[dhcwg] comments on ietf-dhc-topo-conf-01
神明達哉 <jinmei@wide.ad.jp> Tue, 08 April 2014 18:07 UTC
Return-Path: <jinmei.tatuya@gmail.com>
X-Original-To: dhcwg@ietfa.amsl.com
Delivered-To: dhcwg@ietfa.amsl.com
Received: from localhost (ietfa.amsl.com [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 46B611A0695 for <dhcwg@ietfa.amsl.com>; Tue, 8 Apr 2014 11:07:51 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: 4.622
X-Spam-Level: ****
X-Spam-Status: No, score=4.622 tagged_above=-999 required=5 tests=[BAYES_50=0.8, CHARSET_FARAWAY_HEADER=3.2, DKIM_SIGNED=0.1, DKIM_VALID=-0.1, FM_FORGED_GMAIL=0.622, FREEMAIL_FROM=0.001, SPF_PASS=-0.001] autolearn=no
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id NorkLZCdySCK for <dhcwg@ietfa.amsl.com>; Tue, 8 Apr 2014 11:07:49 -0700 (PDT)
Received: from mail-wg0-x22b.google.com (mail-wg0-x22b.google.com [IPv6:2a00:1450:400c:c00::22b]) by ietfa.amsl.com (Postfix) with ESMTP id 85F0F1A0694 for <dhcwg@ietf.org>; Tue, 8 Apr 2014 11:07:49 -0700 (PDT)
Received: by mail-wg0-f43.google.com with SMTP id x13so1341362wgg.26 for <dhcwg@ietf.org>; Tue, 08 Apr 2014 11:07:49 -0700 (PDT)
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=gmail.com; s=20120113; h=mime-version:sender:date:message-id:subject:from:to:cc:content-type; bh=V8W9Gn6qq5Ap/XbkkUs2OFgUllCyvsFastNIL4NnhVY=; b=XPqYxM8PnpAp3rotyDagEqxH/t8cIn4a6KZ6Tlh+tdPVGca81CWQ3UZN4c4+LlvmM5 5KuWEgeEt0G6TvU2AkTApmzyrxgjuSRwLnAd+Z+3dQuszRdhlR7QLQjA729CcuQ8gCdH cQL0Az+CawCWY3P+L6GeAz5h0GIaNrHKHvQinYnyi8I9ST83+8dAIF+pnsSXCKa7GWF0 YeGcA99rTpXlfKekktKfT8EworvukGhOU8Ni0jQmyqyDvQfLflzowQ1GYENE8hhYuxSF eqE1dWXJpoQgflkIpC3hIr0Iv3oAOqsd2hyx6fTl4vSKSlwV8nrlm0fTJldb2d9ww/0D vhEw==
MIME-Version: 1.0
X-Received: by 10.180.24.134 with SMTP id u6mr33446898wif.41.1396980468941; Tue, 08 Apr 2014 11:07:48 -0700 (PDT)
Sender: jinmei.tatuya@gmail.com
Received: by 10.194.123.101 with HTTP; Tue, 8 Apr 2014 11:07:48 -0700 (PDT)
Date: Tue, 08 Apr 2014 11:07:48 -0700
X-Google-Sender-Auth: KwBhvhgV654vqkg3rP98ZEzjpb8
Message-ID: <CAJE_bqdas4pgy61yJq+uZ-DeAOzumYLcockEnOtWS6s8hra2qQ@mail.gmail.com>
From: 神明達哉 <jinmei@wide.ad.jp>
To: draft-ietf-dhc-topo-conf@tools.ietf.org
Content-Type: text/plain; charset="ISO-8859-1"
Archived-At: http://mailarchive.ietf.org/arch/msg/dhcwg/tGODpj8_TWWfIbkGFZZyeA6kRsU
Cc: "dhcwg@ietf.org" <dhcwg@ietf.org>
Subject: [dhcwg] comments on ietf-dhc-topo-conf-01
X-BeenThere: dhcwg@ietf.org
X-Mailman-Version: 2.1.15
Precedence: list
List-Id: <dhcwg.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/dhcwg>, <mailto:dhcwg-request@ietf.org?subject=unsubscribe>
List-Archive: <http://www.ietf.org/mail-archive/web/dhcwg/>
List-Post: <mailto:dhcwg@ietf.org>
List-Help: <mailto:dhcwg-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/dhcwg>, <mailto:dhcwg-request@ietf.org?subject=subscribe>
X-List-Received-Date: Tue, 08 Apr 2014 18:07:51 -0000
I have some small (and maybe a bit out of scope) comments on the draft. - page 6 (Section 3) it states: [...] If for whatever reason that is not feasible (e.g. because the relay agent does not have a global address), the relay agent includes an interface-id option that identifies the link clients are connected to. In the "e.g." part, "the relay agent does not have a global address" means it doesn't have a global address configured on the client-facing interface, right? (Otherwise it's very unlikely for the relay agent to reach DHCPv6 servers). But this sentence could also read as if the relay agent doesn't have any global address on any of its interfaces. Maybe it's not that confusing in the entire context, but I think it's better to revise it so it will be even much less confusing. - and on the next sentence: [...] It is up to administrator to make sure that the interface-id is unique within his administrative domain. Is it expected that an administrator would use interface-id's unique even outside of the relay agent? While RFC 3315 doesn't seem to be very specific, I thought interface-id's would be generally only unique within that particular relay agent (an DHCPv6 relay agent implementation I previously worked on used the OS interface index for the interface-id). While this sentence is not incorrect since it only says "it's up to admin", the tone of this sentence is a bit surprising to me, and I wonder what's the common practice in other implementations and actual deployments. - also in Section 3 (page 7), this paragraph isn't very understandable to me: In all cases, then, the DHCP server will have a link-identifying IP address, and in some cases it may also have a link-specific identifier. It should be noted that there is no guarantee that the link-specific identifier will be unique outside the scope of the link-identifying IP address. What's "link-specific identifier"? Is this a higher level concept that means - global address for the link-address field when provided, or - the interface-id option value when provided or mandated ? The second sentence is also not really clear to me...what does "outside the scope of the link-identifying IP address" mean? Usually "the link-identifying IP address" should be global, so there is basically no "outside the scope" of it in the first place. I guess these are mostly an editorial matter rather than a technical issue, but in its current form this paragraph is very confusing to me. - In Section 8, it states: [...] When changes are made to the DNS server, these changes are immediately and automatically adopted by the DHCP server. I'm afraid "immediately" is not very accurate, since it's more likely that the DHCP server actually uses some caching server and a change at the DNS server (or more accurately, zone) won't be visible to the DHCP server until the cache expires. Of course, it's the DNS admin's responsibility to make sure that the cached information is valid until all cache of it expires, but that's different from the new information being "immediately adopted" by the DHCP server. Also related, this paragraph actually talks about two different types of DNS servers (or their administrators"): the caching DNS server that the DHCP server uses and the authoritative DNS server that manages the information that the DHCP server would ultimately need. It would probably be clearer if this paragraph differentiates these two types of DNS servers according to the appropriate context. -- JINMEI, Tatuya