Re: [v6ops] new draft: draft-colitti-v6ops-host-addr-availability

"Fred Baker (fred)" <fred@cisco.com> Tue, 07 July 2015 00:02 UTC

Return-Path: <fred@cisco.com>
X-Original-To: v6ops@ietfa.amsl.com
Delivered-To: v6ops@ietfa.amsl.com
Received: from localhost (ietfa.amsl.com [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 6D8491A1DBE for <v6ops@ietfa.amsl.com>; Mon, 6 Jul 2015 17:02:07 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -114.511
X-Spam-Level:
X-Spam-Status: No, score=-114.511 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, DKIM_SIGNED=0.1, DKIM_VALID=-0.1, DKIM_VALID_AU=-0.1, RCVD_IN_DNSWL_HI=-5, SPF_PASS=-0.001, T_RP_MATCHES_RCVD=-0.01, USER_IN_DEF_DKIM_WL=-7.5, USER_IN_WHITELIST=-100] autolearn=ham
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id CHcrNRZx4j0v for <v6ops@ietfa.amsl.com>; Mon, 6 Jul 2015 17:02:05 -0700 (PDT)
Received: from alln-iport-6.cisco.com (alln-iport-6.cisco.com [173.37.142.93]) (using TLSv1 with cipher RC4-SHA (128/128 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id 1DF181A1BE0 for <v6ops@ietf.org>; Mon, 6 Jul 2015 17:02:05 -0700 (PDT)
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/simple; d=cisco.com; i=@cisco.com; l=4974; q=dns/txt; s=iport; t=1436227326; x=1437436926; h=from:to:cc:subject:date:message-id:references: in-reply-to:mime-version; bh=r4rJEzuFWxGdJwT2oPCZolbp5aHxs9TpUlVTNHGcXr0=; b=E+ZEAPFR9P0US2suzDrky+Ls5wMArte62j/UE+3b2ZCkcT/Dfz27+o1s BfPQWx5wWWm8HHfwtlXO/P/i2NwOMI1o7aCJMgSyOMVWSFIFM324+KL5R op9Pq8Xh8Ribxfb8qklyKXiUzXtBdVwbsCI/bqXrMjezGZFn0qtvkLrnK Q=;
X-Files: signature.asc : 833
X-IronPort-Anti-Spam-Filtered: true
X-IronPort-Anti-Spam-Result: A0DAAwD9FZtV/4wNJK1cgxJUYAaxCYxOCYFkCoV3AoFAOBQBAQEBAQEBgQqEIwEBAQMBAQEBawsFCwIBCA4KLiEGCyUCBA4FDogLAwoIDcUdDYVuAQEBAQEBAQEBAQEBAQEBAQEBAQEBF4tLgk2BTQgLWQeDF4EUBYVchj2HfAGCKoFSBWCFIYFlgTpEg1GDD4hbg0CDXSaCBwUcVAF+b4EEJB+BBAEBAQ
X-IronPort-AV: E=Sophos;i="5.15,418,1432598400"; d="asc'?scan'208";a="165998377"
Received: from alln-core-7.cisco.com ([173.36.13.140]) by alln-iport-6.cisco.com with ESMTP; 07 Jul 2015 00:02:05 +0000
Received: from xhc-rcd-x04.cisco.com (xhc-rcd-x04.cisco.com [173.37.183.78]) by alln-core-7.cisco.com (8.14.5/8.14.5) with ESMTP id t670248r021504 (version=TLSv1/SSLv3 cipher=AES128-SHA bits=128 verify=FAIL); Tue, 7 Jul 2015 00:02:04 GMT
Received: from xmb-rcd-x09.cisco.com ([169.254.9.49]) by xhc-rcd-x04.cisco.com ([173.37.183.78]) with mapi id 14.03.0195.001; Mon, 6 Jul 2015 19:02:03 -0500
From: "Fred Baker (fred)" <fred@cisco.com>
To: Andrew Yourtchenko <ayourtch@gmail.com>
Thread-Topic: [v6ops] new draft: draft-colitti-v6ops-host-addr-availability
Thread-Index: AQHQuEgnsal/sN+flU+Nn0z6zYUySg==
Date: Tue, 07 Jul 2015 00:02:03 +0000
Message-ID: <39F63B55-977F-4B84-8B55-52E2F0B1A851@cisco.com>
References: <201507061147.t66Bl1AE028312@irp-lnx1.cisco.com> <9290D0D1-062A-4DE0-A437-9A5F5045ACAC@gmail.com>
In-Reply-To: <9290D0D1-062A-4DE0-A437-9A5F5045ACAC@gmail.com>
Accept-Language: en-US
Content-Language: en-US
X-MS-Has-Attach: yes
X-MS-TNEF-Correlator:
x-originating-ip: [10.19.64.123]
Content-Type: multipart/signed; boundary="Apple-Mail=_808DB5DF-D140-46B4-A452-E2E44DD78E11"; protocol="application/pgp-signature"; micalg="pgp-sha1"
MIME-Version: 1.0
Archived-At: <http://mailarchive.ietf.org/arch/msg/v6ops/abyUMeHYV6ccDc3C4XtQBH66Bd8>
Cc: "v6ops@ietf.org" <v6ops@ietf.org>, "draft-colitti-v6ops-host-addr-availability@tools.ietf.org" <draft-colitti-v6ops-host-addr-availability@tools.ietf.org>
Subject: Re: [v6ops] new draft: draft-colitti-v6ops-host-addr-availability
X-BeenThere: v6ops@ietf.org
X-Mailman-Version: 2.1.15
Precedence: list
List-Id: v6ops discussion list <v6ops.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/v6ops>, <mailto:v6ops-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/v6ops/>
List-Post: <mailto:v6ops@ietf.org>
List-Help: <mailto:v6ops-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/v6ops>, <mailto:v6ops-request@ietf.org?subject=subscribe>
X-List-Received-Date: Tue, 07 Jul 2015 00:02:07 -0000

