[v6ops] Fwd: [E] New Version Notification for draft-mishra-v6ops-variable-iids-problem-statement-01.txt

Gyan Mishra <hayabusagsm@gmail.com> Tue, 17 September 2024 22:16 UTC

Return-Path: <hayabusagsm@gmail.com>
X-Original-To: v6ops@ietfa.amsl.com
Delivered-To: v6ops@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 7C773C14F69E for <v6ops@ietfa.amsl.com>; Tue, 17 Sep 2024 15:16:00 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -7.105
X-Spam-Level:
X-Spam-Status: No, score=-7.105 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, DKIM_SIGNED=0.1, DKIM_VALID=-0.1, DKIM_VALID_AU=-0.1, DKIM_VALID_EF=-0.1, FREEMAIL_FROM=0.001, HTML_MESSAGE=0.001, RCVD_IN_DNSWL_HI=-5, RCVD_IN_ZEN_BLOCKED_OPENDNS=0.001, SPF_HELO_NONE=0.001, SPF_PASS=-0.001, T_SCC_BODY_TEXT_LINE=-0.01, URIBL_DBL_BLOCKED_OPENDNS=0.001, URIBL_ZEN_BLOCKED_OPENDNS=0.001] autolearn=ham autolearn_force=no
Authentication-Results: ietfa.amsl.com (amavisd-new); dkim=pass (2048-bit key) header.d=gmail.com
Received: from mail.ietf.org ([50.223.129.194]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id OcZS47EvEKd5 for <v6ops@ietfa.amsl.com>; Tue, 17 Sep 2024 15:15:56 -0700 (PDT)
Received: from mail-pj1-x1034.google.com (mail-pj1-x1034.google.com [IPv6:2607:f8b0:4864:20::1034]) (using TLSv1.3 with cipher TLS_AES_128_GCM_SHA256 (128/128 bits) key-exchange X25519 server-signature ECDSA (P-256) server-digest SHA256) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id 7F6B6C14F697 for <v6ops@ietf.org>; Tue, 17 Sep 2024 15:15:56 -0700 (PDT)
Received: by mail-pj1-x1034.google.com with SMTP id 98e67ed59e1d1-2d87a0bfaa7so3994983a91.2 for <v6ops@ietf.org>; Tue, 17 Sep 2024 15:15:56 -0700 (PDT)
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=gmail.com; s=20230601; t=1726611355; x=1727216155; darn=ietf.org; h=to:subject:message-id:date:from:in-reply-to:references:mime-version :from:to:cc:subject:date:message-id:reply-to; bh=ng4ytlUh0oFsceLLUHDNQHyMju21kXxt4ovgcGvNvvE=; b=aJe3wNH2ZJFB2BhN8mS3iz1/BEKEgHsSI/Zo4j1jlNje4jYUTB7qzAv/rBbPN82hML pYFkxoHBiVqhvZ+bDJFeVJK8jkzG9l/M/E4kBKSSoapEjutn83i7o6ZWXSjj6ywOuAMD GsyaFok6DJl0DgynrBoPy8Y866Q1Ns//u/Ghv4B820LQn8lJzMnM9iCYv88jCrJhgseh yDsnc2BSq9IM7LnRmeBloNjTc2B5vGdtPiQkeLNrBZmQXFI7YrhyIs4NcxshVcSD3g+p MPlCUoh5oanVEch18cjs0Q0eLBMdXLThhhbUBrzLGzP59QnuyzKsX8DtToiNhT7yYIov cS/A==
