[v6ops] Re: Traffic control protocols (PCP and UPnP IGD)

Daryll Swer <contact@daryllswer.com> Fri, 26 July 2024 17:07 UTC

Return-Path: <contact@daryllswer.com>
X-Original-To: v6ops@ietfa.amsl.com
Delivered-To: v6ops@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id E4CE7C14F6B5 for <v6ops@ietfa.amsl.com>; Fri, 26 Jul 2024 10:07:16 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -2.105
X-Spam-Level:
X-Spam-Status: No, score=-2.105 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, DKIM_SIGNED=0.1, DKIM_VALID=-0.1, DKIM_VALID_AU=-0.1, DKIM_VALID_EF=-0.1, HTML_MESSAGE=0.001, RCVD_IN_ZEN_BLOCKED_OPENDNS=0.001, SPF_HELO_NONE=0.001, SPF_PASS=-0.001, T_SCC_BODY_TEXT_LINE=-0.01, URIBL_BLOCKED=0.001, URIBL_DBL_BLOCKED_OPENDNS=0.001, URIBL_ZEN_BLOCKED_OPENDNS=0.001] autolearn=ham autolearn_force=no
Authentication-Results: ietfa.amsl.com (amavisd-new); dkim=pass (2048-bit key) header.d=daryllswer.com
Received: from mail.ietf.org ([50.223.129.194]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id Ya8SdWVYiyag for <v6ops@ietfa.amsl.com>; Fri, 26 Jul 2024 10:07:12 -0700 (PDT)
Received: from mail-pl1-x629.google.com (mail-pl1-x629.google.com [IPv6:2607:f8b0:4864:20::629]) (using TLSv1.3 with cipher TLS_AES_128_GCM_SHA256 (128/128 bits) key-exchange X25519 server-signature RSA-PSS (2048 bits) server-digest SHA256) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id 7DBECC14F6BE for <v6ops@ietf.org>; Fri, 26 Jul 2024 10:07:12 -0700 (PDT)
Received: by mail-pl1-x629.google.com with SMTP id d9443c01a7336-1fc658b6b2eso7504915ad.0 for <v6ops@ietf.org>; Fri, 26 Jul 2024 10:07:12 -0700 (PDT)
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=daryllswer.com; s=google; t=1722013632; x=1722618432; darn=ietf.org; h=cc:to:subject:message-id:date:from:in-reply-to:references :mime-version:from:to:cc:subject:date:message-id:reply-to; bh=QCaowNtCVvW8q4EHiRRIOHUY70pOgLT4vc11n4f44oM=; b=MtXsrlOtQR+2TH6mlr9JyFpima2mN60h4Xg6CIIkIgJDgIzX+NlEs7aZZcWNkM14eQ 1/c4IQiAHq2Rc3EX68W6K+kceD0tmWXACtSZpJ/cJyN3Euvvz5BCkmO6k84jptzXML2X 4X7bdANdUxVIP1AhXmf6lc9PIGBXbLbmcj9VTdygo1tYE6JfG1W7Ph0stgPcOx4Jbdg/ QfXZTtgroQUsZebJHfxwHAaUufUx/1FfhE6tsPzgsK/L99UaWfybWVLuLehAn96VBw8R w2b7ZkaX9Wh2xG+nYabD8gq00hD4rtdggT/hy2Kh62hDwJ9OiVH0gbH8DMketleowNzr 96SQ==
