Re: IPv6 Deployment for the LAN

2009-10-18 Thread Mark Smith
On Sun, 18 Oct 2009 09:03:12 +0100
Andy Davidson a...@nosignal.org wrote:

 
 On 18 Oct 2009, at 01:55, Ray Soucy wrote:
  The only solution that lets us expand our roll out IPv6 to the edge  
  without major changes to the production IPv4 network seems to point  
  to making use of DHCPv6, so the effort has been focused there.
 [...]
  Needless to say, the thought of being able to enable IPv6 on a per- 
  host basis is met with far less resistance than opening up the  
  floodgates and letting SLAAC take control.
 
 Hi, Roy --
 
 Good summary, thanks for the write-up.
 
 I reluctantly just use SLAAC on our own office LANs because, we're  
 still quite a small and nimble team, therefore we can secure our  
 network against our SLAAC security concerns by locking down access to  
 the network.  I realise this isn't going to work for everyone, as it  
 doesn't fit well for the security needs of your much larger campus  
 network.  It also doesn't work for some of our customers who have DHCP  
 in their toolbox for provision certain hosting environments.
 
 DHCPv6 today lacks default-router option support, so you are left with  
 some pretty awful choices if you don't want to use the router  
 solicitation/advertisement, err, 'features' in SLAAC :
 

I'm curious what the issue is with not having a default-router option
in DHCPv6?

If it's because somebody could start up a rogue router and announce
RAs, I think a rogue DHCPv6 server is (or will be) just as much a
threat, if not more of one - I think it's more likely server OSes will
include DHCPv6 servers than RA servers.


   - Static route on the device
 - Actually, you could use the *same* link-local address to keep  
 this the same on all devices on your network, which you continue to  
 support long after a better protocol comes along.  This reduces your  
 support overhead.
 
   - end user runs some routing protocol
 - I don't want to give my router the extra work though.  And it  
 feels like a stupid idea.  And end user OSes don't tend to have them  
 installed.
 
   - Don't roll v6 beyond engineering teams, until something better  
 comes along
 - Sadly, I think that this is the option people are taking. :-(
 
 I don't know the history of the process that led to DHCPv6 ending up  
 crippled, and I have to admit that it's not clear how I signal this  
 and to whom, but for the avoidance of doubt: this operator would like  
 his tools back please.  Support default-routing options for DHCPv6 !
 
 Andy
 
 
 
 
 -- 
 Regards, Andy Davidson+44 (0)20 7993 1700www.netsumo.com
 NetSumo Specialist ISP/networks consultancy, Whitelabel 24/7 NOC
 
 



Re: IPv6 Deployment for the LAN

2009-10-18 Thread Nathan Ward

On 18/10/2009, at 9:03 PM, Andy Davidson wrote:

I don't know the history of the process that led to DHCPv6 ending up  
crippled, and I have to admit that it's not clear how I signal this  
and to whom, but for the avoidance of doubt: this operator would  
like his tools back please.  Support default-routing options for  
DHCPv6 !


I think what you really want is an on-link prefix option in DHCPv6. Or  
at least, you'd need that as well as a default router option.


As I've said before, RA does not mean SLAAC. DO NOT use the two words  
interchangeably.


We have two address configuration mechanisms, RA is the transport for  
one (SLAAC) and is the hint to use another (DHCPv6 stateful).

The use of RA does NOT require the use of either mechanism.
Without RA, we don't know which to use, without manual configuration.  
I for one don't want to have to fool around every time I move to a new  
network, and I'm a tech guy.


Can we put this in to a FAQ somewhere, I write this in almost every  
IPv6 thread that comes up on NANOG.




The reason Ray's perceived problem exists is that when using DHCPv6  
stateful for address configuration, you should also include the prefix  
in an RA message. This is because DHCPv6 doesn't give out prefix  
lengths, it only gives out addresses.


There is an option (the A bit) with each prefix in an RA message,  
which says whether this prefix can be used for SLAAC or not (1 =  
SLAAC). Ray's perception (fear?) is that there are some  
implementations that will ignore the contents of this bit, and use the  
prefix for SLAAC regardless.


I'm interested to see if these implementations actually exist, I  
haven't come across any myself or heard of any - but I've not been  
looking.



Anyway, start here for a discussion of prefix lengths in DHCPv6:
http://www.ietf.org/mail-archive/web/dhcwg/current/msg07412.html

--
Nathan Ward




Re: IPv6 Deployment for the LAN

2009-10-18 Thread Nathan Ward

On 18/10/2009, at 9:22 PM, Mark Smith wrote:


I'm curious what the issue is with not having a default-router option
in DHCPv6?


This mechanism is provided by RA.
RA is needed to tell a host to use DHCPv6, so RA is going to be there  
whenever you have DHCPv6.
There's no point putting a default router option in to DHCPv6 at this  
point.



If it's because somebody could start up a rogue router and announce
RAs, I think a rogue DHCPv6 server is (or will be) just as much a
threat, if not more of one - I think it's more likely server OSes will
include DHCPv6 servers than RA servers.



Perhaps, but if you're operating a LAN segment you're going to want to  
filter rouge RA and DHCPv6 messages from your network, just like you  
do with DHCP in IPv4.

Filtering RA and DHCPv6 are done in very similar ways.

--
Nathan Ward




Re: IPv6 Deployment for the LAN

2009-10-18 Thread Chuck Anderson
On Sun, Oct 18, 2009 at 09:29:41PM +1300, Nathan Ward wrote:
 Perhaps, but if you're operating a LAN segment you're going to want to  
 filter rouge RA and DHCPv6 messages from your network, just like you do 
 with DHCP in IPv4.
 Filtering RA and DHCPv6 are done in very similar ways.

