RE: RFC4941 text on requirement for public addresses (was: Re: default-iids and stable addresses)

Dave Thaler <dthaler@microsoft.com> Wed, 18 May 2016 16:45 UTC

Return-Path: <dthaler@microsoft.com>
X-Original-To: ipv6@ietfa.amsl.com
Delivered-To: ipv6@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 43A6C12D16D for <ipv6@ietfa.amsl.com>; Wed, 18 May 2016 09:45:29 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -102.002
X-Spam-Level:
X-Spam-Status: No, score=-102.002 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, DKIM_SIGNED=0.1, DKIM_VALID=-0.1, DKIM_VALID_AU=-0.1, HTML_MESSAGE=0.001, RCVD_IN_DNSWL_NONE=-0.0001, RCVD_IN_MSPIKE_H2=-0.001, SPF_HELO_PASS=-0.001, SPF_PASS=-0.001, USER_IN_WHITELIST=-100] autolearn=ham autolearn_force=no
Authentication-Results: ietfa.amsl.com (amavisd-new); dkim=pass (1024-bit key) header.d=microsoft.com
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id nksvxKY57KFh for <ipv6@ietfa.amsl.com>; Wed, 18 May 2016 09:45:27 -0700 (PDT)
Received: from na01-by2-obe.outbound.protection.outlook.com (mail-by2on0123.outbound.protection.outlook.com [207.46.100.123]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-SHA384 (256/256 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id E8DB012D5B7 for <6man@ietf.org>; Wed, 18 May 2016 09:45:26 -0700 (PDT)
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=microsoft.com; s=selector1; h=From:To:Date:Subject:Message-ID:Content-Type:MIME-Version; bh=fly89Ra4GrxW+iTSctd3dttXsokiO4s341wlbdMMuXg=; b=X29zRZkOkR5398jeS5FHstL650Zm4Ww5k01O7jnuOxp7tmU2MArd4F7lgoGI3j6X0CfF6GMPEWCbN+CGF42dyNdeXG2/SZ3pz/qiJbBj515fmPvuQCoIhKd2BUEIhdVw7/M/7vxPc9E1fY84Eu3tqmfbT2ZQBe1XKO0ySQBdLGM=
Received: from DM2PR0301MB0717.namprd03.prod.outlook.com (10.160.97.13) by DM2PR0301MB0719.namprd03.prod.outlook.com (10.160.97.14) with Microsoft SMTP Server (TLS) id 15.1.497.12; Wed, 18 May 2016 16:45:25 +0000
Received: from DM2PR0301MB0717.namprd03.prod.outlook.com ([10.160.97.13]) by DM2PR0301MB0717.namprd03.prod.outlook.com ([10.160.97.13]) with mapi id 15.01.0497.017; Wed, 18 May 2016 16:45:25 +0000
From: Dave Thaler <dthaler@microsoft.com>
To: Lorenzo Colitti <lorenzo@google.com>, Ole Troan <otroan@employees.org>
Subject: RE: RFC4941 text on requirement for public addresses (was: Re: default-iids and stable addresses)
Thread-Topic: RFC4941 text on requirement for public addresses (was: Re: default-iids and stable addresses)
Thread-Index: AQHRsPZbSSmbpzz5P0G2XDGXcEU5R5++tD8AgAAy3FA=
Date: Wed, 18 May 2016 16:45:25 +0000
Message-ID: <DM2PR0301MB0717D5EA3FD289A7894E3AC0A3490@DM2PR0301MB0717.namprd03.prod.outlook.com>
References: <573B5FAC.7060300@gont.com.ar> <FBFC5456-E42D-4E52-BBE2-0ADC898516B0@employees.org> <CAKD1Yr2aWnRVvL6KEheWb1fKn3RPGdYewdb3QVf9w3A1V1wTUQ@mail.gmail.com>
In-Reply-To: <CAKD1Yr2aWnRVvL6KEheWb1fKn3RPGdYewdb3QVf9w3A1V1wTUQ@mail.gmail.com>
Accept-Language: en-US
Content-Language: en-US
X-MS-Has-Attach:
X-MS-TNEF-Correlator:
authentication-results: google.com; dkim=none (message not signed) header.d=none;google.com; dmarc=none action=none header.from=microsoft.com;
