Re: [dhcwg] WGLC on draft-ietf-dhc-mac-assign-01 and draft-ietf-dhc-slap-quadrant-01 - respond by Nov. 17

"Bernie Volz (volz)" <volz@cisco.com> Wed, 08 January 2020 17:05 UTC

Return-Path: <volz@cisco.com>
X-Original-To: dhcwg@ietfa.amsl.com
Delivered-To: dhcwg@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 3996612089A for <dhcwg@ietfa.amsl.com>; Wed, 8 Jan 2020 09:05:48 -0800 (PST)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -14.519
X-Spam-Level:
X-Spam-Status: No, score=-14.519 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, DKIM_SIGNED=0.1, DKIM_VALID=-0.1, DKIM_VALID_AU=-0.1, HTML_MESSAGE=0.001, RCVD_IN_DNSWL_HI=-5, RCVD_IN_MSPIKE_H3=-0.01, RCVD_IN_MSPIKE_WL=-0.01, SPF_PASS=-0.001, URIBL_BLOCKED=0.001, USER_IN_DEF_DKIM_WL=-7.5] autolearn=ham autolearn_force=no
Authentication-Results: ietfa.amsl.com (amavisd-new); dkim=pass (1024-bit key) header.d=cisco.com header.b=ialydi6p; dkim=pass (1024-bit key) header.d=cisco.onmicrosoft.com header.b=W5dm6fSC
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id v3QqAWYdAnht for <dhcwg@ietfa.amsl.com>; Wed, 8 Jan 2020 09:05:44 -0800 (PST)
Received: from rcdn-iport-2.cisco.com (rcdn-iport-2.cisco.com [173.37.86.73]) (using TLSv1.2 with cipher DHE-RSA-SEED-SHA (128/128 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id 5ABFF12088C for <dhcwg@ietf.org>; Wed, 8 Jan 2020 09:05:44 -0800 (PST)
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/simple; d=cisco.com; i=@cisco.com; l=88222; q=dns/txt; s=iport; t=1578503144; x=1579712744; h=from:to:cc:subject:date:message-id:references: in-reply-to:mime-version; bh=14AgHt9CtWvBBqwZuPk8yr5XpVDFhu1HluH8f4O59iY=; b=ialydi6ppQOeRjuybRb6JyRCboRVVxninctC72DS80okGn4Av74eAm5y rIcOshm1qro3tdx6AY88eTiOEclmMGHs9FzMT4RHuki19Wed098oOF7Uq uNVpB5u7D8Zm+RHwBnEFQrp3NW+ah/nqJhV1hmoC7+kNcufC8az4Ckc3G o=;
IronPort-PHdr: 9a23:sw3DqxePyk5xsGDCqP4gwDHSlGMj4e+mNxMJ6pchl7NFe7ii+JKnJkHE+PFxlwKUD57D5adCjOzb++D7VGoM7IzJkUhKcYcEFlcejNkO2QkpAcqLE0r+eeDtaz4SF8VZX1gj9Ha+YgBY
X-IronPort-Anti-Spam-Filtered: true
X-IronPort-Anti-Spam-Result: A0CKAgCjCxZe/5tdJa0bA0gbAQEBAQEBAQUBAQERAQEDAwEBAYF8AoEjLyknBWxYIAQLKgqDf4NGA4sGgl+JYI4tgUKBEANQBAkBAQEMAQEYAQ4GAgEBhEACF4FTJDgTAgMNAQEEAQEBAgEFBG2FNwyFXgEBAQEDAQEQCAEIChMBASwLAQ8CAQYCEQQBASEBAgQDAgICHwYLFAkIAgQBDQUIGoMBgXlNAy4BAgyQCxKQZAKBOIhhdYEygn4BAQWBOQKDWw0LggwDBoE2AYwYGoIAgRABR4FOfj6BBIEXSQEBAgGBJAQFARECAQgYJAcJgloygiyNMSQygj+FV4lljjQxRAqCNoc2hT+FB4RBgkeHfoEDjxqEQYoUgUmHDoIfj3ICBAIEBQIOAQEFgWkiKj1xcBU7gmxQGA2MbiQHBRcVbwEHgkSFFIU/dAGBJ45DAYEPAQE
X-IronPort-AV: E=Sophos;i="5.69,410,1571702400"; d="scan'208,217";a="701553756"
Received: from rcdn-core-4.cisco.com ([173.37.93.155]) by rcdn-iport-2.cisco.com with ESMTP/TLS/DHE-RSA-SEED-SHA; 08 Jan 2020 17:05:24 +0000
Received: from XCH-RCD-008.cisco.com (xch-rcd-008.cisco.com [173.37.102.18]) by rcdn-core-4.cisco.com (8.15.2/8.15.2) with ESMTPS id 008H5Oei012502 (version=TLSv1.2 cipher=AES256-SHA bits=256 verify=FAIL); Wed, 8 Jan 2020 17:05:24 GMT
Received: from xhs-rtp-001.cisco.com (64.101.210.228) by XCH-RCD-008.cisco.com (173.37.102.18) with Microsoft SMTP Server (TLS) id 15.0.1473.3; Wed, 8 Jan 2020 11:05:22 -0600
