Re: [Softwires] [v4tov6transition] 6a44 MTU issues

2010-10-14 Thread Rémi Després

Le 13 oct. 2010 à 22:04, Templin, Fred L a écrit :
 ...
 If IPv6 packets longer than 1280 would be accepted by 6a44 
 servers, hosts could receive them in fragmented IPv4 datagrams.
 
 Or they might be reassembled in the NAT(s) in front of
 the host.
 They would indeed.
 But they would then be forwarded across the customer network.
 There, they may somewhere be fragmented to fit into fragments 
 shorter than the ISP MTU + 28.
 This happens for example if the ISP IPv6 MTU would be 1500-28 
 and that of some link in the customer site would be 1500-40 
 (say, for an IPv4 in IPv6 tunnel). 
 Right?
 
 The fact of life is that we have the ISP managed network
 domain and the end user network unmanaged network domain,
 whether the ISP controls the CPE or not. The managed domain
 should be well-behaved, but any manner of MTU irregularities
 is possible within the unmanaged domain. For example, I can
 login to my Linksys home router and manually set the MTU to
 any value I want.
 
 Anything that can be configured can be mis-configured, and
 the ISP has no control of any misconfigurations that might
 occur in the end user network. As far as the ISP can tell,
 the end user network is just a black hole that silently
 consumes packets. 

The point isn't about misconfigurations.
It is that stateless tunnels (i.e. without SEAL ...) are legitimate within 
customer sites.
They can lead some intra-site IPv4 PMTUs that are less than 1500, and even less 
than 1500 - 28.

Then, because the 6a44 design privileges robustness, it is better to avoid more 
constraints on intra-site PMTUs than those that are absolutely mandatory.
In order to statelessly support IPv6/UPD/IPV4 packets intra-site IPv4 PMTUs of 
1280 + 8 + 20 = 1308 octets IS the obligation (one that should be satisfied 
with all realistic stateless tunnels in customer sites).

RD



___
Softwires mailing list
Softwires@ietf.org
https://www.ietf.org/mailman/listinfo/softwires


Re: [Softwires] [v4tov6transition] IPv6 VPNs configured over 1280 MTU tunnels

2010-10-14 Thread Washam Fan
Hi Fred,

Please see inline. I did have some different assumptions. And those
assumptions might be wrong. It might be better at this stage we let
the tunneled IPv6 MTU be 1280 and tunneling IPv4 MTU not less than
1308.

2010/10/13 Templin, Fred L fred.l.temp...@boeing.com:
 Hi Washam,

 -Original Message-
 From: Washam Fan [mailto:washam@gmail.com]
 Sent: Monday, October 11, 2010 10:48 PM
 To: Templin, Fred L
 Cc: Rémi Després; Softwires; v4tov6transit...@ietf.org
 Subject: Re: [v4tov6transition] IPv6 VPNs configured over
 1280 MTU tunnels

 Hi Fred,

 I might see your points.

 Good.

 Let H represents Host, N represents NAT, S represents the 6a44
 servers. PMTU(H,S) stands for the PMTU between H and S. HOME_MTU
 represents MTU within home LAN (i.e., unmanaged network), SP_MTU
 represents MTU within SP network(i.e., managed network). We assume
 both SP_MTU and SP_MTU should exceed or equal to 1308.

 This is an incomplete characterization. PMTU is not
 necessarily symmetric, e.g., even just within the end
 user it could be different in the H-N direction than
 in the N-H direction. Also, there could be multiple N's
 in the path; each imparting their own MTU uncertainties.

I assume H-N-S PMTU can be probed, Ns in between should be capable
of translating ICMPv4 messages appropriately. As you said, S-N-H can
not be probed as Ss are stateless.

 if HOME_MTU=SP_MTU, PMTU(H,S)=SP_MTU, the H could configure SP_MTU-28
 as the IPv6 virtual interface MTU.

