Re: [IPv6] I-D Action: draft-ietf-6man-rfc6724-update-07.txt

Ted Lemon <mellon@fugue.com> Fri, 05 April 2024 20:24 UTC

Return-Path: <mellon@fugue.com>
X-Original-To: ipv6@ietfa.amsl.com
Delivered-To: ipv6@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 854A0C1519A0 for <ipv6@ietfa.amsl.com>; Fri, 5 Apr 2024 13:24:09 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -6.898
X-Spam-Level:
X-Spam-Status: No, score=-6.898 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, DKIM_SIGNED=0.1, DKIM_VALID=-0.1, HTML_MESSAGE=0.001, RCVD_IN_DNSWL_HI=-5, RCVD_IN_ZEN_BLOCKED_OPENDNS=0.001, SPF_HELO_NONE=0.001, SPF_PASS=-0.001] autolearn=ham autolearn_force=no
Authentication-Results: ietfa.amsl.com (amavisd-new); dkim=pass (2048-bit key) header.d=fugue-com.20230601.gappssmtp.com
Received: from mail.ietf.org ([50.223.129.194]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id OKIlSsL8wrnE for <ipv6@ietfa.amsl.com>; Fri, 5 Apr 2024 13:24:07 -0700 (PDT)
Received: from mail-yw1-x112f.google.com (mail-yw1-x112f.google.com [IPv6:2607:f8b0:4864:20::112f]) (using TLSv1.3 with cipher TLS_AES_128_GCM_SHA256 (128/128 bits) key-exchange X25519 server-signature RSA-PSS (2048 bits) server-digest SHA256) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id AC9C3C151986 for <ipv6@ietf.org>; Fri, 5 Apr 2024 13:24:07 -0700 (PDT)
Received: by mail-yw1-x112f.google.com with SMTP id 00721157ae682-6114c9b4d83so24098127b3.3 for <ipv6@ietf.org>; Fri, 05 Apr 2024 13:24:07 -0700 (PDT)
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=fugue-com.20230601.gappssmtp.com; s=20230601; t=1712348646; x=1712953446; darn=ietf.org; h=cc:to:subject:message-id:date:from:in-reply-to:references :mime-version:from:to:cc:subject:date:message-id:reply-to; bh=8yPF3+hJ3FN2RbpTJmfe3VD/2dhBrnt6z81yOfXplp0=; b=vDfipGOnYvkQXtJ30w9aYo0QCh6gzmkljerKQiDRT4Rn9jw/3sOcsqj0Adc6JFdQSa 97Nj5eG+8gIW5rD3GKQkib33A7MtCKWdY9USWY3A9rv8h/VzmY+QumMwKic4+ygbdR/2 dhxOjoCzQ+Jk5LwaSpXoa3aW5n15/ZfkAdNqsjW5MopsaNjvPQlMQA4tYOef23rGOzkK xbJJEG62oa8c8VY0HGMEelkn8Q/YedwClAnRsA7VgUo4EWiJdGD9So2kpMO2LOFZo/x6 LDoWm26S+g1Frf1POHDfj4CDpMfW2aNMqfB3i6rlMD2RT512UmnZ7i5Om7R/F8QcxwoB ziDQ==
X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20230601; t=1712348646; x=1712953446; h=cc:to:subject:message-id:date:from:in-reply-to:references :mime-version:x-gm-message-state:from:to:cc:subject:date:message-id :reply-to; bh=8yPF3+hJ3FN2RbpTJmfe3VD/2dhBrnt6z81yOfXplp0=; b=sIIIBpz0xRFzn9H08fUZoGB/jUFKe4qWCkbC+NElOruCTnqXUthSFyeaj04Cdl1ydY 8F13qccUxjeYfnLEw2/p7ityDJ9X8QL7AIKG6GeKflh161Som8X8tRaNOaS7yhEZlV9G 3ZuawrCZZJ5ti8nP4AOwrbyrqtSkXW/QuWQBV0KGTIlf1xQieNJub/8vdUJyP603apMM RMZOGVJU0dbTLIqQ50+kGRZ+WP3uG2C7URZ6u9Hq56Eig29trk2lv8xYwceEsLLaRDqc V3ctY8wtiuxB5MRqt91vFwqAG/NTj8nI/9A5TIdt3uZwLuwhWfRG5qLlyI77p/1KF1tz Wo7A==
X-Forwarded-Encrypted: i=1; AJvYcCVlWL0Xfi9mYX/l07WzvCnUXAWnxHOf+mo6S+olJcfXW8UAjfIwATzmcqsdgLxjnX9OFxb2/YHtY1mGLDNK
X-Gm-Message-State: AOJu0Yxr03c3hPXhatbQboEtapCu0TW+0kxY7t4Jv0rBacrNSCZ+EkLP duo4KRFcuUjj18ki1NwF2Q0iF8eoCjfdsJbV1SMgiB0coxFxQBkKDkOS4NEizsU7xtaDONnuxyf GgdrRA+6MhA0Upq4ZMT/Z3rZ4jQAbb/ZYhmppfg==
X-Google-Smtp-Source: AGHT+IFOccxHn/onw209JCsIfM6GoMsAN95a8qZxYVtLZl73gvnOqru41wwRYtGW7eegeejI2nK4MQJtFtSUMgojlgs=
X-Received: by 2002:a25:a028:0:b0:dc7:4725:56df with SMTP id x37-20020a25a028000000b00dc7472556dfmr2138141ybh.23.1712348646429; Fri, 05 Apr 2024 13:24:06 -0700 (PDT)
MIME-Version: 1.0
References: <171225751716.18509.12521562864612372012@ietfa.amsl.com> <a4063219-1cd5-4e06-bf42-b0ffebd2b419@gmail.com> <CAN-Dau3VrqfRR+4Eee7TOS1L2RAWbfWv87_QJH_u5gzVU1Av7g@mail.gmail.com> <CAPt1N1nq9V4H9kq+hf4YO-T6OUdYMv8Vmsd3Vpqf264Jm7mrKg@mail.gmail.com> <CAN-Dau3nh50j6qB2WryL1tM2ktwSntDKX72v8O-_fzNRnu_C4Q@mail.gmail.com> <a1a1d964-949c-48e4-bb6c-462a81402871@gmail.com> <CAN-Dau1izfpYR=jH2DbRmf+h+LWOmACQxa-WeuW_o0ABbsJmPw@mail.gmail.com>
In-Reply-To: <CAN-Dau1izfpYR=jH2DbRmf+h+LWOmACQxa-WeuW_o0ABbsJmPw@mail.gmail.com>
From: Ted Lemon <mellon@fugue.com>
Date: Fri, 05 Apr 2024 16:23:30 -0400
Message-ID: <CAPt1N1nX3GbcVLsMUqhY5r-_sFAD_ebsBkANQ=Macneccu8hng@mail.gmail.com>
To: David Farmer <farmer@umn.edu>
Cc: Brian E Carpenter <brian.e.carpenter@gmail.com>, ipv6@ietf.org
Content-Type: multipart/alternative; boundary="000000000000cd74c306155f3c21"
Archived-At: <https://mailarchive.ietf.org/arch/msg/ipv6/HLBvidZ9pMbkFCWslJcLJe58tZw>
Subject: Re: [IPv6] I-D Action: draft-ietf-6man-rfc6724-update-07.txt
X-BeenThere: ipv6@ietf.org
X-Mailman-Version: 2.1.39
Precedence: list
List-Id: "IPv6 Maintenance Working Group \(6man\)" <ipv6.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/ipv6>, <mailto:ipv6-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/ipv6/>
List-Post: <mailto:ipv6@ietf.org>
List-Help: <mailto:ipv6-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/ipv6>, <mailto:ipv6-request@ietf.org?subject=subscribe>
X-List-Received-Date: Fri, 05 Apr 2024 20:24:09 -0000

