Re: [v6ops] Heise.de article about IPv6 behaviour of 29 CPEs and reaction to prefix changes

Ted Lemon <mellon@fugue.com> Thu, 19 January 2023 15:15 UTC

Return-Path: <mellon@fugue.com>
X-Original-To: v6ops@ietfa.amsl.com
Delivered-To: v6ops@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id CEFCDC14CE53 for <v6ops@ietfa.amsl.com>; Thu, 19 Jan 2023 07:15:57 -0800 (PST)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -5.896
X-Spam-Level:
X-Spam-Status: No, score=-5.896 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, DKIM_SIGNED=0.1, DKIM_VALID=-0.1, GB_AFFORDABLE=1, HTML_MESSAGE=0.001, RCVD_IN_DNSWL_HI=-5, RCVD_IN_ZEN_BLOCKED_OPENDNS=0.001, SPF_HELO_NONE=0.001, SPF_PASS=-0.001, URIBL_DBL_BLOCKED_OPENDNS=0.001, URIBL_ZEN_BLOCKED_OPENDNS=0.001] autolearn=ham autolearn_force=no
Authentication-Results: ietfa.amsl.com (amavisd-new); dkim=pass (2048-bit key) header.d=fugue-com.20210112.gappssmtp.com
Received: from mail.ietf.org ([50.223.129.194]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id HX8fbs6YGRNq for <v6ops@ietfa.amsl.com>; Thu, 19 Jan 2023 07:15:53 -0800 (PST)
Received: from mail-qk1-x72e.google.com (mail-qk1-x72e.google.com [IPv6:2607:f8b0:4864:20::72e]) (using TLSv1.3 with cipher TLS_AES_128_GCM_SHA256 (128/128 bits) key-exchange X25519 server-signature RSA-PSS (2048 bits) server-digest SHA256) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id DE76CC14F72D for <v6ops@ietf.org>; Thu, 19 Jan 2023 07:15:53 -0800 (PST)
Received: by mail-qk1-x72e.google.com with SMTP id x26so1323458qkj.4 for <v6ops@ietf.org>; Thu, 19 Jan 2023 07:15:53 -0800 (PST)
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=fugue-com.20210112.gappssmtp.com; s=20210112; h=cc:to:subject:message-id:date:from:in-reply-to:references :mime-version:from:to:cc:subject:date:message-id:reply-to; bh=z/ZBJkM31OWG2jTDaBf890AfR65nwnJ8jTDrvgUfSWU=; b=NYz7PCYUenaGOwW8rmEwLm15JNAF363OnBFac4FT06qVbDZGV55UyXZ1lVtzHUo91M TXVycW3kcWHgZRQ5svkb1rBUnk/u5EvArrov3Grwj8+tEp73CX73UWjp/sEufsBA55Bp ZxtNBcPvQPOPlijcb4pjXm8uc2YMYz6/9KJDCR8pPxhJn4R34Tjll221S5Q51qolAwn1 hNs7bIRG+y+Z0yewMrz4xfpC88vnGQGANghwSu6XUnnbKa9o4qwbAL+SI02adMMQ9jWq Pc221HCBU/AvhahpmvTdp3TGryBibfCC/TNS4FtVNjpfqcKv4D0iK60AZ/izxSuYxNot x/MA==
X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20210112; h=cc:to:subject:message-id:date:from:in-reply-to:references :mime-version:x-gm-message-state:from:to:cc:subject:date:message-id :reply-to; bh=z/ZBJkM31OWG2jTDaBf890AfR65nwnJ8jTDrvgUfSWU=; b=OENtXVJoUDOMh3A02eNfL+hQO4c3gXe6dob1c04OVBZDOjy0Zjv6CpXTSnbgbl+GEM pIJi3riTRHQCFwM3RmMBShq3GukUXjbe5eLH/cKfL5xAJ1g/QsZlA/riGG7IpzHoucRU sQhcbqNzMyto+N3pfGh+Stiu/1L73ukpFd2Xu/I3HWlspDGHC1705/8iprcQ4iI0Nom5 hJbeBH1H/O65gTcTfjC46M1l0d/6lgqOOI6WVeFzm5bxLq6QOigkTvc/UQQm2DeolQ2s G/ogxyy3YP67MnTqYl3yTMFTQ32d5Zpr2oZISKCddxBMZIOsxkeFjnc2EWRhNOAQN5Ta YdLA==
