RE: I-D Action: draft-templin-duid-ipv6-01.txt

"Bernie Volz (volz)" <volz@cisco.com> Fri, 15 January 2021 22:32 UTC

Return-Path: <volz@cisco.com>
X-Original-To: ipv6@ietfa.amsl.com
Delivered-To: ipv6@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 552E53A127D; Fri, 15 Jan 2021 14:32:15 -0800 (PST)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -9.6
X-Spam-Level:
X-Spam-Status: No, score=-9.6 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, DKIM_SIGNED=0.1, DKIM_VALID=-0.1, DKIM_VALID_AU=-0.1, DKIM_VALID_EF=-0.1, HTML_MESSAGE=0.001, RCVD_IN_MSPIKE_H2=-0.001, SPF_PASS=-0.001, URIBL_BLOCKED=0.001, USER_IN_DEF_DKIM_WL=-7.5] autolearn=ham autolearn_force=no
Authentication-Results: ietfa.amsl.com (amavisd-new); dkim=pass (1024-bit key) header.d=cisco.com header.b=MXd9jiFv; dkim=pass (1024-bit key) header.d=cisco.onmicrosoft.com header.b=G2xt6q9w
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id 8ZJChEqnfVZn; Fri, 15 Jan 2021 14:32:12 -0800 (PST)
Received: from alln-iport-2.cisco.com (alln-iport-2.cisco.com [173.37.142.89]) (using TLSv1.2 with cipher DHE-RSA-SEED-SHA (128/128 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id 0EC583A126D; Fri, 15 Jan 2021 14:32:12 -0800 (PST)
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/simple; d=cisco.com; i=@cisco.com; l=65540; q=dns/txt; s=iport; t=1610749932; x=1611959532; h=from:to:cc:subject:date:message-id:references: in-reply-to:mime-version; bh=84vIU4H0EIY9SZgK3AhvRZKNsvBx2HKH1KpyxeZuL/0=; b=MXd9jiFvpeTrN9xVFNKjSox6Ecre+oNsHbWGgJ+OwLzt6ORSiMpA2ivt beILb05EaDsdBcRtIR1tYvcCWuFs//+J1H3zfitWOJ53DBKkUUqKHN+2o WYawC+AYt6+YV/ubfkdo1G3DWqLGtKK/SCrfcXkm3lpyjVQVJUo/gjzCF U=;
X-IPAS-Result: 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
IronPort-PHdr: 9a23:OOj15hcVAw8NhkpC6tZZI1bjlGMj4e+mNxMJ6pchl7NFe7ii+JKnJkHE+PFxlwaQA9fR7P9FjeWQuKflCiQM4peE5XYFdpEEFxoIkt4fkAFoBsmZQVb6I/jnY21ffoxCWVZp8mv9PR1TH8DzNFfVr3y04ngZHRCsfQZwL/7+T4jVicn/3uuu+prVNgNPgjf1Yb57IBis6wvLscxDiop5IaF3wRzM8XY=
X-IronPort-Anti-Spam-Filtered: true
X-IronPort-AV: E=Sophos;i="5.79,350,1602547200"; d="scan'208,217";a="652141534"
Received: from alln-core-9.cisco.com ([173.36.13.129]) by alln-iport-2.cisco.com with ESMTP/TLS/DHE-RSA-SEED-SHA; 15 Jan 2021 22:32:10 +0000
Received: from XCH-RCD-001.cisco.com (xch-rcd-001.cisco.com [173.37.102.11]) by alln-core-9.cisco.com (8.15.2/8.15.2) with ESMTPS id 10FMWACs013944 (version=TLSv1.2 cipher=AES256-SHA bits=256 verify=FAIL); Fri, 15 Jan 2021 22:32:10 GMT
Received: from xfe-aln-004.cisco.com (173.37.135.124) by XCH-RCD-001.cisco.com (173.37.102.11) with Microsoft SMTP Server (TLS) id 15.0.1497.2; Fri, 15 Jan 2021 16:32:10 -0600
Received: from xhs-rcd-003.cisco.com (173.37.227.248) by xfe-aln-004.cisco.com (173.37.135.124) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA384) id 15.2.792.3; Fri, 15 Jan 2021 16:32:10 -0600
Received: from NAM04-BN8-obe.outbound.protection.outlook.com (72.163.14.9) by xhs-rcd-003.cisco.com (173.37.227.248) with Microsoft SMTP Server (TLS) id 15.0.1497.2 via Frontend Transport; Fri, 15 Jan 2021 16:32:09 -0600
