[v6ops] Re: Éric Vyncke's Discuss on draft-ietf-v6ops-claton-13: (with DISCUSS and COMMENT)
"Eric Vyncke (evyncke)" <evyncke@cisco.com> Wed, 04 March 2026 09:37 UTC
Return-Path: <evyncke@cisco.com>
X-Original-To: v6ops@mail2.ietf.org
Delivered-To: v6ops@mail2.ietf.org
Received: from localhost (localhost [127.0.0.1]) by mail2.ietf.org (Postfix) with ESMTP id 77247C40B5D8; Wed, 4 Mar 2026 01:37:57 -0800 (PST)
X-Virus-Scanned: amavisd-new at ietf.org
X-Spam-Flag: NO
X-Spam-Score: -10.286
X-Spam-Level:
X-Spam-Status: No, score=-10.286 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, DKIMWL_WL_HIGH=-0.001, DKIMWL_WL_MED=-0.001, DKIM_SIGNED=0.1, DKIM_VALID=-0.1, DKIM_VALID_AU=-0.1, DKIM_VALID_EF=-0.1, HTML_MESSAGE=0.001, RCVD_IN_DNSWL_LOW=-0.7, RCVD_IN_MSPIKE_H5=0.001, RCVD_IN_MSPIKE_WL=0.001, RCVD_IN_VALIDITY_CERTIFIED_BLOCKED=0.001, RCVD_IN_VALIDITY_RPBL_BLOCKED=0.001, SPF_NONE=0.001, T_SPF_HELO_PERMERROR=0.01, USER_IN_DEF_DKIM_WL=-7.5] autolearn=ham autolearn_force=no
Authentication-Results: mail2.ietf.org (amavisd-new); dkim=pass (2048-bit key) header.d=cisco.com
Received: from mail2.ietf.org ([166.84.6.31]) by localhost (mail2.ietf.org [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id IJUNzUDjLhxu; Wed, 4 Mar 2026 01:37:56 -0800 (PST)
Received: from aer-iport-6.cisco.com (aer-iport-6.cisco.com [173.38.203.68]) (using TLSv1.3 with cipher TLS_AES_256_GCM_SHA384 (256/256 bits) key-exchange X25519 server-signature ECDSA (P-256) server-digest SHA256) (No client certificate requested) by mail2.ietf.org (Postfix) with ESMTPS id E9512C40B5D1; Wed, 4 Mar 2026 01:37:55 -0800 (PST)
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=cisco.com; i=@cisco.com; l=27674; q=dns/txt; s=iport01; t=1772617076; x=1773826676; h=from:to:cc:subject:date:message-id:references: in-reply-to:mime-version; bh=O66oZFRFacRSMvI4Za8ANNRXEi3IwwMwSDLo7hynUZ4=; b=XyMdMpGARbf1TDCICd/hfMY11UG6RJnZMnHt6sZYrbdBP9ufbGa7QCxV dh9NoOeTJJzfFfo1aeSd7TxdWQa2FW3HKjJf96rXhnVojd0Xpj01Qcxfm pAMf63EPR8MUKg7CJEF90X+6M5lElWx5ecWN1pDPQBUanI2HcOnEhH5sk wrofsvXwiIqt8s5p6UorbarDWvf6XR1BCx3Ny2Xp/rx663SBY5BD4H2Qm Gwt8510bNtMY3LtJqbibGPeKBVtA9/s8F+bdoI/C0gDmQSFb+XHahVD7Z igH0obQ5RTF/E5L0H2bDG0GtfCPoPbFf6TmoK1c+dvcIOfK1VZj9qyF3P A==;
X-CSE-ConnectionGUID: 9eny++fsQweRTmYqKMKFnw==
X-CSE-MsgGUID: zhC5gcvuQxm5V7O334Uh2g==
X-IPAS-Result: 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
IronPort-PHdr: A9a23:7uqwjx3PZpKz2I5osmDPmlBlVkEcU/3cJAUZ7N8gk71RN/jl9JX5N 0uZ7vJo3xfFXoTevupNkPGe87vhVmoJ/YubvTgcfYZNWR4IhYRenwEpDMOfT0yuBPXrdCc9W s9FUTdY
