Re: [v6ops] Implementation Status of PREF64

"Pascal Thubert (pthubert)" <pthubert@cisco.com> Thu, 30 September 2021 10:14 UTC

Return-Path: <pthubert@cisco.com>
X-Original-To: v6ops@ietfa.amsl.com
Delivered-To: v6ops@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 5A2013A0A8D for <v6ops@ietfa.amsl.com>; Thu, 30 Sep 2021 03:14:30 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -9.598
X-Spam-Level:
X-Spam-Status: No, score=-9.598 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, DKIM_SIGNED=0.1, DKIM_VALID=-0.1, DKIM_VALID_AU=-0.1, DKIM_VALID_EF=-0.1, HTML_MESSAGE=0.001, RCVD_IN_MSPIKE_H2=-0.001, SPF_NONE=0.001, URIBL_BLOCKED=0.001, USER_IN_DEF_DKIM_WL=-7.5] autolearn=ham autolearn_force=no
Authentication-Results: ietfa.amsl.com (amavisd-new); dkim=pass (1024-bit key) header.d=cisco.com header.b=inOJAM/k; dkim=pass (1024-bit key) header.d=cisco.onmicrosoft.com header.b=I6firJQH
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id nl5Rkn_qEruH for <v6ops@ietfa.amsl.com>; Thu, 30 Sep 2021 03:14:25 -0700 (PDT)
Received: from alln-iport-5.cisco.com (alln-iport-5.cisco.com [173.37.142.92]) (using TLSv1.2 with cipher DHE-RSA-SEED-SHA (128/128 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id 4A2F13A0A90 for <v6ops@ietf.org>; Thu, 30 Sep 2021 03:14:25 -0700 (PDT)
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/simple; d=cisco.com; i=@cisco.com; l=51776; q=dns/txt; s=iport; t=1632996865; x=1634206465; h=from:to:cc:subject:date:message-id:references: in-reply-to:mime-version; bh=DEePuQ7FpGaFJhtXBJOWef5cZtKZ1ebwhNm8YHVJ228=; b=inOJAM/kMhAh6GgCk/OcdV5lzTnDmeYwQtF3pL2aKu/hHY+q33I+pyfV Km/sAgx3lR6URNShLkivtyRxOq7ZtEprgbBhHPVgR5Bi97pnhBLvP3WOT Chwv6MctNbWWxTNUMbNhRK61TD/AJP4/HvZaG/Jd6sVRJgsFvIHnRq1vL M=;
X-IPAS-Result: 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
IronPort-PHdr: A9a23:gLF2iRNFVNjrSYTQrkkl6nfjWUAX0o4cdiYZ75M9gPRPf7ituZP4M x+X6fZsiQrPWoPWo7JBhvHNuq/tEWoH/d6asX8EfZANMn1NicgfkwE6RsLQD0r9Ia3maiUgF 4JDWUNruXahPhsdFMP3fVaHpHq04HYbEQn+MgwgIOPzF8bSgs272vr09YfUZlBDhSG2ZvV5K xDlxTg=