Unfortunately, no.  Many/most LAN switches don't support filtering 
IPv6 traffic yet.  Of those that do, most only support TCP/UDP ports 
but not ICMPv6 types or RA specifically.  Therefore, right now it is 
probably easier to find support to filter DHCPv6 (udp source port 547) 
than it is to find support to filter RA.  This is a real problem even 
for people who are not using IPv6 right now and have no desire to use 
IPv6 yet, because Rogue RAs will redirect all IPv6 traffic to a rogue 
box on the LAN, breaking access to dual-stack servers on the Internet.  
The impact is worse when you start trying to roll out IPv6 dual-stack 
to selected servers on your own LAN.



Re: IPv6 Deployment for the LAN

2009-10-18 Thread Nathan Ward

On 18/10/2009, at 9:52 PM, Chuck Anderson wrote:


On Sun, Oct 18, 2009 at 09:29:41PM +1300, Nathan Ward wrote:
Perhaps, but if you're operating a LAN segment you're going to want  
to
filter rouge RA and DHCPv6 messages from your network, just like  
you do

with DHCP in IPv4.
Filtering RA and DHCPv6 are done in very similar ways.


Unfortunately, no.  Many/most LAN switches don't support filtering
IPv6 traffic yet.  Of those that do, most only support TCP/UDP ports
but not ICMPv6 types or RA specifically.  Therefore, right now it is
probably easier to find support to filter DHCPv6 (udp source port 547)
than it is to find support to filter RA.  This is a real problem even
for people who are not using IPv6 right now and have no desire to use
IPv6 yet, because Rogue RAs will redirect all IPv6 traffic to a rogue
box on the LAN, breaking access to dual-stack servers on the Internet.
The impact is worse when you start trying to roll out IPv6 dual-stack
to selected servers on your own LAN.


This is true for now until we get switches with code to do this, and  
also doesn't change my point.


--
Nathan Ward




Re: IPv6 Deployment for the LAN

2009-10-18 Thread Andy Davidson


On 18 Oct 2009, at 09:22, Mark Smith wrote:

If it's because somebody could start up a rogue router and announce  
RAs, I think a rogue DHCPv6 server is (or will be) just as much a  
threat, if not more of one - I think it's more likely server OSes  
will include DHCPv6 servers than RA servers.


Disagree - rogue offers affect people without a lease, so the impact  
of an attack is not immediate.  Filtering DHCP on v4 is well  
understood, an update to current operational practice rather than a  
new system.



On 18 Oct 2009, at 09:29, Nathan Ward wrote:


RA is needed to tell a host to use DHCPv6


This is not ideal.

Andy



Re: IPv6 Deployment for the LAN

2009-10-18 Thread Nathan Ward

On 18/10/2009, at 11:02 PM, Andy Davidson wrote:


On 18 Oct 2009, at 09:29, Nathan Ward wrote:


RA is needed to tell a host to use DHCPv6


This is not ideal.


Why?
Remember RA does not mean SLAAC, it just means RA.

--
Nathan Ward


RE: IPv6 Deployment for the LAN

2009-10-18 Thread TJ
This is a real problem even for people who are not using IPv6 right now and
have no desire to use IPv6 yet, because Rogue RAs will redirect all IPv6
traffic to a rogue 
box on the LAN  

Answer = RA Guard - push your vendor-of-choice to implement it :).



/TJ
-Original Message-
From: Chuck Anderson [mailto:c...@wpi.edu] 
Sent: Sunday, October 18, 2009 4:52 AM
To: nanog@nanog.org
Subject: Re: IPv6 Deployment for the LAN
snip
Unfortunately, no.  Many/most LAN switches don't support filtering 
IPv6 traffic yet.  Of those that do, most only support TCP/UDP ports 
but not ICMPv6 types or RA specifically.  Therefore, right now it is 
probably easier to find support to filter DHCPv6 (udp source port 547) 
than it is to find support to filter RA.  This is a real problem even 
for people who are not using IPv6 right now and have no desire to use 
IPv6 yet, because Rogue RAs will redirect all IPv6 traffic to a rogue 
box on the LAN, breaking access to dual-stack servers on the Internet.  
The impact is worse when you start trying to roll out IPv6 dual-stack 
to selected servers on your own LAN.




RE: IPv6 Deployment for the LAN

2009-10-18 Thread TJ
 RA is needed to tell a host to use DHCPv6
This is not ideal.

That is entirely a matter of opinion, and one frequently debated still.

FWLIW - I think RAs are a perfectly fine way to distribute information about
the router itself, and to provide hints about the environment (e.g. - Yes,
we do Stateful DHCPv6 here (+M, and +O' as well ...)


/TJ



-Original Message-
From: Andy Davidson [mailto:a...@nosignal.org] 
Sent: Sunday, October 18, 2009 6:02 AM
To: NANOG list
Subject: Re: IPv6 Deployment for the LAN


On 18 Oct 2009, at 09:22, Mark Smith wrote:

 If it's because somebody could start up a rogue router and announce  
 RAs, I think a rogue DHCPv6 server is (or will be) just as much a  
 threat, if not more of one - I think it's more likely server OSes  
 will include DHCPv6 servers than RA servers.

Disagree - rogue offers affect people without a lease, so the impact  
of an attack is not immediate.  Filtering DHCP on v4 is well  
understood, an update to current operational practice rather than a  
new system.


On 18 Oct 2009, at 09:29, Nathan Ward wrote:

 RA is needed to tell a host to use DHCPv6

This is not ideal.

