Re: [dhcwg] I-D Action: draft-templin-duid-ipv6-01.txt

"Bernie Volz (volz)" <volz@cisco.com> Fri, 15 January 2021 23:28 UTC

Return-Path: <volz@cisco.com>
X-Original-To: dhcwg@ietfa.amsl.com
Delivered-To: dhcwg@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 2B9583A133F; Fri, 15 Jan 2021 15:28:31 -0800 (PST)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -9.599
X-Spam-Level:
X-Spam-Status: No, score=-9.599 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, DKIM_SIGNED=0.1, DKIM_VALID=-0.1, DKIM_VALID_AU=-0.1, DKIM_VALID_EF=-0.1, HTML_MESSAGE=0.001, RCVD_IN_DNSWL_BLOCKED=0.001, RCVD_IN_MSPIKE_H2=-0.001, SPF_PASS=-0.001, URIBL_BLOCKED=0.001, USER_IN_DEF_DKIM_WL=-7.5] autolearn=ham autolearn_force=no
Authentication-Results: ietfa.amsl.com (amavisd-new); dkim=pass (1024-bit key) header.d=cisco.com header.b=Mu5KJtGH; dkim=pass (1024-bit key) header.d=cisco.onmicrosoft.com header.b=fxiKwtdm
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id 3-r-mAtlcBep; Fri, 15 Jan 2021 15:28:26 -0800 (PST)
Received: from alln-iport-1.cisco.com (alln-iport-1.cisco.com [173.37.142.88]) (using TLSv1.2 with cipher DHE-RSA-SEED-SHA (128/128 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id 2AC593A1334; Fri, 15 Jan 2021 15:28:26 -0800 (PST)
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/simple; d=cisco.com; i=@cisco.com; l=93664; q=dns/txt; s=iport; t=1610753306; x=1611962906; h=from:to:cc:subject:date:message-id:references: in-reply-to:mime-version; bh=b5+gJJswIyM2/sZ1ydUMswsM9D2YQiI4B/ByNBuKWB4=; b=Mu5KJtGHtaHh9QcKRZA9jhjxM9DcSzInNhkc291G5N3dua9oLZZbmMKX DbBD+QibXyzn49QDN2fvV7ekZcDBBY8GzSq+VBIeYLh70qa/ChjIYPNPI Q2t8kveDgsqVoTTJoIxHT0xpwB3NX2wMsp9Btor2CK7fYXJT6U/aF47Tr I=;
X-IPAS-Result: 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
IronPort-PHdr: 9a23:kk4xERTole3mgEwNWpYTx7zN/9psv++ubAcI9poqja5Pea2//pPkeVbS/uhpkESQBNuJ4fVJiuzZ9avnXD9I7ZWAtSUEd5pBH18AhN4NlgMtSMiCFQXgLfHsYiB7eaYKVFJs83yhd0QAHsH4ag7YpXCz6zFUERL6ZkJ5I+3vEdvUiMK6n+m555zUZVBOgzywKbN/JRm7t0PfrM4T1IBjMa02jBDOpyhF
X-IronPort-Anti-Spam-Filtered: true
X-IronPort-AV: E=Sophos;i="5.79,350,1602547200"; d="scan'208,217";a="628967633"
Received: from alln-core-4.cisco.com ([173.36.13.137]) by alln-iport-1.cisco.com with ESMTP/TLS/DHE-RSA-SEED-SHA; 15 Jan 2021 23:28:24 +0000
Received: from XCH-ALN-003.cisco.com (xch-aln-003.cisco.com [173.36.7.13]) by alln-core-4.cisco.com (8.15.2/8.15.2) with ESMTPS id 10FNSOox026046 (version=TLSv1.2 cipher=AES256-SHA bits=256 verify=FAIL); Fri, 15 Jan 2021 23:28:24 GMT
Received: from xhs-aln-003.cisco.com (173.37.135.120) by XCH-ALN-003.cisco.com (173.36.7.13) with Microsoft SMTP Server (TLS) id 15.0.1497.2; Fri, 15 Jan 2021 17:28:24 -0600
Received: from xhs-rcd-001.cisco.com (173.37.227.246) by xhs-aln-003.cisco.com (173.37.135.120) with Microsoft SMTP Server (TLS) id 15.0.1497.2; Fri, 15 Jan 2021 17:28:23 -0600
Received: from NAM12-BN8-obe.outbound.protection.outlook.com (72.163.14.9) by xhs-rcd-001.cisco.com (173.37.227.246) with Microsoft SMTP Server (TLS) id 15.0.1497.2 via Frontend Transport; Fri, 15 Jan 2021 17:28:23 -0600