IronPort-Data: A9a23:kO7FlKhZBg0Y5owmRhwW9xKoX161vhAKZh0ujC45NGQN5FlHY01je htvWWnSb/eJMWGhKtt+YI7npE1SusSAm99jQQVupCo9FXljpJueD7x1DKtf0wB+jyHnZBg6h ynLQoCYdKjYdpJfz/uUGuCJQUNUjclkfZKhTr6ZUsxNbVU8En552Ek7w7dRbrNA2LBVPSvc4 bsenOWHULOV82Yc3rU8sv/rRLtH5ZweiRtA1rAMTakjUGz2yxH5OKkiyZSZdBMUdGX78tmSH I4vxJnhlo/QEoxE5tmNyt4XeWVSKlLe0JTnZnd+A8CfbhZ+SiMa/LZibOdAKmRtp2u4vvIvw 9EXtrnqRlJ8VkHMsLx1vxhwCSpyO+hN/6XKZCT5us2IxEqAeHzpqxlsJBhpZstDpaAmWicXq KFwxDMlNnhvg8qu3LKmQOR2muwoLdLgO8UUvXQIITTxUqZ+H86SE/2bjTNe9Cg+p/oQM6v0X vo+TTtxbETiXiJkOn5CXfrSm8/x1iWgLFW0smm9q6Mt5mXJ5BF01v7gPMe9UsLUQt1OtkeVu myA+H72ajkEPceezTeD8XXqi+PSlDn3cIIPHaK197hhh1j77mgUEhAQR1zu/aG2jUmxX98ZI EsR0iYrpLI5sk2mUte7WAe3yENopTYGUNZWVuY98gzIluzf4h2SAS4PSTsphMEaWNEeayxzj kLV3PDTKWJekZ/LQnbH9ZLOombnUcQKFlMqaSgBRAoDxtDspoAvkx7CJuqP9obo0bUZ/hmtk li3QDgCa6Y71pRai/rhlbzTq3f9+MeRFFFdChD/Bzr9tmtEiJiZi5tEALQxxcxBJ4aQVFWau 35sdyO2s71WXcjleMBgvIww8FyB/f2JNnjXhkRiWsVn/DW28HnldodViN2fGKuLGptfEdMKS BaO0e+02HO1FCD0BUOQS9nqY/nGNYC6SbzYugn8N7KimKRZeg6d5z1JbkWNxW3rm0VEufhhY s3KLZ72VSxDWP4PIN+KqwE1jO9DKscWmDK7eHwH50/PPUe2PSTMEu5VbDNikMhgtfLUyOkqz zqvH5Lal0oAOAEPSiLW6oUUZUsbNmQ2AIueliCkXrDrH+aSI0l4U6W56ep4I+RNxv0J/s+Vo C3VchIGmTLX2CycQS3XOy8LQO20B/5X8ylkVRHAyH71gRDPl671sP1FH3b2FJF6nNFeIQlcF aJYJJnQXqoVGlwqOV01NPHAkWCrTzzz7SrmAsZvSGJXk0JIL+ARxuLZQw==
IronPort-HdrOrdr: A9a23:jhr1yKhGvzBqXF4Rj7xFMxynxHBQX4N23DAbv31ZSRFFG/FwyP rOoB1L73HJYWgqN03IwerwRpVpQRvnhPlICPoqTMaftWjdySuVxeRZjbcKrAeQYBEXeIRmpN 1dmsRFebjN5B1B/LnHCWqDYpUdKbu8gd2VbI7lph8HJ2wHGsIQjTuRSDzrbnGeLzM2Y6bRYa Dsnvav0ADQAEj/AP7LYkUtbqzmnZnmhZjmaRkJC1oM8w+Vlw6l77b8Dlyxwgoeeykn+8ZhzU H11yjCoomzufCyzRHRk0XJ6Y5NpdfnwtxfQOSRl8kuLCn2gArAXvUlZ1TChkFwnAic0idtrD D+mWZ4Ay210QKIQoiBm2qr5+An6kd015at8y7DvZKpm72IeNtzMbszuWseSGqF16Ll1+sMj5 6iGAmixsZq5Fr77VbAzsmNWBdwmkWup30+1eYVknxESIMbLKRctIoF4SpuYds99Q/Bmcoa+d NVfYzhDTdtACWnRmGcunMqzM2nX3w1EBvDSk8eutaN2zwTmHxi1UMXyMEWg39FrfsGOtd5zv WBNr4tmKBFT8cQY644DOAdQdGvAmiIRR7XKmqdLVnuCalCMXPQrJz85qkz+YiRCdM15Yp3nI 6EXEJTtGY0dU6rAcqS3IdT+hSIW2m5VSSF8LAU23G4gMy1eFPPC1zDdLkDqbrVnxwvOLyTZx /oAuMiPxbKFxqYJbp0
X-IronPort-Anti-Spam-Filtered: true
X-IronPort-AV: E=Sophos;i="5.85,335,1624320000"; d="scan'208,217";a="780669809"
Received: from rcdn-core-4.cisco.com ([173.37.93.155]) by alln-iport-5.cisco.com with ESMTP/TLS/DHE-RSA-SEED-SHA; 30 Sep 2021 10:14:23 +0000
Received: from mail.cisco.com (xbe-aln-001.cisco.com [173.36.7.16]) by rcdn-core-4.cisco.com (8.15.2/8.15.2) with ESMTPS id 18UAENKu023856 (version=TLSv1.2 cipher=AES256-SHA bits=256 verify=OK); Thu, 30 Sep 2021 10:14:23 GMT
Received: from xfe-aln-002.cisco.com (173.37.135.122) by xbe-aln-001.cisco.com (173.36.7.16) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id 15.2.792.15; Thu, 30 Sep 2021 05:14:23 -0500
