[{"author": "Ted Lemon", "text": "<p><span class=\"user-mention\" data-user-id=\"720\">@Jen Linkova</span> I updated the slides again to change all instances of \"stub router\" to \"SNAC router\".</p>", "time": "2024-03-21T03:24:54Z"}, {"author": "Ted Lemon", "text": "<p>@Jen Linkova I updated the slides again to change all instances of \"stub router\" to \"SNAC router\".</p>", "time": "2024-03-21T03:25:23Z"}, {"author": "Bob Hinden", "text": "<p>I approved the slides, will see if meetecho updates in time.</p>", "time": "2024-03-21T03:26:54Z"}, {"author": "Ted Lemon", "text": "<p>Thanks!</p>", "time": "2024-03-21T03:27:01Z"}, {"author": "Mohamed Boucadair", "text": "<p>Ketan has a point. This is exactly why I asked to remove it from the EH</p>", "time": "2024-03-21T03:27:33Z"}, {"author": "Mohamed Boucadair", "text": "<p>we won't have 100 NRPs</p>", "time": "2024-03-21T03:28:23Z"}, {"author": "Mohamed Boucadair", "text": "<p>I'm not even sure there will be more than 1 to put it politely.</p>", "time": "2024-03-21T03:28:47Z"}, {"author": "Ketan Talaulikar", "text": "<p>@Med yes a few/handful is what I've heard as well</p>", "time": "2024-03-21T03:30:08Z"}, {"author": "Ketan Talaulikar", "text": "<p>But I am not precluding more. My point was about simplicity and h/w pipeline efficiency</p>", "time": "2024-03-21T03:30:39Z"}, {"author": "Mohamed Boucadair", "text": "<p>The number is important here as this will  have implication on the configuration burden mentioned by Jie</p>", "time": "2024-03-21T03:31:41Z"}, {"author": "Ketan Talaulikar", "text": "<p>Yes, number is also important. But again, that is a topic for TEAS WG. I will start and email thread on this later today.</p>", "time": "2024-03-21T03:35:35Z"}, {"author": "Jie Dong", "text": "<p>It is OK to take the discussion about NRP number to TEAS.</p>", "time": "2024-03-21T03:36:07Z"}, {"author": "Mohamed Boucadair", "text": "<p>I'm not sure we will get an answer, but please do. Thanks</p>", "time": "2024-03-21T03:36:31Z"}, {"author": "Jie Dong", "text": "<p>As for the encoding, using flag to control the forwarding behavior of specific packets is already used in the design of IPv6 extension headers. Devices support extension header should be capable of that processing.</p>", "time": "2024-03-21T03:39:38Z"}, {"author": "Michael Richardson", "text": "<p>O(1) state in router for 2^64 downstream devices.</p>", "time": "2024-03-21T03:41:47Z"}, {"author": "Jie Dong", "text": "<p>Another thing to consider is extensibility, we have had that discussion in previous IETF meetings, and it seems people want to see this option/ID  being generic and to be used for other applications (in addition to identifying the forwarding resources)</p>", "time": "2024-03-21T03:41:48Z"}, {"author": "Greg Mirsky", "text": "<p>@Jie, I apologize for not following the discussion today. One argument caught my eye. Please help me understand, that you envision that OAM test packets might be arbitrary dropped. Is that the case? Would that cause fault negative alarms?</p>", "time": "2024-03-21T03:46:18Z"}, {"author": "Jie Dong", "text": "<p><span class=\"user-mention\" data-user-id=\"169\">@Michael Richardson</span> right, and the classification rules to be deployed on  every node needs to be very flexible (complex) in this case</p>", "time": "2024-03-21T03:46:31Z"}, {"author": "Greg Mirsky", "text": "<p>s/fault/false/ ;)</p>", "time": "2024-03-21T03:47:42Z"}, {"author": "Jie Dong", "text": "<p><span class=\"user-mention\" data-user-id=\"504\">@Greg Mirsky</span> What I said was OAM packets used to check the availability of an NRP should be dropped when there is no NRP provisioned on a transit node, this way it can correctly reflect the status of the NRP</p>", "time": "2024-03-21T03:48:16Z"}, {"author": "Greg Mirsky", "text": "<p>@Jie,</p>", "time": "2024-03-21T03:48:44Z"}, {"author": "Greg Mirsky", "text": "<p>but the purpose and the expectation of a function that sent the query is to receive response. Not?