IronPort-Data: A9a23:gOJQ96MzwFClADvvrR2olsFynXyQoLVcMsEvi/4bfWQNrUoigjVTx jAdCm6Fbq2LYmTxLop0bYuy9R4Cu5HQmN5nHHM5pCpnJ55oRWUpJjg4wmPYZX76whjrFRo/h ykmQoCeaphyFTmE+kvF3oHJ9RFUzbuPSqf3FNnKMyVwQR4MYCo6gHqPocZh6mJTqYb/WVrlV e/a+ZWFZgf+g2UsaAr41orawP9RlKWq0N8nlgRWicBj5Df2i3QTBZQDEqC9R1OQapVUBOOzW 9HYx7i/+G7Dlz91Yj9yuu+mGqGiaue60Tmm0hK6aYD76vRxjnBaPpIACRYpQRw/ZwNlMDxG4 I4lWZSYEW/FN0BX8QgXe0Ew/ypWZcWq9FJbSJSymZT78qHIT5fj66RjClB1foMDw/l6O11Lx OU7DRMjaA/W0opawJrjIgVtrs0uNozveYgYoHwllGmfBvc9SpeFSKLPjTNa9G5s2oYUQKqYO JZfM2M2BPjDS0Un1lM/BYwvmuyri1H0ciZTrxSeoq9fD237kVQggei9b4O9ltqiV8V+w0mTu H//72GkPE49b4fD9Drf/Sf57gPItWahMG4IL5W07PdknBiSy3AdTQNIUkOg5PK9g1K5XfpeJ lAavC00osAa9UGwQfH8UgG25nmesXY0RYRXC/Z/4wGEy7DPyweUGmZCSSROAPQ46sguXhQr2 0OH2dTzClRSXKa9QH+Hs7PRpjSoNG1MdSkJZDQPSk0O5NyLTJwPsy8jh+1LScadptb0Ajr3h TuNqUADa3871KbnC43TEYj7vg+R
IronPort-HdrOrdr: A9a23:ga2b5KpL79JqTxYTL7fIYRsaV5tWLNV00zEX/kB9WHVpm5Oj5q OTdaUgtSMc1gxxZJh5o6H/BEDhex/hHZ4c2/h2AV7QZniWhILIFvAs0WKM+UybJ8STzJ846U 4kSdkANDSSNyk1sS+Z2njELz9I+rDum87Y55a6854ud3AXV0gK1XYBNu/vKDwMeOAwP+tAKH Pz3LshmxOQPV4sQoCQAH4DU+Lfp9vNuq7HTHc9bSIP2U2ltx/tzKT1PSS5834lPg+nx41MzU H11yjCoomzufCyzRHRk0XJ6Y5NpdfnwtxfQOSRl8k8MFzX+0aVTbUkf4fHkCE+oemp5lpvus LLuQ0cM8N67G6UVn2poCHqxxLr3F8VmjzfIB6j8DneSP7CNXYH4vl69MVkm9zimgwdVeRHoe d2NqSixsNq5F377XzADpPzJmFXfwKP0AkfeKgo/j1iuU90Us4KkWTZl3klS6soDWb07psqH/ JpC9yZ7PFKcUmCZ3ScpWV3xsewN05DVCtub3Jy8vB96QIm10xR3g8d3ogSj30A/JUyR91N4P nFKL1hkPVLQtUNZaxwCe8dSY/vY1a9DS7kISaXOxDqBasHM3XCp9r+56g0/vijfNgNwIEpkJ rMXVtEvSo5el7oC8eJwJpXmyq9DVmVTHDo0IVT9pJ5srrzSP7iNjCCUkknl4+6r/AWEqTgKr +O0VJtconexEfVaPF0NlfFKuxvAGhbVNdQodoyUU+PpMXQQ7eaxNAzWMyjUIbQLQ==
X-Talos-CUID: 9a23:S++eUG6P3wiggAtN49sspUMSC4NmfGbk03rqH0qJEEVMa5OTVgrF
X-Talos-MUID: 9a23:HzQH+AhtklGAvLAn+F9lxMMpJsdDvqulFl00gZBbhZajbncsBjfHg2Hi
X-IronPort-Anti-Spam-Filtered: true
Received: from aer-l-core-10.cisco.com ([144.254.74.211]) by aer-iport-6.cisco.com with ESMTP/TLS/TLS_AES_256_GCM_SHA384; 04 Mar 2026 09:37:48 +0000
Received: from rcdn-opgw-4.cisco.com (rcdn-opgw-4.cisco.com [72.163.7.165]) (using TLSv1.3 with cipher TLS_AES_256_GCM_SHA384 (256/256 bits) key-exchange X25519 server-signature RSA-PSS (2048 bits) server-digest SHA256) (No client certificate requested) by aer-l-core-10.cisco.com (Postfix) with ESMTPS id B61CA18000338; Wed, 4 Mar 2026 09:37:47 +0000 (GMT)
X-CSE-ConnectionGUID: fZceAtRoQNiPmcLTrTdImQ==
X-CSE-MsgGUID: 7jVpXBBPROmqaVVsfJFv9g==
Authentication-Results: rcdn-opgw-4.cisco.com; dkim=pass (signature verified) header.i=@cisco.com
X-IronPort-AV: E=Sophos;i="6.21,323,1763424000"; d="scan'208,217";a="72010508"
Received: from mail-ds2pr08cu00101.outbound.protection.outlook.com (HELO DS2PR08CU001.outbound.protection.outlook.com) ([40.93.13.49]) by rcdn-opgw-4.cisco.com with ESMTP/TLS/TLS_AES_256_GCM_SHA384; 04 Mar 2026 09:37:45 +0000
ARC-Seal: i=1; a=rsa-sha256; s=arcselector10001; d=microsoft.com; cv=none; b=El540EowxnmednHgbEghw7/OOTQ7l39uonZGgAEoFzTTK2qQ9PKsTt+TsK7CWJrrffip8M4YvWSTbXyaszlc1L8ZhHN8TcDya1lT6AjhqBWJmfndpzZLuOuk/dIMtX3pF/qehopqvFondE0FFE47Qjv6A8QvVG58DTzsf2/Vc38d7huR3wNseKlXoybV8vIS+nwxgpBVh6N+xgEMh0eC25lUZwOkxvaZN34vfRbOJzRU+gMbsBHf5UMRjAmyHwFtBe9XPGXnYG6AgUtw4yMlRaTWemD5Spo3jHY/l8wLroSTFG0NrSNcAQoicOxqNY732VfvR6K5MEBYHMuI2zRAew==
ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=microsoft.com; s=arcselector10001; h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-AntiSpam-MessageData-ChunkCount:X-MS-Exchange-AntiSpam-MessageData-0:X-MS-Exchange-AntiSpam-MessageData-1; bh=O66oZFRFacRSMvI4Za8ANNRXEi3IwwMwSDLo7hynUZ4=; b=fZUTdz7+PDbEIxaT2V0PQIK/f+YgVwJgqFTwbLbiFRApcjlSecm+H7juAOFnnKEv85dzSxI7ZcK3n35gRekok1NZ5kYIWqlaoDuLEgSz7Ad32Thg8uzxb87C5yNKnqyO9cFaQzN2zZBB60S3jc8fvDH+FpPjvJxQghe+Ji2wZePaZA0b9xpO3cHRcCmwYb0yMmWhO9tChR/3p3z7EdkbFteHJ7iRAm88eBaqi/DrLQgWARp/FI92Owkdl2SWp1d7Ct4nVs3D0orglsxkl4TJqC6Y93woBlTlmFW/kntGrloVkqryzk3pIEp+/TSVLV6O3AXcK3g0Bz2n7jCmvHLs4A==
ARC-Authentication-Results: i=1; mx.microsoft.com 1; spf=pass smtp.mailfrom=cisco.com; dmarc=pass action=none header.from=cisco.com; dkim=pass header.d=cisco.com; arc=none
Received: from PH0PR11MB4966.namprd11.prod.outlook.com (2603:10b6:510:42::21) by PH8PR11MB6801.namprd11.prod.outlook.com (2603:10b6:510:1c9::8) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id 15.20.9654.22; Wed, 4 Mar 2026 09:37:44 +0000
Received: from PH0PR11MB4966.namprd11.prod.outlook.com ([fe80::258a:9418:efab:8cb8]) by PH0PR11MB4966.namprd11.prod.outlook.com ([fe80::258a:9418:efab:8cb8%7]) with mapi id 15.20.9678.016; Wed, 4 Mar 2026 09:37:44 +0000
From: "Eric Vyncke (evyncke)" <evyncke@cisco.com>
To: Jen Linkova <furry13@gmail.com>
Thread-Topic: Éric Vyncke's Discuss on draft-ietf-v6ops-claton-13: (with DISCUSS and COMMENT)
Thread-Index: AQHcb/Tzqz61KXmrVUSrqf0+Na8/j7UnDtkQgABHiwCABgog54BthriAgAOsx0s=
Date: Wed, 04 Mar 2026 09:37:43 +0000
Message-ID: <PH0PR11MB49660213FA2A355B36791AAEA97CA@PH0PR11MB4966.namprd11.prod.outlook.com>
References: <176589705535.704674.17073535824993411286@dt-datatracker-5bd94c585b-pvtsm> <CABDV=UNjS0B-9KOqtT8zk_Tif2qTtPyE4T+ebfXKt=oH52vz9g@mail.gmail.com> <PH0PR11MB49664D3BD419B90672270491A9A8A@PH0PR11MB4966.namprd11.prod.outlook.com> <CAFU7BATezL2s4O3TxZbK+FgcyDTF0FB2+7XKawKXCEChSLWddw@mail.gmail.com> <PH0PR11MB4966E890F89533D5A27C7D2BA9B4A@PH0PR11MB4966.namprd11.prod.outlook.com> <CAFU7BARAOjyGe3dRzEB9nSrCuzhfwJ2QVESXhM3BuFQ1-NXpnA@mail.gmail.com>
In-Reply-To: <CAFU7BARAOjyGe3dRzEB9nSrCuzhfwJ2QVESXhM3BuFQ1-NXpnA@mail.gmail.com>
Accept-Language: fr-BE, en-US
Content-Language: en-GB
X-MS-Has-Attach:
X-MS-TNEF-Correlator:
x-ms-reactions: allow
x-ms-publictraffictype: Email
x-ms-traffictypediagnostic: PH0PR11MB4966:EE_|PH8PR11MB6801:EE_
x-ms-office365-filtering-correlation-id: 287399a7-e7e8-48ed-ca8f-08de79d1afef
x-ms-exchange-senderadcheck: 1
x-ms-exchange-antispam-relay: 0
x-microsoft-antispam: BCL:0;ARA:13230040|1800799024|376014|366016|13003099007|38070700021|8096899003|7053199007;
