Re: [v6ops] Enterprise policies: :WAS Implementation Status of PREF64

"Pascal Thubert (pthubert)" <pthubert@cisco.com> Fri, 01 October 2021 11:42 UTC

Return-Path: <pthubert@cisco.com>
X-Original-To: v6ops@ietfa.amsl.com
Delivered-To: v6ops@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id BFECE3A0A90 for <v6ops@ietfa.amsl.com>; Fri, 1 Oct 2021 04:42:47 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -11.898
X-Spam-Level:
X-Spam-Status: No, score=-11.898 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, DKIM_SIGNED=0.1, DKIM_VALID=-0.1, DKIM_VALID_AU=-0.1, DKIM_VALID_EF=-0.1, HTML_MESSAGE=0.001, RCVD_IN_DNSWL_MED=-2.3, RCVD_IN_MSPIKE_H2=-0.001, SPF_NONE=0.001, URIBL_BLOCKED=0.001, USER_IN_DEF_DKIM_WL=-7.5] autolearn=ham autolearn_force=no
Authentication-Results: ietfa.amsl.com (amavisd-new); dkim=pass (1024-bit key) header.d=cisco.com header.b=TZeOqcoc; dkim=pass (1024-bit key) header.d=cisco.onmicrosoft.com header.b=YzexCSB/
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id 3QguxASKjvD0 for <v6ops@ietfa.amsl.com>; Fri, 1 Oct 2021 04:42:42 -0700 (PDT)
Received: from alln-iport-1.cisco.com (alln-iport-1.cisco.com [173.37.142.88]) (using TLSv1.2 with cipher DHE-RSA-SEED-SHA (128/128 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id 621C93A0A9B for <v6ops@ietf.org>; Fri, 1 Oct 2021 04:42:42 -0700 (PDT)
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/simple; d=cisco.com; i=@cisco.com; l=71799; q=dns/txt; s=iport; t=1633088562; x=1634298162; h=from:to:cc:subject:date:message-id:references: in-reply-to:mime-version; bh=6V8RlEKPB3j1SmqfbioXWopChJBWHhF+UT9JCwklhvQ=; b=TZeOqcocfsuYlpalm1SKcE7b+MCc09jb2oYItnpf/5ZrV+fvwjN1js8y TgkdNEBU43A9JaZWvg79eVBfufyb9J3kw4T/82nbeyvL4rc+UEgiBTfre nv0ut177bixehkKGY6OwS5gdsH63bwUsjH2zphqcLjMowDwAFqy+DyTMf 4=;
X-IPAS-Result: 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
IronPort-PHdr: A9a23:V3Hd0ByKD0TTVnLXCzPFngc9DxPP8531MxIbrJ09hOEGfqei+sHkO 0rSrbVogUTSVIrWo/RDl6LNsq/mVGBBhPTJsH0LfJFWERNQj8IQkl8hDdKLT0rhI62iYykzB s8XUlhj8jmyOlRUH8CrYVrUrzWy4DceFw+5OxByI7H+G5XZiIK80OXhk6A=
IronPort-Data: A9a23:AaHYUaB35Za6axVW/w3jw5YqxClBgxIJ4kV8jS/XYbTApG5x02ZSz DBOWWHVMq6JMDP2ct8ia4Xj/UoOuseGztY3OVdlrnsFo1CmBibm6XV1Cm+qYkt+++WaFBoPA /3z6bAsFehsJpPmjk/F3oPJ8D8siMlkepKmULSdY3gpHFc+IMscoUsLd9AR09YAbeeRW2thi fuqyyEIEAb4s9LcGjt8B5Or8HuDjtyr0N8rlgBWicRwgbPrvyJ94KTzik2GByCQroF8RoZWT gtYpV2z1juxExwFUrtJnltnG6EHaua6AOSAtpZZc++Sr1sciDcY6Yc6ZPk1RnhUigvYoM8kn b2htbToIesoFrfHlOJYWB5CHmQue6ZH47TAZ3O4tKR/zWWfLCCqmKooXRpwZNFEkgp0KTkmG fgwMCwNcxqOnf6ey7OgQe4qjcMmRCXuFNxC5SAwkWqHXZ7KR7jzbbiX4MJm2ww8h+1fNsSdQ /AyV2dwOUGojxpnYwdLV81WcP2Trn7gfjsN9AqZqK4w5WeVxwt0+LToOcDePN2HWcsTmVyXz krYoWPhGTkbOcCRjz2f/RqRavTnhyj3XscZE6e1s64si1yIzWtVAxoTPbemnRWnogmOdpEBB Vc+wQsv/asb23OoT+esYALt9RZooSUgc9ZXFuQ77iSExazV/xuVCwA4othpNYxOWCgeGG1C6 7OZoz/6LWc14eHKExpx4p/R/G3tYXJKRYMXTXZcFVNt3jX1nG0kYvsjpP5ZEaW1h8f5Ajb2q 9xhhHdj3+VK5SLnOlnSwLwqqyinqp6MRQkv60CHGGmk9Qh+IoWiYuRECGQ3D94dd+51rXHY4 RDofvRyCshVUPlhcwTWG40w8EmBvartDdElqQcH82Md3zqs4WW/Wotb/StzIkxkWu5dJ2SyO BWN51sIusICVJdPUUORS9/hYyjN5fWxfekJqtiPBjazSsErLVTerH0GibC4hjm8yCDAbp3Ty b/CIZrzUh72+IxszSG9QK8GwKQ3yyUlrV4/trilpylLJYG2PSbPIZ9caQPmRrlgsMus/VSOm /4CZpTi40sECoXWPHKImbP/2HhXdBDX87it85wJHgNCSyI7cFwc5wj5m+h8JNA1w/oPxo8lP BiVAydl9bY2vlWfQS3iV5ypQOmHsUpXxZ7jARERAA==