Received: from xhs-aln-002.cisco.com (173.37.135.119) by xhs-rtp-001.cisco.com (64.101.210.228) with Microsoft SMTP Server (TLS) id 15.0.1473.3; Wed, 8 Jan 2020 12:05:22 -0500
Received: from NAM12-DM6-obe.outbound.protection.outlook.com (173.37.151.57) by xhs-aln-002.cisco.com (173.37.135.119) with Microsoft SMTP Server (TLS) id 15.0.1473.3 via Frontend Transport; Wed, 8 Jan 2020 11:05:22 -0600
ARC-Seal: i=1; a=rsa-sha256; s=arcselector9901; d=microsoft.com; cv=none; b=FmPF66z+bHD4JvnN1WA+tXnTsIzZytOYLBMBOebJaRRMWHzDcn3zQnkGf8HGtJ9uYaJa6E5qRlgsRqVZ96KJ4xCalPSfvFHAZJl3MiELwPSENtJlWHMfl8ioWbOdcY4N0l59DnHzdqihMPAwZVg8vgVfBujgx3VcGs0jl24pNQMkebLpw6w/tF5Z1qtQIXSSOXES28CVgvO9ArytVQDekCcrsTfuFKnaa03FZ94KEPWzG6D7S7B03YkKszQEgguoUU6besfV/oa4qlEE+IKVUYhu3paSSamskqekMbRYDUVCX44aw+pJyo5RLgjEVRb0Jk63IhFWAEx9qNVoGb5OjA==
ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=microsoft.com; s=arcselector9901; h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-SenderADCheck; bh=14AgHt9CtWvBBqwZuPk8yr5XpVDFhu1HluH8f4O59iY=; b=NFl68cmgXB5R5IgXA/bfQz4UMZfKDGoibdnabceAudN797cmKKaSiUFQmc0c3Aq+Y4IfZOzf8hbVT/pBz2ocOVVr+UAJXXEFCD5zeElFGEdgj+Tt+rGV1so/9LcjoBLOsARJ7b1HfWm1387Hi2UYCSxLb0QJqRHREU5FtuVyRiUxvpdtHG54knCp7pKGCBKicZ6FiBkUA6fvIcw9C6DU2ROGF//dRN5YEp2ncD++RF8p2m9wVIIa9KFis47o6dMEvrX4+IInY9kQlD2iMI1YkrCHOZ7Y/CYlCNKdgwrrk7mDDRMF3ELCImswnZcLa5keTqzsTrg0i6QjATw9prB21w==
ARC-Authentication-Results: i=1; mx.microsoft.com 1; spf=pass smtp.mailfrom=cisco.com; dmarc=pass action=none header.from=cisco.com; dkim=pass header.d=cisco.com; arc=none
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=cisco.onmicrosoft.com; s=selector2-cisco-onmicrosoft-com; h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-SenderADCheck; bh=14AgHt9CtWvBBqwZuPk8yr5XpVDFhu1HluH8f4O59iY=; b=W5dm6fSC8JD7srMbK7kzsKi+3lxOCCVLIbB26oYvgkNKTVbLCcyU+ykpKrm20TQKjndJg5FpxYUkvsb4aFmNEIn1Zfxppzrla0fret/wlM2UTqPe/eiib7P4n04Ez9vtlDk33DnhQuQuUiqcon6q1E8DP06VWhWzja5Y38xDSPM=
Received: from BYAPR11MB2888.namprd11.prod.outlook.com (20.177.226.147) by BYAPR11MB2549.namprd11.prod.outlook.com (52.135.226.33) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id 15.20.2602.10; Wed, 8 Jan 2020 17:05:20 +0000
Received: from BYAPR11MB2888.namprd11.prod.outlook.com ([fe80::5c56:b4b3:3f67:2bdb]) by BYAPR11MB2888.namprd11.prod.outlook.com ([fe80::5c56:b4b3:3f67:2bdb%5]) with mapi id 15.20.2602.017; Wed, 8 Jan 2020 17:05:20 +0000
From: "Bernie Volz (volz)" <volz@cisco.com>
To: "ianfarrer@gmx.com" <ianfarrer@gmx.com>, CARLOS JESUS BERNARDOS CANO <cjbc@it.uc3m.es>
CC: "dhcwg@ietf.org" <dhcwg@ietf.org>
Thread-Topic: [dhcwg] WGLC on draft-ietf-dhc-mac-assign-01 and draft-ietf-dhc-slap-quadrant-01 - respond by Nov. 17
Thread-Index: AQHVxXzMWbl519udNU66WIbAmH8PxKffqEQAgAFUXYCAAAFToA==
Date: Wed, 08 Jan 2020 17:05:20 +0000
Message-ID: <BYAPR11MB2888FFB1482D24FEA3ADCCC1CF3E0@BYAPR11MB2888.namprd11.prod.outlook.com>
