15:00:41 #startmeeting neutron_ipv6 15:00:42 hello 15:00:42 Meeting started Tue Oct 21 15:00:41 2014 UTC and is due to finish in 60 minutes. The chair is sc68cal. Information about MeetBot at http://wiki.debian.org/MeetBot. 15:00:43 Useful Commands: #action #agreed #help #info #idea #link #topic #startvote. 15:00:46 The meeting name has been set to 'neutron_ipv6' 15:00:52 Hi 15:00:53 hello 15:01:09 Hi 15:01:11 hello all 15:02:42 Now that Juno has been cut, it's time to start filing specs for Kilo 15:03:39 sc68cal, I filed one spec for extra dhcp options: 15:03:40 https://review.openstack.org/129118 15:04:04 xuhanp: perfect 15:04:08 will be great if team can review it. 15:04:37 dane_leblanc: have you rebased your spec for Kilo? 15:04:42 There is one for multiple prefixes/addresses: https://review.openstack.org/#/c/98217 has some reviews already 15:04:56 sc68cal: Yes, it is in the new format 15:05:16 dane_leblanc: that looks like it would be a requirement for the floating addr spec I want to file 15:05:33 aveiga: Looking forward to the floating IP spec 15:06:06 I think we also need to pick up the work on the dual-stack gateway port blueprint back in Havana 15:06:08 https://blueprints.launchpad.net/neutron/+spec/allow-multiple-subnets-on-gateway-port 15:06:14 I can help file a spec for that. 15:06:37 xuhanp: I was going to try fixing that with the multi-prefix blueprint 15:06:40 I checked with Shixiong about if he or Randy going to work on that one in Kilo, haven't heard from him yet. 15:07:09 dane_leblanc, you mean in one spec? 15:07:39 xuhanp: Yes, one spec. 15:07:48 dane_leblanc, great to hear that. 15:08:11 I am also available to help on that. So let me know if you need any help? 15:08:13 xuhanp: Could be separate spec, but it would mean more spec overhead 15:08:42 xuhanp: Thanks, probably will need some help/opinions 15:09:12 And I also saw a review for prefix delegation, https://review.openstack.org/#/c/93054/ - seems as something a provider would want since "bring your own prefix" won't work very well 15:10:35 dane_leblanc, I am just worried about too much code to submit for one spec. It's fine if you want to hold them in one spec. 15:10:51 haleyb: Yes, IMO ipv6 should autodelegate where possible since that is part of its appeal 15:11:28 xuhanp: Code size doesn't look very large for the multi-addresses on gateway ports 15:11:44 dane_leblanc, OK. sounds great. 15:11:50 HenryG: actually, I'd expect it to follow Solicit hints 15:11:51 HenryG: yes, even if neutron just manually assigned a prefix when the ipv6 box is checked, like a FIP 15:11:57 instead of auto-delegate 15:12:30 we'd have to work out the allocation algorithm there, because a client may only hint for a /64 where a net was allowed a /48 ... 15:12:31 aveiga: Good point, I agree 15:15:05 aveiga: I was thinking more abstractly, for tenants that don't really care but just want things to work. And operators that want the defaults to "just work". 15:15:20 well, we could work that out in the api 15:15:32 something like "advertise a /64 unless hinted" 15:15:47 based on network attributes 15:16:02 aveiga: exactly, yes 15:18:02 aveiga: So I (or someone) will check with you for the details on the prefix delegation spec. 15:18:28 yes, for "just work" we need a way to fill-in the default ipv6 prefix for a tenant with one that is globally routable. I'll admit I have some reading to do on the options... 15:18:42 HenryG: heh, I'm no authority, but I'd be glad to part of the conversation :) 15:19:02 so 15:19:08 this is super old, but 15:19:09 https://wiki.openstack.org/wiki/Neutron/IPv6/PrefixDelegation 15:19:23 aveiga and I whiteboarded it a while ago 15:20:07 sc68cal: Thanks for pointing that out 15:20:14 Basically I wanted to make it so a user would just do an API request that says "hey give me a prefix" and we'd do the heavy lifting 15:21:02 sc68cal: we need to revisit that, especially the logic around ordering (which objects exist first?) and scheduling logic 15:22:06 +1, for example, having a check box in horizon. You can put me on the list as someone interested in working on it 15:23:54 We have one old BP in launchpad related to DHCPV6 relay agent - https://blueprints.launchpad.net/neutron/+spec/dnsmasq-ipv6-dhcpv6-relay-agent 15:24:30 SridharG: so I actually have a question about that 15:24:36 what's the target use case? 15:24:48 to be honest we have not seen or heard from the drafter for a long time 15:25:11 I think that's for using an external dhcpv6 server 15:25:28 and also it was accepted prior to the new neutron-specs workflow, so I don't know if we need to worry about it unless someone files a neutron-spec 15:26:01 sc68cal: yes, its an old one. 15:26:36 I'm wondering if it's actually necessary. You could potentially just run a service VM listening with a relay running 15:26:54 since I'd assume that net would have dhcpv6 set to off... 15:27:37 There is a separate DHCP relay BP. Looking for it .... 