Re: [v6ops] Thoughts on draft-ietf-v6ops-dhcp-pd-per-device

"Pascal Thubert (pthubert)" <pthubert@cisco.com> Fri, 04 August 2023 13:36 UTC

Return-Path: <pthubert@cisco.com>
X-Original-To: v6ops@ietfa.amsl.com
Delivered-To: v6ops@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 3C26FC16951E for <v6ops@ietfa.amsl.com>; Fri, 4 Aug 2023 06:36:38 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -14.605
X-Spam-Level:
X-Spam-Status: No, score=-14.605 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, DKIMWL_WL_HIGH=-0.001, DKIMWL_WL_MED=-0.001, DKIM_SIGNED=0.1, DKIM_VALID=-0.1, DKIM_VALID_AU=-0.1, DKIM_VALID_EF=-0.1, HTML_MESSAGE=0.001, RCVD_IN_DNSWL_HI=-5, RCVD_IN_MSPIKE_H5=0.001, RCVD_IN_MSPIKE_WL=0.001, RCVD_IN_ZEN_BLOCKED_OPENDNS=0.001, SPF_NONE=0.001, T_SCC_BODY_TEXT_LINE=-0.01, URIBL_DBL_BLOCKED_OPENDNS=0.001, URIBL_ZEN_BLOCKED_OPENDNS=0.001, USER_IN_DEF_DKIM_WL=-7.5] autolearn=unavailable autolearn_force=no
Authentication-Results: ietfa.amsl.com (amavisd-new); dkim=pass (1024-bit key) header.d=cisco.com header.b="jHHgPZen"; dkim=pass (1024-bit key) header.d=cisco.com header.b="QCT+u4EW"
Received: from mail.ietf.org ([50.223.129.194]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id jMGiiqLUGesi for <v6ops@ietfa.amsl.com>; Fri, 4 Aug 2023 06:36:33 -0700 (PDT)
Received: from alln-iport-5.cisco.com (alln-iport-5.cisco.com [173.37.142.92]) (using TLSv1.2 with cipher DHE-RSA-SEED-SHA (128/128 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id BA92CC16B5B2 for <v6ops@ietf.org>; Fri, 4 Aug 2023 06:36:32 -0700 (PDT)
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/simple; d=cisco.com; i=@cisco.com; l=45376; q=dns/txt; s=iport; t=1691156192; x=1692365792; h=from:to:cc:subject:date:message-id:references: in-reply-to:mime-version; bh=BnAerFVw3WK1olrayh0Rr1LyXfJPoLCTNuxOfd2ZSPw=; b=jHHgPZenzuycs6P+QJ72BN2Z4eqW+M/lw8hUtQUIdsWVTZ4sVc23hm4q WIpocP1S4a/rORqp44oA+c/5xn/M2WZms7SGZpfEhsPbz4J9lMtnUVBiQ KCMu7ZLLfqC9pljcLjrTH4gNrQa78HS5JANC6VgOQFnDUZLFYbkj6vbzT s=;
X-IPAS-Result: A0AxAAAp/sxkmI0NJK1aHAEBAQEBAQcBARIBAQQEAQFlgRYHAQELAYEvATBScwJZKhJHhFGDTAOETl+IXwOLWpIfgSUDUQUPAQEBDQEBLgEMCQQBAYUGAhaGMwIlNAkOAQICAgEBAQEDAgMBAQEBAQEDAQEFAQEBAgEHBBQBAQEBAQEBAR4ZBQ4QJ4VoDYYEAQEBAQIBAQEQEQoTAQEsAgkBCwQCAQgRBAEBASABBgMCAgIfBgsUCQgCBAENBQgaglwBghUTAw4jAwEQoHwBgUACiiZ6gTKBAYIJAQEGBAWBPAKuWA2CSQMGgUIBh2IeAYFKAQGBWYZVJxuBSUSBFUOBZoECPoIgQgEBAoFABhoVFgmDJTmCLocUgl6CfoIIGC4HMgmBDgwJgQiKGiuBCAhegW49Ag1VCwtjgReCSAICEToUSnMbAwcDgQUQLwcEMh0HBgkYLyUGUQctJAkTFUAEgXiBVgqBAz8VDhGCTiICBzY4G0uCagkVBjtQeBAuBBQYgQwIBEsmBRoaHj0REhkNBQh/HQIRJDwDBQMEOAoVDQshBhUhA0QdQAMLcD01FBsFBCIBR1kFnH8KEAIDLw80DoFDAQ9bBkEjBEMOAk4NKhM1DSo5OpYginSiLm8KhAuLfYNQi0SGKBeEAYxsmAxih2aQQiCNQIN0lkUCBAIEBQIOAQEGgWM6gVtwFTuCZ1IZD44gCQMNCYNShRSKZXYCOQIHAQoBAQMJi0gBAQ
IronPort-PHdr: A9a23:ydvU/RCy3fmUr9mcGH7+UyQVoBdPi9zP1kY9454jjfdJaqu8us+kN 03E7vIrh1jMDs3X6PNB3vLfqLuoGXcB7pCIrG0YfdRSWgUEh8Qbk01oAMOMBUDhav+/Ryc7B 89FElRi+iLzKlBbTf73fEaauXiu9XgXExT7OxByI7HtBo7Phcmty8i5+obYZENDgz/uKb93J Q+9+B3YrdJewZM3M7s40BLPvnpOdqxaxHg9I1WVkle06pK7/YVo9GJbvPdJyg==
IronPort-Data: A9a23:WDP1jatdmZoJUZNmNXrtijhY5OfnVC9eMUV32f8akzHdYApBsoF/q tZmKWmDO62IZmHyc9l1PIW/oE1SsZHUmoQwHgdopCEzRS5EgMeUXt7xwmUckM+xwmwvaGo9s q3yv/GZdJhcokf0/0vrav67xZVF/fngqoDUUIYoAQgvA1c9IMsdoUg7wbVh0tY02YLR7z6l4 LseneWOYDdJ5BYsWo4kw/rrRMRH5amaVJsw5zTSVNgT1LPsvyB94KE3ecldG0DFrrx8RYZWc QpsIIaRpQs19z91Yj+sfy2SnkciGtY+NiDW4pZatjTLbhVq/kQPPqgH2PU0bEoUtmiFjo5I9 4tOkIGdbyEGLqztl7FIO/VYO3kW0axu8bvDJz20ttaeih2AeHr3yPIoB0YzVWEa0r8oWicVq 7pBc3ZUMknra+GemNpXTsF0msQ+JsTxIKsUu2prynfSCvNOrZXrGv6UuoIJg21o7ixINdHfN vAzWChRVRCaegFkKlM2A84dgd790xETdBUB+A7K+sLb+VP70lJ2yKPFMdfJdJqNX8o9o6qDj mvC+2K8CRYAOZnPjzGE6XmrwOTImEsXRb7+CpW9+71X3VGCmFUsVh4zSHadh9api2+xDoc3x 1MvxgIiqq079UqOR9b7XgGlrHPsgvL6c4cPewHdwFzTopc48zp1FUBfFWYQMoxOWNseAG10i APUw7sFEBQy6NWopWShGqB4RN9YEQERKWIEDcPvZVRYu4G5yG3fY+6mczqOOKexituwEjbqz nXa6iM/nL4Uy8UM0s1XHGwrYRry/fAlrSZsuW07u15JCCslOeZJgKT0szDmAQ5odtrxc7V4l CFsdzKixO4PF4qRsyeGXf8AGrqkj97cbmyF2Q4wQ8J7rWj9k5JGQWy2yG8nTKuOGphcEQIFn GeI0e+szMYJZSDzPfMfj3yZW516pUQfKTgVfqmEMoURCnSAXASG5yppLVWBxHzglVNErE3ME cnzTCpYNl5DUf4P5GPvH481iOZ3rghgnjm7bc6gkHyaPU+2OST9pUEtagXeN4jULcqs/W3oz jqoH5fTkU4CDLCnPXW/HEx6BQliEEXXzKve8qR/XuWCOQFhXmomDpfsLXkJIOSJQ4w9ej/0w 0yA
IronPort-HdrOrdr: A9a23:2KGKj6MklY34A8BcT2j155DYdb4zR+YMi2TDiHoRdfUFSKKlfp 6V88jzjSWE9gr5OEtLpTiBUJPwJk80hqQFkLX5XI3SEDUO3VHJEGgM1/qY/9VvcReOjNK1uZ 0QFpSWTeeAcmSS7vyKrzVQcexQveVvmZrA7YyzvhQdLz2CKZsQkzuRYTzrdHGeMTM2fabRY6 Dsn/avyQDQHUj/aP7XOlA1G8z44/HbnpPvZhALQzQ97hOVsD+u4LnmVzCFwxY3SVp0sPYf2F mAtza8yrSosvm9xBOZ/XTU9Y5qlNzozcYGLNCQi/ISNi7nhm+TFcRcsvy5zXMISdOUmRMXee r30lMd1gNImjTsl1SO0FnQMs/boXATAjHZuAalaDDY0LzErXoBerl8bMRiA1XkA45KhqAm7E qNtFjp76Z/HFfOmj/w6MPPUAwvnk2ooWA6mepWlHBHV5ACAYUh5rD30XklWavoJhiKoLwPAa 1rFoXR9fxWeVSVYzTQuXRu2sWlWjA2Eg2dSkYPt8SJ23wO9UoJgncw1YgahDMN5Zg9Q55L66 DNNblpjqhHSosTYbhmDOkMTMOrAijGQA7KMmiVPVP7fZt3cU7lutry+vE49euqcJsHwN87n4 nASkpRsSood0fnGaS1ret2G9D2MRKAtBjWu7VjDsJCy8/BrZLQQFi+dGw=
