Re: about violation of standards

"Pascal Thubert (pthubert)" <pthubert@cisco.com> Fri, 19 April 2019 07:00 UTC

Return-Path: <pthubert@cisco.com>
X-Original-To: ipv6@ietfa.amsl.com
Delivered-To: ipv6@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 1A1281202B1 for <ipv6@ietfa.amsl.com>; Fri, 19 Apr 2019 00:00:20 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -14.499
X-Spam-Level:
X-Spam-Status: No, score=-14.499 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, DKIM_SIGNED=0.1, DKIM_VALID=-0.1, DKIM_VALID_AU=-0.1, HTML_MESSAGE=0.001, RCVD_IN_DNSWL_HI=-5, SPF_PASS=-0.001, URIBL_BLOCKED=0.001, USER_IN_DEF_DKIM_WL=-7.5] autolearn=ham autolearn_force=no
Authentication-Results: ietfa.amsl.com (amavisd-new); dkim=pass (1024-bit key) header.d=cisco.com header.b=TFMiWmJ4; dkim=pass (1024-bit key) header.d=cisco.onmicrosoft.com header.b=lGSuJW1X
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id pVVFBeHgnLDT for <ipv6@ietfa.amsl.com>; Fri, 19 Apr 2019 00:00:18 -0700 (PDT)
Received: from rcdn-iport-8.cisco.com (rcdn-iport-8.cisco.com [173.37.86.79]) (using TLSv1.2 with cipher DHE-RSA-SEED-SHA (128/128 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id CA25D120111 for <ipv6@ietf.org>; Fri, 19 Apr 2019 00:00:17 -0700 (PDT)
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/simple; d=cisco.com; i=@cisco.com; l=9927; q=dns/txt; s=iport; t=1555657217; x=1556866817; h=from:to:cc:subject:date:message-id:references: in-reply-to:mime-version; bh=74vR+NTdZtgFbRsLz+9kXLS4wJECJ5Cn37TaKY2oIaM=; b=TFMiWmJ4pv/u1PSNyJHYvGt3RD38Xw0Nm2JdybMa++rkW9uKzGTJEw9g RssnP+FnW83ti3Krr7+14rvWXDr958aDbBDV6sbq0xjM35vA8Wr+Po+9A Hf0xwWQB/r/K6fQZSd+wiDjD0MEdsl+tGOjN4eWsJ+ld8WZaipp8azFYp E=;
IronPort-PHdr: 9a23:YE9ACRQY626YBx22TOVP9XPMQtpsv++ubAcI9poqja5Pea2//pPkeVbS/uhpkESXBNfA8/wRje3QvuigQmEG7Zub+FE6OJ1XH15g640NmhA4RsuMCEn1NvnvOjQmHNlIWUV513q6KkNSXs35Yg6arw==
X-IronPort-Anti-Spam-Filtered: true
X-IronPort-Anti-Spam-Result: A0AXAABacblc/4oNJK1lGwEBAQEDAQEBBwMBAQGBUQYBAQELAYE9KScDaFUgBAsoCoQEg0cDhFKKRYJXgzmPF4RMgS6Bew4BARgBDAiEQAIXhgIjNAkOAQMBAQQBAQIBAm0cDIVLAgEDAQEhHQEBLAsBDwIBBgI/AwICAiULFBECBA4FgyIBgR1MAxwBAgELi3KQXgKKFHGBL4J5AQEFhQMYgg0DBoEyAYRghmkXgUA/gTgfgkw+gmEBAYF4FoJdMYIminiCNoQ+lGQJAoIGhg6MGhQHgguSf40ahRmNfAIEAgQFAg4BAQWBTziBVnAVOyoBgkGCDgwXgQEBAoJIhRSFP3KBKY4oAYEgAQE
X-IronPort-AV: E=Sophos;i="5.60,368,1549929600"; d="scan'208,217";a="547327381"
Received: from alln-core-5.cisco.com ([173.36.13.138]) by rcdn-iport-8.cisco.com with ESMTP/TLS/DHE-RSA-SEED-SHA; 19 Apr 2019 07:00:07 +0000
Received: from XCH-ALN-001.cisco.com (xch-aln-001.cisco.com [173.36.7.11]) by alln-core-5.cisco.com (8.15.2/8.15.2) with ESMTPS id x3J705xx026148 (version=TLSv1.2 cipher=AES256-SHA bits=256 verify=FAIL); Fri, 19 Apr 2019 07:00:06 GMT