ARC-Seal: i=1; a=rsa-sha256; s=arcselector9901; d=microsoft.com; cv=none; b=C9ni0dRjSS/d2o2VZ4BDSULIZ/Ch1K1W2nUIh/JBibynmGf1hjmb8jPC+jEYuvwoDevsCTAXq6uu8jvhzYlnxiz2giftHsIq3ol2NBVrRBYJ5pinkaG2HKyc1Crp6+B8F4P+KVXOHrXTN3esCZOQp7rEJvpKp4gW4F1Lf2nq3MIF41nW8JS5H2tisp7ZWVSeCCAuTCYXCWMdY2Sq0cDrltmjDDXVveOB2Ezu0iF9Ioz3o0SQIqIr2/eJKAcovwgzrw3nj1A717/qdiMxPBAscOYtrI48ko7Xi4mPMFrQ7UYcErPFnZeswT8bSY8zUxxVzlOquA9yqvsswDkZPsYXEQ==
ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=microsoft.com; s=arcselector9901; h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-SenderADCheck; bh=b5+gJJswIyM2/sZ1ydUMswsM9D2YQiI4B/ByNBuKWB4=; b=k4VXm0cQJCdnDOLzevogosXLiqUTohQXYJvPEUiIZLeNN9YUFrYo0MQM0WsovJA/+ikPSmJGJj9DaoYfWc0niC5rJ7INShHEYznOSYbAKIvnvJavMU/tle4TLrhQTebCYKjKIUo4JK5z0YiCuIz98QHamuOCrrQFgFypUymBSmlVTwvRf0uiLadbnFeq4GWtR5SePHjY6z31LHSEhFK7lvoq2m4BaHEeDUSUTdwfMTL48lFfuzjkpzryvztmGqIfW8+UTHE5Yh21V3R4hhA+4qVAsvtwrrGn6PMu6jRAzUV1ld0RvCpzYn39w8BgTekaGyLDHQ+CVtKugeMXFdLOaQ==
ARC-Authentication-Results: i=1; mx.microsoft.com 1; spf=pass smtp.mailfrom=cisco.com; dmarc=pass action=none header.from=cisco.com; dkim=pass header.d=cisco.com; arc=none
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=cisco.onmicrosoft.com; s=selector2-cisco-onmicrosoft-com; h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-SenderADCheck; bh=b5+gJJswIyM2/sZ1ydUMswsM9D2YQiI4B/ByNBuKWB4=; b=fxiKwtdmsCTt0Fm4bEqhsYNAC1ptW8TZpPQzopLWIBLaN1YGp19qNHEiJjgaZiFlE5eVNVw3ucMMrPqxpZuc0XeOjHxS3patmKKozIZjdKrXxEVPb7BUAx/LSIgO+yeeykRHI5pRSR+y0Rp8Q1CPjmpvAo9++jPlwLp3N2JxGOs=
Received: from BN7PR11MB2547.namprd11.prod.outlook.com (2603:10b6:406:af::18) by BN6PR11MB3956.namprd11.prod.outlook.com (2603:10b6:405:77::10) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id 15.20.3763.12; Fri, 15 Jan 2021 23:28:21 +0000
Received: from BN7PR11MB2547.namprd11.prod.outlook.com ([fe80::651c:70ca:fdc4:25eb]) by BN7PR11MB2547.namprd11.prod.outlook.com ([fe80::651c:70ca:fdc4:25eb%3]) with mapi id 15.20.3763.012; Fri, 15 Jan 2021 23:28:21 +0000
From: "Bernie Volz (volz)" <volz@cisco.com>
To: "Templin (US), Fred L" <Fred.L.Templin@boeing.com>, Ted Lemon <mellon@fugue.com>
CC: Bob Hinden <bob.hinden@gmail.com>, dhcwg <dhcwg@ietf.org>, IPv6 List <ipv6@ietf.org>, "Dickson (US), Sean M" <sean.m.dickson@boeing.com>
Thread-Topic: I-D Action: draft-templin-duid-ipv6-01.txt
Thread-Index: AdbrfttkOSxT/RteQveHQZFWn6tS6wAAhjbwAABZKbAAAGfl4AAAPHqgAAB1iEAAAlnTUAAAbfQw
Date: Fri, 15 Jan 2021 23:28:21 +0000
Message-ID: <BN7PR11MB2547851D04D2317F429A2C3BCFA70@BN7PR11MB2547.namprd11.prod.outlook.com>
References: <934f21434d854a9babcfc04c2699968b@boeing.com> <BN7PR11MB25479D4FFB2C6960B1A1D3AFCFA70@BN7PR11MB2547.namprd11.prod.outlook.com> <5048f1f0c14b46cca14f86ff362bc124@boeing.com> <BN7PR11MB2547C04193D394869CB4543DCFA70@BN7PR11MB2547.namprd11.prod.outlook.com> <b931793902d24d1c82bc0bc61066e441@boeing.com> <BN7PR11MB254724BBA0272743D697E895CFA70@BN7PR11MB2547.namprd11.prod.outlook.com> <28aa9d7ca8f841ecb3769de9be18bd1b@boeing.com>
