Re: [EXTERNAL] 64bit MAC addresses and SLAAC

Carsten Bormann <cabo@tzi.org> Thu, 18 June 2020 21:08 UTC

Return-Path: <cabo@tzi.org>
X-Original-To: ipv6@ietfa.amsl.com
Delivered-To: ipv6@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 3B1153A0F91 for <ipv6@ietfa.amsl.com>; Thu, 18 Jun 2020 14:08:07 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -1.898
X-Spam-Level:
X-Spam-Status: No, score=-1.898 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, RCVD_IN_MSPIKE_H4=0.001, RCVD_IN_MSPIKE_WL=0.001, SPF_HELO_NONE=0.001, SPF_PASS=-0.001] autolearn=ham autolearn_force=no
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id vvJqu5eiAk2s for <ipv6@ietfa.amsl.com>; Thu, 18 Jun 2020 14:08:04 -0700 (PDT)
Received: from gabriel-vm-2.zfn.uni-bremen.de (gabriel-vm-2.zfn.uni-bremen.de [134.102.50.17]) (using TLSv1.2 with cipher AECDH-AES256-SHA (256/256 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id 34A993A0F8F for <ipv6@ietf.org>; Thu, 18 Jun 2020 14:08:03 -0700 (PDT)
Received: from [192.168.217.116] (p5089ae91.dip0.t-ipconnect.de [80.137.174.145]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by gabriel-vm-2.zfn.uni-bremen.de (Postfix) with ESMTPSA id 49nvfT1vmDzyXP; Thu, 18 Jun 2020 23:08:01 +0200 (CEST)
Content-Type: text/plain; charset="utf-8"
Mime-Version: 1.0 (Mac OS X Mail 13.4 \(3608.80.23.2.2\))
Subject: Re: [EXTERNAL] 64bit MAC addresses and SLAAC
From: Carsten Bormann <cabo@tzi.org>
In-Reply-To: <c636d6d6-7df0-7dfe-1ae3-c9d25346914c@si6networks.com>
Date: Thu, 18 Jun 2020 23:08:00 +0200
Cc: IPv6 List <ipv6@ietf.org>
X-Mao-Original-Outgoing-Id: 614207280.733902-a9a39c73c4bc2d9ad474241e86b86655
Content-Transfer-Encoding: quoted-printable
Message-Id: <46AEA7C2-5AE4-4BF2-A9BC-C164D8FE59CE@tzi.org>
References: <e8a25961-5ac9-d35e-77dd-bf86f45cd077@gmail.com> <a17ae9f3-001c-07f6-84f9-a0ca583e6a00@gmail.com> <7AE5B6D0-AB01-4077-A9EF-5BD86F428681@gmail.com> <7a3b839f-099e-8fd3-35a2-4625df3c369e@gmail.com> <76e8bd7a-4333-480f-de0f-dcc775418739@si6networks.com> <79d494caa7874696b787aadb80cc322b@boeing.com> <MN2PR11MB35654EDB29696C2C33412691D89B0@MN2PR11MB3565.namprd11.prod.outlook.com> <7e430050-fa9a-d43c-5eaa-a8f7d53d222c@si6networks.com> <MN2PR11MB3565F51E022582BB4B979D2ED89B0@MN2PR11MB3565.namprd11.prod.outlook.com> <c636d6d6-7df0-7dfe-1ae3-c9d25346914c@si6networks.com>
To: Fernando Gont <fgont@si6networks.com>
X-Mailer: Apple Mail (2.3608.80.23.2.2)
Archived-At: <https://mailarchive.ietf.org/arch/msg/ipv6/c2afP3hPo6cHn3DSLm-ZNUD8RJM>
X-BeenThere: ipv6@ietf.org
X-Mailman-Version: 2.1.29
Precedence: list
List-Id: "IPv6 Maintenance Working Group \(6man\)" <ipv6.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/ipv6>, <mailto:ipv6-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/ipv6/>
List-Post: <mailto:ipv6@ietf.org>
List-Help: <mailto:ipv6-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/ipv6>, <mailto:ipv6-request@ietf.org?subject=subscribe>
X-List-Received-Date: Thu, 18 Jun 2020 21:08:07 -0000

> If such reliance is because the overhead is simply unacceptable, then yes, I believe it is a valid question whether IPv6 is the right protocol for whatever device/technology needs such compression to keep the overhead track-table.

Valid question indeed.  The answer may very well be yes.

> YI also agree that there may be valid reasons for which, even if IPv6 was not the best fit for your application, but you might still want to use it, and hence resort to the hacks such as "header compression".

Header compression is not a “hack”.  Jeez.

Seriously, I don’t know where to start.

Even if there still is no Wikipedia page for header compression yet (I’ve been using that as in intro to talks about the subject for quite a while), that is not an excuse for not getting educated about the 30 years of history that header compression has in IP, starting with Van Jacobson’s RFC 1144.

> The fact that such hack somewhat introduces a requirement that is not present anywhere in the ipv6 address architecture (the IID can be anything, since you could e.g. manually configure your addresses, they could be dhcpv6-leased, etc.), should be a hint in that direction.

It is not a requirement; we designed things carefully so it isn’t.
But using the redundancy does supply some additional efficiency, so some deployments may want to use that efficiency to stay within a (technical) budget.
(The privacy-relevant ones don’t have that luxury, of course.)

> Much of what I've seem to remember seeing in the 6lo et al area seem to be tricks to somewhat make IPv6 tractable for the "constrained" scenarios.

Yes, that is the point.
It may not be your area of work, but that doesn’t make it invalid or “tricks” or “a hack”.
(Insert a couple of expletives here, because you have been around for a while and could know all this.)

> Anyway, believe the IID generation should be the least of your concerns here: at the end of the day there's a recommendation (RFC8064) for the general case... but you're free to override it. I seem to remember there was a proposal by Dave Thaler in this area, meant for constrained nodes, too.

Yes.  RFC 8065, and the number is *not* a coincidence.

Grüße, Carsten