X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20230601; t=1726611355; x=1727216155; h=to:subject:message-id:date:from:in-reply-to:references:mime-version :x-gm-message-state:from:to:cc:subject:date:message-id:reply-to; bh=ng4ytlUh0oFsceLLUHDNQHyMju21kXxt4ovgcGvNvvE=; b=WxTh2a8Fi+EPARlvUDf0Xo07+iBTabeNnsSlqdj6k+73XLvzxPaYko36lwWriWNAhm Qw+O6aG6H60PB01p1yJBDVWn5eE2Q4HXyGPOQjzWKP92i+Gbsi2vJ17DtE3a1e8Nm9Lg NqOeU0GhmLRVqB7RBeq93mT833ilzvM5L1/CFsgJbEUy8zbz3FxBp+EE0/Z1EiU3sR7S enkgCOpDQYGe3kkLqP34gDQ3QEvabePumdiuG4ElfGoHlotj2Vbc2hXicm1jGN0rBF++ iiSh9NHaXWAvGSVVzF8DG1a+QHjs9nNxGLIgl6vOFxIVjpTMzTCUFg/R/F/UMH+wFQbo Aurg==
X-Gm-Message-State: AOJu0YyxBZRbX874wRzjW3MbMdcDBV3z4fwK+wczXhxXYpyTGkqLbE4C xIrZJDgh2LxN26YcWqy0+t4Z/vFROZYd110YB484tOoj7SjdvfkRnCo2qiu/k3SrDjCFfdaNcKB UiZRmNzhqS/MWlr6gsNhc+9laHOYRXQ==
X-Google-Smtp-Source: AGHT+IHOG0oNMUYOxCMwT6lpON7wLNb0wZNfHH60QjN8uFDGSTbwil+Ajoocg643inZYDE97s8FBp4X6zdtlUhXyP/4=
X-Received: by 2002:a17:90b:1c84:b0:2c9:6a2d:b116 with SMTP id 98e67ed59e1d1-2dbb9dc9551mr22547856a91.7.1726611355115; Tue, 17 Sep 2024 15:15:55 -0700 (PDT)
MIME-Version: 1.0
References: <172176385611.611136.3361111887074779612@dt-datatracker-659f84ff76-9wqgv> <CAJhXr986yXVysGf6QQLvWYudQMYf+zMQ3BJrrNaj7L6hfu1xjg@mail.gmail.com> <CABNhwV1dspJRUZ15eX0sWupEAg+pLAp-3GMA5dEKF-X04MwQRw@mail.gmail.com>
In-Reply-To: <CABNhwV1dspJRUZ15eX0sWupEAg+pLAp-3GMA5dEKF-X04MwQRw@mail.gmail.com>
From: Gyan Mishra <hayabusagsm@gmail.com>
Date: Tue, 17 Sep 2024 18:15:43 -0400
Message-ID: <CABNhwV0zP5C2uCcki=g7WDb_0Aqs8Q=15SV1r8yNM3E7-b+fVg@mail.gmail.com>
To: IPv6 Operations <v6ops@ietf.org>
Content-Type: multipart/alternative; boundary="0000000000007ca9da062258088b"
Message-ID-Hash: 3RREY3KNM2VRVDAN7HNQ7NPOF5QOLQWT
X-Message-ID-Hash: 3RREY3KNM2VRVDAN7HNQ7NPOF5QOLQWT
X-MailFrom: hayabusagsm@gmail.com
X-Mailman-Rule-Misses: dmarc-mitigation; no-senders; approved; emergency; loop; banned-address; member-moderation; header-match-v6ops.ietf.org-0; nonmember-moderation; administrivia; implicit-dest; max-recipients; max-size; news-moderation; no-subject; digests; suspicious-header
X-Mailman-Version: 3.3.9rc4
Precedence: list
Subject: [v6ops] Fwd: [E] New Version Notification for draft-mishra-v6ops-variable-iids-problem-statement-01.txt
List-Id: v6ops discussion list <v6ops.ietf.org>
Archived-At: <https://mailarchive.ietf.org/arch/msg/v6ops/l0GVin7C0o8zvw_sVYDLdn2HWIw>
List-Archive: <https://mailarchive.ietf.org/arch/browse/v6ops>
List-Help: <mailto:v6ops-request@ietf.org?subject=help>
List-Owner: <mailto:v6ops-owner@ietf.org>
List-Post: <mailto:v6ops@ietf.org>
List-Subscribe: <mailto:v6ops-join@ietf.org>
List-Unsubscribe: <mailto:v6ops-leave@ietf.org>