X-Gm-Message-State: AFqh2kpJnkb/qeE5P+zlyAUsGzAUAuSBEzI2HAG+nfM0ecIgBcLBh8Ag /ue0WCEF3NbhlUA+Q5E0nPWPonxz6u9dI5zmCNgH0G9fi1AJcnNG
X-Google-Smtp-Source: AMrXdXs9V15HyzC53QYL4ooy4y/cCrC152OKkpgI16MmKARsGHKkk6p6FWx/p4/PtQtteTk4iStD78FR867AgJGDl2U=
X-Received: by 2002:ae9:ec11:0:b0:706:e593:2a4d with SMTP id h17-20020ae9ec11000000b00706e5932a4dmr249445qkg.334.1674141352669; Thu, 19 Jan 2023 07:15:52 -0800 (PST)
MIME-Version: 1.0
References: <261c65a87cfd453db38af88995162c7d@huawei.com> <fabc3012-9a8d-6a1e-2fe9-065396a34307@gmail.com> <3691e428c81f48a981fb146a6bcd599a@huawei.com> <CAM5+tA9nAoKkvBQb66JzsHX7yV0g7GwpoKVgXmYpVBmjTFso+A@mail.gmail.com> <CAPt1N1kco_T8ZacuDytyjTJ=DYzM-ZCY7PM3sOgkau=g-YfzSw@mail.gmail.com> <e80167cb1db848e28b40072de23dbe2e@huawei.com> <743e0ce0-dc0d-4062-a047-9d3d543284c5@posteo.de> <CAGB08_cfYV7G_85zZH+s070mz1Lvq5qZbLz=cXydNvNHhgpRBg@mail.gmail.com> <CAD6AjGTHAEciR8muusSVqb1h6Xicq-n-ML10wMTZek5=7xeF=Q@mail.gmail.com>
In-Reply-To: <CAD6AjGTHAEciR8muusSVqb1h6Xicq-n-ML10wMTZek5=7xeF=Q@mail.gmail.com>
From: Ted Lemon <mellon@fugue.com>
Date: Thu, 19 Jan 2023 10:15:16 -0500
Message-ID: <CAPt1N1nrO0MLUBnTcNd3OfgPCU2eebBDe165WvL2OwUNsOhO7A@mail.gmail.com>
To: Ca By <cb.list6@gmail.com>
Cc: Nick Buraglio <buraglio@forwardingplane.net>, Xipengxiao <xipengxiao=40huawei.com@dmarc.ietf.org>, "v6ops@ietf.org" <v6ops@ietf.org>
Content-Type: multipart/alternative; boundary="000000000000a1589f05f29f68fc"
Archived-At: <https://mailarchive.ietf.org/arch/msg/v6ops/l4KIokT2cBczuQYHXhwH98iiPjg>
Subject: Re: [v6ops] Heise.de article about IPv6 behaviour of 29 CPEs and reaction to prefix changes
X-BeenThere: v6ops@ietf.org
X-Mailman-Version: 2.1.39
Precedence: list
List-Id: v6ops discussion list <v6ops.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/v6ops>, <mailto:v6ops-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/v6ops/>
List-Post: <mailto:v6ops@ietf.org>
List-Help: <mailto:v6ops-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/v6ops>, <mailto:v6ops-request@ietf.org?subject=subscribe>
X-List-Received-Date: Thu, 19 Jan 2023 15:15:57 -0000

6204 is obsoleted by 7084, which I think is fairly well regarded.
Similarly, the requirements stated in 6092 seem appropriate and I think are
generally well regarded. Both specs are, AFAIK, generally implemented in
IPv6-capable CE routers. Why do you say that these documents didn't help?

