everyone---

Okay, the Apple IS&T argument for wanting to use ULA and not PI for B2B extranet communication goes like this:

  + we expect to have public-facing servers at PI addresses;

  + some services at these servers still need to be reachable
    over the public Internet from B2B partner hosts;

  + those hosts may also be authorized separately to use the
    extranet link for access to other services at these servers;

  + some services on these servers may need to be reachable
    separately over either path, as named;

  + if we inject routes to our PI space to our partner networks,
    then *all* the traffic from partner hosts to our public-
    facing servers goes over the B2B extranet, not just that for
    specific services.  We don't want that.

Summarizing. When partner hosts connect to server.apple.com at 2620:0:1b00::SERVER, the traffic should go over the public Internet. When those same partner hosts connect to server.apple.com.b2b- extranet.example.com at $ULA::SERVER, the traffic should go over the private link. Likewise, we need the same to happen when our hosts communicate with server.example.com and server.example.com.b2b- extranet.apple.com at the corresponding PI/PA and ULA addresses.

Quoting my IS&T contact again:

I believe our 3 choices are:

1) Inject PI address into partner (and vice versa)
2) Inject ULA address into partner (and vice versa)
3) NAT at the partner connection

#1 is broken because the hosts might need to talk to other partner/ Apple services via another path #2 is dangerous because it dramatically increases the routing table size. #3 does break end-to-end IPsec AH. (not a large impact from my standpoint)

What I infer that he means by "2) inject ULA address into partner (and vice versa)" is this: route ULA prefixes alongside PI prefixes throughout the enterprise to every network where B2B servers exist (potentially anywhere/everywhere) and aggregate those together into one or more ULA /48 prefixes to be injected into the partner network.

They'd prefer to conserve router table space, by routing only the PI- space addresses throughout the enterprise, then apply some kind of symmetric IPv6 NAT at the B2B extranet gateways. They *do* care that IPsec AH is broken by this, and it *does* bother them that applications need to be NAT-friendly to work over the extranet link, but their calculation is that they're much more worried about conserving the router table space than they are about making application protocols jump through NAT hoops.

Whenever an enterprise router upsets because its table memory exhausts on an update, it can take out a whole building. That tends to be very painful for the IS&T staff. They're *VERY* sensitive to such risks.

This is why it doesn't help to use PI or PA space on the extranet instead of a ULA claim. Either way, we still have the same load on the routing tables, but the former means consuming twice as much global space. Also, it's worth noting that using PA space instead of ULA space means having to renumber the extranets when changing providers. Using a symmetric IPv6 NAT avoids all that in one fell (and I do mean fell) swoop: interior routing tables are minimal in size because they only carry our PI/PA routes, *and* the B2B extranet addressing is independent of the PI/PA space addressing for the public- facing services.

I don't think there's anything in RFC 4864 to address this perception of address translation. It's not really a "local network protection" method, is it? It's a "local operational risk mitigation" method.

Now, it occurs to me that enterprise routers and interior routing protocols could be optimized for carrying a dual aggregation around at the same or near the same cost in router table space as operating a singularly aggregated routing domain, but I don't think we've tried to do that. Have we?


--
james woodyatt <[email protected]>
member of technical staff, communications engineering


_______________________________________________
nat66 mailing list
[email protected]
https://www.ietf.org/mailman/listinfo/nat66

Reply via email to