Re: [IPv6] Architectural comments on draft-ietf-6man-ipv6-over-wireless-

"Pascal Thubert (pthubert)" <pthubert@cisco.com> Fri, 28 July 2023 14:27 UTC

Return-Path: <pthubert@cisco.com>
X-Original-To: ipv6@ietfa.amsl.com
Delivered-To: ipv6@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id B83A0C151065 for <ipv6@ietfa.amsl.com>; Fri, 28 Jul 2023 07:27:25 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -9.605
X-Spam-Level:
X-Spam-Status: No, score=-9.605 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, DKIMWL_WL_HIGH=-0.001, DKIMWL_WL_MED=-0.001, DKIM_SIGNED=0.1, DKIM_VALID=-0.1, DKIM_VALID_AU=-0.1, DKIM_VALID_EF=-0.1, RCVD_IN_MSPIKE_H3=0.001, RCVD_IN_MSPIKE_WL=0.001, RCVD_IN_ZEN_BLOCKED_OPENDNS=0.001, SPF_NONE=0.001, T_SCC_BODY_TEXT_LINE=-0.01, URIBL_BLOCKED=0.001, URIBL_DBL_BLOCKED_OPENDNS=0.001, URIBL_ZEN_BLOCKED_OPENDNS=0.001, USER_IN_DEF_DKIM_WL=-7.5] autolearn=unavailable autolearn_force=no
Authentication-Results: ietfa.amsl.com (amavisd-new); dkim=pass (1024-bit key) header.d=cisco.com header.b="Ieb2SrW8"; dkim=pass (1024-bit key) header.d=cisco.com header.b="ApUJl4a0"
Received: from mail.ietf.org ([50.223.129.194]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id yHISeCmftSbP for <ipv6@ietfa.amsl.com>; Fri, 28 Jul 2023 07:27:21 -0700 (PDT)
Received: from rcdn-iport-9.cisco.com (rcdn-iport-9.cisco.com [173.37.86.80]) (using TLSv1.2 with cipher DHE-RSA-SEED-SHA (128/128 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id B503AC151549 for <ipv6@ietf.org>; Fri, 28 Jul 2023 07:27:21 -0700 (PDT)
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/simple; d=cisco.com; i=@cisco.com; l=12034; q=dns/txt; s=iport; t=1690554441; x=1691764041; h=from:to:cc:subject:date:message-id:references: in-reply-to:content-transfer-encoding:mime-version; bh=cUhcq/VCZI3zVI9mIVlWXqJjBblyCrBXC/bHkKeGvIg=; b=Ieb2SrW8At0BQWaqKhfJEwrf6azozQBCiqRzKJbZRCmauzxpwEcj3R8I 895ixidIB0eZgihfK40CPkClT9zejMyjFCw5I0Xb+Pc7UsC4e+xDVBmdu 67sYxXDakvbtSx2F1aWThoSBNpMRttIsgstSH4OqNySowrJTbdC0c+LHn Q=;
X-IPAS-Result: A0DKAgCkzsNkmJFdJa1agQklgSqBYVJzAlkqEkeEUYNMA4UtiF8DgROQI4xBgSUDVg8BAQENAQEuCwsEAQGFBgIWhi0CJTQJDgECAgIBAQEBAwIDAQEBAQEBAwEBBQEBAQIBBwQUAQEBAQEBAQEeGQUOECeFaA2GBQEBAQIBAQEQEREMAQEmBgsBBAsCAQgSCAImAgICJQsVAg4CBA4FGweCXAGCOSMDARCiHAGBQAKKJnqBMoEBggkBAQYEBYJcsBADBoEVLYdmGgFlZogsJxuBSUSBFSccgWZKOD6CYgEBgUIeFYNGOYIuhUuBUAUIBYJegwCCCRguBzIJgQ4MCYELiSQKIYEICF+Bbj0CDVULC2OBGIJJAgIRJxMTUHMbAwcDgQUQLwcEMh0JBgkYGBclBlEHLSQJExVABIF6gVYKgQg/FQ4Rgk4iAgc2OBtMgmoJFQw0OxV4EC4EFBiBFAROJiEaHj0REhsNBQiBAQMaAwYCCQICBAgKAilOA0QdQAMLcD01FBsGQSmdIII9AWoGCCgDCyYBAzIREFAHBDY0Bg8EBwYZARoTBUCSPQgKL4MhrFiBNgqEC5haiEEEIwyEAZNZkRximCiiexwGhHoCBAIEBQIOAQEGgWM6gVtwFTsqAYI8UhkPjikQCYNShRSKZXY7AgcBCgEBAwmLSAEB
