Re: [v6ops] LISP support for draft-ietf-v6ops-rfc7084-bis-00

JORDI PALET MARTINEZ <jordi.palet@consulintel.es> Wed, 12 April 2017 17:44 UTC

Return-Path: <prvs=127550c264=jordi.palet@consulintel.es>
X-Original-To: v6ops@ietfa.amsl.com
Delivered-To: v6ops@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id D5A0212EB23 for <v6ops@ietfa.amsl.com>; Wed, 12 Apr 2017 10:44:12 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -2
X-Spam-Level:
X-Spam-Status: No, score=-2 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, DKIM_SIGNED=0.1, DKIM_VALID=-0.1, DKIM_VALID_AU=-0.1] autolearn=ham autolearn_force=no
Authentication-Results: ietfa.amsl.com (amavisd-new); dkim=pass (1024-bit key) header.d=consulintel.es; domainkeys=pass (1024-bit key) header.from=jordi.palet@consulintel.es header.d=consulintel.es
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id IK-xj-JU-hgN for <v6ops@ietfa.amsl.com>; Wed, 12 Apr 2017 10:44:11 -0700 (PDT)
Received: from mail.consulintel.es (mail.consulintel.es [217.126.185.215]) (using TLSv1 with cipher AES128-SHA (128/128 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id EB69712EB21 for <v6ops@ietf.org>; Wed, 12 Apr 2017 10:44:10 -0700 (PDT)
DKIM-Signature: v=1; a=rsa-sha256; c=simple; d=consulintel.es; s=MDaemon; t=1492019049; x=1492623849; q=dns/txt; h=DomainKey-Signature: Received:User-Agent:Date:Subject:From:To:Message-ID:Thread-Topic: References:In-Reply-To:Mime-version:Content-type: Content-transfer-encoding:Reply-To; bh=yEu7LVNog0GowoWQkVpTETjbg QIN2r45RPjFnCx+soA=; b=RizqsNzXH/pUWDgVK6RiYHoT7a1bQktqCfDbD1o7/ gbXH5uhxN4KMn3glWpRYlGT4NrCHTOC2skFEQfC971n9aV9YNTdnq8OoU4qZbKE5 QrCjR3gu4gYwTrlIakrOODtzY1Xc/F7T5rL8NYOWqS8fKv3Z7da4sopJmlrBTDfl Xk=
DomainKey-Signature: a=rsa-sha1; s=MDaemon; d=consulintel.es; c=simple; q=dns; h=from:message-id; b=WBUTY636BAoviJncOs4ncqELe29TGgv1dc67Wv0tMvUQEDxJ+B+SG/AMBhKg 1khElBBbEDw6K5Bhh8NOqDb8fqb8336q3RPbS4+FAJczBw1HM01YZ1/gU hZktYoZQdD15YE9cnIECd/s4QXMmObmya/mXeGABBjeaOBLsL2SQBY=;
X-MDAV-Processed: mail.consulintel.es, Wed, 12 Apr 2017 19:44:09 +0200
X-Spam-Processed: mail.consulintel.es, Wed, 12 Apr 2017 19:44:08 +0200
Received: from [10.10.10.99] by mail.consulintel.es (MDaemon PRO v11.0.3) with ESMTP id md50005407350.msg for <v6ops@ietf.org>; Wed, 12 Apr 2017 19:44:07 +0200
X-MDOP-RefID: re=0.000,fgs=0 (_st=1 _vt=0 _iwf=0)
X-Authenticated-Sender: jordi.palet@consulintel.es
X-HashCash: 1:20:170412:md50005407350::xZXa5442MtMJcIJN:00001WfY
X-Return-Path: prvs=127550c264=jordi.palet@consulintel.es
X-Envelope-From: jordi.palet@consulintel.es
X-MDaemon-Deliver-To: v6ops@ietf.org
User-Agent: Microsoft-MacOutlook/f.21.0.170409
Date: Wed, 12 Apr 2017 19:44:03 +0200
From: JORDI PALET MARTINEZ <jordi.palet@consulintel.es>
To: "v6ops@ietf.org" <v6ops@ietf.org>
Message-ID: <6DA0D96E-247C-4A95-906B-AD6EB3275938@consulintel.es>
Thread-Topic: [v6ops] LISP support for draft-ietf-v6ops-rfc7084-bis-00
References: <D8F5C737-B01A-4EC8-9175-C4921C0CD69F@consulintel.es> <392D675B-73C4-40D3-81A8-A06907F5581D@employees.org> <3BBFC922-85BD-49B5-B39E-227F191BD48C@consulintel.es> <729244A1-E7AB-4BA0-8B39-A6122D2C32DB@employees.org> <787AE7BB302AE849A7480A190F8B933009E4C3B8@OPEXCLILMA3.corporate.adroot.infra.ftgroup> <2D09D61DDFA73D4C884805CC7865E6114DB194A8@GAALPA1MSGUSRBF.ITServices.sbc.com> <E8AB2CCD-B563-446F-BA96-D18F735F72B6@gmail.com>
In-Reply-To: <E8AB2CCD-B563-446F-BA96-D18F735F72B6@gmail.com>
Mime-version: 1.0
Content-type: text/plain; charset="UTF-8"
Content-transfer-encoding: quoted-printable
Reply-To: jordi.palet@consulintel.es
Archived-At: <https://mailarchive.ietf.org/arch/msg/v6ops/j7h9IGxt6DDyPe-S8BBQaco_5Fg>
Subject: Re: [v6ops] LISP support for draft-ietf-v6ops-rfc7084-bis-00
X-BeenThere: v6ops@ietf.org
X-Mailman-Version: 2.1.22
Precedence: list
List-Id: v6ops discussion list <v6ops.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/v6ops>, <mailto:v6ops-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/v6ops/>
List-Post: <mailto:v6ops@ietf.org>
List-Help: <mailto:v6ops-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/v6ops>, <mailto:v6ops-request@ietf.org?subject=subscribe>
X-List-Received-Date: Wed, 12 Apr 2017 17:44:13 -0000