References: <c9976d83-7243-cf44-a9c6-ff858afb5247@gmail.com> <CD79D9E3-4B44-4D9D-85A6-849EC540DCA4@gmx.com> <CALypLp_yuEXTX3BvjOuAPyhEbPeD1irthaSqT6RYRH0hZ9ae4g@mail.gmail.com> <BYAPR11MB288825CF4DE89C027BBA6ADACF3F0@BYAPR11MB2888.namprd11.prod.outlook.com> <F54DBBB9-9A9F-4F8A-9445-F8FD10B867D9@gmx.com>
In-Reply-To: <F54DBBB9-9A9F-4F8A-9445-F8FD10B867D9@gmx.com>
Accept-Language: en-US
Content-Language: en-US
X-MS-Has-Attach:
X-MS-TNEF-Correlator:
authentication-results: spf=none (sender IP is ) smtp.mailfrom=volz@cisco.com;
x-originating-ip: [173.38.117.91]
x-ms-publictraffictype: Email
x-ms-office365-filtering-correlation-id: da36b55b-a946-469b-f264-08d7945cf1a7
x-ms-traffictypediagnostic: BYAPR11MB2549:
x-microsoft-antispam-prvs: <BYAPR11MB2549A31659D67C69E4C39288CF3E0@BYAPR11MB2549.namprd11.prod.outlook.com>
x-ms-oob-tlc-oobclassifiers: OLM:6430;
x-forefront-prvs: 02760F0D1C
x-forefront-antispam-report: SFV:NSPM; SFS:(10009020)(136003)(346002)(366004)(39860400002)(396003)(376002)(199004)(189003)(9686003)(33656002)(7696005)(186003)(6506007)(55016002)(53546011)(81156014)(8676002)(71200400001)(86362001)(81166006)(8936002)(4326008)(2906002)(26005)(110136005)(66446008)(5660300002)(478600001)(966005)(316002)(66476007)(76116006)(30864003)(52536014)(66556008)(66946007)(64756008)(518174003)(579004); DIR:OUT; SFP:1101; SCL:1; SRVR:BYAPR11MB2549; H:BYAPR11MB2888.namprd11.prod.outlook.com; FPR:; SPF:None; LANG:en; PTR:InfoNoRecords; A:1; MX:1;
received-spf: None (protection.outlook.com: cisco.com does not designate permitted sender hosts)
x-ms-exchange-senderadcheck: 1
x-microsoft-antispam: BCL:0;
x-microsoft-antispam-message-info: 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
x-ms-exchange-transport-forked: True
Content-Type: multipart/alternative; boundary="_000_BYAPR11MB2888FFB1482D24FEA3ADCCC1CF3E0BYAPR11MB2888namp_"
MIME-Version: 1.0
X-MS-Exchange-CrossTenant-Network-Message-Id: da36b55b-a946-469b-f264-08d7945cf1a7
X-MS-Exchange-CrossTenant-originalarrivaltime: 08 Jan 2020 17:05:20.6503 (UTC)
X-MS-Exchange-CrossTenant-fromentityheader: Hosted
X-MS-Exchange-CrossTenant-id: 5ae1af62-9505-4097-a69a-c1553ef7840e
X-MS-Exchange-CrossTenant-mailboxtype: HOSTED
X-MS-Exchange-CrossTenant-userprincipalname: SdedLAsCAgmOl3/SGX0BBeUSmGT/nSeHWGei/652P2E6GuWMSsJDCRb5I4cMTFZP
X-MS-Exchange-Transport-CrossTenantHeadersStamped: BYAPR11MB2549
X-OriginatorOrg: cisco.com
X-Outbound-SMTP-Client: 173.37.102.18, xch-rcd-008.cisco.com
X-Outbound-Node: rcdn-core-4.cisco.com
Archived-At: <https://mailarchive.ietf.org/arch/msg/dhcwg/NbL_EV9eNl_OliZyJav8h_6IOyo>
Subject: Re: [dhcwg] WGLC on draft-ietf-dhc-mac-assign-01 and draft-ietf-dhc-slap-quadrant-01 - respond by Nov. 17
X-BeenThere: dhcwg@ietf.org
X-Mailman-Version: 2.1.29
Precedence: list
List-Id: <dhcwg.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/dhcwg>, <mailto:dhcwg-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/dhcwg/>
List-Post: <mailto:dhcwg@ietf.org>
List-Help: <mailto:dhcwg-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/dhcwg>, <mailto:dhcwg-request@ietf.org?subject=subscribe>
X-List-Received-Date: Wed, 08 Jan 2020 17:05:48 -0000

