Re: I-D Action: draft-mishra-6man-variable-slaac-01.txt

Gyan Mishra <hayabusagsm@gmail.com> Tue, 03 November 2020 07:26 UTC

Return-Path: <hayabusagsm@gmail.com>
X-Original-To: ipv6@ietfa.amsl.com
Delivered-To: ipv6@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 4B3853A12E8; Mon, 2 Nov 2020 23:26:49 -0800 (PST)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -2.097
X-Spam-Level:
X-Spam-Status: No, score=-2.097 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, DKIM_SIGNED=0.1, DKIM_VALID=-0.1, DKIM_VALID_AU=-0.1, DKIM_VALID_EF=-0.1, FREEMAIL_FROM=0.001, HTML_MESSAGE=0.001, SPF_HELO_NONE=0.001, SPF_PASS=-0.001, URIBL_BLOCKED=0.001] autolearn=ham autolearn_force=no
Authentication-Results: ietfa.amsl.com (amavisd-new); dkim=pass (2048-bit key) header.d=gmail.com
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id DW-Ik2nq9N5L; Mon, 2 Nov 2020 23:26:47 -0800 (PST)
Received: from mail-ua1-x935.google.com (mail-ua1-x935.google.com [IPv6:2607:f8b0:4864:20::935]) (using TLSv1.2 with cipher ECDHE-RSA-AES128-GCM-SHA256 (128/128 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id C87383A14F3; Mon, 2 Nov 2020 23:26:46 -0800 (PST)
Received: by mail-ua1-x935.google.com with SMTP id f15so4722360uaq.9; Mon, 02 Nov 2020 23:26:46 -0800 (PST)
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=gmail.com; s=20161025; h=mime-version:references:in-reply-to:from:date:message-id:subject:to :cc; bh=kx/EfiLGQW7+0/20J2u4UC1CdU8YoffySnq5Hhz4Y5g=; b=e7fik40c4ayNx3/0XY+KnpjlE2PBme0SeP0891pZJYB5w0Wj3C9IV1fWAVpFlQbcYJ kiWiU5m1hUpmeX2XNKXWm2yI16i/VMeJC65iOWZCdqnT4iRYUk/EM+B3eswT5nXEoBti wW4npxx4IJ5oYbKqurHeoluifClvEVasGKKuc1MQF/mxnSuB5LwV7yL4XJh/FhtptMsB OfkN5xisDPKHQnOB32ai88kxr1W+oKdRUmOjIPWzxh5+uW6Jv3uRqRp/kcrxvsTouh5w hskaeT6buwlm8Ue9zM2lciDwiMcuE1UwXnMYHXdM+dCtXEr45qBQ+wdxfLC4SwQzO3iB 1b7g==
X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20161025; h=x-gm-message-state:mime-version:references:in-reply-to:from:date :message-id:subject:to:cc; bh=kx/EfiLGQW7+0/20J2u4UC1CdU8YoffySnq5Hhz4Y5g=; b=XdJhjD/QWafFkoVslb4tYt4J5RTixpERMMSi2gZz6RrC8w3YMadMza8I/UygdBlUmG GPZk525LhGCCsxfrzLqDjoFHfDeoeCQI1cPhM9rpk3Bi1kgITAGaaY8A9wCz2iYjcggF vvAqyaJmYzFUvbYzZUxbq/58GKHxslSYXM3vca6bO8S9Pyn7FU866MI5aRl6ieO2E7V5 h7M5Q7i0XrO4rdUDa3fbMlrAvrJ2slQL7FBVkGRj4ifac4Yjo4czZQ7BxfM48a1jz2BJ Dk62nNFoCGpgs50vx369vcDE16iNdSYPv95TKRw9GaMK/0q2+GQIlYT4yofmMrHkJGuN QsJg==
X-Gm-Message-State: AOAM533bc00Cq5/Bf+dJ1iDiuHhpuRuAHibG58lk6kJsJOsiWRm0py/7 AJJfDs5U6PqyCqEqxJOFvWE9TLUJxPHGlcEQ+m4=
X-Google-Smtp-Source: ABdhPJw/FUhP4x1mkZTSvB8cEycmH4h5DJMGqHUPqgUrGNwGJpI7xffHN9G+4iHftruiCqjtQs48uQ02f8VM9IwNyEU=
X-Received: by 2002:ab0:2986:: with SMTP id u6mr5787909uap.118.1604388405725; Mon, 02 Nov 2020 23:26:45 -0800 (PST)
MIME-Version: 1.0
References: <160409741426.1448.16934303750885888002@ietfa.amsl.com> <3c1c3ab5-5726-b141-e7ed-618984bbbdb1@gmail.com>
In-Reply-To: <3c1c3ab5-5726-b141-e7ed-618984bbbdb1@gmail.com>
From: Gyan Mishra <hayabusagsm@gmail.com>
Date: Tue, 03 Nov 2020 02:20:41 -0500
Message-ID: <CABNhwV1zoZpZNjb54rEys4+49H3vpebZW2g9JbO1_58eR+WnQg@mail.gmail.com>
Subject: Re: I-D Action: draft-mishra-6man-variable-slaac-01.txt
To: Brian E Carpenter <brian.e.carpenter@gmail.com>
Cc: draft-mishra-6man-variable-slaac@ietf.org, 6man <ipv6@ietf.org>
Content-Type: multipart/alternative; boundary="000000000000014bae05b32ec944"
Archived-At: <https://mailarchive.ietf.org/arch/msg/ipv6/PsVf3Qly-6JvGqeUA3yNr3o14sY>
X-BeenThere: ipv6@ietf.org
X-Mailman-Version: 2.1.29
Precedence: list
List-Id: "IPv6 Maintenance Working Group \(6man\)" <ipv6.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/ipv6>, <mailto:ipv6-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/ipv6/>
List-Post: <mailto:ipv6@ietf.org>
List-Help: <mailto:ipv6-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/ipv6>, <mailto:ipv6-request@ietf.org?subject=subscribe>
X-List-Received-Date: Tue, 03 Nov 2020 07:26:49 -0000