Dear v6OPS

Here is a list of issues that were brought up during IETF 120.

Right now we are picking up where 6man discussion left off on Issue #2 race
to the bottom.

Many Thanks!!

Gyan

Issue #1 Problem statement discussion on fixed /64 provisioning systems as
reason to change the standard

Most against  the idea of changing the standard for the sake of
provisioning systems that are fixed at /64.

Other problems discussed that I think are valid reasons for variable IID -
what does everyone think?

- Requirements for VLSM and on a subnet with mix of SLAAC, DHCPv6 and
static which is almost always the case both static and DHCPv6 are stuck at
the /64 boundary as well.

- waste of address space having a 64 bit IID

- Private and enterprise subnets that don’t have privacy requirements
should be able to  have longer prefixes shorter IID / VLSM capabilities.
This has been a Day 1 ongoing concern and question by engineers deploying
IPv6.

Issue -#2 Race to bottom

Lorenzo Colitti and few others brought up up race to the bottom with the
/80 that ISPs would adjust to /80 as their new allocation.  Lorenzo kept
saying that ISPs would try to push to move the IID  further shorter with
this move opened door to race all the way down which didn’t make sense to
me.

The standard I am proposing would only allow up to /80 length prefix with
48 IID bits.  That would be the standard proposed so ISPs can at most
change their allocations from /64 to /80 but that would be all that’s
allowed since the SLAAC standard for IID length would be minimum of 48
bits.  There are a lot of ISPs that have the fixed /64 provisioning systems
issue so those would all be stuck at /64.

If GUI is a major issue which I don’t we say that ULA can be used for
variable IID and here since there is no race to bottom concern we can use
the entire bit range from /4 - /128

issue #3 Miscellaneous topics

NCE cache exhaust

I mentioned NCE cache exhaustion and Nick and few others said why do we
need VLSM we can address the entire network including P2P with /64 and no
issues in the chat and I mentioned to read /127 RFC 6164.

Issue #4 Technical issues -

technical issue with in draft mentioning that SLAAC is not variable and
that it is variable already and that is not where the fixed /64 boundary
comes which from RFC 4291 section 2.5.1.  I think there a bunch of drafts
that mention the /64 IID boundary mentioned in the draft.

Issue #5 Operational concerns with solution

Bob did not like the implementation issues with mix of modified and
unmodified devices even though not recommending he said it would be
impossible that we would definitely have mix devices and no way to avoid
and was the main reason for not supporting the draft.



Kind Regards

Gyan



---------- Forwarded message ---------
From: Gyan Mishra <hayabusagsm@gmail.com>
Date: Sat, Jul 27, 2024 at 3:12 AM
Subject: Fwd: [E] New Version Notification for
draft-mishra-v6ops-variable-iids-problem-statement-01.txt
To: IPv6 Operations <v6ops@ietf.org>



Dear v6OPS

I did not have enough time to respond at the MIC on the questions asked.

So I would like to field some of those questions now and see how everyone
fields about this draft.

Issue #1 Problem statement discussion on fixed /64 provisioning systems as
reason to change the standard

Most against  the idea of changing the standard for the sake of
provisioning systems that are fixed at /64.

Other problems discussed that I think are valid reasons for variable IID -
what does everyone think?

- Requirements for VLSM and on a subnet with mix of SLAAC, DHCPv6 and
static which is almost always the case both static and DHCPv6 are stuck at
the /64 boundary as well.

- waste of address space having a 64 bit IID

- Private and enterprise subnets that don’t have privacy requirements
should be able to  have longer prefixes shorter IID / VLSM capabilities.
This has been a Day 1 ongoing concern and question by engineers deploying
IPv6.

Issue -#2 Race to bottom

Lorenzo Colitti and few others brought up up race to the bottom with the
/80 that ISPs would adjust to /80 as their new allocation.  Lorenzo kept
saying that ISPs would try to push to move the IID  further shorter with
this move opened door to race all the way down which didn’t make sense to
me.

The standard I am proposing would only allow up to /80 length prefix with
48 IID bits.  That would be the standard proposed so ISPs can at most
change their allocations from /64 to /80 but that would be all that’s
allowed since the SLAAC standard for IID length would be minimum of 48
bits.  There are a lot of ISPs that have the fixed /64 provisioning systems
issue so those would all be stuck at /64.

If GUI is a major issue which I don’t we say that ULA can be used for
variable IID and here since there is no race to bottom concern we can use
the entire bit range from /4 - /128

issue #3 Miscellaneous topics

NCE cache exhaust

I mentioned NCE cache exhaustion and Nick and few others said why do we
need VLSM we can address the entire network including P2P with /64 and no
issues in the chat and I mentioned to read /127 RFC 6164.

Issue #4 Technical issues -

technical issue with in draft mentioning that SLAAC is not variable and
that it is variable already and that is not where the fixed /64 boundary
comes which from RFC 4291 section 2.5.1.  I think there a bunch of drafts
that mention the /64 IID boundary mentioned in the draft.

Issue #5 Operational concerns with solution

Bob did not like the implementation issues with mix of modified and
unmodified devices even though not recommending he said it would be
impossible that we would definitely have mix devices and no way to avoid
and was the main reason for not supporting the draft.



