Re: [v6ops] Thoughts about wider operational input

Philip Homburg <pch-v6ops-11@u-1.phicoh.com> Thu, 24 March 2022 11:29 UTC

Return-Path: <pch-b28DE43C2@u-1.phicoh.com>
X-Original-To: v6ops@ietfa.amsl.com
Delivered-To: v6ops@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id DC26C3A0E00 for <v6ops@ietfa.amsl.com>; Thu, 24 Mar 2022 04:29:44 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -1.907
X-Spam-Level:
X-Spam-Status: No, score=-1.907 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, RCVD_IN_DNSWL_BLOCKED=0.001, SPF_HELO_NONE=0.001, SPF_NONE=0.001, T_SCC_BODY_TEXT_LINE=-0.01] autolearn=ham autolearn_force=no
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id RBb317xPppXR for <v6ops@ietfa.amsl.com>; Thu, 24 Mar 2022 04:29:42 -0700 (PDT)
Received: from stereo.hq.phicoh.net (stereo6.hq.phicoh.net [IPv6:2001:981:201c:1:2a0:c9ff:fe9f:17a9]) (using TLSv1.2 with cipher ECDHE-RSA-CHACHA20-POLY1305 (256/256 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id 55E853A0DDD for <v6ops@ietf.org>; Thu, 24 Mar 2022 04:29:40 -0700 (PDT)
Received: from stereo.hq.phicoh.net (localhost [::ffff:127.0.0.1]) by stereo.hq.phicoh.net with esmtp (TLS version=TLSv1.2 cipher=ECDHE-RSA-CHACHA20-POLY1305) (Smail #158) id m1nXLes-0000J8C; Thu, 24 Mar 2022 12:29:38 +0100
Message-Id: <m1nXLes-0000J8C@stereo.hq.phicoh.net>
To: v6ops@ietf.org
From: Philip Homburg <pch-v6ops-11@u-1.phicoh.com>
Sender: pch-b28DE43C2@u-1.phicoh.com
References: <52661a3d-75dc-111a-3f23-09b10d7cb8d4@gmail.com> <A72CDDDB-CDCE-4EAF-B95E-997C764DB2C4@gmail.com> <9175dc32-45c1-e948-c20a-3bcc958b77b9@gmail.com> <YjmJQMNgnJoSInUw@Space.Net> <fd17a91f-68dc-92b5-0544-51aefa1b7f08@gmail.com> <CAM5+tA-Wq5O4pjQ++VZQi-FTKZGMRAW-LFc6O5dPOyox4QZDEw@mail.gmail.com> <YjpA4IH/eI5im8DT@Space.Net> <CAM5+tA-foEATL9uihwD=zoTZ1EvHiwc5k_xKf=GRNYD51REQYQ@mail.gmail.com> <Yjq2Gr2cQjFuQ8ie@Space.Net>
In-reply-to: Your message of "Wed, 23 Mar 2022 06:54:34 +0100 ." <Yjq2Gr2cQjFuQ8ie@Space.Net>
Date: Thu, 24 Mar 2022 12:29:37 +0100
Archived-At: <https://mailarchive.ietf.org/arch/msg/v6ops/wX2-cQuudn3DgkpadUkT0KSDd5Y>
Subject: Re: [v6ops] Thoughts about wider operational input
X-BeenThere: v6ops@ietf.org
X-Mailman-Version: 2.1.29
Precedence: list
List-Id: v6ops discussion list <v6ops.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/v6ops>, <mailto:v6ops-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/v6ops/>
List-Post: <mailto:v6ops@ietf.org>
List-Help: <mailto:v6ops-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/v6ops>, <mailto:v6ops-request@ietf.org?subject=subscribe>
X-List-Received-Date: Thu, 24 Mar 2022 11:29:45 -0000

>(Dual-stack cannot be the answer anyway - it will have all the issues
>of IPv4, plus the added complications of dual-stack.  Services need to
>be dual-stack, but for all the rest, single-stack IPv6 needs to be
>the end goal - see facebook etc)

Obviously, on an IPv6-only system, there is no IPv4, so the relative
priority of ULA compared to IPv4 does not matter.

I'm curious what IPv4aaS we want to deploy. I consider NAT64 a complete
disaster (even if the form of 464xlat). Given how the internet works, 
we will probably end up with NAT64 everywhere until the end of times.

>This is not what I had in mind.  If "we" decide that ULA is a good
>way forward, IETF can update RFCs, and vendors will eventually
>update their base OS.  It might take 5 years, but so will everything
>else in Big Enterprise land.

The problem with ULA is that we have lots of installations where hosts with
a ULA address don't have access to the IPv6 internet. Often, CPEs announce
a ULA when the CPE doesn't have an IPv6 uplink. 

In contrast, where RFC 1918 was meant for local IPv4 communication, it is 
now on a very large scale the primary method for a host to reach the IPv4
internet.

So to avoid the situation where we say that ULA is local and then use it
to connect to the IPv6 internet, we should just allocate a new space. And
explicitly give it the property to connect to the IPv6 internet through
through some sort of address translation.

There is also a nice tie-in with PI. Obviously, putting millions of PI
prefixes in BGP does not scale.

On the other hand, there is no such limit if the PI space is used behind NAT.