Received: from xhs-aln-003.cisco.com (173.37.135.120) by XCH-ALN-001.cisco.com (173.36.7.11) with Microsoft SMTP Server (TLS) id 15.0.1473.3; Fri, 19 Apr 2019 02:00:04 -0500
Received: from xhs-rtp-001.cisco.com (64.101.210.228) by xhs-aln-003.cisco.com (173.37.135.120) with Microsoft SMTP Server (TLS) id 15.0.1473.3; Fri, 19 Apr 2019 02:00:04 -0500
Received: from NAM02-CY1-obe.outbound.protection.outlook.com (64.101.32.56) by xhs-rtp-001.cisco.com (64.101.210.228) with Microsoft SMTP Server (TLS) id 15.0.1473.3 via Frontend Transport; Fri, 19 Apr 2019 03:00:04 -0400
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=cisco.onmicrosoft.com; s=selector1-cisco-com; h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-SenderADCheck; bh=74vR+NTdZtgFbRsLz+9kXLS4wJECJ5Cn37TaKY2oIaM=; b=lGSuJW1XiL6XlaqihHeKa8jM9BA2Lmp0cvLJfbGfR5uGNoHbuANaq9ZnkqquuFzbIKnHDTQB92YvCvVM7h7LKoUP5DqUSXuQ+Ch06h3i457qYXc0FG42e0d3/lqHKbM77FVF5gPnvsfgjVfYKEkz0vx2VnT41gt8Owt+/b+wAMk=
Received: from MN2PR11MB3565.namprd11.prod.outlook.com (20.178.250.159) by MN2PR11MB4014.namprd11.prod.outlook.com (10.255.181.155) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id 15.20.1813.12; Fri, 19 Apr 2019 07:00:02 +0000
Received: from MN2PR11MB3565.namprd11.prod.outlook.com ([fe80::8cde:9e01:ad20:d10e]) by MN2PR11MB3565.namprd11.prod.outlook.com ([fe80::8cde:9e01:ad20:d10e%6]) with mapi id 15.20.1792.018; Fri, 19 Apr 2019 07:00:02 +0000
From: "Pascal Thubert (pthubert)" <pthubert@cisco.com>
To: 神明達哉 <jinmei@wide.ad.jp>
CC: Fernando Gont <fgont@si6networks.com>, Alexandre Petrescu <alexandre.petrescu@gmail.com>, IPv6 <ipv6@ietf.org>
Subject: Re: about violation of standards
Thread-Topic: about violation of standards
Thread-Index: AQHU9hjz0VelQW2CM0S4qjQG7Nm8iaZCZ5mAgAAz6wCAAAwogIAAZyao
Date: Fri, 19 Apr 2019 07:00:01 +0000
Message-ID: <EEF00EA7-2AAF-403F-99AD-1D53ED18E8B3@cisco.com>
References: <bb7f7606-2adf-e669-8bcd-e41f17800782@gmail.com> <CAJE_bqd9frqX5-yeVPj8MYXpZ4737HqK1gmfD9cQV3A-Ea5HrQ@mail.gmail.com> <6bd5db47-408a-727e-5c13-f34a3465f986@si6networks.com>, <CAJE_bqfTLqRbLp4fLu2ASZuZ+4G5c2G+RXkO92kXfLgPTqBnng@mail.gmail.com>
In-Reply-To: <CAJE_bqfTLqRbLp4fLu2ASZuZ+4G5c2G+RXkO92kXfLgPTqBnng@mail.gmail.com>
Accept-Language: fr-FR, en-US
Content-Language: fr-FR
X-MS-Has-Attach:
X-MS-TNEF-Correlator:
authentication-results: spf=none (sender IP is ) smtp.mailfrom=pthubert@cisco.com;
x-originating-ip: [91.69.164.91]
x-ms-publictraffictype: Email
x-ms-office365-filtering-correlation-id: 85ff3350-11a7-4c65-3051-08d6c494a557
x-microsoft-antispam: BCL:0; PCL:0; RULEID:(2390118)(7020095)(4652040)(8989299)(5600141)(711020)(4605104)(4534185)(4627221)(201703031133081)(201702281549075)(8990200)(2017052603328)(7193020); SRVR:MN2PR11MB4014;
x-ms-traffictypediagnostic: MN2PR11MB4014:
x-ms-exchange-purlcount: 2