In-Reply-To: <28aa9d7ca8f841ecb3769de9be18bd1b@boeing.com>
Accept-Language: en-US
Content-Language: en-US
X-MS-Has-Attach:
X-MS-TNEF-Correlator:
authentication-results: boeing.com; dkim=none (message not signed) header.d=none;boeing.com; dmarc=none action=none header.from=cisco.com;
x-originating-ip: [24.233.121.124]
x-ms-publictraffictype: Email
x-ms-office365-filtering-correlation-id: 0391f37c-ee9d-4054-eb39-08d8b9ad3f65
x-ms-traffictypediagnostic: BN6PR11MB3956:
x-microsoft-antispam-prvs: <BN6PR11MB3956D2E525B05D0ED46E1C7ACFA70@BN6PR11MB3956.namprd11.prod.outlook.com>
x-ms-oob-tlc-oobclassifiers: OLM:4714;
x-ms-exchange-senderadcheck: 1
x-microsoft-antispam: BCL:0;
x-microsoft-antispam-message-info: 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
x-forefront-antispam-report: CIP:255.255.255.255; CTRY:; LANG:en; SCL:1; SRV:; IPV:NLI; SFV:NSPM; H:BN7PR11MB2547.namprd11.prod.outlook.com; PTR:; CAT:NONE; SFS:(346002)(366004)(39860400002)(376002)(396003)(136003)(66946007)(30864003)(66556008)(33656002)(5660300002)(52536014)(66446008)(966005)(76116006)(66476007)(64756008)(8936002)(71200400001)(8676002)(2906002)(86362001)(6506007)(9686003)(26005)(4326008)(478600001)(55016002)(45080400002)(7696005)(316002)(66574015)(110136005)(53546011)(54906003)(166002)(83380400001)(186003)(579004); DIR:OUT; SFP:1101;
x-ms-exchange-antispam-messagedata: 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
x-ms-exchange-transport-forked: True
Content-Type: multipart/alternative; boundary="_000_BN7PR11MB2547851D04D2317F429A2C3BCFA70BN7PR11MB2547namp_"
MIME-Version: 1.0
X-MS-Exchange-CrossTenant-AuthAs: Internal
X-MS-Exchange-CrossTenant-AuthSource: BN7PR11MB2547.namprd11.prod.outlook.com
X-MS-Exchange-CrossTenant-Network-Message-Id: 0391f37c-ee9d-4054-eb39-08d8b9ad3f65
X-MS-Exchange-CrossTenant-originalarrivaltime: 15 Jan 2021 23:28:21.5240 (UTC)
X-MS-Exchange-CrossTenant-fromentityheader: Hosted
X-MS-Exchange-CrossTenant-id: 5ae1af62-9505-4097-a69a-c1553ef7840e
X-MS-Exchange-CrossTenant-mailboxtype: HOSTED
X-MS-Exchange-CrossTenant-userprincipalname: 5G0EENvhONA0GmI/7gDn5earB2qJlv///ROwinviJQ//tzxLoaRbOHKCk987VlEq
X-MS-Exchange-Transport-CrossTenantHeadersStamped: BN6PR11MB3956
X-OriginatorOrg: cisco.com
X-Outbound-SMTP-Client: 173.36.7.13, xch-aln-003.cisco.com
X-Outbound-Node: alln-core-4.cisco.com
Archived-At: <https://mailarchive.ietf.org/arch/msg/dhcwg/19j1P1690k-u4nTpPzhfB5-ABUY>
Subject: Re: [dhcwg] I-D Action: draft-templin-duid-ipv6-01.txt
X-BeenThere: dhcwg@ietf.org
X-Mailman-Version: 2.1.29
Precedence: list
List-Id: <dhcwg.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/dhcwg>, <mailto:dhcwg-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/dhcwg/>
List-Post: <mailto:dhcwg@ietf.org>
List-Help: <mailto:dhcwg-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/dhcwg>, <mailto:dhcwg-request@ietf.org?subject=subscribe>
X-List-Received-Date: Fri, 15 Jan 2021 23:28:38 -0000

