Internet DRAFT - draft-palet-v6ops-he-reporting
draft-palet-v6ops-he-reporting
v6ops J. Palet Martinez
Internet-Draft The IPv6 Company
Intended status: Standards Track C. Martinez
Expires: May 1, 2018 LACNIC
October 28, 2017
Reporting of Happy Eyeballs Failures
draft-palet-v6ops-he-reporting-00
Abstract
This document describes an extension to Happy Eyeballs in order to
report IPv6 failures that force the fall-back to IPv4 and
consequently, facilitate the troubleshooting of IPv6 networks.
Status of This Memo
This Internet-Draft is submitted in full conformance with the
provisions of BCP 78 and BCP 79.
Internet-Drafts are working documents of the Internet Engineering
Task Force (IETF). Note that other groups may also distribute
working documents as Internet-Drafts. The list of current Internet-
Drafts is at https://datatracker.ietf.org/drafts/current/.
Internet-Drafts are draft documents valid for a maximum of six months
and may be updated, replaced, or obsoleted by other documents at any
time. It is inappropriate to use Internet-Drafts as reference
material or to cite them other than as "work in progress."
This Internet-Draft will expire on May 1, 2018.
Copyright Notice
Copyright (c) 2017 IETF Trust and the persons identified as the
document authors. All rights reserved.
This document is subject to BCP 78 and the IETF Trust's Legal
Provisions Relating to IETF Documents
(https://trustee.ietf.org/license-info) in effect on the date of
publication of this document. Please review these documents
carefully, as they describe your rights and restrictions with respect
to this document. Code Components extracted from this document must
include Simplified BSD License text as described in Section 4.e of
the Trust Legal Provisions and are provided without warranty as
described in the Simplified BSD License.
Palet Martinez & Martinez Expires May 1, 2018 [Page 1]
Internet-Draft HE Failures Reporting October 2017
Table of Contents
1. Introduction . . . . . . . . . . . . . . . . . . . . . . . . 2
2. Using Syslog . . . . . . . . . . . . . . . . . . . . . . . . 2
3. Discovery of the syslog collector NSP . . . . . . . . . . . . 3
4. HE behaviour on failure detection . . . . . . . . . . . . . . 3
5. Privacy Considerations . . . . . . . . . . . . . . . . . . . 3
6. Security Considerations . . . . . . . . . . . . . . . . . . . 5
7. IANA Considerations . . . . . . . . . . . . . . . . . . . . . 5
8. Acknowledgements . . . . . . . . . . . . . . . . . . . . . . 5
9. Normative References . . . . . . . . . . . . . . . . . . . . 5
Authors' Addresses . . . . . . . . . . . . . . . . . . . . . . . 5
1. Introduction
Happy Eyeballs ([RFC6555]) provides a way for improving user-visible
delay when IPv6 connectivity is performing worse than the IPv4 one.
However, this hides the possible IPv6 connectivity issues to the
operator because users don't notice anything broken, so they aren't
reporting it to their providers.
The goal of this document is to specify an extension of HE, in order
to use existing protocols for providing a reporting to the operator,
which can be used to setup alarms and trigger further investigation
so to improve network reliability, facilitating the detection of
failures as soon as they appear, without the need of external
monitoring.
2. Using Syslog
In order to simplify the reporting of the HE failures, syslog
([RFC5424]) over UDP ([RFC5426]), MUST be used, by means of the
default port (514) with IPv6-only.
The intend is to make this reporting very simple, so no choice of
alternative ports or transport protocols is offered.
Operators willing to use this reporting MUST configure at least one
syslog collector at the IPv6 prefix formed as:
Network-Specific Prefix::192.88.99.1
The Network-Specific Prefix (NSP) MUST be chosen by the operator from
its RIR allocated IPv6 addressing space.
Additional collectors can be made available by using anycast at the
NSP + 192.88.99.0/24 prefix
Palet Martinez & Martinez Expires May 1, 2018 [Page 2]
Internet-Draft HE Failures Reporting October 2017
3. Discovery of the syslog collector NSP
The same mechanism described by RFC7050 ([RFC7050]) should be used to
define the address of the syslog collector(s).
Because the collectors will be using an IPv6 address with the 32 low
order bits from the reserved range 192.88.99.0/24, this will not be
in conflict with any public addresses used in Internet, so this
mechanism is compatible with the expected usage of the NSP for NAT64.
4. HE behaviour on failure detection
This section will specify the exact behaviour of HE in order to
initiate the reporting and the specific format/parameters of the HE
failure message to be sent to the syslog collector.
A preliminary consideration is to include, in addition to the syslog
required parameters, the timeouts detected, the failed destination
address and the source prefix from where the destination has failed.
TBD.
5. Privacy Considerations
The goal is to provide the operator information about the failures
detected by HE, without requiring specific users traffic information.
