Skip to main content

Issues with Dual Stack IPv6 on by Default
draft-ietf-v6ops-v6onbydefault-03

Revision differences

Document history

Date Rev. By Action
2015-10-14
03 (System) Notify list changed from fred@cisco.com, kurtis@kurtis.pp.se to kurtis@kurtis.pp.se
2012-08-22
03 (System) post-migration administrative database adjustment to the No Objection position for Margaret Wasserman
2012-08-22
03 (System) post-migration administrative database adjustment to the No Objection position for Steven Bellovin
2005-05-26
03 (System) State Changes to Dead from AD is watching by IESG Secretary
2005-03-26
03 (System) Document has expired
2005-03-25
03 David Kessens State Changes to AD is watching from IESG Evaluation::AD Followup by David Kessens
2005-03-25
03 David Kessens
This document is dependant on: draft-ietf-v6ops-onlinkassumption which
is not ready yet and in fact a decision needs to be made whether not
to publish that …
This document is dependant on: draft-ietf-v6ops-onlinkassumption which
is not ready yet and in fact a decision needs to be made whether not
to publish that draft and/or make major changes. We will wait with
this draft until we have a decision made on: draft-ietf-v6ops-onlinkassumption.
2005-03-25
03 David Kessens State Change Notice email list have been change to fred@cisco.com, kurtis@kurtis.pp.se from pekkas@netcore.fi, jonne.Soininen@nokia.com
2004-11-25
03 Margaret Cullen [Ballot Position Update] Position for Margaret Wasserman has been changed to No Objection from Discuss by Margaret Wasserman
2004-11-03
03 Steven Bellovin [Ballot Position Update] Position for Steve Bellovin has been changed to No Objection from Discuss by Steve Bellovin
2004-07-20
03 (System) Sub state has been changed to AD Follow up from New Id Needed
2004-07-20
03 (System) New version available: draft-ietf-v6ops-v6onbydefault-03.txt
2004-05-28
03 (System) Removed from agenda for telechat - 2004-05-27
2004-05-27
03 Amy Vezza State Changes to IESG Evaluation::Revised ID Needed from IESG Evaluation by Amy Vezza
2004-05-27
03 Margaret Cullen
[Ballot discuss]
The status of the proposed solutions in this document is unclear.

There are at least two choices about what to do about this: …
[Ballot discuss]
The status of the proposed solutions in this document is unclear.

There are at least two choices about what to do about this:

(1) Get the proposed solutions reviewed by the appropriate groups (Transport/TCPM, IPv6 WG, etc.) and reflect their feedback and action plans into this document.
(2) Remove the solutions discussions from this document and just describe the problem.
2004-05-27
03 Margaret Cullen [Ballot Position Update] Position for Margaret Wasserman has been changed to Discuss from No Objection by Margaret Wasserman
2004-05-27
03 Alex Zinin [Ballot Position Update] New position, No Objection, has been recorded for Alex Zinin by Alex Zinin
2004-05-27
03 Thomas Narten
[Ballot comment]
destination as reachable if the lookup succeeds.  The Neighbor
  Discovery on-link assumption mentioned in Section 2.2 makes this
  method somewhat irrelevant, …
[Ballot comment]
destination as reachable if the lookup succeeds.  The Neighbor
  Discovery on-link assumption mentioned in Section 2.2 makes this
  method somewhat irrelevant, however, as an implementation of the
  assumption could simply be to insert an IPv6 default on-link route
  into the system's forwarding table when the default router list is
  empty.  The side-effect is that the rule would always determine that
  all IPv6 destinations are reachable.  Therefore, this rule will not
  necessarily prefer one destination over the other.

IMO, this is a misreading of the spec. Even if everything is considered
to be  on-link, a separate NCE will be created with NUD, etc. Thus,
individual entries may well say "unreachable"


  A similar problem could exist for virtual private network (VPN)
  software.  A VPN could protect all IPv4 packets but transmit all
  others onto the local subnet unprotected.  At least one widely used
  VPN behaves this way.  This is problematic on a dual stack host that

Should this be qualified?

I.e., s/one widely used VPN/one known VPN implementation/
2004-05-27
03 Thomas Narten
[Ballot discuss]
This document really needs an "applicability" paragraph or two at the
beginning saying something like:

  This document discusses in detail some issues …
[Ballot discuss]
This document really needs an "applicability" paragraph or two at the
beginning saying something like:

  This document discusses in detail some issues related to .... The
  IPv6 WG has addressed these (or is addressing?) them in the
  following way... The suggestions in this document are just possible
  approaches for discussion and are not recommended solutions; see the
  other relevant documents for the recommended approaches."

Or something like that. I don't have an issue with publishing the
contents of the document essentially as is, but I think it would be
good to include context about what the IETF is doing about these
problems. Readers should not be misled into thinking they should
implement the recommendations in the document.
2004-05-27
03 Thomas Narten [Ballot Position Update] New position, Discuss, has been recorded for Thomas Narten by Thomas Narten
2004-05-27
03 Bert Wijnen [Ballot Position Update] New position, No Objection, has been recorded for Bert Wijnen by Bert Wijnen
2004-05-27
03 Harald Alvestrand
[Ballot comment]
Reviewed by Spencer Dawkins, Gen-ART

Issues found in review:

- I'm a little confused about why 2.3.1.1 talks about aborting TCP
connections that …
[Ballot comment]
Reviewed by Spencer Dawkins, Gen-ART

Issues found in review:

- I'm a little confused about why 2.3.1.1 talks about aborting TCP
connections that are in SYN-RECEIVED state. The problem statement said
"no IPv6 router" - how did the SYN get to the host in the first place?
The discussion makes perfect sense to me if it's limited to SYN-SENT.