    > On Apr 12, 2017, at 5:52 AM, STARK, BARBARA H <bs7652@att.com> wrote:
    > 
    >> I tend to agree with you but with a slightly different proposal:  pick ONE
    >> mandatory stateful mechanism (DS-Lite) and ONE mandatory A+P
    >> mechanism (MAP-E).
    > 
    > Because RFC 7084 is also used as a mandatory reference in BBF TR-124 (used by telco ISPs to help with CE router RFPs), and most ISPs have no interest in requiring capabilities that are not useful to or relevant in their deployment, there MUST NOT be any mandatory transition mechanisms included in a 7084-bis.
    
    No hats
    
    I'm not sure I would go so far as your respective statements, but I agree that we don't want a laundry list of mechanisms that mostly make equipment more expensive, harder to use, and harder to sell. It's kind of pointless. It seems to me that if a network wants to use a given transition technology, it 

[Jordi] I disagree here. Adding the actual transition mechanism (all them) in the v-01 of the document (submitted today) means 0,15% of extra flash memory (slide 4 in my Chicago presentation) in the average “very low cost” CE today available in the market (8 Mbytes flash, leaving still about 2.5-3 Mbytes for future upgrades). I’ve done this analysis based on OpenWRT and several products in the market that use this or similar Linux-based implementations, which I think is probably 80% of the market today, and going up. More and more product now start using 16 Mbytes flash. There is no need for more CPU power or more RAM. In fact, there were 3 “major well-know” vendors in the meeting room and didn’t said that I’m wrong on this. May be if they are reading, they could confirm.

should specify that to its vendor(s) in the RFP/RFQ.

[Jordi] The point here is what I’ve indicated several times. Vendors are telling ISPs that they don’t support a given transition mechanism such as lw4o6, 464XLAT or MAP, because they’re aren’t in the RFC7084. Smaller ISPs have even a worst situation because they can’t do RFQs as their quantity is too small, so they just go to retail. This has been confirmed in the list by several folks.

    
    A data point of interest: https://ccdcoe.org/multimedia/hedgehog-fog-creating-and-detecting-ipv6-transition-mechanism-based-information.html is being flagged in the media as a reason to not deploy IPv6 - transition technologies that use tunnels apparently bypass intrusion detection technologies. I would argue that the point is flawed; put the tunnel intrusion detection technology between the tunnel endpoints and the user, problem solved. One issue there might be with the IDS itself - if it only looks at IPv4, it's not going to detect much in IPv6.
    
    But in general, I tend to think that a better recommendation would be to walk through our list of technologies and obsolete them - like we did with 6to4.
    
    > Barbara
    > _______________________________________________
    > v6ops mailing list
    > v6ops@ietf.org
    > https://www.ietf.org/mailman/listinfo/v6ops
    
    
    



**********************************************
IPv4 is over
Are you ready for the new Internet ?
http://www.consulintel.es
The IPv6 Company

This electronic message contains information which may be privileged or confidential. The information is intended to be for the use of the individual(s) named above. If you are not the intended recipient be aware that any disclosure, copying, distribution or use of the contents of this information, including attached files, is prohibited.