Re: I-D Action: draft-ietf-6man-rfc6434-bis-01.txt

Tim Chown <Tim.Chown@jisc.ac.uk> Mon, 17 July 2017 09:00 UTC

Return-Path: <tim.chown@jisc.ac.uk>
X-Original-To: ipv6@ietfa.amsl.com
Delivered-To: ipv6@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 3D3C812EB5F for <ipv6@ietfa.amsl.com>; Mon, 17 Jul 2017 02:00:48 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -4.3
X-Spam-Level:
X-Spam-Status: No, score=-4.3 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, DKIM_SIGNED=0.1, DKIM_VALID=-0.1, DKIM_VALID_AU=-0.1, RCVD_IN_DNSWL_MED=-2.3, SPF_PASS=-0.001, URIBL_BLOCKED=0.001] autolearn=ham autolearn_force=no
Authentication-Results: ietfa.amsl.com (amavisd-new); dkim=pass (1024-bit key) header.d=jisc.ac.uk
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id J0-vrYVbrxjJ for <ipv6@ietfa.amsl.com>; Mon, 17 Jul 2017 02:00:46 -0700 (PDT)
Received: from eu-smtp-delivery-189.mimecast.com (eu-smtp-delivery-189.mimecast.com [207.82.80.189]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-SHA384 (256/256 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id C671612EA7C for <ipv6@ietf.org>; Mon, 17 Jul 2017 02:00:45 -0700 (PDT)
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=jisc.ac.uk; s=mimecast20170213; t=1500282044; h=from:subject:date:message-id:to:cc:mime-version:content-type:content-transfer-encoding:in-reply-to:references; bh=Mvif31SSPVwhvT6BBJsBeoVUjv1Dy+sxPzAt9MlIFPs=; b=EdyFxnXtFzLIFsWyaLIgS2J7yZY+qCFwhADqXsuxE6Huh2CHHPKU44nPtscX+Dkvb9uAB1YKvY4WMWJ8VnipHmVfMHQ4pj0Q3/qg2Of+qxVb0Kz9QCnnwq1KNQvVfLtRP7/DBoZrFfONHs24t/Bc/pbmx4o6aDiGNkgY6KbFwN0=
Received: from EUR03-DB5-obe.outbound.protection.outlook.com (mail-db5eur03lp0079.outbound.protection.outlook.com [94.245.120.79]) (Using TLS) by eu-smtp-1.mimecast.com with ESMTP id uk-mta-130-qz1GbzUrNraeRge-71xBZA-1; Mon, 17 Jul 2017 10:00:36 +0100
Received: from AM3PR07MB1140.eurprd07.prod.outlook.com (10.163.188.14) by AM3PR07MB1204.eurprd07.prod.outlook.com (10.163.188.30) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256_P256) id 15.1.1282.4; Mon, 17 Jul 2017 09:00:35 +0000
Received: from AM3PR07MB1140.eurprd07.prod.outlook.com ([fe80::b8a2:fb24:484f:ba3]) by AM3PR07MB1140.eurprd07.prod.outlook.com ([fe80::b8a2:fb24:484f:ba3%13]) with mapi id 15.01.1282.008; Mon, 17 Jul 2017 09:00:35 +0000
From: Tim Chown <Tim.Chown@jisc.ac.uk>
To: "STARK, BARBARA H" <bs7652@att.com>
CC: IETF IPv6 Mailing List <ipv6@ietf.org>
Subject: Re: I-D Action: draft-ietf-6man-rfc6434-bis-01.txt
Thread-Topic: I-D Action: draft-ietf-6man-rfc6434-bis-01.txt
Thread-Index: AQHS9BbBUsATtgvuN0uZCK2ByUXQ5KJWRHuAgAAeRYCAAAFwAIAAN0sAgAC654CAAHe7gA==
Date: Mon, 17 Jul 2017 09:00:34 +0000
Message-ID: <FBEB4BDC-1278-472A-99B5-604D13444859@jisc.ac.uk>
References: <149909644776.22718.16227939850699261560@ietfa.amsl.com> <CAKD1Yr25jk22qTTqJ-RoxOVTu7=e=vQWWLQZnek-HGCKaZgU=w@mail.gmail.com> <596B4BE1.7020807@foobar.org> <CAKD1Yr1W0+d-Bj9daqXUsyAEaNE6RHHZBwJ_6SzT0sGhZXdDMw@mail.gmail.com> <CAN-Dau0PnZ0u8iARftmaWFvfYavwpBeV+JCS=1LEUckcaUVh5w@mail.gmail.com> <2D09D61DDFA73D4C884805CC7865E6114DBCB6A8@GAALPA1MSGUSRBF.ITServices.sbc.com>
In-Reply-To: <2D09D61DDFA73D4C884805CC7865E6114DBCB6A8@GAALPA1MSGUSRBF.ITServices.sbc.com>
Accept-Language: en-GB, en-US
Content-Language: en-US
X-MS-Has-Attach:
X-MS-TNEF-Correlator:
x-mailer: Apple Mail (2.3273)
x-originating-ip: [2001:67c:370:128:21ec:8d4a:5310:e823]
x-ms-publictraffictype: Email