 A couple of things here. First, you seem to be assuming a
 static S instead of a redundantly replicated S with anycast,
 where there may be many distinct paths with varing SP_MTUs to
 reach the multiple S's.

I assume all Ss shared the same MTUs since they are located in managed
networks. Or the MTU on their interfaces attaching SP networks can be
configured with the least IPv4 MTU value.

 Second, how does H discover SP_MTU;
 by engaging in an initial probing by sending large packets
 and getting a PTB message back?

I assume H can discover PMTU traversing Ns in between.

 Again, this won't give a
 deterministic SP_MTU value if  S is replicated across paths
 with varying PMTUs.

I assume all Ss configured with the same MTUs on their interfaces
attaching to SP networks.

 H-S direction: if S received or trigger any ICMPv6 PTB messages, it
 can forward ICMPv6-in-UDP-in-IPv4 to H.

 You keep saying this, and I keep saying that you are right
 but that this has never been a matter for concern. PMTUD
 *beyond* the tunnel is not in question; it is only PMTUD
 *within* the tunnel that bears further discussion.

 S-H direction: S would reject any IPv6 packets exceeding SP_MTU-28
 with ICMPv6 PTB.
 I don't see problems here.

 Huh? Is S supposed to cache the SP_MTU to each and every
 potential host H? I assume the goal is for a completely
 stateless S - right?

I assume MTU is statically configured on Ss' interfaces attaching the
SP networks.

 If HOME_MTUSP_MTU,PMTU(H,S)=HOME_MTU, the H could configure
 HOME_MTU-28 as IPv6 virtual interface MTU.

 So again, H could discover this only by sending probes?
 And again, any probing would be non-deterministic if S
 is an anycast (and not unicast) address.

See above.

Thanks,
washam

 H-S direction: if S received or trigger any ICMPv6 PTB messages, it
 can forward ICMPv6-in-UDP-in-IPv4 to H.

 Yes, we have confirmed this several times now; not
 a point in question.

 I don't expect the size of the encapsulated packet is too much.

 Encapsulated PTB could be as big as 1280 + 20 + 8.

 S-H direction: if S forward some IPv6 packets whose size is between
 HOME_MTU-28 and SP_MTU-28, N might trigger a ICMPv4 PTB or filtering
 them. For the former, S might don't have enough info to infer which
 IPv6 original packet it is related,

 Right.

 for the latter, black hole might occur. I see problems here.

 Right.

 Fred
 fred.l.temp...@boeing.com

 Thanks,
 washam

 2010/10/12 Templin, Fred L fred.l.temp...@boeing.com:
  Hi Washam,
 
  -Original Message-
  From: Washam Fan [mailto:washam@gmail.com]
  Sent: Monday, October 11, 2010 7:38 PM
  To: Templin, Fred L
  Cc: Rémi Després; Softwires; v4tov6transit...@ietf.org
  Subject: Re: [v4tov6transition] IPv6 VPNs configured over
  1280 MTU tunnels
 
  Hi,
 
  If 6a44 deployed in a managed ISP network, the 6a44 client could be
  configured with IPv4_MTU-28 for its IPv6 MTU.
 
  My understanding is that the 6a44 server is in the managed
  ISP network, and the 6a44 client is in the UNmanaged end
  user network.
 
  For inbound direction,
  6a44 server would reject any IPv6 packets whose size exceeds
  IPv4_MTU-28 with a ICMPv6 PTB message, so no ICMPv6-ICMPv4
 translation
  needed.
 
  Huh? How does the server have any idea what MTU the client
  set on its tunnel interface? The client is behind a NAT in
  an unmanaged end user network. Are you expecting the server
  to probe the path MTU to the client and maintain state? (An
  IRON server might be in position to do 

Re: [Softwires] [v4tov6transition] 6a44 MTU issues

2010-10-14 Thread Templin, Fred L
Hi Remi, 

 -Original Message-
 From: Rémi Després [mailto:remi.desp...@free.fr] 
 Sent: Thursday, October 14, 2010 12:09 AM
 To: Templin, Fred L
 Cc: Softwires; v4tov6transit...@ietf.org
 Subject: Re: [Softwires] [v4tov6transition] 6a44 MTU issues
 
 
 Le 13 oct. 2010 à 22:04, Templin, Fred L a écrit :
  ...
  If IPv6 packets longer than 1280 would be accepted by 6a44 
  servers, hosts could receive them in fragmented IPv4 datagrams.
  
