Re: [IPv6] ULA vs. 1918

"Pascal Thubert (pthubert)" <pthubert@cisco.com> Fri, 16 June 2023 15:12 UTC

Return-Path: <pthubert@cisco.com>
X-Original-To: ipv6@ietfa.amsl.com
Delivered-To: ipv6@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 41CEBC1527A6 for <ipv6@ietfa.amsl.com>; Fri, 16 Jun 2023 08:12:05 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -9.594
X-Spam-Level:
X-Spam-Status: No, score=-9.594 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, DKIMWL_WL_HIGH=-0.001, DKIMWL_WL_MED=-0.001, DKIM_SIGNED=0.1, DKIM_VALID=-0.1, DKIM_VALID_AU=-0.1, DKIM_VALID_EF=-0.1, HTML_MESSAGE=0.001, RCVD_IN_MSPIKE_H5=0.001, RCVD_IN_MSPIKE_WL=0.001, RCVD_IN_ZEN_BLOCKED_OPENDNS=0.001, SPF_NONE=0.001, URIBL_BLOCKED=0.001, URIBL_DBL_BLOCKED_OPENDNS=0.001, URIBL_ZEN_BLOCKED_OPENDNS=0.001, USER_IN_DEF_DKIM_WL=-7.5] autolearn=ham autolearn_force=no
Authentication-Results: ietfa.amsl.com (amavisd-new); dkim=pass (1024-bit key) header.d=cisco.com header.b="beYDzuYP"; dkim=pass (1024-bit key) header.d=cisco.com header.b="Sc8cAE99"
Received: from mail.ietf.org ([50.223.129.194]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id yULB8an0Khce for <ipv6@ietfa.amsl.com>; Fri, 16 Jun 2023 08:12:01 -0700 (PDT)
Received: from alln-iport-3.cisco.com (alln-iport-3.cisco.com [173.37.142.90]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id 0D30AC14CE30 for <ipv6@ietf.org>; Fri, 16 Jun 2023 08:12:01 -0700 (PDT)
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/simple; d=cisco.com; i=@cisco.com; l=31052; q=dns/txt; s=iport; t=1686928321; x=1688137921; h=from:to:cc:subject:date:message-id:references: in-reply-to:mime-version; bh=jDR/ZS24IMOnO4jBfJ13AhDNiWXv/7NO9sRYxFb9Vls=; b=beYDzuYP/vhDE1xST9E+IIdEieHnHXdUZMXpXijLetvSQEhY/+Ph69pb +iiQmG3bFJ27rmbX6EhVw0GKEXR+dJtK6i4uRGbqz5/3X1Gz/3SOjgq9V frc719DjArBZlDaCa9jUALSBIDESjB1sz02jI2JYkjsQamZRTa4CFiWkN c=;
X-CSE-ConnectionGUID: k454nVu7TLiDaLpLFy7M1A==
X-CSE-MsgGUID: l13UTpFVRki7vgvr+CDqKQ==
X-IPAS-Result: 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
IronPort-PHdr: A9a23:D+y1oRAeSN1wd10XiMDFUyQVoBdPi9zP1kY9454jjfdJaqu8us6kN 03E7vIrh1jMDs3X6PNB3vLfqLuoGXcB7pCIrG0YfdRSWgUEh8Qbk01oAMOMBUDhav+/Ryc7B 89FElRi+iLzKlBbTf73fEaauXiu9XgXExT7OxByI7HtBo7Phcmty8i5+obYZENDgz/uKb93J Q+9+B3YrdJewZM3M7s40BLPvnpOdqxaxHg9I1WVkle06pK7/YVo9GJbvPdJyg==
IronPort-Data: A9a23:S2eDaKhsnUc4qO/0rYtaTCSvX161zBIKZh0ujC45NGQN5FlHY01je htvDzvXOauCYjOkLttwOY3kpxhVuZ/cm9IxSVA6/Ck3ECljpJueD7x1DKtf0wB+jyHnZBg6h ynLQoCYdKjYdleF+1H1dOCn9ScsvU2xbuKUIPbePSxsThNTRi4kiBZy88Y0mYcAbeKRW2thg vus5ZWHULOZ82QsaDlMtfvd8EkHUMna4Vv0gHRvPZing3eG/5UlJMp3Db28KXL+Xr5VEoaSL woU5Ojklo9x105F5uKNyt4XQGVTKlLhFVTmZk5tZkSXqkMqShrefUoMHKF0hU9/011llj3qo TlHncTYpQwBZsUglAmBOvVVO3kWAEFIxFPICXvj7JCV8VCZT1/t7/xKFGUYLNI9o88iVAmi9 dRAQNwMRhmHg+Tzy7WhR6wywM8iN8LseogYvxmMzxmAUq1gGs6FGv6MvIQJtNszrpgm8fL2f 9YZdDBidgjoaBxUMVBRA5U79AutriCnLmYE9wzJ/sLb5UDXlVdM7KDDDuDWe4OUSttP3W20v 0H/qjGR7hYycYb3JSC+2nO0mLHnnC7nVsQVDrLQyxJxqFSXwmpWAxoMWB7l5/K4kUW5HdlYL iT45xYTkET7z2TyJvHVVByjq3nCtRkZM+e82cVjgO1R4sI4OzqkO1U=
