Re: IPv6 Routing & ND vs. Addressing, (Was: Re: <draft-ietf-6man-rfc4291bis-09.txt>)

"Joel M. Halpern" <jmh@joelhalpern.com> Wed, 12 July 2017 13:59 UTC

Return-Path: <jmh@joelhalpern.com>
X-Original-To: ipv6@ietfa.amsl.com
Delivered-To: ipv6@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 75B6312ECB7 for <ipv6@ietfa.amsl.com>; Wed, 12 Jul 2017 06:59:39 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -2.702
X-Spam-Level:
X-Spam-Status: No, score=-2.702 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, DKIM_SIGNED=0.1, DKIM_VALID=-0.1, DKIM_VALID_AU=-0.1, RCVD_IN_DNSWL_LOW=-0.7, SPF_HELO_PASS=-0.001, SPF_PASS=-0.001] autolearn=ham autolearn_force=no
Authentication-Results: ietfa.amsl.com (amavisd-new); dkim=pass (1024-bit key) header.d=joelhalpern.com
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id xYmuDk5Hg5jd for <ipv6@ietfa.amsl.com>; Wed, 12 Jul 2017 06:59:38 -0700 (PDT)
Received: from mailb2.tigertech.net (mailb2.tigertech.net [208.80.4.154]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id 244DD128961 for <ipv6@ietf.org>; Wed, 12 Jul 2017 06:59:38 -0700 (PDT)
Received: from localhost (localhost [127.0.0.1]) by mailb2.tigertech.net (Postfix) with ESMTP id 0CE997222C3; Wed, 12 Jul 2017 06:59:38 -0700 (PDT)
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=joelhalpern.com; s=1.tigertech; t=1499867978; bh=Oyqxd2AmDp6jXVlZm+v9syBuuiUMnIezkcuIdSduy8A=; h=Subject:To:References:From:Date:In-Reply-To:From; b=U5SzDAueeZtUH9yYKzc/qZ0f0W9x+RyslN9P7c96RJXBYKTnWJDIPocCWijSLBas9 sZyPMnGMoIgb6RPbhujiyRZIxLZOXOjGIG7hv5BgN9ftOKEIKBHqswABjKOB1S+Vdm qUPyuJbwI8jJ6ew33QENXoJrn9ekja5HDi1FF+HE=
X-Virus-Scanned: Debian amavisd-new at b2.tigertech.net
Received: from Joels-MacBook-Pro.local (unknown [50.225.209.67]) (using TLSv1.2 with cipher ECDHE-RSA-AES128-GCM-SHA256 (128/128 bits)) (No client certificate requested) by mailb2.tigertech.net (Postfix) with ESMTPSA id A30471C02FB; Wed, 12 Jul 2017 06:59:35 -0700 (PDT)
Subject: Re: IPv6 Routing & ND vs. Addressing, (Was: Re: <draft-ietf-6man-rfc4291bis-09.txt>)
To: Simon Hobson <linux@thehobsons.co.uk>, 6man WG <ipv6@ietf.org>
References: <CAN-Dau2zgthR2w9e5ZVUdGc-vm+YvK2uTUJ8O=vrcv0jNc58RA@mail.gmail.com> <CAKD1Yr2+Si_tzNF8p6ASf4=StgFSX9Gm3TEj9iiqdE2gHQaNmQ@mail.gmail.com> <CAN-Dau03r_CKW53kegaLa=F_R_RG4cWaCT1j6idrqPm9UuN03A@mail.gmail.com> <5963BF27.1050300@foobar.org> <ff09ffcd-df65-4033-8018-fbe7ae98cff8@gmail.com> <6bf7f3d0e9c047b1b86d4bcc220f8705@XCH15-06-11.nw.nos.boeing.com> <CAN-Dau1bxm5y0v_6kUBc_ym39bSSxepjdwrzcS7YHWD=CV9-bw@mail.gmail.com> <3b34d6e9718a45ae80877e36fb55f2b4@XCH15-06-11.nw.nos.boeing.com> <CAO42Z2x+282VK7nMFHjcCz9tBmJ_=d4OhkiRZFZDLcZhakGB1Q@mail.gmail.com> <8392C5AA-0E37-4A09-AFEB-13A61D11E783@thehobsons.co.uk>
From: "Joel M. Halpern" <jmh@joelhalpern.com>
Message-ID: <dcfd0c54-9d4b-559c-205f-2bc563935eab@joelhalpern.com>
Date: Wed, 12 Jul 2017 09:59:34 -0400
User-Agent: Mozilla/5.0 (Macintosh; Intel Mac OS X 10.12; rv:52.0) Gecko/20100101 Thunderbird/52.2.1
MIME-Version: 1.0
In-Reply-To: <8392C5AA-0E37-4A09-AFEB-13A61D11E783@thehobsons.co.uk>
Content-Type: text/plain; charset="utf-8"; format="flowed"
Content-Language: en-US
Content-Transfer-Encoding: 7bit
Archived-At: <https://mailarchive.ietf.org/arch/msg/ipv6/cYyjVd0eRlLH9TpYGSod5798ipY>
X-BeenThere: ipv6@ietf.org
X-Mailman-Version: 2.1.22
Precedence: list
List-Id: "IPv6 Maintenance Working Group \(6man\)" <ipv6.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/ipv6>, <mailto:ipv6-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/ipv6/>
List-Post: <mailto:ipv6@ietf.org>
List-Help: <mailto:ipv6-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/ipv6>, <mailto:ipv6-request@ietf.org?subject=subscribe>
X-List-Received-Date: Wed, 12 Jul 2017 13:59:39 -0000

If we keep the self-genereated IID length at 64 bits, then folks can 
work otu different methods for making use of it, and see what the value is.
if we say taht the length is defined by something the network, then we 
need to work out what we have to tell people to make that safe to do. 
We also restrict people's ability to innovate in the host stack (which 
is where, as I understand it, we want to see innovation.)

If we were short of bits, sure, freeing up bits might make sense.  But 
why do so in the absence of such a shortage?

Yours,
Joel

On 7/12/17 9:47 AM, Simon Hobson wrote:
> Mark Smith <markzzzsmith@gmail.com> wrote:
> 
>> This is not recognising that there are more than operational or functional properties of addresses. They have privacy and security properties too.
> 
> Shouldn't this requirement be separate from the underlying protocol requirements ?
> 
> Ignoring LL addresses, it seems that only self assigned addresses using deprecated methods (ie based on hardware address) actually *require* a 64 bit split. So on that basis, the standard defining how the protocols work should require implementations to support an arbitrary split.
> 
> Separate to that (in a separate section), make recommendations (as in "should") to support security and privacy.
> 
> 
> --------------------------------------------------------------------
> IETF IPv6 working group mailing list
> ipv6@ietf.org
> Administrative Requests: https://www.ietf.org/mailman/listinfo/ipv6
> --------------------------------------------------------------------
>