X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20230601; t=1722013632; x=1722618432; h=cc:to:subject:message-id:date:from:in-reply-to:references :mime-version:x-gm-message-state:from:to:cc:subject:date:message-id :reply-to; bh=QCaowNtCVvW8q4EHiRRIOHUY70pOgLT4vc11n4f44oM=; b=UrLk8fEaQI+hkmOGF9U7NesTG0zkF8Rzx20B2wh/ZvfnxaVbQ+GDTNACpTe1aBww1l aBJQe2eCzm1vQo2toAbdOmFG5B+EwMHCy/uyIfOosQ/R9iGWIzTkOvL1i9eH9YM95F2G lOVk7Sia8hE53Dqyt0Oh4klT6InR9kDLlVHkTgV67740f5fiZu2tniNpKu1oMXV/VGEZ etVpowex2bWwqJ61vwBJqWpGPR9UqcxhY7I5H2CzG40/hQ/0Q7Up06rDR8O9pYST9uId FTEblj3Hgw5f34m3djHH9dAgo6h2nUS+MRzQU4StpcaTLRomCiAwAOGS6LBbNEOgP8zH owIg==
X-Gm-Message-State: AOJu0YyG+mbzKL1xNTfuPvylMmr6P7horFzoKf/sgWpzHNKW+AK5qK4C D2unhlyA1AHzqr+dkOx662P+ybq3rWSUv6a3JUnm3F0HWy1cIp7VsDAeui4PR3dB/H3JfLY31zx Fd+A=
X-Google-Smtp-Source: AGHT+IGvtbYijXsd+SjiZZG2Trc0FNc9otWPJDIwK2GkQx6kW6VtbOX8p3Idj2Hh9oGrndR5xkU1ow==
X-Received: by 2002:a17:903:41c8:b0:1fa:fc69:7a81 with SMTP id d9443c01a7336-1ff0483157amr3178575ad.29.1722013631453; Fri, 26 Jul 2024 10:07:11 -0700 (PDT)
Received: from mail-pg1-f172.google.com (mail-pg1-f172.google.com. [209.85.215.172]) by smtp.gmail.com with ESMTPSA id d9443c01a7336-1fed7fcd252sm35096905ad.285.2024.07.26.10.07.10 for <v6ops@ietf.org> (version=TLS1_3 cipher=TLS_AES_128_GCM_SHA256 bits=128/128); Fri, 26 Jul 2024 10:07:10 -0700 (PDT)
Received: by mail-pg1-f172.google.com with SMTP id 41be03b00d2f7-793a3a79a83so807890a12.3 for <v6ops@ietf.org>; Fri, 26 Jul 2024 10:07:10 -0700 (PDT)
X-Received: by 2002:a17:90a:2f61:b0:2c9:6ccc:2fbb with SMTP id 98e67ed59e1d1-2cf7e1fbb8cmr149650a91.24.1722013630333; Fri, 26 Jul 2024 10:07:10 -0700 (PDT)
MIME-Version: 1.0
References: <73141FE4-DA01-4B9F-88F3-EE68FBD2A0CB@apple.com> <TYVPR01MB10750A78CA08E3D2EB6CCEB37D2AB2@TYVPR01MB10750.jpnprd01.prod.outlook.com> <CAPt1N1mhViWNxWw1XKQZyMwFWWdUQ3doh-u6pezYoFhpA8b8Qg@mail.gmail.com> <TYVPR01MB10750FB6A5FA4EB034F9B5B8AD2B42@TYVPR01MB10750.jpnprd01.prod.outlook.com> <CAPt1N1kA9KETiVsK744m5AaXvCnspsN8zkdqRR1OcMo-ftkNfA@mail.gmail.com> <TYVPR01MB10750B17554096318B8C49BACD2B42@TYVPR01MB10750.jpnprd01.prod.outlook.com> <BF9C2E26-E49C-4764-9CEA-8E7738801819@employees.org> <CACyFTPFiNjvBKbCbNv-yk9NuNW3JJEJA9KBhsD06EdgrZQmFKw@mail.gmail.com> <CAPt1N1=SJNe+_dtufY8sMOydgqtGatxp0M9Vd4dOecxqo9zE7g@mail.gmail.com> <CACyFTPFoepzuDcEBnn2dt9v1Kt32ALxuBwoNwh9=8Qca=ihOoQ@mail.gmail.com> <TYVPR01MB107504A021B4A90CAEC2AAE0BD2B42@TYVPR01MB10750.jpnprd01.prod.outlook.com> <CACyFTPGQPme1NHzOc1Cvdydx=Jg1+2SzppTy305jw4UFzJkvwg@mail.gmail.com> <TYVPR01MB10750B5C9FD7FEF601FE6F660D2B42@TYVPR01MB10750.jpnprd01.prod.outlook.com>
In-Reply-To: <TYVPR01MB10750B5C9FD7FEF601FE6F660D2B42@TYVPR01MB10750.jpnprd01.prod.outlook.com>
From: Daryll Swer <contact@daryllswer.com>
Date: Fri, 26 Jul 2024 22:36:33 +0530
