Re: [v6ops] Fwd: I-D Action: draft-ietf-v6ops-6204bis-05.txt

"STARK, BARBARA H" <bs7652@att.com> Mon, 09 January 2012 14:57 UTC

Return-Path: <bs7652@att.com>
X-Original-To: v6ops@ietfa.amsl.com
Delivered-To: v6ops@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id DF55C21F87AC for <v6ops@ietfa.amsl.com>; Mon, 9 Jan 2012 06:57:05 -0800 (PST)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -105.758
X-Spam-Level:
X-Spam-Status: No, score=-105.758 tagged_above=-999 required=5 tests=[AWL=0.240, BAYES_00=-2.599, HTML_MESSAGE=0.001, J_CHICKENPOX_13=0.6, RCVD_IN_DNSWL_MED=-4, USER_IN_WHITELIST=-100]
Received: from mail.ietf.org ([12.22.58.30]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id MkYZeWOIFyub for <v6ops@ietfa.amsl.com>; Mon, 9 Jan 2012 06:57:04 -0800 (PST)
Received: from mail120.messagelabs.com (mail120.messagelabs.com [216.82.250.83]) by ietfa.amsl.com (Postfix) with ESMTP id A524421F873E for <v6ops@ietf.org>; Mon, 9 Jan 2012 06:57:04 -0800 (PST)
X-Env-Sender: bs7652@att.com
X-Msg-Ref: server-3.tower-120.messagelabs.com!1326121021!57533248!1
X-Originating-IP: [144.160.20.146]
X-StarScan-Version: 6.4.3; banners=-,-,-
X-VirusChecked: Checked
Received: (qmail 8879 invoked from network); 9 Jan 2012 14:57:02 -0000
Received: from sbcsmtp7.sbc.com (HELO mlpd194.enaf.sfdc.sbc.com) (144.160.20.146) by server-3.tower-120.messagelabs.com with DHE-RSA-AES256-SHA encrypted SMTP; 9 Jan 2012 14:57:02 -0000
Received: from enaf.sfdc.sbc.com (localhost.localdomain [127.0.0.1]) by mlpd194.enaf.sfdc.sbc.com (8.14.5/8.14.5) with ESMTP id q09EtVJj003794; Mon, 9 Jan 2012 09:55:32 -0500
Received: from sflint04.pst.cso.att.com (sflint04.pst.cso.att.com [144.154.234.231]) by mlpd194.enaf.sfdc.sbc.com (8.14.5/8.14.5) with ESMTP id q09EtNPp003496 (version=TLSv1/SSLv3 cipher=DHE-RSA-AES256-SHA bits=256 verify=NO); Mon, 9 Jan 2012 09:55:23 -0500
Received: from 01AL10015010627.AD.BLS.COM (01AL10015010627.ad.bls.com [90.152.44.196]) by sflint04.pst.cso.att.com (RSA Interceptor); Mon, 9 Jan 2012 09:56:37 -0500
Received: from 01NC27689010627.AD.BLS.COM ([90.144.44.202]) by 01AL10015010627.AD.BLS.COM with Microsoft SMTPSVC(6.0.3790.4675); Mon, 9 Jan 2012 08:55:42 -0600
Received: from 01NC27689010650.AD.BLS.COM ([90.144.44.120]) by 01NC27689010627.AD.BLS.COM with Microsoft SMTPSVC(6.0.3790.4675); Mon, 9 Jan 2012 09:55:41 -0500
X-MimeOLE: Produced By Microsoft Exchange V6.5
Content-class: urn:content-classes:message
MIME-Version: 1.0
Content-Type: multipart/alternative; boundary="----_=_NextPart_001_01CCCEDE.C1CA3BDA"
Date: Mon, 09 Jan 2012 09:56:33 -0500
Message-ID: <750BF7861EBBE048B3E648B4BB6E8F4F21CFEB81@crexc50p>
In-Reply-To: <4F083E04.5050908@globis.net>
X-MS-Has-Attach:
X-MS-TNEF-Correlator:
Thread-Topic: Re: [v6ops] Fwd: I-D Action: draft-ietf-v6ops-6204bis-05.txt
Thread-Index: AczNOexWI2RPFe33T5GFQA1THBxtegBodZtg
References: <20111222210318.22621.37105.idtracker@ietfa.amsl.com><B265E089-2FDF-4648-865B-A4A879B49AAD@cisco.com><867F4B6A1672E541A94676D556793ACD0CB56952D5@MOPESMBX01.eu.thmulti.com><8FFE15EA-B90E-4553-A776-7C2C5C221852@employees.org><867F4B6A1672E541A94676D556793ACD0CB569536F@MOPESMBX01.eu.thmulti.com><478BBBA2-3D32-4038-A5E4-CD886A417EB8@employees.org><867F4B6A1672E541A94676D556793ACD0CB56953B7@MOPESMBX01.eu.thmulti.com><1E00A66B-B0A3-4FFC-AF0E-ED3A2CACEA60@employees.org> <867F4B6A1672E541A94676D556793ACD0CB56953BE@MOPESMBX01.eu.thmulti.com> <750BF7861EBBE048B3E648B4BB6E8F4F21CFE5E5@crexc50p> <4F083E04.5050908@globis.net>
From: "STARK, BARBARA H" <bs7652@att.com>
To: Ray Hunter <v6ops@globis.net>
X-OriginalArrivalTime: 09 Jan 2012 14:55:41.0737 (UTC) FILETIME=[C1DBC990:01CCCEDE]
X-RSA-Inspected: yes
X-RSA-Classifications: public
X-RSA-Action: allow
Cc: v6ops@ietf.org
Subject: Re: [v6ops] Fwd: I-D Action: draft-ietf-v6ops-6204bis-05.txt
X-BeenThere: v6ops@ietf.org
X-Mailman-Version: 2.1.12
Precedence: list
List-Id: v6ops discussion list <v6ops.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/v6ops>, <mailto:v6ops-request@ietf.org?subject=unsubscribe>
List-Archive: <http://www.ietf.org/mail-archive/web/v6ops>
List-Post: <mailto:v6ops@ietf.org>
List-Help: <mailto:v6ops-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/v6ops>, <mailto:v6ops-request@ietf.org?subject=subscribe>
X-List-Received-Date: Mon, 09 Jan 2012 14:57:06 -0000

