Re: [v6ops] Please review the No IPv4 draft

Simon Perreault <simon.perreault@viagenie.ca> Tue, 22 April 2014 13:23 UTC

Return-Path: <simon.perreault@viagenie.ca>
X-Original-To: v6ops@ietfa.amsl.com
Delivered-To: v6ops@ietfa.amsl.com
Received: from localhost (ietfa.amsl.com [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id BDA751A046F for <v6ops@ietfa.amsl.com>; Tue, 22 Apr 2014 06:23:48 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -0.773
X-Spam-Level:
X-Spam-Status: No, score=-0.773 tagged_above=-999 required=5 tests=[BAYES_05=-0.5, RP_MATCHES_RCVD=-0.272, SPF_PASS=-0.001] autolearn=ham
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id ilnmZUU254pJ for <v6ops@ietfa.amsl.com>; Tue, 22 Apr 2014 06:23:44 -0700 (PDT)
Received: from jazz.viagenie.ca (jazz.viagenie.ca [IPv6:2620:0:230:8000::2]) by ietfa.amsl.com (Postfix) with ESMTP id E7CAF1A0430 for <v6ops@ietf.org>; Tue, 22 Apr 2014 06:23:43 -0700 (PDT)
Received: from porto.nomis80.org (unknown [IPv6:2620:0:230:c000:349d:fe5f:bc57:89]) by jazz.viagenie.ca (Postfix) with ESMTPSA id 4E47B40221; Tue, 22 Apr 2014 09:23:38 -0400 (EDT)
Message-ID: <53566D59.7000202@viagenie.ca>
Date: Tue, 22 Apr 2014 09:23:37 -0400
From: Simon Perreault <simon.perreault@viagenie.ca>
User-Agent: Mozilla/5.0 (X11; Linux x86_64; rv:24.0) Gecko/20100101 Thunderbird/24.4.0
MIME-Version: 1.0
To: "George, Wes" <wesley.george@twcable.com>, Matthew Petach <mpetach@netflight.com>, Ted Lemon <ted.lemon@nominum.com>
References: <534BF5A5.5010609@viagenie.ca> <20140415083615.GB43641@Space.Net> <534D3672.3060702@viagenie.ca> <3446106.k0lm12lQ8b@linne> <alpine.DEB.2.02.1404161034220.10236@uplift.swm.pp.se> <CAKD1Yr2D+ZMi-UctuvrMzyqoHqgBy5O26GODT=bRwq0PsvLgLw@mail.gmail.com> <alpine.DEB.2.02.1404161053110.10236@uplift.swm.pp.se> <20140416155714.GB64039@ricotta.doit.wisc.edu> <alpine.DEB.2.02.1404162310050.10236@uplift.swm.pp.se> <B21C1073-ABBE-44FE-964F-65AD7849CD31@delong.com> <alpine.DEB.2.02.1404170658440.10236@uplift.swm.pp.se> <4EABCE38-7CBA-4C95-84EE-686A2300F26E@delong.com> <8E450CDC-FFC5-4649-89FE-387836C8E40B@nominum.com> <CAEmG1=oNyotn6tcKyxUuLCW0of-MxVrvUB08jsygjo8kidgt0g@mail.gmail.com> <CF7BDD91.1911D%wesley.george@twcable.com>
In-Reply-To: <CF7BDD91.1911D%wesley.george@twcable.com>
Content-Type: text/plain; charset="UTF-8"
Content-Transfer-Encoding: 8bit
Archived-At: http://mailarchive.ietf.org/arch/msg/v6ops/eyyXZP-dKtB20AgZutD8-xB7Y74
Cc: "v6ops@ietf.org WG" <v6ops@ietf.org>
Subject: Re: [v6ops] Please review the No IPv4 draft
X-BeenThere: v6ops@ietf.org
X-Mailman-Version: 2.1.15
Precedence: list
List-Id: v6ops discussion list <v6ops.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/v6ops>, <mailto:v6ops-request@ietf.org?subject=unsubscribe>
List-Archive: <http://www.ietf.org/mail-archive/web/v6ops/>
List-Post: <mailto:v6ops@ietf.org>
List-Help: <mailto:v6ops-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/v6ops>, <mailto:v6ops-request@ietf.org?subject=subscribe>
X-List-Received-Date: Tue, 22 Apr 2014 13:23:48 -0000

Le 2014-04-22 09:00, George, Wes a écrit :
> WG] I think that there’s a need for clarification here. A lot of this
> discussion has focused almost exclusively on the full-on disabling of
> IPv4. Part of what the draft discusses is that there are differing
> things that can be signaled to the local devices from the network based
> on the bit set in the proposed option. There is an option that simply
> signals “there is no IPv4 support on this network” and makes attendant
> recommendations that the device decide on its own what to do for any
> local IPv4 traffic on the LAN, including doing nothing, configuring 169
> addresses, etc. but that it should disable IPv4 on the upstream
> interface facing the network that provided the signal (I.e. Stop
> forwarding IPv4 traffic and stop sending DHCPv4). 
> I’m willing to go with consensus (if exist) that the more aggressive
> option of something like a full-on IPv4 killswitch that affects more
> than one interface and affects the local network is a bridge too far,
> both for security reasons (It’ll be hard to secure to a level that
> exploits aren’t likely) and because it gets into a question about
> autonomy and span of control. But I think it’s worth highlighting that
> there are also less aggressive options discussed in the draft, and I’d
> like to have some sense that those are mostly on the right track, and
> your statement is so broad that I wanted to get clarification on what
> you think of this.

Right.

To be very explicit, one of the "less aggressive" options on the table
is to specify a "there is no IPv4 on this network" signal while saying
nothing about how a host should react to this signal. Each
implementation could use that hint however it sees fit.

Simon
-- 
DTN made easy, lean, and smart --> http://postellation.viagenie.ca
NAT64/DNS64 open-source        --> http://ecdysis.viagenie.ca
STUN/TURN server               --> http://numb.viagenie.ca