop)
Default PIO preferred time is 1 week. Fernando has the intention to change it to 2hours – still pretty bad.
The resolution by the current ND is very bad.
Eduard
From: Ted Lemon [mailto:mellon@fugue.com]
Sent: Monday, November 21, 2022 6:30 PM
To: Vasilenko Eduard <vasilenko.eduard@huawei.com<mailto:vasilenko.eduard@huawei.com>>
Cc: IETF v6ops WG <v6ops@ietf.org<mailto:v6ops@ietf.org>>
Subject: Re: [v6ops] Updating RFC 7084

The DHCPv6 server could send a notification to the DHCPv6 client if we are concerned about this. But it’s not clear to me that we should be. If you think we should be, you need to actually make a case for that, not just assert that it’s so.

Op ma 21 nov. 2022 om 08:52 schreef Vasilenko Eduard <vasilenko.eduard=40huawei.com@dmarc.ietf.org<mailto:40huawei.com@dmarc.ietf.org>>
Hi all,

I do not understand how DHCP-PD may be used for prefix distribution inside the site.
Because uplink could go down.
Should be some signaling to all routers on site that the prefix is not available anymore (and should be deprecated on all links).
But DHCP is stateless in principle.
This "flush renumbering problem" would be pretty difficult to fix.
It would kill MHMP completely.

Eduard
-----Original Message-----
From: v6ops <v6ops-bounces@ietf.org<mailto:v6ops-bounces@ietf.org>> On Behalf Of Brian E Carpenter
Sent: Friday, November 18, 2022 9:02 PM
To: Timothy Winters <tim@qacafe.com<mailto:tim@qacafe.com>>; IPv6 Operations <v6ops@ietf.org<mailto:v6ops@ietf.org>>
Subject: Re: [v6ops] Updating RFC 7084

On 19-Nov-22 03:47, Timothy Winters wrote:
> Hello,
>
> I've started a draft to update RFC 7084 to support prefix delegation on the LAN interfaces.  The current state of IPv6 in home networks is ISP are assigning prefixes of appropriate sizes but they currently are under utilized due to the lack of prefix delegation on LAN interfaces.
>
> This draft is an attempt to add that support to the draft.
>
> https://datatracker.ietf.org/doc/draft-winters-v6ops-cpe-lan-pd/
> <https://datatracker.ietf.org/doc/draft-winters-v6ops-cpe-lan-pd/>
>
> This is only an update to 7084 at the moment, there has been some discussion on the snac working group about leveraging this work as well.
>
> One item being discussed is this currently doesn't solve multi-homed networks.

As a historical note, we've spent a lot of time in the past on multi-homing and more or less failed (and the HOMENET approach was designed for home nets, not for enterprises where the problem is probably more important).

To summarise what I've said over on SNAC:

1. If we're going to mention PvDs in the 7084 update, I think we should also mention RFC 8028. It isn't that a CE router should necessarily support 8028, but that in a network that does implement 8028 on its subnet routers, the following part of 8028 applies:

2.2.  Expectations of Multihomed Networks

    Networking equipment needs to support source/destination routing for
    at least some of the routes in the Forwarding Information Base (FIB),
    such as default egress routes differentiated by source prefix.
    Installation of source/destination routes in the FIB might be
    accomplished using static routes, Software-Defined Networking (SDN)
    technologies, or dynamic routing protocols.

Those egress routes of course lead to CE routers.

(There is some other thinking about this topic in draft-vv-6man-nd-support-mhmp).

    Brian


>
> I welcome any feedback about the proposal.
>
> ~Tim
>
> _______________________________________________
> v6ops mailing list
> v6ops@ietf.org<mailto:v6ops@ietf.org>
> https://www.ietf.org/mailman/listinfo/v6ops
_______________________________________________
v6ops mailing list
v6ops@ietf.org<mailto:v6ops@ietf.org>
https://www.ietf.org/mailman/listinfo/v6ops
_______________________________________________
v6ops mailing list
v6ops@ietf.org<mailto:v6ops@ietf.org>
https://www.ietf.org/mailman/listinfo/v6ops
_______________________________________________
v6ops mailing list
v6ops@ietf.org<mailto:v6ops@ietf.org>
https://www.ietf.org/mailman/listinfo/v6ops