Re: [v6ops] Operational Guidance for IPv6 Deployment inPredominantly IPv4 Sites - (pre-draft)

"Templin, Fred L" <Fred.L.Templin@boeing.com> Tue, 12 April 2011 22:07 UTC

Return-Path: <Fred.L.Templin@boeing.com>
X-Original-To: v6ops@ietfc.amsl.com
Delivered-To: v6ops@ietfc.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfc.amsl.com (Postfix) with ESMTP id B49D5E079B for <v6ops@ietfc.amsl.com>; Tue, 12 Apr 2011 15:07:37 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -6.194
X-Spam-Level:
X-Spam-Status: No, score=-6.194 tagged_above=-999 required=5 tests=[AWL=-0.195, BAYES_00=-2.599, J_CHICKENPOX_13=0.6, RCVD_IN_DNSWL_MED=-4]
Received: from mail.ietf.org ([208.66.40.236]) by localhost (ietfc.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id FVPQXQr7Zsyz for <v6ops@ietfc.amsl.com>; Tue, 12 Apr 2011 15:07:36 -0700 (PDT)
Received: from stl-smtpout-01.boeing.com (stl-smtpout-01.boeing.com [130.76.96.56]) by ietfc.amsl.com (Postfix) with ESMTP id 4C6D8E07BE for <v6ops@ietf.org>; Tue, 12 Apr 2011 15:07:36 -0700 (PDT)
Received: from blv-av-01.boeing.com (blv-av-01.boeing.com [130.247.48.231]) by stl-smtpout-01.ns.cs.boeing.com (8.14.4/8.14.4/8.14.4/SMTPOUT) with ESMTP id p3CM7Qab003974 (version=TLSv1/SSLv3 cipher=DHE-RSA-AES256-SHA bits=256 verify=FAIL); Tue, 12 Apr 2011 17:07:26 -0500 (CDT)
Received: from blv-av-01.boeing.com (localhost [127.0.0.1]) by blv-av-01.boeing.com (8.14.4/8.14.4/DOWNSTREAM_RELAY) with ESMTP id p3CM7PG4016756; Tue, 12 Apr 2011 15:07:25 -0700 (PDT)
Received: from XCH-NWHT-09.nw.nos.boeing.com (xch-nwht-09.nw.nos.boeing.com [130.247.25.115]) by blv-av-01.boeing.com (8.14.4/8.14.4/UPSTREAM_RELAY) with ESMTP id p3CM7Pxs016753 (version=TLSv1/SSLv3 cipher=RC4-MD5 bits=128 verify=OK); Tue, 12 Apr 2011 15:07:25 -0700 (PDT)
Received: from XCH-NW-01V.nw.nos.boeing.com ([130.247.64.120]) by XCH-NWHT-09.nw.nos.boeing.com ([130.247.25.115]) with mapi; Tue, 12 Apr 2011 15:07:25 -0700
From: "Templin, Fred L" <Fred.L.Templin@boeing.com>
To: Mark Smith <ipng@69706e6720323030352d30312d31340a.nosense.org>
Date: Tue, 12 Apr 2011 15:07:24 -0700
Thread-Topic: [v6ops] Operational Guidance for IPv6 Deployment inPredominantly IPv4 Sites - (pre-draft)
Thread-Index: Acv5WpX0SXRY8m3ASDWV8OcR8pq4UgAAajJw
Message-ID: <E1829B60731D1740BB7A0626B4FAF0A65C699E7756@XCH-NW-01V.nw.nos.boeing.com>
References: <7B64C6B4-23DB-44AE-8941-ACE9964A3578@cisco.com><E1829B60731D174 0BB7A0626B4FAF0A65C699E721E@XCH-NW-01V.nw.nos.boeing.com> <20110413071247.2befa661@opy.nosense.org>
In-Reply-To: <20110413071247.2befa661@opy.nosense.org>
Accept-Language: en-US
Content-Language: en-US
X-MS-Has-Attach:
X-MS-TNEF-Correlator:
acceptlanguage: en-US
Content-Type: text/plain; charset="us-ascii"
Content-Transfer-Encoding: quoted-printable
MIME-Version: 1.0
Cc: "v6ops@ietf.org" <v6ops@ietf.org>
Subject: Re: [v6ops] Operational Guidance for IPv6 Deployment inPredominantly IPv4 Sites - (pre-draft)
X-BeenThere: v6ops@ietf.org
X-Mailman-Version: 2.1.12
Precedence: list
List-Id: v6ops discussion list <v6ops.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/v6ops>, <mailto:v6ops-request@ietf.org?subject=unsubscribe>
List-Archive: <http://www.ietf.org/mail-archive/web/v6ops>
List-Post: <mailto:v6ops@ietf.org>
List-Help: <mailto:v6ops-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/v6ops>, <mailto:v6ops-request@ietf.org?subject=subscribe>
X-List-Received-Date: Tue, 12 Apr 2011 22:07:37 -0000