Hi:

Regarding (1), that probably is a good question. And, as the relay and server are more “controlled” (usually in the same administrative domain), perhaps it is not a consideration – other than it may be something to point out?

Regarding (2), I would think that if the relay provided the option, it was an administratively configured choice and so should override the client (i.e., it is administrative policy). I guess we could make it configurable on the server which is to be preferred (though we’d still need to recommend a default)?

But it does get tricky with what do you tell the client in terms of what happened with its preferences (and what if the relay and client preferences match)?

Let’s see what the slap-quadrant authors want to suggest for how to address these issues?

  *   Bernie
From: ianfarrer@gmx.com <ianfarrer@gmx.com>
Sent: Wednesday, January 8, 2020 11:51 AM
To: Bernie Volz (volz) <volz@cisco.com>; CARLOS JESUS BERNARDOS CANO <cjbc@it.uc3m.es>
Cc: dhcwg@ietf.org
Subject: Re: [dhcwg] WGLC on draft-ietf-dhc-mac-assign-01 and draft-ietf-dhc-slap-quadrant-01 - respond by Nov. 17

Hi Bernie / Carlos,

The following paragraph in Bernie’s comments raises a couple of questions:

"Since this and the mac-assign document should probably go as a package, perhaps this argues for requiring implementation of both? Or perhaps we should have the server that supports and used the OPTION_QUAD echo it back (in the IA_LL-options field for clients and Relay-Reply for relay agent) as that would be one way for the client or relay agent to know the server understood it (this would also remove the need for this to be support in the ERO option). Also, if the relay agent’s value was used (overrides the clients), it would NOT be echoed back in the IA_LL-option – just in the Relay-Reply)?”


1, I’m not clear what a relay agent can do by knowing whether the server implements OPTION_QUAD or not.

If the relay is configured to add OPTION_QUAD to the relay-forward message. The contents of this is based on its (static) configuration. If the server understands it and has the correct address type available, it allocates it and sends to the relay. The relay sends the IA_LL to the client.


If the server doesn’t understand it, OPTION_QUAD is ignored, an allocation is made based on whatever the server is configured with and this gets relayed to the client. The relay doesn’t look at the contents of the IA_LL.