Andy




Re: IPv6 Deployment for the LAN

2009-10-18 Thread Owen DeLong


On Oct 18, 2009, at 3:05 AM, Nathan Ward wrote:


On 18/10/2009, at 11:02 PM, Andy Davidson wrote:


On 18 Oct 2009, at 09:29, Nathan Ward wrote:


RA is needed to tell a host to use DHCPv6


This is not ideal.


Why?
Remember RA does not mean SLAAC, it just means RA.

--
Nathan Ward


Because RA assumes that all routers are created equal.
Because RA is harder to filter.
Because the bifercated approach to giving a host router/mask  
information and address information

creates a number of unnecessary new security concerns.

I think those are the top 3.  I can't think of the rest of the list  
off the top of my head as my

brain still thinks it's 5 AM.

Owen




RE: IPv6 Deployment for the LAN

2009-10-18 Thread TJ
Because RA assumes that all routers are created equal.
Because RA is harder to filter.
Because the bifercated approach to giving a host router/mask information and
address information creates a number of unnecessary new security concerns.

Off the top of my head, the easiest answers are:
Default Router Preference, well supported on hosts and routers, doesn't
cover 100% of every corner case, but then again - nothing does :)
RA Guard - push vendors to implement  (otherwise, other
monitoring/preventative measures are available - but 3rd party)
And I still think the router is in a (much) better position to inform hosts
about the router's and link's information than some server three hops ---
that way.


/TJ
-Original Message-
From: Owen DeLong [mailto:o...@delong.com] 
Sent: Sunday, October 18, 2009 8:11 AM
To: Nathan Ward
Cc: NANOG
Subject: Re: IPv6 Deployment for the LAN


On Oct 18, 2009, at 3:05 AM, Nathan Ward wrote:

 On 18/10/2009, at 11:02 PM, Andy Davidson wrote:

 On 18 Oct 2009, at 09:29, Nathan Ward wrote:

 RA is needed to tell a host to use DHCPv6

 This is not ideal.

 Why?
 Remember RA does not mean SLAAC, it just means RA.

 --
 Nathan Ward

Because RA assumes that all routers are created equal.
Because RA is harder to filter.
Because the bifercated approach to giving a host router/mask  
information and address information
creates a number of unnecessary new security concerns.

I think those are the top 3.  I can't think of the rest of the list  
off the top of my head as my
brain still thinks it's 5 AM.

Owen





Re: IPv6 Deployment for the LAN

2009-10-18 Thread Nathan Ward


On 19/10/2009, at 1:10 AM, Owen DeLong wrote:


On Oct 18, 2009, at 3:05 AM, Nathan Ward wrote:


On 18/10/2009, at 11:02 PM, Andy Davidson wrote:


On 18 Oct 2009, at 09:29, Nathan Ward wrote:


RA is needed to tell a host to use DHCPv6


This is not ideal.


Why?
Remember RA does not mean SLAAC, it just means RA.


Because RA assumes that all routers are created equal.


RFC4191


Because RA is harder to filter.


DHCP in IPv4 was hard to filter before vendors implemented it, too.

Because the bifercated approach to giving a host router/mask  
information and address information

creates a number of unnecessary new security concerns.


Security concerns would be useful to explore. Can you expand on this?

--
Nathan Ward


Re: IPv6 Deployment for the LAN

2009-10-18 Thread Kevin Loch

Nathan Ward wrote:


On 19/10/2009, at 1:10 AM, Owen DeLong wrote:


On Oct 18, 2009, at 3:05 AM, Nathan Ward wrote:


On 18/10/2009, at 11:02 PM, Andy Davidson wrote:


On 18 Oct 2009, at 09:29, Nathan Ward wrote:


RA is needed to tell a host to use DHCPv6


This is not ideal.


Why?
Remember RA does not mean SLAAC, it just means RA.


Because RA assumes that all routers are created equal.


RFC4191


In some cases different devices on a segment need a different
default router (for default).  This is the fundamental
problem with RA's, they shotgun the entire segment.




Because RA is harder to filter.


DHCP in IPv4 was hard to filter before vendors implemented it, too.

Because the bifercated approach to giving a host router/mask 
information and address information

creates a number of unnecessary new security concerns.


Security concerns would be useful to explore. Can you expand on this?


What would be useful would be having the option to give a default
router to a dhcpv6 client, and having vrrpv6 work without RA's.
Why can't we have those options in our toolbox in addition to
this continuously evolving RA+hacks?

- Kevin



Re: {SPAM?} Re: IPv6 Deployment for the LAN

2009-10-18 Thread Ray Soucy
I generally agree with the design of RA and using DHPCv6 as a
supplement to it.  The problems here seem to be more along the lines
of implementation in clients.  I suspect it will take some time for
the dust to settle and vendors to get their act together.

I notice that Cisco has a prefix no-autoconfig statement in some
releases in addition to no-advertise.  The code I'm running doesn't
seem to support this yet.  I'll have to dig deeper to see what series
support it and how it interacts with hosts.  If hosts actually do
respect it, it will likely lead to our migration to using /64s, though
a lot will depend on the time tables we can set to move to code that
will support this on our routers.  I do remember seeing some notes
about some implementations of IPv6 simply ignoring that flag for the
prefix, though, so I'm still hesitant to endorse it until I've had a
chance to test a wide variety of hosts in this configuration.

Still, using a prefix other than a /64, but maintaining a migration
path to /64 in the future, seems to be the best way to get IPv6 rolled
out to the edge from a political standpoint.  It's easier to make the
case to extend IPv6 if you can be fairly certain that it won't cause
hosts to suddenly start using IPv6 on their own.  I have yet to run
into an IPv6 implementation that will use SLAAC with a prefix other
than a /64, thankfully.

