Re: [v6ops] [*SPAM* Score/Req: 3.9/3.3] Re: [*SPAM* Score/Req: 3.9/3.3] Re: reclassify 464XLAT as standard instead of info

Owen DeLong <owen@delong.com> Thu, 21 September 2017 02:21 UTC

Return-Path: <owen@delong.com>
X-Original-To: v6ops@ietfa.amsl.com
Delivered-To: v6ops@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 0F1E91320DC for <v6ops@ietfa.amsl.com>; Wed, 20 Sep 2017 19:21:32 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -6.1
X-Spam-Level:
X-Spam-Status: No, score=-6.1 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, DKIM_ADSP_ALL=0.8, HTML_MESSAGE=0.001, RCVD_IN_DNSWL_HI=-5, SPF_PASS=-0.001] autolearn=ham autolearn_force=no
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id 8pN3rtirQjOe for <v6ops@ietfa.amsl.com>; Wed, 20 Sep 2017 19:21:29 -0700 (PDT)
Received: from owen.delong.com (owen.delong.com [192.159.10.2]) by ietfa.amsl.com (Postfix) with ESMTP id 50164128D0D for <v6ops@ietf.org>; Wed, 20 Sep 2017 19:21:28 -0700 (PDT)
Received: from [10.0.5.241] (r190-64-69-50.su-static.adinet.com.uy [190.64.69.50] (may be forged)) (authenticated bits=0) by owen.delong.com (8.14.5/8.14.5) with ESMTP id v8L2K6nF014520 (version=TLSv1/SSLv3 cipher=DHE-RSA-AES256-SHA bits=256 verify=NOT); Wed, 20 Sep 2017 19:20:16 -0700
Content-Type: multipart/alternative; boundary="Apple-Mail=_8ED1E896-CFE7-4BAE-841C-E5760A164B4F"
Mime-Version: 1.0 (Mac OS X Mail 9.3 \(3124\))
From: Owen DeLong <owen@delong.com>
In-Reply-To: <add60b73-17a3-ca99-39e1-e58b7002344e@gmail.com>
Date: Wed, 20 Sep 2017 23:20:04 -0300
Cc: v6ops@ietf.org
Message-Id: <8F15B155-55C9-4016-A55C-25DB745FE217@delong.com>
References: <C1017FAF-91C3-4CA3-89C2-B64FF5100E41@consulintel.es> <85d934b3-ae06-c0ea-3519-4069c8387f0a@gmail.com> <C33DB89E-C005-4A32-9066-C8EE710F3255@consulintel.es> <b16c4ca2-da97-9a5a-0f88-6388ebbda80e@gmail.com> <B9C2822F-56EE-47D8-AAB5-C041A3D22F41@gmail.com> <f23854dd-0952-eedb-802b-8506dc111da7@gmail.com> <355FA9BA-CBE9-41AC-8FA6-B44C15C7420B@gmail.com> <58bb7a08-4595-f9b8-0be4-25bb471ca2db@gmail.com> <CAAedzxrMk10P8g0p5=1m8rANFy6+GvkA7+SrnWLKp3Do7sY5aw@mail.gmail.com> <d441f1cd-7b22-f94f-1fe2-4b12ab47ae21@gmail.com> <39456568-1DF0-4D51-8E94-0FDF3595EB31@consulintel.es> <58c5384b-d7d4-f89b-4e1c-f340d2af6630@gmail.com> <8AC03AD2-A7C0-48ED-BFD1-54AEF6A2C29B@consulintel.es> <75a6ea1b-de5d-5b8d-b3d9-d24edbb7bfad@gmail.com> <3521F710-56E4-4950-9EA0-6ECC58219F11@delong.com> <1c0b744f-05ef-6df0-9233-9e86d3de7c8e@gmail.com> <DD38869A-815E-4456-92E8-1F545CDCCB22@delong.com> <add60b73-17a3-ca99-39e1-e58b7002344e@gmail.com>
To: Alexandre Petrescu <alexandre.petrescu@gmail.com>
X-Mailer: Apple Mail (2.3124)
X-Greylist: Sender succeeded SMTP AUTH, not delayed by milter-greylist-4.2.7 (owen.delong.com [192.159.10.2]); Wed, 20 Sep 2017 19:20:26 -0700 (PDT)
Archived-At: <https://mailarchive.ietf.org/arch/msg/v6ops/uLQNPrnH4Rk_g5aJlJ-_HamIMmc>
Subject: Re: [v6ops] [*SPAM* Score/Req: 3.9/3.3] Re: [*SPAM* Score/Req: 3.9/3.3] Re: reclassify 464XLAT as standard instead of info
X-BeenThere: v6ops@ietf.org
X-Mailman-Version: 2.1.22
Precedence: list
List-Id: v6ops discussion list <v6ops.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/v6ops>, <mailto:v6ops-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/v6ops/>
List-Post: <mailto:v6ops@ietf.org>
List-Help: <mailto:v6ops-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/v6ops>, <mailto:v6ops-request@ietf.org?subject=subscribe>
X-List-Received-Date: Thu, 21 Sep 2017 02:21:32 -0000