IronPort-PHdr: A9a23:2STUvhwzrYLMZ3vXCzMRngc9DxPP853uNQITr50/hK0LL+Ko/o/pO wrU4vA+xFPKXICO8/tfkKKWqKHvX2Uc/IyM+G4Pap1CVhIJyI0WkgUsDdTDCBjTJ//xZCt8F 8NHBxd+53/uCUFOA47lYkHK5Hi77DocABL6YBJpJvn/F5TOp8+2zOu1vZbUZlYAiD+0e7gnN Byttk2RrpwPnIJ4I6Atyx3E6ndJYLFQwmVlZBqfyh39/cy3upVk9kxt
IronPort-Data: A9a23:W3AotaOo2cSuJLPvrR3Fl8FynXyQoLVcMsEvi/4bfWQNrUp0gmAHn WAcD22CMquIZ2XyKYhwPYzjoBkEuZ+GnIMwSHM5pCpnJ55oRWUpJjg4wmPYZX76whjrFRo/h ykmQoCcaphyFBcwnz/1WlTbhSEUOZqgGPykUYYoBggrHVU/EHh72Uo68wIEqtcAbeaRUlvlV eza+6UzCHf9s9KjGjtJg04rgEoHUMXa4Fv0jHRnDRx4lAO2e00uMX4qDfrZw00U7WVjNrXSq +7rlNlV945ClvsnIovNfr3TKiXmTlNOVOSDoiI+ZkSsvvRNjg84gvoZJvENU1holCmXntkpj 8dnm5PlHG/FPoWU8AgcewNTHyc7Nqpc9fqWZ3O+qseUiUbBdhMAwd03UxpwZtJeq70xWD0Tn RAbAGhlghSrn/623bi2UPVEjcU4J86tN4Qa0p1l5WCCU654EcGaK0nMzYNY7jUhvZlrJq7Df 5cdMmN3YBH8cgIabz/7D7pnzLv32RETaQZwqUqL+4I27nTdigtr39DQ3MH9YNeGQ4BemVyV4 zOA9GXiCRZcP9uaodaYzp6yrszFzX/ZSokDLqKH6eJ0gVTLgX45JhJDADNXvsKFokK5XtteL Wkd9SwvsbU++SSXoj/VAkPQTJms40B0ZjZALwEpwFrSlfeMsm51EkBBH2ERMoV33CMjbWVyj gfhoj//OdB4XFSopZ+17LyYq3a5PjIYaD5Ebi4fRgxD6N7myG3Ssv4tZog5eEJWpoSlcd0V/ 9xshHRn71n0pZJTv5hXBXid31qRSmHhF2bZHDn/UGO/9R9eb4W4fYGu4lWzxa8efd7FHgPf4 CBbwZn2AAUy4XelynTlrAIlQunB2hp5GGa0baNHRsN4rG39pxZPg6gAu2gWyLhV3jYsIG+1P xC7VfJ5755IN3zidr5sf4+0EKwXIVvIS7zYugTvRoMWOPBZLVbflAk3PBL49z62yiAEz/pgU ap3hO7xVx72/4w9kmrvLwrcuJd2rh0DKZT7HsiilUn+gOvDPRZ4i94taTOzUwzw14vdyC39+ NdEPMzMwBJaONASqAGNmWLPBTjm9UQGOK0=
IronPort-HdrOrdr: A9a23:tL0gBq/WwmqxSvJgIyNuk+Fwdb1zdoMgy1knxilNoENuE/Bwxv rBoB1E73DJYW4qKQ4dcLC7UpVpQRvnhPlICPoqTMmftW7dySeVxeBZnMbfKljbexEWmdQtrp uIH5IObeEYSGIK8foSgzPIXOrIouP3ipxA7N22pxwAPGIaCZ2IrT0JdzpzeXcGIjWucKBJbK Z0kfA33gZIF05nCvhTAENpY8Hz4/nw0L72ax8PABAqrCOUiymz1bL8Gx+Emj8DTjJm294ZgC n4uj28wp/mn+Cwyxfa2WOWxY9RgsHdxtxKA9HJotQJKw/rlh2jaO1aKv2/VXEO0aKSAWQR4Z zxSiQbToBOArTqDyaISC7WqkvdOfAVmjnfIBGj8CLeSIfCNUMH4oJ69PJkm13imgQdVBUW6t MR44pf3KAnVS/ojWDz4cPFWAptkVfxqX0+kfQLh3gaSocGbqRNxLZvtH+9Pa1wah4S0rpXWd VGHYXZ/rJbYFmaZ3fWsi1mx8GtRG06GlODTlIZssKY3jBKlDQhpnFojvA3jzMF7tYwWpNE7+ PLPuBhk6xPVNYfaeZ4CP0aScW6B2TRSVbHMX6UI17gCKYbUki94KLf8fEw/qWnaZYIxJw9lN DIV05Zr3c7fwb0BciHzPRwg2fwqaWGLEDQI+1llu1EU+fHNcnW2AW4OSITr/c=
X-Talos-CUID: 9a23:WFmciGj9Vf66Uop+nUCrHW9ozjJuUXeNkFXCKF6CFll2VKOUQAfX6olKnJ87
X-Talos-MUID: 9a23:xSMTygp386OdqsRabV8ez21iBsV52P2LMxgQicgC4JCcOSlMKijI2Q==
X-IronPort-Anti-Spam-Filtered: true
Received: from rcdn-core-9.cisco.com ([173.37.93.145]) by rcdn-iport-9.cisco.com with ESMTP/TLS/ECDHE-RSA-AES256-GCM-SHA384; 28 Jul 2023 14:27:20 +0000
