Re: [v6ops] draft-vf-v6ops-ipv6-deployment and draft-lmhp-v6ops-transition-comparison

Gabor LENCSE <lencse@hit.bme.hu> Sat, 27 March 2021 15:35 UTC

Return-Path: <lencse@hit.bme.hu>
X-Original-To: v6ops@ietfa.amsl.com
Delivered-To: v6ops@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id A8A343A2CEB for <v6ops@ietfa.amsl.com>; Sat, 27 Mar 2021 08:35:39 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -1.9
X-Spam-Level:
X-Spam-Status: No, score=-1.9 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, HTML_MESSAGE=0.001, NICE_REPLY_A=-0.001, SPF_PASS=-0.001, URIBL_BLOCKED=0.001] autolearn=ham autolearn_force=no
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id qB1xRsN3BVDb for <v6ops@ietfa.amsl.com>; Sat, 27 Mar 2021 08:35:35 -0700 (PDT)
Received: from frogstar.hit.bme.hu (frogstar.hit.bme.hu [IPv6:2001:738:2001:4020::2c]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id 0839B3A2CED for <v6ops@ietf.org>; Sat, 27 Mar 2021 08:35:34 -0700 (PDT)
Received: from [192.168.1.118] (host-79-121-41-166.kabelnet.hu [79.121.41.166]) (authenticated bits=0) by frogstar.hit.bme.hu (8.15.2/8.15.2) with ESMTPSA id 12RFZIfO024165 (version=TLSv1.2 cipher=ECDHE-RSA-AES128-GCM-SHA256 bits=128 verify=NO) for <v6ops@ietf.org>; Sat, 27 Mar 2021 16:35:26 +0100 (CET) (envelope-from lencse@hit.bme.hu)
X-Authentication-Warning: frogstar.hit.bme.hu: Host host-79-121-41-166.kabelnet.hu [79.121.41.166] claimed to be [192.168.1.118]
To: v6ops@ietf.org
References: <BL0PR05MB5316425C5650B5D2FE43DE4DAE6C9@BL0PR05MB5316.namprd05.prod.outlook.com> <59B5C1F7-48E4-4915-BAAC-41D8ADA29E8F@gmail.com> <18ea74665936408bb33f20630da95311@huawei.com> <E0757B36-8FFB-43A8-8F8B-A7F152F81156@gmail.com> <fb216b2c2d9743d9aedbd4112bb71a27@huawei.com>
From: Gabor LENCSE <lencse@hit.bme.hu>
Message-ID: <c29d1459-14f9-0ece-26be-91de3bc04ec2@hit.bme.hu>
Date: Sat, 27 Mar 2021 16:35:13 +0100
User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:78.0) Gecko/20100101 Thunderbird/78.8.1
MIME-Version: 1.0
In-Reply-To: <fb216b2c2d9743d9aedbd4112bb71a27@huawei.com>
Content-Type: multipart/alternative; boundary="------------8E778D71DA3F0B7950FCA523"
Content-Language: en-US
X-Virus-Scanned: clamav-milter 0.102.4 at frogstar.hit.bme.hu
X-Virus-Status: Clean
Received-SPF: pass (frogstar.hit.bme.hu: authenticated connection) receiver=frogstar.hit.bme.hu; client-ip=79.121.41.166; helo=[192.168.1.118]; envelope-from=lencse@hit.bme.hu; x-software=spfmilter 2.001 http://www.acme.com/software/spfmilter/ with libspf2-1.2.10;
X-DCC-wuwien-Metrics: frogstar.hit.bme.hu; whitelist
X-Scanned-By: MIMEDefang 2.79 on 152.66.248.44
Archived-At: <https://mailarchive.ietf.org/arch/msg/v6ops/XsSTXdz2uUvnsPwnZmx_KPrJaC4>
Subject: Re: [v6ops] draft-vf-v6ops-ipv6-deployment and draft-lmhp-v6ops-transition-comparison
X-BeenThere: v6ops@ietf.org
X-Mailman-Version: 2.1.29
Precedence: list
List-Id: v6ops discussion list <v6ops.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/v6ops>, <mailto:v6ops-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/v6ops/>
List-Post: <mailto:v6ops@ietf.org>
List-Help: <mailto:v6ops-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/v6ops>, <mailto:v6ops-request@ietf.org?subject=subscribe>
X-List-Received-Date: Sat, 27 Mar 2021 15:35:40 -0000

Dear All,

I have read draft-vf-v6ops-ipv6-deployment-02 and I found it useful and 
I support its adoption.