X-Talos-CUID: 9a23:2u+YvGqRZVk8zx89uDizPTvmUcUoMUCAwGaOGnDmCkN0ZZuzZk+R2awxxg==
X-Talos-MUID: 9a23:SH7v6gw8s6Nfycg77aMovYvS45+aqIOvWXonoIc4gs3eLDBbKzO8h2iUX7Zyfw==
X-IronPort-Anti-Spam-Filtered: true
Received: from alln-core-8.cisco.com ([173.36.13.141]) by alln-iport-5.cisco.com with ESMTP/TLS/ECDHE-RSA-AES256-GCM-SHA384; 04 Aug 2023 13:36:31 +0000
Received: from alln-opgw-3.cisco.com (alln-opgw-3.cisco.com [173.37.147.251]) by alln-core-8.cisco.com (8.15.2/8.15.2) with ESMTPS id 374DaUVN006318 (version=TLSv1.2 cipher=DHE-RSA-AES256-GCM-SHA384 bits=256 verify=OK) for <v6ops@ietf.org>; Fri, 4 Aug 2023 13:36:31 GMT
Authentication-Results: alln-opgw-3.cisco.com; dkim=pass (signature verified) header.i=@cisco.com; spf=Pass smtp.mailfrom=pthubert@cisco.com; dmarc=pass (p=quarantine dis=none) d=cisco.com
X-IronPort-AV: E=Sophos;i="6.01,255,1684800000"; d="scan'208,217";a="5125450"
Received: from mail-dm6nam10lp2102.outbound.protection.outlook.com (HELO NAM10-DM6-obe.outbound.protection.outlook.com) ([104.47.58.102]) by alln-opgw-3.cisco.com with ESMTP/TLS/ECDHE-RSA-AES256-GCM-SHA384; 04 Aug 2023 13:36:29 +0000
ARC-Seal: i=1; a=rsa-sha256; s=arcselector9901; d=microsoft.com; cv=none; b=UKYtCS2wJO+h/3ZXKxpjwAOOa1rwCzQ5bSmMKsfpcANhbbmfY04ewoPkznHRRPv6rH2uPwzYWwqb14LkMzhEigPJ1Opf7IjX2iby0Z0WMIgxMPcwEVZny4rZucCuZF4HT103Xr33smT6F9Y8Ua0pa68AY4ynfShrwpDbbtrRdfTDOhzSvfvEt2S937vzZaCOF3lLMaNJGiQcbTwd2BIZV5fQopCSJjy4XisFUO8Giko9PytTQV6OVquUGrWQI8BfmHazf4TqKwXpFTE9lo5RqFyzwnhcQ8R/IsMBkitdBxLPxRFIGVAV3X2D7HNhSBhoC+rkw0jBgCM/63y5XpirTQ==
ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=microsoft.com; s=arcselector9901; h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-AntiSpam-MessageData-ChunkCount:X-MS-Exchange-AntiSpam-MessageData-0:X-MS-Exchange-AntiSpam-MessageData-1; bh=BnAerFVw3WK1olrayh0Rr1LyXfJPoLCTNuxOfd2ZSPw=; b=nxtJf9smGNnqyfpXIcsXJV5RbdSxQUFVnBOneC50JAjM3IQrpeITN1HqLdc1NruHpzCoPmkTOIFt/JecUuPsL9doFI02/4wdGZnsvCvbrcHcE+z6LqasHWH5OfpGPde05HucnGDQFGlD3yz/z+9d+dzdzCn1URhedTIklcEYwE5kZcDS6zO9KwG4OQPiqLOJ8WDCk8V0RSBrpz3kfw9aV1Wq2PiEdfYRZLrcDDl3v1Irz+QHgFCH0JKvUvEH+JgkA3+zoLGx16aUKneYOKDr/IPYc0dD9QKCUBsymXafqBEORGPdmrJSEaMS/hm2dUlkP8tOD1yuCFLCdi1p87Q+xg==