On Thu, Jan 19, 2023 at 10:06 AM Ca By <cb.list6@gmail.com> wrote:

> Examples of previous documents that took a lot of WG group time, in the
> same way, but did not actually help imho
>
> https://datatracker.ietf.org/doc/html/rfc6092
>
>
> https://datatracker.ietf.org/doc/html/rfc6204
>
>
>
> On Thu, Jan 19, 2023 at 5:51 AM Nick Buraglio <
> buraglio@forwardingplane.net> wrote:
>
>>
>>
>> On Thu, Jan 19, 2023 at 7:32 AM Klaus Frank <klaus.frank@posteo.de>
>> wrote:
>>
>>> Hi,
>>>
>>> On 19.01.2023 11:59, Xipengxiao wrote:
>>> >
>>> > Hi Ca, Nick, Ted and folks,
>>> >
>>> > Nick (and Brian)’s proposal to write clear guidelines is accepted by
>>> > all, but I suspect it’s not enough – if we don’t reduce options, these
>>> > guidelines will still be too long and requiring the deployers to make
>>> > too many decisions (a negative).
>>> >
>>> > When proposing reducing options, I am not denying flexibility’s value.
>>> > But is there a single company that deployed IPv6 for flexibility?
>>> > Every IPv6 deployment I know of is for addresses. Therefore, creating
>>> > a base-line IPv6 solution that works is top priority for now.
>>> > Flexibility and optimization can come later.
>>> >
>>> > I am surprised that the proposal to reduce options met strong
>>> > opposition.  Do you think this direction is wrong, or do you think the
>>> > direction is right but it is too difficult to achieve?
>>> >
>>> I think it probably will be to difficult to achieve in the end, but it
>>> is worth trying to craft something anyway.
>>
>> The main reason for that is
>>> that most things related to why deploying IPv6 currently is such a
>>> complex topic is because of having to work around bugs and quirks...
>>>
>>
>> Bugs and quirks won't ever go away. A framework of sane and
>> straightforward deployment expectations will serve to better clarify what
>> those bugs and quirks are, and therefore shine a light on them and,
>> hopefully, aid in diminishing them a little.
>>
>>>
>>> Like the scanner that only supports ULA addresses as it fails to use a
>>> DNS name within the client component of the driver so you're forced to
>>> use an IP address. And then when the GUA changes it breaks.
>>> Or a wide variety of different deployments by ISPs. Some offer DHCPv6-PD
>>> some don't. Some offer a /48 or /60 others just a single /64 and even
>>> use the first address out of it for the WAN interface. I was told of at
>>> least one provider that blocked all traffic that originated from every
>>> address that was not the SLAAC generated one, so temporary addresses and
>>> subnetting are not possible without NAT66. There are ISPs which
>>> completely block ICMPv6 on their CPE and thereby completely breaking
>>> IPv6 within applications behind it. Clients that refuse to connect to a
>>> network that doesn't have an IPv4 address and telling the user it
>>> doesn't have network connectivity or immediately automatically
>>> disconnecting. And then there is also software like docker which doesn't
>>> have a builtin way for dynamic address updates and need custom scripts
>>> to be written for it. But even then, can you use DHCPv6-PD or do you
>>> need ND-Proxy?
>>
>>
>> These things in particular are what would benefit the most in the long
>> term from something like this -
>> If there is some document which holds some weight that points to a
>> supportable deployment, then there are
>> at least some developers that will use it as a reference, and some users
>> that will point to it when functionality
>> is poor or nonsensical (such as filtering ICMP for all but SLAAC
>> addresses). It won't solve all the problems, but a rising tide lifts all
>> boats,
>> so if it helps a few folks, then we should try.
>>
>>
>>> That depends on what the ISP provides and what other bugs
>>> you have to workaround in that network, so it is not portable. When you
>>> try to do it on a notebook that is roaming from network to network, it's
>>> basically a impracticable to find a solution. And not to mention devices
>>> and clients that implement additional "features" that aren't RFC
>>> compliant, like Linux ignoring routes that have a longer mask than a
>>> predefined value within router advertisements (and often that is set to
>>> 0 by default, ignoring all but the default route).