</p>", "time": "2024-03-21T03:49:24Z"}, {"author": "Greg Mirsky", "text": "<p>If the request merely times out, how it can be distinguished from the network defect?</p>", "time": "2024-03-21T03:50:11Z"}, {"author": "Michael Richardson", "text": "<p>my Thanks to Brian for continuing to persue this.  This looks like a good way to avoid further useless holes in the ground.</p>", "time": "2024-03-21T03:50:52Z"}, {"author": "Jie Dong", "text": "<p><span class=\"user-mention\" data-user-id=\"504\">@Greg Mirsky</span> If the purpose of the OAM packet is to check the connectivity (say BFD), not receiving the packet would be the expected result to detect the failure of an NRP</p>", "time": "2024-03-21T03:51:41Z"}, {"author": "Greg Mirsky", "text": "<p>BFD is not intended to check availability of an application but only the forwarding path and the forwarding engine (to a certain degree). Frankly, I'm now more confused by the idea behind that mechanism than before.</p>", "time": "2024-03-21T03:53:18Z"}, {"author": "Greg Mirsky", "text": "<p>In MPLS, LSP Ping can be used to check the consistency between the control and data plane. AFAIK, there's seems no analogous functionality in IPv6 yet.</p>", "time": "2024-03-21T03:54:56Z"}, {"author": "Jie Dong", "text": "<p><span class=\"user-mention\" data-user-id=\"504\">@Greg Mirsky</span> we can discuss about OAM after the meeting, but the S flag is not only for the OAM packets, it can be set on demand for specific flows of packets according to the policy on  \"drop or fallback\"</p>", "time": "2024-03-21T03:56:37Z"}, {"author": "Greg Mirsky", "text": "<p>@Jie, sure, let continue the discussion. Though, I'd like to make a point that IMHO the applicability of S flag to OAM must be made clear before the document moves forward.</p>", "time": "2024-03-21T03:58:37Z"}, {"author": "Michael Richardson", "text": "<p><span class=\"user-mention\" data-user-id=\"1238\">@Lorenzo Colitti</span> how can we get a default zone/scope implemented for Linux Kernel.</p>", "time": "2024-03-21T03:59:03Z"}, {"author": "Michael Richardson", "text": "<p>could it be per-process.... inherited to child processes.</p>", "time": "2024-03-21T03:59:35Z"}, {"author": "Michael Richardson", "text": "<p>% set-default-scope 14; chrome &amp;</p>", "time": "2024-03-21T03:59:59Z"}, {"author": "Jie Dong", "text": "<p><span class=\"user-mention\" data-user-id=\"504\">@Greg Mirsky</span> Currently there is no mentioning/restriction about the setting of the S flag on packets. All depends on operators policy.</p>", "time": "2024-03-21T04:03:26Z"}, {"author": "Greg Mirsky", "text": "<p>@Jie, I believe that the case of OAM must be explicitly discussed or it is excluded from the S-flag altogether. I strongly believe that playing with arbitrary policies toward OAM is a clear path to a problem that would be hard to detect and troubleshoot, as you may have turned off the very mechanism that is intended to help you in the detection and localization of the problem.</p>", "time": "2024-03-21T04:08:11Z"}, {"author": "Jie Dong", "text": "<p><span class=\"user-mention\" data-user-id=\"504\">@Greg Mirsky</span> thanks for your suggestion, we will take it into consideration</p>", "time": "2024-03-21T04:09:47Z"}, {"author": "Tommy Jensen", "text": "<p>Love the transcription</p>", "time": "2024-03-21T04:13:06Z"}, {"author": "\u00c9ric Vyncke", "text": "<p>As individual: let's have SNAC routers sending M&amp;O flags to 0</p>", "time": "2024-03-21T04:17:49Z"}, {"author": "Timothy Winters", "text": "<p>@Eric, that might work Can we think if any host on a SNAC router might be triggered by the flags?</p>", "time": "2024-03-21T04:19:32Z"}, {"author": "\u00c9ric Vyncke", "text": "<p>Unsure whether a SNAC router should also have a pure host function (or can simply start stateful/stateless DHCP anyway)</p>", "time": "2024-03-21T04:22:01Z"}, {"author": "Timothy Winters", "text": "<p>Sorry I meant a SNAC router sending RAs to a host attached to it.