Re: I-D Action: draft-ietf-6man-rfc6434-bis-01.txt

Nick Hilliard <nick@foobar.org> Sun, 16 July 2017 11:20 UTC

Return-Path: <nick@foobar.org>
X-Original-To: ipv6@ietfa.amsl.com
Delivered-To: ipv6@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 0C0B912F268 for <ipv6@ietfa.amsl.com>; Sun, 16 Jul 2017 04:20:09 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -4.201
X-Spam-Level:
X-Spam-Status: No, score=-4.201 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, RCVD_IN_DNSWL_MED=-2.3, SPF_PASS=-0.001] autolearn=ham autolearn_force=no
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id jHMwSRKHaG8m for <ipv6@ietfa.amsl.com>; Sun, 16 Jul 2017 04:20:07 -0700 (PDT)
Received: from mail.netability.ie (mail.netability.ie [IPv6:2a03:8900:0:100::5]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-SHA (256/256 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id 1F7A012EC4B for <ipv6@ietf.org>; Sun, 16 Jul 2017 04:20:06 -0700 (PDT)
X-Envelope-To: ipv6@ietf.org
Received: from crumpet.local (089-101-070074.ntlworld.ie [89.101.70.74] (may be forged)) (authenticated bits=0) by mail.netability.ie (8.15.2/8.15.2) with ESMTPSA id v6GBK23B049653 (version=TLSv1.2 cipher=ECDHE-RSA-AES256-SHA bits=256 verify=NO); Sun, 16 Jul 2017 12:20:02 +0100 (IST) (envelope-from nick@foobar.org)
X-Authentication-Warning: cheesecake.ibn.ie: Host 089-101-070074.ntlworld.ie [89.101.70.74] (may be forged) claimed to be crumpet.local
Message-ID: <596B4BE1.7020807@foobar.org>
Date: Sun, 16 Jul 2017 12:20:01 +0100
From: Nick Hilliard <nick@foobar.org>
User-Agent: Postbox 5.0.15 (Macintosh/20170609)
MIME-Version: 1.0
To: Lorenzo Colitti <lorenzo@google.com>
CC: IETF IPv6 Mailing List <ipv6@ietf.org>, draft-ietf-6man-rfc6434-bis@tools.ietf.org
Subject: Re: I-D Action: draft-ietf-6man-rfc6434-bis-01.txt
References: <149909644776.22718.16227939850699261560@ietfa.amsl.com> <CAKD1Yr25jk22qTTqJ-RoxOVTu7=e=vQWWLQZnek-HGCKaZgU=w@mail.gmail.com>
In-Reply-To: <CAKD1Yr25jk22qTTqJ-RoxOVTu7=e=vQWWLQZnek-HGCKaZgU=w@mail.gmail.com>
X-Enigmail-Version: 1.2.3
Content-Type: text/plain; charset="UTF-8"
Content-Transfer-Encoding: 7bit
Archived-At: <https://mailarchive.ietf.org/arch/msg/ipv6/dcCvututKD_CHl4f1OKTNVOKMmE>
X-BeenThere: ipv6@ietf.org
X-Mailman-Version: 2.1.22
Precedence: list
List-Id: "IPv6 Maintenance Working Group \(6man\)" <ipv6.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/ipv6>, <mailto:ipv6-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/ipv6/>
List-Post: <mailto:ipv6@ietf.org>
List-Help: <mailto:ipv6-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/ipv6>, <mailto:ipv6-request@ietf.org?subject=subscribe>
X-List-Received-Date: Sun, 16 Jul 2017 11:20:09 -0000

Lorenzo Colitti wrote:
> I see that the document still says:
> 
> There will be a wide range of IPv6 deployment models and differences
> in address assignment requirements, some of which may require DHCPv6
> for stateful address assignment.  Consequently, all hosts SHOULD
> implement address configuration via DHCPv6.
> 
> We should abandon this documentation, for two reasons.
> 
> First, networks that require DHCPv6 assignment are explicitly NOT 
> RECOMMENDED by current IETF best practices. Specifically, RFC 7934 
> section 8 says "it is RECOMMENDED that the network give the host the 
> ability to use new addresses without requiring explicit requests". A 
> DHCPv6-only network cannot meet this recommendation, because on a 
> DHCPv6-only network, all addresses acquisition requires an explicit 
> request to the network.
> 
> Second, the draft says "Where devices are likely to be carried by
> users and attached to multiple visisted networks, DHCPv6 client
> anonymity profiles SHOULD be supported as described in [RFC7844]".

neither of these suggestions form anything even close to an adequate
basis to drop the recommendation for dhcpv6.

The self-selection addressing model does not suit the deployment
requirements for many types of ipv6 networks, including enterprise,
provider hosting, terrestrial access networks (e.g. docsis / gpon /
ipoe) and others.  If the recommendation for dhcpv6 is dropped, then
there is no recommended ietf model for operator-assigned addressing, and
this would leave a glaring hole in the ipv6 host specification.

Just because SLAAC works for many types of ipv6 deployments, that
doesn't make it a suitable model for every situation.

Nick