IETF-83 6renum WG Minutes Tuesday 27th March 2012 Chairs: Tim Chown (tjc@ecs.soton.ac.uk) Wes George (wesley.george@twcable.com) Minute taker: Steven Blake Welcome and administrivia, agenda bashing http://www.ietf.org/proceedings/83/slides/slides-83-6renum-0.pptx - no comments Homenet update; "flash renumbering" - Tim Chown - Discuss fact that home networks may be renumbered more frequently than originally foreseen. - Will discuss with ADs whether some of that work will be addressed in this WG in the future. Enterprise Scenarios draft-ietf-6renum-enterprise-00 - Sheng Jiang http://www.ietf.org/proceedings/83/slides/slides-83-6renum-1.ppt - Wes: "In the case of mixed DHCP?" - Benedict Stockebrand: Let IPv4 die; mixing IPv4 & IPv6 in the context of renumbering, we shouldn't put much effort into addressing it. - Wes: but these configurations exist. - Benedict: better to have separate instances. This is not good practice. - Lee Howard: are we talking about IPv4 information in DHCPv6 response? - Sheng: DS-Lite scenario - Lee: probably want to say something; in scope - Joel J: we won't advance the state of the art, we should take that notion seriously - Tim C: we are not going to fix these issues. Mention in gap analysis that we are not going to fix this here. - Wes: in the case of DS, where IPv4 & IPv6 live on same server, still out-of-scope. - Tim C: re: multicast DNS, proposal in homenet to extend beyond link-local. - Wes: does this draft refer to SEND? - Sheng: think we considered SEND. Security considerations have two levels: one with regular ND, discuss normal issues for ND. - Wes: there are other places where this is discussed, should reference them in this draft. - Sheng: not sure SEND will solve this issue. - Joel J: SEND RFCs describe the problem. Security considerations need to be explicit on the exposure - Sheng: will add reference - Tim: part of the process is managing & monitoring the renumbering - Ilijtch van Beijnum: renumbering nothing more than getting new addresses, forgeting older ones. Could start bogus RA and all hosts would configure new addresses. No protections if DHCP server doesn't renew leases. Why is security suddenly a big issue. - Tim: same security considerations apply. In the general case, agree with what you are saying. - Sheng: nothing new for renumbering. - Benedict: doing anything like DHCPv6 PD in an enterprise environment is not likely. Ok for home nets. Enterprises have professionals; don't want something stupid to happen. Renumbering is dangerous, especially when using fully automatic tools. Would stay away from all mechanisms that take me out of control. - Tim: where does homenet end, and enterprise begin? - Benedict: important distinction is having people around that know what they are doing. - Philip Matthews: small enterprise (DSL service) "flower shop", treat them like a homenet. Large enterprise (static allocation) not going into a BRAS, likely a dedicated router port. Would put filters on DHCPv6 PD option (must be exactly right). - Lee: definition of enterprise not based on access method. In our network, the way we get routing info for cable customers, CMTS watches PD go past; otherwise need to run dynamic routing protocol with customers. - Tim: can we offer two prefixes simultaneously thru a renumbering event. - Lee: currently no; depends on DHCP PD server vendor. - Philip: small == homenet, large often getting different services (L2VPN, L3VPN). - Eric Vyncke: DHCP PD can send another prefix ? - Tim: which is the new prefix, which is the old? - Dan York: enterprise have a control factor (staff). Big enterprises don't want outside factors driving renumbering. - Lan ? (Sweden): DNS root zone signed for at least a year. - Dan: increasing number of domains (~80) signed at the top-level. US govt, Sweden, Czech Republic pushing DNSSEC along. Comcast just turned up DNSSEC validating resolvers. Deploy360 - Benedict: seen a lot of networks where DNS FQDN were not considered an option. Need bootstrapping. If packet filtering uses DNSSEC for routing table, and can reach the DNS server, broken. Will have literal addresses in configurations. Can minimize the use, but can't get away from it. - Tim: starting list of those in the draft. - Benedict: should continue with that list - Dan: what are you looking for DNSSEC to do. - Tim: want to avoid using address literals, want to be able to trust the names - Dan: in the enterprise domain? Wouldn't you have control? - Sheng: talking about enterprise - Dan: not sure about applicability since enterprise has control over its DNS entries - Tim: protect against internal attacker. Example is open campus net - Joel J: lots of use cases for .local entries that do renumber (e.g., printer, Apple TV, etc.). Those cases are worthy of consideration. - Wes: don't worry about exhaustive list of cases. Use FQDN where it is reasonable, list cases where it is not reasonable. Can't come up with a complete list of examples for using FQDN. - Tim: v6ops topic: use link-locals between routers. Might want to consider that. - Tim re: RA Guard: not sure what the question is? - ?: existing implementations of RA Guard. If you renumber, need to change RA Guard configuration (if filter looks at