IronPort-HdrOrdr: A9a23:zJYrSKFqyYdp5kt+pLqFSpHXdLJyesId70hD6qkvc31om52j+f xGws516fatskdvZJkh8erwX5VoMkmsi6KdgLNhfItKOTOHhILGFvAY0WKP+UyEJ8S6zJ8g6U 4CSdk/NDSTNykBsS+S2mDReLxMrKjlgcKVbKXlvgpQpGpRGsddBnJCe36m+zpNNXB77PQCZf 6hz/sCgwDlVWUcb8y9CHVAdfPEvcf3mJXvZgNDLwI76SGV5AnYq4LSIly95FMzQjlPybAt/S zuiAri/JiutPm911v1y3LT1ZJLg9Hso+EzRvBky/JlbwkEuDzYI7iJaIfy+gzdZ9vfsWrCpe O85yvI+f4Ds085MFvF+icFkDOQoQrGo0WSuWNwx0GT+/AQgFkBepZ8bUUzSGqF16NohqAO7I tbm22erJZZFhXGgWD04MXJTQhjkg6urWMlivN7tQ0TbWIyUs4bkWUkxjIeLH7AJlOM1Kk3VO 11SM3M7vdfdl2XK3jfo2l02dSpGnA+BA2PTEQOstGcl2E+pgE382IIgMgE2nsQ/pM0TJdJo+ zCL6RzjblLCssbd7h0CusNSda+TmbNXRXPOmSPJkmPLtBKB1vd75rspLkl7uCjf5IFiJM0hZ TaSVtd8XU/fkr/YPf+lKGjMiq9CVlVeA6dhP22y6IJz4EUdYCbRxFrEmpe4fdIi89vdvHmZw ==
X-IronPort-Anti-Spam-Filtered: true
X-IronPort-AV: E=Sophos;i="5.85,337,1624320000"; d="scan'208,217";a="757984368"
Received: from rcdn-core-8.cisco.com ([173.37.93.144]) by alln-iport-1.cisco.com with ESMTP/TLS/DHE-RSA-SEED-SHA; 01 Oct 2021 11:42:40 +0000
Received: from mail.cisco.com (xbe-rcd-003.cisco.com [173.37.102.18]) by rcdn-core-8.cisco.com (8.15.2/8.15.2) with ESMTPS id 191BgeWc031897 (version=TLSv1.2 cipher=AES256-SHA bits=256 verify=OK); Fri, 1 Oct 2021 11:42:40 GMT
Received: from xfe-rtp-004.cisco.com (64.101.210.234) by xbe-rcd-003.cisco.com (173.37.102.18) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id 15.2.792.15; Fri, 1 Oct 2021 06:42:40 -0500
Received: from xfe-rtp-002.cisco.com (64.101.210.232) by xfe-rtp-004.cisco.com (64.101.210.234) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id 15.2.792.15; Fri, 1 Oct 2021 07:42:39 -0400
Received: from NAM11-DM6-obe.outbound.protection.outlook.com (64.101.32.56) by xfe-rtp-002.cisco.com (64.101.210.232) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id 15.2.792.15 via Frontend Transport; Fri, 1 Oct 2021 07:42:39 -0400
ARC-Seal: i=1; a=rsa-sha256; s=arcselector9901; d=microsoft.com; cv=none; b=lshyFqIvwgr+0v4r5hXMgA0hnvfNZ5Vqt/Sn5REbQxlTX1Lw6WnDCZ2Tk0tPfgVE/Hxc0cpNaDAEbKDCIQphPbaMEOY5Wtmijt2kBJlT/JyNzeIhVyEeu6TV057d9G9DvBLn5ZiF3cVOdOiFVKYzTEIICw4Y+Srjkyw6GqhQqR4vCabiKxGKAXu6xFa+Abl/k3Q6DXwB2LqfHrOdMzDrHtyHAv5DQUucS2OxtsZqM3+5JubPjdJC9m7yf1pWi+LtciH22HLnxEh6h9/tPhLGOmImS9hhz3NacQ1TrqE+E8VV/CkcJTzKJsIdmxR5GQyOspzW29Dc4KLjYaWiAbqQ0g==
ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=microsoft.com; s=arcselector9901; h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-AntiSpam-MessageData-ChunkCount:X-MS-Exchange-AntiSpam-MessageData-0:X-MS-Exchange-AntiSpam-MessageData-1; bh=6V8RlEKPB3j1SmqfbioXWopChJBWHhF+UT9JCwklhvQ=; b=n9bpmt5UNFfIYhJ2k+hwKzrqYh8FeM/MUBnBZlDCeMkFABanyQQjVOCXBBNdZkPJDvOI/A793QcPG+i95cdVBGj9BvNDc0rIj0UrhGs+6qJEoIbQgExEDpAUT0tfXhFit0S3PN+6XXasCZ3uaQ1ICp3tTiI7KwCg8IkKhhSSlUlw4iFqtmApdbJ2bLpLKQKc7V6ffrNN9bGetWtt2ehIxxGsYPsiSd8k/Nn77Yv52Ab4zDP9OMc9FEweqKLJ+9bwHCX5bW0p3HEkYyVKTxNyiw7vf+xY+EOQT0JncoGchdSLt6ckKr4914BQ43N0tMvO8cwHNQuNgsCE6CafT72IAA==
ARC-Authentication-Results: i=1; mx.microsoft.com 1; spf=pass smtp.mailfrom=cisco.com; dmarc=pass action=none header.from=cisco.com; dkim=pass header.d=cisco.com; arc=none
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=cisco.onmicrosoft.com; s=selector2-cisco-onmicrosoft-com; h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-SenderADCheck; bh=6V8RlEKPB3j1SmqfbioXWopChJBWHhF+UT9JCwklhvQ=; b=YzexCSB/vJ0YTij7yIZpbqxv1DLzuT1qnFlumB3pyZiMCrRfKjw3f6S+SynTIXCgcU6gmIipGu/umUG8kwBZp8DmETb/cb2qygrGkWie3e9zBXUscYqjKMS9Mak6SilGxozXDy6iFxiz2otkniI3sBFk83MOjVjaolqhVL2zm5A=
Received: from CO1PR11MB4881.namprd11.prod.outlook.com (2603:10b6:303:91::20) by MWHPR1101MB2301.namprd11.prod.outlook.com (2603:10b6:301:53::12) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id 15.20.4566.15; Fri, 1 Oct 2021 11:42:37 +0000
Received: from CO1PR11MB4881.namprd11.prod.outlook.com ([fe80::1493:cc59:eb78:7302]) by CO1PR11MB4881.namprd11.prod.outlook.com ([fe80::1493:cc59:eb78:7302%7]) with mapi id 15.20.4566.015; Fri, 1 Oct 2021 11:42:37 +0000
From: "Pascal Thubert (pthubert)" <pthubert@cisco.com>
To: Owen DeLong <owen=40delong.com@dmarc.ietf.org>
CC: v6ops list <v6ops@ietf.org>
Thread-Topic: [v6ops] Enterprise policies: :WAS Implementation Status of PREF64
Thread-Index: Ade2F2i+DqEMOmUbSsmK+MQXRJC8GQADbr4AAAYaxboAB0R5gAAXs4jH
Date: Fri, 01 Oct 2021 11:42:37 +0000
Message-ID: <F5FA6B8B-A13B-4B42-8351-4B9E0213FF01@cisco.com>
References: <CO1PR11MB48819C4DC3C8C17C975E9EC2D8AA9@CO1PR11MB4881.namprd11.prod.outlook.com> <5778D865-D4B1-48DD-8B68-51710735437C@delong.com> <843153CC-DC05-4594-A22F-83E7A866C2A2@cisco.com> <7BBDD6E6-0264-4D95-B80F-49A2EECDFE0F@delong.com>
In-Reply-To: <7BBDD6E6-0264-4D95-B80F-49A2EECDFE0F@delong.com>
Accept-Language: fr-FR, en-US
Content-Language: fr-FR
X-MS-Has-Attach:
X-MS-TNEF-Correlator:
authentication-results: ietf.org; dkim=none (message not signed) header.d=none;ietf.org; dmarc=none action=none header.from=cisco.com;
x-ms-publictraffictype: Email
x-ms-office365-filtering-correlation-id: fa535f05-82c8-4876-15f0-08d984d09177
x-ms-traffictypediagnostic: MWHPR1101MB2301:
x-microsoft-antispam-prvs: <MWHPR1101MB2301FAA65B6CB08B6E65CA2BD8AB9@MWHPR1101MB2301.namprd11.prod.outlook.com>
x-ms-oob-tlc-oobclassifiers: OLM:7219;
x-ms-exchange-senderadcheck: 1
x-ms-exchange-antispam-relay: 0
x-microsoft-antispam: BCL:0;
