Re: Last Call: <draft-ietf-6man-rfc4941bis-10.txt> (Temporary Address Extensions for Stateless Address Autoconfiguration in IPv6) to Proposed Standard

Alexandre Petrescu <alexandre.petrescu@gmail.com> Mon, 14 September 2020 09:29 UTC

Return-Path: <alexandre.petrescu@gmail.com>
X-Original-To: ipv6@ietfa.amsl.com
Delivered-To: ipv6@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 5E63E3A0D69 for <ipv6@ietfa.amsl.com>; Mon, 14 Sep 2020 02:29:05 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: 0.647
X-Spam-Level:
X-Spam-Status: No, score=0.647 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, DKIM_ADSP_CUSTOM_MED=0.001, FORGED_GMAIL_RCVD=1, FREEMAIL_FROM=0.001, NICE_REPLY_A=-0.001, NML_ADSP_CUSTOM_MED=0.9, RCVD_IN_MSPIKE_H4=-0.01, RCVD_IN_MSPIKE_WL=-0.01, SPF_HELO_NONE=0.001, SPF_SOFTFAIL=0.665] autolearn=no autolearn_force=no
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id YVmgcJl5GI-D for <ipv6@ietfa.amsl.com>; Mon, 14 Sep 2020 02:29:04 -0700 (PDT)
Received: from sainfoin-smtp-out.extra.cea.fr (sainfoin-smtp-out.extra.cea.fr [132.167.192.228]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id C78163A0D68 for <ipv6@ietf.org>; Mon, 14 Sep 2020 02:29:03 -0700 (PDT)
Received: from pisaure.intra.cea.fr (pisaure.intra.cea.fr [132.166.88.21]) by sainfoin-sys.extra.cea.fr (8.14.7/8.14.7/CEAnet-Internet-out-4.0) with ESMTP id 08E9T0GW007389; Mon, 14 Sep 2020 11:29:00 +0200
Received: from pisaure.intra.cea.fr (localhost [127.0.0.1]) by localhost (Postfix) with SMTP id 05D61202992; Mon, 14 Sep 2020 11:29:00 +0200 (CEST)
Received: from muguet2-smtp-out.intra.cea.fr (muguet2-smtp-out.intra.cea.fr [132.166.192.13]) by pisaure.intra.cea.fr (Postfix) with ESMTP id E71DF2028F1; Mon, 14 Sep 2020 11:28:59 +0200 (CEST)
Received: from [10.14.3.19] ([10.14.3.19]) by muguet2-sys.intra.cea.fr (8.14.7/8.14.7/CEAnet-Internet-out-4.0) with ESMTP id 08E9Svqv020300; Mon, 14 Sep 2020 11:28:58 +0200
Subject: Re: Last Call: <draft-ietf-6man-rfc4941bis-10.txt> (Temporary Address Extensions for Stateless Address Autoconfiguration in IPv6) to Proposed Standard
To: Fernando Gont <fgont@si6networks.com>, Fernando Gont <fernando@gont.com.ar>, ipv6@ietf.org
References: <159969199185.9541.8823907519726516405@ietfa.amsl.com> <CAKD1Yr1fVnhr3ZM64vLxtXg-9WAKemDuzW2gMupviv-i9V-GiA@mail.gmail.com> <16bd1438-90fd-4d78-f5df-993450810cce@gmail.com> <5cc141fe-3b2d-8e44-6ceb-4844265e58c4@gont.com.ar> <566a2ba7-d493-1522-2c2e-cbfe79c37e07@gmail.com> <25ac1371-f7ba-d351-a810-a54d4d1bd4f6@si6networks.com>
From: Alexandre Petrescu <alexandre.petrescu@gmail.com>
Message-ID: <b6157e0b-756b-4728-2519-baf19077d571@gmail.com>
Date: Mon, 14 Sep 2020 11:28:57 +0200
User-Agent: Mozilla/5.0 (Windows NT 10.0; WOW64; rv:68.0) Gecko/20100101 Thunderbird/68.12.0
MIME-Version: 1.0
In-Reply-To: <25ac1371-f7ba-d351-a810-a54d4d1bd4f6@si6networks.com>
Content-Type: text/plain; charset="utf-8"; format="flowed"
Content-Language: fr
Content-Transfer-Encoding: 8bit
Archived-At: <https://mailarchive.ietf.org/arch/msg/ipv6/8843y3I_ZahTOkAGwImnAk9ySt4>
X-BeenThere: ipv6@ietf.org
X-Mailman-Version: 2.1.29
Precedence: list
List-Id: "IPv6 Maintenance Working Group \(6man\)" <ipv6.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/ipv6>, <mailto:ipv6-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/ipv6/>
List-Post: <mailto:ipv6@ietf.org>
List-Help: <mailto:ipv6-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/ipv6>, <mailto:ipv6-request@ietf.org?subject=subscribe>
X-List-Received-Date: Mon, 14 Sep 2020 09:29:05 -0000