x-microsoft-antispam-prvs: <MN2PR11MB40147E9A74BC4C1B7C8355DAD8270@MN2PR11MB4014.namprd11.prod.outlook.com>
x-forefront-prvs: 0012E6D357
x-forefront-antispam-report: SFV:NSPM; SFS:(10009020)(979002)(396003)(376002)(366004)(346002)(136003)(39860400002)(189003)(199004)(7736002)(93886005)(82746002)(25786009)(54906003)(606006)(3846002)(66066001)(6116002)(14444005)(66574012)(68736007)(86362001)(256004)(66946007)(91956017)(966005)(3480700005)(83716004)(4326008)(14454004)(76176011)(71200400001)(2906002)(36756003)(6246003)(99286004)(71190400001)(102836004)(11346002)(26005)(6486002)(6306002)(6512007)(33656002)(486006)(53936002)(8936002)(73956011)(186003)(478600001)(446003)(5660300002)(316002)(229853002)(6916009)(81166006)(81156014)(97736004)(236005)(54896002)(476003)(6436002)(66446008)(8676002)(6506007)(2616005)(66476007)(64756008)(66556008)(76116006)(244885003)(969003)(989001)(999001)(1009001)(1019001); DIR:OUT; SFP:1101; SCL:1; SRVR:MN2PR11MB4014; H:MN2PR11MB3565.namprd11.prod.outlook.com; FPR:; SPF:None; LANG:en; PTR:InfoNoRecords; MX:1; A:1;
received-spf: None (protection.outlook.com: cisco.com does not designate permitted sender hosts)
x-ms-exchange-senderadcheck: 1
x-microsoft-antispam-message-info: i/NybBUYKYYGG5WTdQCeHR0QTvtChZMociPXrKENBVO3gFYxD0gkqVU/DnjWtpJo2rdI2dGc4MguGgXlFq3AVMfgAt1dQv5UNygusNBYf9Ss/F45CVT8C+Wr/yZ+12R0F+zLUMmeALiQO9cwqKRlKdK1FBgkmnsCmOTJgYf9NKpDbAYO/LCUPhQpIvCMQ6Hmd5QOGetuC1CoQuVrRSa9rHS3XnX7qXqme1vAHOmOe9rHGMUX8b0autLR7FV1l2qpKrhK79l5O8BsVlMAR3ah+MABWhm+MAFslf4X6biII/alGe2+OYb2rt9YrezeEYg/Zfc4LDU9wjWIKeSXKyMAbvwebTrWT8W3KIW8+FQdWajHNpX4p/vHyxy43g2ZjM0WMjfEf69nOZZsTrsvtx45pTC1NR9ODIhsO0EExUdjE90=
Content-Type: multipart/alternative; boundary="_000_EEF00EA72AAF403F99AD1D53ED18E8B3ciscocom_"
MIME-Version: 1.0
X-MS-Exchange-CrossTenant-Network-Message-Id: 85ff3350-11a7-4c65-3051-08d6c494a557
X-MS-Exchange-CrossTenant-originalarrivaltime: 19 Apr 2019 07:00:01.5223 (UTC)
X-MS-Exchange-CrossTenant-fromentityheader: Hosted
X-MS-Exchange-CrossTenant-id: 5ae1af62-9505-4097-a69a-c1553ef7840e
X-MS-Exchange-CrossTenant-mailboxtype: HOSTED
X-MS-Exchange-Transport-CrossTenantHeadersStamped: MN2PR11MB4014
X-OriginatorOrg: cisco.com
X-Outbound-SMTP-Client: 173.36.7.11, xch-aln-001.cisco.com
X-Outbound-Node: alln-core-5.cisco.com
Archived-At: <https://mailarchive.ietf.org/arch/msg/ipv6/_bcivEMsTb4z77mpXP__H6NkqMg>
X-BeenThere: ipv6@ietf.org
X-Mailman-Version: 2.1.29
Precedence: list
List-Id: "IPv6 Maintenance Working Group \(6man\)" <ipv6.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/ipv6>, <mailto:ipv6-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/ipv6/>
List-Post: <mailto:ipv6@ietf.org>
List-Help: <mailto:ipv6-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/ipv6>, <mailto:ipv6-request@ietf.org?subject=subscribe>
X-List-Received-Date: Fri, 19 Apr 2019 07:00:20 -0000

