Re: [v6ops] new draft: draft-ietf-v6ops-6204bis

"Weil, Jason" <jason.weil@twcable.com> Tue, 18 October 2011 21:14 UTC

Return-Path: <jason.weil@twcable.com>
X-Original-To: v6ops@ietfa.amsl.com
Delivered-To: v6ops@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id C24CB21F8B37 for <v6ops@ietfa.amsl.com>; Tue, 18 Oct 2011 14:14:07 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -1.462
X-Spam-Level:
X-Spam-Status: No, score=-1.462 tagged_above=-999 required=5 tests=[BAYES_00=-2.599, HELO_EQ_MODEMCABLE=0.768, HOST_EQ_MODEMCABLE=1.368, HTML_MESSAGE=0.001, RCVD_IN_DNSWL_LOW=-1]
Received: from mail.ietf.org ([12.22.58.30]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id gTdM+s4zreg1 for <v6ops@ietfa.amsl.com>; Tue, 18 Oct 2011 14:14:05 -0700 (PDT)
Received: from cdpipgw01.twcable.com (cdpipgw01.twcable.com [165.237.59.22]) by ietfa.amsl.com (Postfix) with ESMTP id C169F21F8B00 for <v6ops@ietf.org>; Tue, 18 Oct 2011 14:14:04 -0700 (PDT)
X-SENDER-IP: 10.136.163.13
X-SENDER-REPUTATION: None
X-IronPort-AV: E=Sophos; i="4.69,366,1315195200"; d="scan'208,217"; a="286958111"
Received: from unknown (HELO PRVPEXHUB04.corp.twcable.com) ([10.136.163.13]) by cdpipgw01.twcable.com with ESMTP/TLS/RC4-MD5; 18 Oct 2011 17:07:52 -0400
Received: from PRVPEXVS08.corp.twcable.com ([10.136.163.36]) by PRVPEXHUB04.corp.twcable.com ([10.136.163.13]) with mapi; Tue, 18 Oct 2011 17:11:28 -0400
From: "Weil, Jason" <jason.weil@twcable.com>
To: james woodyatt <jhw@apple.com>, IPv6 Operations <v6ops@ietf.org>
Date: Tue, 18 Oct 2011 17:11:28 -0400
Thread-Topic: [v6ops] new draft: draft-ietf-v6ops-6204bis
Thread-Index: AcyNxXLGzPhIt8uRQE2ONYAe3RKZWwAEw7VA
Message-ID: <839CD7F7A30CF149B5FE4D908ADE00A139FBFBBBD0@PRVPEXVS08.corp.twcable.com>
References: <201110111355.p9BDt1M23806@ftpeng-update.cisco.com> <282BBE8A501E1F4DA9C775F964BB21FE3EB758B7A8@GRFMBX704BA020.griffon.local> <1B8E4C5A-D08B-4F37-B701-A39745136A33@cisco.com> <750BF7861EBBE048B3E648B4BB6E8F4F1FDCA4C3@crexc50p> <282BBE8A501E1F4DA9C775F964BB21FE3EB758B7AB@GRFMBX704BA020.griffon.local> <B06E5723-1EE5-4808-AE7F-3D98EB3F17CE@cisco.com> <94C682931C08B048B7A8645303FDC9F35A2DDC07B7@PUEXCB1B.nanterre.francetelecom.fr> <5B6B2B64C9FE2A489045EEEADDAFF2C303130A41@XMB-RCD-109.cisco.com> <94C682931C08B048B7A8645303FDC9F35A2DDC0801@PUEXCB1B.nanterre.francetelecom.fr> <5B6B2B64C9FE2A489045EEEADDAFF2C303130AAE@XMB-RCD-109.cisco.com> <A29A998E-658F-4265-95C7-2B27EF160EEE@apple.com>
In-Reply-To: <A29A998E-658F-4265-95C7-2B27EF160EEE@apple.com>
Accept-Language: en-US
Content-Language: en-US
X-MS-Has-Attach:
X-MS-TNEF-Correlator:
acceptlanguage: en-US
Content-Type: multipart/alternative; boundary="_000_839CD7F7A30CF149B5FE4D908ADE00A139FBFBBBD0PRVPEXVS08cor_"
MIME-Version: 1.0
Cc: "pcp-chairs@tools.ietf.org" <pcp-chairs@tools.ietf.org>, "draft-ietf-pcp-base@tools.ietf.org" <draft-ietf-pcp-base@tools.ietf.org>, "draft-ietf-v6ops-6204bis@tools.ietf.org" <draft-ietf-v6ops-6204bis@tools.ietf.org>
Subject: Re: [v6ops] new draft: draft-ietf-v6ops-6204bis
X-BeenThere: v6ops@ietf.org
X-Mailman-Version: 2.1.12
Precedence: list
List-Id: v6ops discussion list <v6ops.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/v6ops>, <mailto:v6ops-request@ietf.org?subject=unsubscribe>
List-Archive: <http://www.ietf.org/mail-archive/web/v6ops>
List-Post: <mailto:v6ops@ietf.org>
List-Help: <mailto:v6ops-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/v6ops>, <mailto:v6ops-request@ietf.org?subject=subscribe>
X-List-Received-Date: Tue, 18 Oct 2011 21:14:07 -0000

