Re: [v6ops] Chair decision on WGLC for draft-ietf-v6ops-dhcp-pd-per-device-04

Ole Trøan <otroan@employees.org> Fri, 03 November 2023 10:29 UTC

Return-Path: <otroan@employees.org>
X-Original-To: v6ops@ietfa.amsl.com
Delivered-To: v6ops@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 81F05C14CF15 for <v6ops@ietfa.amsl.com>; Fri, 3 Nov 2023 03:29:58 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -1.213
X-Spam-Level:
X-Spam-Status: No, score=-1.213 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, DKIM_SIGNED=0.1, DKIM_VALID=-0.1, DKIM_VALID_AU=-0.1, DKIM_VALID_EF=-0.1, HTML_MESSAGE=0.001, MIME_HTML_ONLY=0.1, MIME_HTML_ONLY_MULTI=0.001, MIME_QP_LONG_LINE=0.001, MPART_ALT_DIFF=0.79, RCVD_IN_ZEN_BLOCKED_OPENDNS=0.001, SPF_HELO_NONE=0.001, SPF_PASS=-0.001, T_SCC_BODY_TEXT_LINE=-0.01, URIBL_BLOCKED=0.001, URIBL_DBL_BLOCKED_OPENDNS=0.001, URIBL_ZEN_BLOCKED_OPENDNS=0.001] autolearn=no autolearn_force=no
Authentication-Results: ietfa.amsl.com (amavisd-new); dkim=pass (2048-bit key) header.d=employees.org
Received: from mail.ietf.org ([50.223.129.194]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id 1DmBIFZ-TAXd for <v6ops@ietfa.amsl.com>; Fri, 3 Nov 2023 03:29:54 -0700 (PDT)
Received: from proxmox01.kjsl.com (proxmox01.kjsl.com [IPv6:2607:7c80:54:6::6]) (using TLSv1.3 with cipher TLS_AES_256_GCM_SHA384 (256/256 bits) key-exchange X25519 server-signature RSA-PSS (2048 bits) server-digest SHA256) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id 8A89AC151981 for <v6ops@ietf.org>; Fri, 3 Nov 2023 03:29:53 -0700 (PDT)
Received: from proxmox01.kjsl.com (localhost.localdomain [127.0.0.1]) by proxmox01.kjsl.com (Proxmox) with ESMTP id F17F9E2F9C; Fri, 3 Nov 2023 10:29:52 +0000 (UTC)
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=employees.org; h=cc:cc:content-transfer-encoding:content-type:content-type :date:from:from:in-reply-to:message-id:mime-version:references :reply-to:subject:subject:to:to; s=prox2023; bh=rbZ8JJ44if25PsrP vmvanGnK0lw6C5pES43QKxzVQgs=; b=O0JiC0o99DSjSq8RG/yGrYQRe88L7kt4 o1KVTciZgTPYD/NRSRTwaHaTc0m6RTgbCVEsUHMw4CE++R2vZURqAhcP5RjZdbzl CNk6m9c4hAj2/qCJ/OrNxYubhe13EC3JMOYIzO+VUrIUp9XjSePKLH+wfaKRka4m o98cOknq1Tk4Z2MC2KfYr6tAnjLdHVwvR/o2u0AdHdwDIhrrO8lWY/p7S2aXMyhN EDI8k/X7U6zDR52t3X93A8uQdcx6u+qIkSMgEfNhhsW8NZ6oqAk3u8ocDKuVu+fe 7yw1kAhINZVxtcbULEj0w0cJI1TppL7WKrrbn+y1XIrzujq8MsNM5A==
Received: from clarinet.employees.org (clarinet.employees.org [198.137.202.74]) (using TLSv1.3 with cipher TLS_AES_256_GCM_SHA384 (256/256 bits) key-exchange X25519 server-signature RSA-PSS (4096 bits)) (No client certificate requested) by proxmox01.kjsl.com (Proxmox) with ESMTPS id CEEFBE2F46; Fri, 3 Nov 2023 10:29:52 +0000 (UTC)
Received: from smtpclient.apple (unknown [IPv6:2001:4650:c3ed:37a:d3ee:77f3:1449:1daa]) (using TLSv1.3 with cipher TLS_AES_128_GCM_SHA256 (128/128 bits) key-exchange X25519 server-signature ECDSA (P-256) server-digest SHA256) (No client certificate requested) by clarinet.employees.org (Postfix) with ESMTPSA id 832CE4E11B8E; Fri, 3 Nov 2023 10:29:52 +0000 (UTC)
Content-Type: multipart/alternative; boundary="Apple-Mail-3A15C1CD-0125-46AC-ACBE-67A929E07C0F"
Content-Transfer-Encoding: 7bit
From: Ole Trøan <otroan@employees.org>
Mime-Version: 1.0 (1.0)
Date: Fri, 03 Nov 2023 11:29:39 +0100
Message-Id: <3DF1AE49-79BB-41AF-B010-393940C4B58B@employees.org>
References: <CAKD1Yr2-5OOkDizDA5kk1_ijR2CTNWbtQuj7WeHd+p8XdXf-8Q@mail.gmail.com>
Cc: Brian E Carpenter <brian.e.carpenter@gmail.com>, v6ops@ietf.org
In-Reply-To: <CAKD1Yr2-5OOkDizDA5kk1_ijR2CTNWbtQuj7WeHd+p8XdXf-8Q@mail.gmail.com>
To: Lorenzo Colitti <lorenzo=40google.com@dmarc.ietf.org>
X-Mailer: iPhone Mail (21B74)
Archived-At: <https://mailarchive.ietf.org/arch/msg/v6ops/Xty1RtmeeLCBbXro50hOCxiRtMs>
Subject: Re: [v6ops] Chair decision on WGLC for draft-ietf-v6ops-dhcp-pd-per-device-04
X-BeenThere: v6ops@ietf.org
X-Mailman-Version: 2.1.39
Precedence: list
List-Id: v6ops discussion list <v6ops.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/v6ops>, <mailto:v6ops-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/v6ops/>
List-Post: <mailto:v6ops@ietf.org>
List-Help: <mailto:v6ops-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/v6ops>, <mailto:v6ops-request@ietf.org?subject=subscribe>
X-List-Received-Date: Fri, 03 Nov 2023 10:29:58 -0000

