Re: [v6ops] Implementation Status of PREF64

Owen DeLong <owen@delong.com> Thu, 30 September 2021 15:49 UTC

Return-Path: <owen@delong.com>
X-Original-To: v6ops@ietfa.amsl.com
Delivered-To: v6ops@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id A91E33A0D78; Thu, 30 Sep 2021 08:49:15 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -2.098
X-Spam-Level:
X-Spam-Status: No, score=-2.098 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, DKIM_SIGNED=0.1, DKIM_VALID=-0.1, DKIM_VALID_AU=-0.1, DKIM_VALID_EF=-0.1, HTML_MESSAGE=0.001, SPF_HELO_NONE=0.001, SPF_PASS=-0.001, URIBL_BLOCKED=0.001] autolearn=ham autolearn_force=no
Authentication-Results: ietfa.amsl.com (amavisd-new); dkim=pass (1024-bit key) header.d=delong.com
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id xJQ2nXtrA-mb; Thu, 30 Sep 2021 08:49:09 -0700 (PDT)
Received: from owen.delong.com (owen.delong.com [IPv6:2620:0:930::200:2]) by ietfa.amsl.com (Postfix) with ESMTP id 35DFF3A0D55; Thu, 30 Sep 2021 08:49:09 -0700 (PDT)
Received: from smtpclient.apple ([IPv6:2620:0:930:0:d12c:2b24:7049:d8a]) (authenticated bits=0) by owen.delong.com (8.16.1/8.15.2) with ESMTPSA id 18UFn7T73453925 (version=TLSv1.2 cipher=ECDHE-RSA-AES256-GCM-SHA384 bits=256 verify=NOT); Thu, 30 Sep 2021 08:49:08 -0700
DKIM-Filter: OpenDKIM Filter v2.11.0 owen.delong.com 18UFn7T73453925
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=delong.com; s=mail; t=1633016948; bh=Ak1pi69X41sf/uzuZdOFfTUSdVpd+0rAeszH5WjVLGw=; h=From:Subject:Date:In-Reply-To:Cc:To:References:From; b=KpTGP6GA2TGvW+lHyEc4maklVerJCKUeU5Ce+3zGUMLJYLxQBloBrn3AWnS2bLHVc BJB2XHdTqrA7LHpuRlvhtAEql3Fgyr7LBAMUqY8glRht0NxReG6BgAeUqz44NqN+8D rC7qMI/nMlJllNtw2658A+Ou6Jdccfnxeva/lBcM=
From: Owen DeLong <owen@delong.com>
Message-Id: <111A3C47-DD24-4652-818C-C627C69A7EAD@delong.com>
Content-Type: multipart/alternative; boundary="Apple-Mail=_671FC9D8-4E3D-4933-9F0E-97519C08AA68"
Mime-Version: 1.0 (Mac OS X Mail 14.0 \(3654.120.0.1.13\))
Date: Thu, 30 Sep 2021 08:49:06 -0700
In-Reply-To: <CAKD1Yr3TmqFxjKuZ57wS7VuPOf6rJvOwnvnQdFrRLQ=DkZ+CCw@mail.gmail.com>
Cc: "Pascal Thubert (pthubert)" <pthubert=40cisco.com@dmarc.ietf.org>, v6ops list <v6ops@ietf.org>
To: Lorenzo Colitti <lorenzo=40google.com@dmarc.ietf.org>
References: <DDA36020-90CC-471B-83AD-3D98950F1164@delong.com> <CAO42Z2wdoSdJDOB2Zo0=ZK0ecOARRsdg2nbHZGSDOhryPbLfDw@mail.gmail.com> <F2BD0A42-E9AD-45DD-999A-638E73BE1177@delong.com> <CAKD1Yr2K3Gd3JD=NJFOoH6GYgs-8ACxRQB9-sKJ7cbF4_hxsow@mail.gmail.com> <0B533C71-5DB0-410D-A5A3-7E8FD559F214@delong.com> <CAKD1Yr3NoYfNT7+OVJoCCdgdif6AHHw29tNCPttS=-NuRZKv3w@mail.gmail.com> <5FAD5290-3616-4194-B783-D473DB38A89A@delong.com> <m1mVGC6-0000HSC@stereo.hq.phicoh.net> <D6620D7C-8FE8-4294-8014-AB18A230C9C7@delong.com> <m1mVItl-0000GuC@stereo.hq.phicoh.net> <YVN6/cA6Ob3vLJQH@Space.Net> <m1mVK32-0000HpC@stereo.hq.phicoh.net> <CAO42Z2zQys6o41+m1iX1Mm88M7CaUdQa1C+uuYqxz2STfcwt_Q@mail.gmail.com> <d2887464-19d7-da09-d6f6-51ddc0e9ca45@foobar.org> <CAO42Z2w=BVoy-EmkM+x=8bVJc8WAcwRyLrdpsOAxu-as3ed6ZQ@mail.gmail.com> <CAN-Dau0v5dS9esEfQk9w0deG-QLpQ6EH9JJBY4JVcUfstFENkQ@mail.gmail.com> <1e9444b30d964a5cb17ff419eca6cc35@huawei.com> <CAKD1Yr0T-7t-UHbsJBMLpTjKhPAV5uUQkux6oby89TVUue7PyA@mail.gmail.com> <CO1PR11MB4881D400EA4681F1505040D2D8AA9@CO1PR11MB4881.namprd11.prod.outlook.com> <CAKD1Yr3TmqFxjKuZ57wS7VuPOf6rJvOwnvnQdFrRLQ=DkZ+CCw@mail.gmail.com>
X-Mailer: Apple Mail (2.3654.120.0.1.13)
X-Greylist: Sender succeeded SMTP AUTH, not delayed by milter-greylist-4.6.4 (owen.delong.com [IPv6:2620:0:930:0:0:0:200:2]); Thu, 30 Sep 2021 08:49:08 -0700 (PDT)
Archived-At: <https://mailarchive.ietf.org/arch/msg/v6ops/U96fB2fG45waLAKWvJHkxemvKa4>
Subject: Re: [v6ops] Implementation Status of PREF64
X-BeenThere: v6ops@ietf.org
X-Mailman-Version: 2.1.29
Precedence: list
List-Id: v6ops discussion list <v6ops.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/v6ops>, <mailto:v6ops-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/v6ops/>
List-Post: <mailto:v6ops@ietf.org>
List-Help: <mailto:v6ops-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/v6ops>, <mailto:v6ops-request@ietf.org?subject=subscribe>
X-List-Received-Date: Thu, 30 Sep 2021 15:49:16 -0000