ARC-Seal: i=1; a=rsa-sha256; s=arcselector9901; d=microsoft.com; cv=none; b=c0ov4tuqMsQ5OdWEXYV9TsgPF++KZJRRfIJ9DqVERAwCN3axTXBjBUA1tZzjaSDF/g9wsfku6NR9AVPgc7ElUhtK892uBUtQ4/5ousXjC+2BTASW5liSAQifVytrvDHbpkw/8PEv1OJ9maPp73OVMD9H6Q475DZ3nKDnf6CeEVRo0C97Jxsq07XW32qyYhzCkCCTZG/mqBL+8drPc9NmqC3tavPqgBC9NepizqqH9NziU3ajDoKWJcG+XydghpHK8bSbCeIkmek95EN4IoePaw8S0BELm0vtge6MvOm2zM6Q2K0sHc+lRAl16pv/JEhPKcTwwFCdiKkri3+bacSMHQ==
ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=microsoft.com; s=arcselector9901; h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-SenderADCheck; bh=84vIU4H0EIY9SZgK3AhvRZKNsvBx2HKH1KpyxeZuL/0=; b=Jg229wadkiVM6060VEslqwTsJCGhngZa3zn5MAX1qjnQ24Vuh5NUFm/D8HpBbRnQuWFmbql6ZZqiqSR/O23mJnmXyN8OPNBxDd5AiFwGDPlI0UPzxZCgcYlj/3oUkuU/syRDyH0fNeH/MvTqjcI8C2ZyGF9idJS3F11vW+EGGseqcVidK1bUEP+1UAPUYHDVdNAr0iEeCdPUoo5n4dDEXuuwXhbw2UxvbT0h+TrCaQWJ2rRcMDMS+giGkkTgQQAdnCgbBVDN7P2uc82oNGJuHf/l+PNXTECWtWxuSl9it2noMZQOVgKlq1kQA5hcG4WKQ5KpqdHoU/0Uxrma3vKDUw==
ARC-Authentication-Results: i=1; mx.microsoft.com 1; spf=pass smtp.mailfrom=cisco.com; dmarc=pass action=none header.from=cisco.com; dkim=pass header.d=cisco.com; arc=none
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=cisco.onmicrosoft.com; s=selector2-cisco-onmicrosoft-com; h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-SenderADCheck; bh=84vIU4H0EIY9SZgK3AhvRZKNsvBx2HKH1KpyxeZuL/0=; b=G2xt6q9w7agSZ9oyi9O0N8NWnydzczmiSddqzawSZI2zi2Rvk5BSqqdYOUE1scaYKmLXXwbgeIU2SvF/LnzEbyJM1RRrYRI/DZY/SBuiMfDfuwp1sjLZSumS6dJR8r0bjCa7H3Oe2L+6RhfFw9IGOYed1WD+DQrxf7u3cTgxaGQ=
Received: from BN7PR11MB2547.namprd11.prod.outlook.com (2603:10b6:406:af::18) by BN6PR1101MB2228.namprd11.prod.outlook.com (2603:10b6:405:52::16) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id 15.20.3742.9; Fri, 15 Jan 2021 22:32:08 +0000
Received: from BN7PR11MB2547.namprd11.prod.outlook.com ([fe80::651c:70ca:fdc4:25eb]) by BN7PR11MB2547.namprd11.prod.outlook.com ([fe80::651c:70ca:fdc4:25eb%3]) with mapi id 15.20.3763.012; Fri, 15 Jan 2021 22:32:08 +0000
From: "Bernie Volz (volz)" <volz@cisco.com>
To: "Templin (US), Fred L" <Fred.L.Templin@boeing.com>, Ted Lemon <mellon@fugue.com>
CC: Bob Hinden <bob.hinden@gmail.com>, dhcwg <dhcwg@ietf.org>, IPv6 List <ipv6@ietf.org>, "Dickson (US), Sean M" <sean.m.dickson@boeing.com>
Subject: RE: I-D Action: draft-templin-duid-ipv6-01.txt
Thread-Topic: I-D Action: draft-templin-duid-ipv6-01.txt
Thread-Index: AdbrfttkOSxT/RteQveHQZFWn6tS6wAAhjbwAABZKbAAAGfl4AAAPHqgAAB1iEA=
Date: Fri, 15 Jan 2021 22:32:08 +0000
Message-ID: <BN7PR11MB254724BBA0272743D697E895CFA70@BN7PR11MB2547.namprd11.prod.outlook.com>
References: <934f21434d854a9babcfc04c2699968b@boeing.com> <BN7PR11MB25479D4FFB2C6960B1A1D3AFCFA70@BN7PR11MB2547.namprd11.prod.outlook.com> <5048f1f0c14b46cca14f86ff362bc124@boeing.com> <BN7PR11MB2547C04193D394869CB4543DCFA70@BN7PR11MB2547.namprd11.prod.outlook.com> <b931793902d24d1c82bc0bc61066e441@boeing.com>
In-Reply-To: <b931793902d24d1c82bc0bc61066e441@boeing.com>
Accept-Language: en-US
Content-Language: en-US
X-MS-Has-Attach:
X-MS-TNEF-Correlator:
authentication-results: boeing.com; dkim=none (message not signed) header.d=none;boeing.com; dmarc=none action=none header.from=cisco.com;