Hi Mark, 

> -----Original Message-----
> From: Mark Smith 
> [mailto:ipng@69706e6720323030352d30312d31340a.nosense.org] 
> Sent: Tuesday, April 12, 2011 2:43 PM
> To: Templin, Fred L
> Cc: v6ops@ietf.org
> Subject: Re: [v6ops] Operational Guidance for IPv6 Deployment 
> inPredominantly IPv4 Sites - (pre-draft)
> 
> Hi Fred,
> 
> On Mon, 11 Apr 2011 11:18:14 -0700
> "Templin, Fred L" <Fred.L.Templin@boeing.com> wrote:
> 
> > Hello,
> > 
> > The following should not be construed as a draft, but
> > rather just a set of ideas that might be considered
> > for inclusion in a new or existing draft. Any
> > comments or suggestions?
> > 
> 
> I don't know if it has been though of before, however one alternative
> use of ISATAP I've thought of is to facilitate IPv6 topology
> hiding. The underlying IPv4 addresses probably would expose 
> the network
> typology, however if they're RFC1918 ones, they'd be unreachable
> externally.

There is probably a discussion point here, but I'll
note that other IPv4-embedding mechanisms like 6to4
and 6rd are not shy about exposing IPv4 addresses
externally. Especially with 6rd, the IPv4 addresses
may be from the private internal IPv4 addressing realm
of the ISP, so there would seem to be precendence for
just letting the IPv4 addresses leak out.

> Possibly this could be resolved by having only the ISATAP
> domain link-local addresses use IPv4 addresses, and then have 
> global ->
> link local IPv6 translation tables which are then used to resolve a
> global IPv6 ISATAP host address which doesn't include an interior IPv4
> host address into a ISATAP link local and then interior IPv4 
> address. As
> external parties would only use externally visible IPv6 addresses, the
> IPv4 topology would then be hidden as well.

I'm almost on-board with this, however I would not
want to see the site number all of its ISATAP host
interfaces with only link-local IPv6 addresses. Or,
maybe that's not what you were saying?

What I *could* see happening is for the ISATAP
router to maintain a translation table whereby
it translates the IPv6 address 2001:db8::[ISATAP]
coming from a host within the site to the IPv6
address 2001:db8::[EUI64] for communications with
hosts outside the site.

Even moreso, ISATAP hosts inside an enterprise
network are likely to need to go through an
enterprise-border proxy in order to talk to IPv6
servers out on the Internet, so the proxy itself
could do the translation as I suspect many IPv4
proxies currently do today.

Is that what you had in mind?