Received: from xfe-aln-005.cisco.com (173.37.135.125) by xfe-aln-002.cisco.com (173.37.135.122) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id 15.2.792.15; Thu, 30 Sep 2021 05:14:22 -0500
Received: from NAM11-BN8-obe.outbound.protection.outlook.com (173.37.151.57) by xfe-aln-005.cisco.com (173.37.135.125) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id 15.2.792.15 via Frontend Transport; Thu, 30 Sep 2021 05:14:22 -0500
ARC-Seal: i=1; a=rsa-sha256; s=arcselector9901; d=microsoft.com; cv=none; b=MaVzzhu8P6M2qx/gnwzPXej3chMYJ7C08kjLusq/KyrrnCDoneK8BmT0LOAqEl/uel0TwgSLzQCVqKJITe7U1C+s35NuHIzTqQJynXIFBc/D0EzFcwihyN4mxUpfJz53PfMS99/tEw7YeyLhxwfzd67l0EIID+J9huEYd2c+zqs9j4QFfyYLjoLKdN2Cx5AbbEwDJCEFADFrNSKi1Uy7/fNy6KMbKJv6CHZIxmkVDXvg4l1K7xxs8agVO9UOK8Cnr/pQh3iahR/d+GDbAW5vMvXye94YEzVHCqXvYRydEj7VwoFU6/Keb7xUbeX4ShuQlZPRzWm+xiX666U137tDrw==
ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=microsoft.com; s=arcselector9901; h=From:Date:Subject:Message-ID:Content-Type:MIME-Version; bh=DEePuQ7FpGaFJhtXBJOWef5cZtKZ1ebwhNm8YHVJ228=; b=QvMlUQgQ0iH5clbfslEHZzNw2r2CU81qRtoNO3iZRVRD5DEBvw4N0JbuQkR0pR5LO87vd9Tnr95puXH/eZ2n/XW4WbLi5GbukLzE6vsZrsOtwQYEUG9eg0N1QC5+NrcfDw80Pr4N87zIowDcE0l5v5xw3/m9H6d9poLPUR5afomXSxzljRRL0zTQmkuNIb4gahw/AGGQxU4RbmDWHrg5ObiUgv3QqZ97i1JO247kl4UDnCiZEMqA0dShkmneh7SmGLhoWYZE6XkhHPAbUI/imQIALkXkyvrCB6vqOOmyalc57r1w1oFwEI3Cyqjv5J1LZHO51j3xXbJkjDVhouJZEQ==
ARC-Authentication-Results: i=1; mx.microsoft.com 1; spf=pass smtp.mailfrom=cisco.com; dmarc=pass action=none header.from=cisco.com; dkim=pass header.d=cisco.com; arc=none
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=cisco.onmicrosoft.com; s=selector2-cisco-onmicrosoft-com; h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-SenderADCheck; bh=DEePuQ7FpGaFJhtXBJOWef5cZtKZ1ebwhNm8YHVJ228=; b=I6firJQHgM3B9x7WL0LzsL4g6eCZCui5mSDFtCa/M9ced9ODbG9nXg+iw528IeIfuuiBPKgcS7r7BYAy4tXL03LKqrWXBRYzXUKdtZCnCpeJx7nMx5m8bADsi1wOMzHWAySUhqD6DavI4OtfTbnMDMJyAhGgSLoae2RP8BVeZmQ=
Received: from CO1PR11MB4881.namprd11.prod.outlook.com (2603:10b6:303:91::20) by MWHPR11MB1518.namprd11.prod.outlook.com (2603:10b6:301:c::10) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id 15.20.4566.15; Thu, 30 Sep 2021 10:14:19 +0000
Received: from CO1PR11MB4881.namprd11.prod.outlook.com ([fe80::1493:cc59:eb78:7302]) by CO1PR11MB4881.namprd11.prod.outlook.com ([fe80::1493:cc59:eb78:7302%7]) with mapi id 15.20.4566.015; Thu, 30 Sep 2021 10:14:19 +0000
