Re: “DHCPv6, SLAAC, Static Day X - 17 year interoperability issue” 2nd issue
Gyan Mishra <hayabusagsm@gmail.com> Tue, 10 November 2020 02:22 UTC
Return-Path: <hayabusagsm@gmail.com>
X-Original-To: ipv6@ietfa.amsl.com
Delivered-To: ipv6@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 68EAD3A15A1; Mon, 9 Nov 2020 18:22:49 -0800 (PST)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -2.087
X-Spam-Level:
X-Spam-Status: No, score=-2.087 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, DKIM_SIGNED=0.1, DKIM_VALID=-0.1, DKIM_VALID_AU=-0.1, DKIM_VALID_EF=-0.1, FREEMAIL_FROM=0.001, HTML_MESSAGE=0.001, SPF_HELO_NONE=0.001, SPF_PASS=-0.001, T_REMOTE_IMAGE=0.01, URIBL_BLOCKED=0.001] autolearn=ham autolearn_force=no
Authentication-Results: ietfa.amsl.com (amavisd-new); dkim=pass (2048-bit key) header.d=gmail.com
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id R2kPhXznNi1x; Mon, 9 Nov 2020 18:22:47 -0800 (PST)
Received: from mail-vs1-xe2c.google.com (mail-vs1-xe2c.google.com [IPv6:2607:f8b0:4864:20::e2c]) (using TLSv1.2 with cipher ECDHE-RSA-AES128-GCM-SHA256 (128/128 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id 273013A159E; Mon, 9 Nov 2020 18:22:47 -0800 (PST)
Received: by mail-vs1-xe2c.google.com with SMTP id b129so6181949vsb.1; Mon, 09 Nov 2020 18:22:47 -0800 (PST)
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=gmail.com; s=20161025; h=mime-version:references:in-reply-to:from:date:message-id:subject:to :cc; bh=+yQtEANJ2mXQ4DAwHkn5dqz4niskM4zJinL2zPbYJ08=; b=USuDUFmaAygi5srW5AdvnwD0MEDCnXGRrQktzr9IXqpkkDyRY/WD5FR6xUayttJH6/ S56MgfpTTH4w0LE948lBFQgLKYVZR0nQHuPoxCKYiaO+ttPASGhe3LDMaBA9kjzCH0wL lTk2Ghi5MCxEkgaq+V+/VOKmTZe23g0zHkwHhOeJE3/g5XSQJLTDWEzwFMGWEUzux/3Y PddgP1+aEtCd1ZHNCD9w2E4buGwuKQBaYNGryLb9nZh3VxlMSL8YSkSZ8eQBDkdVorhN WwNP29S1z6ptcLt8b6bp/FjeIFZd+loh0VhBf2LpVA20YiEwW11sSZwmcu2yUYVxYyGq 7d5g==
X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20161025; h=x-gm-message-state:mime-version:references:in-reply-to:from:date :message-id:subject:to:cc; bh=+yQtEANJ2mXQ4DAwHkn5dqz4niskM4zJinL2zPbYJ08=; b=Lg8ECYJQ+sDMdUBffuV0/wIKxUBG301v/QynP+mT/8dUM9uuXil0IFhp74C3Gf5yb+ dhtYis0ozjvWSq3erxUMF9ZOa+SfsyH+EVIKOQOfp4pfgTbMzW9pXkCssXuopGkEQuYp BJ/sDc0NaqtzHU7RNjMXtmlft2+y4lkHnC+NJ3clmgLcXMsVdWAt+LKUd5HeaEoshZMd KHJL9c+oVhVukfMQCSbg8x5h/7rBr08RyqmO9Eiyjgs/QeqT5Wu2Z7JuWHe5mbksiCfX qps6+rOf6ADL6Z6mSQA1puLPnFg30LyiCxwaz3pYwHQkb+54t6jQEdd9CPMkpRmt5jlw BC3w==
X-Gm-Message-State: AOAM532oeYIXcCGt5Iq3OQSpGiLdIta9n17Dk5Y7ExOp/uADFtmzssrn 2SG4m0q/NXBERMkvDXGCklMQRzO0l6d9uyuiNktbkG0mOixNeA==
X-Google-Smtp-Source: ABdhPJwwevKZp38tT8D2MbT5nT2/uVRRjvM55gUioWsxANkxvgb4t+v1YQMPqsx7rz3T4Iry/Ybgp+grxULG2mGMtNg=
X-Received: by 2002:a67:7dc4:: with SMTP id y187mr9763655vsc.58.1604974966057; Mon, 09 Nov 2020 18:22:46 -0800 (PST)
MIME-Version: 1.0
References: <3A94E3B6-EA5A-453A-8CB1-C11BBDF88B53@gmail.com> <CAD6AjGTcy3eo=4P52fOjCKRLDveVMUJcD7Y_u9JzJtpq3RAj0Q@mail.gmail.com>
In-Reply-To: <CAD6AjGTcy3eo=4P52fOjCKRLDveVMUJcD7Y_u9JzJtpq3RAj0Q@mail.gmail.com>
From: Gyan Mishra <hayabusagsm@gmail.com>
Date: Mon, 09 Nov 2020 21:22:34 -0500
Message-ID: <CABNhwV0uE3jVouec-Foj0hF+mZu0ReJ3Z-+ergtHyq=T7hyFhQ@mail.gmail.com>
Subject: Re: “DHCPv6, SLAAC, Static Day X - 17 year interoperability issue” 2nd issue
To: Ca By <cb.list6@gmail.com>
Cc: 6man WG <ipv6@ietf.org>, Alexandre Petrescu <alexandre.petrescu@cea.fr>, Bob Hinden <bob.hinden@gmail.com>, Dmytro Shytyi <dmytro@shytyi.net>, Dusan Mudric <dmudric@avaya.com>, Naveen Kottapalli <naveen.sarma@gmail.com>, Ole Troan <otroan@employees.org>, draft-mishra-6man-variable-slaac@ietf.org