Thanks - Fred
fred.l.templin@boeing.com

 
> Regards,
> Mark.
> 
> 
> > Thanks - Fred
> > fred.l.templin@boeing.com
> > 
> > --- cut here ---
> > 
> > Introduction
> > ************
> > Countless end user sites in the Internet today still have
> > predominantly IPv4 infrastructures. These sites range in
> > size from small home/office networks to large corporate
> > enterprise networks, but share the commonality that IPv4
> > continues to provide satisfactory internal routing and
> > addressing services. As more and more IPv6-only services
> > are deployed in the Internet, however, end user devices
> > within the site will increasingly require at least basic
> > IPv6 functionality for external access. This pre-draft
> > provides operational guidance for predominantly IPv4 sites
> > in making transitional IPv6 services available without
> > disrupting existing IPv4 services.
> > 
> > Characteristics of Existing IPv4 Sites
> > **************************************
> > Existing end user sites use IPv4 routing and addressing
> > internally for normal IT operations such as filesharing,
> > network printing, e-mail, conferencing and numerous other
> > critical site-internal networking services. Such sites
> > typically have an abundance of public or private IPv4
> > addresses for internal networking, and are separated from
> > the public Internet by firewalls, packet filtering gateways,
> > proxies, address translators and other site border securing
> > devices. To date, such sites have had little incentive to
> > enable IPv6 services internally [RFC1687].
> > 
> > With the emergence of IPv6-only services within the public
> > Internet, however, existing IPv4 sites will increasingly
> > require a means for enabling client-side IPv6 services so
> > that end user devices within the site can access IPv6
> > Internet services. Such services must be deployable with
> > minimal configuration and in a fashion that will not cause
> > disruptions to existing IPv4 services within the site. The
> > Intra-Site Automatic Tunnel Addressing Protocol (ISATAP)
> > [RFC5214] provides a simple-to-use service that sites can
> > deploy in the near term to meet these reqirements while a
> > longer-term site-wide IPv6 deployment plan is conducted
> > in parallel.
> > 
> > Enabling Client-Side IPv6 Services with ISATAP
> > **********************************************
> > Small sites typically arrange to obtain public IPv6 prefixes
> > from an Internet Service Provider (ISP) in the same fashion
> > as for home network users. When the ISP does not yet provide
> > native IPv6 services, it can instead offer a transitional
> > service with native-equivalent capabilities using 6RD
> > [RFC5569][RFC5969]. Large sites typically obtain provider
> > independent IPv6 prefixes from an Internet registry and
> > advertise the prefixes into the IPv6 routing system on their
> > own behalf, i.e., they act as an ISP unto themselves.
> > 
> > In both cases, the site can automatically enable ISATAP
> > based IPv6 services by configuring one or more site border
> > routers as ISATAP routers. Each such ISATAP router is added
> > to the Potential Router List (PRL) for the site so that
> > hosts in the network can discover them for default route
> > and prefix auto-configuration purposes.
> > 
> > When there are multiple ISATAP site border routers, the
> > routers can advertise the same IPv6 prefix or a different
> > set of IPv6 prefixes of prefix length /64. For example,
> > a first router may advertise 2001:db8:0:0::/64, a second
> > may advertise 2001:db8:0:1::/64, etc. The routers can
> > further be configured to advertise different prefixes
> > to different sets of hosts within the site (e.g., as
> > identified by the host's IPv4 prefix) for the purpose
> > of site partitioning. In all cases, however, the site
> > border routers must take operational measures to avoid
> > routing loops [draft-ietf-v6ops-tunnel-loops]. As a
> > simple mitigation, the site border router can drop any
> > incoming packets that have an IPv4 source or outgoing
> > packets that have an IPv4 destination address of another
> > site border router, e.g., by checking for the address
> > in the site's PRL.
> > 
> > ISATAP hosts will automatically discover ISATAP site border
> > routers and configure ISATAP addresses using Stateless
> > Address AutoConfiguration (SLAAC) based on the advertised
> > IPv6 prefixes. In order to provide a simple service that
> > does not interact poorly with existing site topological
> > arrangements, the site can enable client-side only operation
> > so that hosts only use the ISATAP service for accessing IPv6
> > services on the public Internet, while continuing to use
> > IPv4 services for intra-site communications.
> > 
> > In order to maintain a client-side only service, the site
> > should not configure any IPv6 addresses provided by ISATAP
> > within site name service resource records. In this way,
> > intra-site communications will continue to use existing
> > IPv4 networking services instead of ISATAP-served IPv6
> > services. This arrangement prevents communication failure
> > modes in which a pair of ISATAP hosts are separated by a
> > packet filtering gateway which would prevent direct
> > communications via the tunneled IPv6 service.
> > 
> > To further disable host-to-host ISATAP communications
> > within the site, the ISATAP site border routers should
> > advertise their prefixes with the (A,L) flags set to (1,0)
> > in their IPv6 Router Advertisements. In that way, each
> > ISATAP host will autoconfigure an address from the
> > advertised IPv6 prefix and assign it to their ISATAP
> > interface, but they will not assign an IPv6 prefix to
> > the ISATAP interface. Therefore, no two ISATAP hosts will
> > see each other as on-link neighbors, and all IPv6
> > communications from the hosts will flow through an ISATAP
> > site border router in order to access IPv6 services in
> > the Internet.
> > 
> > Migration to Native IPv6 Services
> > *********************************
> > ISATAP hosts should be configured to prefer native IPv6
> > services instead of ISATAP whenever available. As the site
> > transitions its internal routers and links to use IPv6
> > natively, hosts will naturally begin to receive native
> > IPv6 router advertisments and will begin using the
> > native IPv6 service instead of ISATAP. As more and
> > more native IPv6 service is enabled in the site, IPv6
> > addresses can be entered into site name service resource
> > records to enable intra-site IPv6 service discovery. In
> > that way, predominantly IPv4 sites will begin to operate
> > a parallel native IPv6 service, and legacy IPv4 services
> > will gradually be phased out.
> > _______________________________________________
> > v6ops mailing list
> > v6ops@ietf.org
> > https://www.ietf.org/mailman/listinfo/v6ops
>