Received: from rcdn-opgw-5.cisco.com (rcdn-opgw-5.cisco.com [72.163.7.169]) by rcdn-core-9.cisco.com (8.15.2/8.15.2) with ESMTPS id 36SERHVX020555 (version=TLSv1.2 cipher=DHE-RSA-AES256-GCM-SHA384 bits=256 verify=OK) for <ipv6@ietf.org>; Fri, 28 Jul 2023 14:27:19 GMT
Authentication-Results: rcdn-opgw-5.cisco.com; dkim=pass (signature verified) header.i=@cisco.com; spf=Pass smtp.mailfrom=pthubert@cisco.com; dmarc=pass (p=quarantine dis=none) d=cisco.com
X-IronPort-AV: E=Sophos;i="6.01,237,1684800000"; d="scan'208";a="4793890"
Received: from mail-dm6nam10lp2101.outbound.protection.outlook.com (HELO NAM10-DM6-obe.outbound.protection.outlook.com) ([104.47.58.101]) by rcdn-opgw-5.cisco.com with ESMTP/TLS/ECDHE-RSA-AES256-GCM-SHA384; 28 Jul 2023 14:27:17 +0000
ARC-Seal: i=1; a=rsa-sha256; s=arcselector9901; d=microsoft.com; cv=none; b=kKI5OsPMgpF2yJjVfGzVU8v+9xFcWK9QPvuYv3NcWxDBM6nWuWyFxiq3yDNCwnjUPU5YZiH6r9qSzTTfBod4W2Gb5HnBxNZN07oh49Pvmedf+j65lW7yH6W4j/nEB4tn8lE7SiWl5xbEK7HMlACDJiBh931n+pgrjuY84RWcSQu5eywodc5baWmpzeCm4e8sd4XhjTDAm/wnL+k5kSHmQUsM4Qm96e/ABZrIxpbpeV2hGmSCqRmkKN7dxCdsZbsXfzXE4dH/yD4hgherfUqS9hZ0KhkRb5ryCDDPNz447U3PeHd7Ppp5oAMoBrz6h36I69hIUOhCyDNjLfdjIHd71w==
ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=microsoft.com; s=arcselector9901; h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-AntiSpam-MessageData-ChunkCount:X-MS-Exchange-AntiSpam-MessageData-0:X-MS-Exchange-AntiSpam-MessageData-1; bh=cUhcq/VCZI3zVI9mIVlWXqJjBblyCrBXC/bHkKeGvIg=; b=WAT1hopSLnvPk6SJHrV7GrkRDRMgo6dtdMZLU82+ypgiiHFxJe8+XOUk1Tt0IOzoHXPSbYqQAfPiSsV3JvCCCuvafVGyYQUBL2DSAPBsW5zP/zi2ywCtAbJsNWdynm59GTFSvShX40wxwDvKmk6Yv8tTYnzROJqEuqUnqCH/z8IChwWPrRi8sd34jeZy0yf7eKlJnNVMhD6GRSrU1KrwdvENiAI1KzE6knHsTXDB19HvJkCIHrIjGkcoaoA2lL9arw4L6/P/cBu9Rrn1syWdBGks4QvRf++OCXm5pbORDrwm9QGLAD8ns/+Rx2TM/jcsf1t+H2U21tHGwLWNMhgW4g==
ARC-Authentication-Results: i=1; mx.microsoft.com 1; spf=pass smtp.mailfrom=cisco.com; dmarc=pass action=none header.from=cisco.com; dkim=pass header.d=cisco.com; arc=none
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=cisco.com; s=selector1; h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-SenderADCheck; bh=cUhcq/VCZI3zVI9mIVlWXqJjBblyCrBXC/bHkKeGvIg=; b=ApUJl4a0WZGndNFReRwN8P2McGSpEi524Om6627U5zacmZBMynbDxeeQWqMk4kOlM7R6/L3xPuDhV2xtgrGFTEgokXcBP714LTOLiiQzRqesd59LuffqDj/+uMHMvqUmkDvUaRUbMr5s+cfhAkeT/WZPTEqv+i2kxDGWKPYdLHg=
Received: from CO1PR11MB4881.namprd11.prod.outlook.com (2603:10b6:303:91::20) by PH0PR11MB5208.namprd11.prod.outlook.com (2603:10b6:510:3b::16) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id 15.20.6631.29; Fri, 28 Jul 2023 14:27:15 +0000