>>>
>>> All of this *requires a lot of workarounds *to be deployed and these
>>> workarounds are what makes IPv6 complicated. It is not that one chooses
>>> to use the freedom of IPv6, but the necessity to support all possible
>>> combinations a ISP may have chosen to deploy so that your devices work
>>> in that network. And if it's a notebook it has to work in all of these.
>>> Making the freedom of IPv6 a burden instead of an enabling force.
>>>
>>> >   I invite people to comment on this.  If enough people think the
>>> > direction is wrong, I will shut up.  If it’s just too difficult, then
>>> > I think agreeing on a few principles like “keeping reducing options
>>> > until it no longer works” may offer a way to define a base-line
>>> > solution.   As examples, I wonder who think the following 2 sentences
>>> > are not acceptable?
>>> >
>>> >   * For simplicity of decision making, GUA is recommended, unless
>>> >     there are clear reasons to use other types of addresses like ULA
>>> >
>>> I agree
>>>
>>
>> 100%
>>
>>
>>> >
>>> >   * Implementers and deployers are encourage to consider 464XLAT or
>>> >     MAP-T first, unless there are clear reasons to use other
>>> >     transition solutions
>>> >
>>> If a MAP-T BR is present also having NAT64 isn't that unrealistic, so
>>> I'd suggest 464XLAT AND MAP-T (I.E. both) to be deployed simultaneously.
>>> Mainly because MAP-T would be limited to TCP and UDP traffic. E. g. SCTP
>>> and QUIC wouldn't be possible with just MAP-T. But in any case the
>>> deployment of MAP-T is better than CG-NAT which many ISPs currently
>>> have, but I'm not sure if we can change the status quo. Nonetheless we
>>> probably also need to specify a minimum amount of TCP and UDP ports an
>>> ISP has to allocate to clients.
>>>
>> In many cases CGN is just a fact of life because small and regional ISPs
>> don't have great options for affordable and supportable 464XLAT CPE, as far
>> as I can tell.  Advocating for it could help in raising awareness of the
>> need for the smaller CPE providers.
>>
>>> >
>>> > This way, common people can go with GUA & 464XLAT, experts can do
>>> > whatever they want.
>>>
>> +1
>>
>>> >
>>> Two additional things we have to consider here:
>>>
>>>   * Renewal of the addresses, should we specify a minimum lifetime for
>>>     the GUA? Should it be unique forever?
>>>   * DHCPv6 or ND-Proxy, which one should we propose for scenarios where
>>>     a client (application) needs more than one address? I wouldn't
>>>     consider most developers "network experts", so we probably have to
>>>     handle the docker on a notebook case...
>>>
>>> Sincerely,
>>> Klaus Frank
>>>
>>> > XiPeng
>>> >
>>> > *From:* Ted Lemon <mellon@fugue.com>
>>> > *Sent:* Tuesday, January 17, 2023 7:58 PM
>>> > *To:* buraglio@es.net
>>> > *Cc:* Xipengxiao <xipengxiao@huawei.com>; v6ops@ietf.org
>>> > *Subject:* Re: [v6ops] Heise.de article about IPv6 behaviour of 29
>>> > CPEs and reaction to prefix changes
>>> >
>>> > One thing I will point out here is that IPv6's flexibility makes
>>> > things possible that are actually useful, and are not possible with
>>> > IPv4 (at least not without some kind of heavy lift). E.g., there is no
>>> > way to do stub networks with IPv4. Doing what we've done with stub
>>> > networks using only IPv4 would require stateful NAT64 with the
>>> > translation table tied to the service advertisement table. Much more
>>> > work than just doing IPv6 routing with ULAs. Also not possible with
>>> > GUAs, since IPv6 GUA prefixes aren't universally available.
>>> >
>>> > I think this idea of reducing flexibility is going in the wrong
>>> > direction. I think giving good advice about what solutions go with
>>> > what problems is a better approach, as Nick has suggested. I think
>>> > also, getting our specs up to date with what works, and getting
>>> > implementations to follow the specs, is important work that can't be
>>> > discounted.
