Re: [v6ops] I-D Action: draft-ietf-v6ops-transition-comparison-00.txt

JORDI PALET MARTINEZ <jordi.palet@consulintel.es> Fri, 16 April 2021 13:32 UTC

Return-Path: <prvs=1740bc00d9=jordi.palet@consulintel.es>
X-Original-To: v6ops@ietfa.amsl.com
Delivered-To: v6ops@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 6C1813A2606 for <v6ops@ietfa.amsl.com>; Fri, 16 Apr 2021 06:32:01 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -1.998
X-Spam-Level:
X-Spam-Status: No, score=-1.998 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, DKIM_SIGNED=0.1, DKIM_VALID=-0.1, DKIM_VALID_AU=-0.1, SPF_HELO_NONE=0.001, URIBL_BLOCKED=0.001] autolearn=ham autolearn_force=no
Authentication-Results: ietfa.amsl.com (amavisd-new); dkim=pass (1024-bit key) header.d=consulintel.es
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id uUzJeRFhN6M4 for <v6ops@ietfa.amsl.com>; Fri, 16 Apr 2021 06:31:56 -0700 (PDT)
Received: from mail.consulintel.es (mail.consulintel.es [IPv6:2001:470:1f09:495::5]) by ietfa.amsl.com (Postfix) with ESMTP id BCD9C3A2604 for <v6ops@ietf.org>; Fri, 16 Apr 2021 06:31:55 -0700 (PDT)
DKIM-Signature: v=1; a=rsa-sha256; c=simple; d=consulintel.es; s=MDaemon; t=1618579913; x=1619184713; i=jordi.palet@consulintel.es; q=dns/txt; h=User-Agent:Date: Subject:From:To:Message-ID:Thread-Topic:References:In-Reply-To: Mime-version:Content-type:Content-transfer-encoding; bh=eSoTJlRy Nx2lwVVR6fMj/9gwglYtFOtF0fCLoq2xEug=; b=Bqn+Le3zN2h/PJlgFLeVXeEe va/6ihnbkEZNqfXborVX7vUR9GcCO755IGxVgJLpa8qqOfOwd0Z1wfLDs0qbYGlQ m+jm0QeakZcpxlYAM0T5BWlq6O4hx5+kwsuoAS0Nj9F12iF0dnBK2rMkWg4o5UCQ mLZNofJHmHboK7vSAao=
X-MDAV-Result: clean
X-MDAV-Processed: mail.consulintel.es, Fri, 16 Apr 2021 15:31:53 +0200
X-Spam-Processed: mail.consulintel.es, Fri, 16 Apr 2021 15:31:53 +0200
Received: from [10.10.10.144] by mail.consulintel.es (MDaemon PRO v16.5.2) with ESMTPA id md50000573094.msg for <v6ops@ietf.org>; Fri, 16 Apr 2021 15:31:52 +0200
X-MDRemoteIP: 2001:470:1f09:495:dcd2:a0e8:4e04:63f5
X-MDHelo: [10.10.10.144]
X-MDArrival-Date: Fri, 16 Apr 2021 15:31:52 +0200
X-Authenticated-Sender: jordi.palet@consulintel.es
X-Return-Path: prvs=1740bc00d9=jordi.palet@consulintel.es
X-Envelope-From: jordi.palet@consulintel.es
X-MDaemon-Deliver-To: v6ops@ietf.org
User-Agent: Microsoft-MacOutlook/16.48.21041102
Date: Fri, 16 Apr 2021 15:31:51 +0200
From: JORDI PALET MARTINEZ <jordi.palet@consulintel.es>
To: "v6ops@ietf.org" <v6ops@ietf.org>
Message-ID: <3AC68FDA-D67F-4F43-9C87-661AE614FB3E@consulintel.es>
Thread-Topic: [v6ops] I-D Action: draft-ietf-v6ops-transition-comparison-00.txt
References: <161851774047.23547.18406903341297144719@ietfa.amsl.com> <0eb0c029ca6247cc9b7274082e694ad1@huawei.com> <48230BB0-88CF-4610-931A-9827C9C67799@consulintel.es> <67a5392d71904a04a53d44054d32f3f3@huawei.com>
In-Reply-To: <67a5392d71904a04a53d44054d32f3f3@huawei.com>
Mime-version: 1.0
Content-type: text/plain; charset="UTF-8"
Content-transfer-encoding: quoted-printable
Archived-At: <https://mailarchive.ietf.org/arch/msg/v6ops/v9u-V4PaUiijiCPc729SEJLladA>
Subject: Re: [v6ops] I-D Action: draft-ietf-v6ops-transition-comparison-00.txt
X-BeenThere: v6ops@ietf.org
X-Mailman-Version: 2.1.29
Precedence: list
List-Id: v6ops discussion list <v6ops.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/v6ops>, <mailto:v6ops-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/v6ops/>
List-Post: <mailto:v6ops@ietf.org>
List-Help: <mailto:v6ops-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/v6ops>, <mailto:v6ops-request@ietf.org?subject=subscribe>
X-List-Received-Date: Fri, 16 Apr 2021 13:32:01 -0000