ARC-Authentication-Results: i=1; mx.microsoft.com 1; spf=pass smtp.mailfrom=cisco.com; dmarc=pass action=none header.from=cisco.com; dkim=pass header.d=cisco.com; arc=none
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=cisco.com; s=selector1; h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-SenderADCheck; bh=BnAerFVw3WK1olrayh0Rr1LyXfJPoLCTNuxOfd2ZSPw=; b=QCT+u4EW0rGGfaxXYWO42c9xV0gu8/AOEJU/jMkQjiQmoPGQfiA1CvFYZCAi7V2LgrsuORNx27g/ZjXr0mEA2l/yNK3EllCfQQYJ27/8rtB0HFysnanAwCp5IFoWduohUhZbW+WPW5JB2jRVRPfAcDFDQh6fa+yl2dBvhuHAjAY=
Received: from CO1PR11MB4881.namprd11.prod.outlook.com (2603:10b6:303:91::20) by PH0PR11MB4839.namprd11.prod.outlook.com (2603:10b6:510:42::18) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id 15.20.6652.20; Fri, 4 Aug 2023 13:36:28 +0000
Received: from CO1PR11MB4881.namprd11.prod.outlook.com ([fe80::9ca3:7661:4c9a:3561]) by CO1PR11MB4881.namprd11.prod.outlook.com ([fe80::9ca3:7661:4c9a:3561%7]) with mapi id 15.20.6652.021; Fri, 4 Aug 2023 13:36:28 +0000
From: "Pascal Thubert (pthubert)" <pthubert@cisco.com>
To: Lorenzo Colitti <lorenzo=40google.com@dmarc.ietf.org>, Brian E Carpenter <brian.e.carpenter@gmail.com>
CC: Owen DeLong <owen@delong.com>, "v6ops@ietf.org list" <v6ops@ietf.org>
Thread-Topic: [v6ops] Thoughts on draft-ietf-v6ops-dhcp-pd-per-device
Thread-Index: AQHZw74prVu+54oY4UCBlVVIik0iMa/T+x2AgAAH/ACAABAQgIABwEkAgAAA2ICAAAFvgIAAAruAgAAXe4CAAAbYgIAAALkAgAADT4CAAARTgIAAFCYAgAAA9oCAABRhgIAAbKUAgADufACAAAMcAIAABMUAgAEqhkCAACFOAIAAM4mAgABqdoCAAK3h0A==
Date: Fri, 04 Aug 2023 13:36:24 +0000
Deferred-Delivery: Fri, 4 Aug 2023 13:35:56 +0000
Message-ID: <CO1PR11MB488179932F8C602CC60620A7D809A@CO1PR11MB4881.namprd11.prod.outlook.com>
References: <CO1PR11MB4881747D07D7F1DED14C65E4D808A@CO1PR11MB4881.namprd11.prod.outlook.com> <F035E47E-56A4-46C1-B24B-FC19BF40774D@delong.com> <935b380f-157b-74c1-5844-d73eab2e9d81@gmail.com> <CAKD1Yr2CgfXpcC=xmn5sKN7UZB64ztCuh+Q9De7gt5yG3ex0Uw@mail.gmail.com>
In-Reply-To: <CAKD1Yr2CgfXpcC=xmn5sKN7UZB64ztCuh+Q9De7gt5yG3ex0Uw@mail.gmail.com>
Accept-Language: fr-FR, en-US
Content-Language: en-US
X-MS-Has-Attach:
X-MS-TNEF-Correlator:
x-ms-publictraffictype: Email
x-ms-traffictypediagnostic: CO1PR11MB4881:EE_|PH0PR11MB4839:EE_
x-ms-office365-filtering-correlation-id: 6b0046dc-d769-476d-0940-08db94efce57
x-ms-exchange-senderadcheck: 1
x-ms-exchange-antispam-relay: 0
x-microsoft-antispam: BCL:0;
