Re: [v6ops] IPv6-Only Preferred DHCPv4 option

Jen Linkova <furry13@gmail.com> Wed, 04 December 2019 23:26 UTC

Return-Path: <furry13@gmail.com>
X-Original-To: v6ops@ietfa.amsl.com
Delivered-To: v6ops@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 1A00512003E; Wed, 4 Dec 2019 15:26:58 -0800 (PST)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -1.749
X-Spam-Level:
X-Spam-Status: No, score=-1.749 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, DKIM_SIGNED=0.1, DKIM_VALID=-0.1, DKIM_VALID_AU=-0.1, FREEMAIL_ENVFROM_END_DIGIT=0.25, FREEMAIL_FROM=0.001, RCVD_IN_DNSWL_NONE=-0.0001, SPF_HELO_NONE=0.001, SPF_PASS=-0.001] autolearn=no autolearn_force=no
Authentication-Results: ietfa.amsl.com (amavisd-new); dkim=pass (2048-bit key) header.d=gmail.com
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id X91ND-emzqMP; Wed, 4 Dec 2019 15:26:57 -0800 (PST)
Received: from mail-qk1-x729.google.com (mail-qk1-x729.google.com [IPv6:2607:f8b0:4864:20::729]) (using TLSv1.2 with cipher ECDHE-RSA-AES128-GCM-SHA256 (128/128 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id 04B2C12002F; Wed, 4 Dec 2019 15:26:57 -0800 (PST)
Received: by mail-qk1-x729.google.com with SMTP id d124so1677076qke.6; Wed, 04 Dec 2019 15:26:56 -0800 (PST)
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=gmail.com; s=20161025; h=mime-version:references:in-reply-to:from:date:message-id:subject:to :cc:content-transfer-encoding; bh=ylM1iSSKb4oWLjyno2cvBZPqPlRmJUf5VXnN1+KPDIU=; b=D7u3LktprXI2Qbrbe5qQ8SoDqP7YMzHT3i3FLWlxc9BVmaUc8I7V5lOlofqdtJSVqV 3ZQ45KJEWuqM1g4mkKosdQpb26HvA02kAyIsuwG/4guJ7FGSfBdu0897zv5gdE5xZvdd D7NaNGkNzPxpMNf8Ob59fM1jz40uupIpi2+Y+iUv2RJoPHHx0qC6QhLdARs7ZRo+YrtI z2xDN+WMLi6hdcldxjil0oGOaFzRA7PuPdf1JztP22KUpjVXyKL6i4aYD2TKANC6L1IX Q5kLfHmoZJ8wWiAleJfoEbcy15yk5/01XjaR4zkdBEtowGAHr81WG8vPT11z1xfmx8Ca QjJQ==
X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20161025; h=x-gm-message-state:mime-version:references:in-reply-to:from:date :message-id:subject:to:cc:content-transfer-encoding; bh=ylM1iSSKb4oWLjyno2cvBZPqPlRmJUf5VXnN1+KPDIU=; b=R265WXTEkMJJ6qtMdDlYZ3PnLQ5SLlZaG110BxkXUX8oo2nO4lnSbwb/8/Gx0k4J4a BdI2PsUsco2cOF1lu3U8fva+l41DteCrkFOQwK62xURNc+00lphK9FVoo16q36smRgT7 eiPxkwFldrfjgXU0CfiIZfPxlKDsrlMtGBEv+N4N/KsWKSci1wxn3/B3WqB4h6tT2E4P ec7deYK0wca2IyHrjQ/Q3sABlN6h7lSEtMu/xPtudGc1xJU0LwSWzGQa26AfoX4B2+pw FyGi29Rkn/XLvI9hwbYHB+y+vUT8aiVmGQNyDv3ChMizb2tWfo8qSczMcUpXiQNVt/XM HBSw==
X-Gm-Message-State: APjAAAWaelep3YjiniokkxY0xJxnKSLGQa2AQbijYsOc0zY1CQKosJHv cnrXyRakOOFfse9Hav5lPT2VSZ2l0IHE7m3g57s=
X-Google-Smtp-Source: APXvYqzRqEzfj1WESbkCK8/mIZPr7mW9DvuUgrA11oiExHjHArmPFFhL+wL3Lhea23Jbboi9zheEMxTTFsuxz6JaZyc=
X-Received: by 2002:a37:4841:: with SMTP id v62mr5384917qka.444.1575502015568; Wed, 04 Dec 2019 15:26:55 -0800 (PST)
MIME-Version: 1.0
References: <CAFU7BAR1JLUZps=CAqJfeQtUf-xQ88RYvgYrPCP+QP0Ter7YFg@mail.gmail.com> <B1A0DD99-B753-473A-B835-B8BEABE32D54@gmail.com>
In-Reply-To: <B1A0DD99-B753-473A-B835-B8BEABE32D54@gmail.com>
From: Jen Linkova <furry13@gmail.com>
Date: Thu, 05 Dec 2019 10:26:44 +1100
Message-ID: <CAFU7BASBFxAyttE-Eu0KmbqLw19i-k28xdL6CcAa466C5+WCTg@mail.gmail.com>
To: Fred Baker <fredbaker.ietf@gmail.com>
Cc: dhcwg@ietf.org, draft-link-dhc-v6only@ietf.org, V6 Ops List <v6ops@ietf.org>
Content-Type: text/plain; charset="UTF-8"
Content-Transfer-Encoding: quoted-printable
Archived-At: <https://mailarchive.ietf.org/arch/msg/v6ops/y3adgTFXnhC8ovb6jgkwlYVaAio>
Subject: Re: [v6ops] IPv6-Only Preferred DHCPv4 option
X-BeenThere: v6ops@ietf.org
X-Mailman-Version: 2.1.29
Precedence: list
List-Id: v6ops discussion list <v6ops.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/v6ops>, <mailto:v6ops-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/v6ops/>
List-Post: <mailto:v6ops@ietf.org>
List-Help: <mailto:v6ops-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/v6ops>, <mailto:v6ops-request@ietf.org?subject=subscribe>
X-List-Received-Date: Wed, 04 Dec 2019 23:26:58 -0000