Received: from CO1PR11MB4881.namprd11.prod.outlook.com ([fe80::17aa:6ac2:4ac6:4841]) by CO1PR11MB4881.namprd11.prod.outlook.com ([fe80::17aa:6ac2:4ac6:4841%7]) with mapi id 15.20.6631.026; Fri, 28 Jul 2023 14:27:15 +0000
From: "Pascal Thubert (pthubert)" <pthubert@cisco.com>
To: Lorenzo Colitti <lorenzo=40google.com@dmarc.ietf.org>
CC: IETF IPv6 Mailing List <ipv6@ietf.org>
Thread-Topic: [IPv6] Architectural comments on draft-ietf-6man-ipv6-over-wireless-
Thread-Index: AQHZwMlB3E+v7xx5/06THcbuxRSRq6/PPaNi
Date: Fri, 28 Jul 2023 14:27:15 +0000
Message-ID: <EA78BD5C-831A-425B-BAEA-073BAE69F68E@cisco.com>
References: <CAKD1Yr1piLMJEh_hqpBi1a559qKD41B7Pb4Fi2U0aPEMSosNTw@mail.gmail.com>
In-Reply-To: <CAKD1Yr1piLMJEh_hqpBi1a559qKD41B7Pb4Fi2U0aPEMSosNTw@mail.gmail.com>
Accept-Language: fr-FR, en-US
Content-Language: fr-FR
X-MS-Has-Attach:
X-MS-TNEF-Correlator:
x-ms-publictraffictype: Email
x-ms-traffictypediagnostic: CO1PR11MB4881:EE_|PH0PR11MB5208:EE_
x-ms-office365-filtering-correlation-id: 233624cb-893e-4767-f145-08db8f76bdbe
x-ms-exchange-senderadcheck: 1
x-ms-exchange-antispam-relay: 0
x-microsoft-antispam: BCL:0;
x-microsoft-antispam-message-info: 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
x-forefront-antispam-report: CIP:255.255.255.255; CTRY:; LANG:en; SCL:1; SRV:; IPV:NLI; SFV:NSPM; H:CO1PR11MB4881.namprd11.prod.outlook.com; PTR:; CAT:NONE; SFS:(13230028)(4636009)(366004)(376002)(346002)(396003)(136003)(39860400002)(451199021)(66899021)(6486002)(966005)(6512007)(26005)(83380400001)(478600001)(36756003)(38070700005)(86362001)(33656002)(2906002)(66476007)(66556008)(2616005)(66446008)(66574015)(186003)(6506007)(8936002)(71200400001)(64756008)(122000001)(38100700002)(4326008)(76116006)(8676002)(66946007)(41300700001)(316002)(5660300002)(45980500001); DIR:OUT; SFP:1101;
x-ms-exchange-antispam-messagedata-chunkcount: 1
x-ms-exchange-antispam-messagedata-0: NrEV7iWBxUcu7oE1Tzw7mpr/Raw1mG50LeREU6CEk2A7RFye5k+vL7RLSEpPLphMVUyrIuC+1Jhwk57koL8yqRnOOGEoM50g07E6H1Gn8HuTh8ISEmU64hfo9TDY8+VzbJVo57UYI5bTPLI4Ep7Ly90Nj5mKMNbxcDNJmCINlLy3nEgl97DteB2VdSmCEihTuZTCQ82sRpusL9HR1TaMPADME0I7bpaIIUX9KVGdJs5QwdQMGRzqOUioZ+H5SY9wgDUJI0OSY+2z+46HKpO+KPPQnfgXx452+HYLJiyHPvBU0ZjsLlCxt1PDQFbsrvUqmm9NWyx3LyhG+ZEJjoJpvu3LQ7tHnLPJ6kqYoUS+CrSB47VkFQjVmQDISl6vt2AxJl8zPV+KwzOjJH16EOXfsKXMihHELHcStUU2NnJsAbkQZN9oCOVFc6Kd3DDU773krQF/NJdPWIZQpZpNYmHHVg9TmzZ2K0Z/Q33It93Fd5yJgNM1ngivlfpvn5MAT6o5iBhX2XXYvltjeeHjMPSh9L1voDrChzOmFKfM51V5imNHByIqX2n2ZU/5Ha0IjnDZTd/ki4HRV3xEzOLGffZYxi9tQCNwIg5BZqR5WSnif7BIQR0jRdZItzukfM3l1/UNz71e++NZ8Gwqv2Wnvt/JvglESGk7PveOtHzWa7hJ21I08kYdQqU5Mqex6JPXhkzTp5m4pMBUHdw7nh3hp23vpD2kd4DcROxLt1BAR/u9D14brXfZYEE8stHf0UO68XtJwGfcxicAn1QHiCSQrk9NR2Q3Ql7i546U8Ed7wewU0snj++2+d8HiTo9zAPDagnu0884jwgGplZv4GeyNR8cfPCrmpPUO176Io9zjClTx0X3D0A+7JjE9qHIvcXWkFPmUIK00tFPoHbU2g+s0PJbi8k9/m5aS0Wml49JnJHKmZM5wn1uI2+CNxfRLBWfW2m3a5SwIyHickeVWO89/NkueIxATxQ9YjA1VZYv2YZ0KAuPfjeS0nksyentp/jy+yFPGciUfw1/stFAWAa/55JdKHj2yLKIFkJa5DBGzGvDHtvbTidx859vkPehAaoxZFYsNQTnP859Ubzw/3ukrXlxqr/7u2OlgqtxYm3NAmucZHIGs/Bm8v3ivOA2NpX7mqXfYvnbZai+D3PitDPNo266vFyTgqXDaE0vfFfl/+jHsZQN2OnhtX8PNRkUNj7hW1/B0Gb5dVqef24Gd04TdXJDeYCqi8a8uaYTfPou6T1Q/jdv3WIXwYjQ2yJ67TAZn468nhDbwE5EXNB3+4j0YeY7MCy2y5EpBBqwArH4F376v6ssjcXyZqfuSTlsESu6XBfmp11fJce52Md0niGTu5l1tXKb79MtBOcZF7AV25D0YPT6X8surQlYB+aMo1zuQrQTDoPbkJHDHC5WYAzAiNIBEbRxIIRtHVMasIGbGLxJ54RlVLJ+6grHGM9t0/AYI84wBDKnKIAS0LLSgadvE1dE9xGsWGa0g6gwlSUpz79EHpuKMj51iU2ET4oiuQnLCSQ90uixjyIt2HOtbI4nMFArHxctIpkcTjO3Dw1Cvc0HY6DtgiJF+enZZeTL3DI3cDAxy
Content-Type: text/plain; charset="utf-8"
Content-Transfer-Encoding: base64
MIME-Version: 1.0
X-OriginatorOrg: cisco.com
X-MS-Exchange-CrossTenant-AuthAs: Internal
X-MS-Exchange-CrossTenant-AuthSource: CO1PR11MB4881.namprd11.prod.outlook.com
X-MS-Exchange-CrossTenant-Network-Message-Id: 233624cb-893e-4767-f145-08db8f76bdbe
X-MS-Exchange-CrossTenant-originalarrivaltime: 28 Jul 2023 14:27:15.4790 (UTC)
X-MS-Exchange-CrossTenant-fromentityheader: Hosted
X-MS-Exchange-CrossTenant-id: 5ae1af62-9505-4097-a69a-c1553ef7840e
X-MS-Exchange-CrossTenant-mailboxtype: HOSTED
X-MS-Exchange-CrossTenant-userprincipalname: PHxpej7bEENMDL2KwXUg/J5wSGbzk/xPpIbMG1DpbQ24e+tPX0Wuk2+NJ3Yr5Dg21qmbEkD8s3uCbwUe/NDqCg==
X-MS-Exchange-Transport-CrossTenantHeadersStamped: PH0PR11MB5208
X-Outbound-SMTP-Client: 72.163.7.169, rcdn-opgw-5.cisco.com
X-Outbound-Node: rcdn-core-9.cisco.com
Archived-At: <https://mailarchive.ietf.org/arch/msg/ipv6/q2hznIOzpMnRMIYgHr1mvu7zHls>
Subject: Re: [IPv6] Architectural comments on draft-ietf-6man-ipv6-over-wireless-
X-BeenThere: ipv6@ietf.org
X-Mailman-Version: 2.1.39
Precedence: list
List-Id: "IPv6 Maintenance Working Group \(6man\)" <ipv6.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/ipv6>, <mailto:ipv6-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/ipv6/>
List-Post: <mailto:ipv6@ietf.org>
List-Help: <mailto:ipv6-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/ipv6>, <mailto:ipv6-request@ietf.org?subject=subscribe>
X-List-Received-Date: Fri, 28 Jul 2023 14:27:25 -0000