I have found a typo at the bottom of page 18:

"Yet, this worsening effect may appea_e_ as disturbing for a plain 
transition to IPv6." --> "Yet, this worsening effect may appea*r* as 
disturbing for a plain transition to IPv6."

Regarding IPv6 Security in Section 11.4, I think it is also worth 
considering the additional security issues brought into existence by the 
applied IPv6 transition technologies used to implement IPv4aaS, like 
464XLAT, DS-Lite, etc. You can find some basic hints in our paper:

G. Lencse and Y. Kadobayashi, "Methodology for the identification of 
potential security issues of different IPv6 transition technologies: 
Threat analysis of DNS64 and stateful NAT64", /Computers & Security/ 
(Elsevier), vol. 77, no. 1, pp. 397-411, August 1, 2018, DOI: 
10.1016/j.cose.2018.04.012

Available from: 
http://www.hit.bme.hu/~lencse/publications/ECS-2018-Methodology-revised.pdf

As for our draft, draft-lmhp-v6ops-transition-comparison-06, I am 
working on an RFC 8219 compliant performance measurement tool to be able 
to add relevant data to Section 5 about Performance Comparison. I have 
just prepared the very much alpha state version of a stateful NAT64 
tester, by enabling siitperf for stateful tests: 
https://github.com/lencsegabor/siitperf/tree/stateful

It is capable of benchmarking both stateful NAT64 and stateful NAT44 
(CGNAT) implementations. Its documentation is to be updated yet, but I 
am glad the help, if any you would like to use it.

Best regards,

Gábor

p.s.: I have corrected the subject line, as I think Fred intended to 
include both drafts in it.

On 3/27/2021 1:05 PM, Xipengxiao wrote:
> Hi All,
>
> I support the adoption of both drafts, as they provide (1) useful information about the current deployment status of IPv6, and (2) useful information for operators to consider while deploying IPv6.   With almost 500 IPv6-related RFCs, it's difficult for IPv6-deployers to find all the relevant information.  So these summary-and-advice types of  documents are useful for our industry at this stage.
>
> XiPeng
>
>> -----Original Message-----
>> From: v6ops [mailto:v6ops-bounces@ietf.org] On Behalf Of Fred Baker
>> Sent: Saturday, March 27, 2021 5:58 AM
>> To: v6ops@ietf.org
>> Cc: draft-lmhp-v6ops-transition-comparison@ietf.org; draft-vf-v6ops-ipv6-
>> deployment@ietf.org
>> Subject: [v6ops] draft-vf-v6ops-ipv6-deployment and draft-vf-v6ops-ipv6-
>> deployment
>>
>>
>>
>>> On Mar 19, 2021, at 1:39 AM, Paolo Volpato <paolo.volpato@huawei.com>
>> wrote:
>>> For lmhp-v6ops-transition-comparison, on behalf of the authors of draft-vf-
>> v6ops-ipv6-deployment I can say we are in favor of the WG adoption. Not
>> only is it a good description of the transition technologies to IPv6, but it also
>> constitutes a basis for our draft.
>>
>> OK, let me put this to the working group. We asked about adoption of draft-
>> lmhp-v6ops-transition-comparison once before (in January 2020), and got
>> essentially no response. It has come up on the list twice since, in July and in
>> November. The authors of draft-vf-v6ops-ipv6-deployment would like to see
>> it adopted. The two sets of authors are disjoint. I therefore have at least nine
>> people that would like to see us adopt and publish it. What other folks have
>> opinions, pro or con?
>>
>> Along the same lines, are there opinions regarding the adoption of draft-vf-
>> v6ops-ipv6-deployment?
>>
>> https://mailarchive.ietf.org/arch/search/?qdr=a&q=%22draft-lmhp-v6ops-
>> transition-comparison%22
>> https://mailarchive.ietf.org/arch/search/?qdr=a&q=%22draft-vf-v6ops-ipv6-
>> deployment%22
> _______________________________________________
> v6ops mailing list
> v6ops@ietf.org
> https://www.ietf.org/mailman/listinfo/v6ops