>>> >
>>> > If there is any complexity we could probably reduce, it would be
>>> > complexity relating to transition technologies. E.g., 464XLAT was
>>> > mentioned here, but generally when 464XLAT will work, NAT64 is also
>>> > present and also works. NAT64 is less complex than 464XLAT. So there's
>>> > no reason to have 464XLAT other than that some application doesn't
>>> > understand how to do IPv6. Is this really something that app
>>> > ecosystems should ever support?
>>> >
>>> > On Tue, Jan 17, 2023 at 1:39 PM Nick Buraglio <buraglio@es.net> wrote:
>>> >
>>> >     Here is what came to my mind:
>>> >
>>> >     Informational draft detailing a working deployment with
>>> >     suggestions per scenario. When speaking with folks implementing
>>> >     IPv6, what most seem to want is a recipe due to the somewhat
>>> >     overwhelming set of knobs and levers. Flexibility, by design,
>>> >     breeds a potentially complex set of options. What they
>>> >     overwhelmingly want to see is a best practice - or at the very
>>> >     least a known working methodology for:
>>> >
>>> >     ·I want to dual stack, what do I need to do?
>>> >
>>> >     oHere is a working recipe for deployment of a dual stack network
>>> >
>>> >     oHere are the features required to accomplish this
>>> >
>>> >     ·Where should I use ULA?
>>> >
>>> >     oHere is an example of a successful ULA deployment
>>> >
>>> >     oHere is a link to the operational considerations draft for using
>>> >     ULA (may help further the draft through the process as well)
>>> >
>>> >     oHere are examples of a supportable deployment for using GUA in a
>>> >     similar manner to ULA
>>> >
>>> >     ·What if I want to deploy my network as IPv6-only?
>>> >
>>> >     oHere are examples of successful and supportable IPv6-only
>>> deployments
>>> >
>>> >     §Here are the features required to deploy these scenarios.
>>> >
>>> >     ·etc...
>>> >
>>> >     Some of this may exist, I don't know for sure. I know a lot of
>>> >     this exists in the wild in various documentation, forums, blog
>>> >     posts, and email threads. Having the IETF produce such text
>>> >     provides something more "official" that can be referenced by
>>> >     vendors, management, architects, etc..
>>> >
>>> >     Regardless, and without commenting on whether this is the
>>> >     correct avenue or not, having a draft of a set of drafts that give
>>> >     these examples will go a *very* long way. If it is caveated in
>>> >     such a way that states "this is one way, it may not be the only
>>> >     way" may alleviate at least some of the lack of consensus that
>>> >     will inevitably arise.
>>> >
>>> >     I have written some of a draft on ULA use cases (as well as some
>>> >     updates to RRC6724) written that need revisiting. Of course, if
>>> >     there is no consensus, then it's just another exercise.
>>> >
>>> >
>>> >     ----
>>> >     nb
>>> >
>>> >     ᐧ
>>> >
>>> >
>>> >     ----
>>> >
>>> >     nb
>>> >
>>> >     On Tue, Jan 17, 2023 at 11:05 AM Xipengxiao
>>> >     <xipengxiao=40huawei.com@dmarc.ietf.org> wrote:
>>> >
>>> >         Hi Brian and folks, Please see comments in line.
>>> >
>>> >         -----Original Message-----
>>> >         From: v6ops <v6ops-bounces@ietf.org> On Behalf Of Brian E
>>> >         Carpenter
>>> >         Sent: Monday, January 16, 2023 9:06 PM
>>> >         To: v6ops@ietf.org
>>> >         Subject: Re: [v6ops] Heise.de article about IPv6 behaviour of
>>> >         29 CPEs and reaction to prefix changes
>>> >
>>> >         On 17-Jan-23 07:08, Xipengxiao wrote:
>>> >
>>> >         > Hi folks,
>>> >
>>> >         >
>>> >
>>> >         > I am moving the discussion to v6ops as I think the problems
>>> >         are more operational than technical.
