[v6ops] Review of draft-ietf-v6ops-nd-considerations-01

"Pascal Thubert (pthubert)" <pthubert@cisco.com> Wed, 28 June 2023 07:31 UTC

Return-Path: <pthubert@cisco.com>
X-Original-To: v6ops@ietfa.amsl.com
Delivered-To: v6ops@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id C6B79C151099 for <v6ops@ietfa.amsl.com>; Wed, 28 Jun 2023 00:31:24 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -14.595
X-Spam-Level:
X-Spam-Status: No, score=-14.595 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, DKIMWL_WL_HIGH=-0.001, DKIMWL_WL_MED=-0.001, DKIM_SIGNED=0.1, DKIM_VALID=-0.1, DKIM_VALID_AU=-0.1, DKIM_VALID_EF=-0.1, RCVD_IN_DNSWL_HI=-5, RCVD_IN_MSPIKE_H5=0.001, RCVD_IN_MSPIKE_WL=0.001, RCVD_IN_ZEN_BLOCKED_OPENDNS=0.001, SPF_NONE=0.001, URIBL_BLOCKED=0.001, URIBL_DBL_BLOCKED_OPENDNS=0.001, URIBL_ZEN_BLOCKED_OPENDNS=0.001, USER_IN_DEF_DKIM_WL=-7.5] autolearn=ham autolearn_force=no
Authentication-Results: ietfa.amsl.com (amavisd-new); dkim=pass (1024-bit key) header.d=cisco.com header.b="Fb2bdVrm"; dkim=pass (1024-bit key) header.d=cisco.com header.b="DeGpNZQ/"
Received: from mail.ietf.org ([50.223.129.194]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id yd6Rb6ID0MEn for <v6ops@ietfa.amsl.com>; Wed, 28 Jun 2023 00:31:19 -0700 (PDT)
Received: from rcdn-iport-1.cisco.com (rcdn-iport-1.cisco.com [173.37.86.72]) (using TLSv1.2 with cipher DHE-RSA-SEED-SHA (128/128 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id 53F50C15106D for <v6ops@ietf.org>; Wed, 28 Jun 2023 00:31:19 -0700 (PDT)
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/simple; d=cisco.com; i=@cisco.com; l=9909; q=dns/txt; s=iport; t=1687937479; x=1689147079; h=from:to:subject:date:message-id: content-transfer-encoding:mime-version; bh=RcKpKYhMyripURakmdsPJSaO+bMOUtae9SIM12soBYw=; b=Fb2bdVrmAZ++OnHWeCiMYnwU39aCIG3V2gufCJJec/q+1I2iDSCnyebP 2VjzRpGq8CeXlbXZalT9a/U/iwfuOAVNNjmkOwAbE9dc47o7UvwVVxGik JmbIo/W0pSxB6MT888S9wX75LcWgdM729I1NhiOUsTD0NLg6U24vjDXKy U=;
X-IPAS-Result: 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
IronPort-PHdr: A9a23:z2esvRSdRw0pALMDYCLxO8o7KNpso3PLVj580XJvo6hFfqLm+IztI wmCo/5sl1TOG47c7qEMh+nXtvX4UHcbqdaasX8EeYBRTRJNl8gMngIhDcLEQU32JfLndWo7S exJVURu+DewNk0GUN3maQjqq2appSUXBg25MAN0IurvHYuHl9i3yuq/4YH7aARTjz37arR3f 126qAzLvZwOiJB5YuYpnwLUq2FBffhXw24gKVOIyhD74MrxtJI2+CVLsPVn/MlFOZg=
