Re: [v6ops] Scope of Unique Local IPv6 Unicast Addresses (Fwd: New Version Notification for draft-gont-6man-ipv6-ula-scope-00.txt)

Ted Lemon <mellon@fugue.com> Sun, 14 February 2021 21:32 UTC

Return-Path: <mellon@fugue.com>
X-Original-To: v6ops@ietfa.amsl.com
Delivered-To: v6ops@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id F33933A0C32 for <v6ops@ietfa.amsl.com>; Sun, 14 Feb 2021 13:32:38 -0800 (PST)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: 0.002
X-Spam-Level:
X-Spam-Status: No, score=0.002 tagged_above=-999 required=5 tests=[DKIM_SIGNED=0.1, DKIM_VALID=-0.1, HTML_MESSAGE=0.001, SPF_HELO_NONE=0.001, SPF_PASS=-0.001, URIBL_BLOCKED=0.001] autolearn=unavailable autolearn_force=no
Authentication-Results: ietfa.amsl.com (amavisd-new); dkim=pass (2048-bit key) header.d=fugue-com.20150623.gappssmtp.com
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id g5_-p_iGAUKT for <v6ops@ietfa.amsl.com>; Sun, 14 Feb 2021 13:32:36 -0800 (PST)
Received: from mail-qt1-x835.google.com (mail-qt1-x835.google.com [IPv6:2607:f8b0:4864:20::835]) (using TLSv1.2 with cipher ECDHE-RSA-AES128-GCM-SHA256 (128/128 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id ECDF13A0C00 for <v6ops@ietf.org>; Sun, 14 Feb 2021 13:32:35 -0800 (PST)
Received: by mail-qt1-x835.google.com with SMTP id o21so3679809qtr.3 for <v6ops@ietf.org>; Sun, 14 Feb 2021 13:32:35 -0800 (PST)
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=fugue-com.20150623.gappssmtp.com; s=20150623; h=from:message-id:mime-version:subject:date:in-reply-to:cc:to :references; bh=EKXJVAMvY8RyKKdx6wJy+uUkRLU2zrc4fcBYbsCg5b0=; b=jref9YLizLA8HLx2Wb0GLnpbiT8YWwnFB5BlL0BkmprQ4wohxqpaC57lv1PnwoCJtU o2CGr9diy+myvm27FIH1DXH7SRl+VElcMvBPEPKbc9+jwjf9CyIjKiQgDfD/VM10Xp1O LvJnShdd1GESyrqM9RGcERhXaEzgswMzhbOqoFfRvhbjJXTZKhv7aFz4F91QuW3669bS qzJlYbz+OBDh8alupNvhNhZ8HJy2FIIISnEmho1jyLHwTdk78be5L+pGOR0nfeqRrAmC nH4ILjK2/xEBbCmgOm5Ai60pZ2whixnhm0QTwCZyivxvG9oJJxz38OmZ0mMumAvk7MNX crwQ==
X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20161025; h=x-gm-message-state:from:message-id:mime-version:subject:date :in-reply-to:cc:to:references; bh=EKXJVAMvY8RyKKdx6wJy+uUkRLU2zrc4fcBYbsCg5b0=; b=kfSHUrohQX8lbYiyTznoNqzyuLn2H477Ijmgc3mF52CQCCB3VAUn+oqS6zWuuZD5DN rGRVCeymALnODqxh4Coz/Jtwp6K9MnV1aheRM088HIs3SdLzkPRIkD1/w7OwLf+jOYiH MzlKtFD3A28M/RuO/m2Yt2mQCper3f/cYyTH8B+lhHm2t/oEam5aW0J7dtc59f+zb9D/ XwsW3SFaH81bbHkle30xxQYSHMDjvasXlfMPGgR2/rEgjKZYpWsXRJkz0+4Nq4fLn1MP JM6nnHq0zAXxUfAF3Pvk9KgfruUV7o0zBAKMoRxDb/iAU0DF1kTm8FojxW+Iw6AMcBye H4Iw==
X-Gm-Message-State: AOAM532ZbaP9ikK4y0I9FFZ0oWXpylqglOjyofgtbQx7v4XKVksaObWP xBw4nv89to/VJao0D7vt2Hhr2w==
X-Google-Smtp-Source: ABdhPJxgVYA7IS+xCPP3T/KjkjbU43mAGKW0XBgl4Nz07azNE1jygUdjuqWsFAR586LeuprKfos9Wg==
X-Received: by 2002:ac8:5852:: with SMTP id h18mr11650743qth.357.1613338354831; Sun, 14 Feb 2021 13:32:34 -0800 (PST)
Received: from smtpclient.apple (c-24-91-177-160.hsd1.nh.comcast.net. [24.91.177.160]) by smtp.gmail.com with ESMTPSA id 82sm11143634qkd.48.2021.02.14.13.32.34 (version=TLS1_2 cipher=ECDHE-ECDSA-AES128-GCM-SHA256 bits=128/128); Sun, 14 Feb 2021 13:32:34 -0800 (PST)