Fwiw my only interest in PCP today is to satisfy REC-48 type functionality in a native Dual-stack CPE Router with an IPv6 firewall enabled. We are specifying RFC6092 functionality today for home gateways and the two options on the table to allow applications to signal their requirements to firewall are (I thought) PCP and UPnP.  If PCP isn't ready to do this functionality fairly soon then it is becomes mostly  useless in my book and I will have to look elsewhere for that functionality. If it is close and we can get it included in 6204bis, it would make sense to wait for it.

Thanks,

Jason

From: v6ops-bounces@ietf.org [mailto:v6ops-bounces@ietf.org] On Behalf Of james woodyatt
Sent: Tuesday, October 18, 2011 2:41 PM
To: IPv6 Operations
Cc: pcp-chairs@tools.ietf.org; draft-ietf-pcp-base@tools.ietf.org; draft-ietf-v6ops-6204bis@tools.ietf.org
Subject: Re: [v6ops] new draft: draft-ietf-v6ops-6204bis

On Oct 18, 2011, at 10:33 AM, Hemant Singh (shemant) wrote:

 But the PCP base document needs to become a RFC ASAP

The current revision, I-D.ietf-pcp-base-14 is unsuitable for the purposes described in REC-48 of RFC 6092, in my opinion.  I'm hoping that the forthcoming -15 revision will be acceptable, but I don't actually see it on the server yet, and some of the more authoritative participants in the working group are balking at being asked to consider a new revision of the draft.

One of the things that would help here is for the PCP working group to stop thinking that their job is done after they specify how ports are mapped for translation and address amplification with NAT44 and NAT64 and to start remembering that their draft actually purports to explain how PCP can meet REC-48 of RFC 6092 as well.  Every time I bring up a point that shows how their draft falls down on that point, they complain that nobody cares about IPv6 CPE routers, or transports other than TCP and UDP, or this, that or the other thing, and tell me they plan to fix it in the next round of RFC development.  Fortunately, the chair and the technical editor of the draft seem to be paying attention to the problems, but I do *NOT* feel at all comfortable that the community of PCP implementers is ready to consider simple security in IPv6 CPE routers.

I am very concerned that IPv6 CPE router vendors will rush out devices that contain early reference implementations of PCP, because it is standards track, but have simple security functions that are *MUCH* less transparent than the Informational category RFC 6092 recommends.  If this happens, then PCP servers in these ubiquitous and sure-to-never-be-upgraded home gateways will establish a conventional restriction on the transparency of IPv6 residential service that unnecessarily mimics the brokenness of IPv4/NAPT.  We should endeavor to avoid the possibility of a disaster like that, if at all possible, and I'm sensing a significant resistance to that concern among an influential cadre of PCP working group participants and implementers.

Therefore, I'd prefer that any update to RFC 6204 either wait for PCP to be revised appropriately in a second RFC, or that it not contain any recommendation for a PCP server at all.  Alternatively, the stakeholders in RFC 6204 could engage more directly with the PCP working group, so that Keith Moore and I are not the only ones speaking up in the defense of your interests.


--
james woodyatt <jhw@apple.com<mailto:jhw@apple.com>>
member of technical staff, core os networking




________________________________
This E-mail and any of its attachments may contain Time Warner Cable proprietary information, which is privileged, confidential, or subject to copyright belonging to Time Warner Cable. This E-mail is intended solely for the use of the individual or entity to which it is addressed. If you are not the intended recipient of this E-mail, you are hereby notified that any dissemination, distribution, copying, or action taken in relation to the contents of and attachments to this E-mail is strictly prohibited and may be unlawful. If you have received this E-mail in error, please notify the sender immediately and permanently delete the original and any copy of this E-mail and any printout.