Re: [v6ops] Heise.de article about IPv6 behaviour of 29 CPEs and reaction to prefix changes

Ted Lemon <mellon@fugue.com> Tue, 17 January 2023 18:58 UTC

Return-Path: <mellon@fugue.com>
X-Original-To: v6ops@ietfa.amsl.com
Delivered-To: v6ops@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 26192C15171E for <v6ops@ietfa.amsl.com>; Tue, 17 Jan 2023 10:58:32 -0800 (PST)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -1.883
X-Spam-Level:
X-Spam-Status: No, score=-1.883 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, DKIM_SIGNED=0.1, DKIM_VALID=-0.1, HTML_FONT_LOW_CONTRAST=0.001, HTML_MESSAGE=0.001, RCVD_IN_DNSWL_BLOCKED=0.001, RCVD_IN_ZEN_BLOCKED_OPENDNS=0.001, SPF_HELO_NONE=0.001, SPF_PASS=-0.001, T_KAM_HTML_FONT_INVALID=0.01, URIBL_BLOCKED=0.001, URIBL_DBL_BLOCKED_OPENDNS=0.001, URIBL_ZEN_BLOCKED_OPENDNS=0.001] autolearn=unavailable autolearn_force=no
Authentication-Results: ietfa.amsl.com (amavisd-new); dkim=pass (2048-bit key) header.d=fugue-com.20210112.gappssmtp.com
Received: from mail.ietf.org ([50.223.129.194]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id T9lmlbSXSZ_r for <v6ops@ietfa.amsl.com>; Tue, 17 Jan 2023 10:58:27 -0800 (PST)
Received: from mail-qk1-x735.google.com (mail-qk1-x735.google.com [IPv6:2607:f8b0:4864:20::735]) (using TLSv1.3 with cipher TLS_AES_128_GCM_SHA256 (128/128 bits) key-exchange X25519 server-signature RSA-PSS (2048 bits) server-digest SHA256) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id EC135C1522C0 for <v6ops@ietf.org>; Tue, 17 Jan 2023 10:58:27 -0800 (PST)
Received: by mail-qk1-x735.google.com with SMTP id h11so3624126qkm.5 for <v6ops@ietf.org>; Tue, 17 Jan 2023 10:58:27 -0800 (PST)
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=fugue-com.20210112.gappssmtp.com; s=20210112; h=cc:to:subject:message-id:date:from:in-reply-to:references :mime-version:from:to:cc:subject:date:message-id:reply-to; bh=3TRlulAEwWySwnPlHIVi4eNqpunX0yVv+IbRsARF2kY=; b=R2zgUJ2spQC74uFBsJY1YrDiEbTp7KdR3ZN9/Nz7c9aMBWQKd6nTu/GImgJ2M8IUbo rWid9GQ7ms0F47V5ifKnPbg0ohjs2hOEb0KltmPNkAObe01xiFq7qbVrS9IrzyyZqJmb 3Tm6woW9F4dtElg51+mNu2D+614l3OKBkRABXrmTABObzsh0sl7aroqXNOKw+2eK2SM2 asAq2r3Y6yt1s5OO6hUk6FZFcupSdg3F8AkAJ41gi2eB/3UtW4oogyFxYBimSPnsVoSD /57ytso6iIDuG1mKW6wOw3Y0iVDB7UOiC38WW0sNuhGVUwl6pjkQbowznhhGw2wmdohe W/HA==