x-microsoft-antispam-message-info: iUtx8xiUb5yc1vvQZQYrkoAyT0rBjt6XUWs1uDoenPfIyQnFqMlKLY60+zdjYOig9lbyKVgmbdQ5JRjY1wPyQGVP1LdMXXYAJSGhOSwXA4J71mOG8cmIprzFjzLDaDciNXRHr91DBfimnILSH0ljvnyGmYjtUwRrNvkHQE+gJg0oZ0n+owyliF5HukyUAE3YrSmlG55zqFPISA1qUfJdwioy4hlt8fkTb6MmPsUh9zb98ouklmn0RTBuXE1wM9GMo5GGbu8IHv2oxg45DHGuyw6U2tMsZkwveYQYFuS3eZe+AI/aqt6qC6RQuLHSRvEvR898TTNgRK3ZlwWe/NG4y2H1JXXOfdsooGyqFmudRd6jv3SbAWhEQSqTN8JKl/FSyqNkKN9/LEVp3rnmUAZ+m+RlL4lmYN24CpKNyAumc1F2YBOJA+70F0b8u43l4iRLmM0FLKfUAWVpRX30n+siD+pRgcv2qf51GP5gmHdPn9QmhS5wu3O5B4e6uhYc6fPENhYeZEaiY7xFWSv+aEW/ziJlVrLLrLijl3sEELDFJgVtOSJWiU11vsJuhXPCpXgALV2HhYiG5PRFpUqNelyElwGfRzcgVK5vEd5v4HzCouzugFfBpWx9aCFlJwfeJHvJjHqu7Zz9fbiAXpDYZdyfZxlKtix+7XF8SgcnZ97u8oKAL7cCDlKiJVAKveywCHSmPjCvoCbD+821cfM1tSjVQLRQzEELipJCRwQ5TYszYkGn+4MhGy33h4Fu7dtjHqeo3tWZ+uvMpntKmcIrGoZxSeqo4ow4ywscpFi7WrG42U/cKdat7GkmkeeEhaHhoK/mevfuZ7QiMpm8n1piykD6gayrgXntkL77rHmMkRn93XGyvPKLTlHf2nuZ5YCL4Ts0
x-forefront-antispam-report: CIP:255.255.255.255; CTRY:; LANG:en; SCL:1; SRV:; IPV:NLI; SFV:NSPM; H:CO1PR11MB4881.namprd11.prod.outlook.com; PTR:; CAT:NONE; SFS:(366004)(38100700002)(8936002)(508600001)(71200400001)(76116006)(66476007)(5660300002)(66556008)(64756008)(66446008)(316002)(38070700005)(186003)(8676002)(122000001)(2616005)(33656002)(91956017)(30864003)(36756003)(166002)(83380400001)(6486002)(86362001)(6512007)(2906002)(4326008)(6506007)(66946007)(53546011)(66574015)(45980500001)(244885003); DIR:OUT; SFP:1101;
x-ms-exchange-antispam-messagedata-chunkcount: 1
x-ms-exchange-antispam-messagedata-0: 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
x-ms-exchange-transport-forked: True
Content-Type: multipart/alternative; boundary="_000_F5FA6B8BA13B4B4283514B9E0213FF01ciscocom_"
MIME-Version: 1.0
X-MS-Exchange-CrossTenant-AuthAs: Internal
X-MS-Exchange-CrossTenant-AuthSource: CO1PR11MB4881.namprd11.prod.outlook.com
X-MS-Exchange-CrossTenant-Network-Message-Id: fa535f05-82c8-4876-15f0-08d984d09177
X-MS-Exchange-CrossTenant-originalarrivaltime: 01 Oct 2021 11:42:37.7324 (UTC)
X-MS-Exchange-CrossTenant-fromentityheader: Hosted
X-MS-Exchange-CrossTenant-id: 5ae1af62-9505-4097-a69a-c1553ef7840e
X-MS-Exchange-CrossTenant-mailboxtype: HOSTED
X-MS-Exchange-CrossTenant-userprincipalname: N5dc6kNq4gsBSH55+1IHT+qtJXeE82uSS32yAVLiEtlaohWlRbq+nShVG5cYoP+Z/+pADXATC/6xk92QypKFrA==
X-MS-Exchange-Transport-CrossTenantHeadersStamped: MWHPR1101MB2301
X-OriginatorOrg: cisco.com
X-Outbound-SMTP-Client: 173.37.102.18, xbe-rcd-003.cisco.com
X-Outbound-Node: rcdn-core-8.cisco.com
Archived-At: <https://mailarchive.ietf.org/arch/msg/v6ops/BuEhuvl6efak7HnIwHh9NUk_IJA>
Subject: Re: [v6ops] Enterprise policies: :WAS Implementation Status of PREF64
X-BeenThere: v6ops@ietf.org
X-Mailman-Version: 2.1.29
Precedence: list
List-Id: v6ops discussion list <v6ops.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/v6ops>, <mailto:v6ops-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/v6ops/>
List-Post: <mailto:v6ops@ietf.org>
List-Help: <mailto:v6ops-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/v6ops>, <mailto:v6ops-request@ietf.org?subject=subscribe>
X-List-Received-Date: Fri, 01 Oct 2021 11:42:48 -0000