From what I've been told, Cisco is actively working on RA-gaurd for
their managed switching platforms, which will be nice to see.

Reading a bit of the discussions regarding IPv6 in the Apple world, it
seems that they're after supporting DNS server information in RA using
RFC 5006.  I think RFC 5006 is a very bad idea personally.  DHCPv6 was
designed to work in harmony with RA, and providing host configuration
is beyond the scope of RA.  I hope that we don't start seeing
implementations of this as it will lead to an environment where some
clients support DHCPv6 and some do not.

The SLAAC vs. DHCPv6 war all seems a bit silly.  They're both tools
that are designed to compliment one another, and both have their uses.

DHCPv6 does complicate things with the DUID rather than using the
physical address, but I can appreciate the problems they're trying to
overcome.  It just makes this a little more complicated for those of
us who would like to maintain associations between a hosts IP and IPv6
information in a dual-stack environment.

On Sun, Oct 18, 2009 at 11:45 AM, Kevin Loch kl...@kl.net wrote:
 Nathan Ward wrote:

 On 19/10/2009, at 1:10 AM, Owen DeLong wrote:

 On Oct 18, 2009, at 3:05 AM, Nathan Ward wrote:

 On 18/10/2009, at 11:02 PM, Andy Davidson wrote:

 On 18 Oct 2009, at 09:29, Nathan Ward wrote:

 RA is needed to tell a host to use DHCPv6

 This is not ideal.

 Why?
 Remember RA does not mean SLAAC, it just means RA.

 Because RA assumes that all routers are created equal.

 RFC4191

 In some cases different devices on a segment need a different
 default router (for default).  This is the fundamental
 problem with RA's, they shotgun the entire segment.


 Because RA is harder to filter.

 DHCP in IPv4 was hard to filter before vendors implemented it, too.

 Because the bifercated approach to giving a host router/mask information
 and address information
    creates a number of unnecessary new security concerns.

 Security concerns would be useful to explore. Can you expand on this?

 What would be useful would be having the option to give a default
 router to a dhcpv6 client, and having vrrpv6 work without RA's.
 Why can't we have those options in our toolbox in addition to
 this continuously evolving RA+hacks?

 - Kevin





-- 

Ray Soucy
Communications Specialist

+1 (207) 561-3526

Communications and Network Services

University of Maine System
http://www.maine.edu/



OT: Any PALM e-mail administrators

2009-10-18 Thread Keith Medcalf

I have tried contacting PALM through their listed contact phone numbers and by 
email to their postmaster, all to no avail.

I am having problems with their SMTP servers being unable to communicate with 
my domain configured SMTP server using Mxed addessing (ie, to 
kmedc...@dessus.com) although sending directly to the mail server 
(kmedc...@mail.dessus.com) works correctly.  This issue is limited to PALM and 
their configuration and I cannot duplicate (nor have I ever come across such a 
misconfiguration anywhere else, ever).  Even adding A records directly to the 
domain record itself does not result in success.

I have had no success contacting anyone with clue at palm for about three weeks 
now despite numerous attempts to do so.

Anyone with an internal contact, or if anyone from PALM is here, off-list 
contact info would be appreciated.  (mail sent via PALM SMTP servers will have 
to be sent to the incorrect -- direct mailbox on the SMTP server -- address 
kmedc...@mail.dessus.com or your misconfigured servers will not even attempt to 
send the message).

Now, back to our regularly scheduled programming ...


--
()  ascii ribbon campaign against html e-mail
/\  www.asciiribbon.org






RE: IPv6 Deployment for the LAN

2009-10-18 Thread TJ
 In some cases different devices on a segment need a different
 default router (for default).  This is the fundamental

This capability is also defined, more specific routes - but no one
encouraged any vendors that I know of to support it - so they don't.  Big
demand?


 problem with RA's, they shotgun the entire segment.

As opposed to a standard deployment, where the DHCP server provides the same
information to every host on that link ... ???


 What would be useful would be having the option to give a default
 router to a dhcpv6 client, and having vrrpv6 work without RA's.

These are separate problems.
Host configuration vs. first-hop redundancy, and we can solve them
independently.


 Why can't we have those options in our toolbox in addition to
 this continuously evolving RA+hacks?

You say hacks, others see it as relatively-speaking simple additions of more
functionality.
You can define any options you want for DHCPv6, write a draft and get
community support.
I don't see how that (continuously evolving DHCPv6 hacks) is any better
than what is happening with RAs?



I, for one, am just fine with RAs being the first step - leading to either
SLAAC or (some mode of) DHCPv6 ... 
/TJ




Re: {SPAM?} Re: IPv6 Deployment for the LAN

2009-10-18 Thread Ray Soucy
 And not just Cisco, IIRC it is an open standard anyone can implement ... ?

Here is the work being done on RA-Gaurd:
http://tools.ietf.org/html/draft-ietf-v6ops-ra-guard-03

-- 

Ray Soucy
Communications Specialist

+1 (207) 561-3526

Communications and Network Services

University of Maine System
http://www.maine.edu/



Re: IPv6 Deployment for the LAN

2009-10-18 Thread Nick Hilliard

On 18/10/2009 11:05, Nathan Ward wrote:

Remember RA does not mean SLAAC, it just means RA.


This is not ideal because two protocols are being mandated instead of just 
one: RA for client-side autoconfiguration and DHCPv6 for everything else.


This is pointless.  We have a good working model in ipv4: namely, the 
Joesoap in charge of the LAN decides what addressing parameters are to be 
used on the network, and it all uses a single protocol: dhcpv4.  you can 
filter it out from rogue clients using dhcp-guard on a decent switch, and 
everyone is happy with it.