x-microsoft-antispam-message-info: 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
x-forefront-antispam-report: CIP:255.255.255.255; CTRY:; LANG:en; SCL:1; SRV:; IPV:NLI; SFV:NSPM; H:CO1PR11MB4881.namprd11.prod.outlook.com; PTR:; CAT:NONE; SFS:(13230028)(4636009)(346002)(396003)(39860400002)(136003)(376002)(366004)(451199021)(1800799003)(186006)(83380400001)(53546011)(6506007)(8676002)(9686003)(76116006)(316002)(66556008)(2906002)(5660300002)(66946007)(64756008)(66476007)(66446008)(4326008)(41300700001)(8936002)(6666004)(7696005)(71200400001)(966005)(52536014)(54906003)(478600001)(110136005)(122000001)(55016003)(38100700002)(33656002)(166002)(86362001)(38070700005)(66899021); DIR:OUT; SFP:1101;
x-ms-exchange-antispam-messagedata-chunkcount: 1
x-ms-exchange-antispam-messagedata-0: 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
Content-Type: multipart/alternative; boundary="_000_CO1PR11MB488179932F8C602CC60620A7D809ACO1PR11MB4881namp_"
MIME-Version: 1.0
X-OriginatorOrg: cisco.com
X-MS-Exchange-CrossTenant-AuthAs: Internal
X-MS-Exchange-CrossTenant-AuthSource: CO1PR11MB4881.namprd11.prod.outlook.com
X-MS-Exchange-CrossTenant-Network-Message-Id: 6b0046dc-d769-476d-0940-08db94efce57
X-MS-Exchange-CrossTenant-originalarrivaltime: 04 Aug 2023 13:36:28.2194 (UTC)
X-MS-Exchange-CrossTenant-fromentityheader: Hosted
X-MS-Exchange-CrossTenant-id: 5ae1af62-9505-4097-a69a-c1553ef7840e
X-MS-Exchange-CrossTenant-mailboxtype: HOSTED
X-MS-Exchange-CrossTenant-userprincipalname: EBsj4nBZOYKWcgXbSFvnfecLqiWD6rdbaz1Q3p+DHe606GM2pPu7zbgDAUq46TuGO1eKsl5DvhHEWpoPtc5fUw==
X-MS-Exchange-Transport-CrossTenantHeadersStamped: PH0PR11MB4839
X-Outbound-SMTP-Client: 173.37.147.251, alln-opgw-3.cisco.com
X-Outbound-Node: alln-core-8.cisco.com
Archived-At: <https://mailarchive.ietf.org/arch/msg/v6ops/9nNNc0ehObRD9XWsvEBBfHLe9is>
Subject: Re: [v6ops] Thoughts on draft-ietf-v6ops-dhcp-pd-per-device
X-BeenThere: v6ops@ietf.org
X-Mailman-Version: 2.1.39
Precedence: list
List-Id: v6ops discussion list <v6ops.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/v6ops>, <mailto:v6ops-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/v6ops/>
List-Post: <mailto:v6ops@ietf.org>
List-Help: <mailto:v6ops-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/v6ops>, <mailto:v6ops-request@ietf.org?subject=subscribe>
X-List-Received-Date: Fri, 04 Aug 2023 13:36:38 -0000

