Re: [v6ops] I-D Action: draft-palet-v6ops-rfc6177-bis-00.txt

"Mudric, Dusan (Dusan)" <dmudric@avaya.com> Wed, 03 July 2019 15:51 UTC

Return-Path: <dmudric@avaya.com>
X-Original-To: v6ops@ietfa.amsl.com
Delivered-To: v6ops@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 423E01203A2; Wed, 3 Jul 2019 08:51:19 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -6.899
X-Spam-Level:
X-Spam-Status: No, score=-6.899 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, DKIM_SIGNED=0.1, DKIM_VALID=-0.1, RCVD_IN_DNSWL_HI=-5, SPF_HELO_NONE=0.001, SPF_PASS=-0.001, URIBL_BLOCKED=0.001] autolearn=ham autolearn_force=no
Authentication-Results: ietfa.amsl.com (amavisd-new); dkim=pass (1024-bit key) header.d=avaya365.onmicrosoft.com
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id 9m0nTVrKfayw; Wed, 3 Jul 2019 08:51:16 -0700 (PDT)
Received: from co300216-co-outbound.net.avaya.com (co300216-co-outbound.net.avaya.com [198.152.13.100]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id 2678A120370; Wed, 3 Jul 2019 08:51:15 -0700 (PDT)
X-IronPort-Anti-Spam-Filtered: true
X-IronPort-Anti-Spam-Result: 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
X-IPAS-Result: A2EBAAAmzhxd/wUHmMZmDgsBAQEBAQEBAQEBAQEHAQEBAQEBgVMEAQEBAQELAYFDUG11BDMKhBKDRwOEUolygluJTY15gS4UgRADGDwJAQEBDQEjCgIBAQKEPgIXggwjNAkOAQMBAQEEAQEBAQQBAgJpijcMgnhNLwoCMAEBAQEBAQEBAQEBAQEBAQEBAQEBAQEBAQEBAQEBAQEBAQEBAQUCDykeAQEYAQEBAQIBEhERDAEBJQcGBQELBAIBCA0EBAEBAQICJgICAh8RFQgIAgQBDQUIEweDAYFqAw4PAQICCpoPAoEIMIhfAQFwgTIaAoJdAQEFhQ8NC4ISAwYJAYECKAGHbVSBf4EeF4FBPiZrRoJMPoIaRwQYgQs+FRWCXjKCJotyCAFLgiKaayxACQKCFoZWgUGHdYFAgk6CK4ccg3kDEIoejTCBMIYNgXKOBAICAgIEBQIOAQEFgVA5gVhwFTuCbIJBg3GKGDtyAQGBJ4tUAYEVCwEB
Received: from unknown (HELO co300216-co-erhwest.avaya.com) ([198.152.7.5]) by co300216-co-outbound.net.avaya.com with ESMTP; 03 Jul 2019 11:51:12 -0400
X-OutboundMail_SMTP: 1
Received: from unknown (HELO AZ-US1EXHC02.global.avaya.com) ([135.11.85.13]) by co300216-co-erhwest-out.avaya.com with ESMTP/TLS/DHE-RSA-AES256-GCM-SHA384; 03 Jul 2019 11:51:09 -0400
Received: from PWEXCVMAP02.global.avaya.com (135.11.85.81) by AZ-US1EXHC02.global.avaya.com (135.11.85.13) with Microsoft SMTP Server (TLS) id 14.3.439.0; Wed, 3 Jul 2019 11:51:08 -0400
Received: from PWEXCVMAP02.global.avaya.com (135.11.85.81) by PWEXCVMAP02.global.avaya.com (135.11.85.81) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256) id 15.1.1531.3; Wed, 3 Jul 2019 11:51:08 -0400
Received: from PW365VMAP02.avaya.com (135.8.98.110) by PWEXCVMAP02.global.avaya.com (135.11.85.81) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256) id 15.1.1531.3 via Frontend Transport; Wed, 3 Jul 2019 11:51:08 -0400
Received: from NAM02-SN1-obe.outbound.protection.outlook.com (104.47.36.57) by PW365VMAP02.avaya.com (135.8.98.110) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA384_P384) id 15.1.1531.3; Wed, 3 Jul 2019 10:51:08 -0500
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=Avaya365.onmicrosoft.com; s=selector1-Avaya365-onmicrosoft-com; h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-SenderADCheck; bh=7lvNdTX6L3Mx3DvSf/UKqnh+q1/TcOlQd8bi/+0Bmgs=; b=K1gMkr+8eK/lbkKWhBVJrzZjcn7Wfiqw7Cms4lWvO+wekX7Pn1iUFzgwn0EDgdSYVNsGnsz3ParDOA434GshwCL2fQiKZOL9Zla8a4p4MEeGwpKjGMG+cMPh7XhPuKTPQOQidbhjeHE4jaidyEPYOCM2etqp+EfWggw1zTtOR9I=
Received: from DM6PR15MB2506.namprd15.prod.outlook.com (20.176.71.32) by DM6PR15MB3290.namprd15.prod.outlook.com (20.179.51.20) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id 15.20.2052.17; Wed, 3 Jul 2019 15:51:06 +0000
Received: from DM6PR15MB2506.namprd15.prod.outlook.com ([fe80::697d:5307:1f7a:79bc]) by DM6PR15MB2506.namprd15.prod.outlook.com ([fe80::697d:5307:1f7a:79bc%6]) with mapi id 15.20.2032.019; Wed, 3 Jul 2019 15:51:06 +0000