Kind Regards

Gyan

---------- Forwarded message ---------
From: Mishra, Gyan S <gyan.s.mishra@verizon.com>
Date: Fri, Jul 26, 2024 at 6:42 PM
Subject: Fwd: [E] New Version Notification for
draft-mishra-v6ops-variable-iids-problem-statement-01.txt
To: Gyan S. Mishra <hayabusagsm@gmail.com>



---------- Forwarded message ---------
From: <internet-drafts@ietf.org>
Date: Tue, Jul 23, 2024 at 3:44 PM
Subject: [E] New Version Notification for
draft-mishra-v6ops-variable-iids-problem-statement-01.txt
To: Alexandre Petrescu <Alexandre.Petrescu@cea.fr>, Alexandre Petrescu <
alexandre.petrescu@cea.fr>, Dmytro Shytyi <dmytro@shytyi.net>, Dusan Mudric
<dmudric@ciena.com>, Gyan Mishra <gyan.s.mishra@verizon.com>, Naveen
Kottapalli <nkottapalli@benu.net>


A new version of Internet-Draft
draft-mishra-v6ops-variable-iids-problem-statement-01.txt has been
successfully submitted by Gyan Mishra and posted to the
IETF repository.

Name:     draft-mishra-v6ops-variable-iids-problem-statement
Revision: 01
Title:    SLAAC Prefixes with Variable Interface ID (IID) Problem Statement
Date:     2024-07-23
Group:    Individual Submission
Pages:    32
URL:
https://urldefense.proofpoint.com/v2/url?u=https-3A__www.ietf.org_archive_id_draft-2Dmishra-2Dv6ops-2Dvariable-2Diids-2Dproblem-2Dstatement-2D01.txt&d=DwICaQ&c=udBTRvFvXC5Dhqg7UHpJlPps3mZ3LRxpb6__0PomBTQ&r=DnUkF34wu4mqq0UY8nn2rxBBO7qOW_D-RfNVLML28ZU&m=yOpsg61LTbRxJVfirFFKnW_889SuNFJeQWVHZYnBPs7SroiFpUYTIAiYneYXFEX6&s=KE68wUuGE8eBtHyZXBH7xy5bkVxyNrwUEV470cRrOfQ&e=
Status:
https://urldefense.proofpoint.com/v2/url?u=https-3A__datatracker.ietf.org_doc_draft-2Dmishra-2Dv6ops-2Dvariable-2Diids-2Dproblem-2Dstatement_&d=DwICaQ&c=udBTRvFvXC5Dhqg7UHpJlPps3mZ3LRxpb6__0PomBTQ&r=DnUkF34wu4mqq0UY8nn2rxBBO7qOW_D-RfNVLML28ZU&m=yOpsg61LTbRxJVfirFFKnW_889SuNFJeQWVHZYnBPs7SroiFpUYTIAiYneYXFEX6&s=7I3vuUcKRci0Kx5N6lrk7sD5Xh6c5I8AEV_CvpgOopM&e=
HTMLized:
https://urldefense.proofpoint.com/v2/url?u=https-3A__datatracker.ietf.org_doc_html_draft-2Dmishra-2Dv6ops-2Dvariable-2Diids-2Dproblem-2Dstatement&d=DwICaQ&c=udBTRvFvXC5Dhqg7UHpJlPps3mZ3LRxpb6__0PomBTQ&r=DnUkF34wu4mqq0UY8nn2rxBBO7qOW_D-RfNVLML28ZU&m=yOpsg61LTbRxJVfirFFKnW_889SuNFJeQWVHZYnBPs7SroiFpUYTIAiYneYXFEX6&s=JN176NxWs36PKk_UbEEv9Zw2DuyM0RI4J0mY1c98Nqo&e=
Diff:
https://urldefense.proofpoint.com/v2/url?u=https-3A__author-2Dtools.ietf.org_iddiff-3Furl2-3Ddraft-2Dmishra-2Dv6ops-2Dvariable-2Diids-2Dproblem-2Dstatement-2D01&d=DwICaQ&c=udBTRvFvXC5Dhqg7UHpJlPps3mZ3LRxpb6__0PomBTQ&r=DnUkF34wu4mqq0UY8nn2rxBBO7qOW_D-RfNVLML28ZU&m=yOpsg61LTbRxJVfirFFKnW_889SuNFJeQWVHZYnBPs7SroiFpUYTIAiYneYXFEX6&s=ugar0T977pbBkM0q6A8yH6-uF8ufScX6AtiecmpKnT4&e=

Abstract:

   In the past, various IPv6 addressing models have been proposed based
   on a subnet hierarchy embedding a 64-bit prefix.  The last remnant of
   IPv6 classful addressing is a inflexible interface identifier
   boundary at /64.  This document details the 64-bit boundary problem
   statement.



The IETF Secretariat