content, not just who sends it). - Sheng: yes - Tim: re: figure: ascii art good, not sure it is important. - Sheng: some suggested that the figure should be more complicated. - Tim: constrainted by current RFC format - Benedict: could have multiple pictures. - Wes: want more reviews of this draft before last call. Gap Analysis draft-ietf-6renum-gap-analysis-01 - Bing Liu http://www.ietf.org/proceedings/83/slides/slides-83-6renum-2.ppt - Tim: any experience in room on TSIG - Benedict: a few years ago, implemented some lab-grade stuff using TSIG Questions remain on using public-key crypto with renumbering, computations of multiple machines updating entries might melt down server. Might want an approach to updating literal addresses. - Ilijtsch: been running dyn DNS server without security for years. Main issue is autoconfiguration. Important to do this, but not specific for this WG; don't have a general solution in IPv6 for reverse DNS w/ temporary addresses. Should revive bit labels in A6 (but won't happen). - Lee: in the past, many of these options weren't available, used access control before allowing a host on the network, then accepted any updates from the host. Good enough approach. - Tim: good stuff - Benedict: comment on Ilijtsh's suggestions: one tool to generate the TSIG key (shell script), have another script to update forward zone. Should be safe. From an enterprise PoV, can be done reasonably well. Tool on my home page. Synchronizes forward & reverse entries. Multicast gaps - Stig Venaas - Tim: are you considering Fred Baker model where two prefixes could be alive for a period of time, or are you assuming rapid cutover. - Stig: more complicated for mcast to have two simultaneous prefixes. - Takebod (sp?): in enterprise don't see MSDP a lot. - Stig: some cases with MSDP (resilience with multiple RPs), shouldn't be a big deal. - Benedict: from what I consider normal, don't expect to see enterprises running mcast to the outside. Providers can't predict traffic rate, which is bad for flat-rate pricing. Also, mcast uses router memory. Use ULAs for mcast rendevous points inside. Problems you are discussing are very special. - Stig: could also use ULAs for mcast sources. Might be issues with address selection. - Benedict: not saying that it is going to be easy. - Tim: interesting observation about using mcast outside site. Not uncommon in university networks. - Stig: cases where mcast is between two domains. - Tim: once you have multiple domains, can't use ULAs. - Benedict: might see this in research network, not in business network. Mcast doesn't scale that well, ISPs won't support it. - Stig: some different opinions on that. Draft will add text on using ULAs. - Benedict: if draft says these are the options, if none are applicable to you, you have a problem. - Takabod (sp?): need to discuss consequences of renumbering for mcast. Source-specific mcast: there are dangers. Static Addresses Problem draft-carpenter-6renum-static-problem-02 - Sheng Jiang http://www.ietf.org/proceedings/83/slides/slides-83-6renum-3.ppt - Philip Matthews: this draft gets to the heart of the problem. Suggests that I can number my loopbacks using ULAs. Could use DHCP or SLAAC for hosts. Don't see how to number host-facing router interfaces. Must be global, want it to renumber. - Ilijtsch: use link-local - Philip: can't ping it to make sure it is alive - Fred Baker: couple of drafts. RFC 4192 (one global prefix to another one). My passive (?) IP draft I wrote. - Philip: don't think this solves the problem - Fred: RFC 4192 addresses having more than one prefix on an interface (make before break). Hard part is making sure new address works with DNS, DHCP. Need to keep services reachable. - Philip: manual effort - Fred: could be scripted. RFC 2xxx protocol; Cisco didn't implement it because of unsolved problems. - Ilijtsch: tested on small Cisco router, in specs, i/fs need global addr. - Tim: see v6ops drafts on using link-local addr on router i/fs. - Bill Manning: DNS hasn't been touched on. Should discuss how to renumber DNS servers. - Fred: when working on RFC 4192, Cisco person took person aside; UPC reader knows address not name of server it reports to. - Bill: ever tried to renumber a root name server? Draft isn't specifically dealing with caching, resolv.conf. Needs more emphasis. - Sheng: Seems this is already documented in gap analysis draft. - Tim: ping the AD. Additional draft here that we are not chartered to produce. Can we adopt this one, or should we extract good text for the other drafts. - Ilijtsch: issue with 2 ISPs, take addresses from ISP A, try to send on ISP B and run into source address filtering. Really need to be able to send packets to the right exit to avoid filtering. - Ron Bonica (AD): work item is about static route configuration problem. No protocol being developed. - Tim: but not in charter currently - Ron: ok, so finish the docs you are chartered to do, then add this draft if/when you recharter. - Tim: so please ask Brian to extract bits from this draft and put in gap analysis draft. New work and next steps - Tim: any additional comments? Will discuss with Wes about issue arising from homenet. Will focus on the two drafts. Meeting adjourned