Content-Type: multipart/alternative; boundary="000000000000b9b07305b3b75aee"
Archived-At: <https://mailarchive.ietf.org/arch/msg/ipv6/8lqFOXVGdgbIY0NZA0Lj_lwrrtg>
X-BeenThere: ipv6@ietf.org
X-Mailman-Version: 2.1.29
Precedence: list
List-Id: "IPv6 Maintenance Working Group \(6man\)" <ipv6.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/ipv6>, <mailto:ipv6-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/ipv6/>
List-Post: <mailto:ipv6@ietf.org>
List-Help: <mailto:ipv6-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/ipv6>, <mailto:ipv6-request@ietf.org?subject=subscribe>
X-List-Received-Date: Tue, 10 Nov 2020 02:22:49 -0000
On Mon, Nov 9, 2020 at 8:53 PM Ca By <cb.list6@gmail.com> wrote: > > > On Mon, Nov 9, 2020 at 4:36 PM Gyan Mishra <hayabusagsm@gmail.com> wrote: > >> >> This may have gotten lost in all the threads so starting a new thread. >> The issue is interoperability related issue between the 3 IPv6 addressing >> options that had been broken for 17 years. >> >> Problem Statement: >> >> The main point I am trying to make is that static address configuration >> and DHCPV6 stateful RFC 8415, you can have any prefix length prefix. >> SLAAC with A flag set requires a 64 bit IID and that stems from RFC 4291 >> modified EUI64 mac based IID generation. However, now with random IID >> generation schemes with RFC 4941 privacy extension and RFC 7217 stable IID >> you can generate any length IID. >> >> The operational issue with SLAAC not supporting any prefix length in PIO >> and requirement for the 64 bit boundary is that in a deployment scenario >> where you would like to deploy longer prefix length subnets with a mix of >> server hosts with static address and mix of client hosts with managed >> address M=1 that get their 128 bit address from the DHCPv6 server pool, the >> fear has always been that if a device came up on the subnet that only >> supports SLAAC it would not work due to the SLAAC A flag set and 64 bit IID >> requirement. In that case the SLAAC host would not be able to communicate >> with any of the devices with a longer prefix including the router. >> >> So that fear of interoperability of SLAAC hosts not being able to support >> longer prefix lengths has prevented operators from being able to deploy >> subnets with longer prefix lengths, as it’s hard to predict that all hosts >> will be able to support static or stateful and so you may end up in a >> situation where a device type may only support SLAAC so then you are in >> trouble deploying longer prefix lengths. >> >> Due to the SLAAC 64 bit IID restrictions it has prevented operators from >> deploying “host” subnets with >64 bit prefix lengths. >> >> f you go to the “root” of the problem the root is the original IPv6 >> specification RFC 1884 dated 1995, RFC 2373 dated 1998, RFC 3513 dated 2003 >> and now the present RFC 4291 dated 2006. As soon EUI64 mac based IID >> become not recommendedR and obsolete the standard should have immediately >> updated RFC 4291 as the dependency on fixed IID is no longer as now random >> IID generation schema starting with RFC 4941 privacy extension dated 2007 >> soon became standard for all OS vendors and later RFC 7217 stable IID >> became an alternative option to provide a “random” IID. >> >> Once random IID became mainstream in all Host Operating Systems it