Re: [v6ops] Vicious circle [ULA precedence [Thoughts about wider operational input]]

Michael Richardson <mcr+ietf@sandelman.ca> Tue, 03 May 2022 00:55 UTC

Return-Path: <mcr+ietf@sandelman.ca>
X-Original-To: v6ops@ietfa.amsl.com
Delivered-To: v6ops@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 4391EC15E3EA; Mon, 2 May 2022 17:55:40 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -2.096
X-Spam-Level:
X-Spam-Status: No, score=-2.096 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, DKIM_SIGNED=0.1, DKIM_VALID=-0.1, DKIM_VALID_AU=-0.1, DKIM_VALID_EF=-0.1, RCVD_IN_DNSWL_BLOCKED=0.001, SPF_HELO_NONE=0.001, SPF_PASS=-0.001, URIBL_BLOCKED=0.001, URIBL_DBL_BLOCKED_OPENDNS=0.001, URIBL_ZEN_BLOCKED_OPENDNS=0.001] autolearn=ham autolearn_force=no
Authentication-Results: ietfa.amsl.com (amavisd-new); dkim=pass (2048-bit key) header.d=sandelman.ca
Received: from mail.ietf.org ([50.223.129.194]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id baLXXmCWt1Vi; Mon, 2 May 2022 17:55:35 -0700 (PDT)
Received: from tuna.sandelman.ca (tuna.sandelman.ca [209.87.249.19]) (using TLSv1.3 with cipher TLS_AES_256_GCM_SHA384 (256/256 bits) key-exchange X25519 server-signature RSA-PSS (2048 bits) server-digest SHA256) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id C0F2CC157902; Mon, 2 May 2022 17:55:33 -0700 (PDT)
Received: from localhost (localhost [127.0.0.1]) by tuna.sandelman.ca (Postfix) with ESMTP id 2D2D638DCF; Mon, 2 May 2022 21:08:34 -0400 (EDT)
Received: from tuna.sandelman.ca ([127.0.0.1]) by localhost (localhost [127.0.0.1]) (amavisd-new, port 10024) with LMTP id y3w-Bksk-_Sb; Mon, 2 May 2022 21:08:33 -0400 (EDT)
Received: from sandelman.ca (obiwan.sandelman.ca [IPv6:2607:f0b0:f:2::247]) by tuna.sandelman.ca (Postfix) with ESMTP id 0506038DCE; Mon, 2 May 2022 21:08:33 -0400 (EDT)
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/simple; d=sandelman.ca; s=mail; t=1651540113; bh=5tNw5oORASBLOtrhhbHhodbg8jV2aVcJidMusGYzlOU=; h=From:To:Subject:In-Reply-To:References:Date:From; b=YuMBoEM6UQ00nW+Gl611zi1+CowtBd3Avp0gZjF3fCnjFrQzi7TItdQ7sSiHAeRqC aG3kt3O+giEPSFLEO1k9aGzPTNiKX2LXZt4p7ir/aYdfk508GKuRvt7vXW3Va8agVU 1l/mHcKbRjHPG8nlyMG8EPMLiTqXsR6VRT59v66DABi2w7yb3HDQDbhIin5FJWeDyT yVrCQkMS8LaBq5MGOfMYiZbz3U9lw5PginsEHnOmMHfDzOu96oVQxCaLgGx1uod0Wr Iva9KZWKTtaWhGP5U9d/HSoCbL95igX9sfmpWLSidV3LjAIH5dEVdO7zLNi64q+zx0 HnHNjJ7rStmpw==
Received: from localhost (localhost [IPv6:::1]) by sandelman.ca (Postfix) with ESMTP id BF325544; Mon, 2 May 2022 20:55:30 -0400 (EDT)
From: Michael Richardson <mcr+ietf@sandelman.ca>
To: v6ops list <v6ops@ietf.org>, 6man@ietf.org
In-Reply-To: <DM6PR14MB3178A46301A64F3FD98A8E01D7C19@DM6PR14MB3178.namprd14.prod.outlook.com>
References: <CAN-Dau3iyP7sMUsiP3ckYEpkLoQK-bpgKnDn6d4Ci7f9V_5CPw@mail.gmail.com> <CAE=N4xe3ycbg+8UcLstFneg9q42SLQfPHLPmcQLEyNH4GOyPGw@mail.gmail.com> <DM6PR14MB3178A46301A64F3FD98A8E01D7C19@DM6PR14MB3178.namprd14.prod.outlook.com>
X-Mailer: MH-E 8.6+git; nmh 1.7+dev; GNU Emacs 27.1
X-Face: $\n1pF)h^`}$H>Hk{L"x@)JS7<%Az}5RyS@k9X%29-lHB$Ti.V>2bi.~ehC0; <'$9xN5Ub# z!G,p`nR&p7Fz@^UXIn156S8.~^@MJ*mMsD7=QFeq%AL4m<nPbLgmtKK-5dC@#:k
MIME-Version: 1.0
Content-Type: multipart/signed; boundary="=-=-="; micalg="pgp-sha512"; protocol="application/pgp-signature"
Date: Mon, 02 May 2022 20:55:30 -0400
Message-ID: <6470.1651539330@localhost>
Archived-At: <https://mailarchive.ietf.org/arch/msg/v6ops/TeHnRG_HMK5wfr4N7_TRlgFksm0>
Subject: Re: [v6ops] Vicious circle [ULA precedence [Thoughts about wider operational input]]
X-BeenThere: v6ops@ietf.org
X-Mailman-Version: 2.1.34
Precedence: list
List-Id: v6ops discussion list <v6ops.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/v6ops>, <mailto:v6ops-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/v6ops/>
List-Post: <mailto:v6ops@ietf.org>
List-Help: <mailto:v6ops-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/v6ops>, <mailto:v6ops-request@ietf.org?subject=subscribe>
X-List-Received-Date: Tue, 03 May 2022 00:55:40 -0000

I'm in favour of doing some new work, but I'm not convinced that the policy
that buraglio-v6ops-ula is sufficiently universal as to become a new default
policy.

I'm not sure that there is such a policy!!!

The document says:

   Other operational considerations are the use of the policy table
   detailed in section 2.1 of [RFC6724] . While conceptually the intent
   was for a configurable, longest-match table to be adjusted as-needed.
   In practice, modifying the prefix policy table remains difficult
   across platforms, and in some cases impossible.  Embedded,
   proprietary, closed source, and IoT devices are especially difficult
   to adjust and are, in many cases, incapable of any adjustment
   whatsoever.  Large scale manipulation of the policy table also
   remains out of the realm of realistic support for small and medium
   scale operators due to lack of ability to manipulate all the hosts
   and systems, or a lack of tooling and access.

It seems to me that we need a way to express policy at the network layer, and
for hosts to listen to that.  Since this document anticipates a change to all
hosts, it seems that we ought to just do it the right way once.
As such, I'm not convinced that this is a v6ops vs a 6man effort.

In reading the document, I got the impression that some of the problem is
that RFC6724 has not been properly adopted/implemented by comodity desktops
and smartphones.  Maybe that's just my reading of it, because that doesn't
seem to be a supported point in the thread.

It seems to me that part of the bug is that RFC6724 puts all IPv4 into the
same category, while it could break out RFC1918 addresses (and maybe rfc6598
100.64.0.0/10) specifically.   This is an example of a quibble about the
policy that I think many will have.





--
Michael Richardson <mcr+IETF@sandelman.ca>   . o O ( IPv6 IøT consulting )
           Sandelman Software Works Inc, Ottawa and Worldwide