x-microsoft-antispam-message-info: 6xg2edUK7UMLf1cdd2TBXify+yycBFBxYGtWFZdxbww78qkQFxWjzu75cpzvFAj1WrGsbe1fQRQA9JucCPky1XJj4fdj+LJeCBdYoCV2UyFRalhDeRbMGrBGLcv68o7DJSvMScGUnsHbvlv6W13KMs2Vyk+dg7dHwgs99A9UoTDXc7XbqrX1UJWHwkn24RYSyTMsCxAwZSLs0YSABn/o5ibCqqYHENLNCVE53g+zvDHyZXqBpgZeNL5IDNueqcG1SMUUq/jnljY8CzR4FVoeXghKBdmuhAnE3zvt9B+qEURm9Es2OUJzAoaJwILPTIWvYgUQN2P34nVrEjyBkhIa7VNeINGMT0c21uIgZgMAifFFvI49Q5DSEao7NzDPJxJxck+q1AMlElQ8tSL3Gl1lxpc7Ob+jwhYh8N3inrWi5jsWJgPAVyWjPMsCZXOONxu0mi4ei6FoTNnpSxI2bCnbL5OlNqmQLy5JXj2RDl3ZQdE9R5wyxcfJGnrbV6dTXRorfSd0HnkfxDNEoMh+R/jfpCK9V6jBOs6t+BxzEkeNrriB1P0+bJ+UA9ilZ8mgxCdN9tgKDbsEX5VK7/lfQKlaQgaAG57YY0OZY+df6sCEETh6Hu6W90B+k8iH8aWpQw07RZIj2a+jHzTDf7qBdxyY5I8V35ZZr/tgowR5SWUWN0F2ZMX1C1jeMmf/7kCnPQjtpNmP2HwnexMtky0vAJfCgX9LW7TCMyO9C81cvXsBWN/nBsIo5rbhmR5UjcicYxgCOfMZU8F6sfUrN5+aLz73JFhDMIwUt3bL5AmGF45jO0Y=
x-forefront-antispam-report: CIP:255.255.255.255;CTRY:;LANG:en;SCL:1;SRV:;IPV:NLI;SFV:NSPM;H:PH0PR11MB4966.namprd11.prod.outlook.com;PTR:;CAT:NONE;SFS:(13230040)(1800799024)(376014)(366016)(13003099007)(38070700021)(8096899003)(7053199007);DIR:OUT;SFP:1101;
x-ms-exchange-antispam-messagedata-chunkcount: 1
x-ms-exchange-antispam-messagedata-0: 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
Content-Type: multipart/alternative; boundary="_000_PH0PR11MB49660213FA2A355B36791AAEA97CAPH0PR11MB4966namp_"
MIME-Version: 1.0
X-OriginatorOrg: cisco.com
X-MS-Exchange-CrossTenant-AuthAs: Internal
X-MS-Exchange-CrossTenant-AuthSource: PH0PR11MB4966.namprd11.prod.outlook.com
X-MS-Exchange-CrossTenant-Network-Message-Id: 287399a7-e7e8-48ed-ca8f-08de79d1afef
X-MS-Exchange-CrossTenant-originalarrivaltime: 04 Mar 2026 09:37:43.9943 (UTC)
X-MS-Exchange-CrossTenant-fromentityheader: Hosted
X-MS-Exchange-CrossTenant-id: 5ae1af62-9505-4097-a69a-c1553ef7840e
X-MS-Exchange-CrossTenant-mailboxtype: HOSTED
X-MS-Exchange-CrossTenant-userprincipalname: L0zil3KbgHVqj0RUf9H2bv1Xb9m3o4LoXggxaLC0kMCiebAl6bUbWWz9ZxZxeOLE57kZ+1S1yMaP6EI4HMCPQg==
X-MS-Exchange-Transport-CrossTenantHeadersStamped: PH8PR11MB6801
X-Outbound-SMTP-Client: 72.163.7.165, rcdn-opgw-4.cisco.com
X-Outbound-Node: aer-l-core-10.cisco.com
Message-ID-Hash: IAT6U6VRXMMIGZGD7TFLFFOF54QNV6IZ
X-Message-ID-Hash: IAT6U6VRXMMIGZGD7TFLFFOF54QNV6IZ
X-MailFrom: evyncke@cisco.com
X-Mailman-Rule-Misses: dmarc-mitigation; no-senders; approved; emergency; loop; banned-address; member-moderation; header-match-v6ops.ietf.org-0; nonmember-moderation; administrivia; implicit-dest; max-recipients; max-size; news-moderation; no-subject; digests; suspicious-header
CC: Tommy Jensen <tojens.ietf@gmail.com>, The IESG <iesg@ietf.org>, "draft-ietf-v6ops-claton@ietf.org" <draft-ietf-v6ops-claton@ietf.org>, "gih@apnic.net" <gih@apnic.net>, "jim@rfc1035.com" <jim@rfc1035.com>, "v6ops-chairs@ietf.org" <v6ops-chairs@ietf.org>, "v6ops@ietf.org" <v6ops@ietf.org>
X-Mailman-Version: 3.3.9rc6
Precedence: list
Subject: [v6ops] Re: Éric Vyncke's Discuss on draft-ietf-v6ops-claton-13: (with DISCUSS and COMMENT)
List-Id: v6ops discussion list <v6ops.ietf.org>
Archived-At: <https://mailarchive.ietf.org/arch/msg/v6ops/9jSl1tuHsH9mMkJL-lBU-uS94aU>
List-Archive: <https://mailarchive.ietf.org/arch/browse/v6ops>
List-Help: <mailto:v6ops-request@ietf.org?subject=help>
List-Owner: <mailto:v6ops-owner@ietf.org>
