Re: [v6ops] Thinking about problems in IPv6-only networks

"Mudric, Dusan (Dusan)" <dmudric@avaya.com> Wed, 29 August 2018 19:02 UTC

Return-Path: <dmudric@avaya.com>
X-Original-To: v6ops@ietfa.amsl.com
Delivered-To: v6ops@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id B864B130E07 for <v6ops@ietfa.amsl.com>; Wed, 29 Aug 2018 12:02:18 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -6.9
X-Spam-Level:
X-Spam-Status: No, score=-6.9 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, RCVD_IN_DNSWL_HI=-5] autolearn=ham autolearn_force=no
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id e9Zw3DbCpxFb for <v6ops@ietfa.amsl.com>; Wed, 29 Aug 2018 12:02:16 -0700 (PDT)
Received: from co300216-co-outbound.net.avaya.com (co300216-co-outbound.net.avaya.com [198.152.13.100]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id 8342D130E06 for <v6ops@ietf.org>; Wed, 29 Aug 2018 12:02:16 -0700 (PDT)
X-IronPort-Anti-Spam-Filtered: true
X-IronPort-Anti-Spam-Result: A2EMAgCu7IZb/yYyC4dQChoBAQEBAQIBAQEBCAEBAQGCelVlbRIoCoNoiBGMKYINgz2Sa4E/OwsjCQKEPgIXgnUhNBgBAgEBAQEBAQICAmkcDIJoLwEBBAcDDC8JAgMBAQEBAQEBTwIPRwEBGAEBAQECARIREToQBwQCAQgNBAQBAQECAgYgAgICMBUICAIEARIIGoMAgXkIAQ6aXIlvgS4aAolgBYELiQUXgUI+gRJGgh4ugxsEGIEcLRWCajGCJgKbOQkChjGCeoZdiF0DhXGLI4g1gUE5gVJwFTuCaYYBilJvgRaKPwGBGwEB
X-IPAS-Result: A2EMAgCu7IZb/yYyC4dQChoBAQEBAQIBAQEBCAEBAQGCelVlbRIoCoNoiBGMKYINgz2Sa4E/OwsjCQKEPgIXgnUhNBgBAgEBAQEBAQICAmkcDIJoLwEBBAcDDC8JAgMBAQEBAQEBTwIPRwEBGAEBAQECARIREToQBwQCAQgNBAQBAQECAgYgAgICMBUICAIEARIIGoMAgXkIAQ6aXIlvgS4aAolgBYELiQUXgUI+gRJGgh4ugxsEGIEcLRWCajGCJgKbOQkChjGCeoZdiF0DhXGLI4g1gUE5gVJwFTuCaYYBilJvgRaKPwGBGwEB
X-IronPort-AV: E=Sophos;i="5.53,304,1531800000"; d="scan'208";a="295663763"
Received: from unknown (HELO p-us1-erheast-smtpauth.us1.avaya.com) ([135.11.50.38]) by co300216-co-outbound.net.avaya.com with ESMTP; 29 Aug 2018 15:02:15 -0400
X-OutboundMail_SMTP: 1
Received: from unknown (HELO AZ-US1EXHC01.global.avaya.com) ([135.11.85.12]) by p-us1-erheast-out.us1.avaya.com with ESMTP/TLS/DHE-RSA-AES256-GCM-SHA384; 29 Aug 2018 15:02:14 -0400
Received: from AZ-US1EXMB03.global.avaya.com ([fe80::a5d3:ad50:5be9:1922]) by AZ-US1EXHC01.global.avaya.com ([135.11.85.12]) with mapi id 14.03.0382.000; Wed, 29 Aug 2018 15:02:14 -0400
From: "Mudric, Dusan (Dusan)" <dmudric@avaya.com>
To: Lee Howard <lee@asgard.org>, "v6ops@ietf.org" <v6ops@ietf.org>
Thread-Topic: [v6ops] Thinking about problems in IPv6-only networks
Thread-Index: AQHUNlUbwY2Dk8XmmUa2xka+HPWvRqTEhQ4AgAFeugCAAYKZgIACN7yAgAEN+4CACp1coA==
Date: Wed, 29 Aug 2018 19:02:14 +0000
Message-ID: <9142206A0C5BF24CB22755C8EC422E459CB46310@AZ-US1EXMB03.global.avaya.com>
References: <9B8DB67F-DF22-4E5D-8EC5-90E79E3C86A2@gmail.com> <33af3d07-c1be-783a-e7a7-d1674c46b51d@asgard.org> <CAD6AjGQ_OBFGJb_C+mP_87nu7q_oXPrTvxhaV_=RcubeHtMy2Q@mail.gmail.com> <E345387F-6C1D-49D4-8B03-52D04498DDA5@lists.zabbadoz.net> <a9eeba1b-76dc-a69f-aabe-04fa4ddc3a4f@gmail.com> <e560c82c-085e-60fe-2076-70e3624696c0@asgard.org>
In-Reply-To: <e560c82c-085e-60fe-2076-70e3624696c0@asgard.org>
Accept-Language: en-US
Content-Language: en-US
X-MS-Has-Attach:
X-MS-TNEF-Correlator:
x-originating-ip: [135.11.85.50]
Content-Type: text/plain; charset="utf-8"
Content-Transfer-Encoding: base64
MIME-Version: 1.0
Archived-At: <https://mailarchive.ietf.org/arch/msg/v6ops/xW1-GXmMxPRIxeoh8Ne_6De2AWQ>
Subject: Re: [v6ops] Thinking about problems in IPv6-only networks
X-BeenThere: v6ops@ietf.org
X-Mailman-Version: 2.1.27
Precedence: list
List-Id: v6ops discussion list <v6ops.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/v6ops>, <mailto:v6ops-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/v6ops/>
List-Post: <mailto:v6ops@ietf.org>
List-Help: <mailto:v6ops-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/v6ops>, <mailto:v6ops-request@ietf.org?subject=subscribe>
X-List-Received-Date: Wed, 29 Aug 2018 19:02:19 -0000

