Re: [v6ops] New Version Notification for draft-palet-v6ops-p2p-from-customer-prefix-00.txt

Ole Troan <otroan@employees.org> Wed, 01 November 2017 21:05 UTC

Return-Path: <otroan@employees.org>
X-Original-To: v6ops@ietfa.amsl.com
Delivered-To: v6ops@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id D8EBA13F69E for <v6ops@ietfa.amsl.com>; Wed, 1 Nov 2017 14:05:09 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -1.901
X-Spam-Level:
X-Spam-Status: No, score=-1.901 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, SPF_PASS=-0.001] autolearn=ham autolearn_force=no
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id KTMGonuYLW2T for <v6ops@ietfa.amsl.com>; Wed, 1 Nov 2017 14:05:08 -0700 (PDT)
Received: from accordion.employees.org (accordion.employees.org [IPv6:2607:7c80:54:3::74]) (using TLSv1.2 with cipher AECDH-AES256-SHA (256/256 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id 35E74136934 for <v6ops@ietf.org>; Wed, 1 Nov 2017 14:05:08 -0700 (PDT)
Received: from h.hanazo.no (96.51-175-103.customer.lyse.net [51.175.103.96]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by accordion.employees.org (Postfix) with ESMTPSA id 027562D4FD1; Wed, 1 Nov 2017 21:05:06 +0000 (UTC)
Received: from [IPv6:::1] (localhost [IPv6:::1]) by h.hanazo.no (Postfix) with ESMTP id B5454200908F30; Wed, 1 Nov 2017 22:05:03 +0100 (CET)
From: Ole Troan <otroan@employees.org>
Message-Id: <F1F177F6-902A-4886-8273-9B9BF73E0947@employees.org>
Content-Type: multipart/signed; boundary="Apple-Mail=_580F812A-325F-4F14-B226-23BA2F215758"; protocol="application/pgp-signature"; micalg="pgp-sha512"
Mime-Version: 1.0 (Mac OS X Mail 11.0 \(3445.1.7\))
Date: Wed, 01 Nov 2017 22:05:02 +0100
In-Reply-To: <CAO42Z2zd=FuakoOoEinUsJ8ZeUm_maBKFhxndZiH2O5612hqkQ@mail.gmail.com>
Cc: Mikael Abrahamsson <swmike@swm.pp.se>, v6ops list <v6ops@ietf.org>
To: Mark Smith <markzzzsmith@gmail.com>
References: <150860492012.3131.14623048904955800548.idtracker@ietfa.amsl.com> <0EAB4149-AFE9-4770-8242-6D8E05889091@consulintel.es> <alpine.DEB.2.20.1710231313080.31961@uplift.swm.pp.se> <66E223E7-73B5-49BA-AA40-5AA632F3F755@consulintel.es> <alpine.DEB.2.20.1710231549470.31961@uplift.swm.pp.se> <CAO42Z2xa50nwmZ1o-toxcZMn+2tSSb6PdK=fkxS5ZnvqGWRhUQ@mail.gmail.com> <553EFFEF-BB82-4F63-B80E-9E84BB9A903A@employees.org> <CAO42Z2zd=FuakoOoEinUsJ8ZeUm_maBKFhxndZiH2O5612hqkQ@mail.gmail.com>
X-Mailer: Apple Mail (2.3445.1.7)
Archived-At: <https://mailarchive.ietf.org/arch/msg/v6ops/NMaHBtYdJMaqierOOpPdASNmDf4>
Subject: Re: [v6ops] New Version Notification for draft-palet-v6ops-p2p-from-customer-prefix-00.txt
X-BeenThere: v6ops@ietf.org
X-Mailman-Version: 2.1.22
Precedence: list
List-Id: v6ops discussion list <v6ops.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/v6ops>, <mailto:v6ops-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/v6ops/>
List-Post: <mailto:v6ops@ietf.org>
List-Help: <mailto:v6ops-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/v6ops>, <mailto:v6ops-request@ietf.org?subject=subscribe>
X-List-Received-Date: Wed, 01 Nov 2017 21:05:10 -0000

Mark,

I most definitely think doing address resolution on links without link-layer addresses is the wrong thing to do.
Sure, other ND functions are being used. NUD isn't typically useful on router to router links. Often p2p links have link-layer notification on link state too, and I'd argue that the benefit of a router doing NUD towards hosts have limited usefulness, unless it is to garbage collect state.
If we ever get to update NUD, I would argue quite hard for simplification of the protocol.

> There are two choices. Either prevent the packet loop occurring if a
> packet is sent to a destination that doesn't exist, by probing for its
> existence via ND NS, or mitigate the consequences of the loop after it
> has already occurred. I think prevention is better than mitigation.

If this is the problem you are trying to solve, then we have already solved that.
See rfc4443, from changelog:

    - In the description of Destination Unreachable messages, Code 3,
     added rule prohibiting forwarding of packets back onto point-to-
     point links from which they were received, if their destination
     addresses belong to the link itself ("anti-ping-ponging" rule).

Was there any other unresolved problem I missed?

Cheers,
Ole