Re: [EXTERNAL] Re: 64bit MAC addresses and SLAAC

Philip Homburg <pch-ipv6-ietf-6@u-1.phicoh.com> Thu, 18 June 2020 08:20 UTC

Return-Path: <pch-b9D3CB0F5@u-1.phicoh.com>
X-Original-To: ipv6@ietfa.amsl.com
Delivered-To: ipv6@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id AE3D43A0F5E for <ipv6@ietfa.amsl.com>; Thu, 18 Jun 2020 01:20:28 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -1.622
X-Spam-Level:
X-Spam-Status: No, score=-1.622 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, KHOP_HELO_FCRDNS=0.276, SPF_HELO_NONE=0.001, SPF_NONE=0.001] autolearn=no autolearn_force=no
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id e6wZBrrUl7BZ for <ipv6@ietfa.amsl.com>; Thu, 18 Jun 2020 01:20:27 -0700 (PDT)
Received: from stereo.hq.phicoh.net (stereo6-tun.hq.phicoh.net [IPv6:2001:888:1044:10:2a0:c9ff:fe9f:17a9]) (using TLSv1.2 with cipher ECDHE-RSA-CHACHA20-POLY1305 (256/256 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id E9A1C3A0F5D for <ipv6@ietf.org>; Thu, 18 Jun 2020 01:20:26 -0700 (PDT)
Received: from stereo.hq.phicoh.net (localhost [::ffff:127.0.0.1]) by stereo.hq.phicoh.net with esmtp (TLS version=TLSv1.2 cipher=ECDHE-RSA-CHACHA20-POLY1305) (Smail #157) id m1jlpmX-0000IXC; Thu, 18 Jun 2020 10:20:21 +0200
Message-Id: <m1jlpmX-0000IXC@stereo.hq.phicoh.net>
To: ipv6@ietf.org
Cc: "Pascal Thubert (pthubert)" <pthubert=40cisco.com@dmarc.ietf.org>
Subject: Re: [EXTERNAL] Re: 64bit MAC addresses and SLAAC
From: Philip Homburg <pch-ipv6-ietf-6@u-1.phicoh.com>
Sender: pch-b9D3CB0F5@u-1.phicoh.com
References: <e8a25961-5ac9-d35e-77dd-bf86f45cd077@gmail.com> <a17ae9f3-001c-07f6-84f9-a0ca583e6a00@gmail.com> <7AE5B6D0-AB01-4077-A9EF-5BD86F428681@gmail.com> <7a3b839f-099e-8fd3-35a2-4625df3c369e@gmail.com> <76e8bd7a-4333-480f-de0f-dcc775418739@si6networks.com> <79d494caa7874696b787aadb80cc322b@boeing.com> <MN2PR11MB35654EDB29696C2C33412691D89B0@MN2PR11MB3565.namprd11.prod.outlook.com>
In-reply-to: Your message of "Thu, 18 Jun 2020 07:38:46 +0000 ." <MN2PR11MB35654EDB29696C2C33412691D89B0@MN2PR11MB3565.namprd11.prod.outlook.com>
Date: Thu, 18 Jun 2020 10:20:20 +0200
Archived-At: <https://mailarchive.ietf.org/arch/msg/ipv6/b_bRombGsBHZbgG3dMwlBJU1Ne0>
X-BeenThere: ipv6@ietf.org
X-Mailman-Version: 2.1.29
Precedence: list
List-Id: "IPv6 Maintenance Working Group \(6man\)" <ipv6.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/ipv6>, <mailto:ipv6-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/ipv6/>
List-Post: <mailto:ipv6@ietf.org>
List-Help: <mailto:ipv6-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/ipv6>, <mailto:ipv6-request@ietf.org?subject=subscribe>
X-List-Received-Date: Thu, 18 Jun 2020 08:20:29 -0000

> E.g., machines do not have complexes but may be complex to locate
> and manage. Whether we at 6MAN like it or not, some standards out
> there tie the role of a device to its IPv6 address, so you can
> replace the device with a spare, give it the same IPv6 address /
> keys and keep using it/managing it as you did. Look at ISA100.11a
> for an example. Note on the side that Internet connectivity is the
> least of the concerns of a control network. In fact the risk of
> being connected unknowingly to the Internet is a deterrent for IPv6
> adoption (vs. mission - specific and proprietary protocols).
> 
> Also +1 to Kerry. Some standards (including ours) can do a preferred
> treatment if the IPv6 address derives from the MAC. Note that this
> looks antinomic with the spare part goal above; that would indeed
> be antinomic for burn-in MAC addresses; but there are also standards
> out there that use a shorter assigned MAC address, e.g., to reduce
> the frame size and save energy and bandwidth; in that case you can
> have both properties of deriving the IPv6 address from the MAC and
> replacing a failing device by a virtually identical one.

I don't understand the behavior of first picking SLAAC over DHCPv6 and then
trying to modify SLAAC to do something it is not designed to do.

If you want to have stable addresses with the ability to replace hardware,
use DHCPv6. It is meant to provide this mapping.

If you want to group devices in address ranges that are easy to identify,
DHCPv6 can also do this.

SLAAC was meant for the unmanaged situation where devices can generate addresses
without any outside support.