IronPort-Data: A9a23:QLKtKqukte+0Ymhw2p9bKRC08ufnVDReMUV32f8akzHdYApBsoF/q tZmKT2BaP3YamL8Kd90YYi3ph4D7MOAzNJiTVdtqH80QylGgMeUXt7xwmUckM+xwmwvaGo9s q3yv/GZdJhcokf0/0vrav67xZVF/fngqoDUUIYoAQgvA1c9IMsdoUg7wbVh3NQ42YHR7z6l4 LseneWOYDdJ5BYsWo4kw/rrRMRH5amaVJsw5zTSVNgT1LPsvyB94KE3ecldG0DFrrx8RYZWc QpsIIaRpQs19z91Yj+sfy2SnkciGtY+NiDW4pZatjTLbhVq/kQPPqgH2PU0Shle0QePhtFIm MgKhKSgbhkJN7PIsbFIO/VYO3kW0axu4rTLJz20ttaeihGAeHr3yPIoB0YzVWEa0r8oWicVq rpJc3ZUM03ra+GemNpXTsF0msQ+JsTxIKsUu2prynfSCvNOrZXrHPSWtYcHjG5YasZmHtuGV 8AeWwBURQnCRycMYQ4GBqsjpbL97pX4W2QI9A3KzUYt2EDNkgtpy5DsPcbbPNuQSq1ocl2wv GnK+SHyBQsXcYDZwjue+XXqjejK9c/mZG4MPJ7m/6RYhkSS/zwOTywuRXylgfCnjmfrDrqzN Hco0iYpqKEz8mmiQd/8QwC0rRa4Uvg0BoQ4/woStV/l90bE3+qKLjNbEWMZObTKoOdzFGN6j AbY9z/8LWU36OX9dJ6LyluDQdqP1cU9N2QOY2oPShEIpoWlq4AohRWJRdFmeEJUsjEXMW+pq 9xphHFu71n2sSLt//7qlbwgq270zqUltiZvum3qspuNt2uVnrKNaY2y8kT85v1dNoufRVTpl CFay5fOvbhQVsrXy3zlrAAx8FeBua7t3Nr03wYHInXd32/FF4OLJNoJu2gueC+FzO5dIGK3C KMshe+hzMYDYCT1BUOGS4mwEM8thbPxDsjoU+u8Uza9SsYZSeNzxwk3PRT49zm0yCAEyPhvU b/FKpzEJShBVsxaIM+eGr11PUkDnH5unAs+hPnTknya7FZpTCTFFOpdawTQMr1RAWHtiFy9z uuz/vCikn13eOb/eSLQt4UUKDg3wbITXPgad+Q/mja/Hzdb
IronPort-HdrOrdr: A9a23:KApQDaHpxkevhb1bpLqFVJHXdLJyesId70hD6qkvc31om52j+f xGws516fatskdqZJhBo7q90dq7MA7hHPlOkMMs1NaZLULbUQ6TTL2KgrGSuwEIdxeOk9K1tp 0QPpSWaueAdmSS5PySiGLVYrVQouVvm5rY4ts2uk0dND2CHJsQiTuRZDzrdnGeQjMqObMJUL 6nouZXrTupfnoaKu6hAGMeYuTFr9rX0Lr7fB8vHXccmUazpALtzIS/PwmT3x8YXT8K66wl63 L5nwvw4bjmm+2nyyXby3TY4/1t6ZXcI5p4dY2xY/ouW3bRYzWTFcZcsnq5zXUISdSUmRYXeR /30lMd1opImjTslyqO0GfQMkHboUkTAjnZuBOlab+Jm72heNr8YPAxw76wfnbimjQdlcA536 RR022DsZ1LSRvGgSTm/tDNEwpnj0yuvBMZ4JguZlFkIP8jgYVq3Psi1VIQFI1FEDPx6YghHu UrBMbA5OxOeVffa3zCpGFgzNGlQ3x2R369MwA/k93Q1yITkGFyzkMeysBalnAc9IglQ50B4+ jfKKxnmLxHU8dTZ6NgA+UKR9exFwX2MFvxGXPXJU6iGLAMOnrLpZKy6LIp5PuycJhN15c2kI SpaiIsiYfzQTOdNSSj5uw5zvmWehTNYd3E8LAv26RE
X-Talos-CUID: 9a23:9gNqPm541QV0OhnhnNss1xAdQPIja3zknGqXEneoLnhJQaORYArF
X-Talos-MUID: 9a23:LwsbYw1UzD09qaqE7Vp8CwFlxzUj4In2OEoKo689ktSGERYzYG6Mgg2qe9py
X-IronPort-Anti-Spam-Filtered: true
Received: from rcdn-core-4.cisco.com ([173.37.93.155]) by rcdn-iport-1.cisco.com with ESMTP/TLS/DHE-RSA-SEED-SHA; 28 Jun 2023 07:31:18 +0000
Received: from rcdn-opgw-5.cisco.com (rcdn-opgw-5.cisco.com [72.163.7.169]) by rcdn-core-4.cisco.com (8.15.2/8.15.2) with ESMTPS id 35S7VBYU002208 (version=TLSv1.2 cipher=DHE-RSA-AES256-GCM-SHA384 bits=256 verify=OK) for <v6ops@ietf.org>; Wed, 28 Jun 2023 07:31:14 GMT
Authentication-Results: rcdn-opgw-5.cisco.com; dkim=pass (signature verified) header.i=@cisco.com; spf=Pass smtp.mailfrom=pthubert@cisco.com; dmarc=pass (p=quarantine dis=none) d=cisco.com
X-IronPort-AV: E=Sophos;i="6.01,164,1684800000"; d="scan'208";a="3542395"
Received: from mail-dm6nam12lp2176.outbound.protection.outlook.com (HELO NAM12-DM6-obe.outbound.protection.outlook.com) ([104.47.59.176]) by rcdn-opgw-5.cisco.com with ESMTP/TLS/ECDHE-RSA-AES256-GCM-SHA384; 28 Jun 2023 07:31:10 +0000