Do you say that in the draft? You don’t give the properties of the global address that can be used (other than a vague statement about uniqueness).

You do state:

   DUID-V6ADDR makes it possible for devices to use suitably-derived
   unique IPv6 addresses to identify themselves to DHCPv6 servers and/or
   other network nodes.

And, “but its use in control messages asserts that the address has been ensured unique through some unspecified means”? Is this permanently unique? And, how can this be defended if the device is moved elsewhere but still retains that address?

But never define what is “suitable-derived unique”? Nothing about “permanent” – address generated at time A may be unique, but can they stay unique when that device is offline?

And, you don’t describe how this interacts with the creation of this address and potentially having obtained leases prior to this (i.e., how does a host boot the first time when it does not yet have your “global address”).

Next, for ULA’s, you say that they are unique to a service domain – but don’t say what this means – how does a host know it is in a new service domain (and hence needs a new address)? What if it cannot tell because whatever it needs to communicate with requires a DHCP lease? This again can result in collisions or issues when the new address is used. If the device is out of the domain, how does it defend its prior use if it indeed was “permanent”. But your text implies it may not be “permanent” in this case?

> Which is why I proposed a single DUID-V6ADDR  type

By all means … if the address generated is (“permanently”) globally unique, then why would how it is generated matter? However, if different techniques at the same time, how accurate is the “globally unique”.


And, for your “ANYCAST” case, this has impact on DHCP operations as you’ll need to detail how this is designed to work? What about IAIDs? How would they be managed and are the leases obtain supposed to be used by all of the devices (how do they learn of this, how do they coordinate when the lease expires or if lease is released). There’s a lot that needs clarity here.

And again, when should this type be used over the other types? Are there cases it MUST be used. Are there cases it MUST NOT be used?


The other DUID types all use inputs that should remain FIXED for the life of the device (excepting administrator action). This type has cases where this is not the case, so either you need to REMOVE those or document what should happen when the DUID needs to change – what does it change to if there is no address available (i.e., consider the ULA case where the device moves out of that domain and into a new one which has no “global address”).


Anyway, I am going to stop debating these points at this time and may pick it up when you have a more complete draft that considers these (and likely other) aspects.


The DUID-UUID draft was much clearer because the properties of a UUID are defined elsewhere. Here you have the added issue as to how and when the “global address” is produced and whether it really is unique “forever”. UUID has almost a full 128 bits. Addresses generally have far fewer bits which can be used to generate “unique” values. And, when a node is down or disconnected, it cannot defend its use of the address (and it also seems the address may not even be used for “real” communication which further raises the question of how unique it can be).

You also don’t provide any clue as to whether this should be used by “all hosts” or hosts in specific environments (and what those might be). Should Android, Apple, Linux, and Microsoft devices use this?

Anyway, that’s it for me for a while on this topic … on to other things for a bit.


  *   Bernie

From: Templin (US), Fred L <Fred.L.Templin@boeing.com>
Sent: Friday, January 15, 2021 5:52 PM
To: Bernie Volz (volz) <volz@cisco.com>; Ted Lemon <mellon@fugue.com>
Cc: Bob Hinden <bob.hinden@gmail.com>; dhcwg <dhcwg@ietf.org>; IPv6 List <ipv6@ietf.org>; Dickson (US), Sean M <sean.m.dickson@boeing.com>
Subject: RE: I-D Action: draft-templin-duid-ipv6-01.txt

> For the DUID-UUID it is clearly presumed that this is PERMANENTLY assigned value to the device.

