Re: OPS-DIR review of draft-6man-stable-privacy-addresses-16

Tim Chown <tjc@ecs.soton.ac.uk> Mon, 27 January 2014 19:10 UTC

Return-Path: <tjc@ecs.soton.ac.uk>
X-Original-To: ipv6@ietfa.amsl.com
Delivered-To: ipv6@ietfa.amsl.com
Received: from localhost (ietfa.amsl.com [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 9FABC1A0239; Mon, 27 Jan 2014 11:10:55 -0800 (PST)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -1.756
X-Spam-Level:
X-Spam-Status: No, score=-1.756 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, DKIM_SIGNED=0.1, DKIM_VALID=-0.1, DKIM_VALID_AU=-0.1, RP_MATCHES_RCVD=-0.535, SPF_NEUTRAL=0.779] autolearn=ham
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id XTLRI7si_DtA; Mon, 27 Jan 2014 11:10:53 -0800 (PST)
Received: from falcon.ecs.soton.ac.uk (falcon.ecs.soton.ac.uk [IPv6:2001:630:d0:f102::25e]) by ietfa.amsl.com (Postfix) with ESMTP id 45AE91A007C; Mon, 27 Jan 2014 11:10:53 -0800 (PST)
Received: from falcon.ecs.soton.ac.uk (localhost [127.0.0.1]) by falcon.ecs.soton.ac.uk (8.13.8/8.13.8) with ESMTP id s0RJAmll031851; Mon, 27 Jan 2014 19:10:48 GMT
X-DKIM: Sendmail DKIM Filter v2.8.2 falcon.ecs.soton.ac.uk s0RJAmll031851
DKIM-Signature: v=1; a=rsa-sha1; c=simple/simple; d=ecs.soton.ac.uk; s=201304; t=1390849848; bh=PfMDkB9huRVChx69l4CgwTZ6x2A=; h=Mime-Version:Subject:From:In-Reply-To:Date:Cc:References:To; b=hjSJpf/XY+nncnyqD5Mf76OiCfWhWFmILDFl4OFeXPjBqd0wd61mzqBYz9862jen9 Pzodp4qmK9KRZEZd969qE7dXS9Q50QUylrxcS75GdkGqGwsYx9f9WAvYMt+Hs7ox6k z/DYcLH0AWxU68aCFOefALUJRdG/EvPY2MskNNR4=
Received: from gander.ecs.soton.ac.uk (gander.ecs.soton.ac.uk [2001:630:d0:f102::25d]) by falcon.ecs.soton.ac.uk (falcon.ecs.soton.ac.uk [2001:630:d0:f102::25e]) envelope-from <tjc@ecs.soton.ac.uk> with ESMTP (valid=N/A) id q0QJAm0959647084q8 ret-id none; Mon, 27 Jan 2014 19:10:48 +0000
Received: from [192.168.1.108] (host213-123-213-183.in-addr.btopenworld.com [213.123.213.183]) (authenticated bits=0) by gander.ecs.soton.ac.uk (8.13.8/8.13.8) with ESMTP id s0RJ9R8V022277 (version=TLSv1/SSLv3 cipher=AES128-SHA bits=128 verify=NO); Mon, 27 Jan 2014 19:09:28 GMT
Content-Type: text/plain; charset="windows-1252"
Mime-Version: 1.0 (Mac OS X Mail 7.1 \(1827\))
Subject: Re: OPS-DIR review of draft-6man-stable-privacy-addresses-16
From: Tim Chown <tjc@ecs.soton.ac.uk>
In-Reply-To: <C91E67751B1EFF41B857DE2FE1F68ABA3DF87C31@TK5EX14MBXC303.redmond.corp.microsoft.com>
Date: Mon, 27 Jan 2014 19:09:31 +0000
Content-Transfer-Encoding: quoted-printable
Message-ID: <EMEW3|668ce6db736e9204f32cb53fc886e07aq0QJAm03tjc|ecs.soton.ac.uk|EF8C1108-E3E6-438E-A1FA-83AFA0B7C7B2@ecs.soton.ac.uk>
References: <C7046F3A-8C15-4863-9402-A5F6DAEB67BC@ecs.soton.ac.uk> <EMEW3|8f37f1d5d449ce20468ee92a0af181faq0M16n03tjc|ecs.soton.ac.uk|C7046F3A-8C15-4863-9402-A5F6DAEB67BC@ecs.soton.ac.uk> <52E0C6A8.3050503@si6networks.com> <A770E304-C965-4829-8F31-E93D0E7A4564@ecs.soton.ac.uk> <EMEW3|12f5e9bae279fcfd68e300eb7c33b88aq0NHE703tjc|ecs.soton.ac.uk|A770E304-C965-4829-8F31-E93D0E7A4564@ecs.soton.ac.uk> <52E65DE6.3010903@si6networks.com> <6FB21B43-0001-46D7-A57E-2359D819BC4A@ecs.soton.ac.uk> <EMEW3|098bca4b1eaa1178fbc2402cb1bb79e2q0QHBi03tjc|ecs.soton.ac.uk|6FB21B43-0001-46D7-A57E-2359D819BC4A@ecs.soton.ac.uk> <C91E67751B1EFF41B857DE2FE1F68ABA3DF87C31@TK5EX14MBXC303.redmond.corp.microsoft.com> <EF8C1108-E3E6-438E-A1FA-83AFA0B7C7B2@ecs.soton.ac.uk>
To: Christian Huitema <huitema@microsoft.com>
X-Mailer: Apple Mail (2.1827)
X-ECS-MailScanner: Found to be clean, Found to be clean
X-smtpf-Report: sid=q0QJAm095964708400; tid=q0QJAm0959647084q8; client=relay,ipv6; mail=; rcpt=; nrcpt=6:0; fails=0
X-ECS-MailScanner-Information: Please contact the ISP for more information
X-ECS-MailScanner-ID: s0RJAmll031851
X-ECS-MailScanner-From: tjc@ecs.soton.ac.uk
Cc: "6man-chairs@tools.ietf.org" <6man-chairs@tools.ietf.org>, Fernando Gont <fgont@si6networks.com>, "ops-dir@ietf.org" <ops-dir@ietf.org>, "ipv6@ietf.org" <ipv6@ietf.org>, "draft-ietf-6man-stable-privacy-addresses.all@tools.ietf.org" <draft-ietf-6man-stable-privacy-addresses.all@tools.ietf.org>
X-BeenThere: ipv6@ietf.org
X-Mailman-Version: 2.1.15
Precedence: list
List-Id: "IPv6 Maintenance Working Group \(6man\)" <ipv6.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/ipv6>, <mailto:ipv6-request@ietf.org?subject=unsubscribe>
List-Archive: <http://www.ietf.org/mail-archive/web/ipv6/>
List-Post: <mailto:ipv6@ietf.org>
List-Help: <mailto:ipv6-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/ipv6>, <mailto:ipv6-request@ietf.org?subject=subscribe>
X-List-Received-Date: Mon, 27 Jan 2014 19:10:55 -0000