  Or they might be reassembled in the NAT(s) in front of
  the host.
  They would indeed.
  But they would then be forwarded across the customer network.
  There, they may somewhere be fragmented to fit into fragments 
  shorter than the ISP MTU + 28.
  This happens for example if the ISP IPv6 MTU would be 1500-28 
  and that of some link in the customer site would be 1500-40 
  (say, for an IPv4 in IPv6 tunnel). 
  Right?
  
  The fact of life is that we have the ISP managed network
  domain and the end user network unmanaged network domain,
  whether the ISP controls the CPE or not. The managed domain
  should be well-behaved, but any manner of MTU irregularities
  is possible within the unmanaged domain. For example, I can
  login to my Linksys home router and manually set the MTU to
  any value I want.
  
  Anything that can be configured can be mis-configured, and
  the ISP has no control of any misconfigurations that might
  occur in the end user network. As far as the ISP can tell,
  the end user network is just a black hole that silently
  consumes packets. 
 
 The point isn't about misconfigurations.
 It is that stateless tunnels (i.e. without SEAL ...) are 
 legitimate within customer sites.
 They can lead some intra-site IPv4 PMTUs that are less than 
 1500, and even less than 1500 - 28.

No; the point is that (without a deterministic MTU discovery
scheme) you can't control the few end user networks that set
a 1308 MTU so the vast majority of end user networks that
set a 1500+ MTU are made to suffer.

Fred
fred.l.temp...@boeing.com

 Then, because the 6a44 design privileges robustness, it is 
 better to avoid more constraints on intra-site PMTUs than 
 those that are absolutely mandatory.
 In order to statelessly support IPv6/UPD/IPV4 packets 
 intra-site IPv4 PMTUs of 1280 + 8 + 20 = 1308 octets IS the 
 obligation (one that should be satisfied with all realistic 
 stateless tunnels in customer sites).
 
 RD
 
 
 
 
___
Softwires mailing list
Softwires@ietf.org
https://www.ietf.org/mailman/listinfo/softwires


Re: [Softwires] [v4tov6transition] IPv6 VPNs configured over 1280 MTU tunnels

2010-10-14 Thread Templin, Fred L
Hi Washam, 

 -Original Message-
 From: Washam Fan [mailto:washam@gmail.com] 
 Sent: Thursday, October 14, 2010 5:50 AM
 To: Templin, Fred L
 Cc: Rémi Després; Softwires; v4tov6transit...@ietf.org
 Subject: Re: [v4tov6transition] IPv6 VPNs configured over 
 1280 MTU tunnels
 
 Hi Fred,
 
 Please see inline. I did have some different assumptions. And those
 assumptions might be wrong. It might be better at this stage we let
 the tunneled IPv6 MTU be 1280 and tunneling IPv4 MTU not less than
 1308.

All of your assumptions are lowest-common-denominator.
All end user networks are made to suffer because of the
few that are poorly configured. GigE is a current day
reality, and MTUs much larger than the lowest common
denominator should be made available to the end user
networks that paid good money for them when possible.

Fred
fred.l.temp...@boeing.com

 2010/10/13 Templin, Fred L fred.l.temp...@boeing.com:
  Hi Washam,
 
  -Original Message-
  From: Washam Fan [mailto:washam@gmail.com]
  Sent: Monday, October 11, 2010 10:48 PM
  To: Templin, Fred L
  Cc: Rémi Després; Softwires; v4tov6transit...@ietf.org
  Subject: Re: [v4tov6transition] IPv6 VPNs configured over
  1280 MTU tunnels
 
  Hi Fred,
 
  I might see your points.
 