X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20210112; h=cc:to:subject:message-id:date:from:in-reply-to:references :mime-version:x-gm-message-state:from:to:cc:subject:date:message-id :reply-to; bh=3TRlulAEwWySwnPlHIVi4eNqpunX0yVv+IbRsARF2kY=; b=QbxVzaoF1vHt4KgFNwk+wY4GVa6ucxrVuev/VoKP2teGmkAVs7w7p7YDZinu+AwwuQ GgHEhz+wQbq2MdNPAlmZycukv+TdtK/7AeBU47BLaRWa7esE8+lV8kk5CcAUtW3BX9em ODS00uCdNtwsC+wmSwtPW7r5d84caJ/yTguf+Y9srHXxsMBuRwO3IDhn7rjgAqiMvncv W+8RGW328fccsO6R1RxgjAkasmu9Bf/61EZyVOLkc1glEsegyBkZh5cUzr7kIDUk2pHF 10y5myfuKv9HiEFRpx3iZb2fE4jceIvn0TKzQRqIdl2GtYXLoUm0zTLnC/ou3Foqjv8m KxDA==
X-Gm-Message-State: AFqh2kqABt67ZO1I8MbWpltNf57oX8/7SVp9jpCTtkcGRE+810cwX8sC TRUGMkLhT3AHiEfs9hgiRTzt6NTs0OGJ0rgJkYZcyA==
X-Google-Smtp-Source: AMrXdXslR4COYkAHSVfC1mNcs5HYoYOMTSY3WRC3r4J1kfY5W1+03Dx506JrdZFmknxOvgvcIBLvyGdMOEfzA3adwA8=
X-Received: by 2002:a05:620a:5371:b0:6fe:e6c3:2d3e with SMTP id op49-20020a05620a537100b006fee6c32d3emr214664qkn.365.1673981906673; Tue, 17 Jan 2023 10:58:26 -0800 (PST)
MIME-Version: 1.0
References: <261c65a87cfd453db38af88995162c7d@huawei.com> <fabc3012-9a8d-6a1e-2fe9-065396a34307@gmail.com> <3691e428c81f48a981fb146a6bcd599a@huawei.com> <CAM5+tA9nAoKkvBQb66JzsHX7yV0g7GwpoKVgXmYpVBmjTFso+A@mail.gmail.com>
In-Reply-To: <CAM5+tA9nAoKkvBQb66JzsHX7yV0g7GwpoKVgXmYpVBmjTFso+A@mail.gmail.com>
From: Ted Lemon <mellon@fugue.com>
Date: Tue, 17 Jan 2023 13:57:50 -0500
Message-ID: <CAPt1N1kco_T8ZacuDytyjTJ=DYzM-ZCY7PM3sOgkau=g-YfzSw@mail.gmail.com>
To: buraglio@es.net
Cc: Xipengxiao <xipengxiao=40huawei.com@dmarc.ietf.org>, "v6ops@ietf.org" <v6ops@ietf.org>
Content-Type: multipart/alternative; boundary="000000000000e8854d05f27a48d1"
Archived-At: <https://mailarchive.ietf.org/arch/msg/v6ops/MrphyHKjdLn3gUXUC6LJtNbXVWE>
Subject: Re: [v6ops] Heise.de article about IPv6 behaviour of 29 CPEs and reaction to prefix changes
X-BeenThere: v6ops@ietf.org
X-Mailman-Version: 2.1.39
Precedence: list
List-Id: v6ops discussion list <v6ops.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/v6ops>, <mailto:v6ops-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/v6ops/>
List-Post: <mailto:v6ops@ietf.org>
List-Help: <mailto:v6ops-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/v6ops>, <mailto:v6ops-request@ietf.org?subject=subscribe>
X-List-Received-Date: Tue, 17 Jan 2023 18:58:32 -0000