Lorenzo >   The draft does say that the server must hand out a prefix of sufficient size to support SLAAC. There's a good reason for this: SLAAC is the only address assignment mechanism that is mandatory to implement, and in large numbers of hosts, it's the only one that is implemented.

Even that, Lorenzo, does not convince me. Because it really depends on what attaches to that node and in that case it does not have to be generic. Jen mentioned a box she opened in her home, with devices embedded at manuf. Do they need SLAAC? I’d bet they have hardcoded addresses and every box shipped has exactly the same.

That’s at least what industrial production lines do. They hardcode RFC 1918 addresses when they design one line and then build as many lines as they need identically. Since it’s all v4, there’s a NAT at the end of the line. To migrate to v6, it would make sense to replace the NAT by a CLAT and delegate it a /96. This way a /64 can cover all the parallel lines and a lot more stuff.

I also saw a useful application of the delegation to provide addresses to apps inside a device; the apps do not do SLAAC, they get what the OS will give them. For privacy, see next point, if it is known that a /48 is used for delegating /64s and above, then the guessability plays in the bits between 48 and 64, which means that there’s no privacy at all.

And it’s never too late to start defining an autoconf mechanism that works on other plen too, as long as we make DAD fast and solid in the process.

Brian >> There's that, and a similar argument about privacy/guessability of IIDs. When we looked at this for RFC7421, we concluded that 40 bits was enough, so /80 or even /88 subnets would be reasonable.
(https://www.rfc-editor.org/rfc/rfc7421.html#page-16)

And by that we mean that the space where different hosts get different addresses is the bits between say 80 or 88 and 128. Not to be confused with what I said above, that is, if hosts get delegated a /80 out of a /64 for internal usage, then the space to differentiate hosts is between 64 and 80 and that’s only 16 bits, way below the required 40.

IOW: if you delegate to routers that serve other devices in a CIDR fashion, you can give them /80s to build /88 subnets. If you delegate to hosts that will use all available addresses for internal addressing, give them /96s out of a /56 and /104 and longer out of a /64 so there’s still 40 bits to hide this host into… We must be able to signal what can of length we want because really depends on the use case.

regards,

Pascal
From: Lorenzo Colitti <lorenzo=40google.com@dmarc.ietf.org>
Sent: Friday, August 4, 2023 4:51 AM
To: Brian E Carpenter <brian.e.carpenter@gmail.com>
Cc: Owen DeLong <owen@delong.com>; Pascal Thubert (pthubert) <pthubert@cisco.com>; v6ops@ietf.org list <v6ops@ietf.org>
Subject: Re: [v6ops] Thoughts on draft-ietf-v6ops-dhcp-pd-per-device

Let's not fall into another debate about the /64 boundary :-) The draft does not have /64 hard coded anywhere in it, so if and when we change the subnet size supported by SLAAC to something else, the document will not need to be modified.

The draft does say that the server must hand out a prefix of sufficient size to support SLAAC. There's a good reason for this: SLAAC is the only address assignment mechanism that is mandatory to implement, and in large numbers of hosts, it's the only one that is implemented.

Yes, this does mean that this draft is not applicable on all networks. But to be realistically, I see no way that we could get consensus on *any* method that would support end-to-end connectivity and permissionless network extension on all networks. If anyone can think of one, please do share and we'll go off and do that instead :-)

In the meantime, this draft is what comes closest to that goal. It meaningfully increases the capabilities of large networks by allowing unlimited end-to-end extension, and that's a huge improvement. Let's not be the perfect be the enemy of the good.

Cheers,
Lorenzo

On Fri, 4 Aug 2023, 05:30 Brian E Carpenter, <brian.e.carpenter@gmail.com<mailto:brian.e.carpenter@gmail.com>> wrote:
On 04-Aug-23 05:25, Owen DeLong wrote:
> /64 also provides a sufficiently large space that the odds of a collision among randomly generated addresses are sufficiently small as to allow address autoconf to have a high success rate on the first attempt.

There's that, and a similar argument about privacy/guessability of IIDs. When we looked at this for RFC7421, we concluded that 40 bits was enough, so /80 or even /88 subnets would be reasonable.
(https://www.rfc-editor.org/rfc/rfc7421.html#page-16)

>
> Walking further right to work around stingy provider’s bad allocation policies is a step in the wrong direction, IMHO.
>
> That said, I do agree that /64 shouldn’t be hard coded anywhere and that prefix size should be an operator choice. I think it is useful for /64 to remain a strong recommendation.

So perhaps 6man should adopt draft-bourbaki-6man-classless-ipv6?

