Re: [dhcwg] WGLC for draft-ietf-dhc-addr-notification - Respond by December 11, 2023

Ted Lemon <mellon@fugue.com> Fri, 29 December 2023 16:12 UTC

Return-Path: <mellon@fugue.com>
X-Original-To: dhcwg@ietfa.amsl.com
Delivered-To: dhcwg@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 34FE2C14F683 for <dhcwg@ietfa.amsl.com>; Fri, 29 Dec 2023 08:12:54 -0800 (PST)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -1.905
X-Spam-Level:
X-Spam-Status: No, score=-1.905 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, DKIM_SIGNED=0.1, DKIM_VALID=-0.1, HTML_MESSAGE=0.001, RCVD_IN_DNSWL_NONE=-0.0001, RCVD_IN_ZEN_BLOCKED_OPENDNS=0.001, SPF_HELO_NONE=0.001, SPF_PASS=-0.001, T_SCC_BODY_TEXT_LINE=-0.01, URIBL_BLOCKED=0.001, URIBL_DBL_BLOCKED_OPENDNS=0.001, URIBL_ZEN_BLOCKED_OPENDNS=0.001] autolearn=unavailable autolearn_force=no
Authentication-Results: ietfa.amsl.com (amavisd-new); dkim=pass (2048-bit key) header.d=fugue-com.20230601.gappssmtp.com
Received: from mail.ietf.org ([50.223.129.194]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id 0KhYUYO78KB6 for <dhcwg@ietfa.amsl.com>; Fri, 29 Dec 2023 08:12:50 -0800 (PST)
Received: from mail-qv1-xf2a.google.com (mail-qv1-xf2a.google.com [IPv6:2607:f8b0:4864:20::f2a]) (using TLSv1.3 with cipher TLS_AES_128_GCM_SHA256 (128/128 bits) key-exchange X25519 server-signature RSA-PSS (2048 bits) server-digest SHA256) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id 4C927C14F691 for <dhcwg@ietf.org>; Fri, 29 Dec 2023 08:12:49 -0800 (PST)
Received: by mail-qv1-xf2a.google.com with SMTP id 6a1803df08f44-67f91d48863so50562816d6.0 for <dhcwg@ietf.org>; Fri, 29 Dec 2023 08:12:49 -0800 (PST)
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=fugue-com.20230601.gappssmtp.com; s=20230601; t=1703866368; x=1704471168; darn=ietf.org; h=cc:to:subject:message-id:date:from:in-reply-to:references :mime-version:from:to:cc:subject:date:message-id:reply-to; bh=j8pthe7J26EzJZa+RUe7cNhX/kHYaqiKijp+RPVeCuc=; b=w7VrsfNZp4UeG1CvSdugO/9iiBdyYJM1qgiC5wMUVQA/iDqS0EjwkCzVdBgk+m9+dV imx6uBJ8/U2IsS8xE2BeojgF5Eu7SddKBDOOKyNHgJF6TeLMC1EXMN0fK0EKykwble9T Xk948GSqJ39mUU7EqXxitvBmxeYuX8XoRQeLSwrvMbts9dNsa4kIrBPAN4M3A8aZHE9L XNtYvAt2P834hhufXS9j6M60RjPTymCnTJQwZjuYaHAt0iypzNzSjMkKaWYJbfqw8xwD 8o4kpVNEvum0gm38y9Ct4+urweOx7ootn5L+uWyzBIFM6i/P95SgWr77VN2TdYlyX+Al S/6g==
X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20230601; t=1703866368; x=1704471168; h=cc:to:subject:message-id:date:from:in-reply-to:references :mime-version:x-gm-message-state:from:to:cc:subject:date:message-id :reply-to; bh=j8pthe7J26EzJZa+RUe7cNhX/kHYaqiKijp+RPVeCuc=; b=K6pw04TCSAffpjZYKkw2KS2M8RPIGQ8/KlkwHNC4W/9X71lKbfnHu3BWXBar9tfExr 6g/C8BJ0NzInlDo8+IEH6Z36SDegHYzFPNMn/J5116t147i/D/Ctwmstb5WBLe8xaGdg gGfDW6xHimosHkcENkPAZ/kt9g/sYX8MhQuT82uN4huEulxNmb6yZI1ROWrsF4uO6aeU FP07Qn5ekDrURHK2YuY6FLbZ8BpVMjyrdDkb3kUaMBDjAvnomReQSYXCJdLfnuerKBLU XQLFF4I9U2+KuKA/B/5UQnHbR4Hxml+OO2wvHYbOkOADLlIbDReYrN8ZrigCn1nK2Of4 hXYw==
X-Gm-Message-State: AOJu0Yz/9CKcLWMblukgFcRHrizhoNjT5qoZBznjff22hm/1lUIo/RLn tEznsKBpIY7XuHsCsLe5daK6A/Exp2OP9u7oVa0wuhJl4hE4Sg==
X-Google-Smtp-Source: AGHT+IFlnoxohylISujK/hkz63QySk4pWN42g7alrMBp2sH2bNnsIdfSNMzjNeIsLdPMB+zXFWD2HX/lnlTYHV2Lke0=
X-Received: by 2002:a05:6214:2af:b0:680:3f5b:7107 with SMTP id m15-20020a05621402af00b006803f5b7107mr5659882qvv.74.1703866368622; Fri, 29 Dec 2023 08:12:48 -0800 (PST)
MIME-Version: 1.0
References: <CACyFTPE0+aV35JgVCL62T3NKL_tFkxuvM=Wfq0xpcw5_Ra-u_A@mail.gmail.com> <15477.1703435979@localhost> <CAFU7BATNwBjbY7k_i7ft8nf2b_HhRqV2yyd4LKc=ou1kLmjwXQ@mail.gmail.com>
In-Reply-To: <CAFU7BATNwBjbY7k_i7ft8nf2b_HhRqV2yyd4LKc=ou1kLmjwXQ@mail.gmail.com>
From: Ted Lemon <mellon@fugue.com>
Date: Fri, 29 Dec 2023 11:12:36 -0500
Message-ID: <CAPt1N1=h10kWEQkynMF4qDQBBrMLGOxDOE_tAc4AYnob1jw8qg@mail.gmail.com>
To: Jen Linkova <furry13@gmail.com>
Cc: Daryll Swer <contact=40daryllswer.com@dmarc.ietf.org>, Michael Richardson <mcr+ietf@sandelman.ca>, dhcwg@ietf.org
Content-Type: multipart/alternative; boundary="000000000000a593b6060da84dcc"
Archived-At: <https://mailarchive.ietf.org/arch/msg/dhcwg/JlDdCap8Wxff4b9uGJeS9tANk48>
Subject: Re: [dhcwg] WGLC for draft-ietf-dhc-addr-notification - Respond by December 11, 2023
X-BeenThere: dhcwg@ietf.org
X-Mailman-Version: 2.1.39
Precedence: list
List-Id: Dynamic Host Configuration <dhcwg.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/dhcwg>, <mailto:dhcwg-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/dhcwg/>
List-Post: <mailto:dhcwg@ietf.org>
List-Help: <mailto:dhcwg-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/dhcwg>, <mailto:dhcwg-request@ietf.org?subject=subscribe>
X-List-Received-Date: Fri, 29 Dec 2023 16:12:54 -0000