ARC-Seal: i=1; a=rsa-sha256; s=arcselector9901; d=microsoft.com; cv=none; b=hVZ1Bt50r7dcb1EMneOU+X+e2HnGgYI69HGBDfTAik4t4uL2lyI5TBcgFyNpq/Rabb0SOQLsGpwvoXoQKgV5arawrSbGti8KKa0qZLPTLYnZe0XZXyJlZJEg1DPHhI2m1IgyHuNDf2ZOki6OFKP7fELkzyiU33geUxHJ8Xi1GX4RGUgCrsvVor8Bdrx3KkZNiz7LCGwBYaxVFI0GIPKvj+ViL1kPGFZks/qqd3upuE+hVmgr8ISoMSWa6lH7YNCjKXFO+g2sSanxuOt5Nai85txMDWUiTa3mItduT+HsXh1+3q95E78krdsOnfQq6hDOsj7WLWHvnR3i5eBdU4zt2g==
ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=microsoft.com; s=arcselector9901; h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-AntiSpam-MessageData-ChunkCount:X-MS-Exchange-AntiSpam-MessageData-0:X-MS-Exchange-AntiSpam-MessageData-1; bh=08IH0Wowh3SJM480XujbPl6YoUoUJ/dCOgYMA+ivIu0=; b=CuFB2B0If1MsXVvlkLyuSmMsXzbHSLzvG5k9+7sjmdGWSvRtpob5rQHWj19xt6B/9v1bd519/V21SqZjc8t8wiCQC31zaMUPZiGAarR2Z12piZ4kf3vmNUBgtBZL/ki05Y21sieT8ljOLJkkrZ0i12e0MSW8ZuyNHpZWaomaMcLXwf+5oTa04hq7UiNyowaLH0tfiSqFptddYXu+IiMQNj4FtY2xUlHjTybg9LAC+8NpdKR2pEjHSRHDtxfsWuL/jfF+nkN2jixvG3zjkgxFTLRdnCeh3l/ZiXIybzwu0SZtpdZ4yswSe5uxO5zqnKnB5YDOZJKeqPm+Nt0YRKYhhg==
ARC-Authentication-Results: i=1; mx.microsoft.com 1; spf=pass smtp.mailfrom=cisco.com; dmarc=pass action=none header.from=cisco.com; dkim=pass header.d=cisco.com; arc=none
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=cisco.com; s=selector1; h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-SenderADCheck; bh=08IH0Wowh3SJM480XujbPl6YoUoUJ/dCOgYMA+ivIu0=; b=DeGpNZQ/f/CAd1vsjCpPcRFdk+6/FUlMEu/fxDwZH/+Q5KF5QlMeBwzQk0lqkOvF0AvG+083RJheYPcXlVlaiw1t1F7jhfMF3WRXEeIyeG0b3MWJ2yWdW+R3vHFkULcS/i57iWXFaLwtF8B7anDDl+pdXO3HY+1MTFiksknSFq4=
Received: from CO1PR11MB4881.namprd11.prod.outlook.com (2603:10b6:303:91::20) by SN7PR11MB7466.namprd11.prod.outlook.com (2603:10b6:806:34c::6) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id 15.20.6521.26; Wed, 28 Jun 2023 07:31:09 +0000
Received: from CO1PR11MB4881.namprd11.prod.outlook.com ([fe80::140c:d7a2:4d4c:8739]) by CO1PR11MB4881.namprd11.prod.outlook.com ([fe80::140c:d7a2:4d4c:8739%7]) with mapi id 15.20.6521.026; Wed, 28 Jun 2023 07:31:09 +0000
From: "Pascal Thubert (pthubert)" <pthubert@cisco.com>
To: "IPv6 Operations (v6ops@ietf.org)" <v6ops@ietf.org>
Thread-Topic: Review of draft-ietf-v6ops-nd-considerations-01
Thread-Index: AQHZqQ9NuNlSM3fxjkG9vWpf8kvZYQ==
Date: Wed, 28 Jun 2023 07:31:09 +0000
Message-ID: <CO1PR11MB48817BABC3EF0628438BB9DAD827A@CO1PR11MB4881.namprd11.prod.outlook.com>
Accept-Language: fr-FR, en-US
Content-Language: fr-FR
X-MS-Has-Attach:
X-MS-TNEF-Correlator:
msip_labels:
x-ms-publictraffictype: Email
x-ms-traffictypediagnostic: CO1PR11MB4881:EE_|SN7PR11MB7466:EE_
x-ms-office365-filtering-correlation-id: effea580-8984-400c-2548-08db77a9a47a
x-ms-exchange-senderadcheck: 1
x-ms-exchange-antispam-relay: 0
x-microsoft-antispam: BCL:0;