Hello Lorenzo 
> 
> 
> I mentioned this v6ops at the mic, but never sent it here, so...
> 
> tl;dr - While this architecture may be a slightly better fit for wireless links, it does so at the cost of greater complexity, reduced resilience, reduction in the ability for hosts to autonomously form addresses, and the loss of an abstraction that is useful for application developers. I also don't think that the scalability and power improvements are necessary in most networks.
> 

This is one tool in a tool set. The one thing that this draft does not intend to be is a one fits all. It is an administrative decision to split the broadcast domain and when that decision is made then this architecture is cleaner than bunches of tunnels aka MIP.

 Note that it is heavily deployed on wires today in EVPN and LISP -based solutions. So we are mostly recognizing after the fact that it exists, and providing an architecture as a context for it.

 Doing that we realize that snooping protocols is a non-deterministic hack so the framework provides a proactive way to fix it.

About the use of “reduce”. Whether there is a reduction and the extent of the loss is also dependent on the use case and I’d leave ths cost  / benefit to the admin’s appreciation.

> ======
> 
> More in detail: while the proposed architecture is a good fit for low power networks (which is where it originates from), I don't think the new architecture is a good trade-off for general purpose networks like 802.11, for several reasons.
> 

Too many cases around to be that general.

 In my book delegating prefixes to the host is totally part of the architecture, at least when the prefix is longer than 64. 

Whether the host gets /128s or /96s or what else does not make a difference. It’s just a route in the SGP. And the host knows that it can (ask the router to) inject that route (using ND prefix registration)  because its prefix fits in the one in a PIO. This is the sense of my question yesterday at 6MAN. Mobility/DNA requires that you know if the delegated prefix is still usable in the new location.



> First: the draft is very focused on ND, but ND is just one of the protocols that rely on the broadcast link abstraction. It's arguably the _most important_ protocol, because it is required for all other communications, but it's definitely not the only protocol, and it's most certainly not the protocol that sends the most packets or bytes. For example, MDNS is much chattier.
> 

The architecture allows for scopes. From link local which is what discovery protocols for physical objects will use to admin scope which is what the admin decides is the domain where an address / prefix is topologically correct and reachable.

The key word for the large domain is mobility. Forming new addresses on the go creates hiccups in the active conversations. Not nice but survivable. It’s a lot worse for delegated prefixes if you need to flash-renumber the devices inside the device. We are not good at that. This was the sense of my words at v6ops.

 Very chatty broadcast protocols hopefully fall into the fist category. We have measured 300+ ND broadcast messages at a large conference during the keynote. Saying that mDNS is worse, well, depends.

 ND in rfc 4861 requires the scope of the subnet vs hopefully most services one is looking for that are either on link or proxied. This difference of scope is what makes the difference and the reason to focus on ND.