Le 13/09/2020 à 06:45, Fernando Gont a écrit :
> On 12/9/20 16:49, Alexandre Petrescu wrote:
>>
>>
>> Le 12/09/2020 à 07:36, Fernando Gont a écrit :
>>> On 10/9/20 08:35, Alexandre Petrescu wrote:
>>>>
>>>>
>>>> Le 10/09/2020 à 13:26, Lorenzo Colitti a écrit :
>>>>> Having read this document again, I have the following concerns.
>>>>>
>>>>> 1. I think it should not include section 3.3.2. The reason is that it
>>>>>  needlessly suggests an algorithm that is much more complex than
>>>>> simply using an existing random number generator which all nodes
>>>>> likely already have.
>>>>
>>>> I object to that I-D paragraph at least because it says this "SHOULD
>>>> produce an output of at least 64 bits."  It should be of a more 
>>>> variable
>>>> length.  It is not 'at least 64bit'.
>>>
>>> Huh?
>>>
>>> SLAAC IIDs are currently required to be 64-bit long, hence the output 
>>> should be of at least 64 bits -- if the output is 64-bits, you take 
>>> all of them, whereas if it's more that 64-bits, you discard the 
>>> exceeding bits.
>>
>> I agree that IPv6-over-foo IIDs part of SLAAC requires that to be 
>> 64bit long.
>>
>> And I maintain it is a wrong requirement.
>>
>> The requirement should be that is a variable length.  An IID of length 
>> 45 should work in SLAAC as much as an IID of length 72.  And 
>> incidentally 64, some times.
> 
> While I'd probably agree, this is not the I-D where such work should be 
> pursued.

Fair enough, the 64bit limit discussion is not the goal of this draft.

However, like all other drafts: they all claim that is not their 
problem, and they all continue with the limit.

If this draft keeps the text that is originally discussed (SHOULD 64bit) 
then this draft continues that trend.

So, if that 64bit limit were not its problem, then it would not state 
64bit.  It would be _neutral_ with respect to it.

>> Some implementations do work the way I say it (openbsd IID length 45 
>> or 72 works).  Some implementation is under development in linux to 
>> make that work too.  They are different implementations but achieve 
>> the same thing.
> 
> To be honest, I'm curious why one would want to use *even longer* IIDs 
> than /64.  (Shorter, for sure)
> 
> 
> 
>>
>>>> I do not oppose to the existence of that section 3.3.2.  But how would
>>>> it cope with other generated Interface Identifiers, like HIT (Host
>>>> Identity Tag) or ORCHIDs.  These are too RFCs on the Standards Track.
>>>> They too are generated by a crypto function, they too are 64bit length.
>>>>   Still they are different than this F().
>>>
>>> This is orthogonal to this document.
>>
>> Hmm... orthogonal, yes, but there could be an ideal goal that RFCs at 
>> IETF make sense all together, I think.  If HIP protocols considers 
>> always that IID must be 64, but other RFCs no, then there is obviously 
>> a need to try to make sense all together.
> 
> Doesn't HIP employ 64-bit IIDs?

yes it does.

> 
> 
> 
>> True, the task might seem huge, and so we call it orthogonal: it would 
>> be hard to climb a vertical :-)
> 
> What I'm saying is that relaxing the requirement of 64-bits for the IID 
> is out of the scope of this document.

I agree.  In that sense, it might be that the draft does not want to say 
64bit.

Alex

>