Re: [v6ops] WGLC: draft-ietf-v6ops-dhcp-pd-per-device-02

Vasilenko Eduard <vasilenko.eduard@huawei.com> Mon, 23 October 2023 07:40 UTC

Return-Path: <vasilenko.eduard@huawei.com>
X-Original-To: v6ops@ietfa.amsl.com
Delivered-To: v6ops@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 0DD02C14F747 for <v6ops@ietfa.amsl.com>; Mon, 23 Oct 2023 00:40:50 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -4.205
X-Spam-Level:
X-Spam-Status: No, score=-4.205 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, RCVD_IN_DNSWL_MED=-2.3, RCVD_IN_MSPIKE_H5=0.001, RCVD_IN_MSPIKE_WL=0.001, RCVD_IN_ZEN_BLOCKED_OPENDNS=0.001, SPF_HELO_NONE=0.001, SPF_PASS=-0.001, T_SCC_BODY_TEXT_LINE=-0.01, URIBL_DBL_BLOCKED_OPENDNS=0.001, URIBL_ZEN_BLOCKED_OPENDNS=0.001] autolearn=ham autolearn_force=no
Received: from mail.ietf.org ([50.223.129.194]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id u2iIzV3I2yfq for <v6ops@ietfa.amsl.com>; Mon, 23 Oct 2023 00:40:46 -0700 (PDT)
Received: from frasgout.his.huawei.com (frasgout.his.huawei.com [185.176.79.56]) (using TLSv1.2 with cipher AECDH-AES256-SHA (256/256 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id 5EBFCC14CE29 for <v6ops@ietf.org>; Mon, 23 Oct 2023 00:40:42 -0700 (PDT)
Received: from mscpeml100002.china.huawei.com (unknown [172.18.147.226]) by frasgout.his.huawei.com (SkyGuard) with ESMTP id 4SDRt8409Xz6K8xH; Mon, 23 Oct 2023 15:40:00 +0800 (CST)
Received: from mscpeml500001.china.huawei.com (7.188.26.142) by mscpeml100002.china.huawei.com (7.188.26.75) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256) id 15.1.2507.31; Mon, 23 Oct 2023 10:40:38 +0300
Received: from mscpeml500001.china.huawei.com ([7.188.26.142]) by mscpeml500001.china.huawei.com ([7.188.26.142]) with mapi id 15.01.2507.031; Mon, 23 Oct 2023 10:40:38 +0300
From: Vasilenko Eduard <vasilenko.eduard@huawei.com>
To: Pascal Thubert <pascal.thubert@gmail.com>, Martin Hunek <martin.hunek@tul.cz>
CC: "v6ops@ietf.org" <v6ops@ietf.org>
Thread-Topic: [v6ops] WGLC: draft-ietf-v6ops-dhcp-pd-per-device-02
Thread-Index: AQHaANJW304OkC4qSGCA09yigaKgsbBTFS6AgAO8LICAADTHoA==
Date: Mon, 23 Oct 2023 07:40:38 +0000
Message-ID: <1a1f09b05d3f40a481801ae439721808@huawei.com>
References: <2016093.QCnGb9OGeP@asclepius.adm.tul.cz> <36F13687-B126-4291-9720-C4468FE3E259@gmail.com>
In-Reply-To: <36F13687-B126-4291-9720-C4468FE3E259@gmail.com>
Accept-Language: en-US, zh-CN
Content-Language: en-US
X-MS-Has-Attach:
X-MS-TNEF-Correlator:
x-originating-ip: [10.199.56.242]
Content-Type: text/plain; charset="utf-8"
Content-Transfer-Encoding: base64
MIME-Version: 1.0
X-CFilter-Loop: Reflected
Archived-At: <https://mailarchive.ietf.org/arch/msg/v6ops/lSBZ1Ts4ZkHcqs-eVFk3CPGHAFY>
Subject: Re: [v6ops] WGLC: draft-ietf-v6ops-dhcp-pd-per-device-02
X-BeenThere: v6ops@ietf.org
X-Mailman-Version: 2.1.39
Precedence: list
List-Id: v6ops discussion list <v6ops.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/v6ops>, <mailto:v6ops-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/v6ops/>
List-Post: <mailto:v6ops@ietf.org>
List-Help: <mailto:v6ops-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/v6ops>, <mailto:v6ops-request@ietf.org?subject=subscribe>
X-List-Received-Date: Mon, 23 Oct 2023 07:40:50 -0000

+1
Its very bad that draft still mislead for "/64 only for any type of sub-allocation (including DHCP or local algorithm)".