</p>", "time": "2024-03-21T04:23:05Z"}, {"author": "\u00c9ric Vyncke", "text": "<p>on the stub network then? Good question</p>", "time": "2024-03-21T04:23:34Z"}, {"author": "Toerless Eckert", "text": "<p>ENOQUEUE for truce ?</p>", "time": "2024-03-21T04:23:52Z"}, {"author": "Toerless Eckert", "text": "<p>Just wondering if there would need to be some exponential backup requirement to avoid lots of MUST triggered messages in case of problems. Or rate-limit, or any of our common texts for such cases</p>", "time": "2024-03-21T04:24:42Z"}, {"author": "Michael Richardson", "text": "<p>I want 6man to adopt this, because I think that we can make it slightly better than the storey with NAT44.</p>", "time": "2024-03-21T04:46:13Z"}, {"author": "Michael Richardson", "text": "<p>+1 on everything Lorenzo said.</p>", "time": "2024-03-21T04:48:08Z"}, {"author": "Nick Buraglio", "text": "<p>As one of the co-authors of this update, I am happy to respond to these</p>", "time": "2024-03-21T04:48:36Z"}, {"author": "Fernando Gont", "text": "<p>Full disclosure: I haven't read the draft. But i would note that NAT-PT for v6 is how IPv6 is used in Kubernets (including Google Cloud Platform).  wishes does not necessarily match reality.</p>", "time": "2024-03-21T04:49:00Z"}, {"author": "Michael Richardson", "text": "<p><span class=\"user-mention silent\" data-user-id=\"893\">Fernando Gont</span> <a href=\"#narrow/stream/19-6man/topic/ietf-119/near/115657\">said</a>:</p>\n<blockquote>\n<p>Full disclosure: I haven't read the draft. But i would note that NAT-PT for v6 is how IPv6 is used in Kubernets (including Google Cloud Platform).  wishes does not necessarily match reality.</p>\n</blockquote>\n<p>Really? I thought they did DHCPv6-PD.</p>", "time": "2024-03-21T04:49:27Z"}, {"author": "Fernando Gont", "text": "<p>Nope. They essentially mimicked ipV4 FOR THE ipv6 case. Train has left.</p>", "time": "2024-03-21T04:49:54Z"}, {"author": "Fernando Gont", "text": "<p>(I'm referring to <em>Kubernetes</em>, not regular compute instances)</p>", "time": "2024-03-21T04:50:21Z"}, {"author": "Michael Richardson", "text": "<p><span class=\"user-mention silent\" data-user-id=\"893\">Fernando Gont</span> <a href=\"#narrow/stream/19-6man/topic/ietf-119/near/115659\">said</a>:</p>\n<blockquote>\n<p>Nope. They essentially mimicked ipV4 FOR THE ipv6 case. Train has left.</p>\n</blockquote>\n<p>I disagree: the engine has left the station, the caboose is still visible :-)</p>", "time": "2024-03-21T04:50:35Z"}, {"author": "Tom Hill", "text": "<p>Minimal uses, and will definitely be over utilised. \"Because it looks the same as NAT44\"</p>", "time": "2024-03-21T04:50:53Z"}, {"author": "Lorenzo Colitti", "text": "<p>it was experimental because there was no cosensus on anything else</p>", "time": "2024-03-21T04:50:58Z"}, {"author": "Ted Lemon", "text": "<p>TWO votes for historic!</p>", "time": "2024-03-21T04:51:08Z"}, {"author": "Fernando Gont", "text": "<p>It's pretty much production. That's what we use in production clusters in gcp nowadays.</p>", "time": "2024-03-21T04:51:41Z"}, {"author": "Michael Richardson", "text": "<p>Yeah, Toerless, we have Industrial examples of anti-patterns for NAT44: How it leads to major insecurity.</p>", "time": "2024-03-21T04:51:55Z"}, {"author": "Ted Lemon", "text": "<p><span class=\"user-mention\" data-user-id=\"106\">@Toerless Eckert</span> in the industrial cast you should just use ULA. Industrial settings SHOULD NOT be using the global internet.</p>", "time": "2024-03-21T04:52:15Z"}, {"author": "Erik Kline", "text": "<p>do we have a description of the \"industrial use case\" somewhere?</p>", "time": "2024-03-21T04:52:30Z"}, {"author": "Fernando Gont", "text": "<p>+1 to ted</p>", "time": "2024-03-21T04:52:50Z"}, {"author": "Erik Kline", "text": "<p>I was thinking was Ted said, but...