x-originating-ip: [168.159.213.209]
x-ms-office365-filtering-correlation-id: d1a2f4c7-838f-41ab-9272-08d37f3bcfd9
x-microsoft-exchange-diagnostics: 1; DM2PR0301MB0719; 5:RPltl8oKNTKkZ4mO090tRpACb88RKXPVqAcG6tiy4kAeZdV08DcBEvXDr66JIeCUDyh4ZYT4P2MMC7BbBneszmPwphQPhwh+cwfitG3ox0QZ0Yfe0h8UBnQl2sY28pRzJu43pJ9qOHZBDOjZYnwqdQ==; 24:ozRZ5yplKqIWXmoVgbyxeNpFIngZuTaOY3+n+qX8b8qwUOTFLj2l9/rxCupLIaJ21YBUu1nF2TMWlxDtYnbg5iJhz0SR0lRS7EHXce8je5U=; 7:iQyl9Sb5hW/Ixvktkd1gBT9vN+muwWhoBP1x0tB/nZ038DcepZXbu08p5R+0+A7Gprkt7QG9uZWVQNHx84pR7tO1MYIKtiFrTAcxYwpXT4IKE0PzGPgSYOyB+ZtauvhwcIMzturXwgrJFh7O9NeDb/XZwUHXKbqHbfqtR34AT41eEUJBC9RRzW85MWs4lWXHWjphoo3RNfrx7vyMu02zKQ==
x-microsoft-antispam: UriScan:;BCL:0;PCL:0;RULEID:;SRVR:DM2PR0301MB0719;
x-microsoft-antispam-prvs: <DM2PR0301MB0719AACF363C7B2B0E86FFC9A3490@DM2PR0301MB0719.namprd03.prod.outlook.com>
x-exchange-antispam-report-test: UriScan:;
x-exchange-antispam-report-cfa-test: BCL:0; PCL:0; RULEID:(61425038)(601004)(2401047)(8121501046)(5005006)(3002001)(10201501046)(6055026)(61426038)(61427038); SRVR:DM2PR0301MB0719; BCL:0; PCL:0; RULEID:; SRVR:DM2PR0301MB0719;
x-forefront-prvs: 0946DC87A1
x-forefront-antispam-report: SFV:NSPM; SFS:(10019020)(51694002)(24454002)(377454003)(252514010)(790700001)(99286002)(66066001)(19617315012)(8676002)(4326007)(9686002)(2906002)(16236675004)(76576001)(1220700001)(8936002)(5005710100001)(10290500002)(11100500001)(6116002)(586003)(19300405004)(106116001)(81166006)(122556002)(10400500002)(3660700001)(33656002)(19609705001)(2900100001)(19580395003)(2950100001)(50986999)(189998001)(74316001)(77096005)(3280700002)(5002640100001)(76176999)(92566002)(19625215002)(54356999)(5008740100001)(86362001)(15975445007)(5004730100002)(87936001)(5001770100001)(102836003)(5003600100002)(19580405001)(86612001); DIR:OUT; SFP:1102; SCL:1; SRVR:DM2PR0301MB0719; H:DM2PR0301MB0717.namprd03.prod.outlook.com; FPR:; SPF:None; MLV:sfv; LANG:en;
spamdiagnosticoutput: 1:23
spamdiagnosticmetadata: NSPM
Content-Type: multipart/alternative; boundary="_000_DM2PR0301MB0717D5EA3FD289A7894E3AC0A3490DM2PR0301MB0717_"
MIME-Version: 1.0
X-OriginatorOrg: microsoft.com
X-MS-Exchange-CrossTenant-originalarrivaltime: 18 May 2016 16:45:25.5374 (UTC)
X-MS-Exchange-CrossTenant-fromentityheader: Hosted
X-MS-Exchange-CrossTenant-id: 72f988bf-86f1-41af-91ab-2d7cd011db47
X-MS-Exchange-Transport-CrossTenantHeadersStamped: DM2PR0301MB0719
Archived-At: <http://mailarchive.ietf.org/arch/msg/ipv6/CSlN6QVL8Rvrx7dIZLsNoIr4zGU>
Cc: "6man@ietf.org" <6man@ietf.org>, Fernando Gont <fernando@gont.com.ar>, "draft-ietf-6man-default-iids@tools.ietf.org" <draft-ietf-6man-default-iids@tools.ietf.org>
X-BeenThere: ipv6@ietf.org
X-Mailman-Version: 2.1.17
Precedence: list
List-Id: "IPv6 Maintenance Working Group \(6man\)" <ipv6.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/ipv6>, <mailto:ipv6-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/ipv6/>
List-Post: <mailto:ipv6@ietf.org>
List-Help: <mailto:ipv6-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/ipv6>, <mailto:ipv6-request@ietf.org?subject=subscribe>
X-List-Received-Date: Wed, 18 May 2016 16:45:29 -0000

