Re: RE: 3484bis and privacy addresses

Ray Hunter <v6ops@globis.net> Wed, 11 April 2012 13:50 UTC

Return-Path: <v6ops@globis.net>
X-Original-To: ipv6@ietfa.amsl.com
Delivered-To: ipv6@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id DCF3011E816E for <ipv6@ietfa.amsl.com>; Wed, 11 Apr 2012 06:50:53 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -2.599
X-Spam-Level:
X-Spam-Status: No, score=-2.599 tagged_above=-999 required=5 tests=[AWL=0.000, BAYES_00=-2.599]
Received: from mail.ietf.org ([12.22.58.30]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id hVD2pngJjeGM for <ipv6@ietfa.amsl.com>; Wed, 11 Apr 2012 06:50:53 -0700 (PDT)
Received: from globis01.globis.net (RayH-1-pt.tunnel.tserv11.ams1.ipv6.he.net [IPv6:2001:470:1f14:62e::2]) by ietfa.amsl.com (Postfix) with ESMTP id 0CA2611E816B for <ipv6@ietf.org>; Wed, 11 Apr 2012 06:50:52 -0700 (PDT)
Received: from localhost (localhost [127.0.0.1]) by globis01.globis.net (Postfix) with ESMTP id 6F5AA8700F3; Wed, 11 Apr 2012 15:50:51 +0200 (CEST)
X-Virus-Scanned: Debian amavisd-new at globis01.globis.net
Received: from globis01.globis.net ([127.0.0.1]) by localhost (mail.globis.net [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id IqmpYcGw+ENw; Wed, 11 Apr 2012 15:50:43 +0200 (CEST)
Received: from Rays-iMac.local (unknown [192.168.0.3]) (Authenticated sender: Ray.Hunter@globis.net) by globis01.globis.net (Postfix) with ESMTPA id 528C48700EC; Wed, 11 Apr 2012 15:50:43 +0200 (CEST)
Message-ID: <4F858C32.6060709@globis.net>
Date: Wed, 11 Apr 2012 15:50:42 +0200
From: Ray Hunter <v6ops@globis.net>
User-Agent: Postbox 3.0.3 (Macintosh/20120304)
MIME-Version: 1.0
To: Dave Thaler <dthaler@microsoft.com>
Subject: Re: RE: 3484bis and privacy addresses
References: <4F716D5C.40402@innovationslab.net> <4F726C9E.50107@gmail.com> <9B57C850BB53634CACEC56EF4853FF653B5054C1@TK5EX14MBXW604.wingroup.windeploy.ntdev.microsoft.com> <4F83D8D0.5030402@gmail.com> <9B57C850BB53634CACEC56EF4853FF653B508719@TK5EX14MBXW604.wingroup.windeploy.ntdev.microsoft.com>
In-Reply-To: <9B57C850BB53634CACEC56EF4853FF653B508719@TK5EX14MBXW604.wingroup.windeploy.ntdev.microsoft.com>
Content-Type: text/plain; charset="ISO-8859-15"; format="flowed"
Content-Transfer-Encoding: 7bit
Cc: "ipv6@ietf.org" <ipv6@ietf.org>
X-BeenThere: ipv6@ietf.org
X-Mailman-Version: 2.1.12
Precedence: list
List-Id: "IPv6 Maintenance Working Group \(6man\)" <ipv6.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/ipv6>, <mailto:ipv6-request@ietf.org?subject=unsubscribe>
List-Archive: <http://www.ietf.org/mail-archive/web/ipv6>
List-Post: <mailto:ipv6@ietf.org>
List-Help: <mailto:ipv6-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/ipv6>, <mailto:ipv6-request@ietf.org?subject=subscribe>
X-List-Received-Date: Wed, 11 Apr 2012 13:50:54 -0000

With all due respect to everyone concerned, there's no way an end user 
or IT department can buy a bunch of machines based on the text currently 
contained in this proposed Standard Track document and

1) be able to predict how each machine will behave by defaultin advance 
of actually plugging it in.

2) be able to effectively manage a machine's behaviour remotely via an 
IETF defined control mechanism, because the various MAYs and SHOULDs 
cannot be overridden by the two things that are actually reasonably well 
defined by the IETF i.e.
the prefix policy table + draft-ietf-6man-addr-select-opt-03 for 
transporting that policy table.

That suggests to me that we're not yet completely on the right track.

IMHO If there's an implementation option in 3484bis, there should always 
be a corresponding control option in the (prefix) policy table, plus a 
way to effectively transport that policy table in e.g. 
draft-ietf-6man-addr-select-opt-03.

Align and package all 3 together, and you have a far better solution.

regards,
RayH

Dave Thaler wrote:
> Brian Carpenter writes:
>>> >  >  The wording I propose to add is:
>>> >  >  
>>> >  >       "There SHOULD be an administrative option to change this preference, if the
>>> >  >       implementation supports privacy addresses.  If there is no such option, there
>>> >  >       MUST be an administrative option to disable privacy addresses."
>>> >  >  
>>> >  >  -Dave
>> >
>> >  That works for me. Perhaps there also needs to be a general statement in the security
>> >  considerations that all administrative changes and options MUST be secured against illicit use.
>
> Done.   Draft-02  now includes the wording above, and adds a general statement in the
> security considerations section as you suggested.
>
> -Dave