</p>", "time": "2024-03-21T04:52:53Z"}, {"author": "Nick Buraglio", "text": "<p>I have some that we use for scientific instruments that functionally fall into that category</p>", "time": "2024-03-21T04:52:58Z"}, {"author": "Ted Lemon", "text": "<p>:)</p>", "time": "2024-03-21T04:52:59Z"}, {"author": "Michael Richardson", "text": "<p><span class=\"user-mention silent\" data-user-id=\"724\">Ted Lemon</span> <a href=\"#narrow/stream/19-6man/topic/ietf-119/near/115677\">said</a>:</p>\n<blockquote>\n<p><span class=\"user-mention silent\" data-user-id=\"106\">Toerless Eckert</span> in the industrial cast you should just use ULA. Industrial settings SHOULD NOT be using the global internet.</p>\n</blockquote>\n<p>Nope, ULA does not work.  NAT44 leads to lack of ability to audit. They want to move towards a flat network with sdn managed L2 firewalls.</p>", "time": "2024-03-21T04:53:16Z"}, {"author": "Lorenzo Colitti", "text": "<p>the kubernetes ship has not necessarily sailed. it's software, it can be fixed if something better (PD?) comes along</p>", "time": "2024-03-21T04:53:37Z"}, {"author": "Michael Richardson", "text": "<p><span class=\"user-mention silent\" data-user-id=\"1238\">Lorenzo Colitti</span> <a href=\"#narrow/stream/19-6man/topic/ietf-119/near/115685\">said</a>:</p>\n<blockquote>\n<p>the kubernetes ship has not necessarily sailed. it's software, it can be fixed if something better (PD?) comes along</p>\n</blockquote>\n<p>Docker has PD, AFAIK, but on Amazon, it can't be used for stupid reasons.</p>", "time": "2024-03-21T04:54:11Z"}, {"author": "Ted Lemon", "text": "<p><span class=\"user-mention\" data-user-id=\"169\">@Michael Richardson</span> I have no idea what you mean by this. You don't need NAT at all with ULA. If you need to connect networks together, you connect them together. There's no need for address rewrites or global addresses.</p>", "time": "2024-03-21T04:54:20Z"}, {"author": "Ted Lemon", "text": "<p>If you really really want global addresses, you can buy a block from an RIR, but why on earth would you ever route a factory floor to the global internet? This is a recipe for ransomware attacks.</p>", "time": "2024-03-21T04:55:16Z"}, {"author": "Nick Buraglio", "text": "<p>ULA works well for contained sensor networks. If they need external connectivity they can use an application proxy or GUA</p>", "time": "2024-03-21T04:55:36Z"}, {"author": "Michael Richardson", "text": "<p><span class=\"user-mention silent\" data-user-id=\"724\">Ted Lemon</span> <a href=\"#narrow/stream/19-6man/topic/ietf-119/near/115688\">said</a>:</p>\n<blockquote>\n<p><span class=\"user-mention silent\" data-user-id=\"169\">Michael Richardson</span> I have no idea what you mean by this. You don't need NAT at all with ULA. If you need to connect networks together, you connect them together. There's no need for address rewrites or global addresses.</p>\n</blockquote>\n<p>The lack of a \"PD\" in <em>IPv4</em> leads to multiple layers of NAT44 for industrial networks, which means that they auditing system can not see all the devices/traffic.  ULA with routing of ULA subnets would work, but at that point, one can just use PI GUA and a simple outgoing-only firewall.</p>", "time": "2024-03-21T04:55:49Z"}, {"author": "Fernando Gont", "text": "<p>In theory, you qould be able to make Kubernetes work with unique addresses. In practice, for the most part you wouldn't care to do so.</p>", "time": "2024-03-21T04:56:12Z"}, {"author": "Michael Richardson", "text": "<p>(many sins are hidden by NAT44)</p>", "time": "2024-03-21T04:56:13Z"}, {"author": "Ted Lemon", "text": "<p>Sure, but why would you do that. Why do you want outgoing connectivity?</p>", "time": "2024-03-21T04:56:19Z"}, {"author": "Michael Richardson", "text": "<ol>\n<li>software updates. 2. cloud computing. 3. diagnostics.</li>\n</ol>", "time": "2024-03-21T04:56:53Z"}, {"author": "Naoki Matsuhira", "text": "<p>I've been experiencing a lot of issues with NAT. With IPv6, I don't think it should be repeated.