[LINK] World IPv6 Day mostly smooth
stephen at melbpc.org.au
stephen at melbpc.org.au
Fri Jun 10 18:57:21 AEST 2011
World IPv6 Day went mostly smoothly, with a few surprises
By Iljitsch van Beijnum | Pub June 9, 2011
<http://arstechnica.com/web/news/2011/06/world-ipv6-day-went-mostly-
smoothly-with-a-few-surprises.ars>
Tuesday evening, hundreds of Web destinations, including the four most
popular ones worldwide, showed up on the IPv6 Internet.
IPv6 traffic went up a lot in relative terms, but still barely registered
as a blip on the radar.
The 0.05 percent of users who were expected to encounter delays or errors
didn't or decided to call their Moms, watch TV, or otherwise refrain
from complaining. Twenty-four hours later things went back to the way
they were beforefor the most part.
But not everything went according to plan: a small but significant number
of websites did participate, but experienced some IPv6-related problems.
Bumps in the road
The most salient is the story of a mobile operator in a small European
country. I'm not sure how much of this is true, but what I heard was that
the CEO learned about World IPv6 Day the day before, and instructed his
engineers to participate. When WIPv6D rolled around, the frantic efforts
to enable IPv6 reachability for the company's website had completely
failed and they were unreachable for the better part of the day.
When Facebook gained its IPv6 address about half an hour before midnight
Zulu time, it remained unreachable for several minutes and then
disappeared from the DNS again. About half an hour later the address came
back and everything worked as expected. In many cases, the DNS updates
propagated really quickly, but depending on how much (and how standards-
compliant) caching is present in various DNS servers, the operating
system, and even applications, in a few cases it would take a while for
newly injected IPv6 addresses to be recognized by applications. It
probably took even more time for the IPv6 addresses to disappear once
they were removed when the experiment ended.
Internet backbone operator Level3 had a lot of issues with its IPv6-
enabled website: when consulted over IPv4, the site would display fine,
but when loaded over IPv6, the exact same URL produced a 404 error
message. In hindsight, it makes sense that such problems would occur for
a fraction of the participants. The page shown for a HTTP request can
depend on both the address that the client connects to and the "host"
header sent by the client, which contains the domain name from the
requested URL. Web servers themselves, as well as load balancers, look at
both these variables. You need to explicitly test that asking for the
right host over a connection to the right address makes the server send
the right page. Testing this requires some trickery to execute before the
IPv6 address is added to the DNS.
Not long after the start of the experiment, someone reported that
www.nist.gov didn't work. However, NIST's IPv6 address did appear to be
reachable. When I asked for a webpage, it just didn't produce any
results. This changed when I set the maximum packet size on my network
connection to 1280, which is the "minimum maximum" specified for IPv6in
other words, every IPv6 system must be able to handle packets of at least
1280 bytes. With the new setting, my computer would tell the NIST Web
server that I can only handle 1280-byte packets. And then everything
worked.
So NIST was suffering from a path MTU discovery problem, probably the
result of a filter that filters IPv6 ICMP packets that routers send to
make IPv6 systems adjust their packet sizes where necessary. This is a
problem that's hard to debug, because it only shows its ugly face when
communicating over a path that has a packet size limitation. Most of the
Internet uses the standard 1500-byte Ethernet (or larger) packets so the
problem doesn't occur.
This problem disappeared and reappeared at least once during the day. But
once the NIST site had loaded successfully, clicking on any link produced
a 404 error. I've been told that a message was later added to the page
explaining that this was the case and that the page was a copy made to
participate in World IPv6 Day; viewing the NIST website required visiting
over IPv4.
An IPv6 all-nighter in Amsterdam
But how does an average user do that? In fact, the group of researchers,
students and IPv6 enthusiasts of all walks of life that had assembled at
the University of Amsterdam all-night lab had some trouble with that.
There are some browser extensions that claim to show whether a site is
IPv4 or IPv6. Unfortunately, these extensions don't have access to the
browser's internals, so they can't tell whether a page was really loaded
over IPv4 or IPv6. My personal solution for this was to connect my Mac to
the dual-stack (IPv4 + IPv6) LAN and use Safari as my dual-stack browser.
Firefox lets you turn off IPv6 within the application by going into the
about:config and then setting "network.dns.disableIPv6" to "true." So
that was my IPv4-only browser. I then connected my iPhone to the IPv6-
only Wi-Fi network and turned off cellular data to avoid getting IPv4
over 3G, so Safari on the iPhone was my IPv6-only browser.
An interesting side effect of using the iPhone as my IPv6 canary in the
coal mine was even after Bing, Yahoo, and CNN added their IPv6 addresses,
I still couldn't visit those sites, because each of them redirected me
from "www" to "m," and their mobile sites were all IPv4-only. It's also
common for sites that are reachable over IPv6 to load additional page
elements such as javascripts, images, or CSS files from domains that only
have an IPv4 address. When visiting those using an IPv6-only system, the
pages don't exactly look as intended. None of this is a big deal for the
purposes of this experiment, as it was designed to flush out clients with
broken IPv6 setups. But in the future, we'll have to have an IPv6-only
day, to see what will have to happen before people who only have IPv6 and
no IPv4 can visit participating sites.
Once the experiment was in full swing, it was time to check up on IPv6
traffic levels. Being in Amsterdam, we of course first checked the
Amsterdam Internet Exchange IPv6 statistics. Normally, about 0.3 percent
of the AMS-IX traffic is IPv6, which is higher than found elsewhere. But
if anything, WIPv6D reduced AMS-IX IPv6 traffic a little. Strange. Not so
at the Deutsche Commercial Internet eXchange (DE-CIX) in Frankfurt:
there, IPv6 traffic was almost double the normal amount, reaching about
0.1 percent of IPv4 traffic.
Hurricane Electric, which is very active in the IPv6 world and provides
free IPv6-over-IPv4 tunneling services to the public, saw its IPv6
traffic go up by more than a factor of five. And Sandvine, which
builds "traffic optimization" devices, observed that even though native
(untunneled) IPv6 traffic remained stable, 6to4 traffic, which is
automatically tunneled over the IPv4 internet to the closest gateway to
the IPv6 internet, increased by a factor of ten. They also say that
6over4 traffic increased by a factor of five, but 6over4 is a very rarely
used mechanism. They probably mean packets tunneled through manually
created IPv6-in-IPv4 tunnels, such as the ones that Hurricane Electric
offers.
Akamai, one of the founding participants of the Day, saw its IPv6
requests quickly skyrocket to more than ten times the normal level.
In a blog post, Arbor Networks explains that normally, the little IPv6
traffic that they see is encrypted file transfers, peer-to-peer traffic,
and experimental protocols. But for the duration of the experiment, HTTP
pretty much became the only game in town.
Facebook had a million visitors over IPv6, but no increase in the number
of users seeking help from their help center. Hopefully one or more World
IPv6 Day participants (such as Google) have measured the number of users
which experienced problems, because discovering those problems was the
whole point of the exercise. So far, no thwarted users have come out of
the woodwork.
But it seems safe to say that adding a few IPv6 addresses to the DNS is
not enough kill the Internet. As such, a few participants, such as
xbox.com, have decided to keep their IPv6 addresses in the DNS. Based on
the very high amounts of tunneled IPv6 traffic observed, an obvious next
step is to do whatever's needed to get native, untunneled IPv6 off the
ground for consumers. That's not going to be easy, but then again,
staying with IPv4 ones after all the addresses have been given out isn't
going to be easy, either.
--
Cheers,
Stephen
More information about the Link
mailing list