15:27:38 aveiga: IMO I think its for an external Centralised DHCPV6 server. 15:27:45 yup 15:28:02 the local impact seems to be acting as a relay for a non-OpenStack dhcvp6 15:28:13 so again, I think that's solved through NFV work instead :) 15:28:28 just run the relay agent as a service VM and be done with it 15:28:41 * sc68cal likes making things NFV's problem 15:28:46 https://blueprints.launchpad.net/neutron/+spec/dhcp-relay 15:30:29 I think this is entering nice to have territory, and not really core feature space 15:30:42 we still have lots of things to work on that Neutron has to handle 15:31:07 and this is something that can be accomplished without requiring Neutron intervention at the moment, so I vote to either backlog it or not bother 15:31:55 aveiga: sure, np. 15:32:38 and since someone asked me the other day, how painful would it be to do privacy extensions/temp addresses? It's not on the top of my list by any means, but someone will want it by the L release. Core things are more importatnt now 15:32:49 * haleyb waits for the tomatoes 15:32:49 impossible 15:33:06 we cannot mathematically predict the address (that's the point of PE) 15:33:11 well, you can remove all the port anti-spoof filters 15:33:12 so we can't do anti-spoofing rules 15:33:36 it's in violation of the BIS stating that you shouldn't use PE on servers 15:33:51 I mean, that's one of those things that's a "you're on your own" deal 15:34:02 yeah we've been pretty consistent throughout the life of this subteam, not really entertaining PE feature requests 15:34:13 it can be done in SLAAC mode, and you have to disable the filters 15:34:18 I know, and that's what I said back, but people will continue to ask 15:34:29 we'll make a FAQ ;) 15:34:34 but as soon as you start disabling built-in security features, that's where I shake my head 15:34:45 yeah, that can be done up in docs, honestly 15:35:02 i will continue to say it's unsupported 15:35:03 because there's no way to get proper support in 15:35:11 unless we intercept DAD/ND 15:35:22 feel free to move on to more important things... 15:35:27 ok 15:36:39 One quick notice: I am still waiting for more feedback for sending out Neighbor advertisement message for IPv6 15:36:40 http://lists.openstack.org/pipermail/openstack-dev/2014-October/048373.html 15:37:04 last time we were talking about make ryu a dependency is too big 15:38:13 xuhanp, can you clarify the use case for the unsolicited NA 15:39:06 It's for router to advise itself after HA replacement. 15:39:22 it's documented in one RFC, I may need time to find that for you 15:39:41 You can also check the email list in Sep 15:40:16 xuhanp, ok, I'm trying to think of a case where it's required. 15:40:32 it's like the function of ARP in HA case 15:41:13 but I've been spending some time on finding the right solution to send out the unsolicited NA 15:42:55 xuhanp: I hope this is the link you were referring to - http://lists.openstack.org/pipermail/openstack-dev/2014-September/044602.html 15:43:23 SridharG, that's right. Thanks a lot! 15:43:45 SridharG, thanks. 15:44:08 xuhanp: baoli: np, your welcome. 15:47:53 I submitted a patch for the Bug#1382076 15:48:00 https://review.openstack.org/#/c/129865/ 15:48:30 I'll be happy to hear the review comments.. 15:50:01 SridharG, will take a look. 15:50:31 baoli: thanks. 15:53:00 xuhanp, I need to look at it in more detail. But would the VRRP protocol (or keepalived which implements it) takes care of sending the NA after failover? 15:53:41 baoli, exactly, but there are cases HA is not configured. So we should take care those cases like IPv4 15:54:11 ARP is not sent out when VRRP keepalived is configured 15:55:15 xuhanp, ok still confused. In the case of HA not being configured, would radvd do the same? 15:56:04 radvd only take care of internal router interface. we still need to take care external gateway port when router is failed over to another host 15:58:29 xuhanp, so this is to cover the NA to the gateway port (failover or not) on the neutron router. 15:59:20 looks like we're out of time 15:59:40 let's take it to the ML and keep the thread alive that xuhanp started 15:59:40 baoli, maybe talk another time? 15:59:48 xuhanp, sure. 15:59:49 until next week everyone! 15:59:53 #endmeeting