However, in IPv6, we are being told that this is not good enough: that 
there need to be two protocols, one of which tells the client enough 
information about the network so that the client can choose its own 
address, route packets but not enough to allow DNS (i.e. functional 
internet connectivity).  So then we decided that we needed another protocol 
to give the client everything else that it needed.  And in order to avoid 
egos from tripping over other egos, each camp kept on their own turf: 
dhcp6 was hobbled to the extent that it couldn't feasibly be called a host 
configuration protocol (no default route, no address assignment and no 
subnet size options), and the RA folks at least initially tried to keep 
useful functionality out of the RA spec.


Or at least this was the plan.  Of course, it was a completely broken plan 
for a variety of reasons, including:


- there were two protocols required for stateless network management 
instead of one

- we already had a really good working model in ipv4
- address selection was performed by the client, not the administrator
- we found out in the early 1990s with RIP that you need to be careful 
about announcing default routes, and because you now have to protect 
against two protocols instead of just one, this makes things more difficult
- no-one thought it might be useful to ask the operators what they thought 
about using two protocols instead of one.  Did it ever occur to the people 
defining the standards that most LAN operators are not particularly smart 
people, and that they would have trouble with this?


So, as a result, RA grew about 6 arms and 8 legs (most of them the 
left-side variant), and the DHCPv6 camp continued with their diplomatic 
tip-toeing around the RA camp until one day, someone threw King Looie 
Katz's tail into the dirt: no longer were Hooie, Fooie or Kooie Katz going 
to play nice!  So, now we have protocol proposals in the pipeline that will 
enable DHCPv6 to be sufficient to functionally run stateless address 
configuration rather than to continue to be nothing more than a necessary 
headache.  Hooray!


Of course, there are still several people in ietf-land who think that this 
is all a terrible mistake, and that RA and DHCPv6 should have been 
complementary to each other.  To these people, I will be happy to listen to 
their opinions on condition that they do two things: 1) agree to filter out 
all ethertypes except 0x86dd on their laptops at ietf meetings (and spare 
me the platitudes that they aren't responsible for what the vendors 
implement) and 2) attempt to run a large IPv6 multi-lan network with 
current operating systems and switching gear for a period of one month.


Most seriously, there's not nearly enough eating-one's-own-dog-food going 
on here.


So, if someone in protocol standards-land had actually asked the operators 
what they wanted, they would have been told that they needed a protocol 
which took decisions about addressing and configuration away from the 
client.  You plonk your computer on a lan, and you are told what address to 
use and what configuration parameters to use.  You don't start inventing 
your own, because honestly, it's a pain to manage.


I appreciate there are conflicting views on this particular point;  I've 
heard the arguments and remain entirely unconvinced that RA + anything 
makes for a better stateless host configuration protocol than dhcpv6 will, 
or ought to have from day one.  Meanwhile, because of all this pointless 
bickering about whether dhcpv6 should have had this or that or the other 
option, we're 13 years down the road since ipv6 was defined and we still 
don't have what I would consider to be a sane and fully standardised host 
auto-configuration model.


I find it amusing that sane autoconfiguration was supposed to be one of the 
primary selling points of ipv6 in the first place.


Nick




Re: IPv6 Deployment for the LAN

2009-10-18 Thread Kevin Loch

TJ wrote:

In some cases different devices on a segment need a different
default router (for default).  This is the fundamental


This capability is also defined, more specific routes - but no one
encouraged any vendors that I know of to support it - so they don't.  Big
demand?


by Default I meant 0.0.0.0/0, not more specifics.


problem with RA's, they shotgun the entire segment.


As opposed to a standard deployment, where the DHCP server provides the same
information to every host on that link ... ???


Not always.  The DHCP server can be aware of specific clients by
mac address and give different options (and even pseudo-static IPs).
DHCP server is not always running on a router so adding this 
functionality to routers won't help.


- Kevin



RE: IPv6 Deployment for the LAN

2009-10-18 Thread TJ
  Remember RA does not mean SLAAC, it just means RA.
 
 This is not ideal because two protocols are being mandated instead of
 just
 one: RA for client-side autoconfiguration and DHCPv6 for everything
 else.

Um, DHCPv6 does configure the client - perhaps not until the +M or +O option
is recieved.


 This is pointless.  We have a good working model in ipv4: namely, the
 Joesoap in charge of the LAN decides what addressing parameters are to
 be used on the network, and it all uses a single protocol: dhcpv4.  You
can
 filter it out from rogue clients using dhcp-guard on a decent switch,
 and everyone is happy with it.

And RA Guard will fix it for IPv6.  Did we have DHCP Guard @ day 1?


 However, in IPv6, we are being told that this is not good enough: that
 there need to be two protocols, one of which tells the client enough
 information about the network so that the client can choose its own
 address, route packets but not enough to allow DNS (i.e. functional
 internet connectivity).  So then we decided that we needed another
 protocol
 to give the client everything else that it needed.  And in order to
 avoid
 egos from tripping over other egos, each camp kept on their own turf:
 dhcp6 was hobbled to the extent that it couldn't feasibly be called a
 host
 configuration protocol (no default route, no address assignment and no

Incorrect, DHCPv6 can assign addresses.

 subnet size options), and the RA folks at least initially tried to keep
 useful functionality out of the RA spec.
 
 Or at least this was the plan.  Of course, it was a completely broken
 plan
 for a variety of reasons, including:
 
 - there were two protocols required for stateless network management
 instead of one
 - we already had a really good working model in ipv4

Perhaps, But I submit that good and working do not mean ideal.