On Thu, Dec 5, 2019 at 7:49 AM Fred Baker <fredbaker.ietf@gmail.com> wrote:
> > One of the biggest issue in deploying IPv6-only LANs is how to do it
> > incrementally, when some hosts work just fine in NAT64 environment
> > while some legacy devices still need IPv4.
>
> A general comment - I don't think this is "devices" as much as it is "applications". I'm thinking here of issues raised in RFC 2993 among others.

You are right, it's applications getting broken w/o IPv4 indeed. The
text is saying 'devices' just for the sake of brevity: as a network
engineer I see *devices* connecting to the network, and IPv4 addresses
being assigned to the devices. A device just a box with a number of
applications (+ an OS) running inside.
However there are cases when an application needs an IPv4 address to
operate while the whole device does not. Think of a device with
464XLAT  enabled (e.g. an Android phone). The same application might
work perfectly fine on a mobile phone connected to an IPV6-only WiFi
but gets broken if I run it on my macbook connected to the same
network.

Would it be better if the sentence you quoted would be saying 'while
some legacy devices still need IPv4 addresses as their OSes and/or
applications depend on IPv4'?

> I would argue that NAT64 is subject to the same issues as NAT44; there is a coupling between the network and application layers in that an IP address is used as an application layer identifier, and a coupling between addressing domains in the network in that hosted applications presume that an address they use is meaningful to and means the same to an application in another domain. RFC 3439 talk about coupling primarily in terms of time, but couplings such as I describe are also dangerous, and I would argue that the issues raised in RFC 2993 are direct results of coupling. So, whenever an address is embedded in application data and interpreted or used by the peer application, there will be a NAT issue.
>
> What would I want to do about it? I would not want to see an ALG (to my mind, that works against higher layer security such as TLS or IPSec), but rather see the application use an application layer identifier such as a DNS name.

NAT64 is not perfect and is not a silver bullet but I do not think we
have any better tool right now. At least NAT64 is used for iPv4-only
destinations only so damage is contained (and the footprint will be
reducing over time, I hope).
-- 
SY, Jen Linkova aka Furry