Re: Detailed review of Significance of IPv6 Interface Identifiers

Brian E Carpenter <brian.e.carpenter@gmail.com> Thu, 15 August 2013 03:32 UTC

Return-Path: <brian.e.carpenter@gmail.com>
X-Original-To: ipv6@ietfa.amsl.com
Delivered-To: ipv6@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 8E9A911E81C8 for <ipv6@ietfa.amsl.com>; Wed, 14 Aug 2013 20:32:02 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -102.499
X-Spam-Level:
X-Spam-Status: No, score=-102.499 tagged_above=-999 required=5 tests=[AWL=0.100, BAYES_00=-2.599, USER_IN_WHITELIST=-100]
Received: from mail.ietf.org ([12.22.58.30]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id UVV438ssiVCm for <ipv6@ietfa.amsl.com>; Wed, 14 Aug 2013 20:32:02 -0700 (PDT)
Received: from mail-pa0-x232.google.com (mail-pa0-x232.google.com [IPv6:2607:f8b0:400e:c03::232]) by ietfa.amsl.com (Postfix) with ESMTP id 2224911E81C4 for <6man@ietf.org>; Wed, 14 Aug 2013 20:32:02 -0700 (PDT)
Received: by mail-pa0-f50.google.com with SMTP id fb10so344100pad.23 for <6man@ietf.org>; Wed, 14 Aug 2013 20:32:01 -0700 (PDT)
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=gmail.com; s=20120113; h=message-id:date:from:organization:user-agent:mime-version:to:cc :subject:references:in-reply-to:content-type :content-transfer-encoding; bh=rXfi8KaUu/9iFHZ6y9I19olgK9VfEs6FBcNU8mWBrJY=; b=mGTHMkww6TIfwkQN1gA0f630jzCMwWFe3fqvS2LMqUn9ow7oX/rYHC0iAAxWBptXRm X5bxg704HCUcyc2VorBysFe+W+9dX5TXlREYt+nHx9ihIz5623uu/970T2HZToOPUO0N okuccmmZzUWN/h7sCT0aYeegC1K5hKHdBkzZaOgUJYZNwWy+xgE6FNbgMnGYGMfvj/6Q jhJKsoYBBokSrs3x6MwiXvDgLkfI0drvqIUmm4laAIp84tiI7Nrc3ViH8lYl0uzDyHzW 5aeO7HzjFHMLbAqym0+oVs0SZ/v+vgURYqYIw1pH8ddCJVyNZbssWKvxniDyHJMrkZYL KRSw==
X-Received: by 10.66.189.98 with SMTP id gh2mr13466352pac.60.1376537521862; Wed, 14 Aug 2013 20:32:01 -0700 (PDT)
Received: from [10.1.9.168] ([203.167.141.74]) by mx.google.com with ESMTPSA id hk3sm12472924pbb.3.2013.08.14.20.31.58 for <multiple recipients> (version=TLSv1 cipher=ECDHE-RSA-RC4-SHA bits=128/128); Wed, 14 Aug 2013 20:32:01 -0700 (PDT)
Message-ID: <520C4BB2.4050500@gmail.com>
Date: Thu, 15 Aug 2013 15:32:02 +1200
From: Brian E Carpenter <brian.e.carpenter@gmail.com>
Organization: University of Auckland
User-Agent: Thunderbird 2.0.0.6 (Windows/20070728)
MIME-Version: 1.0
To: "Fred Baker (fred)" <fred@cisco.com>
Subject: Re: Detailed review of Significance of IPv6 Interface Identifiers
References: <520B3529.80802@si6networks.com> <520BF653.8060603@gmail.com> <8C48B86A895913448548E6D15DA7553B9979F5@xmb-rcd-x09.cisco.com>
In-Reply-To: <8C48B86A895913448548E6D15DA7553B9979F5@xmb-rcd-x09.cisco.com>
Content-Type: text/plain; charset="UTF-8"
Content-Transfer-Encoding: 7bit
Cc: Fernando Gont <fgont@si6networks.com>, "6man@ietf.org" <6man@ietf.org>, "<draft-ietf-6man-ug@tools.ietf.org>" <draft-ietf-6man-ug@tools.ietf.org>
X-BeenThere: ipv6@ietf.org
X-Mailman-Version: 2.1.12
Precedence: list
List-Id: "IPv6 Maintenance Working Group \(6man\)" <ipv6.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/ipv6>, <mailto:ipv6-request@ietf.org?subject=unsubscribe>
List-Archive: <http://www.ietf.org/mail-archive/web/ipv6>
List-Post: <mailto:ipv6@ietf.org>
List-Help: <mailto:ipv6-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/ipv6>, <mailto:ipv6-request@ietf.org?subject=subscribe>
X-List-Received-Date: Thu, 15 Aug 2013 03:32:02 -0000

On 15/08/2013 10:56, Fred Baker (fred) wrote:
> On Aug 14, 2013, at 2:27 PM, Brian E Carpenter <brian.e.carpenter@gmail.com> wrote:
> 
>>> * Section 3:
>>>> To the extent that each method of IID creation specifies the values 
>>>> of the "u" and "g" bits, and that each new method is carefully 
>>>> designed in the light of its predecessors, these bits tend to reduce 
>>>> the chances of duplicate IIDs.
>>> Not sure what you mean. Do you mean that *if* each IID-generation method
>>> were to use a different combination of "ug", colisions between them
>>> would be avoided? If so, I'd argue that since there's no coordination of
>>> which combinations should be used for which method, that's unfeasible.
>>> For instance, traditional SLAAC uses all combinations (modulo
>>> "illegal/unused" combinations of ug).
>> The argument is fuzzy and the sentence needs to be rewritten.
>>
>> (I would actually suggest that in a pseudo-random method, now that we
>> are clear that the bits have no meaning, it would be best to use them to
>> provide two more bits of entropy rather than giving them fixed values.)
> 
> Good grief. If the bits don't mean anything - and they never did, since nobody ever interpreted them except in IETF dancing-on-heads-of-pins discussions - could we simply say that they are as random in value as any of the other bits in the IID are?

Yes, I believe future IID formats could do that. We can try to make that
clear in the next version.

   Brian