Ed/
> -----Original Message-----
> From: v6ops [mailto:v6ops-bounces@ietf.org] On Behalf Of Pascal Thubert
> Sent: Monday, October 23, 2023 10:29 AM
> To: Martin Huněk <martin.hunek@tul.cz>
> Cc: v6ops@ietf.org
> Subject: Re: [v6ops] WGLC: draft-ietf-v6ops-dhcp-pd-per-device-02
> 
> 
> 
> 
> > Le 21 oct. 2023 à 00:27, Martin Huněk <martin.hunek@tul.cz> a écrit :
> >
> > Hi Jen,
> >
> > Dne úterý 17. října 2023 10:17:15 CEST, Jen Linkova napsal(a):
> >>> On Fri, Oct 13, 2023 at 4:18 PM Martin Huněk <martin.hunek@tul.cz>
> wrote:
> >>> First of all, in section 8, paragraph 2:
> >>> At least in the RIPE region, it is based on FALSE assumption. Maximum
> ASSIGNMENT (without approval from RIPE) is /48, not /29 - this is default
> ALLOCATION. By the book, any organization is allowed to use ASSIGNED
> addresses, not ALLOCATED ones. So even as LIR with /29, I cannot use whole
> /29 for myself / my network. I can only use /48.
> >>> Rest I'm allowed to use for further ASSIGNMENTS to other
> subjects/organizations. The whole paragraph makes no sense, at least in the
> RIPE region.
> >>
> >> I do not think we are making any assumptions. You are talking about a
> >> default assignment but it doesn't have to be a default one. Also, an
> >> LIR doesn't have to be an ISP - a large enterprise will be using
> >> assignments from its allocation to address its network, so the whole
> >> allocation will eventually be used for the network.
> >
> > Regardless of whether the enterprise is a LIR or not, it is still allowed to
> make a maximum ASSIGNMENT of /48. So:
> > ALLOCATED-BY-RIR is /29
> > ASSIGNED is max. /48 (rule without using any exceptions)
> > You can use only ASSIGNED addresses (or AGGREGATED-BY-LIR, also max.
> /48). Even as a non-ISP LIR, you are not allowed to use more than /48
> without RIPE approval or well-documented justification for future audit. See
> RIPE-738 5.4.2. I tried to persuade RIPE that I needed more address space
> without any luck.
> >>
> >>> Section 7, second point from top:
> >>> This implies /64 or bigger. There are several problems with it:
> >>
> >> We are actually trying to avoid implying. That section describes what
> >> shall be taken into account when configuring the *network*, and those
> >> considerations are to ensure the maximum applicability of the solution
> >> (increasing number of endpoints and scenarios it would support). We
> >> can say that the network is expected to provide /120 only, but if we
> >> do that currently it would break nit just devices w/o DHCPv6 support,
> >> but also all 7084-compliant routers, most of IPv6-only endpoints and
> >> also - as per current SNAC document - stub routers.
> >> I do not think we shall narrow the scope/applicability so much.
> >
> > Extending the network by SLAAC is what implies /64 or more. Not every
> client is extending the network at every moment, so it is up to the client to
> indicate its need to extend the network.
> >
> > IMHO, forcing the client to indicate its *current* needs is the proper way to
> not imply anything.
> 
> +1
> 
> There are limitations to the current Pd interface like the needs to:
> - associate a provable identity to the delegated prefix
> - provide the requested prefix length and expected lease duration
> 
> The idea that any network MUST delegate /64s is a fair way to kill IPv6 in
> enterprises. I MUST object.
> 
> The draft also highlights without saying that there’s a need to interface the
> delegation and routing.
> 
> Bottom line is that at the moment we are in requirement space not solution.
> This draft works and is applicable to certain areas. The danger is that as
> written it claims to be generally applicable and pushes for methods that are
> not applicable / acceptable in networks where we want IPv6 to thrive.
> 
> All the best,
> 
> Pascal
> 
> 
> >>
> >>> 1) This is wasteful for Hosts (not routers as defined in I-D), as not every
> Client needs to extend a network.
