Re: [v6ops] Fwd: New Version Notification for draft-linkova-v6ops-ipmaclimi-00.txt

Nick Hilliard <nick@foobar.org> Wed, 09 November 2022 14:51 UTC

Return-Path: <nick@foobar.org>
X-Original-To: v6ops@ietfa.amsl.com
Delivered-To: v6ops@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id E11BBC1522D0 for <v6ops@ietfa.amsl.com>; Wed, 9 Nov 2022 06:51:41 -0800 (PST)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -6.91
X-Spam-Level:
X-Spam-Status: No, score=-6.91 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, NICE_REPLY_A=-0.001, RCVD_IN_DNSWL_HI=-5, RCVD_IN_ZEN_BLOCKED_OPENDNS=0.001, SPF_HELO_NONE=0.001, SPF_PASS=-0.001, T_SCC_BODY_TEXT_LINE=-0.01] autolearn=unavailable autolearn_force=no
Received: from mail.ietf.org ([50.223.129.194]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id 6zD0icrsD3Oy for <v6ops@ietfa.amsl.com>; Wed, 9 Nov 2022 06:51:37 -0800 (PST)
Received: from mail.netability.ie (mail.netability.ie [IPv6:2a03:8900:0:100::5]) (using TLSv1.3 with cipher TLS_AES_256_GCM_SHA384 (256/256 bits) key-exchange X25519 server-signature RSA-PSS (2048 bits) server-digest SHA256) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id C20A2C1524A5 for <v6ops@ietf.org>; Wed, 9 Nov 2022 06:51:26 -0800 (PST)
Received: from cupcake.local (admin.ibn.ie [46.182.8.8]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by mail.netability.ie (Postfix) with ESMTPSA id AA1E39CD89; Wed, 9 Nov 2022 14:51:22 +0000 (GMT)
To: Lorenzo Colitti <lorenzo=40google.com@dmarc.ietf.org>
Cc: V6 Ops List <v6ops@ietf.org>
References: <CAFU7BASFaWexbmrhncBiJ5UMAYGnE1eJZxoPmFHiLzbWkU70zA@mail.gmail.com> <3689DCDC-8D8C-43BD-B29F-C546E0BF2C63@employees.org> <CAKD1Yr0i8k6g-ZKhqOtdOO2ZLox8VBT=7htDguS2VumVeb4-Mg@mail.gmail.com>
From: Nick Hilliard <nick@foobar.org>
Message-ID: <05951c9c-6182-a9eb-057d-15f4c575abb0@foobar.org>
Date: Wed, 09 Nov 2022 14:51:21 +0000
User-Agent: Mozilla/5.0 (Macintosh; Intel Mac OS X 10.16; rv:52.0) Gecko/20100101 PostboxApp/7.0.58
MIME-Version: 1.0
In-Reply-To: <CAKD1Yr0i8k6g-ZKhqOtdOO2ZLox8VBT=7htDguS2VumVeb4-Mg@mail.gmail.com>
Content-Type: text/plain; charset="utf-8"; format="flowed"
Content-Language: en-GB
Content-Transfer-Encoding: 7bit
Archived-At: <https://mailarchive.ietf.org/arch/msg/v6ops/SREfxe06rxinVQj01S8GtKNCrRk>
Subject: Re: [v6ops] Fwd: New Version Notification for draft-linkova-v6ops-ipmaclimi-00.txt
X-BeenThere: v6ops@ietf.org
X-Mailman-Version: 2.1.39
Precedence: list
List-Id: v6ops discussion list <v6ops.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/v6ops>, <mailto:v6ops-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/v6ops/>
List-Post: <mailto:v6ops@ietf.org>
List-Help: <mailto:v6ops-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/v6ops>, <mailto:v6ops-request@ietf.org?subject=subscribe>
X-List-Received-Date: Wed, 09 Nov 2022 14:51:42 -0000

Lorenzo Colitti wrote on 09/11/2022 13:41:
> Running a DHCPv6-only network can prevent hosts from using more than X 
> addresses, where X is decided by the DHCPv6 server. But that just moves 
> the problem, it doesn't solve it.

I don't have a clear picture of what you're suggesting here. If you're 
looking for a way to solve a resource supply constraint, the normal way 
of approaching resource constraint situations is for resource suppliers 
to allocate in a reasonable way and consumers to handle failure 
gracefully.  I.e. management process on both sides.

SLAAC makes this problematic because it lacks any mechanism to manage 
resources on the supply side, due to its design philosophy.

If you want to dismiss partial management approaches (for example, dhcp) 
as a way to merely move the problem, but not solve it, then you're kinda 
suggesting that there's a solution to this resource allocation 
constraint which doesn't involve compromise on the part of the client. I 
guess we all want a pony.

Other solutions might be to build a new tlv into ND which restricts the 
number of addresses that a client can assign locally. Won't be 
implemented for legacy clients, but maybe if ChromeOS implemented 
support, then it would catch on?

NAT will work fine, as you suggest.

Does ChromeOS have an exception handler for the situation where it 
attempts to configure extra addresses, but this fails, or that if it 
succeeds, that these IP addresses only have limited connectivity?

Perhaps document that ChromeOS needs X addresses per instance, and make 
it clear to the client / network operator that the network 
infrastructure needs to be able to support an appropriate level of 
resourcing?

Nick