Hi,

On 27 Jan 2014, at 17:49, Christian Huitema <huitema@microsoft.com> wrote:

>> So I think the thing here is that the IID can't be guaranteed to be stable per prefix, because there are factors that may cause it to change.  The only way to be sure it's stable per prefix is to store the IID used per prefix, or to find some stateless generation method for which there can be no change. Storing the per-prefix IIDs essentially puts a permanent list of all addresses the device has ever used into persistent storage on the device.
> 
> In fact, the draft already has some text about remembering DAD collisions:
> 
>                                                   In order to mitigate this potential problem,
>   nodes MAY record the DAD_Counter value employed for a specific
>   {Prefix, Net_Iface, Network_ID} tuple in non-volatile memory, such
>   that the same DAD_Counter value is employed when configuring an
>   address for the same Prefix and subnet at any other point in time.
> 
> This can be a baby step towards "a permanent list of all addresses the device has ever used..." But then, we have to wonder whether we really need to guarantee that the address will remain constant for all locations that the device visits. In practice, it feels like the "stable address" property is mostly needed in the "home base" of the device, for example the corporate network if the device is registered in one. On the other hand, I don't think many will object if their device gets a different address each time they visit the same airport bar...

I agree with the likely use case. I suggested something to consider along those lines for Fernando’s related draft.

Tim