 - address selection was performed by the client, not the administrator

If SLAAC is chosen, yes.


 - we found out in the early 1990s with RIP that you need to be careful
 about announcing default routes, and because you now have to protect
 against two protocols instead of just one, this makes things more
 difficult
 - no-one thought it might be useful to ask the operators what they
 thought
 about using two protocols instead of one.  Did it ever occur to the
 people
 defining the standards that most LAN operators are not particularly
 smart
 people, and that they would have trouble with this?

With the addition of RFC5006, you can actually choose just one (once hosts
implement it).
Just not the one you seem to favor.


 So, as a result, RA grew about 6 arms and 8 legs (most of them the
 left-side variant), and the DHCPv6 camp continued with their diplomatic
 tip-toeing around the RA camp until one day, someone threw King Looie
 Katz's tail into the dirt: no longer were Hooie, Fooie or Kooie Katz
 going
 to play nice!  So, now we have protocol proposals in the pipeline that
 will
 enable DHCPv6 to be sufficient to functionally run stateless address
 configuration rather than to continue to be nothing more than a
 necessary
 headache.  Hooray!

And I am OK with all that as well, although THAT also complicates scenarios
for implementers.
(Now hosts will need to support two discrete host-configuration protocols
that actively step on each others' capabilities).


 Of course, there are still several people in ietf-land who think that
 this
 is all a terrible mistake, and that RA and DHCPv6 should have been
 complementary to each other.  To these people, I will be happy to
 listen to
 their opinions on condition that they do two things: 1) agree to filter
 out
 all ethertypes except 0x86dd on their laptops at ietf meetings (and
 spare
 me the platitudes that they aren't responsible for what the vendors
 implement) and 2) attempt to run a large IPv6 multi-lan network with
 current operating systems and switching gear for a period of one month.

I'll filter all non-0x86dd if you filter all non-0x800.
And I will be more successful as you are then blocking ARP :).
The other missing piece of that is most of us aren't going IPv6 ONLY just
yet - so if we need to rely on IPv4 for a bit longer that is, while far from
optimal, atleast kinda OK.  (e.g. - cheating off of IPv4 for DNS).

 
 Most seriously, there's not nearly enough eating-one's-own-dog-food
 going
 on here.

Totally agree there!


 So, if someone in protocol standards-land had actually asked the
 operators
 what they wanted, they would have been told that they needed a protocol
 which took decisions about addressing and configuration away from the
 client.  You plonk your computer on a lan, and you are told what
 address to
 use and what configuration parameters to use.  You don't start
 inventing
 your own, because honestly, it's a pain to manage.

It is still the router, a piece of managed infrastructure sending out the
information - not like we are encouraging hosts to make up their own prefix
info here ... and hosts choosing the low-order bits shouldn't 

Re: IPv6 Deployment for the LAN

2009-10-18 Thread Ray Soucy
Thought this off-list reply would be of interest to many here:

On Sun, Oct 18, 2009 at 1:43 PM, Daniel G. Kluge wrote:

 Hello Ray,
 on the Subject on DHCPv6 for MacOS, there were some discussions on the
 IPv6-dev lists on Apple, with the usual comment from Apple engineers, that
 they are not authorized to discuss plans on product features. If you have a
 substantial MacOS population, I'd recommend to join the discussion, and
 chime in for support of DHCPv6 on MacOS.
 The two recent threads on DHCPv6 are:
 http://lists.apple.com/archives/Ipv6-dev/2009/Sep/msg00018.html
 http://lists.apple.com/archives/Ipv6-dev/2009/Oct/msg3.html
 The first one is from the perspective of service providers, the latter one
 from the perspective of enterprises and educational networks
 Cheers,
 -daniel

I'd like to urge everyone to send in bug reports to Apple as described
in the mailing list posts above requesting DHCPv6 in OS X.

Thank you, Dan.

-- 

Ray Soucy
Communications Specialist

+1 (207) 561-3526

Communications and Network Services

University of Maine System
http://www.maine.edu/



Re: IPv6 Deployment for the LAN

2009-10-18 Thread Matthew Kaufman

TJ wrote:

It is still the router, a piece of managed infrastructure sending out the
information - not like we are encouraging hosts to make up their own prefix
info here ... and hosts choosing the low-order bits shouldn't matter that
much.


But that's the fatal flaw of autoconfiguration. Hosts chosing the 
low-order bits works great until either A) one of those hosts wants a 
semi-permanent name lodged in a DNS server and the IT guy wants to 
semi-permanently assign an IP address to it without having to touch the 
host configuration or B) the RIAA/MPAA/FBI/etc. comes and asks to see 
the logs which show which user on the subnet had a particular address 
and then goes to the local court and claims that you're using this 
newfangled protocol so as to avoid making information available that has 
always been available before.


If *both* of these problems were fixed as well as DHCP fixes them for 
IPv4, there'd be a whole lot more support for letting the hosts choose 
their low-order bits.


Matthew Kaufman



Re: IPv6 Deployment for the LAN

2009-10-18 Thread Steven Bellovin


On Oct 17, 2009, at 8:55 PM, Ray Soucy wrote:


Looking for general feedback on IPv6 deployment to the edge.

As it turns out delivering IPv6 to the edge in an academic setting has
been a challenge.  Common wisdom says to rely on SLAAC for IPv6
addressing, and in a perfect world it would make sense.

Given that historically we have relied on DHCP for a means of NAC and
host registration, like many academic institutions, the idea of
sweeping changes to accommodate IPv6 was just not going to happen in
the near future.


...

