[Int-dir] RFC7217 [was An IOT DIR review of draft-ietf-anima-autonomic-control-plane]

Brian E Carpenter <brian.e.carpenter@gmail.com> Tue, 22 May 2018 20:55 UTC

Return-Path: <brian.e.carpenter@gmail.com>
X-Original-To: int-dir@ietfa.amsl.com
Delivered-To: int-dir@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 1756C12D886; Tue, 22 May 2018 13:55:51 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -2
X-Spam-Level:
X-Spam-Status: No, score=-2 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, DKIM_SIGNED=0.1, DKIM_VALID=-0.1, DKIM_VALID_AU=-0.1, FREEMAIL_FROM=0.001, RCVD_IN_DNSWL_NONE=-0.0001, SPF_PASS=-0.001] autolearn=ham autolearn_force=no
Authentication-Results: ietfa.amsl.com (amavisd-new); dkim=pass (2048-bit key) header.d=gmail.com
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id ksFhaGrQFFQL; Tue, 22 May 2018 13:55:49 -0700 (PDT)
Received: from mail-pf0-x244.google.com (mail-pf0-x244.google.com [IPv6:2607:f8b0:400e:c00::244]) (using TLSv1.2 with cipher ECDHE-RSA-AES128-GCM-SHA256 (128/128 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id 48D80124D37; Tue, 22 May 2018 13:55:49 -0700 (PDT)
Received: by mail-pf0-x244.google.com with SMTP id f189-v6so9359217pfa.7; Tue, 22 May 2018 13:55:49 -0700 (PDT)
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=gmail.com; s=20161025; h=subject:to:cc:references:from:message-id:date:user-agent :mime-version:in-reply-to:content-language:content-transfer-encoding; bh=YlS7QW+n6C5qCDKyh7VWOujrZ9Js1Ysx3XsdyJWvmo8=; b=Qc8eEzxL/SJ/ReBHGGFm9/J4vOySEhox4uYYUQU0696YLFjWmzpJtnOh3htSVj+62a gpKDAmpORD9ROQdS6EnRMip6LKgtG4vhDNmuXvfvq+cV3fwLStu3llTsiYkE/ysGJeh0 uNQidPHQkWJv6yMyC9glIbrT/Q8XY2+EJ+m4wR/7nWCbZauW8pnbYyh5dF7CGPwo+4RC Pj6B6EeKVz0uqF/urD6mo6GdUm51uIlhlJVYsZMt6GZ6cJtUnGw/N+D0DXqFdleUkQOC BBU59i5FzSve/8PhOcqfGo6IEE+OgvjKS44nEnuVgNkT+k2ljICej1ogXZoi9WyD9A3l S0/g==
X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20161025; h=x-gm-message-state:subject:to:cc:references:from:message-id:date :user-agent:mime-version:in-reply-to:content-language :content-transfer-encoding; bh=YlS7QW+n6C5qCDKyh7VWOujrZ9Js1Ysx3XsdyJWvmo8=; b=jLOJoTfOLPBd1JRbtcbUYSnnkRAYf6ZjdvYR+wIN7qeDCn3LH8ChBDK7zrBBlVmp+F 8vmilUsWAWcwK4hUl14BnXjUAtDJTYCwXhVHZ326lCe3XUapGCNkIzqVhcI/CJUIe9yL gTp+NNGolel18K67CO0BbPTMZvuhkEMgxiqbtOC32DiVhyIC7e0VE8HQEsVyKHhm9j85 5iNriZqoPJIwiFNLr5C0JAfzA9azctCdtppvM5mh9XRucnfgiwkaR/o/zTg0QtM+PZYH fIZR32oGYkZ1wXxeuI4Xe7vL4PVb62+ZLTArG4YNxoA4kU+JGKUzqN6E/KySf5pMClNt ba0Q==
X-Gm-Message-State: ALKqPwfNQXUKls7KDeCqFI0km1n7/oRFvqDrfMZ5Uw/+HWBo9ExW5Pc3 nPgoYrpmz5AC8pt5ht3dfQ19Bw==
X-Google-Smtp-Source: AB8JxZrv14ZI3C/oh+zA4w6c0VZ0TzOvCm243FK5lkoWOjPBt7LJmU1bwFUHsR+0c9Ma9aIyEsXixw==
X-Received: by 2002:a62:b509:: with SMTP id y9-v6mr34367pfe.121.1527022548495; Tue, 22 May 2018 13:55:48 -0700 (PDT)
Received: from [192.168.178.21] ([118.148.121.80]) by smtp.gmail.com with ESMTPSA id 131-v6sm28768795pfa.128.2018.05.22.13.55.44 (version=TLS1_2 cipher=ECDHE-RSA-AES128-GCM-SHA256 bits=128/128); Tue, 22 May 2018 13:55:47 -0700 (PDT)
To: "Pascal Thubert (pthubert)" <pthubert@cisco.com>, Toerless Eckert <tte@cs.fau.de>
Cc: "ops-dir@ietf.org" <ops-dir@ietf.org>, "draft-ietf-anima-autonomic-control-plane@ietf.org" <draft-ietf-anima-autonomic-control-plane@ietf.org>, "anima@ietf.org" <anima@ietf.org>, iot-dir <iot-dir@ietf.org>, "int-dir@ietf.org" <int-dir@ietf.org>
References: <449b7e2f10094531b325919710696754@XCH-RCD-001.cisco.com> <20180510060636.gspxrd4d7duaksc7@faui48f.informatik.uni-erlangen.de> <a8a7be73373c4c68bf885dc10daff09d@XCH-RCD-001.cisco.com>
From: Brian E Carpenter <brian.e.carpenter@gmail.com>
Message-ID: <4823a9d3-9ea9-4403-3db8-8e34bb159fd6@gmail.com>
Date: Wed, 23 May 2018 08:55:47 +1200
User-Agent: Mozilla/5.0 (Windows NT 6.1; WOW64; rv:52.0) Gecko/20100101 Thunderbird/52.7.0
MIME-Version: 1.0
In-Reply-To: <a8a7be73373c4c68bf885dc10daff09d@XCH-RCD-001.cisco.com>
Content-Type: text/plain; charset="utf-8"
Content-Language: en-US
Content-Transfer-Encoding: 7bit
Archived-At: <https://mailarchive.ietf.org/arch/msg/int-dir/oVeU_yYi4PHFogdZGqdi4B4I3Fg>
Subject: [Int-dir] RFC7217 [was An IOT DIR review of draft-ietf-anima-autonomic-control-plane]
X-BeenThere: int-dir@ietf.org
X-Mailman-Version: 2.1.22
Precedence: list
List-Id: "This list is for discussion between the members of the Internet Area directorate." <int-dir.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/int-dir>, <mailto:int-dir-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/int-dir/>
List-Post: <mailto:int-dir@ietf.org>
List-Help: <mailto:int-dir-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/int-dir>, <mailto:int-dir-request@ietf.org?subject=subscribe>
X-List-Received-Date: Tue, 22 May 2018 20:55:51 -0000