- Section 2.1 talks about "rules" out of the blue, with no reference
given explicitly. I THINK it's referring to the rules from Section 6
of [ADDRSEL], but that's not obvious to the semi-initiated.

- No reference is given for the assertion that "Many TCP
implementations behave this way" in 2.3.1.1, or for the "work in
progress" described at the end of 2.3.3.

So, you ask, is fixing these items enough?

I sympathize with the authors, but they are being forced to handwave
on firewalling and NATing because we don't have BCPs on how to
firewall, and this doesn't help them to be clear or complete.

That's not a problem the authors can fix in this document. But from
one end of the document to the other, this problem complicates life -
3.3 talks about firewalls that don't enforce the same policy for IPv4
and IPv6, but where do we set the expectation that firewalls should,
or don't have to, enforce the same policy?

We do have RFC 2979, but it's Informational, does not contain the
ASCII string "v6", and talks about what firewalls do, not how to
operate firewalled networks. Sigh.

But maybe this document will be good enough for an Informational RFC.
Sigh.
2004-05-26
03 Harald Alvestrand
[Ballot comment]
Reviewed by Spencer Dawkins, Gen-ART

Issues found in review:

- I'm a little confused about why 2.3.1.1 talks about aborting TCP
connections that …
[Ballot comment]
Reviewed by Spencer Dawkins, Gen-ART

Issues found in review:

- I'm a little confused about why 2.3.1.1 talks about aborting TCP
connections that are in SYN-RECEIVED state. The problem statement said
"no IPv6 router" - how did the SYN get to the host in the first place?
The discussion makes perfect sense to me if it's limited to SYN-SENT.

- Section 2.1 talks about "rules" out of the blue, with no reference
given explicitly. I THINK it's referring to the rules from Section 6
of [ADDRSEL], but that's not obvious to the semi-initiated.

- No reference is given for the assertion that "Many TCP
implementations behave this way" in 2.3.1.1, or for the "work in
progress" described at the end of 2.3.3.

So, you ask, is fixing these items enough?

I sympathize with the authors, but they are being forced to handwave
on firewalling and NATing because we don't have BCPs on how to
firewall, and this doesn't help them to be clear or complete.

That's not a problem the authors can fix in this document. But from
one end of the document to the other, this problem complicates life -
3.3 talks about firewalls that don't enforce the same policy for IPv4
and IPv6, but where do we set the expectation that firewalls should,
or don't have to, enforce the same policy?

We do have RFC 2979, but it's Informational, does not contain the
ASCII string "v6", and talks about what firewalls do, not how to
operate firewalled networks. Sigh.

But maybe this document will be good enough for an Informational RFC.
Sigh.
2004-05-26
03 Harald Alvestrand [Ballot Position Update] New position, No Objection, has been recorded for Harald Alvestrand by Harald Alvestrand
2004-05-26
03 Russ Housley [Ballot Position Update] Position for Russ Housley has been changed to No Objection from Undefined by Russ Housley
2004-05-26
03 Russ Housley [Ballot comment]
Delete appendix B and appendic C prior to publication as an RFC.
2004-05-26
03 Russ Housley [Ballot Position Update] New position, Undefined, has been recorded for Russ Housley by Russ Housley
2004-05-25
03 Steven Bellovin
[Ballot discuss]
2.3.1.1 is inconsistent in its view of Host Requirements.  In particular, though it cites 1122, it ignores 1123.  Section 2.3 of the latter …
[Ballot discuss]
2.3.1.1 is inconsistent in its view of Host Requirements.  In particular, though it cites 1122, it ignores 1123.  Section 2.3 of the latter says that applications "SHOULD be preparted to try multiple addresses from the [preference-ordered] list".  This ties in quite closely with the discussion in this draft, and contradicts the assumption that since most applications then only tried one address, that the concept of multi-homed hosts wasn't considered in those RFCs.
2004-05-25
03 Steven Bellovin [Ballot Position Update] New position, Discuss, has been recorded for Steve Bellovin by Steve Bellovin
2004-05-25
03 Ted Hardie [Ballot Position Update] New position, No Objection, has been recorded for Ted Hardie by Ted Hardie
2004-05-24
03 Scott Hollenbeck [Ballot Position Update] New position, No Objection, has been recorded for Scott Hollenbeck by Scott Hollenbeck
2004-05-22
03 Margaret Cullen [Ballot Position Update] New position, No Objection, has been recorded for Margaret Wasserman by Margaret Wasserman
2004-05-20
03 David Kessens [Ballot Position Update] New position, Yes, has been recorded for David Kessens
2004-05-20
03 David Kessens Ballot has been issued by David Kessens
2004-05-20
03 David Kessens Created "Approve" ballot
2004-05-20
03 (System) Ballot writeup text was added
2004-05-20
03 (System) Last call text was added
2004-05-20
03 (System) Ballot approval text was added
2004-05-20
03 David Kessens State Changes to IESG Evaluation from Publication Requested by David Kessens
2004-05-20
03 David Kessens Placed on agenda for telechat - 2004-05-27 by David Kessens
2004-05-12
03 Dinara Suleymanova Draft Added by Dinara Suleymanova
2004-05-11
02 (System) New version available: draft-ietf-v6ops-v6onbydefault-02.txt
2004-02-16
01 (System) New version available: draft-ietf-v6ops-v6onbydefault-01.txt
2003-10-22
00 (System) New version available: draft-ietf-v6ops-v6onbydefault-00.txt