Another alternative is that the draft excludes the network extension use case and only focuses on the local addressing of the host.
Which if I understood the authors correctly was the main “problem” they wanted to solve. 

O. 

On 3 Nov 2023, at 11:24, Lorenzo Colitti <lorenzo=40google.com@dmarc.ietf.org> wrote:


Brian,

On Wed, Nov 1, 2023 at 8:07 PM Brian E Carpenter <brian.e.carpenter@gmail.com> wrote:
I think that the model here is RFC4861 and RFC4862, which refer throughout to "prefix length" and never state that 64 is a special value, with one possible exception in 4862 where it mentions "(e.g., EUI-64 for an Ethernet interface)". Obviously your draft can't go quite that far, because it describes real-world deployment and provides examples.

How about a statement that /64 is used in the examples for practical reasons, but that any reasonable prefix length could be used, typically /64 or longer, if the operational scenario requires it? It would fit nicely in the bullet list of design principles before Fig. 1.
 
Are you primarily concerned that this draft does not hardcoding 64 as parameter value? If so, then I think the draft does try very hard to do this already. But we could clarify that the examples use /64 because currently SLAAC only supports /64 (except for prefixes starting with the binary 000). It already says this in section 8 ("At the time of writing the only prefix size that will allow devices to use SLAAC is 64 bits (see also [RFC7421]).") but we can definitely add additional text explaining that to a -05.

If you're suggesting that it should allow prefixes that are not too small to support SLAAC, then section 8 explains why this is not desirable. It would substantially lessen the utility of this draft. For example, it would no longer be possible to plug in a RFC 7084 router or a SNAC router and have them just work. It would no longer be possible to extend the network in a way that guarantees that all IPv6-compliant devices will work. And so on. I don't think we should do this. Perhaps we should refer to the text in RFC 7421 that says, "using an IID shorter than 64 bits and a subnet prefix longer than 64 bits is outside the current IPv6 specifications, so results may vary."?

Cheers,
Lorenzo
_______________________________________________
v6ops mailing list
v6ops@ietf.org
https://www.ietf.org/mailman/listinfo/v6ops