x-microsoft-antispam-message-info: shquABRjVKxbOf88gSdhFC1VkpYfuGAtxAwNCkuDD3Z+jbWbOqIYSlZsdAkr7lHsXDH8HiLApQmGYRHk4A3uDKusW5eCE4o1vImhiC5A0aWM0GPP76+RcW6DVq4b+G0C7L7CtfmMEtEx2xLnaFUe0+f5usfIolSW4fqAXdKEd2hGPanVzSWyjMxn4pXv4VOzSMGmFyo9Ad7o7gYhaQ+YcA4F/pfn2jOy+d5suKqr9tTUf/9JjRsXDNsrjcAsgggVtAknLLHZ6U37VTTayQsll2ANtyYsj5D0HU8t6VITGyLJSfGoxgHtVvfr5wNTsiBwvu7U7f7h2DGLfpe4fKN88SgfqCKAVyVFzho2luyXHBgYo5ZXRD7mSKvxb8DBTSwuCpLtADLIkQIxwWNZFj0QZLGOab0V4K4DOgbUYyKomYYZ7WZrjwSiBP1AgiPNIcJfVA4KWrkk9Ckh523s5PXBSDesK1QC/q683f84A8V2Ma+LN3whLowYpVpEkP+SO1favj56Jt2/kGB5274fv+FZAyUGiXL5Q/MmjtnakqYIU//KGUCKVP8fa8W15aBFgaUH3LSRkbd2hqH7oBHhnoJi6WR6zTDm4TcG4FZT9IsZOO0=
x-forefront-antispam-report: CIP:255.255.255.255; CTRY:; LANG:en; SCL:1; SRV:; IPV:NLI; SFV:NSPM; H:CO1PR11MB4881.namprd11.prod.outlook.com; PTR:; CAT:NONE; SFS:(13230028)(366004)(39860400002)(136003)(396003)(376002)(346002)(451199021)(66899021)(6506007)(122000001)(52536014)(33656002)(76116006)(66476007)(5660300002)(86362001)(316002)(64756008)(6916009)(55016003)(66446008)(38070700005)(66556008)(41300700001)(8936002)(38100700002)(66946007)(8676002)(91956017)(966005)(66574015)(2906002)(9686003)(186003)(7696005)(26005)(71200400001)(478600001)(83380400001); DIR:OUT; SFP:1101;
x-ms-exchange-antispam-messagedata-chunkcount: 1
x-ms-exchange-antispam-messagedata-0: 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
Content-Type: text/plain; charset="iso-8859-1"
Content-Transfer-Encoding: quoted-printable
MIME-Version: 1.0
X-OriginatorOrg: cisco.com
X-MS-Exchange-CrossTenant-AuthAs: Internal
X-MS-Exchange-CrossTenant-AuthSource: CO1PR11MB4881.namprd11.prod.outlook.com
X-MS-Exchange-CrossTenant-Network-Message-Id: effea580-8984-400c-2548-08db77a9a47a
X-MS-Exchange-CrossTenant-originalarrivaltime: 28 Jun 2023 07:31:09.5305 (UTC)
X-MS-Exchange-CrossTenant-fromentityheader: Hosted
X-MS-Exchange-CrossTenant-id: 5ae1af62-9505-4097-a69a-c1553ef7840e
X-MS-Exchange-CrossTenant-mailboxtype: HOSTED
X-MS-Exchange-CrossTenant-userprincipalname: seLMuZBO+dluq9ZE/8/abe5h6fkx0kB/SG9KiLqliIvRM1VsoObEujqYQcc9/+JMxOtAlfHVtNMDZhvk2lXdjw==
X-MS-Exchange-Transport-CrossTenantHeadersStamped: SN7PR11MB7466
X-Outbound-SMTP-Client: 72.163.7.169, rcdn-opgw-5.cisco.com
X-Outbound-Node: rcdn-core-4.cisco.com
Archived-At: <https://mailarchive.ietf.org/arch/msg/v6ops/8GbS4B-ZWed-jAiaGvYwtVX4gX8>
Subject: [v6ops] Review of draft-ietf-v6ops-nd-considerations-01
X-BeenThere: v6ops@ietf.org
X-Mailman-Version: 2.1.39
Precedence: list
List-Id: v6ops discussion list <v6ops.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/v6ops>, <mailto:v6ops-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/v6ops/>
List-Post: <mailto:v6ops@ietf.org>
List-Help: <mailto:v6ops-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/v6ops>, <mailto:v6ops-request@ietf.org?subject=subscribe>
X-List-Received-Date: Wed, 28 Jun 2023 07:31:24 -0000