Pascal’s proposal isn’t a bad idea, but it’s an entirely different use case from what is being discussed here.

Therefore, yes, I support Pascal’s proposal, but implementing it would not obviate the need for IA_NA support.

They are somewhat orthogonal issues.

Owen

> On Sep 30, 2021, at 02:16 , Lorenzo Colitti <lorenzo=40google.com@dmarc.ietf.org> wrote:
> 
> Pascal,
> 
> From what's been said so far on this thread, do you think that an implementation would achieve anything? Many of the posts here say things like, "my network, my rules", and "this network has a policy of requiring DHCPv6". Would be interested in seeing whether any of the folks on this thread who are saying that Android should implement DHCPv6 support your proposal, since it's obviously not DHCPv6. :-)
> 
> I'm all for finding another solution to this problem, but given some of the messages on this thread it doesn't look like there's much room for compromise.
> 
> Cheers,
> Lorenzo
> 
> On Thu, Sep 30, 2021 at 5:43 PM Pascal Thubert (pthubert) <pthubert=40cisco.com@dmarc.ietf.org <mailto:40cisco.com@dmarc.ietf.org>> wrote:
> There is, Lorenzo,
> 
>  
> 
> and strangely enough to me you are still opposing the technical evolution of SLAAC that would make them to be fully efficient – RFC 8505 <https://datatracker.ietf.org/doc/html/rfc8505>.
> 
>  
> 
> I see that our support of First Hop Security (that includes snooping) is explicitly cited in that article. RFC 8505 solves the corner case of snooping, e.g., silent nodes which the article inelegantly ignores but are a real issue when you do not have DHCP to provide a complete state.
> 
>  
> 
> If needed the infra could easily republish an RFC 8505 registration to that resurrected draft-ietf-dhc-addr-registration <https://datatracker.ietf.org/doc/draft-ietf-dhc-addr-registration/> that you suggest as we do for LISP today, but we foresee a more distributed registrar, e.g., with eVPN (draft-thubert-bess-secure-evpn-mac-signaling) <https://datatracker.ietf.org/doc/html/draft-thubert-bess-secure-evpn-mac-signaling-00>.
> 
>  
> 
> RFC 8505 allows the device to configure any address it likes as long as it’s not duplicate. It is an alternative from DHCP where the host is still in control of its addresses; it’s still autoconf, but made stateful. It is less work on the host that already has SLAAC than implementing draft-ietf-dhc-addr-registration <https://datatracker.ietf.org/doc/draft-ietf-dhc-addr-registration/> as you suggest in you other mail.
> 
>  
> 
> I’m still baffled and sad that we are not working together on making this happen in a demo.
> 
>  
> 
> Keep safe;
> 
>  
> 
> Pascal
> 
>  
> 
>  
> 
> From: v6ops <v6ops-bounces@ietf.org <mailto:v6ops-bounces@ietf.org>> On Behalf Of Lorenzo Colitti
> Sent: jeudi 30 septembre 2021 9:17
> To: Vasilenko Eduard <vasilenko.eduard@huawei.com <mailto:vasilenko.eduard@huawei.com>>
> Cc: v6ops list <v6ops@ietf.org <mailto:v6ops@ietf.org>>; David Farmer <farmer=40umn.edu@dmarc.ietf.org <mailto:40umn.edu@dmarc.ietf.org>>
> Subject: Re: [v6ops] Implementation Status of PREF64
> 
>  
> 
> There are already vendor solutions.
> 
>  
> 
> https://theinternetprotocolblog.wordpress.com/2020/03/14/does-one-need-dhcpv6/ <https://theinternetprotocolblog.wordpress.com/2020/03/14/does-one-need-dhcpv6/>
>  
> 
> On Thu, Sep 30, 2021 at 4:12 PM Vasilenko Eduard <vasilenko.eduard@huawei.com <mailto:vasilenko.eduard@huawei.com>> wrote:
> 
> +1.
> 
> “Show me another solution” is a good message. Just idea or theory is not enough.
> 
> David has mentioned OpenSource. I would say that vendor product is needed too.
> 
> Ed/
> 
> From: v6ops [mailto:v6ops-bounces@ietf.org <mailto:v6ops-bounces@ietf.org>] On Behalf Of David Farmer
> Sent: Thursday, September 30, 2021 5:15 AM
> To: Mark Smith <markzzzsmith@gmail.com <mailto:markzzzsmith@gmail.com>>; Lorenzo Colitti <lorenzo@google.com <mailto:lorenzo@google.com>>
> Cc: v6ops list <v6ops@ietf.org <mailto:v6ops@ietf.org>>
> Subject: Re: [v6ops] Implementation Status of PREF64
> 
>  