> >>
> >> If the host doesn't extend the network and doesn't run virtual systems
> >> behind it - no reason for it to request a SLAAC prefix. Please note
> >> that this document focuses on the network, not on the host.
> >
> > Sure, but in the I-D, there is nothing that would even suggest that it
> SHOULD NOT / MUST NOT.
> >>
> >>> 2) It should not be a MUST as a Host COULD set prefix-length hint to a
> bigger number, and then the second point is in direct opposition to the first
> one.
> >>
> >> Ah I see where the confusion is coming from. The intention here is to
> >> ensure that the network MUST give the client a SLAAC-suitable prefix
> >> to clients which ask for such prefix.
> >> it's about the least common denominator, about the network is
> >> guaranteed to provide upon request.
> >
> > But what is written there is to every client - regardless of client asking less.
> >>
> >> The client may choose a longer prefix - or not to use PD at all.
> >> The idea is that this draft needs to define *what can be expected from
> >> the network*. So, to ensure that clients can:
> >> - extend the network connectivity to at least one interface (physical
> >> or virtual)
> >> or
> >> - use 464XLAT
> >> or
> >> - use SLAAC-only to address its interfaces
> > This is the point. The client SHOULD NOT (/MUST NOT) use it just to use
> SLAAC on its interface - this is wasteful, and there is no point in doing that
> apart from saving a few hours of programmer's time for generating shorter
> IID.
> >>
> >> the network MUST provide a SLAAC-suitable prefix to such clients.
> >>
> >> If I may, I'd like to use an analogy. The local regulations say that
> >> my company MUST provide me with 4 weeks of holidays per year. Some
> >> people decide that they do not need 4 weeks, and only take two. They
> >> don't have to request 4 weeks, but the company MUST still provide
> >> them. It's more or less the same here.
> >
> > I don't know about that. I had one time a serious chat with my boss about
> me not using my holiday time ... :-)
> >>
> >> So how about changing the second bullet point to:
> >>
> >> "If the client does not include a prefix-length hint value into the
> >> request, the serverMUST provide a prefix short enough for the client
> >> to extend the network to at least one interface, and allow nodes on
> >> that interface to obtain addresses via SLAAC. The server MAY provide a
> >> longer prefix if the client hints for that."
> >
> > Better, but why not mandate prefix-hint to be set for the smallest prefix the
> client would need to perform its function? If the server has more space to
> give, it can. Opting for a bigger prefix increases the likelihood of the server
> saying "No.". The default value of /64 (as any other value) is just more
> "implying".
> >>
> >>> 3) Not every network policy allows the extension of the network, so
> MUST is contra-productive for such networks.
> >>
> >> It's an informational document, such networks are not obliged to
> >> deploy the proposed solutions. They can continue to do what they  are
> >> doing now, or do smth completely different.
> >> If they have full control of the clients, they can make the clients
> >> hinting for the longer prefix.
> >
> > Not if the vendor of those clients forces them to ask for /64, then you are
> out of luck. If the vendor in the future decides that it will not support any
> other method of autoconfiguration, then what?
> >>
> >> However I have a question: Let's say I connect my phone (or my laptop)
> >> to your network. If the network provides IPv4, how do you know if my
> >> device extends the network, or not?
> >
> > I can just guess that by device vendor. It is not the point. We are not
> discussing IPv4 here. With IPv6 DHCPv6-PD, I currently know that the device
> is, in fact, a router. Nothing else is doing PD now. If the usual host will ask,
> let's say, /120 or /96, I'm OK with it too. If everyone will ask /64, I just lost a
> valuable hint. It doesn't make my life easier.
> >>
> >>> 4) Responsibility for a prefix-length hint lies on the Client, not on the
> server. The server does not know the intent of a client to extend the network
> or not. It does not know what type of device a client is (router/rhouter/host),
> if it needs to address other routed interfaces, needs to run VMs, and so on.
> This lies solely on the Client.
> >>
> >> I think we are in the violent agreement here - the network/server
> >> doesn't know. So, the person configuring the network/server needs some
> >> guidance on what to configure to minimize the number of "broken"
> >> clients (it's not possible, as I've said before, to support a client
> >> with an arbitrary number of interfaces, and with an arbitrary levels
> >> of hierarchy/subtended routers) - so this draft claims that it
> >> supports at least one interface behind the client. To achieve that,
> >> the solution must guarantee that the client can ask for a
> >> slaac-suitable prefix. The client doesn't have to - the draft doesn't
> >> say "the client MUST always ask for /64".
