Re: draft-bourbaki-6man-classless-ipv6-00

otroan@employees.org Sat, 10 June 2017 13:14 UTC

Return-Path: <otroan@employees.org>
X-Original-To: ipv6@ietfa.amsl.com
Delivered-To: ipv6@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id D291012940F for <ipv6@ietfa.amsl.com>; Sat, 10 Jun 2017 06:14:46 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -2.001
X-Spam-Level:
X-Spam-Status: No, score=-2.001 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, DKIM_SIGNED=0.1, DKIM_VALID=-0.1, DKIM_VALID_AU=-0.1, SPF_PASS=-0.001] autolearn=ham autolearn_force=no
Authentication-Results: ietfa.amsl.com (amavisd-new); dkim=pass (1024-bit key) header.d=employees.org; domainkeys=pass (1024-bit key) header.from=otroan@employees.org header.d=employees.org
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id 5HmEGZgA3dHJ for <ipv6@ietfa.amsl.com>; Sat, 10 Jun 2017 06:14:44 -0700 (PDT)
Received: from esa01.kjsl.com (esa01.kjsl.com [IPv6:2607:7c80:54:3::87]) by ietfa.amsl.com (Postfix) with ESMTP id D33CA129410 for <ipv6@ietf.org>; Sat, 10 Jun 2017 06:14:43 -0700 (PDT)
Received: from cowbell.employees.org ([198.137.202.74]) by esa01.kjsl.com with ESMTP/TLS/DHE-RSA-AES256-GCM-SHA384; 10 Jun 2017 13:14:42 +0000
Received: from cowbell.employees.org (localhost [127.0.0.1]) by cowbell.employees.org (Postfix) with ESMTP id 4A361D788B; Sat, 10 Jun 2017 06:14:42 -0700 (PDT)
DKIM-Signature: v=1; a=rsa-sha1; c=relaxed; d=employees.org; h=from :message-id:content-type:mime-version:subject:date:in-reply-to :cc:to:references; s=selector1; bh=k8jQflvuR8LG5RGsm1rsB7rFSMw=; b= mt0xDP3glSDfH7xYNnUJKmuhNJbFTN0lx3AxUcoSFvzndjQwmA8Bjc3HQtZcEMl6 wojtKBwcy/i1LLvHrYmRN3Gq9FM1m48t2rem1issL5g7UvOEIDSQr4y2pbMpM31v yjop7ipwo7LcOJkig6tTcZNZlv3wsRQhBBp/z2IRh4Q=
DomainKey-Signature: a=rsa-sha1; c=nofws; d=employees.org; h=from :message-id:content-type:mime-version:subject:date:in-reply-to :cc:to:references; q=dns; s=selector1; b=FRLChUcURIRyUnjYUagLAh6 srdlG24ubJWn9JZgZZ2zgX5wBPPl6HJ8BnWz4rj1xDc2NmRjilgSy3BhNEC5BZmg pzQURY6tbDM75jwk3FrHdRTBaTr1mn6cri2kcxuN9sKAkwHLCTdq/5gnHLwx5TsJ NlsPEjonIFlfJ8wc5NOE=
Received: from h.hanazo.no (96.51-175-103.customer.lyse.net [51.175.103.96]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) (Authenticated sender: otroan) by cowbell.employees.org (Postfix) with ESMTPSA id E1A5ED788A; Sat, 10 Jun 2017 06:14:41 -0700 (PDT)
Received: from [IPv6:::1] (localhost [IPv6:::1]) by h.hanazo.no (Postfix) with ESMTP id 2FF25D0EA367; Sat, 10 Jun 2017 15:14:41 +0200 (CEST)
From: otroan@employees.org
Message-Id: <E02C4C99-155A-4358-A845-F00F8BB071C1@employees.org>
Content-Type: multipart/signed; boundary="Apple-Mail=_0025C96A-CAF8-4D5B-9DF7-0242C89FA548"; protocol="application/pgp-signature"; micalg="pgp-sha512"
Mime-Version: 1.0 (Mac OS X Mail 10.3 \(3273\))
Subject: Re: draft-bourbaki-6man-classless-ipv6-00
Date: Sat, 10 Jun 2017 15:14:40 +0200
In-Reply-To: <4b2f5200-86a1-7711-e5ff-7436572be467@gmail.com>
Cc: Fernando Gont <fgont@si6networks.com>, 6man WG <ipv6@ietf.org>
To: Brian E Carpenter <brian.e.carpenter@gmail.com>
References: <20170602141112.x64nleqclygz7dwd@Vurt.local> <20170602141259.GD30896@gir.theapt.org> <CAKD1Yr0DtQYvCYLQexhXe_nhb5rjeyhnB4bCveqyO5Xbuwdg1A@mail.gmail.com> <CAKFn1SEdjhsQ3tKPZdbdfF4ArDzw-FZfjQT68gV55Fc-5vzBvw@mail.gmail.com> <CAKD1Yr3ppM0UF8HoN8PgS7F0iEmK26ebiuJK=tkAdZnuLWpkZg@mail.gmail.com> <CAKFn1SHASt34ihJmGN0iRFQQzLTMspZfxXHgBjBatXXcRYF4cw@mail.gmail.com> <20170604093119.nt733rb3ymmjssww@Vurt.local> <m1dHTLx-0000DcC@stereo.hq.phicoh.net> <CAKD1Yr0ZZwRar6D-2bkXBKPYehqqW99+BMtDOjyovR8WDXKzxw@mail.gmail.com> <CAD6AjGTjikAWutcenW8qn7OW8kPM9c_x_yDUy5vQxJmXKL85dg@mail.gmail.com> <91c3c0f4-eb8b-cdf7-b9c9-7d1eecb7fe64@gmail.com> <CAKD1Yr0_WR_TB+OC0U1Qt2h6WzUp9EGvrqC1ZKW2mwFeBd3bCQ@mail.gmail.com> <4021a559-5b6d-b3fb-19cd-afbe9041e8f2@gmail.com> <34A29D4D-3670-40BC-B62E-85C4EABC55D5@employees.org> <6e03e25e-fd6a-6311-390e-4834281a76f7@si6networks.com> <1B580CBB-B29D-4860-9EC8-BECD1D5E0006@employees.org> <4b2f5200-86a1-7711-e5ff-7436572be467@gmail.com>
X-Mailer: Apple Mail (2.3273)
Archived-At: <https://mailarchive.ietf.org/arch/msg/ipv6/6_XnFXwNSkLTh8X6OI8OwI7YF4g>
X-BeenThere: ipv6@ietf.org
X-Mailman-Version: 2.1.22
Precedence: list
List-Id: "IPv6 Maintenance Working Group \(6man\)" <ipv6.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/ipv6>, <mailto:ipv6-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/ipv6/>
List-Post: <mailto:ipv6@ietf.org>
List-Help: <mailto:ipv6-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/ipv6>, <mailto:ipv6-request@ietf.org?subject=subscribe>
X-List-Received-Date: Sat, 10 Jun 2017 13:14:47 -0000