Thanks. One question. Chair hat off.

Section 2 identifies the current deployment model - each interface has a link-local address, a SLAAC address, and one or more temporary addresses. I haven't heard anyone complaining about that. Section 3 goes on to discuss virtual machines/containers, which might each have additional addresses, and the model Facebook is reportedly using, which gives individual addresses to processes. It also mentions draft-herbert-nvo3-ila, which is not a stupid model - I still have some comments on it in a multi-administration environment or for running applications in an "inside" and an "outside" address ("NAT has well-known drawbacks"), but it at least gets rid of the random encapsulations predominant in data centers today.

In other words, we already assign multiple addresses, by some means, to each interface in a network.

You mention SLAAC. Lorenzo mentions that in section 7. He also mentions DHCP address and prefix allocation.

The statement that I don't see in the document, which would help me personally, is a problem statement. I would guess that the problem statement is "we think some networks are limiting host interfaces to a single IPv6 address." I'd want a little more detail, but I'll bet that's the crux of it.

So my question is: "precisely what problem are we solving here?".

> On Jul 6, 2015, at 2:39 PM, Andrew Yourtchenko <ayourtch@gmail.com> wrote:
> 
> I read the draft and absolutely agree with the spirit.
> 
> Unfortunately, I think it won't work:
> 
> As soon as the devices work "good enough" with a single address, appealing to increase the amount of work by administrators in the name of humanity is going to fall on deaf ears.
> 
> The only way I see to solve this is to always use SLAAC on the devices: either 'externally' from the prefix received within the RA, or 'internally' from within the prefix received via DHCP-PD, and provide a mandatory registration mechanism for name-to-IP mapping.
> 
> If neither of the above works, as a backup effort the device can try getting N addresses via DHCP IA_NA and release those that it does not need immediately - and displaying a big yellow warning "This network may restrict IPv6 functionality and eat your kittens, contact your system administrator". Because ND is not going to happen on these 'extra' addresses, forwarding wise there will be no impact, just some more DHCP traffic after attachment (the "limited functionality" of course would need just one address and can start immediately).
> 
> Those who want tracking can track the upper 64bits or use IA_NA and filter out the addresses that are shortly lived.
> 
> Of course to avoid being a religious crusade such an effort need to produce something pragmatic - namely,
> a userland cross-platform API that would allow getting new addresses on demand by application and if needs to - implementing custom transport protocols on top of those on a per-app-per-address basis.
> 
> The above conjecture however is even less realistic than politely asking the inconveniences away, so the logical conclusion from that is I fully support this draft.
> 
> --a
> 
>> On 06 Jul 2015, at 13:47, fred@cisco.com wrote:
>> 
>> A new draft has been posted, at http://tools.ietf.org/html/draft-colitti-v6ops-host-addr-availability. Please take a look at it and comment.
>> 
>> _______________________________________________
>> v6ops mailing list
>> v6ops@ietf.org
>> https://www.ietf.org/mailman/listinfo/v6ops