Re: Extending a /64

Gyan Mishra <hayabusagsm@gmail.com> Wed, 11 November 2020 22:50 UTC

Return-Path: <hayabusagsm@gmail.com>
X-Original-To: ipv6@ietfa.amsl.com
Delivered-To: ipv6@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 542113A11BB for <ipv6@ietfa.amsl.com>; Wed, 11 Nov 2020 14:50:57 -0800 (PST)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -2.087
X-Spam-Level:
X-Spam-Status: No, score=-2.087 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, DKIM_SIGNED=0.1, DKIM_VALID=-0.1, DKIM_VALID_AU=-0.1, DKIM_VALID_EF=-0.1, FREEMAIL_FROM=0.001, HTML_MESSAGE=0.001, SPF_HELO_NONE=0.001, SPF_PASS=-0.001, T_REMOTE_IMAGE=0.01, URIBL_BLOCKED=0.001] autolearn=ham autolearn_force=no
Authentication-Results: ietfa.amsl.com (amavisd-new); dkim=pass (2048-bit key) header.d=gmail.com
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id n_3bmxyOm4g8 for <ipv6@ietfa.amsl.com>; Wed, 11 Nov 2020 14:50:55 -0800 (PST)
Received: from mail-pf1-x430.google.com (mail-pf1-x430.google.com [IPv6:2607:f8b0:4864:20::430]) (using TLSv1.2 with cipher ECDHE-RSA-AES128-GCM-SHA256 (128/128 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id A88553A11BA for <ipv6@ietf.org>; Wed, 11 Nov 2020 14:50:55 -0800 (PST)
Received: by mail-pf1-x430.google.com with SMTP id 10so2676057pfp.5 for <ipv6@ietf.org>; Wed, 11 Nov 2020 14:50:55 -0800 (PST)
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=gmail.com; s=20161025; h=mime-version:references:in-reply-to:from:date:message-id:subject:to :cc; bh=Y2fAIdCH79A/msKbF1Oltlyc1ESRatdalcr80Fba510=; b=MjnhC6WusjGJdAx5MWPCiIyck60QC3h8Z7fkqR10KeClqF592DX3FmHzlnnyDl6LzX FlL2hROpWsgMAjbUWzF4gvEQ3OSuf31hbliZ6HWT1jLZzyxLYA7+hhQW1avIHeFO9rY9 t0fRUaVzyBBynxAq4WRw6CgIsWG9klKZbnfvPoX/DZUL6WvuPREQK4mGcewXLzFfhgGK RnbqjWo0p6X3Z7bM28sVdYE01bIoR2HIczjWEZs8xKYzx8YqrN4mfsHMa88Lu4rc6Xtx wKnRoP2lotDnSG5h83RCL9bJrixoUvGRAyq6epD9d/7BMZytm++HhFQ3ct1jE6qpR7jv 3/Qw==
X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20161025; h=x-gm-message-state:mime-version:references:in-reply-to:from:date :message-id:subject:to:cc; bh=Y2fAIdCH79A/msKbF1Oltlyc1ESRatdalcr80Fba510=; b=F7WJEFSdjdr7M3uDCaQepvPmvhcJtnfi+cBF9oGVaxAIGQhYZsQU+osimGLPV430ge 3z1HprIhOtEmOYU2gmoTPW60tIy2f521M5no9a1ubWHDvDpLI7RgCEetqonppem91dA3 aJe0gjs7P5prCDxD9X5XOxs5uF/a8lwGE2SlI4ixBxzDVlHgOfPantPoOtOUoHFZQyR9 90fZ0cn/+tFQrc3YdCSA/WSaVeHAUf5uETBjiJM1MfUnAL2yB+FGyBdDd7ToLau3WjBR 6NJb7Phbpc7PcePsUolKHzJTZpJsIOMgAMukefFn+JuqcWxQhAuiYmYJcjdrBITWgpRp lL2Q==
X-Gm-Message-State: AOAM533onnCMrR9gJlleqC9A+WXtlmNTce6dEnb9gRtYk7zQHjWeGr8D eJ7nf2KuRQM6hazV/60PCZAToJhOeYtg13ir9Ug=
X-Google-Smtp-Source: ABdhPJxAa7zbeiozRwOhxS3ChrPo++Pn+A3ao2MVqSomMlzBjIMughwuOr1HQWcouZvMy1t/1ReTwo9/ji/HtZsUmsY=
X-Received: by 2002:aa7:8281:0:b029:164:cc0f:2b3a with SMTP id s1-20020aa782810000b0290164cc0f2b3amr25489664pfm.30.1605135055072; Wed, 11 Nov 2020 14:50:55 -0800 (PST)
MIME-Version: 1.0
References: <005ECBB3-088B-4363-BB53-8D4AD25CA3D2@employees.org> <b468124f-f85b-7e20-a354-c6b7eaba3447@mccallumwhyman.com> <20593.1604972743@localhost> <CAKr6gn0tedRz4iBu49Lrw5qMCdXWPcg-66UAOfHeJ_ZUeq8U4g@mail.gmail.com> <CABNhwV2c_qaQGY2J62LDh=EZYHo5poYNF_Asf908ofR3wfmW1g@mail.gmail.com> <CABNhwV3wgdOUKqOyqJ4bTvVv4PKq81anYCxASOTCEMg3T84zig@mail.gmail.com> <CAL9jLaaDYrXVTGQeWh4aAc-qUVCoxRNokwANpQhuZ4OGdpySMw@mail.gmail.com> <46a202df-bae8-626b-042a-72adc3d31fcc@gmail.com> <CABNhwV0eRYx9jaygAaZ=KZ45zz-X3+Un17Oi8gv2wzf2-HzXMA@mail.gmail.com>
In-Reply-To: <CABNhwV0eRYx9jaygAaZ=KZ45zz-X3+Un17Oi8gv2wzf2-HzXMA@mail.gmail.com>
From: Gyan Mishra <hayabusagsm@gmail.com>
Date: Wed, 11 Nov 2020 17:45:06 -0500
Message-ID: <CABNhwV3cYvdssqK8EJ+_goH5_tLi0vm_Dy5M4bj+-Mp_yVaReg@mail.gmail.com>
Subject: Re: Extending a /64
To: Brian E Carpenter <brian.e.carpenter@gmail.com>
Cc: Christopher Morrow <christopher.morrow@gmail.com>, Michael Richardson <mcr+ietf@sandelman.ca>, IPv6 <ipv6@ietf.org>
Content-Type: multipart/alternative; boundary="000000000000c6331105b3dca0f7"
Archived-At: <https://mailarchive.ietf.org/arch/msg/ipv6/D3Vxqt6y2WAHey2IcW4Bs3oOIZE>
X-BeenThere: ipv6@ietf.org
X-Mailman-Version: 2.1.29
Precedence: list
List-Id: "IPv6 Maintenance Working Group \(6man\)" <ipv6.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/ipv6>, <mailto:ipv6-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/ipv6/>
List-Post: <mailto:ipv6@ietf.org>
List-Help: <mailto:ipv6-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/ipv6>, <mailto:ipv6-request@ietf.org?subject=subscribe>
X-List-Received-Date: Wed, 11 Nov 2020 22:50:57 -0000

