On Thu, Jan 30, 2014 at 6:14 PM, Mark Andrews <ma...@isc.org> wrote: > > In message > <caa93jw6wcx2fgu9ftji+ndaar4cve2dzf-emuwyyt2jmhom...@mail.gmail.com> > , Dave Taht writes: >> On Thu, Jan 30, 2014 at 8:46 AM, Markus Stenberg <markus.stenb...@iki.fi> w= >> rote: >> > On 30.1.2014, at 17.50, Dave Taht <dave.t...@gmail.com> wrote: >> >> don't want it in the routing protocol. >> > >> > Why not? You can stick in kitchen sink there! ;-) >> > >> >>>> of routing protocols for that branch. I have assumed there is agreemen= >> t to >> >>>> have a single routing protocol in the home, and not support multiple. >> >> I'm interested only in a routing protocol that works well with wired, wi= >> reless, >> >> and the internet of things. >> >> >> >> I don't think anyone will ever agree to a single routing protocol decisi= >> on >> >> unless the protocol meets those requirements well, and is battle tested >> >> to meet those requirements well. And none do. >> > >> > The definition of 'works' varies by people, so by that definition, I don'= >> t think there is much to see here. >> >> Much work is required here, and co-ordination with the wgs on internet >> of things would make sense. >> >> And running code, in upstream versions of the relevant daemons. >> >> >>> So question if we don't use the routing protocol for prefix assignment,= >> what >> >>> should go in there? Should we have a new protocol for service discovery? >> >> It is my hope that hybrid-proxy-mdns solves this. Certainly mdns is pret= >> ty >> >> good about picking up dynamically changed >> > >> > hybrid proxy fixes some things ( see https://github.com/sbyx/ohybridproxy= >> for a minimalist implementation that seems to work, more or less ). Howeve= >> r, it needs quite a bit of configuration on top of that that you can't sque= >> eze in easily; or at least, you wind up with either >> > >> > - configuration coming from some other protocol (like my old OSPF+SD draf= >> t), or >> > - dns-updates + god DNS server + god DNS server replication within your h= >> ome >> > >> > I'm not sure which is worse, but neither sounds very appealing. >> >> Yep, we need a replacement for dns, that is replicable (uses a dht?), >> robust, and secure. Anyone? >> >> >> It still seems that being able to distribute and route between /128s is = >> needed, >> >> and nd proxying for folk that are only doing a /64 and have subnets. >> > >> > Lots of nodes still don't do stateful DHCPv6 (and even fewer do AHCP or s= >> omething else); obviously, we could just ignore them and point at RFC6434? = >> Hmm. >> >> I don't mind pushing people at the standards at all :) I never grokked >> much of the overall emphasis on distributing /64s everywhere though. >> >> the problem I've long had to deal with is only getting a single /64 at >> best in a routed network (and /60 doesn't help much either). >> >> ahcp has and has been for 6 years on linux >> >> apt-get install babeld # pulls in ahcp >> edit /etc/default/ahcpd to add your interfaces and specify -6 only >> edit /etc/ahcp/ahcp-script.sh # to more sanely add servers >> >> walla. you get /128s. >> >> dhcpv6 is similar, of course. Presently openwrt is handing out /128s >> for stateful dhcpv6, I don't know if that's intended. >> >> >> 1) in the multi-homing case you want requests from a local dns server >> >> to be sourced >> >> from the right network to the right ISP-provided forwarder. (think >> >> I have a fix for >> >> that but it involves abandoning resolv.conf for specific dnsmasq >> >> configuration. >> > >> > Does it really work without host changes? Let's assume you have prefixes = >> A and B from ISPs ISP_A, >> >> yes. >> >> >ISP_B. You have host that has addresses in A and B. It chooses to point it= >> 's upstream resolver at your dnsmasq on your router. How do you figure whic= >> h upstream DNS server to use? A and B source address won't help in this cas= >> e, as DNS resolution is done with 'point SOMETHING at configured DNS server= >> ' in most current hosts. >> >> in-home hosts can point to any local dns server over any ip address >> type, be it ipv4, link local, ula, or some set of ISP provided >> address. >> >> on the gateway the local dns server needs to distinguish from what ISP >> was derived the relevant source >> addresses, so it can issue queries to an upstream dns server, which >> involves abandoning leveraging >> /etc/resolv.conf.auto, for a dnsmasq specific configuration: >> >> cat /tmp/dnsmasq.d/comcast.conf >> server=3D2001:558:feed::1@260x:y:z::1 >> server=3D2001:558:feed::2@260x:y:z::1 >> >> Bind also can do the same, but the syntax is more involved. > > forwarders { > 2001:558:feed::1; 2001:6000:feed::2; > }; > > server 2001:558:feed::1 { > query-source 2001:558:xxxx::2; > }; > > server 2001:6000:feed::2 { > query-source 2001:6000:xxxx::2; > };
excellent. > The server clauses could be removed if there was a way for the ISP > to say which prefixes it has so that the stack's source address > selection rules picked the prefix from that ISP for those addresses. How about reverse lookups? > Presumably the ISP's recursive servers arn't open to the world. > >> The in-home dns server also needs to ensure it only responds to >> queries from internal hosts (so as not to become a open resolver), >> presently that's done by ignoring queries from the external >> interface(s). It would >> be nice if queries from external hosts for the AAAA records for your >> in-home domain worked. Are there >> any dynamic dns providers working with AAAAs yet? >> >> incidentally one thing that could be used specifically for dns is to >> give the server it's own ipv6 >> address to play in, thus freeing up all ports to protect against >> things like the kaminsky attack, and >> better being able to correctly handle queries from the universe. >> Another option is run dns on >> a separate box, which conceptually hands the address awareness problem >> back to some sort of protocol. >> >> (Personally I see a lot of homes not running a local dns server and >> relying on mdns internally instead.) >> >> I was very happy to start routing all my dns traffic over ipv6 >> recently, in saving udp4 ports for >> other uses. The impact of running a local dnsrbl can drop >> significantly if NXDOMAIN is honored >> by the upstream server. I merely turned off getting ISP nameservers >> via dhcp4 and get them from >> dhcpv6 on the gateway. >> >> I have proposed syntax for dealing with reverse lookups to the >> dnsmasq-discuss list. >> >> > >> >> 4) the vast increase in ipv6 related multicast led me to finally >> >> violate the 802.11 standard and >> >> fix wireless multicast rates to 9mbits. So far that hasn't broken any= >> thing. >> > >> > Oho. Do you have concrete numbers on how much multicast you're seeing in = >> and what sort of topology? Just base IPv6 stuff or e.g. mdns? >> >> What I have at the moment is indirectly observable effects >> >> > >> > Cheers, >> > >> > -Markus >> >> >> >> -- = >> >> Dave T=E4ht >> >> Fixing bufferbloat with cerowrt: http://www.teklibre.com/cerowrt/subscribe.= >> html >> _______________________________________________ >> homenet mailing list >> homenet@ietf.org >> https://www.ietf.org/mailman/listinfo/homenet > -- > Mark Andrews, ISC > 1 Seymour St., Dundas Valley, NSW 2117, Australia > PHONE: +61 2 9871 4742 INTERNET: ma...@isc.org -- Dave Täht Fixing bufferbloat with cerowrt: http://www.teklibre.com/cerowrt/subscribe.html _______________________________________________ homenet mailing list homenet@ietf.org https://www.ietf.org/mailman/listinfo/homenet