  Good.
 
  Let H represents Host, N represents NAT, S represents the 6a44
  servers. PMTU(H,S) stands for the PMTU between H and S. HOME_MTU
  represents MTU within home LAN (i.e., unmanaged network), SP_MTU
  represents MTU within SP network(i.e., managed network). We assume
  both SP_MTU and SP_MTU should exceed or equal to 1308.
 
  This is an incomplete characterization. PMTU is not
  necessarily symmetric, e.g., even just within the end
  user it could be different in the H-N direction than
  in the N-H direction. Also, there could be multiple N's
  in the path; each imparting their own MTU uncertainties.
 
 I assume H-N-S PMTU can be probed, Ns in between should be capable
 of translating ICMPv4 messages appropriately. As you said, S-N-H can
 not be probed as Ss are stateless.
 
  if HOME_MTU=SP_MTU, PMTU(H,S)=SP_MTU, the H could 
 configure SP_MTU-28
  as the IPv6 virtual interface MTU.
 
  A couple of things here. First, you seem to be assuming a
  static S instead of a redundantly replicated S with anycast,
  where there may be many distinct paths with varing SP_MTUs to
  reach the multiple S's.
 
 I assume all Ss shared the same MTUs since they are located in managed
 networks. Or the MTU on their interfaces attaching SP networks can be
 configured with the least IPv4 MTU value.
 
  Second, how does H discover SP_MTU;
  by engaging in an initial probing by sending large packets
  and getting a PTB message back?
 
 I assume H can discover PMTU traversing Ns in between.
 
  Again, this won't give a
  deterministic SP_MTU value if  S is replicated across paths
  with varying PMTUs.
 
 I assume all Ss configured with the same MTUs on their interfaces
 attaching to SP networks.
 
  H-S direction: if S received or trigger any ICMPv6 PTB 
 messages, it
  can forward ICMPv6-in-UDP-in-IPv4 to H.
 
  You keep saying this, and I keep saying that you are right
  but that this has never been a matter for concern. PMTUD
  *beyond* the tunnel is not in question; it is only PMTUD
  *within* the tunnel that bears further discussion.
 
  S-H direction: S would reject any IPv6 packets exceeding SP_MTU-28
  with ICMPv6 PTB.
  I don't see problems here.
 
  Huh? Is S supposed to cache the SP_MTU to each and every
  potential host H? I assume the goal is for a completely
  stateless S - right?
 
 I assume MTU is statically configured on Ss' interfaces attaching the
 SP networks.
 
  If HOME_MTUSP_MTU,PMTU(H,S)=HOME_MTU, the H could configure
  HOME_MTU-28 as IPv6 virtual interface MTU.
 
  So again, H could discover this only by sending probes?
  And again, any probing would be non-deterministic if S
  is an anycast (and not unicast) address.
 
 See above.
 
 Thanks,
 washam
 
  H-S direction: if S received or trigger any ICMPv6 PTB 
 messages, it
  can forward ICMPv6-in-UDP-in-IPv4 to H.
 
  Yes, we have confirmed this several times now; not
  a point in question.
 
  I don't expect the size of the encapsulated packet is too much.
 
  Encapsulated PTB could be as big as 1280 + 20 + 8.
 
  S-H direction: if S forward some IPv6 packets whose size 
 is between
  HOME_MTU-28 and SP_MTU-28, N might trigger a ICMPv4 PTB or 
 filtering
  them. For the former, S might don't have enough info to infer which
  IPv6 original packet it is related,
 
  Right.
 
  for the latter, black hole might occur. I see problems here.
 
  Right.
 