What useful action can the relay take based on knowing that the server doesn’t implement OPTION_QUAD?




2, The question of priority in the case that a client sends OPTION_QUAD in its IA_LL and the relay also adds OPTION_QUAD is also interesting. I can see cases where you would want the relay's option to be used over the client’s. But, in the case of a mixed environment where there are devices without OPTION_QUAD and varied types of devices that do (mobile devices, IoT, MAC address randomization for privacy etc.), you may want the server to take the client’s OPTION_QUAD (if present) over the relay’s. It would be worth having some discussion of this is the document.




Thanks,
Ian






On 7. Jan 2020, at 22:05, Bernie Volz (volz) <volz@cisco.com<mailto:volz@cisco.com>> wrote:

In addition to Ian’s comments, I will add the following for you and the WG to consider:

For section 5.1, pref-n, I’d suggest explain what this value means (is a lower value more “preferred” or a higher?).

I’m also still wondering whether a simpler mechanism would just be to have the client provide the list of quadrant values it would like in the order of preference, so the option would be just quadrant-1, quadrant-2, […]. I’m really not sure what the pref value adds and it makes things more complicated in processing.

If you do keep the quad/pref, you should make it clear whether there is any requirement in terms of ordering or not (I would guess you would want not).

And, in either case, what does the absence of a quadrant mean – that the server SHOULD NOT assign this or assume they are of even lower preference? This is buried in the text section 4.1, item #2:

                                              If the server does not
       have addresses from the requested quadrant, it MUST return the
       IA_LL option containing a Status Code option with status set to
       NoQuadAvail.

I think you would want to specify the processing rules in the option description (i.e., section 5.1).

And, the text earlier in sections 4.1 and 4.2 says “In order to indicate the preferred SLAP quadrant,“ but that seems to be indicating only 1 – not a list of possible values?

Perhaps in 5.1, after the fields, you should add something like:

If the client or relay agent provide the OPTION_QUAD, the server uses the quadrant-n/pref-n values to order the selection of the quadrants. If the server can provide an assignment from one the specified quadrants, it should proceed with the assignment. If the server cannot provide an assignment from one of the specified quadrant-n fields, it MUST NOT assign any addresses and return a status of NoQuadAvail in the IA_LL Option.

There is no requirement that the client or relay agent order the quadrant/pref values in any specific order; hence servers MUST NOT assume that quadrant-1/pref-1 have the highest preference (except if there is only 1 set of values).

Client and relay agent MUST NOT place the same quadrant value into the option more than once; however servers should be capable of dealing with this by using the more preferred instance (as it requires no special handling).

If the same preference value is used for more than one quadrant, the behavior as to which is more preferred is random.

But also note that servers that do not support the OPTION_QUAD will proceed with assigning from whatever may be available. So, I’m wondering if this behavior is really the best – does the client (or relay agent) need to check that the addresses were assigned from the quadrant?

Since this and the mac-assign document should probably go as a package, perhaps this argues for requiring implementation of both? Or perhaps we should have the server that supports and used the OPTION_QUAD echo it back (in the IA_LL-options field for clients and Relay-Reply for relay agent) as that would be one way for the client or relay agent to know the server understood it (this would also remove the need for this to be support in the ERO option). Also, if the relay agent’s value was used (overrides the clients), it would NOT be echoed back in the IA_LL-option – just in the Relay-Reply)?


As a nit, you probably should be consistent in usage of Relay-Forw and Relay-Reply (some cases lower case is used) … and per RFC8415, the usage is:
                Relay-forward and Reply-reply when referring to the messages
                RELAY-FORW and RELAY-REPLY when referring to the msg-type of a message
So, you want to use “Relay-forward” and “Reply-reply” in pretty much all cases?


  *   Bernie

From: dhcwg <dhcwg-bounces@ietf.org<mailto:dhcwg-bounces@ietf.org>> On Behalf Of CARLOS JESUS BERNARDOS CANO
Sent: Tuesday, January 7, 2020 12:06 PM
To: ianfarrer@gmx.com<mailto:ianfarrer@gmx.com>
Cc: dhcwg@ietf.org<mailto:dhcwg@ietf.org>
Subject: Re: [dhcwg] WGLC on draft-ietf-dhc-mac-assign-01 and draft-ietf-dhc-slap-quadrant-01 - respond by Nov. 17

Dear Ian,

Thanks a lot for your very detailed review. I'll follow up on that on the mailing list and publish a new version (once we have agreed on all the changes) in the next few days.