From: "Pascal Thubert (pthubert)" <pthubert@cisco.com>
To: Lorenzo Colitti <lorenzo=40google.com@dmarc.ietf.org>
CC: Vasilenko Eduard <vasilenko.eduard@huawei.com>, v6ops list <v6ops@ietf.org>, David Farmer <farmer@umn.edu>
Thread-Topic: [v6ops] Implementation Status of PREF64
Thread-Index: AQHXtcqCWIXFodZSLkqGGYs1FKD2lqu8KpsAgAATjsCAAA3zgIAACv0g
Date: Thu, 30 Sep 2021 10:14:15 +0000
Deferred-Delivery: Thu, 30 Sep 2021 10:13:58 +0000
Message-ID: <CO1PR11MB4881F411A4D5BEA7A8479726D8AA9@CO1PR11MB4881.namprd11.prod.outlook.com>
References: <DDA36020-90CC-471B-83AD-3D98950F1164@delong.com> <CAO42Z2wdoSdJDOB2Zo0=ZK0ecOARRsdg2nbHZGSDOhryPbLfDw@mail.gmail.com> <F2BD0A42-E9AD-45DD-999A-638E73BE1177@delong.com> <CAKD1Yr2K3Gd3JD=NJFOoH6GYgs-8ACxRQB9-sKJ7cbF4_hxsow@mail.gmail.com> <0B533C71-5DB0-410D-A5A3-7E8FD559F214@delong.com> <CAKD1Yr3NoYfNT7+OVJoCCdgdif6AHHw29tNCPttS=-NuRZKv3w@mail.gmail.com> <5FAD5290-3616-4194-B783-D473DB38A89A@delong.com> <m1mVGC6-0000HSC@stereo.hq.phicoh.net> <D6620D7C-8FE8-4294-8014-AB18A230C9C7@delong.com> <m1mVItl-0000GuC@stereo.hq.phicoh.net> <YVN6/cA6Ob3vLJQH@Space.Net> <m1mVK32-0000HpC@stereo.hq.phicoh.net> <CAO42Z2zQys6o41+m1iX1Mm88M7CaUdQa1C+uuYqxz2STfcwt_Q@mail.gmail.com> <d2887464-19d7-da09-d6f6-51ddc0e9ca45@foobar.org> <CAO42Z2w=BVoy-EmkM+x=8bVJc8WAcwRyLrdpsOAxu-as3ed6ZQ@mail.gmail.com> <CAN-Dau0v5dS9esEfQk9w0deG-QLpQ6EH9JJBY4JVcUfstFENkQ@mail.gmail.com> <1e9444b30d964a5cb17ff419eca6cc35@huawei.com> <CAKD1Yr0T-7t-UHbsJBMLpTjKhPAV5uUQkux6oby89TVUue7PyA@mail.gmail.com> <CO1PR11MB4881D400EA4681F1505040D2D8AA9@CO1PR11MB4881.namprd11.prod.outlook.com> <CAKD1Yr3TmqFxjKuZ57wS7VuPOf6rJvOwnvnQdFrRLQ=DkZ+CCw@mail.gmail.com>
In-Reply-To: <CAKD1Yr3TmqFxjKuZ57wS7VuPOf6rJvOwnvnQdFrRLQ=DkZ+CCw@mail.gmail.com>
Accept-Language: fr-FR, en-US
Content-Language: en-US
X-MS-Has-Attach:
X-MS-TNEF-Correlator:
authentication-results: dmarc.ietf.org; dkim=none (message not signed) header.d=none;dmarc.ietf.org; dmarc=none action=none header.from=cisco.com;
x-ms-publictraffictype: Email
x-ms-office365-filtering-correlation-id: 3beac593-f930-4e61-2ba8-08d983fb1132
x-ms-traffictypediagnostic: MWHPR11MB1518:
x-microsoft-antispam-prvs: <MWHPR11MB1518AD1C3E520CA55CDCBA90D8AA9@MWHPR11MB1518.namprd11.prod.outlook.com>
x-ms-oob-tlc-oobclassifiers: OLM:8273;