Brian

Responses in-line

Thanks

Gyan

On Mon, Nov 2, 2020 at 4:41 PM Brian E Carpenter <
brian.e.carpenter@gmail.com> wrote:

> Hi authors,
>
> > 8.  Greater than 64 bit prefix usage by ISPs is strictly prohibited
> >
> >    The RA flag S bit setting proposed by this draft for greater or less
> >    then /64 bit prefix feature is strictly for enterprises and broadband
> >    subscriber customer use only.
>
> How do you propose to enforce this, to prevent a race to the bottom
> between ISPs? Do you have a funding source for the new Protocol Police?
>

   Gyan> Understood that there is no way we can police.  Working as a Tier
1 ISP with Verizon, I can say that from a cost benefit analysis trade off
that it would be cost prohibitive to manage vlsm to customers.

>
> It's hard to see why this draft is needed anyway. All that is needed
> is to remove the "64 bit" statement from the addressing architecture,
> which the WG has consistently failed to reach consensus about.
>

    Gyan>  This topic has come up many times over the years in heated
debate and this is another instance of that.  Agreed.  However, what makes
this instance different is that we have a major problem to be solved with
4G  &  now as 5G is rolled out, segmentation is of utmost importance.  I
think in the past we have not had a major problem to be solved and so this
change being proposed did not gain traction,  but now as 5G becomes the
"norm" as it will compete directly with broadband that customers will start
using 5G in SOHO as well as other environments.   This is a major issue
that has come up with the ramp up for 5G IPv6 only deployments.  The
problem with increasing the size of the handset allocation from /64 is
problematic as well just due to the massive mobile subscriber base as I
believe the last count of mobile handsets worldwide is 15 Billion.  The
segmentation as well for 4G & 5G use cases with IOT as well would be
beneficial.  Also as 5G swallows up the broadband subscriber base this
problem gets even worse with not having segmentation capability.

>
> >    o  1: Variable length interface identifier is enabled (ignored by
> >       hosts not supporting)
>
> How does this work if the router expects hosts to use shorter IIDs but
> hosts in fact use standard 64 bit IIDs? As far as I can see, SLAAC,
> DAD and default address selection will only work correctly if all
> nodes on a given link agree about the prefix and IID lengths. For
> all existing devices, the baked-in code assumes that both are 64.
>
>     Gyan> Valid point. Any subnet would require all hosts to support the
same vlsm mask just a we do today with IPv4.  The only way to get around
that which is common is if you have multiple IPv6 addresses on a LAN subnet
on a router and RA PIO sends all the prefixes down to the host and then the
host via Default address selection picks the address to use.  The goal is
to allow slaac to not have a fixed iid dependency as defined in RFC 4291
from an addressing standpoint have parity with static and stateful so that
you could have a greater than /64 prefix length with a mix of hosts static,
dhcp & slaac all on the same subnet.  Existing IPv6 deployments have
shackled static & dhcpv6 unfortunately due to the 64 bit iid boundary
restriction so that slaac devices can be supported.  So even though static
& dhcpv6 support vlsm, it is not commonly deployed due to the slaac fixed
64 bit iid issue and possible interop issues that could crop up if slaac
devices came up on LAN with dhcpv6 or static vlsm masking.  This has been a
day 1 operations issue that all operators have lived with unfortunately.


> If a 64 bit node wants to send to a destination with the same
> 64 bit prefix that is in fact off-link because the on-link prefix
> is actually supposed to be /68, what happens?
>

    I don't think you could have mix of vlsm masked hosts on the same
subnet as that would not work.  That is not at all what is being suggested
in this draft.  What is being suggested is variable length prefix greater
or less then .64 bit and for longer prefixes use of RFC 4941 or RFC 7217
random iid that does not have modified EUI mac dependency.   In the
variable mask scenario all hosts would have the same mask.

A point that came up a year or so ago with the classless draft below was
related as well to the race to the bottom which comes up every time but
also the variable length sizing and I think there was some contention as to
what size to support.  So with this draft as it supports any length prefix,
it would be supported with any length random iid would be generated RFC
4941 or stable RFC 7217 style whichever is desired.  Greater than or less
then /64 length prefixes and corresponding iid would be supported.


https://tools.ietf.org/html/draft-bourbaki-6man-classless-ipv6-05


>
> Regards
>    Brian
>
> --------------------------------------------------------------------
> IETF IPv6 working group mailing list
> ipv6@ietf.org
> Administrative Requests: https://www.ietf.org/mailman/listinfo/ipv6
> --------------------------------------------------------------------
>


-- 

<http://www.verizon.com/>

*Gyan Mishra*

*Network Solutions A**rchitect *



*M 301 502-134713101 Columbia Pike *Silver Spring, MD