Mmm ... I don't think it was a secret!

If you're working on actual deployments, you need to configure the features you want to enable in the carrier config files, and then Apple publish it. Pretty standard Apple procedure. Alternatively, you can also use the Apple Mobile Configurator, for earlier testing, etc.

Many operators have been using this for about 3 years already. I don't recall right now the iOS version number but was 2017-2018. I believe I've mention this already other times in v6ops.

Because that happened several years ago, I don't think it should be necessary to include what OS versions, not just for Apple, for any OS, however I'm happy to have it if the WG believes so.

I got now your point about incoming connections examples/behavior. We will have some text in the next version.

I believe most of the carriers that use CGN, don't allow incoming connection. If you need that, you pay an alternative service and then you get a "persistent" IPv4.

The problem of CGN is still that if you have Sony PlayStation gamers, the IPv4 addresses in the CGN get into the blacklist forever, so you need to rotate all the IPv4 addresses in the CGNs, until you finish them. Then you go to the market and pay for more transfers, etc. Clearly it doesn't make sense. It is smarter to not install CGNs and instead directly pay for the transfers now, before price keeps going up.


Regards,
Jordi
@jordipalet
 
 

El 16/4/21 15:05, "v6ops en nombre de Vasilenko Eduard" <v6ops-bounces@ietf.org en nombre de vasilenko.eduard@huawei.com> escribió:

    Hi Jordi,
    You did bring the news about iOS that is a big secret for the community. What is the iOS version that supports CLAT?
    Then it is mandatory to include such important information in the draft.

    I am not so interested in any specific protocol. We have too many.
    I am interested in the use case: "to initiate a connection from the outside to an IPv4 server that is behind translation solution".
    We could assume that port forwarding on the CPE subscriber could provision himself (probably port 80). But the CPE should receive incoming TCP session from the internet.
    It would probably bring onto the discussion PCP (for some translation technologies), but if not - I would not be much disappointed.
    By the way, you could dispute the use case then the question is closed.
    I now carriers where all subscribers do receive public IPv4 even now.
    But I know Carriers that have a shortage of public IPv4 for CGNAT pools.
    Of course, you could send them to buy IPv4 on the open market because NAT connection initiated in opposite direction is additional complexity.
    You choose.

    Eduard
    -----Original Message-----
    From: v6ops [mailto:v6ops-bounces@ietf.org] On Behalf Of JORDI PALET MARTINEZ
    Sent: Friday, April 16, 2021 3:20 PM
    To: v6ops@ietf.org
    Subject: Re: [v6ops] I-D Action: draft-ietf-v6ops-transition-comparison-00.txt

    Hi Eduard,

    I think I can provide some light on this.

    iOS was not supporting CLAT since a few years ago, which was a problem for using 464XLAT in tethering, but this is no longer true. Thanks to the push from several operators Apple finally implemented CLAT, which is only needed for the tethering, because the "similar" solution to bump-in-the-host resolve the problem for the apps in the iOS device. Further to that, this is supported because Apple took a very good decision long time ago (2016 I believe), to only allow in the AppStore apps that work in IPv6-only, so that's why the CLAT is not need for the iOS device itself.

    Having no need for the CLAT to be enabled means lower battery consumption, and of course, lower CPU cost and delay if the other end is also using IPv6, so not NAT at all.

    We have indeed some mentions about PCP and EAM in the text, not sure what you will like to see in the document. Could you please elaborate a bit more? An specific section about that or?