x-originating-ip: [24.233.121.124]
x-ms-publictraffictype: Email
x-ms-office365-filtering-correlation-id: a5f39cd4-0b2b-42f4-2999-08d8b9a564e7
x-ms-traffictypediagnostic: BN6PR1101MB2228:
x-microsoft-antispam-prvs: <BN6PR1101MB2228A00C6C373B442D4CE4ACCFA70@BN6PR1101MB2228.namprd11.prod.outlook.com>
x-ms-oob-tlc-oobclassifiers: OLM:5516;
x-ms-exchange-senderadcheck: 1
x-microsoft-antispam: BCL:0;
x-microsoft-antispam-message-info: kgwDFiE2ujbusOhUlCbiIoWie1BCXSlpR1OMrQ1+X+lIyOLXGUi+ZmfNa/YWH4jU4Qr4iYdrjf84ff5d5Xo1wYTQ5Y5gmgr3/aABL42BODKqtynAc00832Kv7RFo3I/Nug+B1VKg6gCktP29PachCmCbSWjRL6R6qDKEwBwiks3iouTvuMi3hg4xTV0c3J6Q7AAnM8mZd+63a7BrChUN1ivN6bdQQ8pxOdUF/SNEJ0MWlg1uHHWt7evZcHrQDYrP69QpXwBvzViMN12PZOyKI/RjXmYwWrcDM/iolsTEilWGeiEHFhsEpMNG8nahasI0KNaUtRDCJp37BwRJXOvwj0rxv5F98XptmsTXNM2xJAKLgjyL++pZo2x/DjGhMD6OqKGOy8oPzEFeR+Q9FIKTsl3cplQXXRRKJdJ4CLabvdwFDSQ1Uk/qGbIEuW79zuY6tndkabEL204HaqMEfliD7zr3LtVOIywBIW3lXyw4382toPbsmt9ebtYIzwMcOq+AYdF+4lC/sH1ZZKauHzKm6zvax81ymnqsFjoNAA37Bsdcc9+YZM7kNgedW4VUNxOb1ckmPsJqiLwAnLUejwiwDhKPVkgEp94gGBYm47986h4=
x-forefront-antispam-report: CIP:255.255.255.255; CTRY:; LANG:en; SCL:1; SRV:; IPV:NLI; SFV:NSPM; H:BN7PR11MB2547.namprd11.prod.outlook.com; PTR:; CAT:NONE; SFS:(346002)(376002)(396003)(39860400002)(366004)(136003)(83380400001)(7696005)(9686003)(316002)(5660300002)(53546011)(54906003)(6506007)(478600001)(4326008)(110136005)(8936002)(33656002)(86362001)(76116006)(66574015)(26005)(166002)(64756008)(71200400001)(66946007)(66556008)(2906002)(66476007)(55016002)(52536014)(186003)(66446008)(8676002)(966005); DIR:OUT; SFP:1101;
x-ms-exchange-antispam-messagedata: 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
x-ms-exchange-transport-forked: True
Content-Type: multipart/alternative; boundary="_000_BN7PR11MB254724BBA0272743D697E895CFA70BN7PR11MB2547namp_"
MIME-Version: 1.0
X-MS-Exchange-CrossTenant-AuthAs: Internal
X-MS-Exchange-CrossTenant-AuthSource: BN7PR11MB2547.namprd11.prod.outlook.com
X-MS-Exchange-CrossTenant-Network-Message-Id: a5f39cd4-0b2b-42f4-2999-08d8b9a564e7
X-MS-Exchange-CrossTenant-originalarrivaltime: 15 Jan 2021 22:32:08.5938 (UTC)
X-MS-Exchange-CrossTenant-fromentityheader: Hosted
X-MS-Exchange-CrossTenant-id: 5ae1af62-9505-4097-a69a-c1553ef7840e
X-MS-Exchange-CrossTenant-mailboxtype: HOSTED
X-MS-Exchange-CrossTenant-userprincipalname: Il30PCKbmTe4dDcpIuUFF8TC+Dq5KhxfusAFiGfBKakXTTUsKSB307VJ+gzxa1p+
X-MS-Exchange-Transport-CrossTenantHeadersStamped: BN6PR1101MB2228
X-OriginatorOrg: cisco.com
X-Outbound-SMTP-Client: 173.37.102.11, xch-rcd-001.cisco.com
X-Outbound-Node: alln-core-9.cisco.com
Archived-At: <https://mailarchive.ietf.org/arch/msg/ipv6/wgEXQ9236TwpfkPIASatJsBbn9k>
X-BeenThere: ipv6@ietf.org
X-Mailman-Version: 2.1.29
Precedence: list
List-Id: "IPv6 Maintenance Working Group \(6man\)" <ipv6.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/ipv6>, <mailto:ipv6-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/ipv6/>
List-Post: <mailto:ipv6@ietf.org>
List-Help: <mailto:ipv6-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/ipv6>, <mailto:ipv6-request@ietf.org?subject=subscribe>
X-List-Received-Date: Fri, 15 Jan 2021 22:32:16 -0000