Hello Owen

I believe you’re confused between LPWAN which is as you describe and 6LoWPAN (now 6lo). Please look at the introduction of RFC 6282, or any of the charters of 6TiSCH ROLL, 6lo, or obviously 6LoWPAN itself. The IoT side of the IETF has been very aware of memory, CPU, and battery- related constraints.

6LoWPAN runs easy on the platforms you mention. Just Google, you’ll find the research papers. There’s a full implementation of 6TiSCH on cc2358 too, including 6LoWPAN and RPL.

Stateful ND is less state in the end host than classical ND because it always operates in not onlink mode, so the only neighbors known are the routers and information is not cached. Many radios and power line networks are non transitive so redirect is discouraged in general.

It is also less code; no DAD, no lookup and no NUD (beyond RSing the routers). No asynchronous multicast to handle but possibly RAs though in general these are unicast. No cache management. And as I said no redirect.

Plain here’s my address(es), here’s how long I need it (renewable) here’s a sequence counter (because I move) and optionally a proof of ownership (crypto based on autoconf’ed keypair). Router says yes or no, eg because it’s duplicate.

It is what the most minimalist implementations of IPv6 do. It is actually hard to prove that you need much more though it is easy to prove that you can get a lot less with more code, more state, and more bandwidth, e.g., SLAAC.

A lot of good people working hard in the early times of 6LoWPAN tried to evolve classical ND to fit in the constrained node (including bandwidth I admit) and failed. Ultimately the group went for stateful, for some people because they liked it, for other because they found no other way.

This does not change the RA much; it is recommended to add the 6CIO to expose capabilities, there’s compression related options if you compress IP, and the address of the equivalent of the DHCP server for use by routers in NBMA networks.

Ole’s work is orthogonal but I believe it’s a modern way for the future. Just like RIFT using Thrift. Please consider that as separate from stateful ND, though.

Keep safe,

Pascal

Le 1 oct. 2021 à 02:24, Owen DeLong <owen=40delong.com@dmarc.ietf.org> a écrit :



On Sep 30, 2021, at 13:55 , Pascal Thubert (pthubert) <pthubert=40cisco.com@dmarc.ietf.org<mailto:pthubert=40cisco.com@dmarc.ietf.org>> wrote:

Hello Owen



Le 30 sept. 2021 à 20:05, Owen DeLong <owen=40delong.com@dmarc.ietf.org<mailto:owen=40delong.com@dmarc.ietf.org>> a écrit :



On Sep 30, 2021, at 10:22 , Pascal Thubert (pthubert) <pthubert=40cisco.com@dmarc.ietf.org<mailto:pthubert=40cisco.com@dmarc.ietf.org>> wrote:

Hello Owen

We cannot stay too vague here. Maybe there are things where we can progress. Can we elaborate on which policies you have in mind?

