On 24 jul 2008, at 22:45, Dave Thaler wrote:

(Don't forget that until the EDNS0 SAS option is supported, you really
don't want to give hosts with dual stack reachability synthetic AAAA
records.)

Sounds like the case you're talking about is a multi-homed client.

That was what I have in mind with regard to the failover part that I discussed before, but this has nothing to do with the text that you quoted...

Since above we're talking about v6-only networks, but hosts with
dual stack reachability.

I'm assuming it would be possible that all hosts share the same IPv6 connectivity, but some also have IPv4 and others don't. Perhaps this isn't a very likely scenario; the easiest way to make this happen would be to give IPv4 over tunnels to some hosts but not others, presumably this wouldn't be a common configuration.

Then again, as an ISP you never know what your customers do on their networks, so it may or may not be safe to provide them with synthetic AAAA records.

We need to pick one. If people then choose to implement administrative overrides, that's their choice, but that means that the burden to make
it work is on those implementers/operators.

I think it also depends on the scenario.  If you're putting NAT64
close to the client (i.e. matching the default route is ok) then
you can use a well-known range.

Right. If we want to put it far away from the client = make it a service that can be provided by a third party over the internet, we need some kind of authenication, which isn't in there now.

If you're putting NAT64 across the internet from the hosts that
will use IPv6 (e.g. closer to IPv4-only servers, at the edge of
a v4-only network), then you need a routable prefix.

That, too, yes.

That's why I want pictures in the draft to see which scenarios you're
targeting.

I guess I'll have to make some.  :-)

A few of us are presenting operational considerations for NAT64 etc in the ops area session.

Well, for things to work well, we pretty much need updates: the EDNS0
option if we go with arbitrary translator prefixes, allowing v4mapped
addresses on the wire if we go with v4mapped.

I'm not yet convinced that we need updates to existing dual stack nodes.

You do if you want to run DNSSEC or IPsec over NAT64, and maybe if you want to have fast failover when a NAT64 fails.

I work for a company that does patches over the Internet.  The bar
for pushing patches automatically to existing hosts is very high
(basically security fixes only).  And if it's not automatic, just
available, then you have to assume that most hosts won't have it.

Back in the day we gave users CDs with software they had to install to connect to the internet when they signed up for internet access. I don't think it's unreasonable to expect users who will be getting IPv6+NAT64 connectivity to install an OS patch.

Hence we do need to optimize for unmodified hosts in my view,
at least for the short term.

How short?

For informational purposes, it might be interesting to
repeat your experiments using the range ::/96

Sure, as long as we're testing anyway. Not sure what the advantages of
using this range would be, though.

Marcelo already answered this... existing hosts sort them after
native IPv6 addresses.

Hm, despite my feature requests not all OSes that I use support the RFC 3484 policy table. (I guess if they can't even acknowledge, let alone fix, the fact that IPv6 packets larger than 2k can't be transmitted successfully over firewire, which leads to real-world breakage for normal use cases, then this one must be quite low on the list. I wasn't happy when another OS that I use simply removed firewire networking but at least that way users don't run into bizarre problems. On the remaining OSes that I use it never worked so at least there are no expectations.)
_______________________________________________
Int-area mailing list
[email protected]
https://www.ietf.org/mailman/listinfo/int-area

Reply via email to