IronPort-HdrOrdr: A9a23:hcgH6qkzKjhzqPDGlZik4thXO53pDfOFimdD5ihNYBxZY6Wkfp +V/cjzhCWbtN9OYh4dcIi7Sda9qBPnn6Kc4eEqTNCftXrdyRWVxeBZnMffKljbexEWmdQtrp uIH5IObeEYSGIK8foSgzPIXOrIouP3ipxA7N22pxwAPGIaCZ2IrT0JdzpzeXcGIjWucKBJbK Z0kfA33gZIF05nCvhTAENpY8Hz4/nw0L72ax8PABAqrCOUiymz1bL8Gx+Emj8DTjJm294ZgC n4uj28wp/mn+Cwyxfa2WOWxY9RgsHdxtxKA9HJotQJKw/rlh2jaO1aKv2/VXEO0aKSAWQR4Z zxSiQbToBOArTqDyaISC7WqkvdOfAVmjnfIBGj8CLeSIfCNUMH4oJ69PJkm13imgQdVBUW6t MR44pf3KAnVS8pkEnGlqv1fgAvmUyurXU4l+kPy3RZTIsFcbdU6ZcS5UVPDf47bWnHAa0cYa BT5fvnlb5rWELfa2qcsnhkwdSqUHh2FhCaQlIassjQ1zRNhnh2w0YR2cRaxx47hd8AYogB4/ 6BPrVjlblIQMNTZaVhBP0ZSc/yDmDWWxrDPG+bPFyiHqAaPHDGrYLx/dwOlauXUY1NyIF3lI XKUVteu2J3c0XyCdeW1JkO6RzJSHXVZ0Wa9iif3ekPhlTRfsueDcTYciFdryKJmYRrPvHm
X-Talos-CUID: 9a23:zczxQmGCTf8rEN5rqmJkqBNIHP44LUH5zVvZB1ecJ3c2beS8HAo=
X-Talos-MUID: 9a23:TfUMmAiSXQkv+36KXsEOkcMpMJ4z3pi2Jn43kpRZpcaaL29bFy6+tWHi
X-IronPort-Anti-Spam-Filtered: true
Received: from alln-core-6.cisco.com ([173.36.13.139]) by alln-iport-3.cisco.com with ESMTP/TLS/ECDHE-RSA-AES256-GCM-SHA384; 16 Jun 2023 15:11:59 +0000
Received: from alln-opgw-2.cisco.com (alln-opgw-2.cisco.com [173.37.147.250]) by alln-core-6.cisco.com (8.15.2/8.15.2) with ESMTPS id 35GFBxAZ031144 (version=TLSv1.2 cipher=DHE-RSA-AES256-GCM-SHA384 bits=256 verify=OK) for <ipv6@ietf.org>; Fri, 16 Jun 2023 15:11:59 GMT
Authentication-Results: alln-opgw-2.cisco.com; dkim=pass (signature verified) header.i=@cisco.com; spf=Pass smtp.mailfrom=pthubert@cisco.com; dmarc=pass (p=quarantine dis=none) d=cisco.com
X-IronPort-AV: E=Sophos;i="6.00,247,1681171200"; d="scan'208,217";a="3099547"
Received: from mail-dm6nam11lp2169.outbound.protection.outlook.com (HELO NAM11-DM6-obe.outbound.protection.outlook.com) ([104.47.57.169]) by alln-opgw-2.cisco.com with ESMTP/TLS/ECDHE-RSA-AES256-GCM-SHA384; 16 Jun 2023 15:11:59 +0000
ARC-Seal: i=1; a=rsa-sha256; s=arcselector9901; d=microsoft.com; cv=none; b=Drn5bXHD6b1+jV8BhnajPGlF8mFrhkOQH/T9XipsC85tCM05p21m/+8RzyVrX8rY6XNbKnDo+OSn7SfGJa6ElbhVnTaY731XJyBB6njtmR2G4ckkzL52nbUnKdvW0tSYDyOt4bB8+FjYHNKePnZHjINb+qWhJTBrjzn5T1GgTPGHAHwT5PDnDA8bqH9mZgrr4trxX/6ozJcGa2JMT5/2o8bNbWpAGFaImIM48tE4pAuzq4pSJ9myOyUcL/DY4RwLVr4kfPrtRUHDsycNmMHItF/gMuPSB6xXkEZKpGuvieLDR/4Ey8vBBfBe61/resTqCMFuLH0B+XagFaYvuH5zjg==
ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=microsoft.com; s=arcselector9901; h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-AntiSpam-MessageData-ChunkCount:X-MS-Exchange-AntiSpam-MessageData-0:X-MS-Exchange-AntiSpam-MessageData-1; bh=jDR/ZS24IMOnO4jBfJ13AhDNiWXv/7NO9sRYxFb9Vls=; b=nI7Jwdj6NwvMF4Jeg7/cgUF0s6mEY1RyRAVmEPz5NrfpdMp3Apx/YIBjv2PFqccTCyWzp5QWberm8QMxK42u7WZDTVY9JHQmhcKOY6MNBlyboeuOsm/YB3qrRIn5hXQepFiWEu+jffYQhSx+4pD6FJ9CNBGl/F3hlFCcvw+4JXCV6CWkTlkrcsFVklJjeHVvq+sE93PnEHV7buh0KJLjUqtV/JzylvZ4ogtXlqksPE10R4Wt6yTnzu2F/wItDEjzcIaFoYhNXR/bjkc/cWRqnetUaFCRvWH3cenpOwNnQ4LDmKQG0HyszPYSZoJX4DVmSe38QquDqdxZtfke9xRl/Q==
ARC-Authentication-Results: i=1; mx.microsoft.com 1; spf=pass smtp.mailfrom=cisco.com; dmarc=pass action=none header.from=cisco.com; dkim=pass header.d=cisco.com; arc=none
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=cisco.com; s=selector1; h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-SenderADCheck; bh=jDR/ZS24IMOnO4jBfJ13AhDNiWXv/7NO9sRYxFb9Vls=; b=Sc8cAE99ARk9griVR2LLT1Fk/aGlGWTRUt9zxqltVV9Vv/6X9gUsbunTWueanoqgd+drcrtXTCQxpyQuft8LwlQLYw3npzCuR2lpnTUHTUVICJvI59xtLTYGIMCHNTC6TFMIg64JB3hxp8QmMIOCwF9BVV7dPRzeLSNm/Xgsgy0=
Received: from CO1PR11MB4881.namprd11.prod.outlook.com (2603:10b6:303:91::20) by DS0PR11MB7214.namprd11.prod.outlook.com (2603:10b6:8:139::18) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id 15.20.6477.37; Fri, 16 Jun 2023 15:11:58 +0000
Received: from CO1PR11MB4881.namprd11.prod.outlook.com ([fe80::140c:d7a2:4d4c:8739]) by CO1PR11MB4881.namprd11.prod.outlook.com ([fe80::140c:d7a2:4d4c:8739%7]) with mapi id 15.20.6477.037; Fri, 16 Jun 2023 15:11:58 +0000
From: "Pascal Thubert (pthubert)" <pthubert@cisco.com>
To: Ted Lemon <mellon@fugue.com>
CC: Brian E Carpenter <brian.e.carpenter@gmail.com>, "ipv6@ietf.org" <ipv6@ietf.org>
Thread-Topic: [IPv6] ULA vs. 1918
Thread-Index: AQHZnh6QpEvEDttOvkqs/AsdkMKBiq+J1sSAgAAcISWAABI1AIAAAOPqgACAIICAAFUigIAACPAAgAAFHwCAAJMaFYAA2pUAgACtyUSAAIOwAIAABH7e
Date: Fri, 16 Jun 2023 15:11:58 +0000
Message-ID: <CO1PR11MB48812878301CDDC2CA8D277DD858A@CO1PR11MB4881.namprd11.prod.outlook.com>
References: <CAJU8_nW36iEWvYHu6qAGvnEKeJ1P1w4BLov+VdSeZ06XLFXDRA@mail.gmail.com> <252E7296-D071-4E2C-971C-63E18694ADB8@isc.org> <CO1PR11MB488198C7174F42A6027656B4D85AA@CO1PR11MB4881.namprd11.prod.outlook.com> <2727C342-C0C4-42E5-B75D-51174FB7F59E@isc.org> <CO1PR11MB488139AB1EC0F8D15184F6D0D85AA@CO1PR11MB4881.namprd11.prod.outlook.com> <CAN-Dau2zjmU0TXEDJyc52W=TiHXAhjnzwAqtEcpE469buH7prQ@mail.gmail.com> <24af315f-f096-cbc5-82e3-984070825541@gmail.com> <CAN-Dau3745bRSQS_Bgsb9yp0M-GK8wjToQLN9qf9PpiA=quBmQ@mail.gmail.com> <54d56b6a-1934-33fe-a8b5-e2b5408abf19@gmail.com> <DAFB73BA-D993-4957-A5A5-0B9D53E89AED@cisco.com> <99c35b98-71e3-f304-02df-0ba849220392@gmail.com> <FE8A0C37-0480-4D68-8343-B05C859BC2F9@cisco.com> <CAPt1N1=TYVbaYk1T-3RzVp+n-Uqmtmvkr=SxG=E-QbOuaEaOHA@mail.gmail.com>
In-Reply-To: <CAPt1N1=TYVbaYk1T-3RzVp+n-Uqmtmvkr=SxG=E-QbOuaEaOHA@mail.gmail.com>