X-Gmail-Original-Message-ID: <CACyFTPHKrvQDpxs1ji+qWjb66BFyBhiM=E1DZbmRfhCyAkdRpw@mail.gmail.com>
Message-ID: <CACyFTPHKrvQDpxs1ji+qWjb66BFyBhiM=E1DZbmRfhCyAkdRpw@mail.gmail.com>
To: "Kawashima Masanobu(川島 正伸)" <kawashimam=40nec.com@dmarc.ietf.org>
Content-Type: multipart/related; boundary="000000000000bc3155061e298a70"
Message-ID-Hash: LADE7RVN6PZ46V4Z3N5PGK4RM2NTN7GJ
X-Message-ID-Hash: LADE7RVN6PZ46V4Z3N5PGK4RM2NTN7GJ
X-MailFrom: contact@daryllswer.com
X-Mailman-Rule-Misses: dmarc-mitigation; no-senders; approved; emergency; loop; banned-address; member-moderation; header-match-v6ops.ietf.org-0; nonmember-moderation; administrivia; implicit-dest; max-recipients; max-size; news-moderation; no-subject; digests; suspicious-header
CC: "v6ops@ietf.org" <v6ops@ietf.org>
X-Mailman-Version: 3.3.9rc4
Precedence: list
Subject: [v6ops] Re: Traffic control protocols (PCP and UPnP IGD)
List-Id: v6ops discussion list <v6ops.ietf.org>
Archived-At: <https://mailarchive.ietf.org/arch/msg/v6ops/xix-p0p0D_BLiadmHJVQ7IMUG6o>
List-Archive: <https://mailarchive.ietf.org/arch/browse/v6ops>
List-Help: <mailto:v6ops-request@ietf.org?subject=help>
List-Owner: <mailto:v6ops-owner@ietf.org>
List-Post: <mailto:v6ops@ietf.org>
List-Subscribe: <mailto:v6ops-join@ietf.org>
List-Unsubscribe: <mailto:v6ops-leave@ietf.org>

> Assumed IPv6 mostly network deployment, 464XLAT is the appropriate choice.

464xlat is *stateful*, MAP-T is *stateless*, I heavily prefer stateless
approaches, why avoid chances to minimise computing overhead in general…

There are multiple deployments of MAP-T, some example:
https://pc.nanog.org/static/published/meetings/NANOG71/1452/20171004_Gottlieb_Mapping_Of_Address_v1.pdf

*--*
Best Regards
Daryll Swer
Website: daryllswer.com
<https://mailtrack.io/l/baec0d6aef3bc8f4c1535fab3e5df7e1fa9be865?url=https%3A%2F%2Fwww.daryllswer.com&u=2153471&signature=c906a080c4faa251>


On Fri, 26 Jul 2024 at 22:17, Kawashima Masanobu(川島 正伸) <kawashimam=
40nec.com@dmarc.ietf.org> wrote:

>
>
> Hi Daryll,
>
>
> >Don't get me wrong, I'm in favour of PCP for only-IPv4 on LTE/5G with
> 464xlat.
> >I'm in favour of PCP for CPE devices for both Dual-Stack IPv4/IPv6 and
> IPv6-only CPEs (MAP-T).
>
>
> I'm in favour of PCP for CPE devices for both Dual-Stack IPv4/IPv6 and
> IPv6-only CPEs (464XLAT). :-)
> Assumed IPv6 mostly network deployment, 464XLAT is the appropriate choice.
>
> As for firewall control protocol, IMHO, CSA Matter is the appropriate
> protocol for the future.
>
> Regards,
>
> Masanobu
>
>
>
> ========================
>
>  NEC Platforms, Ltd.