On 23/05/2018 02:06, Pascal Thubert (pthubert) wrote:
> Hello Toerless:
...
> 
>>> -           "ACP nodes MUST perform standard IPv6 operations across ACP
>> virtual
>>> interfaces including SLAAC (Stateless Address Auto-Configuration -
>>> RFC4862])"
>>>
>>> They may actually prefer Optimistic DAD RFC 4429 since address duplication
>> is highly improbable as long as you .
>>
> 
>> Added:
>>
>>         <t>"Optimistic Duplicate Address Detection (DAD)" according to
>>         <xref target="RFC4429"/> is RECOMMENDED because the likelyhood for
>>         duplicates between ACP nodes is highly improbable as long as
>>         the address can be formed from a globally unique local assigned
>> identifier
>>         (e.g.: EUI-48/EUI-64, see below).</t>
>>
> [PT>] 
> [PT>] I'm unsure what your recommendation for the interface ID is thus the discussion on RFC 7217.

Privacy is not really an issue here. Firstly we're talking about
devices, not people. More important, we're talking about ULA
addresses that will not be visible outside the domain covered
by the ACP. So the old-fashioned technique of using modified EUI-64
would be safe, and there is no real need to use RFC7217.

However, since RFC8064 recommends RFC7217 for all SLAAC nodes,
and the ACP uses SLAAC, RFC7217 is automatically recommended
by the existing standards. I don't think we should mention EUI-64.

   Brian