Dear authors;

please find some comments below:

General:

there's some overlap between section 3 here and section 3 of draft-ietf-6man-ipv6-over-wireless. Lorenzo and Jen suggested on the 6MAN list that there's too much stuff in draft-ietf-6man-ipv6-over-wireless. Would it make sense to merge it all in your document?


1. Introduction

"   Neighbor Discovery [ND] is specified in RFC 4861."

Arguably RFC 4862 should be listed too, since a number of the listed issues are related to SLAAC.

-------------

   "  5. When a packet is to be sent, hosts use multicast NSs to perform
        address resolution for the destination host."

->

   "  5. When a packet is to be sent to a destination that is determined to be on link, hosts use multicast NSs to perform address resolution for the destination host, and forward the packet to their default router otherwise."

--------

2. Review of ND Issues

Note that the section and the draft in general only observe a subset of the ND issues. Maybe it could be clarified that the draft is non exhaustive. 
https://www.ietf.org/archive/id/draft-ietf-6man-ipv6-over-wireless-04.html#name-issues-with-ipv6-nd-based-a list issues and references this document.


"ND uses multicast extensively for Node Solicitations (NSs), Router  Solicitations (RSs) and Router Advertisements (RAs). "

NA(O) can be sent to all hosts. Worth mentioning too?

---------

" This prolongs receiving time and consumes more power of the hosts."

maybe consider using "channel occupancy" or "air time" rather than "receiving time"

----------------

maybe split 2.3 to separate" NCE-on-Demand Causes Performance, NCE Exhaustion" and "Lack of Subscriber Management" Issues

----------

3.4. Wireless ND

6MAN decided to call it SND for Subnet ND. Maybe you could change all and reference draft-ietf-6man-ipv6-over-wireless for the definition of this and other terms like SGP?

---------

"Routers use unicast to communicate with hosts and  become the central address register and arbitrator for the hosts."
->
"Routers use unicast to communicate with hosts and form an abstract registrar and arbitrator for address ownership."

-------------------

"Trusting-all-host related issues may happen"
At least RFC 8928 mitigates SAVI issues. For RS multicast, they can be blocked by the first hop router which replies. The problem becomes trusting that router, which can be alleviated by section 9.2.4. of RFC 3971, though nobody seems interested in zerotrust in actual practice.

---------

"The switch will snoop and install (IP, MAC) proxy table for the local hosts. The switch will also reply to address resolution requests from other sites to its hosts with its own MAC. "

 This is sometimes called "Routing Proxy" (eg RFC 8929) by opposition of "bridging proxy" where the proxy replies with the MAC of the Target.

--------------

" This way, all hosts in a site will appear to have a single MAC to other sites."

This does not reduce the number of IP addresses nor the amount of lookups, does it?
The structure of NCEs may be optimized, though, but what really reduces the broadcast on the last hop is proxy ND by the switches for their attached nodes.  The problem of having a full state about all IP/MAC bindings remains the same as in the Wi-Fi proxy ARP function or in section 3.7

--------

"hosts send unsolicited Neighbor Advertisements upon having a new IPv6 address. "

Note that this creates a cache entry at the router at the creation of the address but does not maintain it. So it improves the situation but does not solve the issue.

------

"or perform Detecting Network Attachment in IPv6 (DNAv6) procedures [RFC6059] when waking up."

DNA does not protect a sleeping device from getting its addresses stolen while asleep. A sleep proxy is needed for that.