was at >> that moment that the standard should have changed to update RFC 4291 to >> permanently remove in all RFCs any mention of 64 bit boundary. >> >> So this change if I do the math is now 13 years past due. Even if you >> gave a few years for host operating systems to adopt the new standard which >> I believe back then was fairly quickly the standard should have changed >> eliminating the 64 bit boundary. >> >> Think of all the problems “Day 17 years” this has caused and even now all >> of these threads. >> >> This is clearly an IETF standards issue and needs to be fixed. >> >> We can’t pass the blame to operators to dole out shorter prefixes or >> support PD. The IETF really needs to take onus end fix the broken standard. >> >> Not going to happen for PDP as their are technical issue related to the >> Mobile Network Gateway to support PD. I will try to dig up the exact >> reason but the network element is very different then a BNG broadband >> gateway which supports most all L3 features. >> >> As far as 3GPP operators they are following the well documented RIPE-690 >> which only requires allocation of /64. The main reason mobile operators >> are not making shorter prefix a standard is that is overkill from their >> perspective as you may have many mobile >> > > No > > handsets in a household and there is no reason for everyone at a single >> location to have shorter prefixes per PDP. When you are at honme you use >> your wired broadband and when are away from home on the road on 3GPP on PDP >> is when the segmentation comes into play to subdivide the /64 prefix to >> downstream devices but in a household is only needed to be provided by one >> of the devices. >> Bottom line is from a 3GPP provider standpoint it does not make sense to >> provide a shorter prefix and I don’t think that will ever change even with >> 5G PDP. >> > Gyan> Sorry I mistyped PDP here “5G wireless handsets not 5G fixed wireless broadband > > I am 3gpp network operator. None of the above thinking has entered my > head. > > I have never read any ripe docs, so you cant say i am beholden to them. > > 3gpp operators only provide /64 because that is all that the standards > allow for without dhcpv6. No other reason, please avoid creating narratives > to explain what is clearly documented in the standards. > > https://tools.ietf.org/html/rfc6459#section-5.3 > > > >> Fixed 5G broadband which is a wired broadband replacement will follow >> RIPE-690 guidelines and will allocation much shorter prefixes as with >> network slicing and other capabilities with 5G offers the requirements >> exist for shorter prefixes. Not so much for PDP. >> >> Gyan> Mistyped PDP here I meant to say mobile handset. >> > > I am rolling out 5G broadband using 64share, so your above is not correct, > at least for me. Why? No dhcp servers in network. > > Maybe you can tell us about how vz is deploying ipv6 here ? > > > https://www.google.com/amp/s/www.rcrwireless.com/20200612/5g/verizon-expanding-enhancing-5g-fixed-wireless-service/amp > > Gyan> Typo above - I am referring to mobile handset not Fixed 5G > broadband which would support PD and would be much shorter prefixes. > >> >> >> >> https://www.ripe.net/publications/docs/ripe-690#4-2-4--considerations-for-cellular-operators >> >> 4.2.4. Considerations for Cellular Operators >> >> There is a clear exception to the rule described above when assigning >> prefixes in a cellular network. In this case, a /64 will