Re: [v6ops] Please review the No IPv4 draft

Owen DeLong <owen@delong.com> Mon, 14 April 2014 16:53 UTC

Return-Path: <owen@delong.com>
X-Original-To: v6ops@ietfa.amsl.com
Delivered-To: v6ops@ietfa.amsl.com
Received: from localhost (ietfa.amsl.com [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 8F3A31A0656 for <v6ops@ietfa.amsl.com>; Mon, 14 Apr 2014 09:53:59 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -1.263
X-Spam-Level:
X-Spam-Status: No, score=-1.263 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, DKIM_ADSP_ALL=0.8, DKIM_SIGNED=0.1, RP_MATCHES_RCVD=-0.272, SPF_PASS=-0.001, T_DKIM_INVALID=0.01] autolearn=no
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id m06brWTstwAc for <v6ops@ietfa.amsl.com>; Mon, 14 Apr 2014 09:53:55 -0700 (PDT)
Received: from owen.delong.com (owen.delong.com [IPv6:2620:0:930::200:2]) by ietfa.amsl.com (Postfix) with ESMTP id EFC151A01FA for <v6ops@ietf.org>; Mon, 14 Apr 2014 09:53:54 -0700 (PDT)
Received: from owens-mbp.meeting.arin.net (unknown.servercentral.net [50.31.214.180] (may be forged)) (authenticated bits=0) by owen.delong.com (8.14.2/8.14.2) with ESMTP id s3EGnFNf022371 (version=TLSv1/SSLv3 cipher=AES128-SHA bits=128 verify=NOT); Mon, 14 Apr 2014 09:49:17 -0700
X-DKIM: Sendmail DKIM Filter v2.8.3 owen.delong.com s3EGnFNf022371
DKIM-Signature: v=1; a=rsa-sha1; c=simple/simple; d=delong.com; s=mail; t=1397494158; bh=XjArKmVRYzS6ju8Lpk571MIpb4s=; h=Content-Type:Mime-Version:Subject:From:In-Reply-To:Date:Cc: Content-Transfer-Encoding:Message-Id:References:To; b=vlIjVK62heMT3Xvjl8ItNF3mbfoalOudv7Dg+J0vncBfXr08NsFK1f/czENF9Su16 u+QxNEMEApbhMOCLUsTKubExTJGvkEk5QJt0w8UN0ltArPDYsP9NZU9NpctQrtc6pc oABTW8rr2iiDDvUC4jKT0p557dUERM+gE/taHELA=
Content-Type: text/plain; charset="windows-1252"
Mime-Version: 1.0 (Mac OS X Mail 7.2 \(1874\))
From: Owen DeLong <owen@delong.com>
In-Reply-To: <F08AF14D-22C6-4F4C-9388-670EB4CD8453@nominum.com>
Date: Mon, 14 Apr 2014 09:49:12 -0700
Content-Transfer-Encoding: quoted-printable
Message-Id: <F2A0EC2F-6B41-4560-88BA-CEBF3E921B61@delong.com>
References: <534BF5A5.5010609@viagenie.ca> <534BFA08.3030404@foobar.org> <49EA8AC9-D5C5-4FE5-9A10-0CD574782F0F@nominum.com> <534C07FC.8000907@foobar.org> <F08AF14D-22C6-4F4C-9388-670EB4CD8453@nominum.com>
To: Ted Lemon <ted.lemon@nominum.com>
X-Mailer: Apple Mail (2.1874)
X-Greylist: Sender succeeded SMTP AUTH, not delayed by milter-greylist-4.0rc1 (owen.delong.com [192.159.10.2]); Mon, 14 Apr 2014 09:49:18 -0700 (PDT)
Archived-At: http://mailarchive.ietf.org/arch/msg/v6ops/si6tEPHiTUSr46aVl9HLSPXaUgw
Cc: v6ops@ietf.org
Subject: Re: [v6ops] Please review the No IPv4 draft
X-BeenThere: v6ops@ietf.org
X-Mailman-Version: 2.1.15
Precedence: list
List-Id: v6ops discussion list <v6ops.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/v6ops>, <mailto:v6ops-request@ietf.org?subject=unsubscribe>
List-Archive: <http://www.ietf.org/mail-archive/web/v6ops/>
List-Post: <mailto:v6ops@ietf.org>
List-Help: <mailto:v6ops-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/v6ops>, <mailto:v6ops-request@ietf.org?subject=subscribe>
X-List-Received-Date: Mon, 14 Apr 2014 16:53:59 -0000

On Apr 14, 2014, at 9:36 AM, Ted Lemon <ted.lemon@nominum.com> wrote:

> On Apr 14, 2014, at 11:08 AM, Nick Hilliard <nick@foobar.org> wrote:
>> because you're using one protocol stack to send signals about another
>> protocol stack.  "layering violation" is possibly the wrong term.  Maybe
>> "protocol bleed" or some
> 
> There is no such thing, and this isn't a valid distinction, at least according to current practice.   This is like saying that an HTTP server that runs over IPv6 can't redirect to a URL that would be fetched over IPv4, or that you can't do a DNS query for a AAAA record over IPv4, or an A record over IPv6.

Not really…

An HTTP server shouldn’t be redirecting to an IP address at all. It should be redirecting via name. Since the address family that the name resolves to is opaque, a name is just a name.

Similarly, DNS is a database query, not a protocol signaling for configuration purposes.

What is being proposed here would be more like responding to an IPv4 packet with an ICMP6 unreachable, which I’m pretty sure would be considered problematic.

>>> And if you don't have IPv4, how do you have DHCPv4?
>> 
>> this is the thing: the whole proposal is a bit circular. If there's no
>> DHCPv4 server, argument 3.1 is irrelevant and argument 3.2 is almost
>> irrelevant because on any shared access medium, dhcp traffic which is
>> ignored is not going to make up significant amounts of traffic.  There's
>> some justification for 3.3 but that can be dealt with on e.g. radio devices
>> by coalescing requests so that control request like this / RA / etc are
>> send alongside each other.  3.4 is an application level problem and it's
>> not the job of the ietf to fix stupid / broken applications.
> 
> It's broadcast traffic, which is expensive for everyone sharing a Wifi AP.   If every host is doing it, that's a lot of traffic.

Sure, so adding a form of NACK or DHCP-UNREACHABLE message to IPv4 makes sense to me.

> Also, if I get a DHCPDISCOVER, and response with a DHCPOFFER with this option, is the expectation that the client will shut down at that point?   That's a substantial protocol change, if so.   If we're going all the way to DHCPACK, now the client has an IP address.   What if it tries to use it?

Why not, instead of using a DCHCPOFFER, provide an ICMPv4 DHCP-UNAVAILABLE message which can be sent in response to a DHCPREQUEST message by any router which is configured to authoritatively deny DHCPv4 on the link? A host receiving such a message should be expected to behave in an identical manner to the behavior proposed in this draft.

> Only a client that's IPv6-capable is ever going to act on this option, so doing it with DHCPv4 doesn't really make sense.

Only a client that’s going to try DHCPv4 is ever going to act on this option, so doing it in DHCPv6 doesn’t really make sense.

Owen