x-microsoft-exchange-diagnostics: 1; AM3PR07MB1204; 20:dGuWqkRpfHx35LJ7GB5E4VTLlRfE+4ojDlsD57Tm++UHMNe305OD6OHosh89a2riQvM7gsOMGxIGtabpdOXWeViSsv+PiJRGv4E8hGmViiBG0q1sxSQ7S3XDnpQmeEofioKgYZwHZOX4mA/iIgyf4cx0UiI5ZxwQOIUU2bBGNE4=
x-ms-office365-filtering-correlation-id: 5854f6e2-084f-4472-00b1-08d4ccf2495b
x-microsoft-antispam: UriScan:; BCL:0; PCL:0; RULEID:(300000500095)(300135000095)(300000501095)(300135300095)(22001)(300000502095)(300135100095)(2017030254075)(300000503095)(300135400095)(2017052603031)(201703131423075)(201703031133081)(201702281549075)(300000504095)(300135200095)(300000505095)(300135600095)(300000506095)(300135500095); SRVR:AM3PR07MB1204;
x-ms-traffictypediagnostic: AM3PR07MB1204:
x-exchange-antispam-report-test: UriScan:(278178393323532)(158342451672863)(133145235818549)(236129657087228)(97927398514766)(211936372134217)(148574349560750);
x-microsoft-antispam-prvs: <AM3PR07MB1204F910E980747CD8C7FC8DD6A00@AM3PR07MB1204.eurprd07.prod.outlook.com>
x-exchange-antispam-report-cfa-test: BCL:0; PCL:0; RULEID:(100000700101)(100105000095)(100000701101)(100105300095)(100000702101)(100105100095)(6040450)(601004)(2401047)(2017060910075)(5005006)(8121501046)(3002001)(93006095)(93001095)(10201501046)(100000703101)(100105400095)(920507026)(6041248)(201703131423075)(201702281529075)(201702281528075)(201703061421075)(201703061406153)(20161123560025)(20161123558100)(20161123564025)(20161123562025)(20161123555025)(6072148)(100000704101)(100105200095)(100000705101)(100105500095); SRVR:AM3PR07MB1204; BCL:0; PCL:0; RULEID:(100000800101)(100110000095)(100000801101)(100110300095)(100000802101)(100110100095)(100000803101)(100110400095)(100000804101)(100110200095)(100000805101)(100110500095); SRVR:AM3PR07MB1204;
x-forefront-prvs: 0371762FE7
x-forefront-antispam-report: SFV:NSPM; SFS:(10009020)(6009001)(39450400003)(39410400002)(39840400002)(39400400002)(24454002)(377454003)(5660300001)(7736002)(478600001)(2950100002)(6916009)(50986999)(2906002)(76176999)(2900100001)(25786009)(50226002)(6246003)(8676002)(42882006)(81166006)(229853002)(4326008)(6506006)(38730400002)(6486002)(86362001)(305945005)(110136004)(8936002)(189998001)(3280700002)(3660700001)(82746002)(33656002)(230783001)(6512007)(93886004)(72206003)(74482002)(53936002)(14454004)(6116002)(102836003)(6436002)(57306001)(53546010)(99286003)(83716003)(36756003)(5250100002); DIR:OUT; SFP:1101; SCL:1; SRVR:AM3PR07MB1204; H:AM3PR07MB1140.eurprd07.prod.outlook.com; FPR:; SPF:None; MLV:sfv; LANG:en;
spamdiagnosticoutput: 1:99
spamdiagnosticmetadata: NSPM
Content-ID: <CA4D1F00528DDE4FB0F291A17C172998@eurprd07.prod.outlook.com>
MIME-Version: 1.0
X-OriginatorOrg: jisc.ac.uk
X-MS-Exchange-CrossTenant-originalarrivaltime: 17 Jul 2017 09:00:35.0153 (UTC)
X-MS-Exchange-CrossTenant-fromentityheader: Hosted
X-MS-Exchange-CrossTenant-id: 48f9394d-8a14-4d27-82a6-f35f12361205
X-MS-Exchange-Transport-CrossTenantHeadersStamped: AM3PR07MB1204
X-MC-Unique: qz1GbzUrNraeRge-71xBZA-1
Content-Type: text/plain; charset="UTF-8"
Content-Transfer-Encoding: base64
Archived-At: <https://mailarchive.ietf.org/arch/msg/ipv6/JAyqgdeMDxAnLxToegE18mzCr7w>
X-BeenThere: ipv6@ietf.org
X-Mailman-Version: 2.1.22
Precedence: list
List-Id: "IPv6 Maintenance Working Group \(6man\)" <ipv6.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/ipv6>, <mailto:ipv6-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/ipv6/>
List-Post: <mailto:ipv6@ietf.org>
List-Help: <mailto:ipv6-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/ipv6>, <mailto:ipv6-request@ietf.org?subject=subscribe>
X-List-Received-Date: Mon, 17 Jul 2017 09:00:48 -0000