>>> >
>>> >         >
>>> >
>>> >         > In short, the Heise article reported that existing IPv6 CPEs
>>> >         have various problems and IPv6 may not work in many
>>> >         scenarios.  Then the good question is, what can the IETF do
>>> >         about them?  From my first look, there are so many different
>>> >         problems that it’s hard to see what to fix.  But maybe the
>>> >         experts here have better ideas.
>>> >
>>> >         >
>>> >
>>> >         > Personally, I think the root cause is IPv6 has too many
>>> >         options (e.g. GUA vs ULA vs now obsoleted SLA, SLAAC vs DHCP,
>>> >         10+ transition solutions).
>>> >
>>> >         As I commented on 6man, I believe that is not quite right.
>>> >         It's the real world that has too many options, and IP6 has
>>> >         flexibility.
>>> >
>>> >         XiPeng:  we can say “It's the real world that has too many
>>> >         options”, but we can only change ourselves.  This is why I
>>> >         propose we limit the options we offer to the world.
>>> >
>>> >         > This makes it difficult for vendors to implement/fine tune
>>> >         their IPv6 solutions, and difficult for common people to learn
>>> >         and deploy.  I advocate that IETF should provide clear
>>> >         recommendation,
>>> >
>>> >         Yes, it's our job to provide guidelines and recommendations,
>>> >         but doing that is not easy and hard to reach even rough
>>> >         consensus. For example:
>>> >
>>> >         > e.g. only use GUA
>>> >
>>> >         That's unacceptable. A good BCP on how and when to use ULAs is
>>> >         very necessary.
>>> >
>>> >         XiPeng: we had a debate whether enterprises need ULA in a side
>>> >         meeting in London IETF.  Ted, Jen, Lorenzo, Jordi, Mike,
>>> >         Nalini, Nick all participated.  The rough consensus was GUA
>>> >         works just fine.  So, I am not saying that ULA has no value, I
>>> >         am saying that between ULA’s value and reducing choices, I
>>> >         advocate the latter.
>>> >
>>> >         But I agree that “providing guidelines and recommendations” is
>>> >         the way to go, but that’s “hard to reach even rough
>>> >         consensus”. To overcome that, I would like to propose a
>>> >         principle here “keep reducing IPv6 options until it fails”.
>>> >         If we can agree on a principle (or a few), maybe we can reach
>>> >         some rough consensus.
>>> >
>>> >         > , only use 464XLAT/MAP-T
>>> >
>>> >         Possibly. But I am sure there are cases where that is a bad
>>> idea.
>>> >
>>> >         XiPeng: I agree, but think of the principle I mentioned above
>>> >         – will the solution fail?  Eduard Vasilenko said in another
>>> >         thread that mobile enjoys good IPv6 deployment because there
>>> >         are fewer choices: only Dual-Stack or 464XLAT.  I think that’s
>>> >         a good point.  Fixed has many more choices. Then we have the
>>> >         CPE problems reported by Heise.
>>> >
>>> >         > and avoid Dual-Stack as much as possible, etc.
>>> >
>>> >         That's also unacceptable. There are *many* scenarios where
>>> >         dual stack on the wire works extremely well.
>>> >
>>> >         XiPeng: I agree Dual-Stack can “works extremely well”, but in
>>> >         some scenarios, IPv4 takes over completely and IPv6 is not
>>> >         used at all (due to its various problems, e.g. ULA less
>>> >         preferred than IPv4, CPE problems). In other words, IPv4 is
>>> >         masking IPv6 problems and gives the IPv6 deployers a false
>>> >         sense of accomplishment.  This is why I think if a company is
>>> >         serious about IPv6, it should avoid Dual-Stack as much as
>>> >         possible.
>>> >
>>> >         > Some experts may dismiss this recommendation as overly
>>> >         simplifying but I think it’s practical at this stage: most
>>> >         people only wants a working solution not necessarily the best
>>> >         one. Therefore we should unite the industry behind a few
>>> >         options and fine tune them.