6204bis is a CE router requirements document. Not an operator
requirements document. 

RFC 6177 provides guidance regarding assignment of IPv6 prefixes to end
sites. Since this RFC already exists, and was recently published, I see
no need to try to write it again at this time.

Barbara

 

From: Ray Hunter [mailto:v6ops@globis.net] 
Sent: Saturday, January 07, 2012 7:44 AM
To: STARK, BARBARA H
Cc: Wuyts Carl; Ole Troan; v6ops@ietf.org
Subject: Re: Re: [v6ops] Fwd: I-D Action:
draft-ietf-v6ops-6204bis-05.txt

 

Speaking as an end user of the Internet: and in the spirit of your
comment on virtual interfaces, why should v6ops make life difficult for
itself and get involved at all in corner cases where there is a conflict
between what are essentially network operators' deployment decisions,
and router vendors' engineering decisions? IMVVVVHO V6ops should not be
defining technical workarounds for non-technical problems like the size
of the PD assignment.

Various authorities have bent over backwards to ensure that IPv6
addresses are globally plentiful and that they are "very much cheaper"
than IPv4 addresses in terms of LIR fees. The equivalent billing in RIPE
for an IPv4 /32 is an IPv6 /43. IMVHO assigning a single /64 IPv6 range
per household seems unnecessarily mean and potentially harmful to
transparent end-to-end connectivity on the Internet, possibly forcing
end users to deploy complex prefix splitting beyond /64 within their CPE
router and thus breaking SLAAC, or perhaps even worse, deploying NAT66.