I’m not the enterprises that have the policies, and you’re not going to like some of them, but examples of things clients have told me:

1. There shall be no address assignment on the LAN except by our DHCP server.
2. The switch shall not pass any packet into the network with a source address that does not correspond to the DHCP address(es)
issued to the host on that port and correlated with its authenticated MAC address in the 802.1x authentication process.
3. Any host on the network must only use addresses which we can correlate with a particular user through the DHCP and 802.1x logs.
4. Hosts cannot just choose addresses, they must be assigned by the DHCP server.

etc.

There are a number of policies that can still be enforced even with AAC, like the number of addresses per device. Some of us hate that it happens, but in some environments there’s an infrastructure cost to each address (like an auth flow, a TCAM entry, whatever) so there are cases where it is bounded by policy, want it or not, and already today. Say that number is 1, and say that ND pushes that information to the DHCP server to feed the existing tools, does that solve your use case? Or is it like the policy interested in defining a specific (semantic) IID for each node?

Most of the clients I’ve encountered that are truly resistant fall more towards the latter.

Do I read that they forge the IID for the node by policy?

Forge is a strong term. Let’s be clear what we mean by IID here. I’m not talking about DUID or MAC address, I’m talking about the host-portion of the IPv[46] address(es).

However, there have been some cases where the former might be a workable solution if hosts could be reliably prevented from using addresses not associated with the authenticated {user, host} that made it through the 802.1x process and any other NAC in question.


Sure. We do that in FHS. The trouble is that snooping is not reliable enough, mostly in the case of SLAAC. This is why stateful AAC is the only viable way in enterprise and for the lack of it the policy becomes DHCP only.

Yeah, sounds about right, though I’m not sure that stateful SLAAC with complex RAs is a better solution.

Notes:

I’m not calling people names, they are my customers. I’m trying (very hard) to make their life simpler, and I’m not trying to influence their policies. It is their job to decide what the best tool is for their case.  I see a hammer and a plier in the 25-years old  toolbox, and I can see many shapes of screws invented since for modern networks. You can manage something with both tools but that’s far from ideal, and not an incentive to go v6.

The name calling comment was more oriented towards some of the other participants in this thread.

I’m not saying that I’m happy with the lack of DHCPv6 in Android. I think DHCP was the natural starting point in the evolution towards IPv6 in enterprise and I buy the argument that it is probably an impediment to the adoption of IPv6 in that space. I just think that ultimately it should phase out and be replaced by Ole’s universal RA and Stateful ND. Because that can bring more control and visibility –  screwdrivers in the tool box.

I’m not 100% convinced of this, but I”m open to being won over. Part of it is that I am very resistant to complicating RA and SLAAC because there are devices that are resource and memory constrained that don’t need to fit into these policy-constrained networks and don’t need all the code to handle every option ever invented plus those that weren’t invented at the time the device was deployed. This constraint doesn’t apply to android, but squeezing v6 into an AT328P or even an ESP12F, for example, is hard enough as it is, without making RA gain all the complexities of DHCPv6.

Our main disagreement. Look at where stateful ND comes from. 6LoWPAN. Because SLAAC was too complicated (cache management) and too resource consuming (broadcast and asynchronous operations that keep the end device awake at night).

That’s a different kind of resource constraint… You’re now focused on power-constrained devices. I’m talking about devices that may well have mains power or a DC wall-wart, but which have only a few K-bytes of memory for IP stack, application, etc.

6LoWPAN is about power-constrained devices, but most of them are fairly resource-rich when it comes to memory, cpu, etc.

The first standard to adopt RFC 9010 is Wi-Sun. For the LFNs, those devices that are so tiny that they sleep more than cats and live on a coin battery for years. Those devices implement RFC 8505. That’s the only ND that was feasible for them.

Again, a low-power solution for a more full-featured set of hardware devices.

 Bottom line is that Stateful ND is in fact much simpler to implement than SLAAC. Your power meter at home may actually implement it and you don’t know. They are deployed by millions in North America.

Not convinced of this. I am convinced that it takes a lot less power than SLAAC, but I’m not yet convinced that the memory/CPU footprint is necessarily smaller overall.

