Re: New Version Notification for draft-troan-6man-universal-ra-option-03.txt

otroan@employees.org Wed, 07 October 2020 14:01 UTC

Return-Path: <otroan@employees.org>
X-Original-To: ipv6@ietfa.amsl.com
Delivered-To: ipv6@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 1494F3A0906 for <ipv6@ietfa.amsl.com>; Wed, 7 Oct 2020 07:01:54 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -1.9
X-Spam-Level:
X-Spam-Status: No, score=-1.9 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, SPF_HELO_NONE=0.001, SPF_PASS=-0.001] autolearn=ham autolearn_force=no
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id NcNtj9BE9Afj for <ipv6@ietfa.amsl.com>; Wed, 7 Oct 2020 07:01:53 -0700 (PDT)
Received: from clarinet.employees.org (clarinet.employees.org [IPv6:2607:7c80:54:3::74]) (using TLSv1.2 with cipher ADH-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id 106EF3A08FF for <ipv6@ietf.org>; Wed, 7 Oct 2020 07:01:52 -0700 (PDT)
Received: from astfgl.hanazo.no (unknown [IPv6:2a01:79c:cebd:9724:2114:afe8:8f1c:7f2d]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by clarinet.employees.org (Postfix) with ESMTPSA id B478C4E11B42; Wed, 7 Oct 2020 14:01:52 +0000 (UTC)
Received: from [IPv6:::1] (localhost [IPv6:::1]) by astfgl.hanazo.no (Postfix) with ESMTP id CA26E40303DA; Wed, 7 Oct 2020 16:01:50 +0200 (CEST)
Content-Type: text/plain; charset="us-ascii"
Mime-Version: 1.0 (Mac OS X Mail 13.4 \(3608.120.23.2.4\))
Subject: Re: New Version Notification for draft-troan-6man-universal-ra-option-03.txt
From: otroan@employees.org
In-Reply-To: <CAKD1Yr0YYswgJ8kCdx_USUezf8g=qxkqungWT=oja2DanNoS7A@mail.gmail.com>
Date: Wed, 07 Oct 2020 16:01:50 +0200
Cc: Philip Homburg <pch-ipv6-ietf-6@u-1.phicoh.com>, 6man WG <ipv6@ietf.org>
Content-Transfer-Encoding: quoted-printable
Message-Id: <3BA29A4E-8C21-4BF9-874B-99CE55AA7F72@employees.org>
References: <160201571921.22183.2288394613501535041@ietfa.amsl.com> <FAA42031-FAF9-4F1E-A702-3B4F27375F4F@employees.org> <m1kQ8qM-0000FiC@stereo.hq.phicoh.net> <066A5931-E009-4610-B679-86A8F495A131@employees.org> <CAKD1Yr0YYswgJ8kCdx_USUezf8g=qxkqungWT=oja2DanNoS7A@mail.gmail.com>
To: Lorenzo Colitti <lorenzo@google.com>
X-Mailer: Apple Mail (2.3608.120.23.2.4)
Archived-At: <https://mailarchive.ietf.org/arch/msg/ipv6/AN_fp0anNAUQY_iWQqh1K-HgzS0>
X-BeenThere: ipv6@ietf.org
X-Mailman-Version: 2.1.29
Precedence: list
List-Id: "IPv6 Maintenance Working Group \(6man\)" <ipv6.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/ipv6>, <mailto:ipv6-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/ipv6/>
List-Post: <mailto:ipv6@ietf.org>
List-Help: <mailto:ipv6-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/ipv6>, <mailto:ipv6-request@ietf.org?subject=subscribe>
X-List-Received-Date: Wed, 07 Oct 2020 14:01:54 -0000

> The architectural change that this brings, is that no longer is changes to router operating systems or the host stack kernel required.
> 
> I don't see how this is an advantage of this particular proposal. Changing RA options is possible today; there is nothing stopping an implementation such as radvd from allowing the user to configure arbitrary options. For hosts, Linux already has the ability to pass arbitrary RA options to userspace via the RTM_NEWNDUSEROPT netlink message which contains the option. And of course, it's possible to get the raw RA in userspace via a packet socket. Other OSes almost certainly provide the latter.

Not without hijacking the numbering space.

This draft was experimental previously, for this reason. What would be the consequence of the IETF letting go of control.
How much standardisation is required depends very much on the configuration information. E.g. I doubt that RFC3898 information has much consequence apart from between the network operator and whatever daemon running on the hosts. While other configuration information has wider consequences, and may or may not benefit from being standardized.
This option proposes an opaque transport mechanism that makes it optional to involve the IETF or not. Is that scary for people in the IETF... likely. ;-)

Best regards,
Ole