Brian,

>>>> do we have a rationale for fixing the value in the IPv6-over-foo documents (anymore)?
>>> 
>>> At the time of this writing, we should probably be in the camp of "If
>>> you do slaac, better stick to 64, since it's know to work with legacy
>>> implementations, and besides, allows for sparse allocation (reduced
>>> collisions of IIDs when you pick a random one, resistance to address
>>> scans, etc.).
>>> 
>>> There's no compelling technical argument for mandating /64 (i.e., such
>>> specific value) if you do manual configuration or, for instance,
>>> stateful DHCPv6. And the recommendation for /64 for slaac mostly has to
>>> do with backwards compatibility than with anything else.
>> 
>> your goal is to remove the 64 bit boundary from RFC2464 et al and update RFC4862?
>> I intended the question for Brian, as he seemed to be of a different view.
> 
> It's hard to track this conversation, but anyway IMHO 2464bis should specify
> /64 as if the addressing architecture didn't even mention it. It has
> to specify something for SLAAC to work, and we have 20 years of deployed
> code based on /64. So we don't have the luxury of changing it, even
> if we want to.

This is confusing.
On one hand you argue we have 20 years of deployed code base and that we cannot change it, on the other hand you want to remove the 64 bit boundary from the addressing architecture, presumably with the goal of changing it?

The argument that SLAAC needs an standard-set per data-link type fixed IID length is a tenuous argument. The only technical requirement for SLAAC to work is that the the IID length is the same across all nodes on a given link.

If we remove the 64 bit boundary from 4291, then an update of 2464 will likely result in the removal of any bit boundary there as well.

> I'm not aware of any technical changes needed in 4862. Jinmei-san has
> convinced me off line that 4862 does logically require the IID length
> for link-local addresses and global-scope SLAAC addresses to be the same.
> I wish the text stated this explicitly, but that's an editorial issue.
> Apart from that, it leaves the IID length as a parameter and that's
> as it should be.

RFC4862 says:
Note that the address architecture [RFC4291 also defines the length of the interface identifiers for
some set of addresses, but the two sets of definitions must be
consistent.  In many cases, the identifier will be derived from
the interface's link-layer address.

The IID length in the IPv6 architecture is fixed. And it has to be consistent across 4291, 4862 and IPv6 over foo documents.
Feel free to look at it as a parameter, and you can pick any value you like from the 0-128 range as long as you pick 64.
That's the current state. And that is what every implementation does. If you want to _change_ that. Then you need to consider that in the light of 7421 and of the wider consequences for the Internet.

I am still confused what this draft proposes to change.

Ole