Re: SLAAC vs DHCPv6 (II)

Fernando Gont <fgont@si6networks.com> Tue, 28 January 2020 15:55 UTC

Return-Path: <fgont@si6networks.com>
X-Original-To: ipv6@ietfa.amsl.com
Delivered-To: ipv6@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id CAE231209DE for <ipv6@ietfa.amsl.com>; Tue, 28 Jan 2020 07:55:52 -0800 (PST)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -1.9
X-Spam-Level:
X-Spam-Status: No, score=-1.9 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, RCVD_IN_DNSWL_NONE=-0.0001, SPF_HELO_NONE=0.001, SPF_PASS=-0.001] autolearn=unavailable autolearn_force=no
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id exIESvl7HM0X for <ipv6@ietfa.amsl.com>; Tue, 28 Jan 2020 07:55:50 -0800 (PST)
Received: from fgont.go6lab.si (fgont.go6lab.si [91.239.96.14]) (using TLSv1.2 with cipher AECDH-AES256-SHA (256/256 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id C2BC81209B3 for <ipv6@ietf.org>; Tue, 28 Jan 2020 07:55:49 -0800 (PST)
Received: from [192.168.100.103] (unknown [186.183.48.23]) (using TLSv1.2 with cipher ECDHE-RSA-AES128-GCM-SHA256 (128/128 bits)) (No client certificate requested) by fgont.go6lab.si (Postfix) with ESMTPSA id ED16A86BA5; Tue, 28 Jan 2020 16:55:45 +0100 (CET)
Subject: Re: SLAAC vs DHCPv6 (II)
To: Lorenzo Colitti <lorenzo@google.com>, "Pascal Thubert (pthubert)" <pthubert@cisco.com>
Cc: 6man WG <ipv6@ietf.org>, Suresh Krishnan <Suresh@kaloom.com>, JORDI PALET MARTINEZ <jordi.palet=40consulintel.es@dmarc.ietf.org>
References: <03C832CE-7282-4320-BF1B-4CB7167FE6BE@employees.org> <MN2PR11MB3565330989D411525D30B90DD80F0@MN2PR11MB3565.namprd11.prod.outlook.com> <80207E17-AE8E-4D19-B516-D2E6AB70721E@employees.org> <8D5610EA-49D3-483E-BB7A-67D67BC89346@jisc.ac.uk> <DE7B0688-230F-4A5C-8E24-9EAED9FD9FEB@puck.nether.net> <AFEBAD7D-DF24-4924-8B9A-60DF22BA1953@consulintel.es> <c42affce-fbd3-23ec-c9ff-4f05cdf38630@si6networks.com> <41173152-A8E8-4241-9DE7-376AA7AFB813@consulintel.es> <c4166907-b6c9-a4ef-fd59-cf539bbe0405@si6networks.com> <43D76C96-C16B-4BEB-B9B8-C68D53BCE63F@fugue.com> <fb5b8377-892d-2777-ef9b-4f9ddefa6c93@si6networks.com> <CAKD1Yr034_tu7ZoJ1FCfDYhNSN6igm-ZQyR4u3U+UDMr=huGOw@mail.gmail.com> <1af0b06d-f9d7-5ea1-27f3-b417eb9148fa@si6networks.com> <7606A049-318D-4526-917D-F2A801BF7050@cisco.com> <CAKD1Yr1d9kORFdoOJr22J_UDJ9hLPr6AQLyWuh7=bAQKa+aXGw@mail.gmail.com>
From: Fernando Gont <fgont@si6networks.com>
Message-ID: <e89b8dbb-686d-0d93-9fa5-6242ad41a1d1@si6networks.com>
Date: Tue, 28 Jan 2020 12:55:34 -0300
User-Agent: Mozilla/5.0 (X11; Linux x86_64; rv:60.0) Gecko/20100101 Thunderbird/60.9.1
MIME-Version: 1.0
In-Reply-To: <CAKD1Yr1d9kORFdoOJr22J_UDJ9hLPr6AQLyWuh7=bAQKa+aXGw@mail.gmail.com>
Content-Type: text/plain; charset="utf-8"; format="flowed"
Content-Language: en-US
Content-Transfer-Encoding: 7bit
Archived-At: <https://mailarchive.ietf.org/arch/msg/ipv6/oC6fghPH_NVXJxY_7We0Ly2udX4>
X-BeenThere: ipv6@ietf.org
X-Mailman-Version: 2.1.29
Precedence: list
List-Id: "IPv6 Maintenance Working Group \(6man\)" <ipv6.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/ipv6>, <mailto:ipv6-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/ipv6/>
List-Post: <mailto:ipv6@ietf.org>
List-Help: <mailto:ipv6-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/ipv6>, <mailto:ipv6-request@ietf.org?subject=subscribe>
X-List-Received-Date: Tue, 28 Jan 2020 15:55:53 -0000