Accept-Language: fr-FR, en-US
Content-Language: fr-FR
X-MS-Has-Attach:
X-MS-TNEF-Correlator:
msip_labels:
x-ms-publictraffictype: Email
x-ms-traffictypediagnostic: CO1PR11MB4881:EE_|DS0PR11MB7214:EE_
x-ms-office365-filtering-correlation-id: 3b58e872-ac7d-4431-c16c-08db6e7c074a
x-ms-exchange-senderadcheck: 1
x-ms-exchange-antispam-relay: 0
x-microsoft-antispam: BCL:0;
x-microsoft-antispam-message-info: 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
x-forefront-antispam-report: CIP:255.255.255.255; CTRY:; LANG:en; SCL:1; SRV:; IPV:NLI; SFV:NSPM; H:CO1PR11MB4881.namprd11.prod.outlook.com; PTR:; CAT:NONE; SFS:(13230028)(396003)(39860400002)(376002)(366004)(346002)(136003)(451199021)(26005)(7696005)(8936002)(9686003)(8676002)(41300700001)(478600001)(71200400001)(40140700001)(66446008)(66556008)(4326008)(66946007)(38100700002)(86362001)(76116006)(66476007)(64756008)(6916009)(38070700005)(54906003)(316002)(33656002)(122000001)(166002)(53546011)(91956017)(6506007)(55016003)(19627405001)(66574015)(52536014)(83380400001)(5660300002)(186003)(966005)(2906002)(244885003); DIR:OUT; SFP:1101;
x-ms-exchange-antispam-messagedata-chunkcount: 1
x-ms-exchange-antispam-messagedata-0: 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
Content-Type: multipart/alternative; boundary="_000_CO1PR11MB48812878301CDDC2CA8D277DD858ACO1PR11MB4881namp_"
MIME-Version: 1.0
X-OriginatorOrg: cisco.com
X-MS-Exchange-CrossTenant-AuthAs: Internal
X-MS-Exchange-CrossTenant-AuthSource: CO1PR11MB4881.namprd11.prod.outlook.com
X-MS-Exchange-CrossTenant-Network-Message-Id: 3b58e872-ac7d-4431-c16c-08db6e7c074a
X-MS-Exchange-CrossTenant-originalarrivaltime: 16 Jun 2023 15:11:58.0366 (UTC)
X-MS-Exchange-CrossTenant-fromentityheader: Hosted
X-MS-Exchange-CrossTenant-id: 5ae1af62-9505-4097-a69a-c1553ef7840e
X-MS-Exchange-CrossTenant-mailboxtype: HOSTED
X-MS-Exchange-CrossTenant-userprincipalname: fZeHj6HGziQp4QzdhKkV9zNcrTKHtQQ0uoOjg8MOtAAC2RENtucuEWdFrLfS07H9Kjo47mGF1uzKFNEdilL9GA==
X-MS-Exchange-Transport-CrossTenantHeadersStamped: DS0PR11MB7214
X-Outbound-SMTP-Client: 173.37.147.250, alln-opgw-2.cisco.com
X-Outbound-Node: alln-core-6.cisco.com
Archived-At: <https://mailarchive.ietf.org/arch/msg/ipv6/qpMedE4lIHcXoUtP4-MZkdNF-dc>
Subject: Re: [IPv6] ULA vs. 1918
X-BeenThere: ipv6@ietf.org
X-Mailman-Version: 2.1.39
Precedence: list
List-Id: "IPv6 Maintenance Working Group \(6man\)" <ipv6.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/ipv6>, <mailto:ipv6-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/ipv6/>
List-Post: <mailto:ipv6@ietf.org>
List-Help: <mailto:ipv6-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/ipv6>, <mailto:ipv6-request@ietf.org?subject=subscribe>
X-List-Received-Date: Fri, 16 Jun 2023 15:12:05 -0000