> On Sep 20, 2017, at 5:55 PM, Alexandre Petrescu <alexandre.petrescu@gmail.com> wrote:
> 
> Le 20/09/2017 à 21:35, Owen DeLong a écrit :
>>> On Sep 20, 2017, at 12:26 PM, Alexandre Petrescu <alexandre.petrescu@gmail.com> wrote:
>>> Le 20/09/2017 à 17:13, Owen DeLong a écrit :
>>>>> On Sep 20, 2017, at 10:44 AM, Alexandre Petrescu <alexandre.petrescu@gmail.com <mailto:alexandre.petrescu@gmail.com>> wrote:
>>>>> Le 20/09/2017 à 15:35, JORDI PALET MARTINEZ a écrit :
>>>>>> Why you try to mix things?
>>>>> I dont mix.  You want a unique STdsTRack.  Do you think the place is empty?
>>>> I’m not sure where you get “unique”. I think Jordi wants 464XLAT moved to Standards track rather than informational. I don’t see anything about unique in his request.
>>>>> As I said already, there is already IPv6-in-GTP for transitioning and DHCPv6-PD for Prefix Delegation. These are standards.
>>>> I guess the question I have for this statement is “why is this relevant to whether or not we move 464XLAT to standard?”
>>> BEcause 464XLAT is a transitioning mechanism and IPv6-in-GTP is a transitioning mechanism too, which is deployed too.
>> So what?
>> ISIS is a Standard and so is OSPF… both are IGPs. For that matter,
>> so is RIPv2.
> 
> YEs, and each uses some distinct number, maybe a UDP port number.  They
> can work simultaneously on a Router.

I suppose you could, technically, run ISIS and OSPF on the same router at the same time, but down that path lies madness.

> But you cant have simultaneously CLAT and DHCPv6-PD on the same client.
> Because CLAT wants that to be a /64 prefix.  It will break when the
> client gets a /63.

Again, I don’t entirely buy this because if the client gets an IA_PD /63, I’m not sure CLAT cares. CLAT cares about either the IA_NA or the interface address assigned by the DHCP client (which should be a /64).

> Moreover, design suggestions from CLAT assume that /64 is sufficient.
> That is wrong - /64 is not sufficient.

If you feel strongly about this, publish an ID obsoleting the current CLAT specification and arguing for more than a /64.

>> There are lots of cases where more than one solution to the same problem becomes a standards track RFC.
> 
> But one wont prohibit the other.
> 
> CLAT prohibits DHCPv6-PD.

Continuing to say this doesn’t make it true.

>> For that matter, DHCPv6 and SLAAC are both standards. Both do
>> address assignment.
> 
> Err, I agree.  Yet CLAT does not agree.  CLAT does not rely on DHCP to
> get an address.  Why?  IT does not rely on DHCPv6-PD to get a prefix.  Why?

Neither do any Android phones, nor do the vast majority of systems that I administer.

What’s your point?

IMHO, no protocol should _RELY_ on DHCPv6 or DHCPv6_PD, but, instead, they should all function regardless of the mechanism by which addresses are assigned. Arguably you could say that insisting a link is a /64 is not valid and you might have a case there, but even there, I think for some things, that ship has sailed.

>>>>>> CLAT is a transition mechanism. SLAAC or DHCPv6 (-PD) is a way to provision addresses/prefixes. No sense to mix all them.
>>>>> That's a problem.  You want them to work  together, not to compete.
>>>> This makes no sense to me. IMHO, they don’t compete and CLAT can work regardless of how the IPv6 address on the client is obtained, whether SLAAC, DHCPv6, static, or otherwise.
>>> But you dont want CLAT's IPv6-in-IPv4 together with GTP encapsulation - that's too many encapsulations.
>> True, but I don’t want ISIS and OSPF running on the same links, either.
> 
> At some point there is some Gateway that is possible, which runs both
> protocols OSPF and ISIS.  But there cant be conversion between CLAT and
> DHCP.

