Good comments - keep 'em coming! 

On Jan 2, 2013, at 1:01 AM, Hugo Trippaers <htrippa...@schubergphilis.com> 
wrote:
> Technically this is a very sound idea, but scale needs to be discussed. 
> Having static assignments in a database like we do for IPv4 could have 
> potential impact as the address space available is multitudes bigger than in 
> IPv4. Technically one can have 18.446.744.073.709.551.616 hosts in a single 
> /64 network, you don't want to be doing a database query on such a table to 
> lookup the IP for a host. (Not that it's very reasonable to assume this we 
> would ever see networks this size) My thinking was more geared to using SLAAC 
> for determining  addressing to get this burden away from cloudstack 
> management server, but this would make other configuration like the firewall 
> a lot more difficult. The other issue with using DHCPv6 is the pseuso 
> addressing that a lot of systems use a the moment, lots of relatively short 
> lived IPv6 addresses on an interface in addition to the one IPv6 address that 
> is based on the modified EUI-64. This might be a feature that we would want 
> to encourage for security reasons, but again this makes firewalls potentially 
> more difficult.

I'd think if you saved the addresses in numeric form (vs string) it wouldn't be 
too bad…interesting convo at 
http://stackoverflow.com/questions/420680/how-to-store-ipv6-compatible-address-in-a-relational-database

How SLAAC works in an IaaS - I don't have a good answer there, yet. Seems like 
having a daemon sniff for advertisements/requests/responses could be one way...

>> This is a big feature, but I think the Basic zone is the easiest for now.
> 
> I would vote for thinking up a good solution for both and doing the advanced 
> zone in one go. But that is very simply because my use case is for advanced 
> networking together with IPv6, we do not use basic networking in any of our 
> deployments.

+1

>> NAT in the VR seems like a firewall, but a true statefull firewall in the VR 
>> could do the same while the Instances still have publicly routeable IPv6 
>> addresses.
> I think we should focus on true statefull firewalls. This would encourage 
> people to think more on security and allows the use of IPv6 privacy 
> extensions right from the host. 

+1

> That said, simply enabling IPv6 will not "fix" the problem until there is a 
> widespread adoption of IPv6 by endusers. Still let's not play the chicken and 
> egg game, but fix IPv6 in CloudStack and take the lead.

 +11 :)

>> 3       UI / UX Requirements
>> All fields (input fields and display fields) that take IP Addresses would 
>> need to support both IPv4 and IPv6
> I think it's bigger than this. Do we need service offerings to tell if a 
> network should have IPv6, IPv4 or both? In that case we need to be able to 
> tell what kind of addressing needs to be configured and how. Depending on the 
> solution we choose we need configuration for the static routes and mappings 
> to public addresses. It probably also ties in with the multiple address per 
> nic configuration and this also has UI implications. We would need 
> configuration screens to configure privacy extensions (ipsec, replacing the 
> VPNs). Firewall configurations will become more complex and might need 
> additional screens for IPv6 statefull firewall configuration. Also the 
> exisiting network configuration might need to be tuned to the type of 
> networking, we don't need to give the user the possibility to configure 
> portforwarding on an IPv6 only network for example.
> 
> In addition simple stuff like the count for available public IP addresses 
> might need to be revisited to make the difference between IPv4 and IPv6 clear 
> in the UI.

I'm thinking as this is a pretty major change, we should have a separate branch 
for development and (a large amount of) testing...


Reply via email to