List-Post: <mailto:v6ops@ietf.org>
List-Subscribe: <mailto:v6ops-join@ietf.org>
List-Unsubscribe: <mailto:v6ops-leave@ietf.org>
Hello Jen, Thanks for the -15, I will shortly update my ballot, and I am trusting you and the responsible AD to fix the two remaining issues: * RFC 8415 (DHCPv6) is now obsoleted by RFC 9915 * The PvD reference should probably rather be RFC 8801 Regards -éric From: Jen Linkova <furry13@gmail.com> Date: Monday, 2 March 2026 at 01:26 To: Eric Vyncke (evyncke) <evyncke@cisco.com> Cc: Tommy Jensen <tojens.ietf@gmail.com>, The IESG <iesg@ietf.org>, draft-ietf-v6ops-claton@ietf.org <draft-ietf-v6ops-claton@ietf.org>, gih@apnic.net <gih@apnic.net>, jim@rfc1035.com <jim@rfc1035.com>, mcr@sandelman.ca <mcr@sandelman.ca>, n.leymann@telekom.de <n.leymann@telekom.de>, v6ops-chairs@ietf.org <v6ops-chairs@ietf.org>, v6ops@ietf.org <v6ops@ietf.org> Subject: Re: Éric Vyncke's Discuss on draft-ietf-v6ops-claton-13: (with DISCUSS and COMMENT) Hi Eric, My apologies for the delayed response. We have just submitted -15. https://author-tools.ietf.org/iddiff?url1=draft-ietf-v6ops-claton-14&url2=draft-ietf-v6ops-claton-15&difftype=--html In addition to addressing your comments, the following changes have been made: 1. Fixing the conflicting text between section 4 ("the node SHOULD disable CLAT if native IPv4 is available") abd Section 5 ("must disable unless configured otherwise). 2. Explicitly stating that obtaining IPv4 connectivity is for the same interface the CLAT instance is running on (it was implicit in Section 5 but mentioned in Section 4...) On Mon, Dec 22, 2025 at 11:20 PM Eric Vyncke (evyncke) <evyncke@cisco.com> wrote: > Nevertheless, there are still 2 blocking DISCUSS points: > > Somewhere there must be text why this I-D did not select the PvD as a potential solution, it is obviously fair game to state that PvDs are not well implemented in hosts OS. I.e., this I-D must be clear that it does not preclude a future solution based on PvDs. -15 now includes the following text in the Section 7: " The Provisioning Domain (PvD) architecture [RFC7556] provides a mechanism for a PvD-aware node to operate correctly in such scenarios. However, at the time of writing PvD support is uncommon for host operating systems, and PvD support is not widely deployed by network operators. Therefore this document focuses on scenarios when the node is not PvD-aware." Please let us know if this text doesn't address your concern. > The section 6.2.2. is still unclear whether it is layer-2 or layer-3 multicast packets. Actually it is intentional. This statement applies for both L2 and L3 multicast. > About the non-blocking comments, please read below at EV> (text elided) > > About the multi-interface with CLAT on, should this specific use case be more > > detailed ? E.g., by explaining how the selection of the default IPv4 route > > should work ? (I note that there is text about