Re: [v6ops] new draft: draft-ietf-v6ops-6204bis

Ole Troan <otroan@employees.org> Tue, 18 October 2011 20:01 UTC

Return-Path: <ichiroumakino@gmail.com>
X-Original-To: v6ops@ietfa.amsl.com
Delivered-To: v6ops@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 7A09221F867F for <v6ops@ietfa.amsl.com>; Tue, 18 Oct 2011 13:01:10 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -3.474
X-Spam-Level:
X-Spam-Status: No, score=-3.474 tagged_above=-999 required=5 tests=[AWL=0.125, BAYES_00=-2.599, RCVD_IN_DNSWL_LOW=-1]
Received: from mail.ietf.org ([12.22.58.30]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id PBo3hPmMSNRr for <v6ops@ietfa.amsl.com>; Tue, 18 Oct 2011 13:01:09 -0700 (PDT)
Received: from mail-wy0-f172.google.com (mail-wy0-f172.google.com [74.125.82.172]) by ietfa.amsl.com (Postfix) with ESMTP id 4444D21F8678 for <v6ops@ietf.org>; Tue, 18 Oct 2011 13:01:09 -0700 (PDT)
Received: by wyh22 with SMTP id 22so1126805wyh.31 for <v6ops@ietf.org>; Tue, 18 Oct 2011 13:01:08 -0700 (PDT)
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=gmail.com; s=gamma; h=sender:subject:mime-version:content-type:from:in-reply-to:date:cc :content-transfer-encoding:message-id:references:to:x-mailer; bh=10zD58cX0rQUym7pxH82PFMcgpRqSNWq2WsHWflPDx8=; b=NBfzYBAvOe5AcRVyglZbEgjBEDiO0gG+78HWKhuAMlOoX7Nw5GkPZem2piwjRGPHv4 ec/9csIPmpCsMR/9x+YpijxqdaoAI+EOtKt6c31uqtz9rZTo1ye72uBW2pTLzAAjKoJ6 SiVelJTy02MblHrXS0sV+4yyinQX1Y3JYbWF0=
Received: by 10.216.230.67 with SMTP id i45mr1430023weq.111.1318967317752; Tue, 18 Oct 2011 12:48:37 -0700 (PDT)
Received: from dhcp-10-55-90-210.cisco.com (64-103-25-233.cisco.com. [64.103.25.233]) by mx.google.com with ESMTPS id b5sm5471940wbh.4.2011.10.18.12.48.36 (version=TLSv1/SSLv3 cipher=OTHER); Tue, 18 Oct 2011 12:48:36 -0700 (PDT)
Sender: Ole Troan <ichiroumakino@gmail.com>
Mime-Version: 1.0 (Apple Message framework v1084)
Content-Type: text/plain; charset="us-ascii"
From: Ole Troan <otroan@employees.org>
In-Reply-To: <A29A998E-658F-4265-95C7-2B27EF160EEE@apple.com>
Date: Tue, 18 Oct 2011 21:48:36 +0200
Content-Transfer-Encoding: quoted-printable
Message-Id: <678E790D-83DA-44BD-821F-942AD1CDBB12@employees.org>
References: <201110111355.p9BDt1M23806@ftpeng-update.cisco.com> <282BBE8A501E1F4DA9C775F964BB21FE3EB758B7A8@GRFMBX704BA020.griffon.local> <1B8E4C5A-D08B-4F37-B701-A39745136A33@cisco.com> <750BF7861EBBE048B3E648B4BB6E8F4F1FDCA4C3@crexc50p> <282BBE8A501E1F4DA9C775F964BB21FE3EB758B7AB@GRFMBX704BA020.griffon.local> <B06E5723-1EE5-4808-AE7F-3D98EB3F17CE@cisco.com> <94C682931C08B048B7A8645303FDC9F35A2DDC07B7@PUEXCB1B.nanterre.francetelecom.fr> <5B6B2B64C9FE2A489045EEEADDAFF2C303130A41@XMB-RCD-109.cisco.com> <94C682931C08B048B7A8645303FDC9F35A2DDC0801@PUEXCB1B.nanterre.francetelecom.fr> <5B6B2B64C9FE2A489045EEEADDAFF2C303130AAE@XMB-RCD-109.cisco.com> <A29A998E-658F-4265-95C7-2B27EF160EEE@apple.com>
To: james woodyatt <jhw@apple.com>
X-Mailer: Apple Mail (2.1084)
Cc: IPv6 Operations <v6ops@ietf.org>, pcp-chairs@tools.ietf.org, draft-ietf-pcp-base@tools.ietf.org, draft-ietf-v6ops-6204bis@tools.ietf.org
Subject: Re: [v6ops] new draft: draft-ietf-v6ops-6204bis
X-BeenThere: v6ops@ietf.org
X-Mailman-Version: 2.1.12
Precedence: list
List-Id: v6ops discussion list <v6ops.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/v6ops>, <mailto:v6ops-request@ietf.org?subject=unsubscribe>
List-Archive: <http://www.ietf.org/mail-archive/web/v6ops>
List-Post: <mailto:v6ops@ietf.org>
List-Help: <mailto:v6ops-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/v6ops>, <mailto:v6ops-request@ietf.org?subject=subscribe>
X-List-Received-Date: Tue, 18 Oct 2011 20:01:10 -0000

James,

>>  But the PCP base document needs to become a RFC ASAP
> 
> The current revision, I-D.ietf-pcp-base-14 is unsuitable for the purposes described in REC-48 of RFC 6092, in my opinion.  I'm hoping that the forthcoming -15 revision will be acceptable, but I don't actually see it on the server yet, and some of the more authoritative participants in the working group are balking at being asked to consider a new revision of the draft.
> 
> One of the things that would help here is for the PCP working group to stop thinking that their job is done after they specify how ports are mapped for translation and address amplification with NAT44 and NAT64 and to start remembering that their draft actually purports to explain how PCP can meet REC-48 of RFC 6092 as well.  Every time I bring up a point that shows how their draft falls down on that point, they complain that nobody cares about IPv6 CPE routers, or transports other than TCP and UDP, or this, that or the other thing, and tell me they plan to fix it in the next round of RFC development.  Fortunately, the chair and the technical editor of the draft seem to be paying attention to the problems, but I do *NOT* feel at all comfortable that the community of PCP implementers is ready to consider simple security in IPv6 CPE routers.
> 
> I am very concerned that IPv6 CPE router vendors will rush out devices that contain early reference implementations of PCP, because it is standards track, but have simple security functions that are *MUCH* less transparent than the Informational category RFC 6092 recommends.  If this happens, then PCP servers in these ubiquitous and sure-to-never-be-upgraded home gateways will establish a conventional restriction on the transparency of IPv6 residential service that unnecessarily mimics the brokenness of IPv4/NAPT.  We should endeavor to avoid the possibility of a disaster like that, if at all possible, and I'm sensing a significant resistance to that concern among an influential cadre of PCP working group participants and implementers.
> 
> Therefore, I'd prefer that any update to RFC 6204 either wait for PCP to be revised appropriately in a second RFC, or that it not contain any recommendation for a PCP server at all.  Alternatively, the stakeholders in RFC 6204 could engage more directly with the PCP working group, so that Keith Moore and I are not the only ones speaking up in the defense of your interests.

agree, and I don't see the rush for 6204bis.
asking CPE vendors to do 6204 + 5969 + 6333 isn't any harder than making them learn yet a new RFC number.
let's shelf 6204 until we have something real to put in there.

cheers,
Ole