x-ms-exchange-senderadcheck: 1
x-ms-exchange-antispam-relay: 0
x-microsoft-antispam: BCL:0;
x-microsoft-antispam-message-info: 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
x-forefront-antispam-report: CIP:255.255.255.255; CTRY:; LANG:en; SCL:1; SRV:; IPV:NLI; SFV:NSPM; H:CO1PR11MB4881.namprd11.prod.outlook.com; PTR:; CAT:NONE; SFS:(366004)(54906003)(40140700001)(55016002)(316002)(53546011)(6506007)(5660300002)(966005)(64756008)(9686003)(2906002)(7696005)(8676002)(8936002)(166002)(38100700002)(122000001)(4326008)(186003)(66446008)(66574015)(38070700005)(83380400001)(508600001)(86362001)(76116006)(66556008)(66476007)(66946007)(33656002)(52536014)(71200400001)(6666004); DIR:OUT; SFP:1101;
x-ms-exchange-antispam-messagedata-chunkcount: 1
x-ms-exchange-antispam-messagedata-0: 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
x-ms-exchange-transport-forked: True
Content-Type: multipart/alternative; boundary="_000_CO1PR11MB4881F411A4D5BEA7A8479726D8AA9CO1PR11MB4881namp_"
MIME-Version: 1.0
X-MS-Exchange-CrossTenant-AuthAs: Internal
X-MS-Exchange-CrossTenant-AuthSource: CO1PR11MB4881.namprd11.prod.outlook.com
X-MS-Exchange-CrossTenant-Network-Message-Id: 3beac593-f930-4e61-2ba8-08d983fb1132
X-MS-Exchange-CrossTenant-originalarrivaltime: 30 Sep 2021 10:14:19.7081 (UTC)
X-MS-Exchange-CrossTenant-fromentityheader: Hosted
X-MS-Exchange-CrossTenant-id: 5ae1af62-9505-4097-a69a-c1553ef7840e
X-MS-Exchange-CrossTenant-mailboxtype: HOSTED
X-MS-Exchange-CrossTenant-userprincipalname: QXpSwOzsn06L1nQtVN2DBjcvK+J4nzmlg/DwQizsF1+ro/w+ay06jYkJGcuhTeyWPGxWqIbVvmw6B+tEWeUn/w==
X-MS-Exchange-Transport-CrossTenantHeadersStamped: MWHPR11MB1518
X-OriginatorOrg: cisco.com
X-Outbound-SMTP-Client: 173.36.7.16, xbe-aln-001.cisco.com
X-Outbound-Node: rcdn-core-4.cisco.com
Archived-At: <https://mailarchive.ietf.org/arch/msg/v6ops/A4REbi-gA-kjbYVTflq1PX2vA-s>
Subject: Re: [v6ops] Implementation Status of PREF64
X-BeenThere: v6ops@ietf.org
X-Mailman-Version: 2.1.29
Precedence: list
List-Id: v6ops discussion list <v6ops.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/v6ops>, <mailto:v6ops-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/v6ops/>
List-Post: <mailto:v6ops@ietf.org>
List-Help: <mailto:v6ops-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/v6ops>, <mailto:v6ops-request@ietf.org?subject=subscribe>
X-List-Received-Date: Thu, 30 Sep 2021 10:14:31 -0000