The same is expected for IPv6 address generation methods that would use DUID-V6ADDR.

> Hope that helps as to why the bar for new DUID-types needs to be high.

Which is why I proposed a single DUID-V6ADDR  type for all manners of generating IPv6
addresses. Otherwise, there would need to be DUID-HIT, DUID-HHIT, DUID-CGA, etc.,
i.e., one for each address generation method. The draft discusses in detail why that
would be a slippery slope we do not want to start down and makes the case for a
single DUID-V6ADDR.

Fred


From: Bernie Volz (volz) [mailto:volz@cisco.com]
Sent: Friday, January 15, 2021 2:32 PM
To: Templin (US), Fred L <Fred.L.Templin@boeing.com>; Ted Lemon <mellon@fugue.com>
Cc: Bob Hinden <bob.hinden@gmail.com>; dhcwg <dhcwg@ietf.org>; IPv6 List <ipv6@ietf.org>; Dickson (US), Sean M <sean.m.dickson@boeing.com>
Subject: [EXTERNAL] RE: I-D Action: draft-templin-duid-ipv6-01.txt

EXT email: be mindful of links/attachments.


Yes, we could have done that. We could have just had DUID-EN and used that for all DUID types.

But the reason to standardize some types is their expected usage – the existing formats (except DUID-EN) are designed to be used by almost all devices and there are reasons specified for using one of the types over the other. Use DUID-LLT unless the link-layer is “locked” to device. DUID-UUID can be used if this is available on the hardware platform as it may require no persistent storage or resolves the issue when DUID-LLT has to be used by both a low-level boot loader (that doesn’t know where the OS stored the DUID-LLT). So, it is pretty clear which of these to use (DUID-EN if applicable, DUID-UUID if possible, DUID-LLT, or finally DUID-LL).

Some standards organization also require use of one type (such as Cable Modems should use DUID-LL).

DUID-EN was designed to allow vendors (or standards bodies for specific technologies) to define a different type for their purposes (not for standard operating systems like Linux to default to but nothing prevents them from being configured to use). The vendor is responsible for assuring the uniqueness and this was generally assumed to be something “burned” into hardware. So, using it was pretty clear.

If a specific application comes along where it needs a different identity for some reason but that is specific to that application, the DUID-EN was what is expected to be used.

When there is a broad benefit to the community at large, that’s when to consider a new DUID type (not DUID-EN).

So, the question that we need answer is when should something use DUID-new type over the other types.

You might say, well just use it if you have a “globally unique address”? But then the questions are:

  *   If this is a general purpose OS, and it boots via a boot loader that needs an address but there is no “global address”, what does it use?
  *   If it started to use an existing type before it got a “global address”, when should it start using the DUID-new type? It could be using active leases under the old DUID.
  *   Where will this global address be stored (persisted) so that it continues to be available “forever”?
  *   What happens if the global address is changed? Does the device keep using it since it is it’s DUID. But then what happens to a new device that gets that “old” global address – how does it know it MUST NOT use the DUID? The draft mentions nothing about what happens when the node / global address relation is ended for some reason (whether administratively done or as result of the “generation technique” where some input might change). As you state “The DUID-V6ADDR format makes no statement about the method used for generating the IPv6 address” but it also says nothing about how “permanent” that generated address must be and how changes to it are handled by a client that has been using it for a DUID-V6ADDR.
BTW: This is why DUID-LLT exists as the network card could be moved to a new device, but the time helps to differentiate the two DUIDs.

For the DUID-UUID it is clearly presumed that this is PERMANENTLY assigned value to the device.

Formatting the data is the easy part – yes put some bits here and there. But the usage is what is critical to define and do it in a way that creates no possible issues (or at least guidance about what the issues may be and how they could be resolved).

Those are some of the things you must properly motivate.

Once you do that and how well you do that should make deciding whether to move forward with DUID-new type or tell you to use DUID-EN as then many of these issues are NOT the responsibility of the IETF. For IETF standardized types, we want to make sure that how and when they are used is clear and that (to a reasonable ability) we prevent issues and possible collisions.