>
>  KAWASHIMA Masanobu
>
>  kawashimam@nec.com
>
>  https://www.necplatforms.co.jp/en/
>
> ========================
>
>
>
>
>
>
>
> *From:* Daryll Swer <contact=40daryllswer.com@dmarc.ietf.org>
> *Sent:* Saturday, July 27, 2024 1:20 AM
> *To:* Kawashima Masanobu(川島 正伸) <kawashimam@nec.com>
> *Cc:* v6ops@ietf.org
> *Subject:* Re: [v6ops] Re: Traffic control protocols (PCP and UPnP IGD)
>
>
>
> Kawashima
>
>
>
> Yeah, that's why I asked if there's ANY application software in the public
> domain that actually uses PCP. I've never seen one.
>
>
>
> Don't get me wrong, I'm in favour of PCP for *only*-IPv4 on *LTE*/*5G*
> with 464xlat. I'm in favour of PCP for CPE devices for both Dual-Stack
> IPv4/IPv6 and IPv6-only CPEs (MAP-T).
>
>
> *--*
>
> Best Regards
>
> Daryll Swer
>
> Website: daryllswer.com
> <https://mailtrack.io/l/bfcb5ab50fca7ddb397e36d1b73183be0c56a937?url=https%3A%2F%2Fwww.daryllswer.com&u=2153471&signature=b4d24d1084f8368f>
>
>
>
>
> On Fri, 26 Jul 2024 at 21:42, Kawashima Masanobu(川島 正伸) <kawashimam=
> 40nec.com@dmarc.ietf.org> wrote:
>
>
>
> Hi Daryll,
>
>
> Just FYI, in Japan, NTT docomo is using 464XLAT on their 5G network.
> However, I’ve never seen PCP implementation.
> Press Releases : DOCOMO to Roll Out IPv6 Single-stack Support Beginning
> Feb. 1
> <https://www.docomo.ne.jp/english/info/media_center/pr/2022/0131_00.html>
>
> It is the chiken and egg problem.
> If there is no actual app with PCP client, there is no PCP server as well.
> We can use PCP on mobile network technically though.
>
> Regards,
>
> Masanobu
>
>
>
> ========================
>
>  NEC Platforms, Ltd.
>
>  KAWASHIMA Masanobu
>
>  kawashimam@nec.com
>
>  https://www.necplatforms.co.jp/en/
>
> ========================
>
>
>
>
>
>
>
> *From:* Daryll Swer <contact=40daryllswer.com@dmarc.ietf.org>
> *Sent:* Friday, July 26, 2024 10:51 PM
> *To:* Ted Lemon <mellon@fugue.com>
> *Cc:* v6ops@ietf.org
> *Subject:* [v6ops] Re: Traffic control protocols (PCP and UPnP IGD)
>
>
>
> > Anything that uses the APIs on macOS/iOS will work with both upnp and
> pcp.
>
>
>
> Good to know. So it's just a matter of the application software making use
> of already existing APIs on Apple OSes.
>
>
>
> Ted, does PCP work with LTE/5G? I am not an expert in mobility, but I am
> curious. If the LTE/5G access network is 464xlat (or maybe MAP-T in the
> future?), can an application software request the upstream carrier via PCP
> to open up a port for IPv4, dynamically for temporary IPv4 P2P session to
> go through? Say VoIP calls without TURN?
>
>
>
> > Regarding security holes, the question would be, what holes does it
> create t that aren’t already there with a firewall that allows outbound
> connections?  I suppose it makes being a DoS attack server slightly easier?
>
>
>
> Many ISPs have DDoS detection/mitigation/re-routing in place anyway, so if
> some gets DDoSed (or DoSed), their /32 will be temporarily blackholed or
> re-routed over a scrubbing infrastructure.
>
>
>
> I see no issues here, if you want a port open, it'll be open.