</p>", "time": "2024-03-21T04:57:35Z"}, {"author": "\u00c9ric Vyncke", "text": "<p>Let's face it: everyone hates NAT (and many of us ULA). Having said this, should the IETF be pragmatic and try to \"herd\" NAT66 implementations ? Endless discussions of course</p>", "time": "2024-03-21T04:58:06Z"}, {"author": "Ted Lemon", "text": "<p>Hm. Our preference is to host software updates locally. I think this is sort of what SUIT is working on, isn't it?</p>", "time": "2024-03-21T04:58:07Z"}, {"author": "Lorenzo Colitti", "text": "<p>I think that instead of herding NAT66 implementations we can better spend our time providing better solutions to the problems that people try to solve with NAT66</p>", "time": "2024-03-21T04:59:12Z"}, {"author": "Tommy Jensen", "text": "<blockquote>\n<p>Let's face it: everyone hates NAT (and many of us ULA). Having said this, should the IETF be pragmatic and try to \"herd\" NAT66 implementations ?</p>\n</blockquote>\n<p>I worry that this pragmatism will undermine our other work as then questions will arise about why newer RFCs don't work well with this one (and the informational/PS nuance <em>will</em> be lost on customers)</p>", "time": "2024-03-21T04:59:18Z"}, {"author": "Michael Richardson", "text": "<p><span class=\"user-mention silent\" data-user-id=\"209\">\u00c9ric Vyncke</span> <a href=\"#narrow/stream/19-6man/topic/ietf-119/near/115709\">said</a>:</p>\n<blockquote>\n<p>Let's face it: everyone hates NAT (and many of us ULA). Having said this, should the IETF be pragmatic and try to \"herd\" NAT66 implementations ? Endless discussions of course</p>\n</blockquote>\n<p>We should adopt and publish NPTv6, because we treated NAT44 the way oppressive regimes treated AIDS: as a sign you were a deviant. So it spread, unchecked.</p>", "time": "2024-03-21T04:59:38Z"}, {"author": "\u00c9ric Vyncke", "text": "<p>@lorenzo no disagreement on working of usable solutions</p>", "time": "2024-03-21T04:59:40Z"}, {"author": "Michael Richardson", "text": "<p><span class=\"user-mention silent\" data-user-id=\"1238\">Lorenzo Colitti</span> <a href=\"#narrow/stream/19-6man/topic/ietf-119/near/115718\">said</a>:</p>\n<blockquote>\n<p>I think that instead of herding NAT66 implementations we can better spend our time providing better solutions to the problems that people try to solve with NAT66</p>\n</blockquote>\n<p>Yes. I want that too.</p>", "time": "2024-03-21T04:59:59Z"}, {"author": "Ted Lemon", "text": "<p>I would also very specifically like it to be the case that an IETF standards-track document that tries to reference NPTv6 would be a down-reference and would get special attention and perhaps opprobrium.</p>", "time": "2024-03-21T05:00:09Z"}, {"author": "Tommy Jensen", "text": "<blockquote>\n<p>we treated NAT44 the way oppressive regimes treated AIDS: as a sign you were a deviant. So it spread, unchecked.</p>\n</blockquote>\n<p>One diff: NAT <em>had</em> to spread due to address exhaustion. Fortunately, we still have a few IPv6 addresses left.</p>", "time": "2024-03-21T05:00:35Z"}, {"author": "Ted Lemon", "text": "<p>One or two.</p>", "time": "2024-03-21T05:00:46Z"}, {"author": "Lorenzo Colitti", "text": "<p>+100</p>", "time": "2024-03-21T05:00:47Z"}, {"author": "Naoki Matsuhira", "text": "<p>Thank you on agenda.</p>", "time": "2024-03-21T05:01:09Z"}, {"author": "Michael Richardson", "text": "<p><span class=\"user-mention silent\" data-user-id=\"512\">Tommy Jensen</span> <a href=\"#narrow/stream/19-6man/topic/ietf-119/near/115726\">said</a>:</p>\n<blockquote>\n<blockquote>\n<p>we treated NAT44 the way oppressive regimes treated AIDS: as a sign you were a deviant. So it spread, unchecked.</p>\n</blockquote>\n<p>One diff: NAT <em>had</em> to spread due to address exhaustion. Fortunately, we still have a few IPv6 addresses left.</p>\n</blockquote>\n<p>Not at the beginning.  Not when the various protocols and socializations were developing.  Addresses were available, but they were not free, often way over-priced.</p>", "time": "2024-03-21T05:01:38Z"}]