Towards this, it will be sufficient to provide to the syslog
collector details about the failed destination address and source
prefix. So privacy issues regarding identification of a specific
device or users are avoided.
Nowadays, operators already log this information in order to comply
with lawful interception regulations, and in general, data protection
regulations allow this logging when technically required. Data
protection regulations explicitly say that the data can't be
disclosed, and there is no need to do so.
In general, vendors also collect telemetry data from devices, in
order to improve OSs and in some situations, there are regulations
that enforce offering the user to enable/disable that feature. So we
could consider offering the same feature for this mechanism.
When the mechanism described in this document detects a failure, the
operator will need to find if the problem is related to:
o A specific user (inside the customer local networks, or even at
their WAN router).
Palet Martinez & Martinez Expires May 1, 2018 [Page 3]
Internet-Draft HE Failures Reporting October 2017
o A group of users (e.g., one or several part of the access or
distribution networks).
o The entire operator network (e.g., core network or transit router/
s).
o The destination network.
o Somewhere else in the path to the destination (e.g., transit
providers).
Those cases, in terms of privacy considerations, will fall into one
of the following categories:
a. Failure cause is internal to a specific customer (LANs or router/
s): The operator may decide, depending on their country
regulations and services offered to that customer, to inform the
customer (and decide what information is provided), or ignore the
failure and include it in a "while list" (i.e., list of "don't
care" failures), so the monitoring system doesn't keep providing
alerts on it.
b. Failure cause is due to the operator network: The operator will
need to find the cause and fix the failure, without disclosing
any personal data.
c. Failure cause is due to third parties: The operator don't need to
disclose any specific user source address/prefix, because in this
case, the shorter prefix (typically the RIR allocated prefix or
part of it, when is being announced split among different BGP
peers), from which the failure has been verified.
In the most extreme case, a more restrictive usage of this procedure,
not involving logging any user source address/prefix, will be to log
only the failed destination address. In a big percentage of the
cases, it will be enough for the operator to detect the failure, as
experience shows that HE fall-back occurs mainly because path or
destination misconfiguration or issues. So, the ISP could replicate
the failure from any other source address in its network to the same
failed destination. If we take this approach, failures internal to a
specific customer, could not be reported by the operator to the
customer (as there is no source data logging), and together with
partial failures of the operator network will require extra work from
operator's staff to research the cause of the failure (i.e., it is in
my network, part of it, a specific customer or external).
So, there is no distinction between the privacy issues from this
protocol compared to regular network operation, abuse reporting, etc.
Palet Martinez & Martinez Expires May 1, 2018 [Page 4]
Internet-Draft HE Failures Reporting October 2017
6. Security Considerations
This document does not have any specific security considerations.
7. IANA Considerations
IANA is requested to reserve 192.88.99.0/24 for this RFC, which was
previously released by ([RFC7526]).
8. Acknowledgements
The author would like to acknowledge the inputs of TBD ...
9. Normative References
[RFC5424] Gerhards, R., "The Syslog Protocol", RFC 5424,
DOI 10.17487/RFC5424, March 2009,
<https://www.rfc-editor.org/info/rfc5424>.
[RFC5426] Okmianski, A., "Transmission of Syslog Messages over UDP",
RFC 5426, DOI 10.17487/RFC5426, March 2009,
<https://www.rfc-editor.org/info/rfc5426>.
[RFC6555] Wing, D. and A. Yourtchenko, "Happy Eyeballs: Success with
Dual-Stack Hosts", RFC 6555, DOI 10.17487/RFC6555, April
2012, <https://www.rfc-editor.org/info/rfc6555>.
[RFC7050] Savolainen, T., Korhonen, J., and D. Wing, "Discovery of
the IPv6 Prefix Used for IPv6 Address Synthesis",
RFC 7050, DOI 10.17487/RFC7050, November 2013,
<https://www.rfc-editor.org/info/rfc7050>.
[RFC7526] Troan, O. and B. Carpenter, Ed., "Deprecating the Anycast
Prefix for 6to4 Relay Routers", BCP 196, RFC 7526,
DOI 10.17487/RFC7526, May 2015,
<https://www.rfc-editor.org/info/rfc7526>.
Authors' Addresses
Jordi Palet Martinez
The IPv6 Company
Molino de la Navata, 75
La Navata - Galapagar, Madrid 28420
Spain
Email: jordi.palet@theipv6company.com
URI: http://www.theipv6company.com/
Palet Martinez & Martinez Expires May 1, 2018 [Page 5]
Internet-Draft HE Failures Reporting October 2017
Carlos Martinez
LACNIC
Rambla Republica de Mexico, 6125
Montevideo 11400
Uruguay
Email: carlos@lacnic.net
URI: http://www.lacnic.net/
Palet Martinez & Martinez Expires May 1, 2018 [Page 6]