    Regards,
    Jordi
    @jordipalet



    El 16/4/21 14:03, "v6ops en nombre de Vasilenko Eduard" <v6ops-bounces@ietf.org en nombre de vasilenko.eduard@huawei.com> escribió:

        Hi all,
        iOS does not support 464XLAT/CLAT.
        They do use RFC 6535 (Bump in the host) instead.
        It is probably an important fact for 4.4.2

        I am not sure that it is needed here. But there is the story of how to initiate a NAT connection in the opposite direction.
        PCP (RFC 7225, RFC 6887), STUN (RFC 5389), EAM (RFC 7757), public IP allocation on CGNAT.
        Different translation technologies have different compatibility and different tools for how to punch a hole in the opposite direction.
        Some FBBs have a real shortage of public IPv4 to play with this.

        It is a little strange that PCP (RFC 7225) has not been mentioned at all.

        Eduard
        -----Original Message-----
        From: v6ops [mailto:v6ops-bounces@ietf.org] On Behalf Of internet-drafts@ietf.org
        Sent: Thursday, April 15, 2021 11:16 PM
        To: i-d-announce@ietf.org
        Cc: v6ops@ietf.org
        Subject: [v6ops] I-D Action: draft-ietf-v6ops-transition-comparison-00.txt


        A New Internet-Draft is available from the on-line Internet-Drafts directories.
        This draft is a work item of the IPv6 Operations WG of the IETF.

                Title           : Pros and Cons of IPv6 Transition Technologies for IPv4aaS
                Authors         : Gabor Lencse
                                  Jordi Palet Martinez
                                  Lee Howard
                                  Richard Patterson
                                  Ian Farrer
        	Filename        : draft-ietf-v6ops-transition-comparison-00.txt
        	Pages           : 30
        	Date            : 2021-04-15

        Abstract:
           Several IPv6 transition technologies have been developed to provide
           customers with IPv4-as-a-Service (IPv4aaS) for ISPs with an IPv6-only
           access and/or core network.  All these technologies have their
           advantages and disadvantages, and depending on existing topology,
           skills, strategy and other preferences, one of these technologies may
           be the most appropriate solution for a network operator.

           This document examines the five most prominent IPv4aaS technologies
           considering a number of different aspects to provide network
           operators with an easy to use reference to assist in selecting the
           technology that best suits their needs.


        The IETF datatracker status page for this draft is:
        https://datatracker.ietf.org/doc/draft-ietf-v6ops-transition-comparison/

        There are also htmlized versions available at:
        https://tools.ietf.org/html/draft-ietf-v6ops-transition-comparison-00
        https://datatracker.ietf.org/doc/html/draft-ietf-v6ops-transition-comparison-00


        Please note that it may take a couple of minutes from the time of submission until the htmlized version and diff are available at tools.ietf.org.

        Internet-Drafts are also available by anonymous FTP at:
        ftp://ftp.ietf.org/internet-drafts/


        _______________________________________________
        v6ops mailing list
        v6ops@ietf.org
        https://www.ietf.org/mailman/listinfo/v6ops

        _______________________________________________
        v6ops mailing list
        v6ops@ietf.org
        https://www.ietf.org/mailman/listinfo/v6ops



    **********************************************
    IPv4 is over
    Are you ready for the new Internet ?
    http://www.theipv6company.com
    The IPv6 Company

    This electronic message contains information which may be privileged or confidential. The information is intended to be for the exclusive use of the individual(s) named above and further non-explicilty authorized disclosure, copying, distribution or use of the contents of this information, even if partially, including attached files, is strictly prohibited and will be considered a criminal offense. If you are not the intended recipient be aware that any disclosure, copying, distribution or use of the contents of this information, even if partially, including attached files, is strictly prohibited, will be considered a criminal offense, so you must reply to the original sender to inform about this communication and delete it.



    _______________________________________________
    v6ops mailing list
    v6ops@ietf.org
    https://www.ietf.org/mailman/listinfo/v6ops
    _______________________________________________
    v6ops mailing list
    v6ops@ietf.org
    https://www.ietf.org/mailman/listinfo/v6ops



**********************************************
IPv4 is over
Are you ready for the new Internet ?
http://www.theipv6company.com
The IPv6 Company

This electronic message contains information which may be privileged or confidential. The information is intended to be for the exclusive use of the individual(s) named above and further non-explicilty authorized disclosure, copying, distribution or use of the contents of this information, even if partially, including attached files, is strictly prohibited and will be considered a criminal offense. If you are not the intended recipient be aware that any disclosure, copying, distribution or use of the contents of this information, even if partially, including attached files, is strictly prohibited, will be considered a criminal offense, so you must reply to the original sender to inform about this communication and delete it.