Issues with Dual Stack IPv6 on by Default
draft-ietf-v6ops-v6onbydefault-03
Revision differences
Document history
Date | Rev. | By | Action |
---|---|---|---|
2015-10-14
|
03 | (System) | Notify list changed from fred@cisco.com, kurtis@kurtis.pp.se to kurtis@kurtis.pp.se |
2012-08-22
|
03 | (System) | post-migration administrative database adjustment to the No Objection position for Margaret Wasserman |
2012-08-22
|
03 | (System) | post-migration administrative database adjustment to the No Objection position for Steven Bellovin |
2005-05-26
|
03 | (System) | State Changes to Dead from AD is watching by IESG Secretary |
2005-03-26
|
03 | (System) | Document has expired |
2005-03-25
|
03 | David Kessens | State Changes to AD is watching from IESG Evaluation::AD Followup by David Kessens |
2005-03-25
|
03 | David Kessens | This document is dependant on: draft-ietf-v6ops-onlinkassumption which is not ready yet and in fact a decision needs to be made whether not to publish that … This document is dependant on: draft-ietf-v6ops-onlinkassumption which is not ready yet and in fact a decision needs to be made whether not to publish that draft and/or make major changes. We will wait with this draft until we have a decision made on: draft-ietf-v6ops-onlinkassumption. |
2005-03-25
|
03 | David Kessens | State Change Notice email list have been change to fred@cisco.com, kurtis@kurtis.pp.se from pekkas@netcore.fi, jonne.Soininen@nokia.com |
2004-11-25
|
03 | Margaret Cullen | [Ballot Position Update] Position for Margaret Wasserman has been changed to No Objection from Discuss by Margaret Wasserman |
2004-11-03
|
03 | Steven Bellovin | [Ballot Position Update] Position for Steve Bellovin has been changed to No Objection from Discuss by Steve Bellovin |
2004-07-20
|
03 | (System) | Sub state has been changed to AD Follow up from New Id Needed |
2004-07-20
|
03 | (System) | New version available: draft-ietf-v6ops-v6onbydefault-03.txt |
2004-05-28
|
03 | (System) | Removed from agenda for telechat - 2004-05-27 |
2004-05-27
|
03 | Amy Vezza | State Changes to IESG Evaluation::Revised ID Needed from IESG Evaluation by Amy Vezza |
2004-05-27
|
03 | Margaret Cullen | [Ballot discuss] The status of the proposed solutions in this document is unclear. There are at least two choices about what to do about this: … [Ballot discuss] The status of the proposed solutions in this document is unclear. There are at least two choices about what to do about this: (1) Get the proposed solutions reviewed by the appropriate groups (Transport/TCPM, IPv6 WG, etc.) and reflect their feedback and action plans into this document. (2) Remove the solutions discussions from this document and just describe the problem. |
2004-05-27
|
03 | Margaret Cullen | [Ballot Position Update] Position for Margaret Wasserman has been changed to Discuss from No Objection by Margaret Wasserman |
2004-05-27
|
03 | Alex Zinin | [Ballot Position Update] New position, No Objection, has been recorded for Alex Zinin by Alex Zinin |
2004-05-27
|
03 | Thomas Narten | [Ballot comment] destination as reachable if the lookup succeeds. The Neighbor Discovery on-link assumption mentioned in Section 2.2 makes this method somewhat irrelevant, … [Ballot comment] destination as reachable if the lookup succeeds. The Neighbor Discovery on-link assumption mentioned in Section 2.2 makes this method somewhat irrelevant, however, as an implementation of the assumption could simply be to insert an IPv6 default on-link route into the system's forwarding table when the default router list is empty. The side-effect is that the rule would always determine that all IPv6 destinations are reachable. Therefore, this rule will not necessarily prefer one destination over the other. IMO, this is a misreading of the spec. Even if everything is considered to be on-link, a separate NCE will be created with NUD, etc. Thus, individual entries may well say "unreachable" A similar problem could exist for virtual private network (VPN) software. A VPN could protect all IPv4 packets but transmit all others onto the local subnet unprotected. At least one widely used VPN behaves this way. This is problematic on a dual stack host that Should this be qualified? I.e., s/one widely used VPN/one known VPN implementation/ |
2004-05-27
|
03 | Thomas Narten | [Ballot discuss] This document really needs an "applicability" paragraph or two at the beginning saying something like: This document discusses in detail some issues … [Ballot discuss] This document really needs an "applicability" paragraph or two at the beginning saying something like: This document discusses in detail some issues related to .... The IPv6 WG has addressed these (or is addressing?) them in the following way... The suggestions in this document are just possible approaches for discussion and are not recommended solutions; see the other relevant documents for the recommended approaches." Or something like that. I don't have an issue with publishing the contents of the document essentially as is, but I think it would be good to include context about what the IETF is doing about these problems. Readers should not be misled into thinking they should implement the recommendations in the document. |
2004-05-27
|
03 | Thomas Narten | [Ballot Position Update] New position, Discuss, has been recorded for Thomas Narten by Thomas Narten |
2004-05-27
|
03 | Bert Wijnen | [Ballot Position Update] New position, No Objection, has been recorded for Bert Wijnen by Bert Wijnen |
2004-05-27
|