Hi,

In-line...

> On 17 Jul 2017, at 02:52, STARK, BARBARA H <bs7652@att.com> wrote:
> 
> On Sun, Jul 16, 2017 at 6:25 AM, Lorenzo Colitti <lorenzo@google.com> wrote:
> On Sun, Jul 16, 2017 at 1:20 PM, Nick Hilliard <nick@foobar.org> wrote:
> The self-selection addressing model does not suit the deployment
> requirements for many types of ipv6 networks, including enterprise,
> provider hosting, terrestrial access networks (e.g. docsis / gpon /
> ipoe) and others.  If the recommendation for dhcpv6 is dropped, then
> there is no recommended ietf model for operator-assigned addressing, and
> this would leave a glaring hole in the ipv6 host specification.
>  
> That's a fair opinion to hold, but the fact of the matter is that a SHOULD for DHCPv6 conflicts with RFC 7934 and RFC 7844.
>  
> We shouldn't publish a host requirements document that contradicts the host address assignment BCP and that cites RFC7844 while contradicting that document's recommendation to use stateless in preference to stateful.
>  
> Lets start with RFC 7934 it is a set of RECOMMENDATIONS for how networks should supply addresses to general purpose hosts.  First, not everything fits into that scope and even within that scope as a RECOMMENDATION that means "there may exist valid reasons in particular circumstances to ignore a particular item" [RFC2119].  So, it by no means precludes the possibility that hosts could find them on a network that is only providing addresses via DHCPv6. Therefore, a SHOULD for DHCPv6 in the host requirements still seems appropriate to me.
>  
> As for RFC 7844, it is scoped to mobile hosts that want privacy from the DHCP server, and it says "The anonymity profiles have the effect of hiding the client identity from the DHCP server.  This is not always desirable. ..."  A document that itself recognizes it's primary purpose "is not always desirable" even within it's defined scope, isn't a strong argument for changing the RECOMMENDED behavior of all host.  
>  
> <bhs> +1. RFC 6434 Node Requirements are general-purpose for all nodes on all networks. And should remain so. They should not be tailored to 3GPP networks or mass market end user networks or any other special network. RFC 7934 and 7844 are not for all nodes. BTW, many wireline access networks do not support SLAAC for address assignment to the CE Router. Which is why RFC 7084 exists -- to provide specific guidance for that specific use case. RFC 7084 does not conflict with RFC 6434. Because its use case is distinct from that of RFCs 7934 and 7844, it doesn’t conflict with them either.
>  
> Further, a "recommendation to use stateless in preference to stateful" isn't a prohibition on stateful, Until, stateful is prohibited or all networks are required to provided stateless, a SHOULD for DHCPv6 in the host requirements still seems appropriate to me.
>  
> <bhs> +1

To support Barbara’s comments above, it's worth noting that RFC7844 includes exceptions, specifically in Section 5, stating that anonymity profiles are not always desirable:

5.  Operational Considerations

   The anonymity profiles have the effect of hiding the client identity
   from the DHCP server.  This is not always desirable.  Some DHCP
   servers provide facilities like publishing names and addresses in the
   DNS, or ensuring that returning clients get reassigned the same
   address.

   Clients using an anonymity profile may be consuming more resources.
   For example, when a client changes its link-layer address and
   requests a new IP address, the old IP address is still marked as
   leased by the server.

   Some DHCP servers will only give addresses to pre-registered MAC
   addresses, forcing clients to choose between remaining anonymous and
   obtaining connectivity.

   Implementers SHOULD provide a way for clients to control when the
   anonymity profiles are used and when standard behavior is preferred.

   Implementers MAY implement this control by tying the use of the
   anonymity profiles to that of link-layer address randomization.


Tim