Right, because CLAT doesn’t assign addresses and DHCP doesn’t provide a gateway between IPv4 and IPv6.

That’s sort of like saying there can’t be conversion between RIP and TELNET.

It’s true, but I’m not sure why it matters.

>> Not sure I understand why this is a relevant topic here. Operators are capable of choosing the standard that best meets their needs
>> from multiple standards. Choice is often a good thing. This is an
>> example of such a case.
> 
> Operators are influenced by Device availability.  If Android is what is
> available, then operators want to satisfy this.  If Android does CLAT,
> then operators choose to not implement DHCPv6-PD, because DHCPv6-PD is
> part of DHCPv6, and because CLAT does not need DHCPv6.

Sorry, but this is absurd logic.

The reason operators choose not to implement DHCPv6-PD in android-centric networks is because Android doesn’t support DHCPv6. That is a completely orthogonal issue to whether android supports 464XLAT/CLAT or not.

That would be sort of like saying “Because my linux system is running Quagga and speaks OSPF, it can’t handle SSH sessions.”

The lack of DHCPv6 on Android devices is (as near as I can tell) largely a religious position taken by Lorenzo.

This situation existed long before CLAT and if they chose to put DHCPv6 clients on Android, it wouldn’t eliminate their ability to run CLAT.

> I dont know how to explain this better to you.

I’m not the one who seems to be misunderstanding the situation.

> Android is very important to operators.

And? Android supports 464XLAT. It’s not going to support DHCPv6 until someone convinces Lorenzo (or someone above him at Alphabits) to do so. Support could be added without breaking 464XLAT/CLAT, so I really don’t see why you are connecting these two things other than perhaps in your mind they are connected because Lorenzo was also one of the early backers of 464XlAT.

>>>>> You want them to have different functions.
>>>> CLAT doesn’t have an IPv6 address assignment function so they
>>>> do, in fact, have different functions.
>>>>> But the function to get a prefix is a unique function.
>>>> CLAT doesn’t have anything to do with getting a prefix for IPv6.
>>> But it only works with a /64.  It means it cant work when
>>> DHCPv6-PD gives it a /63.
>> You’re making no sense here. An interface would still get a /64 from the /63 or /56 or /48 or whatever, so CLAT would still be perfectly capable of operating after the /64 was assigned to the interface.
> 
> To be tried, before arguing.
> 
> Can you try?
> 
> Do you think a WiFi tablet behind a smartphone-on-cellular that uses a
> prefix obtained with DHCPv6-PD and re-advertised with RA would be able
> to get through that CLAT ok, and talk to IPv4 servers?

I don’t see why not. Admittedly, I don’t bother to try, I have enough IPv4 addresses on the networks I run that dual stack is a perfectly viable solution and the idea of all of these silly variants of the NAT shell game just turn my stomach. However, I recognize the real need in the real world for them.

Now, a counter-question… Do you think a WiFi tablet behind that same smart-phone-on-cellular that gets its address via static or some other address assignment mechanism would have the same difficulty? If not, why not?

> If you could try this, then we can have an answer on whether or not I
> make sense.
> 
> Before that, we cant say CLAT and DHCPv6-PD are ok.

You’re making the bold assertion that CLAT fails if the /64 on the interface is assigned by some mechanism other than 64share. As far as I’m concerned, it’s not my responsibility to prove that assertion false, it’s up to you to provide some factual basis behind the assertion and/or some proof that it is valid.

> Nothing of this is orthogonal to CLAT: CLAT does some things because the
> modem is forcing it into doing.

Probably now is the time for us to (as usual) agree to disagree…

Regardless of the reason CLAT was created, it is now widely deployed and very popular. It is a pragmatic solution. Deploying it does not break any of the protocols that are near and dear to your heart. It provides an optional way to deal with circumstances where those protocols are not the best choice for the operator regardless of the reasons behind that.

Would it be nice to get the modem vendors to fix the silicon? Sure. But reality check here… They’re not going to retroactively replace the silicon in billions of smart phones even if they can be convinced to correct future chipsets. As such, the “right thing” is completely infeasible in the real world.

So again, I say that fixing the chipsets, DHCPv6, and IPv6-in-GTP are all orthogonal to this discussion because there is no inherent conflict in deploying CLAT on the phone, it simply provides yet another option for accomplishing a similar task.

In fact, unless I misunderstood IPv6-in-GTP, 464XLAT solves a different problem than IPv6-in-GTP in that IPv6-in-GTP provides (roughly) the cellular equivalent of a 6in4 tunnel rather than providing a mechanism for an IPv6-only device to speak to an IPv4 device at the far end.

Owen