Perhaps the practical solution for 6204bis would be for v6ops to
recommend that network operators delegate "sufficient addresses" to end
user sites (as suggested earlier by Ole), and perhaps even going as far
as recommending a minimum PD assignment of /60 or /56 for customers
using 6204bis compliant equipment. The choice of /60 or /56 being based
on the ability to potentially delegate reverse DNS, and to allow end
users of the Internet to deploy flexible and reasonable local topologies
e.g. a separate DMZ LAN interface on the CPE router (In 6204bis, an IPv6
CE router may have one or more network-layer LAN interfaces).

Regards,
RayH

STARK, BARBARA H wrote: 

		if the network only offers addresses via DHCP, how does
the network
		      

	trigger the CPE to ask for an IA_NA?
	    

		6204 solution is to require the device to always ask.
		[Carl]Just configuration, nothing more, nothing less.
If you want
		ia_na, ask ia_na, if you don't, don't ask, no need to
enforce this.
		      

	What if you enforce ia_na and the server doesn't answer anyway ?
	Nothing accomplished.  What if you ask ia_na and the server is
	configured as such to not hand-out anything if ia_na is
requested
	    

(full
  

	match of requested options, if not match fully: nak) Keep it
simple,
	it's usually the best.  If customer wants ia_na, configure the
device
	as such, don't expect the CPE to do these things
"auto-magically"
	 
	this isn't up to the customer. it is a choice by the access
network.
	and I don't think the "here is a fax from your ISP, just type in
these
	parameters" scheme is the best we can do. ;-)
	 
	[Carl] True, but there will be no "fax" from the ISP to the
customer
	either to ask to switch something in configuration off either if
it
	wouldn't work.  Anyway, I'm always flexible, so I say make it a
SHOULD
	iso MUST, meaning "you should ask it unless you have a good
reason not
	to do so", no ??
	    

 
<bhs> The current requirement means that the customer doesn't have to
know anything about the access network (SLAAC or DHCPv6 IA_NA or
unnumbered). When we created 6204, one of the core goals was to identify
requirements that would allow a customer to plug the CE router in and
not have to know what address assignment mechanism the access network
used. Changing WPD-5 from MUST to SHOULD would completely demolish that
goal. If someone doesn't want to design their CE router per 6204, then
there's absolutely nothing that says they have to. It's not a
"standard". But if someone wants to build a router that can come up
without user configuration when connected to an access network that does
either SLAAC or DHCPv6 IA_NA or unnumbered, then this is what the CE
router must do. If someone wants a separate RFC for CE routers intended
for a different environment, then that's fine, too. But 6204 is for the
CE router intended to work in the environment specified in 6204.
 
As for the virtual interface comment -- my recollection of that was that
CE router designers wanted language that would basically let them put
that "unnumbered model" address wherever made sense for their box: LAN
interface, internal interface, logical interface, whatever. No need to
be specific, and leave it up to them. It just isn't the WAN interface
(because there's an RFC that says that's prohibited). From my
perspective, the CE router is a black box. If the access network
provides IA_PD, but no IA_NA and no SLAAC, then I want that CE router to
pick an address from a /64 of the IA_PD and be able to use that address
for sending/receiving traffic to/from the LAN/WAN (while making the
entire rest of that very same /64 available to the LAN for SLAAC). I
think that the new proposals (in the last few emails on this thread) to
split cases around when to put the address on a LAN interface and when
to put it on an internal interface based on =r > /64 in IA_PD go in
exactly the wrong direction. My experience has been that CE router
vendors are perfectly capable of determining the interface that makes
sense for their box. Realistically, the tests run at UNH-IOL wouldn't
check to see what interface the address is on. Because the specific
interface is not externally verifiable. The tests would check for (a) is
the device able to send/receive traffic to/from all ports (assuming LAN
isn't configured for multiple segments) using an address from the IA_PD,
and (b) does it also advertise the rest of that same /64 for use on the
LAN (SLAAC), and (c) do things just work after all this.</bhs>
Barbara