Re: [v6ops] draft-buraglio-v6ops-ula discussion

Vasilenko Eduard <vasilenko.eduard@huawei.com> Mon, 08 August 2022 08:17 UTC

Return-Path: <vasilenko.eduard@huawei.com>
X-Original-To: v6ops@ietfa.amsl.com
Delivered-To: v6ops@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id AF3E1C15C530 for <v6ops@ietfa.amsl.com>; Mon, 8 Aug 2022 01:17:51 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -0.667
X-Spam-Level:
X-Spam-Status: No, score=-0.667 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, HTML_MESSAGE=0.001, NORMAL_HTTP_TO_IP=0.001, NUMERIC_HTTP_ADDR=1.242, RCVD_IN_MSPIKE_H2=-0.001, SPF_HELO_NONE=0.001, SPF_PASS=-0.001, T_SCC_BODY_TEXT_LINE=-0.01] autolearn=ham autolearn_force=no
Received: from mail.ietf.org ([50.223.129.194]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id T7IBU1Qn1rR6 for <v6ops@ietfa.amsl.com>; Mon, 8 Aug 2022 01:17:50 -0700 (PDT)
Received: from frasgout.his.huawei.com (frasgout.his.huawei.com [185.176.79.56]) (using TLSv1.2 with cipher AECDH-AES256-SHA (256/256 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id B0E40C15C52B for <v6ops@ietf.org>; Mon, 8 Aug 2022 01:17:49 -0700 (PDT)
Received: from fraeml710-chm.china.huawei.com (unknown [172.18.147.206]) by frasgout.his.huawei.com (SkyGuard) with ESMTP id 4M1TXD0WcLz67yBh for <v6ops@ietf.org>; Mon, 8 Aug 2022 16:15:08 +0800 (CST)
Received: from mscpeml500002.china.huawei.com (7.188.26.138) by fraeml710-chm.china.huawei.com (10.206.15.59) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256) id 15.1.2375.24; Mon, 8 Aug 2022 10:17:46 +0200
Received: from mscpeml500001.china.huawei.com (7.188.26.142) by mscpeml500002.china.huawei.com (7.188.26.138) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256) id 15.1.2375.24; Mon, 8 Aug 2022 11:17:46 +0300
Received: from mscpeml500001.china.huawei.com ([7.188.26.142]) by mscpeml500001.china.huawei.com ([7.188.26.142]) with mapi id 15.01.2375.024; Mon, 8 Aug 2022 11:17:46 +0300
From: Vasilenko Eduard <vasilenko.eduard@huawei.com>
To: David Farmer <farmer=40umn.edu@dmarc.ietf.org>, Brian E Carpenter <brian.e.carpenter@gmail.com>
CC: v6ops list <v6ops@ietf.org>
Thread-Topic: [v6ops] draft-buraglio-v6ops-ula discussion
Thread-Index: AQHYpbeg9ezWkP9RC0WJTztRjHUwJ62b840AgARZ3ICAAERqgIAADkyAgAATU4CAA/834A==
Date: Mon, 08 Aug 2022 08:17:46 +0000
Message-ID: <b73188be0d3c40dfa93f40d3742e4331@huawei.com>
References: <CABKBHweedb9Cmefy3M+jBkX3P_ML++a2N7SpSKVcZ0gL2U5K8w@mail.gmail.com> <D28DC500-06C3-41EE-BB07-0B9DF630B288@cisco.com> <CAN-Dau2mc--CpTMkrAkBbPz3fX0SNG8D9iTU3q=gGaE--OaLew@mail.gmail.com> <EBF6BF82-A218-4AF0-89BB-E20A8ABCCE09@cisco.com> <f41e16cc-d04d-cfa9-7f42-6fc75d6c0948@gmail.com> <CAN-Dau2fUh1ABpyh4mYrOod31T5J2gU90b9WEiJ1jOvO+8TYoA@mail.gmail.com>
In-Reply-To: <CAN-Dau2fUh1ABpyh4mYrOod31T5J2gU90b9WEiJ1jOvO+8TYoA@mail.gmail.com>
Accept-Language: zh-CN, en-US
Content-Language: en-US
X-MS-Has-Attach:
X-MS-TNEF-Correlator:
x-originating-ip: [10.81.200.58]
Content-Type: multipart/alternative; boundary="_000_b73188be0d3c40dfa93f40d3742e4331huaweicom_"
MIME-Version: 1.0
X-CFilter-Loop: Reflected
Archived-At: <https://mailarchive.ietf.org/arch/msg/v6ops/bkqkoSGQvRQZbiLZ6DBqcQOs6ik>
Subject: Re: [v6ops] draft-buraglio-v6ops-ula discussion
X-BeenThere: v6ops@ietf.org
X-Mailman-Version: 2.1.39
Precedence: list
List-Id: v6ops discussion list <v6ops.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/v6ops>, <mailto:v6ops-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/v6ops/>
List-Post: <mailto:v6ops@ietf.org>
List-Help: <mailto:v6ops-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/v6ops>, <mailto:v6ops-request@ietf.org?subject=subscribe>
X-List-Received-Date: Mon, 08 Aug 2022 08:17:51 -0000