need to be >> provided for each PDP context for cellular phones, whereas for LTE >> modems/routers, i.e. in the case of broadband by means of cellular access, >> it will still be necessary to choose a /48 or /56 in accordance with the >> aforementioned considerations. >> >> >> RFC 3177 for a default /48 allocation which is obsoleted by 6177 which >> takes a step back and is now not making any recommendations and is putting >> the onus on operators to figure it out and do what they feel is best which >> would definitely not be one size fits all approach. >> >> Please read the summary section in RFC 6177 below >> >> 5 <https://tools.ietf.org/html/rfc6177#section-5>. Summary >> >> The exact choice of how much address space to assign end sites is an >> issue for the operational community. The recommendation in RFC 3177 <https://tools.ietf.org/html/rfc3177> >> [RFC3177 <https://tools.ietf.org/html/rfc3177>] to assign /48s as a default is not a requirement of the >> IPv6 architecture; anything of length /64 or shorter works from a >> standards perspective. However, there are important operational >> considerations as well, some of which are important if users are to >> share in the key benefit of IPv6: expanding the usable address space >> of the Internet. The IETF recommends that any policy on IPv6 address >> assignment policy to end sites take into consideration the following: >> >> >> Thanks >> >> Gyan >> >> >> Sent from my iPhone >> -------------------------------------------------------------------- >> IETF IPv6 working group mailing list >> ipv6@ietf.org >> Administrative Requests: https://www.ietf.org/mailman/listinfo/ipv6 >> -------------------------------------------------------------------- >> > -- <http://www.verizon.com/> *Gyan Mishra* *Network Solutions A**rchitect * *M 301 502-134713101 Columbia Pike *Silver Spring, MD
- “DHCPv6, SLAAC, Static Day X - 17 year interopera… Gyan Mishra
- Re: “DHCPv6, SLAAC, Static Day X - 17 year intero… Joel M. Halpern
- Re: “DHCPv6, SLAAC, Static Day X - 17 year intero… Gyan Mishra
- Re: “DHCPv6, SLAAC, Static Day X - 17 year intero… Ca By
- Re: “DHCPv6, SLAAC, Static Day X - 17 year intero… Mark Andrews
- Re: “DHCPv6, SLAAC, Static Day X - 17 year intero… Joel M. Halpern
- Re: “DHCPv6, SLAAC, Static Day X - 17 year intero… Gyan Mishra
- Re: “DHCPv6, SLAAC, Static Day X - 17 year intero… Gyan Mishra
- Re: “DHCPv6, SLAAC, Static Day X - 17 year intero… Joel M. Halpern
- Re: “DHCPv6, SLAAC, Static Day X - 17 year intero… Mark Andrews
- Re: Re: “DHCPv6, SLAAC, Static Day X - 17 year in… Michael Richardson
- Re: “DHCPv6, SLAAC, Static Day X - 17 year intero… Ca By
- Re: “DHCPv6, SLAAC, Static Day X - 17 year intero… Mark Andrews
- Re: “DHCPv6, SLAAC, Static Day X - 17 year intero… Ted Lemon
- Re: “DHCPv6, SLAAC, Static Day X - 17 year intero… Joel M. Halpern
- Re: “DHCPv6, SLAAC, Static Day X - 17 year intero… Gyan Mishra
- Re: “DHCPv6, SLAAC, Static Day X - 17 year intero… Mark Andrews
- Re: “DHCPv6, SLAAC, Static Day X - 17 year intero… JORDI PALET MARTINEZ
- Re: “DHCPv6, SLAAC, Static Day X - 17 year intero… Mikael Abrahamsson
- Re: [**EXTERNAL**] Re: “DHCPv6, SLAAC, Static Day… Mudric, Dusan
- Re: “DHCPv6, SLAAC, Static Day X - 17 year intero… Alexandre Petrescu
- Re: “DHCPv6, SLAAC, Static Day X - 17 year intero… Joel M. Halpern
- Re: Re: “DHCPv6, SLAAC, Static Day X - 17 year in… Gyan Mishra
- Re: “DHCPv6, SLAAC, Static Day X - 17 year intero… Alexandre Petrescu