I have the same perception of that thread and the IPv6 woes one on NANOG as you do. For one thing we cannot extract DHCPv6 brutally as a rotten tooth.
We need to understand what it’s used for and provide a better replacement that will slowly take over. SLAAC cannot be that. The problem of SLAAC is not the AAC piece, it’s the SL. SL lacks observability, and that’s what prevent it from being a replacement to the database that the operators and network managers need, e.g., for forensics.

I think there’s a golden path where DHCP is pushed deeper in the infra so that at first it is no more visible to the end device but still available to the operations that require it, and then we move on to the point where it becomes fully redundant and ceases to exist, by the user’s own decision, on his own agenda.

The network beyond the first hop has evolved tremendously, and we want to keep the host agnostic for the most part. RFC 8505 goes a lot way to signal things that the modern back ends (wireless, overlays) need to routing and proxying.

I just published how it can replace MLD to avoid the related multicast (https://datatracker.ietf.org/doc/draft-thubert-6lo-multicast-registration/) and that request actually came from outside the IETF and real world deployments. Note that RFC 8505 does not use MLD as it does not use the SNMA, but MLD is still a source of multicast that can be saved on the link and complexity in the stack.

If we need more, I’m happy to work on the more complete set with you all.

Keep safe;

Pascal

From: Lorenzo Colitti <lorenzo=40google.com@dmarc.ietf.org>
Sent: jeudi 30 septembre 2021 11:16
To: Pascal Thubert (pthubert) <pthubert@cisco.com>
Cc: Vasilenko Eduard <vasilenko.eduard@huawei.com>; v6ops list <v6ops@ietf.org>; David Farmer <farmer@umn.edu>
Subject: Re: [v6ops] Implementation Status of PREF64

Pascal,

From what's been said so far on this thread, do you think that an implementation would achieve anything? Many of the posts here say things like, "my network, my rules", and "this network has a policy of requiring DHCPv6". Would be interested in seeing whether any of the folks on this thread who are saying that Android should implement DHCPv6 support your proposal, since it's obviously not DHCPv6. :-)

I'm all for finding another solution to this problem, but given some of the messages on this thread it doesn't look like there's much room for compromise.

Cheers,
Lorenzo

On Thu, Sep 30, 2021 at 5:43 PM Pascal Thubert (pthubert) <pthubert=40cisco.com@dmarc.ietf.org<mailto:40cisco.com@dmarc.ietf.org>> wrote:
There is, Lorenzo,

and strangely enough to me you are still opposing the technical evolution of SLAAC that would make them to be fully efficient – RFC 8505<https://datatracker.ietf.org/doc/html/rfc8505>.

I see that our support of First Hop Security (that includes snooping) is explicitly cited in that article. RFC 8505 solves the corner case of snooping, e.g., silent nodes which the article inelegantly ignores but are a real issue when you do not have DHCP to provide a complete state.

If needed the infra could easily republish an RFC 8505 registration to that resurrected draft-ietf-dhc-addr-registration<https://datatracker.ietf.org/doc/draft-ietf-dhc-addr-registration/> that you suggest as we do for LISP today, but we foresee a more distributed registrar, e.g., with eVPN (draft-thubert-bess-secure-evpn-mac-signaling)<https://datatracker.ietf.org/doc/html/draft-thubert-bess-secure-evpn-mac-signaling-00>.

RFC 8505 allows the device to configure any address it likes as long as it’s not duplicate. It is an alternative from DHCP where the host is still in control of its addresses; it’s still autoconf, but made stateful. It is less work on the host that already has SLAAC than implementing draft-ietf-dhc-addr-registration<https://datatracker.ietf.org/doc/draft-ietf-dhc-addr-registration/> as you suggest in you other mail.

I’m still baffled and sad that we are not working together on making this happen in a demo.

Keep safe;

Pascal


From: v6ops <v6ops-bounces@ietf.org<mailto:v6ops-bounces@ietf.org>> On Behalf Of Lorenzo Colitti
Sent: jeudi 30 septembre 2021 9:17
To: Vasilenko Eduard <vasilenko.eduard@huawei.com<mailto:vasilenko.eduard@huawei.com>>
Cc: v6ops list <v6ops@ietf.org<mailto:v6ops@ietf.org>>; David Farmer <farmer=40umn.edu@dmarc.ietf.org<mailto:40umn.edu@dmarc.ietf.org>>
Subject: Re: [v6ops] Implementation Status of PREF64

There are already vendor solutions.