>>> >
>>> >         It is over-simplifying and that's why it doesn't work: the
>>> >         real world has become too complicated. We *do* need clear BCPs
>>> >         but my guess is that we probably need ~10 of them rather than
>>> ~1.
>>> >
>>> >         XiPeng: I trust that despite the difference, we see each
>>> >         other’s point – we all want to simplify and give clear
>>> >         recommendations but the question is how.  So can we first
>>> >         discuss and agree on a (few) principle?  I offer this as a
>>> >         starting point: “keep reducing IPv6 options until it fails”.
>>> >
>>> >         Thanks.  XiPeng
>>> >
>>> >         > I also want to take this opportunity to say that many
>>> >         existing IPv6 adoption stats are user/session% which can look
>>> >         good according to APNIC/Google.  This may give us a false
>>> >         sense of accomplishment, because an operator with 100% IPv6
>>> >         capable users may actually produce 0% IPv6 traffic. I think
>>> >         IPv6 traffic% is a better indicator of real IPv6 adoption
>>> >         status.  But IPv6 traffic% is hard to find.  Up to this point,
>>> >         we only find that Akamai reported 16% traffic for Oct 2022, FB
>>> >         reports 15% for 2019, and AMS-IX reports 4.1% for Jun 2022
>>> >         (source:
>>> >
>>> https://labs.ripe.net/author/wilhelm/ipv6-10-years-out-an-analysis-in-users-tables-and-traffic/#:~:text=On%20the%20Internet%20exchanges%2C%20the,observes%20an%20average%20of%204.1%25
>>> >         <
>>> https://labs.ripe.net/author/wilhelm/ipv6-10-years-out-an-analysis-in-users-tables-and-traffic/#:~:text=On%20the%20Internet%20exchanges%2C%20the,observes%20an%20average%20of%204.1%25
>>> >
>>> >         <
>>> https://labs.ripe.net/author/wilhelm/ipv6-10-years-out-an-analysis-in-users-tables-and-traffic/#:~:text=On%20the%20Internet%20exchanges%2C%20the,observes%20an%20average%20of%204.1%25
>>> >         <
>>> https://labs.ripe.net/author/wilhelm/ipv6-10-years-out-an-analysis-in-users-tables-and-traffic/#:~:text=On%20the%20Internet%20exchanges%2C%20the,observes%20an%20average%20of%204.1%25
>>> >>).
>>> >          These traffic% are far lower than worldwide IPv6 user%.
>>> >
>>> >         >
>>> >
>>> >         > In summary, I call for the experts in v6ops to make an
>>> >         effort to:
>>> >
>>> >         >
>>> >
>>> >         >  1. Report and discuss IPv6 traffic%
>>> >
>>> >         >  2. Identify the problems hiding behind the low IPv6
>>> >         traffic% (e.g. the CPE problems reported by the Heise
>>> >         article), and recommend solutions for them
>>> >
>>> >         >
>>> >
>>> >         > XiPeng
>>> >
>>> >         _______________________________________________
>>> >         v6ops mailing list
>>> >         v6ops@ietf.org
>>> >         https://www.ietf.org/mailman/listinfo/v6ops
>>> >
>>> >     _______________________________________________
>>> >     v6ops mailing list
>>> >     v6ops@ietf.org
>>> >     https://www.ietf.org/mailman/listinfo/v6ops
>>> >
>>> >
>>> > _______________________________________________
>>> > v6ops mailing list
>>> > v6ops@ietf.org
>>> > https://www.ietf.org/mailman/listinfo/v6ops
>>> _______________________________________________
>>> v6ops mailing list
>>> v6ops@ietf.org
>>> https://www.ietf.org/mailman/listinfo/v6ops
>>>
>> ᐧ
>> _______________________________________________
>> v6ops mailing list
>> v6ops@ietf.org
>> https://www.ietf.org/mailman/listinfo/v6ops
>>
> _______________________________________________
> v6ops mailing list
> v6ops@ietf.org
> https://www.ietf.org/mailman/listinfo/v6ops
>