Re: [v6ops] 464xlat case study (was reclassify 464XLAT as standard instead of info)

Ole Troan <otroan@employees.org> Wed, 27 September 2017 22:43 UTC

Return-Path: <otroan@employees.org>
X-Original-To: v6ops@ietfa.amsl.com
Delivered-To: v6ops@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 761C5135160 for <v6ops@ietfa.amsl.com>; Wed, 27 Sep 2017 15:43:30 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -1.901
X-Spam-Level:
X-Spam-Status: No, score=-1.901 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, SPF_PASS=-0.001] autolearn=ham autolearn_force=no
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id mA9JmKF70jYw for <v6ops@ietfa.amsl.com>; Wed, 27 Sep 2017 15:43:28 -0700 (PDT)
Received: from accordion.employees.org (accordion.employees.org [198.137.202.74]) (using TLSv1.2 with cipher AECDH-AES256-SHA (256/256 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id CEC3E13515F for <v6ops@ietf.org>; Wed, 27 Sep 2017 15:43:28 -0700 (PDT)
Received: from h.hanazo.no (96.51-175-103.customer.lyse.net [51.175.103.96]) (using TLSv1.2 with cipher AECDH-AES256-SHA (256/256 bits)) (No client certificate requested) by accordion.employees.org (Postfix) with ESMTPSA id CC34E2D4FA6; Wed, 27 Sep 2017 22:43:26 +0000 (UTC)
Received: from [IPv6:::1] (localhost [IPv6:::1]) by h.hanazo.no (Postfix) with ESMTP id B22DB10F7B3B4; Thu, 28 Sep 2017 00:43:23 +0200 (CEST)
From: Ole Troan <otroan@employees.org>
Message-Id: <1496304E-54BE-47FA-A7F1-1AA6E163DAB1@employees.org>
Content-Type: multipart/signed; boundary="Apple-Mail=_F7C77F1E-F1AC-4843-B425-452150726B38"; protocol="application/pgp-signature"; micalg="pgp-sha512"
Mime-Version: 1.0 (Mac OS X Mail 10.3 \(3273\))
Date: Thu, 28 Sep 2017 00:43:23 +0200
In-Reply-To: <LO1P123MB0116805F9A18932E2D0694FEEA780@LO1P123MB0116.GBRP123.PROD.OUTLOOK.COM>
Cc: IPv6 Ops WG <v6ops@ietf.org>, james woodyatt <jhw@google.com>
To: "Heatley,N,Nick,TQB R" <nick.heatley@bt.com>
References: <LO1P123MB01168388285206BB7C26F029EA7A0@LO1P123MB0116.GBRP123.PROD.OUTLOOK.COM> <46045DAA-9096-43BA-A5FD-571232767726@google.com> <CAKD1Yr3vziaHfkR+hQ7QHXaz7QraKH2HLUVXUW63GpnOAj4JoQ@mail.gmail.com> <E72C3FBE-57A4-4058-B9E5-F7392C9E9101@google.com> <LO1P123MB0116805F9A18932E2D0694FEEA780@LO1P123MB0116.GBRP123.PROD.OUTLOOK.COM>
X-Mailer: Apple Mail (2.3273)
Archived-At: <https://mailarchive.ietf.org/arch/msg/v6ops/OYVCa1lY0DgSWlloRw8E3SHHNiA>
Subject: Re: [v6ops] 464xlat case study (was reclassify 464XLAT as standard instead of info)
X-BeenThere: v6ops@ietf.org
X-Mailman-Version: 2.1.22
Precedence: list
List-Id: v6ops discussion list <v6ops.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/v6ops>, <mailto:v6ops-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/v6ops/>
List-Post: <mailto:v6ops@ietf.org>
List-Help: <mailto:v6ops-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/v6ops>, <mailto:v6ops-request@ietf.org?subject=subscribe>
X-List-Received-Date: Wed, 27 Sep 2017 22:43:30 -0000

> A specific example: certain vpn clients, still in service, fail when tethered to a nat64/dns64 device. Typically, a customer is tethering their work machine to their personal handset. NAT64/DNS64 does not provide what the client needs and neither can the OS. Such client SW may be older but is still in service, they are not yet end of support.
> 
> Customers care if this breaks. So do I, this is doing harm. And no, they won't revert to their corp IT dept. They know this relates to their provider.
> With 464xlat these usecases simply work.
> I have zero calls into customer services concerning devices with 464xlat.
> 
> 464xlat is the reason why IPv6-only can work where the end OS is unknown.
> IPv6-only for the handset mass-market is the way to mitigate exhaustion.

464xlat is a mechanism to deliver IPv4 service across an IPv6 transport.
Yes, it mitigates exhaustion. - By sharing a single IPv4 address among more and more end-users.
It's just like any other CGN, with the differences being that you need CE support and you can disable IPv4 in the access network.

MAP-E, MAP-T, DS-lite, Configured tunnels, L2 NAT... pretty much all do the same.
The main difference is where session state is kept.

464XLAT or more commonly deployed 44464XLAT is the worst of any combination. It keeps sessions state both at the CE/CLAT and the BR/PLAT. Building scalable stateful devices is hard and expensive. And in the case of IPv4 sharing mechanisms unnecessary.

Ole