  Fred
  fred.l.temp...@boeing.com
 
  Thanks,
  washam
 
  2010/10/12 Templin, Fred L fred.l.temp...@boeing.com:
   Hi Washam,
  
   -Original Message-
   From: Washam Fan [mailto:washam@gmail.com]
   Sent: Monday, October 11, 2010 7:38 PM
   To: Templin, Fred L
   Cc: Rémi Després; Softwires; v4tov6transit...@ietf.org
   Subject: Re: 

Re: [Softwires] [v4tov6transition] IPv6 VPNs configured over 1280 MTU tunnels

2010-10-14 Thread Brian E Carpenter
Fred,

 All of your assumptions are lowest-common-denominator.

What else can an operator safely do but make such assumptions?

Regards
   Brian

On 2010-10-15 02:08, Templin, Fred L wrote:
 Hi Washam, 
 
 -Original Message-
 From: Washam Fan [mailto:washam@gmail.com] 
 Sent: Thursday, October 14, 2010 5:50 AM
 To: Templin, Fred L
 Cc: Rémi Després; Softwires; v4tov6transit...@ietf.org
 Subject: Re: [v4tov6transition] IPv6 VPNs configured over 
 1280 MTU tunnels

 Hi Fred,

 Please see inline. I did have some different assumptions. And those
 assumptions might be wrong. It might be better at this stage we let
 the tunneled IPv6 MTU be 1280 and tunneling IPv4 MTU not less than
 1308.
 
 All of your assumptions are lowest-common-denominator.
 All end user networks are made to suffer because of the
 few that are poorly configured. GigE is a current day
 reality, and MTUs much larger than the lowest common
 denominator should be made available to the end user
 networks that paid good money for them when possible.
 
 Fred
 fred.l.temp...@boeing.com
 
 2010/10/13 Templin, Fred L fred.l.temp...@boeing.com:
 Hi Washam,

 -Original Message-
 From: Washam Fan [mailto:washam@gmail.com]
 Sent: Monday, October 11, 2010 10:48 PM
 To: Templin, Fred L
 Cc: Rémi Després; Softwires; v4tov6transit...@ietf.org
 Subject: Re: [v4tov6transition] IPv6 VPNs configured over
 1280 MTU tunnels

 Hi Fred,

 I might see your points.
 Good.

 Let H represents Host, N represents NAT, S represents the 6a44
 servers. PMTU(H,S) stands for the PMTU between H and S. HOME_MTU
 represents MTU within home LAN (i.e., unmanaged network), SP_MTU
 represents MTU within SP network(i.e., managed network). We assume
 both SP_MTU and SP_MTU should exceed or equal to 1308.
 This is an incomplete characterization. PMTU is not
 necessarily symmetric, e.g., even just within the end
 user it could be different in the H-N direction than
 in the N-H direction. Also, there could be multiple N's
 in the path; each imparting their own MTU uncertainties.
 I assume H-N-S PMTU can be probed, Ns in between should be capable
 of translating ICMPv4 messages appropriately. As you said, S-N-H can
 not be probed as Ss are stateless.

 if HOME_MTU=SP_MTU, PMTU(H,S)=SP_MTU, the H could 
 configure SP_MTU-28
 as the IPv6 virtual interface MTU.
 A couple of things here. First, you seem to be assuming a
 static S instead of a redundantly replicated S with anycast,
 where there may be many distinct paths with varing SP_MTUs to
 reach the multiple S's.
 I assume all Ss shared the same MTUs since they are located in managed
 networks. Or the MTU on their interfaces attaching SP networks can be
 configured with the least IPv4 MTU value.

 Second, how does H discover SP_MTU;
 by engaging in an initial probing by sending large packets
 and getting a PTB message back?
 I assume H can discover PMTU traversing Ns in between.

 Again, this won't give a
 deterministic SP_MTU value if  S is replicated across paths
 with varying PMTUs.
 I assume all Ss configured with the same MTUs on their interfaces
 attaching to SP networks.