The earlier days of DHCPv6 were not easy as there were plenty of issues with DUIDs .. one operating system vendor’s host cloning failed to clear the DUID and so someone that cloned a bunch of hosts would end up with them all having the same DUID.

This is the reason why DUIDs are Standards Action as we need all of the issues thought through carefully and to give implementers guidance on when one type should be used over another.

Warning: I am not saying that my above questions are all there is.

Hope that helps as to why the bar for new DUID-types needs to be high.


  *   Bernie

From: Templin (US), Fred L <Fred.L.Templin@boeing.com<mailto:Fred.L.Templin@boeing.com>>
Sent: Friday, January 15, 2021 4:30 PM
To: Bernie Volz (volz) <volz@cisco.com<mailto:volz@cisco.com>>; Ted Lemon <mellon@fugue.com<mailto:mellon@fugue.com>>
Cc: Bob Hinden <bob.hinden@gmail.com<mailto:bob.hinden@gmail.com>>; dhcwg <dhcwg@ietf.org<mailto:dhcwg@ietf.org>>; IPv6 List <ipv6@ietf.org<mailto:ipv6@ietf.org>>; Dickson (US), Sean M <sean.m.dickson@boeing.com<mailto:sean.m.dickson@boeing.com>>
Subject: RE: I-D Action: draft-templin-duid-ipv6-01.txt

Bernie, using your logic UUIDs could also have gone into DUID-EN under some
arbitrary PEN code. But, they weren’t; they were *standardized* as DUID-UUID
which elevates them in standing as equals to all other forms of DUIDs. Nothing less
will suffice for DUIDs that would be based on IPv6 addresses that are specifically
generated as unique Identifiers for a node.

Fred

From: Bernie Volz (volz) [mailto:volz@cisco.com]
Sent: Friday, January 15, 2021 1:21 PM
To: Templin (US), Fred L <Fred.L.Templin@boeing.com<mailto:Fred.L.Templin@boeing.com>>; Ted Lemon <mellon@fugue.com<mailto:mellon@fugue.com>>
Cc: Bob Hinden <bob.hinden@gmail.com<mailto:bob.hinden@gmail.com>>; dhcwg <dhcwg@ietf.org<mailto:dhcwg@ietf.org>>; IPv6 List <ipv6@ietf.org<mailto:ipv6@ietf.org>>; Dickson (US), Sean M <sean.m.dickson@boeing.com<mailto:sean.m.dickson@boeing.com>>
Subject: [EXTERNAL] RE: I-D Action: draft-templin-duid-ipv6-01.txt

Also, I really have no idea what you mean by “under the care of an arbitrary DUID-EN PEN code”.

After all, this is just about a [unique] identifier isn’t it?

This isn’t putting anything “under the care of”. It is just the way it is communicating between DHCP client and servers and for the client (or perhaps server since it could use DUID-EN too) to identifier itself as a “different” device than another.


  *   Bernie

From: Templin (US), Fred L <Fred.L.Templin@boeing.com<mailto:Fred.L.Templin@boeing.com>>
Sent: Friday, January 15, 2021 4:13 PM
To: Bernie Volz (volz) <volz@cisco.com<mailto:volz@cisco.com>>; Ted Lemon <mellon@fugue.com<mailto:mellon@fugue.com>>
Cc: Bob Hinden <bob.hinden@gmail.com<mailto:bob.hinden@gmail.com>>; dhcwg <dhcwg@ietf.org<mailto:dhcwg@ietf.org>>; IPv6 List <ipv6@ietf.org<mailto:ipv6@ietf.org>>; Dickson (US), Sean M <sean.m.dickson@boeing.com<mailto:sean.m.dickson@boeing.com>>
Subject: RE: I-D Action: draft-templin-duid-ipv6-01.txt

Bernie, putting the entire global IPv6 unicast address space under the care of an
arbitrary DUID-EN PEN code would be like sending Biden to the inauguration on
a bicycle. You don’t transport VIPs to big events on vehicles made of tinker toys;
you give them a full-length limo and full escort.