From: Ted Lemon <mellon@fugue.com>
Message-Id: <EED3FE0C-1CE6-4472-895A-7BA6C6A998F3@fugue.com>
Content-Type: multipart/alternative; boundary="Apple-Mail=_0406F721-B461-40AE-B030-D9B3FCBCB563"
Mime-Version: 1.0 (Mac OS X Mail 14.0 \(3654.80.0.2.32\))
Date: Sun, 14 Feb 2021 16:32:33 -0500
In-Reply-To: <CAN-Dau0JsMJ6Ad1pqeEKSKpRiSXDibMG4yKdVOKL4uFoqi5sAQ@mail.gmail.com>
Cc: Brian E Carpenter <brian.e.carpenter@gmail.com>, Fernando Gont <fgont@si6networks.com>, IPv6 Operations <v6ops@ietf.org>, "6man@ietf.org" <6man@ietf.org>
To: David Farmer <farmer@umn.edu>
References: <160989494094.6024.7402128068704112703@ietfa.amsl.com> <6fe3a45e-de65-9f88-808d-ea7e2abdcd16@si6networks.com> <F4E00812-E366-4520-AE17-7BB46E28D575@gmail.com> <CAN-Dau3iOjjU+FLpdtA7nqfKRX+sjjSanAU8U-O3pH-k5nSoig@mail.gmail.com> <a3fbfb94-90ae-961c-a2ab-33ade27e074e@si6networks.com> <672bd5e6-bdce-5915-1082-1ed30d3c5980@gmail.com> <CAN-Dau1CvbwZccq2Zyr8xBkiW1z0nKX_YcGW-y3VL7=pm+wA+w@mail.gmail.com> <227CDF8C-E929-4AA5-9D24-733381EB5C69@fugue.com> <CAN-Dau0JsMJ6Ad1pqeEKSKpRiSXDibMG4yKdVOKL4uFoqi5sAQ@mail.gmail.com>
X-Mailer: Apple Mail (2.3654.80.0.2.32)
Archived-At: <https://mailarchive.ietf.org/arch/msg/v6ops/37EvspWEuAVA8dhjT4iqEjR8S08>
Subject: Re: [v6ops] Scope of Unique Local IPv6 Unicast Addresses (Fwd: New Version Notification for draft-gont-6man-ipv6-ula-scope-00.txt)
X-BeenThere: v6ops@ietf.org
X-Mailman-Version: 2.1.29
Precedence: list
List-Id: v6ops discussion list <v6ops.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/v6ops>, <mailto:v6ops-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/v6ops/>
List-Post: <mailto:v6ops@ietf.org>
List-Help: <mailto:v6ops-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/v6ops>, <mailto:v6ops-request@ietf.org?subject=subscribe>
X-List-Received-Date: Sun, 14 Feb 2021 21:32:44 -0000

On Feb 14, 2021, at 4:00 PM, David Farmer <farmer@umn.edu> wrote:
> So I recommend a small update to RFC4007, further quantify the necessary uniqueness;
> 
> Global scope, for uniquely identifying interfaces anywhere in the Internet *or within the span of reachability for local-use addresses.*

I think this whole discussion may have something to do with why site-local was deprecated, although I’m just guessing because I didn’t participate in that discussion.

My question to you is this: how does your proposed update help anybody to understand?

If we were to update the text, I would suggest something like this:

Global scope, for uniquely identifying interfaces anywhere on the Internet. Note that when we say an address is “globally unique,” this is a definitional assertion: such an address is to be treated as globally unique by hosts and routers. Mechanisms for ensuring that this definitional assertion is not violated exist for each type of globally scoped address, and in some cases rather than ensuring that a globally /scoped/ address is in fact unique, these mechanisms ensure that the use of such addresses is constrained to contexts in which they are /known/ to be unique.