My question is this: what are your goals?  What are you trying to  
achieve?  Force all authorized machines to register?  If so, why?   
We'll leave out for now whether or not there's even much point to  
that.  My university -- and I'm just a user of campus computing  
facilities; I don't run them -- has concluded that there's no  
particular benefit to requiring registration or permission; it's one  
more server complex to run, one more database to maintain, and one  
more thing to break, and the benefits don't seem to be worth the  
cost.  And given that we've had incidents of IP and MAC address  
spoofing, where it took the switch logs to figure out what was going  
on, I'm very far from convinced that registration is of any benefit  
anyway.  In other words -- yes, I agree with the campus policy -- but  
that's not the question I'm asking.


I ask because there may be other ways to achieve your actual goal, but  
without knowing that it's hard to make recommendations.  The most  
obvious answer is accountability, but physical port number may be a  
better approach there, depending on how the campus network is run.



--Steve Bellovin, http://www.cs.columbia.edu/~smb








Re: IPv6 Deployment for the LAN

2009-10-18 Thread Ray Soucy
Thanks for the response, if only to force me put my thoughts down into words.

On Sun, Oct 18, 2009 at 4:28 PM, Steven Bellovin s...@cs.columbia.edu wrote:

 ...

 My question is this: what are your goals?  What are you trying to achieve?
  Force all authorized machines to register?  If so, why?  We'll leave out
 for now whether or not there's even much point to that.  My university --
 and I'm just a user of campus computing facilities; I don't run them -- has
 concluded that there's no particular benefit to requiring registration or
 permission; it's one more server complex to run, one more database to
 maintain, and one more thing to break, and the benefits don't seem to be
 worth the cost.  And given that we've had incidents of IP and MAC address
 spoofing, where it took the switch logs to figure out what was going on, I'm
 very far from convinced that registration is of any benefit anyway.  In
 other words -- yes, I agree with the campus policy -- but that's not the
 question I'm asking.

Not my place to implement policy; I'm not a lawyer.  We already have
monitoring in place for accountability that maps each address used on
a network (regardless of IP or IPv6) to a device and interface for
incident response.

The greater concern is that SLAAC makes IPv6 available to hosts that
may not be prepared for it.  If administrators are asked if they would
like IPv6 enabled, having been explained the implications of such if
SLAAC is used for configuration, the majority of the time they come
back and say thanks, but no thanks.  In this situation, SLAAC is
holding back deployment of IPv6.  I suspect other have seen this as
well.

Part of the problem here is that IPv6 isn't new; it's old.
Implementations have been in place for years on certain systems
without proper testing as they have gone largely unused.  We've seen
cases where older versions of Linux can be crashed by enabling SLAAC
on a network being one example.

By using DHCPv6 we gain some advantages: We can automatically update
DNS for hosts so that IPv4 records and IPv6 records match; We have the
ability to roll out DHCPv6 on a per-host basis without causing
problems on the production IP network; and we can roll it in to our
existing [home grown] tools for network management in a way that is
easy for users of the system to understand (keep in mind, we provide
tools to delegate network control to hundreds of sub-administrators
throughout the State).

The original question here wasn't SLAAC vs. DHCPv6.  I think many
network operators here who are tasked with managing anything of scale
will agree that SLAAC doesn't quite cut it and is often a step
backwards.  The overhead of implementing and administering such a
system at this scale generally wins out over not doing so.

The question I was mainly concerned with was if anyone has encountered
issues with the use of an 80-bit prefix to prevent SLAAC from being
active.  While the prefix advertisement does have the autonomous flag
which can be set to false, the underlying problem of IPv6
implementations not being consistent across hosts operating systems
yet doesn't change.  I'm not convinced that there aren't
implementations out there that will enable SLAAC regardless of what
the prefix flag is set to, so using a prefix other than a 64 provides
an easy way to [attempt to] avoid this, all the while allowing for us
to eventually migrate to a 64-bit prefix when host support improves.

Another concern is that we certainly don't want to use SLAAC for
servers, and I'm hesitant to promote the use of manual IP
configuration as it can quickly become a nightmare if you need to move
networks (admittedly there should be less need for network moves, but
all the same).

DHCP has long solved many of these issues in the IP world, and it is
perfectly reasonable, and desirable, to apply them to IPv6 though the
use of DHCPv6.  Perhaps in the future, as we see less legacy hosts
online we'll be in a position to make use of both SLAAC and DHCPv6 for
host configuration, but in all honesty, once DHCPv6 is in place, why
would you want to use SLAAC?

My other question was DHCPv6 support from Apple (who seems to be one
of the few in resistance of DHCPv6).  This list managed to point me in
the right direction to nag them about it.

 I ask because there may be other ways to achieve your actual goal, but
 without knowing that it's hard to make recommendations.  The most obvious
 answer is accountability, but physical port number may be a better approach
 there, depending on how the campus network is run.


                --Steve Bellovin, http://www.cs.columbia.edu/~smb



-- 

Ray Soucy
Communications Specialist

+1 (207) 561-3526

Communications and Network Services

University of Maine System
http://www.maine.edu/



2009.10.18 NANOG47 Community Meeting notes

2009-10-18 Thread Matthew Petach
Here's my notes from tonight's Community Meeting from
NANOG47.  Short and sweet, for those who couldn't
attend in person.  :)

Matt



2009.10.18 NANOG 47 community meeting notes

NOTES:
Joe Provo calls the meeting to order at 1740 hours
Eastern Time.

Welcome to Dearborn, haven't been here since
NANOG 13.  Hotel is very, very different.

Thanks for coming to the community meeting,
and caring enough to show up.