Yes, we could have done that. We could have just had DUID-EN and used that for all DUID types.

But the reason to standardize some types is their expected usage – the existing formats (except DUID-EN) are designed to be used by almost all devices and there are reasons specified for using one of the types over the other. Use DUID-LLT unless the link-layer is “locked” to device. DUID-UUID can be used if this is available on the hardware platform as it may require no persistent storage or resolves the issue when DUID-LLT has to be used by both a low-level boot loader (that doesn’t know where the OS stored the DUID-LLT). So, it is pretty clear which of these to use (DUID-EN if applicable, DUID-UUID if possible, DUID-LLT, or finally DUID-LL).

Some standards organization also require use of one type (such as Cable Modems should use DUID-LL).

DUID-EN was designed to allow vendors (or standards bodies for specific technologies) to define a different type for their purposes (not for standard operating systems like Linux to default to but nothing prevents them from being configured to use). The vendor is responsible for assuring the uniqueness and this was generally assumed to be something “burned” into hardware. So, using it was pretty clear.

If a specific application comes along where it needs a different identity for some reason but that is specific to that application, the DUID-EN was what is expected to be used.

When there is a broad benefit to the community at large, that’s when to consider a new DUID type (not DUID-EN).

So, the question that we need answer is when should something use DUID-new type over the other types.

You might say, well just use it if you have a “globally unique address”? But then the questions are:

  *   If this is a general purpose OS, and it boots via a boot loader that needs an address but there is no “global address”, what does it use?
  *   If it started to use an existing type before it got a “global address”, when should it start using the DUID-new type? It could be using active leases under the old DUID.
  *   Where will this global address be stored (persisted) so that it continues to be available “forever”?
  *   What happens if the global address is changed? Does the device keep using it since it is it’s DUID. But then what happens to a new device that gets that “old” global address – how does it know it MUST NOT use the DUID? The draft mentions nothing about what happens when the node / global address relation is ended for some reason (whether administratively done or as result of the “generation technique” where some input might change). As you state “The DUID-V6ADDR format makes no statement about the method used for generating the IPv6 address” but it also says nothing about how “permanent” that generated address must be and how changes to it are handled by a client that has been using it for a DUID-V6ADDR.
BTW: This is why DUID-LLT exists as the network card could be moved to a new device, but the time helps to differentiate the two DUIDs.

For the DUID-UUID it is clearly presumed that this is PERMANENTLY assigned value to the device.