>
>
> *--*
>
> Best Regards
>
> Daryll Swer
>
> Website: daryllswer.com
> <https://mailtrack.io/l/d9660c15f7ba73f852ecacc9dd726a97f16ecaba?url=https%3A%2F%2Fwww.daryllswer.com&u=2153471&signature=fcf70f25da532337>
>
>
>
>
> On Fri, 26 Jul 2024 at 19:13, Ted Lemon <mellon@fugue.com> wrote:
>
> Anything that uses the APIs on macOS/iOS will work with both upnp and pcp.
>
>
>
> Regarding security holes, the question would be, what holes does it create
> t that aren’t already there with a firewall that allows outbound
> connections?  I suppose it makes being a DoS attack server slightly easier?
>
>
>
> Op vr 26 jul 2024 om 06:08 schreef Daryll Swer <contact=
> 40daryllswer.com@dmarc.ietf.org>
>
> Are there actually any common/popular application software used by people,
> that supports PCP? I've always only found UPnP and the obsolete NAT-PMP.
>
>
> *--*
>
> Best Regards
>
> Daryll Swer
>
> Website: daryllswer.com
> <https://mailtrack.io/l/bd01f399b82a8baf04f66715cc1a7f080a88af17?url=https%3A%2F%2Fwww.daryllswer.com&u=2153471&signature=82a4bd12b2a97f5a>
>
>
>
>
> On Fri, 26 Jul 2024 at 16:06, Ole Troan <otroan=
> 40employees.org@dmarc.ietf.org> wrote:
>
> If there is a desire that the IPv6 CE router acts as a firewall, just
> requiring PCP RFC6887 may not be enough.
> At least RFC6887 opens up quite a few security trust issues. At least if
> we have to deal with the threat that an inside client is not under the
> control of the party interested in security.
> Then something like RFC7652 would be required.
> (Which leads one to wonder if it isn’t simpler to configure this through
> a UI on the IPv6 CE router instead of a through a protocol…)
>
> Ole
>
> > On 26 Jul 2024, at 03:34, Kawashima Masanobu(川島 正伸) <kawashimam=
> 40nec.com@dmarc.ietf.org> wrote:
> >
> >  It’s clear now. Thank you.  Regards, Masanobu   From: Ted Lemon <
> mellon@fugue.com>
> > Sent: Friday, July 26, 2024 10:12 AM
> > To: Kawashima Masanobu(川島 正伸) <kawashimam@nec.com>
> > Cc: v6ops@ietf.org
> > Subject: Re: [v6ops] Re: Traffic control protocols (PCP and UPnP IGD)
> >  I think it should be fine to do that, yes.
> >  Op do 25 jul 2024 om 17:15 schreef Kawashima Masanobu(川島 正伸) <
> kawashimam@nec.com>
> >
> > Ted,
> >
> > Thank you for your reply.  It’s almost clear now. :-)
> >
> > How about RFC 6970((UPnP IGD-PCP IWF)?
> > It is ‘Standard Track’. Should we mention something? Regards, Masanobu
> ========================  NEC Platforms, Ltd.                   KAWASHIMA
> Masanobu               kawashimam@nec.com
> https://www.necplatforms.co.jp/en/    ========================
> >    From: Ted Lemon <mellon@fugue.com>
> > Sent: Friday, July 26, 2024 8:59 AM
> > To: Kawashima Masanobu(川島 正伸) <kawashimam@nec.com>
> > Cc: v6ops@ietf.org
> > Subject: Re: [v6ops] Re: Traffic control protocols (PCP and UPnP IGD)
> >  As a router vendor, you have more than one set of requirements you need
> to satisfy. Nobody's saying "don't do uPNP." We're saying "do PCP." We're
> saying "the IETF is not asking you to do uPNP," not "the IETF is telling
> you not to do uPNP."
> >  On Thu, Jul 25, 2024 at 4:50 PM Kawashima Masanobu(川島 正伸) <kawashimam=
> 40nec.com@dmarc.ietf.org> wrote:
> >
> > Hi all,
> >
> > > In today’s v6ops meeting there was mention of UPnP. Having a way for
> client
> > > devices to signal to network infrastructure what traffic they want to
> receive is a
> > > good idea. However, doing that using the UPnP IGD protocol would be a
> > > disastrously bad idea.