> As I see it, the problem with distinguishing global IPv4 addresses from local RFC1918 IPv4 addresses is that RFC1918 IPv4 addresses are most often used as global IPv4 source addresses through the use of NAT. Therefore, distinguishing global IPv4 addresses from local RFC1918 IPv4 addresses isn't practical with today's highly NATed IPv4 Internet.

It is not a relevant concern to Brian’s proposal.
Because NAT is for source address but Brian was talking about destination address priority.

Ed/
From: v6ops [mailto:v6ops-bounces@ietf.org] On Behalf Of David Farmer
Sent: Saturday, August 6, 2022 1:13 AM
To: Brian E Carpenter <brian.e.carpenter@gmail.com>
Cc: v6ops list <v6ops@ietf.org>
Subject: Re: [v6ops] draft-buraglio-v6ops-ula discussion



On Fri, Aug 5, 2022 at 4:04 PM Brian E Carpenter <brian.e.carpenter@gmail.com<mailto:brian.e.carpenter@gmail.com>> wrote:
Eric,

On 06-Aug-22 08:13, Eric Vyncke (evyncke) wrote:
> David,
>
> You are correct. I think that the priority order should be (from most suitable to least suitable):
>
>   * Global IPv6
>   * Global IPv4
>   * ULA
>   * RFC 1918

That may be your opinion, but many people disagree and that is why the consensus is otherwise.

My own order of default preference for *destination* address selection would be:

ULA
Global IPv6
RFC 1918
Global IPv4

The rationale is: Prefer IPv6 always. Prefer local addressing when available.

Obviously this requires similar rules in discovery (whether by DNS or some other method). If you can't discover a ULA, you will never use a ULA.

Source address selection is simple: longest match with the destination.

     Brian

However, neither of those is what RFC6724 specifies. Currently, the order is;

ULA Local /48 (if RFC6724, section 10.6, is implemented automatically or manually, which is generally not the case in the wild)
Global IPv6
Global IPv4/ RFC1918
ULA /7

Further, the table from RFC 3484 was;

Global IPv6/ ULA
Global IPv4/ RFC1918

Personally, I think RFC6724 almost has it right; what it got wrong is that section 10.6 should be mandatory and automatic, implemented by the IP stack, and not effectively optional and left to manual implementation.

As I see it, the problem with distinguishing global IPv4 addresses from local RFC1918 IPv4 addresses is that RFC1918 IPv4 addresses are most often used as global IPv4 source addresses through the use of NAT. Therefore, distinguishing global IPv4 addresses from local RFC1918 IPv4 addresses isn't practical with today's highly NATed IPv4 Internet. Furthermore, adding RFC1918 IPv4 addresses to the table requires at least three entries, one for 10.0.0.0/8<http://10.0.0.0/8>, 172.16.0.0/12<http://172.16.0.0/12>, and 192.168.0.0/16<http://192.168.0.0/16>, and maybe 100.64.0.0/10<http://100.64.0.0/10> from RFC6598 should be included as well. So, distinguishing global IPv4 addresses from local RFC1918 IPv4 addresses will add a lot of cruft to the table.

Thanks

===============================================
David Farmer               Email:farmer@umn.edu<mailto:Email%3Afarmer@umn.edu>
Networking & Telecommunication Services
Office of Information Technology
University of Minnesota
2218 University Ave SE        Phone: 612-626-0815
Minneapolis, MN 55414-3029   Cell: 612-812-9952
===============================================