The keyword here is sustainability. Apart from storms, broadcasts over a large domain mean wasting energy and (as Nick points out) spectrum. When you think that those broadcast are intended for 0 (DAD) or 1 (lookup) target, it feels more planet friendly to leave the door open with the AC on.


> The reason we have a broadcast abstraction over links like 802.11 wifi is that it's a _useful_ abstraction. Developers of applications like MDNS (and many other discovery applications) benefit greatly from a simple abstraction. And even if we change the architecture of ND, the link layer will still need to provide this useful abstraction.

It’s still there. Use it wisely is the ask. Part of that is for protocol developers to design with more sustainability in mind (when shall we have a sustainability section in our specs) 

Another is for net admin to design their broadcast domains and service deployment with energy in mind as well. Here we are giving them new degrees of liberty to achieve that.

> 
> Second: the current architecture has several good properties that the proposed architecture lacks, and I think it's arguably a good trade-off for most general purpose use cases. For example, it is robust to state loss, because any entity that crashes will trivially recover state without needing a complex recovery procedure.

True. It’s probably still ideal for home.

In the case of EVPN or LISP you are a decade too late. This complexity is already there, as the routers build all those tables already. The architecture just provides a context for what is heavily deployed in corp and campus networks.

In EVPN, the 6LBR is replicated in all PEs and synchronized by BGP (acting as SGP). In LISP it is centralized in the MSMR, which itself is implemented in a distributed and redundant fashion. With RFC 8929, the 6LBR is distributed between the 6BBRs (think WiFi APs) each of which is authoritative for proxying its registered addresses. In IoT LLNs, the SGP of choice is RPL

But snooping ND is undeterministic. That’s what the framework in this document rea adds to the existing picture.



> And it allows nodes to form their own addresses without requesting them from the network. This is recommended by RFC 7934, which also documents several cases where hosts were able to autonomously add functionality without changing the network at all.
> 

RFC 8505 /8928 are still autoconf. It just establishes a contract that guarantees to the host that the addresses will be served. When that cannot happen then at least the host gets to know. Part of the contract is SAVI that ND lacks completely. With the registration, impersonation and scanning DOS are prevented natively.

> Third: from a network scalability and power perspective, I think the current architecture scales quite well. In terms of traffic, ND is

Traffic is not different. Mobility and efficiency are.


> almost never a scaling problem except in extreme cases (e.g., tens of thousands of nodes on a link).

The rule of a thumb in OT (after lotta  displeasing experience) is 100 nodes per subnet. After that they claim that their operations (think control network) get unreliable. This is IPv4 so you should really read 100 addresses per subnet. Source: ODVA.


> And because ND uses multicast, these problems are easily solved using L2 optimizations like multicast snooping and, in

I have 10+ years of experience that tell you that it does not work reliably. Add to that that the host behavior is largely unpredictable. Some old implementations will send NA(O) to anl hosts right after DAD. Newer will not. Even newer (GRAND) will send it to all routers. So sometimes the first NA is a response to a lookup which is way too late and impacts the flow. 

 Of all 3, GRAND is the best for the infrastructure . But it’s one shot, not redone after mobility, and it’s not a contract with a lifetime etc. So even if widely available it would still be largely inadequate.


> the case of 802.11, things like multicast-to-unicast conversion.

Much needed, done by the ARP proxy based on the prior knowledge of all addresses that must be deterministic . This is exactly why WiFi has an association and the association is  exactly what RFC 8505 mimics at L3. Same cause and effects.

> Even currently-specified things like ND proxying aren't really necessary for this purpose.

So you say. IEEE std 802.11 mandates it. 


> From a power perspective, ND is a negligible cost for pretty much any general purpose device, and definitely for *anything* the size of a phone or larger.

See Nick’s answer. This can be correct at home but a huge misconception in a large corporate/ conf / stadium / campus networks.

My memory is that JJ B introduced /64 to the host in stadiums for that reason. I may be wrong.  In my book it full makes sense as a topical short term solution like for the duration of a game. Generalized you get IPv4 with 8 bytes addresses.

All the best,

Pascal 

> --------------------------------------------------------------------
> IETF IPv6 working group mailing list
> ipv6@ietf.org
> Administrative Requests: https://www.ietf.org/mailman/listinfo/ipv6
> --------------------------------------------------------------------