> >
> > I agree with having a way for client devices to signal to network
> infrastructure.
> > However, I'm still not sure UPnP IGD is bad idea.
> >
> > As you may know, Broadband Forum has released TR-124 issue 9 on July
> 2024.
> > https://rg-device-requirements.broadband-forum.org/index.htm
> >
> > Related parts are as follows.
> >
> > [WAN.PCP.1]
> >  The RG MUST support Port Control Protocol (PCP) Client as specified in
> RFC 6887
> >
> > [WAN.PCP.7]
> >  The RG MUST embed an interworking function to ensure interworking
> between the UPnP IGD (Internet Gateway Device) used by CPE LAN devices in
> the LAN and PCP as defined in RFC 6970
> >
> > [MGMT.UPnP.IGD.ACRF.1]
> > The RG MUST support UPnP Internet Gateway Device:2 root device. This
> specification is available for download at
> http://upnp.org/specs/gw/UPnP-gw-InternetGatewayDevice-v2-Device.pdf
> >
> > As one of CE router vendor, what should I do?
> > Should I ignore TR-124 because UPnP will be deprecated soon?
> > or should we mention UPnP in some form in RFC 7084bis?
> >
> > As I commented on v6ops WG meeting a while ago, UPnP IGDv2(for IPv6) is
> increasing in Japan.
> > Because our CE router support it, and some gaming title support UPnP
> controll point as well.
> > Syncthing(file sharing app) has also supported UPnP IGDv2.
> > Addition to this, we also recognized UPnP IGDv2 implementation
> increasing in some countries.
> >
> > Please let me know your opinion.
> >
> > Regards,
> > Masanobu
> >
> > ========================
> >  NEC Platforms, Ltd.
> >  KAWASHIMA Masanobu
> >  kawashimam@nec.com
> >  https://www.necplatforms.co.jp/en/
> > ========================
> >
> >
> >
> > > -----Original Message-----
> > > From: Stuart Cheshire <cheshire=40apple.com@dmarc.ietf.org>
> > > Sent: Friday, July 26, 2024 5:33 AM
> > > To: v6ops@ietf.org
> > > Subject: [v6ops] Traffic control protocols (PCP and UPnP IGD)
> > >
> > > In today’s v6ops meeting there was mention of UPnP. Having a way for
> client
> > > devices to signal to network infrastructure what traffic they want to
> receive is a
> > > good idea. However, doing that using the UPnP IGD protocol would be a
> > > disastrously bad idea.
> > >
> > > For a list of the many flaws of UPnP IGD see RFC 6886:
> > >
> > > <https://datatracker.ietf.org/doc/html/rfc6886#section-9>
> > >
> > > This is why the IETF needed to create a robust reliable protocol for
> doing this, Port
> > > Control Protocol:
> > >
> > > <https://datatracker.ietf.org/doc/html/rfc6887>
> > >
> > > If an IETF document is going to recommend or require a way of doing
> this, it should
> > > be using RFC 6887, both because that is an IETF Standards Track
> protocol, and
> > > (more importantly) because of the technical merits of that protocol.
> > >
> > > If the UPnP organization still existed then maybe they could try to
> design a
> > > replacement for IGD that works reliably, but what would be the point
> when the
> > > IETF has already done that?
> > >
> > > Stuart Cheshire
> > >
> > > _______________________________________________
> > > v6ops mailing list -- v6ops@ietf.org
> > > To unsubscribe send an email to v6ops-leave@ietf.org
> > _______________________________________________
> > v6ops mailing list -- v6ops@ietf.org
> > To unsubscribe send an email to v6ops-leave@ietf.org
> > _______________________________________________
> > v6ops mailing list -- v6ops@ietf.org
> > To unsubscribe send an email to v6ops-leave@ietf.org
>
>
>
> _______________________________________________
> v6ops mailing list -- v6ops@ietf.org
> To unsubscribe send an email to v6ops-leave@ietf.org
>
> _______________________________________________
> v6ops mailing list -- v6ops@ietf.org
> To unsubscribe send an email to v6ops-leave@ietf.org
>
>