One thing I will point out here is that IPv6's flexibility makes things
possible that are actually useful, and are not possible with IPv4 (at least
not without some kind of heavy lift). E.g., there is no way to do stub
networks with IPv4. Doing what we've done with stub networks using only
IPv4 would require stateful NAT64 with the translation table tied to the
service advertisement table. Much more work than just doing IPv6 routing
with ULAs. Also not possible with GUAs, since IPv6 GUA prefixes aren't
universally available.

I think this idea of reducing flexibility is going in the wrong direction.
I think giving good advice about what solutions go with what problems is a
better approach, as Nick has suggested. I think also, getting our specs up
to date with what works, and getting implementations to follow the specs,
is important work that can't be discounted.

If there is any complexity we could probably reduce, it would be complexity
relating to transition technologies. E.g., 464XLAT was mentioned here, but
generally when 464XLAT will work, NAT64 is also present and also works.
NAT64 is less complex than 464XLAT. So there's no reason to have 464XLAT
other than that some application doesn't understand how to do IPv6. Is this
really something that app ecosystems should ever support?

On Tue, Jan 17, 2023 at 1:39 PM Nick Buraglio <buraglio@es.net> wrote:

> Here is what came to my mind:
>
> Informational draft detailing a working deployment with suggestions per
> scenario. When speaking with folks implementing IPv6, what most seem to
> want is a recipe due to the somewhat overwhelming set of knobs and levers.
> Flexibility, by design, breeds a potentially complex set of options. What
> they overwhelmingly want to see is a best practice - or at the very least a
> known working methodology for:
>
>    - I want to dual stack, what do I need to do?
>       - Here is a working recipe for deployment of a dual stack network
>       - Here are the features required to accomplish this
>    - Where should I use ULA?
>       - Here is an example of a successful ULA deployment
>       - Here is a link to the operational considerations draft for using
>       ULA (may help further the draft through the process as well)
>       - Here are examples of a supportable deployment for using GUA in a
>       similar manner to ULA
>    - What if I want to deploy my network as IPv6-only?
>       - Here are examples of successful and supportable IPv6-only
>       deployments
>          - Here are the features required to deploy these scenarios.
>       - etc...
>
> Some of this may exist, I don't know for sure. I know a lot of this exists
> in the wild in various documentation, forums, blog posts, and email
> threads. Having the IETF produce such text provides something more
> "official" that can be referenced by vendors, management, architects, etc..
> Regardless, and without commenting on whether this is the correct avenue
> or not, having a draft of a set of drafts that give these examples will go
> a *very* long way. If it is caveated in such a way that states "this is one
> way, it may not be the only way" may alleviate at least some of the lack of
> consensus that will inevitably arise.
>
> I have written some of a draft on ULA use cases (as well as some updates
> to RRC6724) written that need revisiting. Of course, if there is no
> consensus, then it's just another exercise.
>
> ----
> nb
>
> ᐧ
>
> ----
> nb
>
>
> On Tue, Jan 17, 2023 at 11:05 AM Xipengxiao <xipengxiao=
> 40huawei.com@dmarc.ietf.org> wrote:
>
>> Hi Brian and folks,  Please see comments in line.
>>
>>
>>
>> -----Original Message-----
>> From: v6ops <v6ops-bounces@ietf.org> On Behalf Of Brian E Carpenter
>> Sent: Monday, January 16, 2023 9:06 PM
>> To: v6ops@ietf.org
>> Subject: Re: [v6ops] Heise.de article about IPv6 behaviour of 29 CPEs and
>> reaction to prefix changes
>>
>>
>>
>> On 17-Jan-23 07:08, Xipengxiao wrote:
>>
>> > Hi folks,
>>
>> >
>>
>> > I am moving the discussion to v6ops as I think the problems are more
>> operational than technical.
>>
>> >
>>
>> > In short, the Heise article reported that existing IPv6 CPEs have
>> various problems and IPv6 may not work in many scenarios.  Then the good
>> question is, what can the IETF do about them?  From my first look, there
>> are so many different problems that it’s hard to see what to fix.  But
>> maybe the experts here have better ideas.
>>
>> >
>>
>> > Personally, I think the root cause is IPv6 has too many options (e.g.
>> GUA vs ULA vs now obsoleted SLA, SLAAC vs DHCP, 10+ transition solutions).
>>
>>
>>
>> As I commented on 6man, I believe that is not quite right. It's the real
>> world that has too many options, and IP6 has flexibility.
>>
>>
>>
>> XiPeng:  we can say “It's the real world that has too many options”, but