 H-S direction: if S received or trigger any ICMPv6 PTB 
 messages, it
 can forward ICMPv6-in-UDP-in-IPv4 to H.
 You keep saying this, and I keep saying that you are right
 but that this has never been a matter for concern. PMTUD
 *beyond* the tunnel is not in question; it is only PMTUD
 *within* the tunnel that bears further discussion.

 S-H direction: S would reject any IPv6 packets exceeding SP_MTU-28
 with ICMPv6 PTB.
 I don't see problems here.
 Huh? Is S supposed to cache the SP_MTU to each and every
 potential host H? I assume the goal is for a completely
 stateless S - right?
 I assume MTU is statically configured on Ss' interfaces attaching the
 SP networks.

 If HOME_MTUSP_MTU,PMTU(H,S)=HOME_MTU, the H could configure
 HOME_MTU-28 as IPv6 virtual interface MTU.
 So again, H could discover this only by sending probes?
 And again, any probing would be non-deterministic if S
 is an anycast (and not unicast) address.
 See above.

 Thanks,
 washam

 H-S direction: if S received or trigger any ICMPv6 PTB 
 messages, it
 can forward ICMPv6-in-UDP-in-IPv4 to H.
 Yes, we have confirmed this several times now; not
 a point in question.

 I don't expect the size of the encapsulated packet is too much.
 Encapsulated PTB could be as big as 1280 + 20 + 8.

 S-H direction: if S forward some IPv6 packets whose size 
 is between
 HOME_MTU-28 and SP_MTU-28, N might trigger a ICMPv4 PTB or 
 filtering
 them. For the former, S might don't have enough info to infer which
 IPv6 original packet it is related,
 Right.

 for the latter, black hole might occur. I see problems here.
 Right.

 Fred
 fred.l.temp...@boeing.com

 Thanks,
 washam

 2010/10/12 Templin, Fred L fred.l.temp...@boeing.com:
 Hi Washam,

 -Original Message-
 From: Washam Fan [mailto:washam@gmail.com]
 Sent: Monday, October 11, 2010 7:38 PM
 To: Templin, Fred L
 Cc: Rémi 

Re: [Softwires] Call for agenda items

2010-10-14 Thread Sheng Jiang
Hi, Alain  David,

We'd like to have a time slot for a presentation in IETF 79.

 1. Draft name: draft-guo-softwire-sc-discovery
 2. Time requested: 5~10 mins
 3. Presenter: Sheng Jiang

This is the fourth time we present this draft. This draft has also been 
reviewed by DHC working
group. All received comments has been addressed. We'd like to ask the WG 
adoption during IETF 79.

Best regards,

Sheng

 -Original Message-
 From: softwires-boun...@ietf.org 
 [mailto:softwires-boun...@ietf.org] On Behalf Of Alain Durand
 Sent: Friday, October 15, 2010 7:32 AM
 To: Softwires list
 Subject: [Softwires] Call for agenda items
 
 This is a call for agenda items for the upcoming meeting in Beijing.
 Please send request directly  the chairs.
 
 Alain  David, co-chairs.
 ___
 Softwires mailing list
 Softwires@ietf.org
 https://www.ietf.org/mailman/listinfo/softwires

___
Softwires mailing list
Softwires@ietf.org
https://www.ietf.org/mailman/listinfo/softwires


Re: [Softwires] DHCPv6 AFTR name option is needed

2010-10-14 Thread Ted Lemon
On Oct 14, 2010, at 1:13 AM, Maglione Roberta wrote:
 In the specific case being able to provide load-balancing and redundancy in 
 DS-Lite scenario is a requirement for us, thus I would like to see a solution 
 for this coming from IETF.

So your requirement is to have load balancing, not to have DNS, correct?