Hello Ted

packets to/from the ULA can only be injected within the ULA domain of routability.
This creates an isolation against external attackers which have to be inside or use a trojan to attack an ULA only node.

regards,

Pascal
________________________________
De : Ted Lemon <mellon@fugue.com>
Envoyé : vendredi 16 juin 2023 16:53
À : Pascal Thubert (pthubert) <pthubert@cisco.com>
Cc : Brian E Carpenter <brian.e.carpenter@gmail.com>; ipv6@ietf.org <ipv6@ietf.org>
Objet : Re: [IPv6] ULA vs. 1918

What do you mean by “secure” here!

Op vr 16 jun 2023 om 03:02 schreef Pascal Thubert (pthubert) <pthubert=40cisco.com@dmarc.ietf.org<mailto:40cisco.com@dmarc.ietf.org>>
Hello Brian

If I have a ULA and my destination has a ULA and routing enables connectivity between the 2, ULA to ULA seems to be the most secured choice (because there’s some control on the diameter where an attacker can operate).

But then how does my stack know? Sure, routing does to a point (default routes obfuscate). So I could leave it to trial and error / eyeballs. But isn’t that a demonstration that the information available at the stack is lacking?

What we want is the stack to know which prefixes a ULA can reach from the routing standpoint, and if an ULA can reach a prefix, allow to prefer a ULA.

The ULA to ULA routability could be expected / inferred within a 48, but my point above is that it’s doubly a mistake to resort on that.

I’ll add that outside the 48 boundary, ULA longest match is not your friend. If you have 2 ULAs a and b and a destination c outside a’s and b’s 48s, but a longer bitwise match with b, does that mean anything about which of a or b can be routed to c? Ne.

This is why for each PIO of an ULA there should be a train of prefixes that an address formed from the address in that PIO can reach, with a preference (vs other PiOs) That’s the only way to unleash the power of ULAs.

Note along that vein: there’s no point making GUA prefixes special in that logic. If the ULA can reach a GUA, then the ULA is still a more secure source address. Placing a GUA in the train with a preference should be acceptable. For the return path, the GUA should assume symmetrical routability: if the ULA packet reaches me I can reach it back (because it is hopefully filtered at the site boundary).

IOW we could consider RIO as the router-level “the originating router can reach this destination prefix with this preference “ and a RIO-prime attached to a PIO would be the source address-level “a source address formed from the prefix in the PIO above can reach this destination prefix with this preference “. This destination prefix being a global address, ULA or GUA.

Note that RPL use that sort of semantics very successfully. More so with upcoming signaling in https://datatracker.ietf.org/doc/draft-ietf-roll-dao-projection/. I’m not asking you to read the draft but it’s a good hint at how powerful the concept of AGP can become.