Fred

From: Bernie Volz (volz) [mailto:volz@cisco.com]
Sent: Friday, January 15, 2021 1:05 PM
To: Templin (US), Fred L <Fred.L.Templin@boeing.com<mailto:Fred.L.Templin@boeing.com>>; Ted Lemon <mellon@fugue.com<mailto:mellon@fugue.com>>
Cc: Bob Hinden <bob.hinden@gmail.com<mailto:bob.hinden@gmail.com>>; dhcwg <dhcwg@ietf.org<mailto:dhcwg@ietf.org>>; IPv6 List <ipv6@ietf.org<mailto:ipv6@ietf.org>>; Dickson (US), Sean M <sean.m.dickson@boeing.com<mailto:sean.m.dickson@boeing.com>>
Subject: RE: I-D Action: draft-templin-duid-ipv6-01.txt

That anyone can get a PEN code has no bearing on this – the DUID-EN is still standards track because YOUR PEN will be different than someone else’s and hence their format does not “collide” with yours because the Enterprise IDs are different.

This enterprise id has been very successfully used in the vendor class and vendor options (see RFC8415 sections 21.16 and 21.17). Cablelabs and other standards groups use these very heavily to provide for additional information that a vendor (or standards organization) needs to provide their devices. See for example https://community.cablelabs.com/wiki/plugins/servlet/cablelabs/alfresco/download?id=b74c68d8-b6af-45e6-81bf-936004d0273f.

> That, plus I don’t want to carry around the extra 4 bytes for a PEN code…

That’s life. There’s a lot of things I don’t want but have no choice over.


  *   Bernie

From: Templin (US), Fred L <Fred.L.Templin@boeing.com<mailto:Fred.L.Templin@boeing.com>>
Sent: Friday, January 15, 2021 3:54 PM
To: Ted Lemon <mellon@fugue.com<mailto:mellon@fugue.com>>
Cc: Bernie Volz (volz) <volz@cisco.com<mailto:volz@cisco.com>>; Bob Hinden <bob.hinden@gmail.com<mailto:bob.hinden@gmail.com>>; dhcwg <dhcwg@ietf.org<mailto:dhcwg@ietf.org>>; IPv6 List <ipv6@ietf.org<mailto:ipv6@ietf.org>>; Dickson (US), Sean M <sean.m.dickson@boeing.com<mailto:sean.m.dickson@boeing.com>>
Subject: Re: I-D Action: draft-templin-duid-ipv6-01.txt

Ted, the allocation policy for the Private Enterprise Number (PEN) code for users
of DUID-EN is not Standards Track; anyone and their brother can easily obtain a
PEN code by filling out a simple form:

https://pen.iana.org/pen/PenApplication.page

I did one for “LinkUp Networks”, but that is not in any way tied to a Standards
Track RFC. IANA did not even ask me any questions; they simply allocated the
code for free. So, as far as standards status goes, an arbitrary PEN code has no
standing while the global IPv6 unicast address space has full Internet standards
status according to RFCs 4291 and 8200. I would therefore see it as a major
DOWNREF to entrust the entire IPv6 address space to any random person
who decided to register a PEN code.

That, plus I don’t want to carry around the extra 4 bytes for a PEN code…

Fred

From: Ted Lemon [mailto:mellon@fugue.com]
Sent: Friday, January 15, 2021 12:31 PM
To: Templin (US), Fred L <Fred.L.Templin@boeing.com<mailto:Fred.L.Templin@boeing.com>>
Cc: Bernie Volz (volz) <volz@cisco.com<mailto:volz@cisco.com>>; Bob Hinden <bob.hinden@gmail.com<mailto:bob.hinden@gmail.com>>; dhcwg <dhcwg@ietf.org<mailto:dhcwg@ietf.org>>; IPv6 List <ipv6@ietf.org<mailto:ipv6@ietf.org>>; Dickson (US), Sean M <sean.m.dickson@boeing.com<mailto:sean.m.dickson@boeing.com>>
Subject: [EXTERNAL] Re: I-D Action: draft-templin-duid-ipv6-01.txt

On Jan 15, 2021, at 3:25 PM, Templin (US), Fred L <Fred.L.Templin@boeing.com<mailto:Fred.L.Templin@boeing.com>> wrote:
using DUID-EN with some
arbitrary PEN code to encode the entire global IPv6 unicast address space would
IMHO be an unacceptable DOWNREF.

You said this before. I don’t understand what this means. DUID-EN is in a standards track RFC. How is this a DOWNREF? And why use an arbitrary enterprise number?