> >
> > If the client MUST set a prefix-hint to a meaningful number, a network
> administrator will see what is needed by them in PD. I would set the available
> pool based on what I'm expecting to be connected to my network (and what
> is allowed to connect) and based on the address space available. If the
> network policy forbids extending the network, it is fine to limit prefix size to
> less than /64. A client SHOULD NOT expect to get at least /64 every time in
> every network. This way, it would never ask for less. In other words, the real
> minimum is /64, and we have just divided address length by 2 - address
> space by 2^64. Not good.
> >>
> >>> I would suggest to replace the second point in section 7 with something
> like:
> >>>
> >>> * The Client MUST set the prefix-length hint to a minimum value that
> would guarantee a sufficient address space for performing its function in the
> foreseeable future. The Client MUST follow [RFC8168] recommendations for
> processing the Advertise message. If the address space requirements of the
> Client change, the Client MAY request a new prefix of a different size.
> >>
> >> This draft is not about the client, it's about what the network provides.
> >
> > The client is an integral part of the autoconfiguration process, isn't it? The
> network should accommodate reasonable requests made by a client, not
> every request.
> >>
> >>> It is up to the Client to know if it needs just a few addresses like /120 if it
> has one routed interface, so it needs /63 (one /64 for itself and one for its
> interface/VMs etc.), or if it is a router with let's say 8 routed interfaces. For
> some clients, /64 is simply too many; for some, it is too little, and it just
> cannot function with a single /64. It is up to the Client to request the right
> size of a prefix, and it is up to the server to honor such request (if its policy
> and resources allow it). Saying the prefix length MUST be /X simply limits use
> cases in which this approach can be used.
> >>
> >> We need to agree on some common denominator. Some guidance for an
> operator.
> >
> > And for client vendors, too. Do not ask for /64 or more when you do not
> need it. There is a risk that the network operator would not be able to
> accommodate that, and you might not get anything. If it happens, try to get
> less, and you may succeed in getting at least something.
> >
> > What is better for a pure host (not extending the network in any way)? To
> get even just /120. Or to not get any IPv6 prefix?
> >
> > Guidance for the operator should be: If you give less than /64, the clients
> will not be able to extend the network. This may impact their functionality.
> However, if you do not need that, it is OK to give less.
> >
> > Martin
> >>
> >>> Just a remark on the first point in section 6.2:
> >>> It is not explicitly written in RFC8987, but expiring prefixes in persistent
> storage could be solved by saving validity in absolute times. That is why
> RFC8987 calls for a synchronized clock.
> >>
> >> I do not think the biggest problem is expiring prefixes, it's more
> >> like a device coming back up online w/o any state at all, so even
> >> existing prefixes would stop working, if the device doesn't do bulk
> >> lease query or active leasequery.
> >>
> >>> Also, one editorial thing: there is a typo at the beginning of section 7.
> >>
> >> Thanks, will be fixed!
> >>
> >>> On 30. 09. 23 22:42, Xipengxiao wrote:
> >>>>
> >>>> Hi Folks,
> >>>>
> >>>> This message initiates a WGLC for draft-ietf-v6ops-dhcp-pd-per-device-
> 02<https://datatracker.ietf.org/doc/draft-ietf-v6ops-dhcp-pd-per-device/>.
> The call will end on Oct 14, 2023.  Your opinion will be valued.
> >>>>
> >>>> Ron & XiPeng
> >>>>
> >>>>
> >>>>
> >>>> _______________________________________________
> >>>> v6ops mailing list
> >>>> v6ops@ietf.org
> >>>> https://www.ietf.org/mailman/listinfo/v6ops
> >>> _______________________________________________
> >>> v6ops mailing list
> >>> v6ops@ietf.org
> >>> https://www.ietf.org/mailman/listinfo/v6ops
> >> --
> >> SY, Jen Linkova aka Furry
> >>
> >
> > _______________________________________________
> > v6ops mailing list
> > v6ops@ietf.org
> > https://www.ietf.org/mailman/listinfo/v6ops
> 
> _______________________________________________
> v6ops mailing list
> v6ops@ietf.org
> https://www.ietf.org/mailman/listinfo/v6ops