AGENDA:
Steering Committee Report--Joe Provo
Program Committee Report--Dave Meyer
Mailing List Committee Report--Kris Foster
Marketing Working Group Report--Patrick Gilmore
Merit Report--Betty Burke

This is an election meeting, later on in the
session we'll have candidates for SC come up
to speak for a few minutes.

The mics are live, they want a dialog, not a
lecture.

Steering committee members have
blue badges.
Betty Burke
Steve Feldman
Kris Foster
Patrick. W. Gilmore,

etc.

Highlights since NANOG 46
elusive network experiment policy reached fruition
annual Postel scholarship was awarded (could use
 additional funding to allow it to continue)
Operator of Tomorrow partnership
Preparation for this meeting
Work on future meetings.  Austin, San Francisco, Atlanta
 finalized and published--next three are in the pipeline
Elections--why this is so brief!
 SC candidates will have a few minutes each here during
  the Elections portion
 SC and charter ballot voting is open
 So are PC and MLC nominations.

Get your nominations in now, if you know people who
can help contribute.

nominati...@nanog.org

program committee--Dave Meyer
review process -- 47 talks, 80 submitted.
People submit great ideas, but never submit slides
or even outline slides.
Program committee openings
questions for us?

If you know people who would be good for the PC,
please nominate them; it takes some amount of
time committment, but it's an essential part of
making the meetings happen.
They try to rate the talks based on what is
submitted, but at times, the material submitted
is very light, and the final slides don't arrive
until very late.

They had submissions that weren't complete; why
not turn them into lightning talks?

That's generally what they do with the short/incomplete
ones.

Louie--of the people who submitted good topics,
they might not want to do the work until they
know their outline was accepted...
They are notified that their talk has been accepted
so they can work on it.

Ren notes that sometimes they get similar topics,
so they might try to get the two sets of people
to work together.

Todd Underwood, for context, he'll note that it's
a standoff--really good presenters playing chicken
with the program committee.

If the narrative of the story isn't in the slides,
nobody who doesn't know you will understand it
from just the slides; you'll need to give some
idea of the narrative along with the slides.

And the archives are hugely important; make sure
the presentation tells the story even if you
aren't presenting it.

Josh, Rodney, Lane, Todd, and others have done
a great job over the years supporting the
meetings and reading through

Joel Jaeggli, outgoing PC member...the people leaving
have generally been around for 2 years.  They've
been around since the new charter was instituited.

Procedures within the PC remain adhoc but not arbitrary
 reliance on precedent
 willingness on the part of participants to routinely
  alter the division of labour
 responsive to SC input, but not beholden to them
  (within limits)
Transparency
 The minutes are out there, but nobody but Martin
 Hannigan reads them...and he stands up to say even
 he doesn't do that anymore.

Points of Friction over the past few years.
EArlier availability of agenda:
 means CFP is earlier, ability to respond to industry
  events is more constrained, etc.
programming of joint activities
 ARIN
 SC
Distributing ownership of repeating program
 elements and increasing depth of the bench
inclusivenes
new program elements.

Big Wins
Lightning Talks
 more breadth in presentations now
Peering track
 better representation from more people
Newcomers (Ren)
Program quality

MLC members
Randy Epstein
Steve Feldman -- SC liason
Kris Foster -- Chair
Sue Joiner -- Merit Appointee
Simon Lyall

Updates
Policies were updated in August to reflect the thread
 moderation policy
http://www.nanog.org/mailinglist/warningpolicy.php

If you have questions/issues with it, raise them
on nanog-futures mailing list.

Very light since last meeting.  A few thread
moderations, but not many.
10,448 subscribers currently on the list.

Volunteers needed
Kris Foster and Simon Lyall's terms are ending
Possibly a third seat opening up depending on
 what gets decided later.

If you don't subscribe, read, or post, please tell
us why!


Marketing Working Group Report -- Patrick

What is it?
Email updates are sent to NANOG-futures
Idea is to raise more money to reduce costs.
Need a new chair!

New ideas for NANOG 47 and onward
Party Promotion
 party on agenda, tickets handed out at registration
 

Re: OT: Any PALM e-mail administrators

2009-10-18 Thread Gary E. Miller
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA1

Yo Keith!

On Sun, 18 Oct 2009, Keith Medcalf wrote:

 I have tried contacting PALM through their listed contact phone
 numbers and by email to their postmaster, all to no avail.

Contact me off list.  I have been working this problem for over a month
and have some contact info.

RGDS
GARY
- ---
Gary E. Miller Rellim 109 NW Wilmington Ave., Suite E, Bend, OR 97701
g...@rellim.com  Tel:+1(541)382-8588

-BEGIN PGP SIGNATURE-
Version: GnuPG v1.4.3 (GNU/Linux)

iD8DBQFK25+xBmnRqz71OvMRAuyxAKDQ6bKTNL82vgLGwHt2/lsgMCEcAQCg3fhB
n2IDndq+ek32I+dyFUISjJc=
=sDjJ
-END PGP SIGNATURE-




Re: IPv6 Deployment for the LAN

2009-10-18 Thread Chuck Anderson
On Sun, Oct 18, 2009 at 01:29:54PM -0400, TJ wrote:
 You say hacks, others see it as relatively-speaking simple additions of more
 functionality.
 You can define any options you want for DHCPv6, write a draft and get
 community support.
 I don't see how that (continuously evolving DHCPv6 hacks) is any better
 than what is happening with RAs?

The difference is that I don't have to wait for my switch/router 
vendor to implement RA extensions, I can just implement it myself in 
an open source DHCPv6 server.  Software that is embedded in hardware 
is very hard to get changed.