Re: 64share v2

Ca By <cb.list6@gmail.com> Tue, 10 November 2020 18:12 UTC

Return-Path: <cb.list6@gmail.com>
X-Original-To: ipv6@ietfa.amsl.com
Delivered-To: ipv6@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id F2EC63A0DEA for <ipv6@ietfa.amsl.com>; Tue, 10 Nov 2020 10:12:34 -0800 (PST)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -1.847
X-Spam-Level:
X-Spam-Status: No, score=-1.847 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, DKIM_SIGNED=0.1, DKIM_VALID=-0.1, DKIM_VALID_AU=-0.1, DKIM_VALID_EF=-0.1, FREEMAIL_ENVFROM_END_DIGIT=0.25, FREEMAIL_FROM=0.001, HTML_MESSAGE=0.001, SPF_HELO_NONE=0.001, SPF_PASS=-0.001, URIBL_BLOCKED=0.001] autolearn=ham autolearn_force=no
Authentication-Results: ietfa.amsl.com (amavisd-new); dkim=pass (2048-bit key) header.d=gmail.com
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id cID9yoLSIAqy for <ipv6@ietfa.amsl.com>; Tue, 10 Nov 2020 10:12:33 -0800 (PST)
Received: from mail-il1-x12d.google.com (mail-il1-x12d.google.com [IPv6:2607:f8b0:4864:20::12d]) (using TLSv1.2 with cipher ECDHE-RSA-AES128-GCM-SHA256 (128/128 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id A1A8C3A0DDE for <ipv6@ietf.org>; Tue, 10 Nov 2020 10:12:33 -0800 (PST)
Received: by mail-il1-x12d.google.com with SMTP id y9so5973877ilb.0 for <ipv6@ietf.org>; Tue, 10 Nov 2020 10:12:33 -0800 (PST)
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=gmail.com; s=20161025; h=mime-version:references:in-reply-to:from:date:message-id:subject:to :cc; bh=vwtCY3xkgcOX2IIH/bXbhFZTdv9T3GEeLItKoF3KB9g=; b=UUxLQJBulhXalzIfMMG16mr3PY/kIY1FfmC8fPJ0N9E57QMl/tE2QZiCjU/Lf+QW8G fRE5kZjrGpNWLbY5tqLFR/f0auWn1jmZwDe3U9fdFD07R+IenL/cIwlk+w3/M4Dm9mu3 YMOWw8HSPVR0+cuvk27t85AIa3X50UL0/mLgD/Iz+2oE2nDX+PBSmJ5OeP/JMYgDLxWc 4HcQrnVYOH+sygmoX651akV75tir9P88L1eRA3i4dESbhgdbOT2muzDm7QWxqTwic5RX nuiMRIuBzAb3rxtA8LIgK530OIJfn6FMpZaXEitefh4++G5vR8BD/htH3Zos0OvgcNmR xMtA==
X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20161025; h=x-gm-message-state:mime-version:references:in-reply-to:from:date :message-id:subject:to:cc; bh=vwtCY3xkgcOX2IIH/bXbhFZTdv9T3GEeLItKoF3KB9g=; b=tGHPwMzKE9/z5dhwTIXg8bwWDtlNL7R4OqTRLfu6O+8voiyhG68Q6i3koL2j/Xhabu b4wyyacUDkqx9Jxox6knmS/F33SxkF58697phBxCQPOvicBZQWaIuJJKPaFnVaZlwvy2 n59BRyyL0u+rIO5RPG27Sns7BnrryhdyOWYMpQenf8KHfV13Ww2VXBG1+Il4jUbysskS TJ2d6VH0OA2qmTnIkhrT3hdOpxMQZs4Ey8+MXPHpcYspTQ24bAmQg5suiH6aYK6NCspI q2E+3+OqFjSKPBeDG7asjh6F4J4JSbCyuuTZAkQBGONUZoSuIC/UCNoxFOQEfm1Mbc7X fZsQ==
X-Gm-Message-State: AOAM531EBq6KGheQTkQIoDCMwnpSeIIV8elJc/GwcLLlL3lsRuy1fLyc TdI5L/0zOCtDQpZmP2mhs5jaNceFMChavpYMeGoISg4Z2Vc=
X-Google-Smtp-Source: ABdhPJwM7B3MJadsSAgPAFysw5de5qQB3P+070TGoeOQUC2ak6GlKBezn2N4bpfVdZ4msSmbrmJL+9AZeqqBCfB+sbk=
X-Received: by 2002:a92:1548:: with SMTP id v69mr13496874ilk.68.1605031952709; Tue, 10 Nov 2020 10:12:32 -0800 (PST)
MIME-Version: 1.0
References: <CAD6AjGR-NE_sJ_jp7nAT6OvNkcdE9qoWuGEiiVW7r9YtsQvbbw@mail.gmail.com> <CAKD1Yr0G8PjzE+pULte_AaOi=RHMLyto-YUQerGjQ=iOYnz+iA@mail.gmail.com> <0986B112-2159-4045-87F9-876B58F1D896@employees.org> <CAKD1Yr0h9=7p+n=qnH1o1EHqtPrsaYebgvHciOJpP3=iXgNgKQ@mail.gmail.com> <0C739112-D8EA-42C3-BEFD-88C014D5BCD0@employees.org> <62bc0e56-85b8-42ea-c46b-4f2205dc435f@joelhalpern.com> <28C2E56B-1443-480A-B3D1-82E0F8CC0EC7@employees.org> <aabd41ad-1770-f2ac-77d6-62bfff1992c0@joelhalpern.com> <CC7C2B94-5A05-4682-8367-9072CC201C49@employees.org> <80ed3a3b-6e2c-188f-4c1e-c2ededfbbe0d@joelhalpern.com> <0188AC41-60B0-4BC6-810D-DC59CF9E4FB3@employees.org> <1931a638-64ed-f40e-07a3-67cf1eafb941@joelhalpern.com> <376D6BB0-87E2-42E5-9BC4-F3A2F04FA005@employees.org> <CAD6AjGSr-TPcGo7f9EGgoAahYLQTL68CUSq58LGMgD0=6GmRRg@mail.gmail.com> <8DC674FB-9F90-4C41-A323-62BD62934A12@employees.org>
In-Reply-To: <8DC674FB-9F90-4C41-A323-62BD62934A12@employees.org>
From: Ca By <cb.list6@gmail.com>
Date: Tue, 10 Nov 2020 10:12:21 -0800
Message-ID: <CAD6AjGTYBs8YbHgCJJG84vgwXK4ZSCm65z6KXvZP9F+LdT_atg@mail.gmail.com>
Subject: Re: 64share v2
To: otroan@employees.org
Cc: 6man WG <ipv6@ietf.org>
Content-Type: multipart/alternative; boundary="0000000000006512cb05b3c49fab"
Archived-At: <https://mailarchive.ietf.org/arch/msg/ipv6/4LZe4BWxYxjFIEf4LK5vrDRWUjo>
X-BeenThere: ipv6@ietf.org
X-Mailman-Version: 2.1.29
Precedence: list
List-Id: "IPv6 Maintenance Working Group \(6man\)" <ipv6.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/ipv6>, <mailto:ipv6-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/ipv6/>
List-Post: <mailto:ipv6@ietf.org>
List-Help: <mailto:ipv6-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/ipv6>, <mailto:ipv6-request@ietf.org?subject=subscribe>
X-List-Received-Date: Tue, 10 Nov 2020 18:12:35 -0000