03 | Harald Alvestrand | [Ballot comment] Reviewed by Spencer Dawkins, Gen-ART Issues found in review: - I'm a little confused about why 2.3.1.1 talks about aborting TCP connections that … [Ballot comment] Reviewed by Spencer Dawkins, Gen-ART Issues found in review: - I'm a little confused about why 2.3.1.1 talks about aborting TCP connections that are in SYN-RECEIVED state. The problem statement said "no IPv6 router" - how did the SYN get to the host in the first place? The discussion makes perfect sense to me if it's limited to SYN-SENT. - Section 2.1 talks about "rules" out of the blue, with no reference given explicitly. I THINK it's referring to the rules from Section 6 of [ADDRSEL], but that's not obvious to the semi-initiated. - No reference is given for the assertion that "Many TCP implementations behave this way" in 2.3.1.1, or for the "work in progress" described at the end of 2.3.3. So, you ask, is fixing these items enough? I sympathize with the authors, but they are being forced to handwave on firewalling and NATing because we don't have BCPs on how to firewall, and this doesn't help them to be clear or complete. That's not a problem the authors can fix in this document. But from one end of the document to the other, this problem complicates life - 3.3 talks about firewalls that don't enforce the same policy for IPv4 and IPv6, but where do we set the expectation that firewalls should, or don't have to, enforce the same policy? We do have RFC 2979, but it's Informational, does not contain the ASCII string "v6", and talks about what firewalls do, not how to operate firewalled networks. Sigh. But maybe this document will be good enough for an Informational RFC. Sigh. |
2004-05-26
|
03 | Harald Alvestrand | [Ballot comment] Reviewed by Spencer Dawkins, Gen-ART Issues found in review: - I'm a little confused about why 2.3.1.1 talks about aborting TCP connections that … [Ballot comment] Reviewed by Spencer Dawkins, Gen-ART Issues found in review: - I'm a little confused about why 2.3.1.1 talks about aborting TCP connections that are in SYN-RECEIVED state. The problem statement said "no IPv6 router" - how did the SYN get to the host in the first place? The discussion makes perfect sense to me if it's limited to SYN-SENT. - Section 2.1 talks about "rules" out of the blue, with no reference given explicitly. I THINK it's referring to the rules from Section 6 of [ADDRSEL], but that's not obvious to the semi-initiated. - No reference is given for the assertion that "Many TCP implementations behave this way" in 2.3.1.1, or for the "work in progress" described at the end of 2.3.3. So, you ask, is fixing these items enough? I sympathize with the authors, but they are being forced to handwave on firewalling and NATing because we don't have BCPs on how to firewall, and this doesn't help them to be clear or complete. That's not a problem the authors can fix in this document. But from one end of the document to the other, this problem complicates life - 3.3 talks about firewalls that don't enforce the same policy for IPv4 and IPv6, but where do we set the expectation that firewalls should, or don't have to, enforce the same policy? We do have RFC 2979, but it's Informational, does not contain the ASCII string "v6", and talks about what firewalls do, not how to operate firewalled networks. Sigh. But maybe this document will be good enough for an Informational RFC. Sigh. |
2004-05-26
|
03 | Harald Alvestrand | [Ballot Position Update] New position, No Objection, has been recorded for Harald Alvestrand by Harald Alvestrand |
2004-05-26
|
03 | Russ Housley | [Ballot Position Update] Position for Russ Housley has been changed to No Objection from Undefined by Russ Housley |
2004-05-26
|
03 | Russ Housley | [Ballot comment] Delete appendix B and appendic C prior to publication as an RFC. |
2004-05-26
|
03 | Russ Housley | [Ballot Position Update] New position, Undefined, has been recorded for Russ Housley by Russ Housley |
2004-05-25
|
03 | Steven Bellovin | [Ballot discuss] 2.3.1.1 is inconsistent in its view of Host Requirements. In particular, though it cites 1122, it ignores 1123. Section 2.3 of the latter … [Ballot discuss] 2.3.1.1 is inconsistent in its view of Host Requirements. In particular, though it cites 1122, it ignores 1123. Section 2.3 of the latter says that applications "SHOULD be preparted to try multiple addresses from the [preference-ordered] list". This ties in quite closely with the discussion in this draft, and contradicts the assumption that since most applications then only tried one address, that the concept of multi-homed hosts wasn't considered in those RFCs. |
2004-05-25
|
03 | Steven Bellovin | [Ballot Position Update] New position, Discuss, has been recorded for Steve Bellovin by Steve Bellovin |
2004-05-25
|
03 | Ted Hardie | [Ballot Position Update] New position, No Objection, has been recorded for Ted Hardie by Ted Hardie |
2004-05-24
|
03 | Scott Hollenbeck | [Ballot Position Update] New position, No Objection, has been recorded for Scott Hollenbeck by Scott Hollenbeck |
2004-05-22
|
03 | Margaret Cullen | [Ballot Position Update] New position, No Objection, has been recorded for Margaret Wasserman by Margaret Wasserman |
2004-05-20
|
03 | David Kessens | [Ballot Position Update] New position, Yes, has been recorded for David Kessens |
2004-05-20
|
03 | David Kessens | Ballot has been issued by David Kessens |
2004-05-20
|
03 | David Kessens | Created "Approve" ballot |
2004-05-20
|
03 | (System) | Ballot writeup text was added |
2004-05-20
|
03 | (System) | Last call text was added |
2004-05-20
|
03 | (System) | Ballot approval text was added |
2004-05-20
|
03 | David Kessens | State Changes to IESG Evaluation from Publication Requested by David Kessens |
2004-05-20
|
03 | David Kessens | Placed on agenda for telechat - 2004-05-27 by David Kessens |
2004-05-12
|
03 | Dinara Suleymanova | Draft Added by Dinara Suleymanova |
2004-05-11
|
02 | (System) | New version available: draft-ietf-v6ops-v6onbydefault-02.txt |
2004-02-16
|
01 | (System) | New version available: draft-ietf-v6ops-v6onbydefault-01.txt |
2003-10-22
|
00 | (System) | New version available: draft-ietf-v6ops-v6onbydefault-00.txt |