>> we can only change ourselves.  This is why I propose we limit the options
>> we offer to the world.
>>
>>
>>
>> > This makes it difficult for vendors to implement/fine tune their IPv6
>> solutions, and difficult for common people to learn and deploy.  I advocate
>> that IETF should provide clear recommendation,
>>
>>
>>
>> Yes, it's our job to provide guidelines and recommendations, but doing
>> that is not easy and hard to reach even rough consensus. For example:
>>
>>
>>
>> > e.g. only use GUA
>>
>>
>>
>> That's unacceptable. A good BCP on how and when to use ULAs is very
>> necessary.
>>
>>
>>
>> XiPeng: we had a debate whether enterprises need ULA in a side meeting in
>> London IETF.  Ted, Jen, Lorenzo, Jordi, Mike, Nalini, Nick all
>> participated.  The rough consensus was GUA works just fine.  So, I am not
>> saying that ULA has no value, I am saying that between ULA’s value and
>> reducing choices, I advocate the latter.
>>
>>
>>
>> But I agree that “providing guidelines and recommendations” is the way
>> to go, but that’s “hard to reach even rough consensus”. To overcome
>> that, I would like to propose a principle here “keep reducing IPv6 options
>> until it fails”.  If we can agree on a principle (or a few), maybe we can
>> reach some rough consensus.
>>
>>
>>
>> > , only use 464XLAT/MAP-T
>>
>>
>>
>> Possibly. But I am sure there are cases where that is a bad idea.
>>
>>
>>
>> XiPeng: I agree, but think of the principle I mentioned above – will the
>> solution fail?  Eduard Vasilenko said in another thread that mobile enjoys
>> good IPv6 deployment because there are fewer choices: only Dual-Stack or
>> 464XLAT.  I think that’s a good point.  Fixed has many more choices.  Then
>> we have the CPE problems reported by Heise.
>>
>>
>>
>> > and avoid Dual-Stack as much as possible, etc.
>>
>>
>>
>> That's also unacceptable. There are *many* scenarios where dual stack on
>> the wire works extremely well.
>>
>>
>>
>> XiPeng: I agree Dual-Stack can “works extremely well”, but in some
>> scenarios, IPv4 takes over completely and IPv6 is not used at all (due to
>> its various problems, e.g. ULA less preferred than IPv4, CPE problems).  In
>> other words, IPv4 is masking IPv6 problems and gives the IPv6 deployers a
>> false sense of accomplishment.  This is why I think if a company is serious
>> about IPv6, it should avoid Dual-Stack as much as possible.
>>
>>
>>
>> > Some experts may dismiss this recommendation as overly simplifying but
>> I think it’s practical at this stage: most people only wants a working
>> solution not necessarily the best one. Therefore we should unite the
>> industry behind a few options and fine tune them.
>>
>>
>>
>> It is over-simplifying and that's why it doesn't work: the real world has
>> become too complicated. We *do* need clear BCPs but my guess is that we
>> probably need ~10 of them rather than ~1.
>>
>>
>>
>> XiPeng: I trust that despite the difference, we see each other’s point –
>> we all want to simplify and give clear recommendations but the question is
>> how.  So can we first discuss and agree on a (few) principle?  I offer this
>> as a starting point: “keep reducing IPv6 options until it fails”.
>>
>>
>>
>> Thanks.  XiPeng
>>
>>
>>
>> > I also want to take this opportunity to say that many existing IPv6
>> adoption stats are user/session% which can look good according to
>> APNIC/Google.  This may give us a false sense of accomplishment, because an
>> operator with 100% IPv6 capable users may actually produce 0% IPv6 traffic.
>> I think IPv6 traffic% is a better indicator of real IPv6 adoption status.
>> But IPv6 traffic% is hard to find.  Up to this point, we only find that
>> Akamai reported 16% traffic for Oct 2022, FB reports 15% for 2019, and
>> AMS-IX reports 4.1% for Jun 2022 (source:
>> https://labs.ripe.net/author/wilhelm/ipv6-10-years-out-an-analysis-in-users-tables-and-traffic/#:~:text=On%20the%20Internet%20exchanges%2C%20the,observes%20an%20average%20of%204.1%25
>> <
>> https://labs.ripe.net/author/wilhelm/ipv6-10-years-out-an-analysis-in-users-tables-and-traffic/#:~:text=On%20the%20Internet%20exchanges%2C%20the,observes%20an%20average%20of%204.1%25>).
>>  These traffic% are far lower than worldwide IPv6 user%.
>>
>> >
>>
>> > In summary, I call for the experts in v6ops to make an effort to:
>>
>> >
>>
>> >  1. Report and discuss IPv6 traffic%
>>
>> >  2. Identify the problems hiding behind the low IPv6 traffic% (e.g. the
>> CPE problems reported by the Heise article), and recommend solutions for
>> them
>>
>> >
>>
>> > XiPeng
>>
>>
>> _______________________________________________
>> v6ops mailing list
>> v6ops@ietf.org
>> https://www.ietf.org/mailman/listinfo/v6ops
>>
> _______________________________________________
> v6ops mailing list
> v6ops@ietf.org
> https://www.ietf.org/mailman/listinfo/v6ops
>