Formatting the data is the easy part – yes put some bits here and there. But the usage is what is critical to define and do it in a way that creates no possible issues (or at least guidance about what the issues may be and how they could be resolved).

Those are some of the things you must properly motivate.

Once you do that and how well you do that should make deciding whether to move forward with DUID-new type or tell you to use DUID-EN as then many of these issues are NOT the responsibility of the IETF. For IETF standardized types, we want to make sure that how and when they are used is clear and that (to a reasonable ability) we prevent issues and possible collisions.

The earlier days of DHCPv6 were not easy as there were plenty of issues with DUIDs .. one operating system vendor’s host cloning failed to clear the DUID and so someone that cloned a bunch of hosts would end up with them all having the same DUID.

This is the reason why DUIDs are Standards Action as we need all of the issues thought through carefully and to give implementers guidance on when one type should be used over another.

Warning: I am not saying that my above questions are all there is.

Hope that helps as to why the bar for new DUID-types needs to be high.


  *   Bernie

From: Templin (US), Fred L <Fred.L.Templin@boeing.com>
Sent: Friday, January 15, 2021 4:30 PM
To: Bernie Volz (volz) <volz@cisco.com>; Ted Lemon <mellon@fugue.com>
Cc: Bob Hinden <bob.hinden@gmail.com>; dhcwg <dhcwg@ietf.org>; IPv6 List <ipv6@ietf.org>; Dickson (US), Sean M <sean.m.dickson@boeing.com>
Subject: RE: I-D Action: draft-templin-duid-ipv6-01.txt

Bernie, using your logic UUIDs could also have gone into DUID-EN under some
arbitrary PEN code. But, they weren’t; they were *standardized* as DUID-UUID
which elevates them in standing as equals to all other forms of DUIDs. Nothing less
will suffice for DUIDs that would be based on IPv6 addresses that are specifically
generated as unique Identifiers for a node.

Fred

From: Bernie Volz (volz) [mailto:volz@cisco.com]
Sent: Friday, January 15, 2021 1:21 PM
To: Templin (US), Fred L <Fred.L.Templin@boeing.com<mailto:Fred.L.Templin@boeing.com>>; Ted Lemon <mellon@fugue.com<mailto:mellon@fugue.com>>
Cc: Bob Hinden <bob.hinden@gmail.com<mailto:bob.hinden@gmail.com>>; dhcwg <dhcwg@ietf.org<mailto:dhcwg@ietf.org>>; IPv6 List <ipv6@ietf.org<mailto:ipv6@ietf.org>>; Dickson (US), Sean M <sean.m.dickson@boeing.com<mailto:sean.m.dickson@boeing.com>>
Subject: [EXTERNAL] RE: I-D Action: draft-templin-duid-ipv6-01.txt

Also, I really have no idea what you mean by “under the care of an arbitrary DUID-EN PEN code”.

After all, this is just about a [unique] identifier isn’t it?

This isn’t putting anything “under the care of”. It is just the way it is communicating between DHCP client and servers and for the client (or perhaps server since it could use DUID-EN too) to identifier itself as a “different” device than another.


  *   Bernie

From: Templin (US), Fred L <Fred.L.Templin@boeing.com<mailto:Fred.L.Templin@boeing.com>>
Sent: Friday, January 15, 2021 4:13 PM
To: Bernie Volz (volz) <volz@cisco.com<mailto:volz@cisco.com>>; Ted Lemon <mellon@fugue.com<mailto:mellon@fugue.com>>
Cc: Bob Hinden <bob.hinden@gmail.com<mailto:bob.hinden@gmail.com>>; dhcwg <dhcwg@ietf.org<mailto:dhcwg@ietf.org>>; IPv6 List <ipv6@ietf.org<mailto:ipv6@ietf.org>>; Dickson (US), Sean M <sean.m.dickson@boeing.com<mailto:sean.m.dickson@boeing.com>>
Subject: RE: I-D Action: draft-templin-duid-ipv6-01.txt

Bernie, putting the entire global IPv6 unicast address space under the care of an
arbitrary DUID-EN PEN code would be like sending Biden to the inauguration on
a bicycle. You don’t transport VIPs to big events on vehicles made of tinker toys;
you give them a full-length limo and full escort.