-----------


3.14.3. ND Proxy

Since you are at it, RFC 8929 is also an ND proxy, more targeted at the Wi-Fi type of situation. Maybe another section?

------------

4. Selectively Isolating Hosts to Prevent Potential ND Issues

Maybe add an informational ref to draft-levy-abegnoli-6man-stateless-nd-proxy ?

--------------


4. Selectively Isolating Hosts to Prevent Potential ND Issues

"Proxy isolation, used in SARP, ND Optimization for TRILL, Proxy ND in EVPN"

I believe a discussion on routing proxy vs bridging proxy would be useful. Some addresses like 802.15.4 are not bridgeable and a routing proxy is mandatory. And as you point out with FBB, routing proxy makes the L2 topology stable, and isolates the broadcast domains.  see RFC 8929.

--------

" But all messages with LLA can still reach other hosts. "

Not in the NBMA / MLTG case for which this was designed. The L2 broadcast domains are isolated and LLA communication is only available within one broadcast domain (e.g., an 802.11 ESS). A STA will find its printer in the attachment ESS, hopefully very local. 2 STAs attached to the same ESS with be able to talk to one another using LLA; but that's until one of the STAs moves to another AP in the same IP Subnet but not the same ESS, e.g., the next floor or the next building in the campus. GUA communication will remain through routing with the SGP. 

-----------

"dress registration and arbition [RFC8929]"

"arbition" -> arbitration?
better use a reference to SND [draft-ietf-6man-ipv6-over-wireless].

Note that RFC 8929 employs ND on the backbone to federate a split / distributed registrar whereby every L3 AP stores only the binding entries for the locally registered addresses. With EVPN, the registrar is completely synchronized on every hop using BGP. With LISP, it is fully centralized and the LISP implementation handles the high availability concerns as necessary. As you see, the concept of registrar in SND is very abstract and can be implemented in many ways.

--------

"
     . GUA Isolation (without link or subnet isolation)
 
"

I disagree with the without link isolation.  There's a shared subnet, but the MLTG model with an SGP is part of the story. It takes an upgrade of the host, but so do other solutions such as subnet isolation. 
----------

4.3. Applicability of Subnet Isolation with Shared Medium

Here a reference to draft-levy-abegnoli-6man-stateless-nd-proxy could be handy.

" The router must support Subnet Isolation (ie. Unique Prefix Per  Host, e.g. [RFC8273] or [Collink])."

Not just the router. The host too. Hosts do not necessarily support DHCP PD today, do they?

And then there's the standard gap between the DHCPv6 relay and the router(s), which is for now left to proprietary solutions but could be handled through draft-thubert-6lo-prefix-registration. IOW SND also works with prefixes to the host. 

------------

4.5. Applicability of Proxy Isolation

"
   o  Reduced address resolution for GUA among hosts behind different proxies. This reduces the largest source of multicast in ND.

"

I'd reword. All the broadcast lookups associated to AR still occur on the L2 medium. The benefit is that the proxy can filter the multicast ND messages towards an interface iff it knows for sure that the Target Address is not reachable over that interface. Which is *very hard* to establish with certainty when SLAAC is used. The whole point of an 802.11 association and of an RFC 8505 registration is to obtain that deterministic knowledge, so as to create respectively the bridging / routing state, and filter undesirable broadcasts/multicasts.

-----------

" This prevents the most ND issues"
reword?

-----------


4.6. Guidelines for Selecting a Host Isolation Method

"
       c) Remaining issues and solutions:

            1) None.
"

Not too sure. There's a debatable privacy issue. Subnet isolation means that the host can be tracked with the /64. To avoid that, the host would need to rotate /64s (or whatever plen it's given) like it rotates privacy addresses today. 

------------

"4. Otherwise, if GUA Isolation (i.e. setting PIO L-bit=0) is feasible"

Maybe you could mention that MLTG provides a "broadcast domain isolation", and limits the scope of the issues to one broadcast domain while the Subnet may spread beyond one broadcast domain.

------------------

"
  5. Otherwise, if Proxy Isolation is feasible

       a) Applicable scenarios:

"

802.11 mandates a function called proxy ARP in the AP, and it's supposed to work for IPv6 ND too.  I guess that makes a Wi-Fi ESS an applicable scenario.

--------------

"4.7. Impact of Host Isolation on Other Protocols in IPv6 First-hops"

Maybe you could mention that there's a need for a proxy for each service, and a need for a bridging proxy for LLA communication beyond the broadcast domain.


Voila! I hope this helps : )

Pascal