___
Softwires mailing list
Softwires@ietf.org
https://www.ietf.org/mailman/listinfo/softwires


Re: [Softwires] DHCP option for DS-lite

2010-10-14 Thread mohamed.boucadair

David (document shepherd), Jari, all,

   In can answer to the technical questions, but before that let
   position this discussion in its context in the overall process
   (softwire should follow the ietf process).  Below a reminder of the
   main steps for the adoption of this document:

   o  First of all, this document is the proprietary of the working group
  and should reflect the consensus of the working group not the
  opinions of the authors neither the chairs.

   o  The working group reached a consensus on the version, available at
  http://tools.ietf.org/html/
  draft-ietf-softwire-ds-lite-tunnel-option-03.  During the last
  call I didn't remember comments about the name option.

   o  Dave Ward who is the document shepherd mentioned the following in
  his note (available on the tracker):

 (1) We saw evidence of extensive review on the mailing list.
 The documents has been presented in softwires, v6ops, and dhc
 working groups.

 (2) the document has strong support in the WG.

 (3) This is strictly a protocol specification.  We believe
 that an operational document discussing some of the various
 tradeoffs and choices when deploying DS-Lite would be
 valuable.

   o  According to the IETF tracker, a Go Ahead has been received from
  R. Droms on August, 5th.  I understand this as Ralph has no
  technical issue with the content of the document.

   o  According to the IETF tracker, Jari raised the following comment:

 This document is ready to move forward.  However, there is one
 issue that I would like to briefly discuss before recommending
 the final approval of the RFC.  We have been pushing back in
 other cases when people defined both FQDN and IP address
 information for the same configuration item in DHCP.  Why are
 two options and configuration mechanisms absolutely necessary
 in this case?  Wouldn't IP-address based configuration suffice?
 

   o  The comment from Jari is valid and the document should justify why
  two options are needed.  This is even surprising because D.
  Hankins is also the author of
  http://tools.ietf.org/html/draft-ietf-dhc-option-guidelines since
  2007.  This is issue in not new for him.

   o  The authors on their own (or with the document shepherd, I don't
  know) decided to remove the name option **without** asking the
  working group's opinion.  No notification has been sent on the
  mailing list to notify or to justify this IMPORTANT change to the
  document.

   At least two representatives of service providers reiterated the need
   of the name option for high availability and load balancing reasons.
   We can provide Jari with more details if required.  Since the authors
   already maintained the IP address I believe they have strong
   arguments to maintain also the IP address option.

   The question should whether this feedback solves the issue raised by
   Jari during the IESG review.

   Jari, do you need more justification?

   Cheers,

   Med



-Message d'origine-
De : softwires-boun...@ietf.org [mailto:softwires-boun...@ietf.org] De la part 
de Alain Durand
Envoyé : jeudi 14 octobre 2010 18:59
À : Softwires list
Cc : Ralph Droms
Objet : Re: [Softwires] DHCP option for DS-lite

I went back to the other thread on this topic  DHCPv6 AFTR name option is 
needed.
The only technical argument brought forward is that some ISPs would like to use 
a level of indirection via DNS
to achieve load balancing (where the DNS has some form of measurement of the 
current load of the system).
They point at VoIP for a precedent in that space.

I would like to offer several remarks:

1) In the current DS-Lite model, the B4 element would only find out the tunnel 
end-point at config (boot) time.
 There is no provision in the spec to regularly refresh this information. 
This means that whatever is configured
 is going to stay that way for possibly a very long time.
2)  It is unclear that the load information that the DNS was using at the time
 of the  resolution is a good indicator of what the load will be hours 
or days later.
3) Thus, it is unclear that such a system provide any better load distribution 
that a simple round-robin
 that can trivially be implemented in a DHCP server
4) If one follows that logic, the DNS redirection just add a round trip time 
for no benefits.
5) The analogy with VoIP does not hold here because the VoIP client can do the 
 query
 just before placing a call. The load information coming from the DNS has a 
better chance of being accurate for the next few minutes.

I would like to invite the proponents of the DNS indirection to provide 
technical arguments as why the above remarks are incorrect.

   - Alain.




On Oct 12, 2010, at 12:00 PM, Alain Durand wrote:

 Dear wg: