Re: [v6ops] Scope of Unique Local IPv6 Unicast Addresses (Fwd: New Version Notification for draft-gont-6man-ipv6-ula-scope-00.txt)

Michael Richardson <mcr+ietf@sandelman.ca> Wed, 06 January 2021 17:48 UTC

Return-Path: <mcr+ietf@sandelman.ca>
X-Original-To: v6ops@ietfa.amsl.com
Delivered-To: v6ops@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 1DA253A108E; Wed, 6 Jan 2021 09:48:56 -0800 (PST)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -1.898
X-Spam-Level:
X-Spam-Status: No, score=-1.898 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, RCVD_IN_DNSWL_BLOCKED=0.001, SPF_HELO_NONE=0.001, SPF_PASS=-0.001, URIBL_BLOCKED=0.001] autolearn=ham autolearn_force=no
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id NEy4LoReysU6; Wed, 6 Jan 2021 09:48:54 -0800 (PST)
Received: from tuna.sandelman.ca (tuna.sandelman.ca [209.87.249.19]) (using TLSv1.2 with cipher ADH-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id B6E293A107E; Wed, 6 Jan 2021 09:48:53 -0800 (PST)
Received: from localhost (localhost [127.0.0.1]) by tuna.sandelman.ca (Postfix) with ESMTP id 9EFC9389A8; Wed, 6 Jan 2021 12:49:58 -0500 (EST)
Received: from tuna.sandelman.ca ([127.0.0.1]) by localhost (localhost [127.0.0.1]) (amavisd-new, port 10024) with LMTP id HyHH_lKGjd31; Wed, 6 Jan 2021 12:49:58 -0500 (EST)
Received: from sandelman.ca (obiwan.sandelman.ca [IPv6:2607:f0b0:f:2::247]) by tuna.sandelman.ca (Postfix) with ESMTP id 35C88389A7; Wed, 6 Jan 2021 12:49:58 -0500 (EST)
Received: from localhost (localhost [IPv6:::1]) by sandelman.ca (Postfix) with ESMTP id 97603240; Wed, 6 Jan 2021 12:48:51 -0500 (EST)
From: Michael Richardson <mcr+ietf@sandelman.ca>
To: Ted Lemon <mellon@fugue.com>
cc: Fernando Gont <fgont@si6networks.com>, IPv6 Operations <v6ops@ietf.org>, ipv6@ietf.org, Gert Doering <gert@space.net>
In-Reply-To: <1089BC1B-A8E6-4BF5-BB3E-FD440181DB56@fugue.com>
References: <160989494094.6024.7402128068704112703@ietfa.amsl.com> <6fe3a45e-de65-9f88-808d-ea7e2abdcd16@si6networks.com> <m1kx98E-0000EhC@stereo.hq.phicoh.net> <b53b5d62-0334-f791-f56a-f2122767ecdb@si6networks.com> <m1kxAVC-0000KhC@stereo.hq.phicoh.net> <c236e635-518b-fb51-5024-901ec4677c5d@si6networks.com> <20210106162652.GX13005@Space.Net> <1ddf8850-a8cb-53a7-31bc-7433d5a984f2@si6networks.com> <1089BC1B-A8E6-4BF5-BB3E-FD440181DB56@fugue.com>
X-Mailer: MH-E 8.6+git; nmh 1.7+dev; GNU Emacs 26.1
X-Face: $\n1pF)h^`}$H>Hk{L"x@)JS7<%Az}5RyS@k9X%29-lHB$Ti.V>2bi.~ehC0; <'$9xN5Ub# z!G,p`nR&p7Fz@^UXIn156S8.~^@MJ*mMsD7=QFeq%AL4m<nPbLgmtKK-5dC@#:k
MIME-Version: 1.0
Content-Type: multipart/signed; boundary="=-=-="; micalg="pgp-sha512"; protocol="application/pgp-signature"
Date: Wed, 06 Jan 2021 12:48:51 -0500
Message-ID: <12491.1609955331@localhost>
Archived-At: <https://mailarchive.ietf.org/arch/msg/v6ops/P2_OdaitPNcIaXYTVPTYrGbnEhI>
Subject: Re: [v6ops] Scope of Unique Local IPv6 Unicast Addresses (Fwd: New Version Notification for draft-gont-6man-ipv6-ula-scope-00.txt)
X-BeenThere: v6ops@ietf.org
X-Mailman-Version: 2.1.29
Precedence: list
List-Id: v6ops discussion list <v6ops.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/v6ops>, <mailto:v6ops-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/v6ops/>
List-Post: <mailto:v6ops@ietf.org>
List-Help: <mailto:v6ops-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/v6ops>, <mailto:v6ops-request@ietf.org?subject=subscribe>
X-List-Received-Date: Wed, 06 Jan 2021 17:48:56 -0000

Ted Lemon <mellon@fugue.com> wrote:
    > It is of course not even obvious how to solve this, because sometimes
    > you do want ULA in DNS, and sometimes you don’t. And it depends on what
    > DNS.
    > If you are doing split DNS, then you can scope the DNS that
    > advertises ULAs only to serve those networks where those ULAs are
    > in-scope.

Ideally.... but that's a lot of policy stuff to put into DNS.
I think that geolocated answers in DNS is already a bad thing.
We should be using a better anycast.

    > The DNS that is advertised globally would of course contain
    > no ULAs.

I'm not sure that I agree!  I think that ULAs often do belong.

There are potentially many GUA (2000::/3) addresses that could be in DNS,
which would not work for some originators due to ACLs, and yet a different
entry might work just fine.  Why would ULA be any different?

I think that happy eyeballs and source address selection ought to cut out
many possibilities.
It's just too bad that libcurl doesn't implement Happy Eyeballs...
     {ideally in a system-wide, privacy-preserving, maybe even LAN-wide
     [RFC2186-like] way}

(I also lament shim6, but feel that MPTCP and QUIC might give us something
equivalent.  Again... anycast)

    > How this is arranged is either a matter of local configuration
    > or an interesting topic of future work, depending on how you look at
    > it.

Also, is this an operational or architectural issue?

--
Michael Richardson <mcr+IETF@sandelman.ca>   . o O ( IPv6 IøT consulting )
           Sandelman Software Works Inc, Ottawa and Worldwide