using "ipv4only.arpa" in > > multi-interface, which is good). > > > > > > We tried to avoid getting too into the weeds on how address selection should work, given we don't want to change that logic for the platform. > > > > > > EV> I would still prefer to have more text, but this was and still is non-blocking There is a risk of overspecifying here. The logic of selecting the IPv4 route might be OS-specific and, ideally, that logic should be the same for CLAT and non-CLAT (native) routes - so it's not specific for the CLAT. If we start defining a behavior in this document, we might introduce a conflict between our text and reality. > > I fear that `Unless configured otherwise, the node MUST enable CLAT if the node > > has not already obtained a non-link-local IPv4 address by the time it discovers > > the NAT64 prefix.` is probably too aggressive as DHCPv4 is typically slower (as > > it relayed and requires a permanent storage write operation) than IPv6 RA by a > > local router. I.e., CLAT could end up being enabled 10 msec before DHCPv4 > > especially with text later saying `If native IPv4 connectivity becomes > > available later for a given interface, the node SHOULD disable CLAT for that > > interface `. Should there be a minimum delay before enable CLAT ? > > > > > > We do not think so, because this is a trade-off with waiting too long to start and unnecessarily delaying IPv4 connectivity when we know there is IPv4 connectivity available (via 464XLAT). We have guidance for allowing delay in the next sentences to address the shortcomings of RFC 7050 in that specific case, however. > > > > > > EV> not convinced, let's hope that implementers will apply common sense If the node is not doing optimistic DAD, there is a pretty good chance for DHCPv4 to be faster than SLAAC, actually. Also, an initial RS is sent after a random delay (between 0 and 1 sec). DHCP defines randomized wait for DHCPDISCOVER (RFC 2131 Section 4.4.1) and randomized backoff for retransmissions (RFC 2131, Section 4.1). Anyway the operational experience hasn’t revealed any issues with such behavior so far… > > Really unsure what is meant by `If a protocol uses the standard IP checksum,` > > as there is no checksum in any IP header ;-) and is there any TCP or UDP > > protocols not using the standard checksum ? > > > > > > “IP checksum” is commonly used as shorthand for “Internet checksum” (and arguably easier to recognize given IP is no longer expanded usually) as defined in RFCs 1071, 1141, and 1624, which are legacy but most recently referenced by RFC 7414 which also uses the two phrases interchangeably. > > > > EV> I disagree, I looked at RFC 7414 and there is no clear equivalence set between Internet Checksum and IP Checksum. Moreover, there is a checksum field in the IPV4 header, so, let's avoid confusion and be clear. We changed the text to "Internet Checksum". > > Hummm, the 1st paragraph clearly (and