I agree with Ole that RFC 4941 does not require public addresses.
For example, neither of the two snippets quoted by Lorenzo requires public addresses.
They just state what the behavior is IF you have public addresses.

From: Lorenzo Colitti [mailto:lorenzo@google.com]
Sent: Wednesday, May 18, 2016 9:42 AM
To: Ole Troan <otroan@employees.org>
Cc: 6man@ietf.org; Fernando Gont <fernando@gont.com.ar>; draft-ietf-6man-default-iids@tools.ietf.org
Subject: Re: RFC4941 text on requirement for public addresses (was: Re: default-iids and stable addresses)

As written, RFC 4941 seems to require public addresses. For example:

       If a received
       option will extend the lifetime of a public address, the
       lifetimes of temporary addresses should be extended
...
   3.  When a new public address is created as described in [ADDRCONF],
       the node SHOULD also create a new temporary address.
...
       *  Its Preferred Lifetime is the lower of the Preferred Lifetime
          of the public address or TEMP_PREFERRED_LIFETIME -
          DESYNC_FACTOR.

On Wed, May 18, 2016 at 8:13 PM, <otroan@employees.org<mailto:otroan@employees.org>> wrote:
This email from Fernando provides a good introduction to an outstanding question from Buenos Aires.

The current plan is to take RFC4941 to Internet Standard unchanged.
A question was raised if 4941 requires public addresses or not, and if we have to update 4941 text, or if we can live with the current text, and still allow for interfaces with only temporary addresses.

Opinions?

Best regards,
Ole

> On 17 May 2016, at 20:15, Fernando Gont <fernando@gont.com.ar<mailto:fernando@gont.com.ar>> wrote:
>
> Lorenzo (and wg),
>
> The two issues raised by Lorenzo regarding default-iids boil down to:
>
> 1) The ability to embed MAC addresses in the IID
>
> 2) The requirement to have stable addresses
>
>
> This document does ban "1)" as the default algorithm for generating
> IIDs, for the reasons discussed in RFC7721 and
> draft-gont-predictable-numeric-ids. We have a very long history of
> improper numeric IDs, and I guess that, regarding this one, we simply
> disagree with Lorenzo.
>
>
> Regarding "2)", this document does not specify any new requirements on
> the topic. Essentially, nodes are implied to configure a stable
> addresses as a result of SLAAC&traditional link-layer address
> properties, and more explicitly by this text in RFC4941:
>
> * Section 3, bullet #1:
>   2.  Create additional addresses based on a random interface
>       identifier for the purpose of initiating outgoing sessions.
>
> * Section 3.3, bullet #1:
>   1.  Process the Prefix Information Option as defined in [ADDRCONF],
>       either creating a new public address or adjusting the lifetimes
>       of existing addresses, both public and temporary.
>
> * Section 3.3, bullet #3:
>   3.  When a new public address is created as described in [ADDRCONF],
>       the node SHOULD also create a new temporary address.
>
> * Section 3.6, for instance, says (even recommending that temp addrs
> default to "off"):
>   The use of temporary addresses may cause unexpected difficulties with
>   some applications.  As described below, some servers refuse to accept
>   communications from clients for which they cannot map the IP address
>   into a DNS name.  In addition, some applications may not behave
>   robustly if temporary addresses are used and an address expires
>   before the application has terminated, or if it opens multiple
>   sessions, but expects them to all use the same addresses.
>   Consequently, the use of temporary addresses SHOULD be disabled by
>   default in order to minimize potential disruptions.
>
>
>
> Our document simply requires implementations that their
> stable addresses are RFC7721-friendly. But if anything, the requirement
> of whether to have a stable address or not is not something introduced
> by our document.
>
> As a co-author of draft-ietf-6man-default-iids, I just wanted to check
> that we're on the same page, because I have the feeling that the above
> keeps getting misinterpreted.
>
> I believe all of the co-authors of default-iids agree and understand
> that there can be scenarios where you may want to do
> temporary-addresses-only. However, that is orthogonal to this particular
> document (default-iids), and would probably require an update to
> RFC4941, such that temporary addresses can be employed as a replacement
> of stable addresses, rather than as something that you do "in addition
> to" them.
>
> This document is about how to do stable addresses in a more
> RFC7721-friendly way than we currently do.
>
> Thanks!
>
> Best regards,
> --
> Fernando Gont
> e-mail: fernando@gont.com.ar<mailto:fernando@gont.com.ar> || fgont@si6networks.com<mailto:fgont@si6networks.com>
> PGP Fingerprint: 7809 84F5 322E 45C7 F1C9 3945 96EE A9EF D076 FFF1
>
>
>
> --------------------------------------------------------------------
> IETF IPv6 working group mailing list
> ipv6@ietf.org<mailto:ipv6@ietf.org>
> Administrative Requests: https://www.ietf.org/mailman/listinfo/ipv6
> --------------------------------------------------------------------