https://theinternetprotocolblog.wordpress.com/2020/03/14/does-one-need-dhcpv6/

On Thu, Sep 30, 2021 at 4:12 PM Vasilenko Eduard <vasilenko.eduard@huawei.com<mailto:vasilenko.eduard@huawei.com>> wrote:
+1.
“Show me another solution” is a good message. Just idea or theory is not enough.
David has mentioned OpenSource. I would say that vendor product is needed too.
Ed/
From: v6ops [mailto:v6ops-bounces@ietf.org<mailto:v6ops-bounces@ietf.org>] On Behalf Of David Farmer
Sent: Thursday, September 30, 2021 5:15 AM
To: Mark Smith <markzzzsmith@gmail.com<mailto:markzzzsmith@gmail.com>>; Lorenzo Colitti <lorenzo@google.com<mailto:lorenzo@google.com>>
Cc: v6ops list <v6ops@ietf.org<mailto:v6ops@ietf.org>>
Subject: Re: [v6ops] Implementation Status of PREF64


On Wed, Sep 29, 2021 at 5:16 PM Mark Smith <markzzzsmith@gmail.com<mailto:markzzzsmith@gmail.com>> wrote:

On Thu, 30 Sep 2021, 03:41 Nick Hilliard, <nick@foobar.org<mailto:nick@foobar.org>> wrote:

Even if you had, that would be fine and you're welcome to your opinions.
  Other people disagree because it doesn't make sense on their deployments.

If they want to hobble IPv6, such that it is nothing more than a copy of IPv4 with bigger addresses, what is the point of going to the expense and effort of deploying IPv6 when most enterprises have plenty of IPv4 address space via RFC1918 and 100.64/10 if they were willing to abuse it a bit?

A hobbled deployment of IPv6, hobbled such that it doesn't provide any useful benefit over IPv4, is just pure business expense. Increased profit is an exceptionally strong disincentive to incurring those.

So, instead of just telling people they are doing IPv6 wrong (building a hobbled network) and that DHCP doesn't provide them what they think it does; How about making sure there are good open-source tools to build what you think is a non-hobbled network that meets their needs? In other words, how about providing some good open-source ARP and ND router scraping tools?

Now you could point the finger back at me too, but then I'm not saying that building networks with DHCPv6 is building a hobbled network, nor am I refusing to provide a DHCPv6 client for a very popular mobile and IoT platform. So, at least in my opinion, that puts more onus on you than me.

So, I agree that DHCP logging (both IPv4 and IPv6) by itself isn't enough, and yes you also need to scrape ARP and ND out of the routers. However, ARP and ND scrapping by themselves aren't enough either, DHCP logging provides much better granularity than is practical from ARP and ND scrapping, at least using SNMP. Also, by having both you can make some assumptions about suspicious access clients that are statically configuring addresses instead of doing DHCP on the access network as they should be.

I agree that limiting DHCPv6 clients to only IA-NA  and not providing IA-TA is a bad implementation of DHCPv6. Further, I recommend SLAAC, and we provide SLAAC, for general-purpose (AKA public) access networks with IPv6. But, we also have many networks where that is not appropriate, where I have regulatory and contractual compliance requirements, to protect non-public information, things like FERPA, HIPPA, PCI, and CMMC(1-4). Long-term we want these networks doing IPv6 too.

Android smartphones, probably belong on a general-purpose access network with SLAAC for IPv6 in most cases. However, Android is also on many IoT devices, things like point-of-sale terminals, credit card terminals, environmental monitoring sensors, etc... Many of those things I don't want on general-purpose access networks and some of those will have compliance requirements we have to meet. We think DHCPv6 is perfectly appropriate for these networks, and probably for server networks too.

In conclusion, while I agree with most of your arguments that DHCPv6 isn't necessarily the right way to do IPv6, especially for general-purpose (public) access networks, that doesn’t mean I think DHCPv6 doesn’t have a place in many other networks, and it would be very helpful if Android provided a DHCPv6 client, even as a non-default option.

Thanks


--
===============================================
David Farmer               Email:farmer@umn.edu<mailto:Email%3Afarmer@umn.edu>
Networking & Telecommunication Services
Office of Information Technology
University of Minnesota
2218 University Ave SE        Phone: 612-626-0815
Minneapolis, MN 55414-3029   Cell: 612-812-9952
===============================================