I think the SNAC use case would have to be clearly motivated: someone would
have to be asking for it not because they think it should happen in theory,
but because they need it to deploy stub networks in their specific
environment. Personally I’m skeptical that there is a need for this, but it
will be interesting to see.

Op vr 29 dec 2023 om 07:02 schreef Jen Linkova <furry13@gmail.com>

> On Sun, Dec 24, 2023 at 5:39 PM Michael Richardson
> <mcr+ietf@sandelman.ca> wrote:
> > It seems to me that a DHCPv6 server, which has received it's prefix via
> > DHCPv6-PD *could* turn around and forward any ADDR-REG-INFORM it
> received up
> > one level.  I think it need to reform ("proxy", application-level) the
> > messages and take responsability for them itself.  It should not blindly
> > forward or rely upon the "end" client to stop and/or retransmit.
>
> I'm not aware of any generic proxy mechanism. Defining it just for
> this specific message sounds like an overkill (and it would introduce
> some
> privacy considerations indeed).
>
> > While an RFC7084 fits squarely into the "gets DHCPv6-PD", and might even
> > delegate DHCPv6-PD, I strongly think that it should never, in the
> residential
> > situation, send ADDR-REG-INFORM from the home lan to the ISP.
>
> In the current text it would not - unless it acts as a DHCPv6 relay,
> not as DHCPv6 server. But in the latter case the endpoints located in
> a given household would be sending DHCPv6 packets to the ISP server
> anyway, right?
>
> [skip]
> > The challenge here is that we have to send one ADDR-REG-INFORM message
> for
> > each downstream host, and we have to do that from the address of the
> host!
> > I think we should rethink this in some way.
>
> TBH, I'd rather say "don't do this".
>
> > I wrote some text:
> >   https://github.com/wkumari/draft-wkumari-dhc-addr-notification/pull/68
> >
> > and I'm sorry to open this can of worms, but I don't think that
> enterprises
> > will be happy without this.
>
> I have some concerns.
> 1. The desired result can be achieved by relaying the messages - and
> it would using the standard DHCP mechanism. What you are proposing
> requires developing a new mechanism for proxying (and we'd need to
> either sacrifice security, or let the proxy use a spoofed source
> address).
> 2. If I understand you correctly, you see the following use cases when
> the current text doesn't work:
> 2.1 an enterprise remote office with a CPE acting as DHCPv6 PD client.
> The enterprise administrator might want to know the registration data
> for endpoints.
> 2.2 a SNAC router (so the home network administrator has information
> about addresses used by the devices in the stub network.
>
> For #2.1  I'd expect the enterprise to collect that data from the
> router (the same way they would need to do it for DHCPv[46] assigned
> addresses). That information doesn't need to be collected  in real
> time, so existing monitoring/telemetry mechanisms would do.
> Not sure about SNAC case, but I'm still not convinced we shall
> complicate things so drastically (as to invent a proxy mechanism) to
> solve it.
>
>
> >In particular, our desire to enable more
> > (permissionless) DHCPv6-PD downstream will get the same pushback that has
> > lead to this document.
>
> I'm not sure what you mean about "permissionless' '. As long as the
> server delegates the prefix, the administrator knows which device that
> prefix was delegated to.
> So accountability is there.
>
> --
> Cheers, Jen Linkova
>
> _______________________________________________
> dhcwg mailing list
> dhcwg@ietf.org
> https://www.ietf.org/mailman/listinfo/dhcwg
>