Carlos

On Tue, Jan 7, 2020 at 4:11 PM <ianfarrer@gmx.com<mailto:ianfarrer@gmx.com>> wrote:
Hi,

As mentioned in my previous email, here is my review of draft-ietf-dhc-slap-quadrant-01.

Thanks,
Ian


Major Comments
———————————

Section 4.2

If the relay needs to insert the Quad option, then as I understand it, the right way to do this would be for the relay to put it into a Relay Supplied Option Option
(RSOO RFC6422). This requires an update to the IANA table at:

https://www..iana.org/assignments/dhcpv6-parameters/dhcpv6-parameters.xhtml#option-codes-s46-priority-option<https://www.iana.org/assignments/dhcpv6-parameters/dhcpv6-parameters.xhtml#option-codes-s46-priority-option>
-----

Step 3. If the client is sending multiple instances of the IA_LL, how are these associated to the relevant Quad option(s) added
by the relay, or is only a single quadrant possible for all of the IA_LLs in the client’s message?
------

Section 5.1

The structure of the option seems needlessly complex and introduces problems/exceptions that currently aren’t discussed, but could be
avoided. i.e. what happens if a quadrant id appears more than once? What if two id’s have the same preference values?

Couldn’t a simple, ordered list be used here? This would be processed in order (first to last) until a match is found. RFC8026 provides
an example of this.
———

I’m not sure if a new IANA registry of the valid values for the 'quadrant-n’ field is necessary. I’d appreciate the Chairs input on this.
--------


Sections 6 and 7.


The IANA and Security Considerations need to be completed. I’ve indicated necessary registry updates where relevant.



Minor Comments
-----------------------

Section 3.

"Migratable/non-migratable VM.  If the function implemented by the VM is subject to be moved
to another physical server or not.”

Is the above statement accurate? Surely it’s the migration of the VM (and its function) to a new
physical server that matters here..
———

Section 4.1

A ’NoQuadAvail’ error code is mentioned, but this is the only place in the document it occurs. If a new
DHCPv6 error code is being created, then this needs to be defined and the IANA registry updated:
https://www.iana.org/assignments/dhcpv6-parameters/dhcpv6-parameters.xhtml#dhcpv6-parameters-5

———
Section 5.1
The ERO option is introduced here, but I’m not sure how/why this would be used. If the server was to echo a Quad option back
to a relay, what does it do with the received information?




Grammar / Wording comments
-----------------------------------------


1.1.1. Wifi Devices
"but ELI/SAI quadrants might be more suitable in some scenarios,
such as if it is needed that the addresses belong to the CID
assigned to the IoT communication device vendor.”

Wording is quite cumbersome, suggest:

"but ELI/SAI quadrants might be more suitable in some scenarios,
such as if the addresses need to belong to the CID assigned to the IoT communication
 device vendor.”
——

1.1.2 Hypervisor: migratable vs non-migratable functions

If a VM (providing a given function) might  need to be potentially migrated
to another region of the data center (due to maintenance, resilience,
end-user mobility, etc.) it is needed that this VM can keep its
networking context in the new region, and this includes keeping
its MAC addresses.

The language is a bit redundnat in this sentance. Suggested re-word:

If a VM (providing a given function) needs to be migrated to another region
of the data center (e.g. for maintenance, resilience, end-user mobility, etc.),
the VM's networking context needs to migrate with the VM. This includes the VM's
MAC address(es).
---

Non-migratable functions.  If a VM will not be migrated to another
      region of the data center, there are no requirements associated to
      its MAC address, and then it is more efficient to allocate it from
      the AAI SLAP quadrant, which does not need to be same for all the
      data centers (i.e., each region can manage its own, without
      checking for duplicates globally).

Suggested re-word for readability:

Non-migratable functions.  If a VM will not be migrated to another
      region of the data center, there are no requirements associated with
      its MAC address. In this case, it is more efficient to allocate it from
      the AAI SLAP quadrant, that does not need to be unique across
     multiple data centers (i.e., each region can manage its own MAC address
     assignment, without checking for duplicates globally).
——————

2. Terminology

This has the following sentence:
"The DHCPv6 terminology relevant to this specification from the DHCPv6
   Protocol [RFC8415] applies here.”