> 
>  
> 
> On Wed, Sep 29, 2021 at 5:16 PM Mark Smith <markzzzsmith@gmail.com <mailto:markzzzsmith@gmail.com>> wrote:
> 
>  
> 
> On Thu, 30 Sep 2021, 03:41 Nick Hilliard, <nick@foobar.org <mailto:nick@foobar.org>> wrote:
> 
>  
> 
> Even if you had, that would be fine and you're welcome to your opinions. 
>   Other people disagree because it doesn't make sense on their deployments.
> 
>  
> 
> If they want to hobble IPv6, such that it is nothing more than a copy of IPv4 with bigger addresses, what is the point of going to the expense and effort of deploying IPv6 when most enterprises have plenty of IPv4 address space via RFC1918 and 100.64/10 if they were willing to abuse it a bit?
> 
>  
> 
> A hobbled deployment of IPv6, hobbled such that it doesn't provide any useful benefit over IPv4, is just pure business expense. Increased profit is an exceptionally strong disincentive to incurring those.
> 
>  
> 
> So, instead of just telling people they are doing IPv6 wrong (building a hobbled network) and that DHCP doesn't provide them what they think it does; How about making sure there are good open-source tools to build what you think is a non-hobbled network that meets their needs? In other words, how about providing some good open-source ARP and ND router scraping tools? 
> 
>  
> 
> Now you could point the finger back at me too, but then I'm not saying that building networks with DHCPv6 is building a hobbled network, nor am I refusing to provide a DHCPv6 client for a very popular mobile and IoT platform. So, at least in my opinion, that puts more onus on you than me.
> 
>  
> 
> So, I agree that DHCP logging (both IPv4 and IPv6) by itself isn't enough, and yes you also need to scrape ARP and ND out of the routers. However, ARP and ND scrapping by themselves aren't enough either, DHCP logging provides much better granularity than is practical from ARP and ND scrapping, at least using SNMP. Also, by having both you can make some assumptions about suspicious access clients that are statically configuring addresses instead of doing DHCP on the access network as they should be. 
> 
>  
> 
> I agree that limiting DHCPv6 clients to only IA-NA  and not providing IA-TA is a bad implementation of DHCPv6. Further, I recommend SLAAC, and we provide SLAAC, for general-purpose (AKA public) access networks with IPv6. But, we also have many networks where that is not appropriate, where I have regulatory and contractual compliance requirements, to protect non-public information, things like FERPA, HIPPA, PCI, and CMMC(1-4). Long-term we want these networks doing IPv6 too.
> 
>  
> 
> Android smartphones, probably belong on a general-purpose access network with SLAAC for IPv6 in most cases. However, Android is also on many IoT devices, things like point-of-sale terminals, credit card terminals, environmental monitoring sensors, etc... Many of those things I don't want on general-purpose access networks and some of those will have compliance requirements we have to meet. We think DHCPv6 is perfectly appropriate for these networks, and probably for server networks too.
> 
>  
> 
> In conclusion, while I agree with most of your arguments that DHCPv6 isn't necessarily the right way to do IPv6, especially for general-purpose (public) access networks, that doesn’t mean I think DHCPv6 doesn’t have a place in many other networks, and it would be very helpful if Android provided a DHCPv6 client, even as a non-default option.
> 
>  
> 
> Thanks
> 
>  
> 
>  
> 
> --
> 
> ===============================================
> David Farmer               Email:farmer@umn.edu <mailto:Email%3Afarmer@umn.edu>
> Networking & Telecommunication Services
> Office of Information Technology
> University of Minnesota   
> 2218 University Ave SE        Phone: 612-626-0815
> Minneapolis, MN 55414-3029   Cell: 612-812-9952
> ===============================================
> 
> _______________________________________________
> v6ops mailing list
> v6ops@ietf.org
> https://www.ietf.org/mailman/listinfo/v6ops