The reason for not adding the screwdriver in the tool box is not complexity, it’s ignorance (what’s that strange tool for?).

I’m all for putting all the screwdrivers in the toolbox and letting the administrator pick the right one for each job.

What I don’t want to do is keep adding crap to RAs until it becomes impossible to parse them with anything short of a machine with 2G RAM and an ARM M7 or better processor at 1GHz or better.

I want to have something that can run at least on an ESP12-F and preferably on an AT-328P.

The nice thing about having SLAAC and DHCPv6 available is that SLAAC (as is) is a really good option for most networks and most devices and it’s extremely lightweight and relatively easy to implement, while DHCPv6 through the M+O flags in RA can provide a more robust more managed configuration environment for more full-featured hosts that can support it readily.

That was the binary truth of Y2K when networks where of either of 2 colors. This does not apply to IoT or cloud networks.

That doesn’t change the fact that there are resource-constrained (CPU, RAM, FLASH, not necessarily power) devices out there that should still be able to be IPv6 enabled.

The problem (which is almost uniquely android) here is that we have a vendor of full-featured hosts that doesn’t want to play nice i the sandbox and wants to act like a resource-constrained node that can’t do DHCPv6  _AND_ put these devices in general purpose networks with users on the devices facing full featured UIs without these additional configuration constraints, information, etc.

Said otherwise: An enterprise that decided for DHCP must keep IPv4 alive for Android users. This means that they cannot go IPv6 only. And I’ve read on the NANOG woes thread that dual stack is the worst possible outcome for OPEX.  Conclusion?

If it were my enterprise, I’d have an SSID for androids alone that was badly NAT v4 only and move everyone else forward to IPv6.

I’d send out a memo explaining the deficiency in the android operating system and how android has failed to provide the basic building blocks necessary for them to participate in our IPv6 network and so they are consigned to this legacy support SSID on a best-effort basis.

I’d probably also provide some form of subsidy for employees choosing to abandon their android devices in favor of something with DHCPv6 support.

Fortunately, in the closest thing I have to an enterprise environment where I make policy, I don’t have to support android at all.

Note that it’s not DHCP or stateful ND. The node must register an address that was obtained from DHCP in stateful ND, like it must do DAD for it today. Just that you do not waste one second in the process, and do not broadcast over the whole enterprise Wi-Fi domain. The cool thing is  that the host can also unregister it when it ceases to use the address and free network resources.

As I said, I’m not opposed to this being an additional tool administrators can choose from, but I thin it is somewhat orthogonal to whether or not IA_NA is a requirement for enterprise deployment that just can’t be obviated, at least not today. The only drawback that concerns me with it is the added complexity to SLALAC for resource constrained hosts.

I see that from the other end. Real constrained devices cannot do SLAAC. But they can do DHCP.  And they prefer stateful ND, that’s a lot more bang for the buck (e..g., RFC9010 or RFC 8929).

From what your saying, it sounds like you equate “real constrained” with “low power, and/or battery operated”. I’m not talking about power constrained devices, I’m talking about devices with limited RAM and CPU capabilities.

Stateful AAC provides full visibility and protection, a lot more than what we have today, even with DHCP. E.g.,  DHCP can only be snooped by the on path switches, the other just learn indirect information from ND multicast. There is little to no control over the DHCP state and possibly a lot of stale state, think about the impact to MAC rotation for instance. There is no notion of having more than one address with different roles, privacy requirements, and life cycles. DHCP does not help distinguish mobility vs. duplication / attack. It does not pub/sub the binding to external services like proxy, routing, or LISP.

All valid criticisms and I’d personally like to see those features added to DHCP.

Not me.

I’d rather have a modern ND that can do pub sub of what it sees to all interested protocols with a simple and agnostic interface to the host.  See it as a Kafka.

I can foresee a number of problems with that model from a security and privacy perspective.

RFC 8505 gives you address assignment, DAD, and BCE in one round trip and no multicast. It is stimulated by the host which can go back to sleep with the knowledge that it’s address will not be stolen or impersonated. Bang for the buck.

I m not saying that the current stacks should not implement DHCP. I’m saying that it should move to the back end out of sight as it is replaced by a more valuable interface.

I’m not convinced that stateful ND is all things to all people. I’m also convinced that when you start adding the kitchen sink to NS/NA/RA/RS packets, you risk exploding the memory and CPU footprint on hosts that can’t cope well with that.