Take care,

Pascal

Le 15 juin 2023 à 22:40, Brian E Carpenter <brian.e.carpenter@gmail.com<mailto:brian.e.carpenter@gmail.com>> a écrit :

On 15-Jun-23 19:38, Pascal Thubert (pthubert) wrote:
Hello Brian
Today the only reachability that is assumed seems to be the /64. Based on the current standards one could assume that /48 is reachable as well but I’d not like to case that in stone in the stacks. The /64 experience with SLAAC should have taught us a thing or 2.

Routing will determine whether the whole /48 is reachable. There's not too much we can do about that at the address selection stage. This is more a matter of scope; and as things have evolved, the nearest thing we still have to site-local scope is a ULA /48. I completely agree that this is classful addressing (even link-local is classful). However, it would not be cast in stone in the code, since it would be in a configuration table. Do we have a better solution for the *default* behaviour?

(There is an argument for the default table being defined by v6ops, not by 6man.)

   Brian

This is why I jumped in the thread. The ULA may reach a shorter aggregation (even if to Lorenzo’s point that is not fully legal with the current text), and it may reach other ULA prefixes. So hardcoding the /48 is not only repeating an error of the past but also not sufficient to avoid the need of DHCP, as soon as the network gets fancier.
And it will. SNAC is just one example.
I’m looking forward to seeing what the new draft proposes. I hope for a per PIO option inspired by RIO. Basically for ULA all the access le prefixes would be listed with a preference.
Along the same vein I hope for another per PIO option, also inspired by RIO, that indicates the router preference for a source address derived from that prefix.
Regards,
Pascal
Le 15 juin 2023 à 00:52, Brian E Carpenter <brian.e.carpenter@gmail.com<mailto:brian.e.carpenter@gmail.com>> a écrit :

On 15-Jun-23 10:33, David Farmer wrote:
On Wed, Jun 14, 2023 at 17:01 Brian E Carpenter <brian.e.carpenter@gmail.com<mailto:brian.e.carpenter@gmail.com> <mailto:brian.e.carpenter@gmail.com<mailto:brian.e.carpenter@gmail.com>>> wrote:
   On 15-Jun-23 04:56, David Farmer wrote:
    > I've been thinking we should extend RFC 8028's use of a PIO with A=0 and L=0 for choosing the first-hop router. By adding to that, if the prefix is from the ULA range, then the host should also treat the prefix as a Local ULA prefix from an RFC 6472 section 10.3 perspective and add it to the table as a local ULA prefix.
   What is specific about A=L=0 in this case? Why wouldn't this apply to any PIO in the ULA range?
If A=1 and the prefix length isn’t 64, some people are going to have words with you, I’m fine with it, but I’m not really looking to pick a fight today, and those seem to be fighting words.

I was assuming the PIO would be for a prefix of whatever length happens to be in use on the subnet in question (which would be indeed be 64 today). But one can legitimately assume that if fdxx:xxxx:xxxx:yyyy::/64 is announced, the applicable ULA prefix is fdxx:xxxx:xxxx::/48.

  Brian

Also, L=1 is making a different statement about the prefix. A=L=0 isn’t making any other statement about the prefix than it might be a ULA that the host should treat as local and the router announcing the RA knows how to route for.
But it doesn’t specifically have to be A=L=0, but that is probably the safest statement to make.
Thanks
--
===============================================
David Farmer Email:farmer@umn.edu<mailto:Email%3Afarmer@umn.edu> <mailto:Email%3Afarmer@umn.edu<mailto:Email%253Afarmer@umn.edu>>
Networking & Telecommunication Services
Office of Information Technology
University of Minnesota
2218 University Ave SE        Phone: 612-626-0815
Minneapolis, MN 55414-3029   Cell: 612-812-9952
===============================================
--------------------------------------------------------------------
IETF IPv6 working group mailing list
ipv6@ietf.org<mailto:ipv6@ietf.org>
Administrative Requests: https://www.ietf.org/mailman/listinfo/ipv6
--------------------------------------------------------------------
--------------------------------------------------------------------
IETF IPv6 working group mailing list
ipv6@ietf.org<mailto:ipv6@ietf.org>
Administrative Requests: https://www.ietf.org/mailman/listinfo/ipv6
--------------------------------------------------------------------