rightfully) states that all IPv6 > > addresses (CLAT & non-CLAT) MUST have the same behavior, then the bulleted list > > only specifies the CLAT behavior, e.g., allow non-DAD for some addresses as > > long as CLAT addresses do DAD... This is not correct, I suggest removing the > > CLAT-specific text in the bulleted list. > > > > > > We want to limit specificity to CLAT because if this section provides normative behavior for the treatment of IPv6 addresses outside the context of CLAT, this document’s scope is much wider than originally intended. This document is only intended to update CLAT-related RFCs rather than define new requirements that would apply to use of IPv6 without CLAT in place. > > > > About the DHCP registration, like written above, what if the other addresses > > are not registered ? > > EV> any feedback on the above point ? New text: "The node that has the address registration using DHCPv6 [RFC9686] enabled MUST register the CLAT addresses the same way as non-CLAT addresses, if the network supports the registration." I hope it addresses your concern. > > ### Section 9.2 > > > > I was expecting a MAY rather than `SHOULD implement [RFC7050] ("Discovery of > > the IPv6 Prefix Used for IPv6 Address Synthesis")` as this document clearly > > prefers (rightfully) the RA method. > > > > > > This was our original intention, but then it became clear that there are networks where 8781 is not feasible as raised by those with 3GPP experience. Leaving 7050 as a MAY would regress the state of interoperability. That said, we do have text in the fifth paragraph of Section 4 that addresses this by illustrating both the preference order and the heightened considerations around using 7050 versus 8781. > > > > > > > > `The router SHOULD have a configuration knob to disable DHCP Option 108 > > processing.` has little to do with 464XLAT though and more about IPv6-mostly. > > EV> while not mandatory, I would have preferred to read some feedback from the authors/WG Sending PREF64 w/o adding 108 is useless (from CLAT perspective), and to require sending 108 unconditionally is risky, hence this text. -- Cheers, Jen Linkova
- [v6ops] Éric Vyncke's Discuss on draft-ietf-v6ops… Éric Vyncke via Datatracker
- [v6ops] Re: Éric Vyncke's Discuss on draft-ietf-v… Tommy Jensen
- [v6ops] Re: Éric Vyncke's Discuss on draft-ietf-v… Eric Vyncke (evyncke)
- [v6ops] Re: Éric Vyncke's Discuss on draft-ietf-v… mohamed.boucadair
- [v6ops] Re: Éric Vyncke's Discuss on draft-ietf-v… Eric Vyncke (evyncke)
- [v6ops] Re: Éric Vyncke's Discuss on draft-ietf-v… Eric Vyncke (evyncke)
- [v6ops] Re: Éric Vyncke's Discuss on draft-ietf-v… Jen Linkova
- [v6ops] Re: Éric Vyncke's Discuss on draft-ietf-v… Eric Vyncke (evyncke)
- [v6ops] Re: Éric Vyncke's Discuss on draft-ietf-v… Jen Linkova
- [v6ops] Re: Éric Vyncke's Discuss on draft-ietf-v… Eric Vyncke (evyncke)
- [v6ops] Re: Éric Vyncke's Discuss on draft-ietf-v… Jen Linkova