Fred

From: Bernie Volz (volz) [mailto:volz@cisco.com]
Sent: Friday, January 15, 2021 1:05 PM
To: Templin (US), Fred L <Fred.L.Templin@boeing.com<mailto:Fred.L.Templin@boeing.com>>; Ted Lemon <mellon@fugue.com<mailto:mellon@fugue.com>>
Cc: Bob Hinden <bob.hinden@gmail.com<mailto:bob.hinden@gmail.com>>; dhcwg <dhcwg@ietf.org<mailto:dhcwg@ietf.org>>; IPv6 List <ipv6@ietf.org<mailto:ipv6@ietf.org>>; Dickson (US), Sean M <sean.m.dickson@boeing.com<mailto:sean.m.dickson@boeing.com>>
Subject: RE: I-D Action: draft-templin-duid-ipv6-01.txt

That anyone can get a PEN code has no bearing on this – the DUID-EN is still standards track because YOUR PEN will be different than someone else’s and hence their format does not “collide” with yours because the Enterprise IDs are different.

This enterprise id has been very successfully used in the vendor class and vendor options (see RFC8415 sections 21.16 and 21.17). Cablelabs and other standards groups use these very heavily to provide for additional information that a vendor (or standards organization) needs to provide their devices. See for example https://community.cablelabs.com/wiki/plugins/servlet/cablelabs/alfresco/download?id=b74c68d8-b6af-45e6-81bf-936004d0273f.

> That, plus I don’t want to carry around the extra 4 bytes for a PEN code…

That’s life. There’s a lot of things I don’t want but have no choice over.


  *   Bernie

From: Templin (US), Fred L <Fred.L.Templin@boeing.com<mailto:Fred.L.Templin@boeing.com>>
Sent: Friday, January 15, 2021 3:54 PM
To: Ted Lemon <mellon@fugue.com<mailto:mellon@fugue.com>>
Cc: Bernie Volz (volz) <volz@cisco.com<mailto:volz@cisco.com>>; Bob Hinden <bob.hinden@gmail.com<mailto:bob.hinden@gmail.com>>; dhcwg <dhcwg@ietf.org<mailto:dhcwg@ietf.org>>; IPv6 List <ipv6@ietf.org<mailto:ipv6@ietf.org>>; Dickson (US), Sean M <sean.m.dickson@boeing.com<mailto:sean.m.dickson@boeing.com>>
Subject: Re: I-D Action: draft-templin-duid-ipv6-01.txt

Ted, the allocation policy for the Private Enterprise Number (PEN) code for users
of DUID-EN is not Standards Track; anyone and their brother can easily obtain a
PEN code by filling out a simple form:

https://pen.iana.org/pen/PenApplication.page

I did one for “LinkUp Networks”, but that is not in any way tied to a Standards
Track RFC. IANA did not even ask me any questions; they simply allocated the
code for free. So, as far as standards status goes, an arbitrary PEN code has no
standing while the global IPv6 unicast address space has full Internet standards
status according to RFCs 4291 and 8200. I would therefore see it as a major
DOWNREF to entrust the entire IPv6 address space to any random person
who decided to register a PEN code.

That, plus I don’t want to carry around the extra 4 bytes for a PEN code…

Fred

From: Ted Lemon [mailto:mellon@fugue.com]
Sent: Friday, January 15, 2021 12:31 PM
To: Templin (US), Fred L <Fred.L.Templin@boeing.com<mailto:Fred.L.Templin@boeing.com>>
Cc: Bernie Volz (volz) <volz@cisco.com<mailto:volz@cisco.com>>; Bob Hinden <bob.hinden@gmail.com<mailto:bob.hinden@gmail.com>>; dhcwg <dhcwg@ietf.org<mailto:dhcwg@ietf.org>>; IPv6 List <ipv6@ietf.org<mailto:ipv6@ietf.org>>; Dickson (US), Sean M <sean.m.dickson@boeing.com<mailto:sean.m.dickson@boeing.com>>
Subject: [EXTERNAL] Re: I-D Action: draft-templin-duid-ipv6-01.txt

On Jan 15, 2021, at 3:25 PM, Templin (US), Fred L <Fred.L.Templin@boeing.com<mailto:Fred.L.Templin@boeing.com>> wrote:
using DUID-EN with some
arbitrary PEN code to encode the entire global IPv6 unicast address space would
IMHO be an unacceptable DOWNREF.

You said this before. I don’t understand what this means. DUID-EN is in a standards track RFC. How is this a DOWNREF? And why use an arbitrary enterprise number?