    Brian

>
> Owen
>
>
>> On Aug 3, 2023, at 08:52, Pascal Thubert (pthubert) <pthubert=40cisco.com@dmarc.ietf.org<mailto:40cisco.com@dmarc.ietf.org>> wrote:
>>
>> +295147905179352825856
>>
>> I believe that neither any new spec nor any new implementation should have 64 hardcoded in it anymore. There should be a MUST in a BCP for that.
>>
>> There are some chains of inheritance that should be broken before they hurt too much, e.g., https://garethdennis.medium.com/the-not-so-glamourous-origins-of-standard-track-gauge-2b5f1ae7e3bc.
>>
>> Though the horse tall tale might be overrated, I still believe in the one that says that the 64 value was not defined for the best of admins, but to allow SLAAC using the MAC address as IID even in L2 networks using the MAC-of-the-future, of 64 bits. Firewire is dead, and 15.4 is the only major L2 left with 8 bytes MACs. The IETF now discourages MAC for IID anyway.
>>
>> 64 is thus only useful because of some existing SLAAC implementations and should be considered as a special value only in that context, to be provisioned accordingly by the admin that really wants SLAAC and those devices (admittedly, my home gateway is like that).
>>
>> NetOps who are not in that context should be able to build the network they want with minimum constraints. There should not be constraints that are there only to fit the taste or the limitations of the protocol designers. A touch of humility and a good dose of separation of power & responsibility would serve us well here.
>>
>> All the best,
>>
>> Pascal
>>
>>
>>> -----Original Message-----
>>> From: v6ops <v6ops-bounces@ietf.org<mailto:v6ops-bounces@ietf.org>> On Behalf Of Brian E Carpenter
>>> Sent: Wednesday, August 2, 2023 11:38 PM
>>> To: Ole Trøan <otroan@employees.org<mailto:otroan@employees.org>>
>>> Cc: v6ops@ietf.org<mailto:v6ops@ietf.org> list <v6ops@ietf.org<mailto:v6ops@ietf.org>>
>>> Subject: Re: [v6ops] Thoughts on draft-ietf-v6ops-dhcp-pd-per-device
>>>
>>>> On 03-Aug-23 09:20, Ole Trøan wrote:
>>>> Brian,
>>>>
>>>>> On 2 Aug 2023, at 23:10, Brian E Carpenter <brian.e.carpenter@gmail.com<mailto:brian.e.carpenter@gmail.com>>
>>> wrote:
>>>>>
>>>>> On 02-Aug-23 18:55, Ole Trøan wrote:
>>>>>>> With all due respect, etc. etc., very few people on this list have a
>>> typical home network. If we are talking about customers of an ISP that only
>>> offers a /60, it's a different world to ours. I am *not* defending such ISPs,
>>> far from it, but the CEs that they provide are highly unlikely to enable
>>> dhcp-pd-per-device.
>>>>>> If this proposal results in an address assignment approach that cannot
>>> even number a home network that has been assigned 295147905179352825856
>>> addresses, at least an outsider would start wondering what we were smoking.
>>>>>
>>>>> Well yes, but aren't you agreeing with me? A CE that only has a /60
>>> probably shouldn't support a delegation method that assigns a whole /64 to a
>>> single device. (Unless the CE also knows that the device is capable of
>>> assigning longer prefixes to subsidiary devices, which is essentially what
>>> Pascal was saying.)
>>>>>
>>>>> Or in other words, the dhcp-pd-per-device mechanism is only useful for
>>> networks that know how to use it.
>>>>
>>>> Yes, that we agree on.
>>>> DHCP PD as a delegation method supports any prefix length.
>>>
>>> So does RFC 8992, as it happens. I had fun in my toy implementation
>>> supporting any prefix length.
>>>
>>>> The size of the assigned prefix should be an operational choice. I am not
>>> sure this document needs to say more than if the prefix is longer than 64
>>> then further sub-assignment to other hosts will not support SLAAC. If even
>>> that.
>>>
>>> Yes.
>>>     Brian
>>> _______________________________________________
>>> v6ops mailing list
>>> v6ops@ietf.org<mailto:v6ops@ietf.org>
>>> https://www.ietf.org/mailman/listinfo/v6ops
>> _______________________________________________
>> v6ops mailing list
>> v6ops@ietf.org<mailto:v6ops@ietf.org>
>> https://www.ietf.org/mailman/listinfo/v6ops
>
_______________________________________________
v6ops mailing list
v6ops@ietf.org<mailto:v6ops@ietf.org>
https://www.ietf.org/mailman/listinfo/v6ops