Re: New Version Notification for draft-troan-6man-universal-ra-option-03.txt

otroan@employees.org Wed, 07 October 2020 14:48 UTC

Return-Path: <otroan@employees.org>
X-Original-To: ipv6@ietfa.amsl.com
Delivered-To: ipv6@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id C13B23A09CC for <ipv6@ietfa.amsl.com>; Wed, 7 Oct 2020 07:48:01 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -1.9
X-Spam-Level:
X-Spam-Status: No, score=-1.9 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, SPF_HELO_NONE=0.001, SPF_PASS=-0.001] autolearn=ham autolearn_force=no
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id 7gqAA755SRCw for <ipv6@ietfa.amsl.com>; Wed, 7 Oct 2020 07:48:00 -0700 (PDT)
Received: from clarinet.employees.org (clarinet.employees.org [198.137.202.74]) (using TLSv1.2 with cipher ADH-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id C677C3A09C1 for <ipv6@ietf.org>; Wed, 7 Oct 2020 07:47:52 -0700 (PDT)
Received: from astfgl.hanazo.no (201.51-175-101.customer.lyse.net [51.175.101.201]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by clarinet.employees.org (Postfix) with ESMTPSA id F0F344E11B88; Wed, 7 Oct 2020 14:47:51 +0000 (UTC)
Received: from [IPv6:::1] (localhost [IPv6:::1]) by astfgl.hanazo.no (Postfix) with ESMTP id 19D1A4031247; Wed, 7 Oct 2020 16:47:50 +0200 (CEST)
Content-Type: text/plain; charset="us-ascii"
Mime-Version: 1.0 (Mac OS X Mail 13.4 \(3608.120.23.2.4\))
Subject: Re: New Version Notification for draft-troan-6man-universal-ra-option-03.txt
From: otroan@employees.org
In-Reply-To: <m1kQ9tr-0000KEC@stereo.hq.phicoh.net>
Date: Wed, 07 Oct 2020 16:47:49 +0200
Cc: 6man WG <ipv6@ietf.org>
Content-Transfer-Encoding: quoted-printable
Message-Id: <9FB26236-5D9F-433C-8B79-B17F6D337664@employees.org>
References: <160201571921.22183.2288394613501535041@ietfa.amsl.com> <FAA42031-FAF9-4F1E-A702-3B4F27375F4F@employees.org> <m1kQ8qM-0000FiC@stereo.hq.phicoh.net> <066A5931-E009-4610-B679-86A8F495A131@employees.org> <m1kQ9tr-0000KEC@stereo.hq.phicoh.net>
To: Philip Homburg <pch-ipv6-ietf-6@u-1.phicoh.com>
X-Mailer: Apple Mail (2.3608.120.23.2.4)
Archived-At: <https://mailarchive.ietf.org/arch/msg/ipv6/yzU0vmhdosj0ImcayJUshSQWL0A>
X-BeenThere: ipv6@ietf.org
X-Mailman-Version: 2.1.29
Precedence: list
List-Id: "IPv6 Maintenance Working Group \(6man\)" <ipv6.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/ipv6>, <mailto:ipv6-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/ipv6/>
List-Post: <mailto:ipv6@ietf.org>
List-Help: <mailto:ipv6-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/ipv6>, <mailto:ipv6-request@ietf.org?subject=subscribe>
X-List-Received-Date: Wed, 07 Oct 2020 14:48:02 -0000

Philip,

>> The idea of the encoding is to use a higher level more modern level
>> abstraction.  Parsing implementation would be done once for all
>> possible options, and most likely an implementor of the general
>> option could use existing libraries for that.
> 
> This means extra code which could be an issue for embedded systems. For 
> systems that process RAs in the operation system kernel, this may mean linking
> with a library that potentially causes remotely expoitable security holes.

The CBOR parser is quite simple. Having one parser for all options is possibly more efficient that having to parse each option separately with it's different representations of IPV6 prefixes etc. Same thing might apply security wise too, although allowing for passing "anything" might also open new security issues in implementation.

> 
>> So while the work of supporting the option infrastructure in itself
>> is more work than the simple TVL option, adding new data to the
>> option has very little overhead.  The architectural change that
>> this brings, is that no longer is changes to router operating
>> systems or the host stack kernel required.  
> 
> I don't think something like CBOR is required for this. A router can have
> a setup where an external service supplies options. 
> 
> The DHCP world never felt the need to come up with a high level encoding and
> DHCP has a huge number of options.

No, CBOR isn't required. The original proposal was to carry text encoded JSON objects.
The previous discussions on this draft resulted in CBOR as a more effective encoding.
Using CDDL also gives us a modelling language.

> 
>>> However, the complete syntax for an option still needs the names of fields,
>>> use of arrays and dicts, etc.
>> 
>> Right, that's modelled in CDDL in the IANA registry.
> 
> I don't think it is progress to publish protocols in the IANA registry.
> The IANA registry should be for code points (private or public) and data
> extracted from RFCs.
> 
> I think it would be really bad if IANA would be the sole place where 
> essential RAs options are decribed. 

It depends.
If I develop an application that just needs a configuration option from the network, then fine.
Like e.g. the boot URL option that's been suggested in 6man.
If it's an option that revamps the behaviour of the whole host stack, whatever that would be, perhaps not.

> 
>> Why would an option be "standards track"? Nothing prohibiting
>> standards track for a universal configuration option either, but
>> the proposal here is that only expert review is required to define
>> new options.
> 
> To give a couple of examples:
> 1) For some reason we don't have a DHCPv6 option for default router. This is
>   commonly requested, is not a particularly complex option, and DHCPv6 
>   has plenty of code points. This is a discussion we should have out in the
>   open, but as some expert review for an IANA registry.
> 
> 2) We have a DHCPv6 IA_PD with poorly defined semantics. Again, a simple
>   option but with complex semantics. This is again a case where we should
>   have a public discussion.
> 
> 3) We had an endless discussion about an 'IPV4-only' option. Again this 
>   requires more discussion than just a bit of expert review.
> 
> I think that all options that we want to rely on in other RFCs should be
> standards track. Yes, if some vendor has a private light bulb protocol, it
> should be easy to get a code point for that. But anything that is required
> for most routers or hosts should have rough consensus.

This option would resolve all those discussions. It's partly a proposal to free all the time spent on 6man solutions. ;-)
(only partly tongue in cheek).

Best regards,
Ole