Hello Jinmei San

Agreed

While I completely object with Alexandre’s argument I tend to agree with the end goal.

Some functions in the router are complex to implement because same value for a link local address appears on multiple interfaces.

It would be useful to be able to encode an abstract interface ID somewhere in the /64. Legacy 00 would mean unspecified...

All the best,

Pascal

Le 19 avr. 2019 à 02:51, 神明達哉 <jinmei@wide.ad.jp<mailto:jinmei@wide.ad.jp>> a écrit :

At Fri, 19 Apr 2019 02:07:20 +0200,
Fernando Gont <fgont@si6networks.com<mailto:fgont@si6networks.com>> wrote:

> [....]
> > Now, I'm open to the discussion of possibly updating RFC4291 to allow
> > non-0 value in the intermediate 54-bit field, starting from the fact
> > that it currently violates the standard.  But I don't buy an argument
> > that a behavior against the current standard is not a violation simply
> > because there's a system utility of a widely used OS that allows that
> > particular behavior.
>
> In this particular case, it would be mostly useless: such addresses not
> only violate existing standards, but also don't work with
> widely-deployed implementations. That is, you cannot safely employ them.
> As result, there's no point in trying.

I'm basically on the same page with you, but I guess some background
context helps here.  In my understanding this is a followup on a
recent int-dir review discussion on
draft-ietf-ipwave-ipv6-over-80211ocb.  In that context, (my
understanding of) the author's argument about the incompatibility with
the "widely-deployed implementations", or more specifically, BSD
variants, is that "that doesn't matter, since they only need to
legitimize this violation for a specific Linux implementation of
IPv6-over-OCB, and they don't care about BSDs since BSDs don't support
OCB" (btw I don't know if there's any BSDs that support OCB or not).
I don't buy that argument either; my response to it is this:
https://mailarchive.ietf.org/arch/msg/int-dir/_tk437U1eq6kHDE3O6c-VrUaeXw

That said, I personally wouldn't close the door immediately.  There
might be even stronger argument for the update even if that would break
some existing implementations that are currently standard-compliant.
IMO that bar should be very high, but I wouldn't say it can never be
cleared.  Sometimes even a disruptive update can be justified (like an
extreme case of some security matters).  Now that the author seems to
choose the option to try that bar, I'm now waiting for a stronger
argument than "we don't care about those existing incompatible
implementations".

--
JINMEI, Tatuya
--------------------------------------------------------------------
IETF IPv6 working group mailing list
ipv6@ietf.org<mailto:ipv6@ietf.org>
Administrative Requests: https://www.ietf.org/mailman/listinfo/ipv6
--------------------------------------------------------------------