On 28/1/20 03:13, Lorenzo Colitti wrote:
> On Tue, Jan 28, 2020 at 2:59 PM Pascal Thubert (pthubert) 
> <pthubert@cisco.com <mailto:pthubert@cisco.com>> wrote:
> 
>      > Well, the whole thread entitled "RFC4941bis: consequences of many
>     addresses for the network" seem to be in conflict with RFC7934. --
>     i.e., folks have concerns about nodes configuring an arbitrary
>     number of addresses at will.
> 
> I think we should try to dig deeper into the reasons for this and see if 
> we can come to a compromise on some of them.

My view is that this is out of scope for rfc4941bis (being RFC4941 a 
widely implemented and deployed spec), but the topic certainly deserves 
analysis in a different document.


> 
>   * If the concern is that the host could configure "too many addresses"
>     - This sort of behaviour is not in anyone's interest (either host or
>     network), so I don't think it will happen in practice. There's also
>     an easy way to fix it: just drop the packets past N addresses.

The question is that the host does not know what's "too many". To many, 
in a way, is in the eyes of the operator or network admin, that run the 
network and possibly know what may break if the group of connected hosts 
exceed some number of configured addresses.

COnveying some sort of policy information in SLAAC helps hosts what's 
"too many". Similarly, a DHCPv6 server can "enforce" such policy, based 
on its knowledge of the network.



>   * If the concern is load on the network or tracking, I think we can
>     come up with a reasonable engineering compromise here.

I'm curious what would such compromise be.



>   * If the concern is that the host should use exactly the single
>     address (or low-N number of addresses) that is assigned by the
>     network, then that has the downsides discussed in RFC 7934 and
>     that's a problem.

As noted, I think that when it comes to RFC4941, the cat is out of the 
box, already. Besides, we're talking about a dozen address per host, 
which I guess is the minimum one could expect in the context of RFC7934.

That said, the issue is worth exploring, because it certainly affects 
more agressive approaches such as "one address per application".


> 
>     I agree. I see GRAND as a useful hack for the lack of the real
>     thing. It does not maintain nor tears down a binding. It is lacking
>     essential ingredients like a lifetime. It does not prevent address
>     theft and impersonation.
> 
>     Could this group seriously consider RFC 8505?
> 
> 
> The problem with RFC 8505 is the conflict with the text in RFC 7934 
> section 8 which recommends that networks allow devices to create 
> addresses at will. Requiring use of RFC 8505 by general purpose hosts 
> violates those recommendations.

Creating addresses at will seems, exactly, the concern being expressed 
by operators on this list. I'm not arguing one way or another, but just 
noting that "creating addresses at will" seems to be at odds with what 
the ops people are expressing.

-- 
Fernando Gont
SI6 Networks
e-mail: fgont@si6networks.com
PGP Fingerprint: 6666 31C6 D484 63B2 8FB1 E3C4 AE25 0D55 1D4E 7492