…then goes on to redefine client and server. Suggest that the above sentence
is replaced with:

“Where relevant, the DHCPv6 terminology from the DHCPv6
Protocol [RFC8415] also applies here. Additionally, the following definitions are updated
for this document."
----

There also needs to be a definition for the relay function, as it needs to be updated for
the Quad option as well.
—————


3. Quadrant selection mechanisms

s/Quadrant selection mechanisms/Quadrant Selection Mechanisms/
----

"We next describe some exemplary ways to perform SLAP quadrant
   selection.  These are provided just as informational text to
   exemplify how the quadrant preference mechanisms could be used.”

Suggested re-word:

The following section describes some examples of how the quadrant preference mechanisms could be used.
——

Putting the IoT, Wifi and Data Center examples into their own sub-sections would improve the structure and
readability.
———

The way that the IoT’s SLAP quadrant decision making is written implies a level of autonomy and free will
that devices don’t possess and many of considerations are unknowable to the device itself. The bullet points are
considerations that the device vendor/administrator may wish to use when defining the IoT device’s MAC
address request policy. Please reword to reflect this.
——

"IoT devices are typically very
   resource constrained, so it might be as well that simple decisions
   are just taken, for example based on pre-configured preferences.”

Suggested reword for clarity:

"IoT devices are typically very
   resource constrained, so there may only be simple decision making
process based on pre-configured preferences.”
——

s/Most modern OS/Most modern OSs/
——

s/and this might mean the OS to force the use or change of a local MAC address./
and this might require that the OS forces the use of a local MAC address, or that
the local MAC address is changed./
———

4.1 Address assignment from the preferred SLAP quadrant indicated by
      the client

s/Address assignment from the preferred SLAP quadrant indicated by
      the client/Address Assignment from the Preferred SLAP Quadrant Indicated by
      the Client/
——

s/We describe next/Next, we describe/
----

Much of the content of this section duplicates what is described in [I-D.ietf-dhc-mac-assign].
It would be better just to have a pointer to the relevant sections of that document and describe
the changes that the Quad option makes to this process.
————


4.2 Address assignment from the SLAP quadrant indicated by the relay

s/Address assignment from the SLAP quadrant indicated by the relay/Address Assignment from the SLAP Quadrant Indicated by the Relay/
——

s/We describe next/Next, we describe/
——

Figure 4 seem to show that the relay adds the Quad option into the client's SOLICIT - i.e. alters the contents of the client’s
message.

This is not described by the body text, but the diagram needs to be fixed to avoid confusion here.
———


5.1. DHCPv6 options definitions

s/DHCPv6 options definitions/DHCPv6 Option Definition/
——




On 30. Oct 2019, at 02:51, Tomek Mrugalski <tomasz.mrugalski@gmail.com<mailto:tomasz.mrugalski@gmail.com>> wrote:

Hi,
This mail initiates a Working Group Last Call on two related IDs:

Link-Layer Addresses Assignment Mechanism for DHCPv6
draft-ietf-dhc-mac-assign-01
https://tools.ietf.org/html/draft-ietf-dhc-mac-assign-01<https://tools.ietf..org/html/draft-ietf-dhc-mac-assign-01>

and

SLAP quadrant selection options for DHCPv6
draft-ietf-dhc-slap-quadrant-01
https://tools.ietf.org/html/draft-ietf-dhc-slap-quadrant-01

Authors believe those drafts are ready for WGLC. Please post your
substantial comments and your opinion whether those are ready for
publication or not. If you have minor editorial comments, you may send
them to the authors directly.

Please post your comments by Nov. 17th.

Cheers,
Tomek

_______________________________________________
dhcwg mailing list
dhcwg@ietf.org<mailto:dhcwg@ietf.org>
https://www.ietf.org/mailman/listinfo/dhcwg

_______________________________________________
dhcwg mailing list
dhcwg@ietf.org<mailto:dhcwg@ietf.org>
https://www.ietf.org/mailman/listinfo/dhcwg