> I will boldly assert that there are no RFCs requiring updates in order
> to deploy IPv6-only.

I suggest both DHCPv6 and SLAAC to be enabled by default. Currently, RFC4861 recommends to disable DHCPv6 by default.

RFC4862 already mandates SLAAC by default. Section 5.5:
						"the processing described below MUST be
						enabled by default."
But, this should be changed:
	- RFC4861 section 6.2.1: AdvManagedFlag and AdvOtherConfigFlag: Default: FALSE
	==> Change 'O' bit default value to TRUE (AdvOtherConfigFlag: Default: TRUE).

 to allow hosts to be deployed and automatically configured (i.e. get IPv6 address and other configuration automatically) in any environment:
- DHCPv6 only environment (no config via RA and SLAAC can be disabled), or
- SLAAC only environment (no DHCPv6 config and DHCPv6 can be disabled), or
- DHCPv6 and SLAAC environment.
using the default settings.

With the current RFC4861 recommendation (AdvManagedFlag and AdvOtherConfigFlag: Default: FALSE), if DHCPv6 is disabled on hosts that are deployed in the network which configures hosts using DHCP (DHCPv6 only environment), the hosts will not work. Changing AdvOtherConfigFlag: Default: TRUE will allow hosts to assign SLLAC addresses and obtain the application configuration using stateless DHCPv6.

Regards,
Dusan.

> -----Original Message-----
> From: v6ops <v6ops-bounces@ietf.org> On Behalf Of Lee Howard
> Sent: Tuesday, August 21, 2018 12:20 PM
> To: v6ops@ietf.org
> Subject: Re: [v6ops] Thinking about problems in IPv6-only networks
> 
> 
> 
> On 08/20/2018 08:14 PM, Brian E Carpenter wrote:
> > Well, first we need to know our objective. I suggest that our
> > objective should be to identify things that the IETF should
> > do to alleviate the alleged problems. Since what we can do
> > is write standards-track, BCP or informational RFCs, the real
> > question is: which of the alleged problems could in fact be fixed
> > by new RFC text?
> 
> That was exactly the charter of sunset4, which is in a coma from lack of
> work.
> >
> > I don't know how to do that except by making a list of the
> > alleged problems and checking off the ones that RFC text
> > could fix. Boring, no?
> 
> I will boldly assert that there are no RFCs requiring updates in order
> to deploy IPv6-only.
> 
> I make that assertion not so much from complete confidence, but as a
> challenge to prove me wrong.
> 
> IPv6-only deployment suffers from scarce business drivers, buggy
> implementations, and vendor support. There's an enterprise
> "multi-homing" problem that I think has been addressed several ways.
> There's the interaction of fragmentation headers and DNSSec (or other
> apps using transport without session management, or anycast; see
> draft-ietf-intarea-frag-fragile).  I don't think there's more the IETF
> can do.
> 
> Lee
> 
> >
> >      Brian
> >
> > _______________________________________________
> > v6ops mailing list
> > v6ops@ietf.org
> > https://urldefense.proofpoint.com/v2/url?u=https-
> 3A__www.ietf.org_mailman_listinfo_v6ops&d=DwIGaQ&c=BFpWQw8bsuKp
> l1SgiZH64Q&r=UT3Bk9cbLeaJxhf3iCrhIoUWB8YLZU23029sMQGQ2kY&m=L_93
> AEOrqv1BjCUqko2-t_K-PeKX4KhbiWDsgHHxa90&s=Vb-
> HRMCpnYvnHdEL5pFK2yFbAmKqPU6Aq0RTxBtyiZw&e=
> 
> _______________________________________________
> v6ops mailing list
> v6ops@ietf.org
> https://urldefense.proofpoint.com/v2/url?u=https-
> 3A__www.ietf.org_mailman_listinfo_v6ops&d=DwIGaQ&c=BFpWQw8bsuKp
> l1SgiZH64Q&r=UT3Bk9cbLeaJxhf3iCrhIoUWB8YLZU23029sMQGQ2kY&m=L_93
> AEOrqv1BjCUqko2-t_K-PeKX4KhbiWDsgHHxa90&s=Vb-
> HRMCpnYvnHdEL5pFK2yFbAmKqPU6Aq0RTxBtyiZw&e=