This is a really contrived scenario, David. The scenario is that this
constrained device is now succeeding in communicating, and after this
change will fail, right? Or maybe it's not succeeding now, in which case
this change can only improve the situation.

The notion is that a constrained device on a very large enterprise network
with multiple ULA /48s will need to communicate with another device that is
on a ULA /48 that is not appearing in a PIO option in an RA. The case where
we'd have a setup like this in an enterprise environment is most likely
where there are multiple sites. So the likelihood that this constrained
device needs to communicate with a device at another site within the same
enterprise and has no GUA that would work for that communication seems
unlikely. I don't think we need to lose any sleep worrying about this.


On Fri, Apr 5, 2024 at 4:15 PM David Farmer <farmer@umn.edu> wrote:

>
>
> On Fri, Apr 5, 2024 at 2:37 PM Brian E Carpenter <
> brian.e.carpenter@gmail.com> wrote:
>
>> On 06-Apr-24 07:15, David Farmer wrote:
>> > On Fri, Apr 5, 2024 at 9:30 AM Ted Lemon <mellon@fugue.com <mailto:
>> mellon@fugue.com>> wrote:
>> ...
>> >     If constrained devices already support the policy table, I do not
>> think this additional work is onerous.
>> >
>> >
>> > How would the "known-local" ULA prefixes be populated if not
>> dynamically updated from PIOs and RIOs?
>>
>> By the simple fact that a host actually has a ULA. This is the approach I
>> used in three different userland hacks:
>>
>> https://github.com/becarpenter/misc/blob/main/enable_ula.py
>> https://github.com/becarpenter/misc/blob/main/gai_wrap.py
>> https://github.com/becarpenter/getapr/
>>
>>     Brian
>>
>
> That will work for a single ULA network, but how does that work when you
> merge ULA networks, as discussed in section 4.2 of RFC4193? Do all hosts
> have to get an address from the other network(s) to know they are local?
> Somehow, the host needs to know the other ULA networks to treat it as
> local; otherwise, effectively, you can't merge ULA networks as RFC4193
> promises. I envision that coming from ROIs. If not ROIs, what?
>
> Thanks
> --
> ===============================================
> David Farmer               Email:farmer@umn.edu
> Networking & Telecommunication Services
> Office of Information Technology
> University of Minnesota
> 2218 University Ave SE        Phone: 612-626-0815
> Minneapolis, MN 55414-3029   Cell: 612-812-9952
> ===============================================
>