In summary from all the threads thus far on the original "general variable
slaac draft & problem statement draft" - b1) steal the uplink /64
(64share)  - which steals the wan /64 &  performing a PD like delegation
function using RA for subtending to downstream devices.  So far this is the
leading option.

Initially we did look at longer prefix, but then the contentious debate on
"race to the bottom" - and technical issue with DHCPv6 PD not being
supported on 3GPP gateway to get a shorter prefix -  that the only
workaround to longer prefix is a shorter prefix via "B1" which gets around
the "race to the bottom".

Cameron's 64share v2 enlightenment on the possible solution shorter 64<
prefix idea via RA would require IETF + 3GPP concurrence to spec changes.

Downside in stealing WAN /64 is the ephemeral prefix nature & instability
issue similar to what we have with wired broadband BNG with flash
renumbering.
We are digging in on the v2 thread how to detect failure & signal to the CE
a renumbering event.  Is this really an issue or are we over thinking as
this is a mobile device not fixed.

With existing 64share stealing of the radio /64 has there been any reported
issues in deployment & instability from renumbering events?

For the shorter prefix we would not be able to do a similar trick I don't
think as was done with 64share with single /64 stealing.  Unless it was
multiple /64's sent in PIO to steal - trickery would that be possible RA
PD like delegation.

Has that ever been done before -  using 64share delegating multiple /64s
via RA in PIO with 3GPP?

Multiple /64s trickery would get around changing IETF or 3GPP
specifications.


Kind Regards

Gyan






On Wed, Nov 11, 2020 at 5:04 PM Gyan Mishra <hayabusagsm@gmail.com> wrote:

> My last post  - I accidentally posted to the wrong thread - was supposto
> be on 64share v2 😃
>
> On Wed, Nov 11, 2020 at 4:23 PM Brian E Carpenter <
> brian.e.carpenter@gmail.com> wrote:
>
>> On 12-Nov-20 08:44, Christopher Morrow wrote:
>> > it seems that this whole conversation is really:
>> >   https://tools.ietf.org/html/draft-bourbaki-6man-classless-ipv6-05
>> >
>> > happening again.
>> >
>> > right? :) "I'd like to use all the bits in my address as I see fit for
>> my purposes"
>>
>> Except that it *explicitly* recommends against changing the /64 for SLAAC.
>>
>>    Brian
>>
>>
>
> --
>
> <http://www.verizon.com/>
>
> *Gyan Mishra*
>
> *Network Solutions A**rchitect *
>
>
>
> *M 301 502-134713101 Columbia Pike *Silver Spring, MD
>
>

-- 

<http://www.verizon.com/>

*Gyan Mishra*

*Network Solutions A**rchitect *



*M 301 502-134713101 Columbia Pike *Silver Spring, MD