It might be great in some (possibly even most) enterprise environments, but if you’re going to mess with RA/RS and/or NA/NS, you’re going to need to do so very carefully.

Think about the things we can do with stateful ND AAC:

- provide full visibility to the network administrator
- secure the address ownership with RFC 8928
- rotate MAC and IP for privacy with no stale state and/or silent node
- synchronize a state in the L3switch/AP/router for ND proxy (RFC 8929) and routing (RFC 9010, RIFT<https://datatracker.ietf.org/doc/html/draft-ietf-rift-rift>, eVPN<https://datatracker.ietf.org/doc/html/draft-thubert-bess-secure-evpn-mac-signaling>)

All of these come at a cost of complexity in the ND process which I’m not convinced is a benefit.

The biggest operational complexity is probably to deal with broadcast, which places a high constraint on how a subnet can be assembled.

Not everyone is a CCIE, and I’ve seen people in industrial plants suffering trial and failures deploying simple IPv4 and discovering the impact of broadcast over 100 nodes per broadcast domain. The sort of failure that you observe when the network injects jitter in control loop operations. Ugly. They now have explicit rule of thumb and network designs to prevent that.

They should never have had to worry about that. It’s entirely our fault.

It’s all due to the reactive behavior of ARP. ND is worse because it’s not only lookup, it’s also DAD, times N addresses. Not really an incentive to let SLAAC on in the enterprise is it?

With stateful ND we deploy subnets with thousands of nodes on linkspeeds expressed in Kbps, and there’s no CCIE involved in the deployment. They are live. Now.

OK, that’s great for a bandwidth starved network, mesh networking, low power devices, etc.

Not convinced it’s necessarily a better solution for enterprise-level networks.

Further not convinced it’s necessarily better for devices which are {memory, cpu} constrained.

SLAAC/DHCP separation was intentional in order to provide both a low-cost light-weight auto configuration protocol that could be used by resource constrained hosts that were not on policy-sensitive networks _AND_ a full-featured dynamic host configuration capability that was heavier and better suited to such policy-sensitive environments.

Unfortunately, M-bit enforcement is a gaping hole here since it depends on voluntary compliance by host developers, thus can’t be depended on for enforcement.


It can be enforced at the first hop (snooping) switch. But having to snoop and destroy protocol elements in a middle box is the clear indication that the protocol is not doing its job.

It’s also a fragile and perilous way to do things. I wouldn’t trust it as part of a security architecture which is what we’re talking about here.

There should be an explicit contract between the host and the network that this host can use this address in association with this MAC, that the network will guarantee the ownership for a duration that is part of the negotiation. Seems complicated but really is not.

That doesn’t seem complicated at all, but it does require more RAM and a bit more CPU.

 I’m aware of customers with policy similar to what you suggested. But the ones I know do not care what the IID is. I believe that their policy would be satisfied if we do 1x and AAC for one address and then push the address to DHCP from the router on behalf of the host.

In a lot of cases, this is more tribal than technical. The folks that want control over host behavior are not friends with the folks that control the routers. That’s a common enterprise reality.

You can argue that the organization is broken in such cases, but guess what… Most organizations are broken in various ways and this is one of the more common ones.

It’s reality. We have to deal with it.

Further, we have a device manufacturer that is unrepentantly determined to produce general purpose devices that (currently) need to he able to be used on policy-sensitive networks and only support the required policy regime and configuration options in IPv4. They have refused to implement the necessary capabilities in IPv6.

The situation with Android is related but not exactly the subject of my question. Please assume that I regret this situation and that you do not need to convince me.

Fair enough. The situation with android is the one I care more about at the moment. Looks like we agree that what you’re on about is orthogonal to that.
The situation with android is the one currently stalling IPv6 deployment in the enterprise (at least to some extent). Yours is more of an optimization for some
particular users of the network that are unlikely to choose IPv4 over IPv6 even in the current state of both protocols.

 I wish to understand if we can envision to push DHCP out of sight of the end device in your use cases, not now but if / when stateful ND gets in mainstream stacks.

As I have said, maybe in some cases, but almost certainly not in all.

If so we may have a path to resolve the situation. Convincing people to take that path is another story…

It sounds to me like Lorenzo is at least as resistant to stateful ND as he is to DHCPv6, so I don’t see it helping with the current situation that I am concerned about, but I appreciate your efforts.

I do know that pushing one boulder up one hill is hard enough. Trying to push two boulders up different hills at the same time will usually get you crushed while the hills both laugh at you.

Owen