On Tue, Nov 10, 2020 at 10:04 AM <otroan@employees.org> wrote:

> Cameron,
>
> > > From what the operators have said, using the existing infrastructure
> for RA/SLAAC is important.  They have not needed DHCPv6.  So they want to
> be able to offer this using the tools they have deployed.  That seems
> reasonable to me.  Creating a new protocol for this would seem even worse.
> >
> > Then you must have missed the point I made earlier.
> >
> > What operators find attractive about the RA hack is a deployment model
> where the user's delegated prefix is taken out of a dynamic pool local to
> the box.
> > That deployment model results in ephemeral addresses. Which might work
> in an environment with tethering today (a client-only stub network, where
> user is expected to press refresh often). But it is not obvious how scaling
> that hack to multiple links/routers is possible. Without a massive cost to
> the rest of the ecosystem.
> >
> >
> > Ole,
> >
> > Your understanding is correct.
>
> Excellent!
>
> > I believe this thread saw several reports that prefixes in the home are
> commonly ephemeral, sometimes on purpose, so this is not new .  It is also
> consistent to my user experience with multiple large USA broadband
> providers.  Reports from around the world confirm similar, see
> draft-ietf-v6ops-slaac-renum-05.  Do you believe there is a new risk here
> that is not yet commonly seen ?
>
> The slaac-renum documents describe only a small subset of the problems
> that ephemeral addressing causes.
>
> > If you would like to provide some brief cautionary text for the I-D, I
> would be happy to include it, so that implementers are not under any false
> impressions.  Perhaps reference to draft-ietf-v6ops-slaac-renum-05   would
> be sufficient.  That said, like many I-Ds, this one has trade-offs.
>
> It isn't as much an implementation problem (implementation of this is
> easy) it's the operational problems caused by this (operations in the
> end-user networks).
>

Can you be specific with regards to text in the i-d draft ?



> Is it not irresponsible to specify a mechanism that we know will cause
> massive pain for host stacks, applications etc, if we were to properly fix
> the problem properly, or a miserably functioning network for the end-users
> if we didn't.
>
> Feel free to tell me I'm wrong, and how networks are supposed to work with
> ephemeral addressing.


>
> Best regards,
> Ole