From: "Mudric, Dusan (Dusan)" <dmudric@avaya.com>
To: JORDI PALET MARTINEZ <jordi.palet@consulintel.es>, Brian E Carpenter <brian.e.carpenter@gmail.com>, Lea Roberts <lea.roberts@stanford.edu>, JORDI PALET MARTINEZ <jordi.palet=40consulintel.es@dmarc.ietf.org>
CC: "draft-palet-v6ops-rfc6177-bis@ietf.org" <draft-palet-v6ops-rfc6177-bis@ietf.org>, IPv6 Operations <v6ops@ietf.org>
Thread-Topic: [v6ops] I-D Action: draft-palet-v6ops-rfc6177-bis-00.txt
Thread-Index: AQHVMY8hcok+ksVslk+ZIlaRClYvtaa5BJ8w
Date: Wed, 03 Jul 2019 15:51:06 +0000
Message-ID: <DM6PR15MB2506BBC13C2D761B8CC2F740BBFB0@DM6PR15MB2506.namprd15.prod.outlook.com>
References: <153017691583.14743.17000446834856511528@ietfa.amsl.com> <78a36a81-3bb3-9d47-aa06-8da8f7594677@gmail.com> <C040E02F-7BEC-4FF9-8585-BE380B6859DE@consulintel.es> <alpine.DEB.2.02.1807191054090.7979@networking.stanford.edu> <9142206A0C5BF24CB22755C8EC422E459CB44344@AZ-US1EXMB03.global.avaya.com> <f1bc1848-abe0-553e-0fdf-623eb0d1a871@gmail.com> <0601C33E-0BB0-4C42-BCD2-B86FD90BBA6A@consulintel.es>
In-Reply-To: <0601C33E-0BB0-4C42-BCD2-B86FD90BBA6A@consulintel.es>
Accept-Language: en-US
Content-Language: en-US
X-MS-Has-Attach:
X-MS-TNEF-Correlator:
authentication-results: spf=none (sender IP is ) smtp.mailfrom=dmudric@avaya.com;
x-originating-ip: [104.129.196.166]
x-ms-publictraffictype: Email
x-ms-office365-filtering-correlation-id: e60d1dd2-c6b5-42be-e5e7-08d6ffce426a
x-microsoft-antispam: BCL:0; PCL:0; RULEID:(2390118)(7020095)(4652040)(8989299)(4534185)(7168020)(4627221)(201703031133081)(201702281549075)(8990200)(5600148)(711020)(4605104)(1401327)(2017052603328)(7193020); SRVR:DM6PR15MB3290;
x-ms-traffictypediagnostic: DM6PR15MB3290:
x-ms-exchange-purlcount: 2
x-microsoft-antispam-prvs: <DM6PR15MB3290F3FE455479874F5108B3BBFB0@DM6PR15MB3290.namprd15.prod.outlook.com>
x-ms-oob-tlc-oobclassifiers: OLM:4502;
x-forefront-prvs: 00872B689F
x-forefront-antispam-report: SFV:NSPM; SFS:(10009020)(4636009)(376002)(346002)(39860400002)(396003)(136003)(366004)(13464003)(59124004)(53754006)(189003)(199004)(6506007)(102836004)(55236004)(53546011)(446003)(476003)(11346002)(486006)(71200400001)(186003)(71190400001)(33656002)(966005)(26005)(66946007)(73956011)(76116006)(19627235002)(8936002)(66446008)(64756008)(66556008)(66476007)(478600001)(5024004)(14444005)(8676002)(30864003)(256004)(74316002)(76176011)(7696005)(305945005)(81156014)(81166006)(7736002)(99286004)(2906002)(229853002)(68736007)(6116002)(3846002)(2171002)(53936002)(66574012)(55016002)(6436002)(52536014)(53946003)(9686003)(6306002)(4326008)(6246003)(25786009)(86362001)(66066001)(5660300002)(54906003)(110136005)(316002)(14454004)(579004); DIR:OUT; SFP:1101; SCL:1; SRVR:DM6PR15MB3290; H:DM6PR15MB2506.namprd15.prod.outlook.com; FPR:; SPF:None; LANG:en; PTR:InfoNoRecords; MX:1; A:1;
received-spf: None (protection.outlook.com: avaya.com does not designate permitted sender hosts)
x-ms-exchange-senderadcheck: 1
x-microsoft-antispam-message-info: L5MZCBI4et/gn86xSSJifTlov5Dz6dit6aEg0HCUeLiVgKpkCqW7Adpk9eq1D0HsDuBNLbLUBDlQixNPJjVErmqR+hdoV2xGm2uIOQfAmzpCJEIpPeAm8USNpt7Bgu5VGIjo5JMZEoE3U8k1fcgz8xw5lEjk3/UN4DWDKMSYbPqQLAKw/bi71iQSvwixK9A1SWJf2lWz4Np5pksC25gVhSwMeh2Gac1HtlraZzq9JY8neIik6W76JjiXuYB42W4SECbqeglbIRMQzyNqniCJrG0kpIYM7YYAGVTW/x5tRTZOpWfwZG5GYQvngXolRW/SSSvgRb4coxjwXzs2BjTwrInQE73nhaCGqJ+eVT1EyBQm8lkmvu+uLvizO/mgVaIfSvbTm+tjaKHEtMTicjjGXb51sqjTW31W12LnhozxEMc=
Content-Type: text/plain; charset="utf-8"
Content-Transfer-Encoding: base64
MIME-Version: 1.0
X-MS-Exchange-CrossTenant-Network-Message-Id: e60d1dd2-c6b5-42be-e5e7-08d6ffce426a
X-MS-Exchange-CrossTenant-originalarrivaltime: 03 Jul 2019 15:51:06.0462 (UTC)
X-MS-Exchange-CrossTenant-fromentityheader: Hosted
X-MS-Exchange-CrossTenant-id: 04a2636c-326d-48ff-93f8-709875bd3aa9
X-MS-Exchange-CrossTenant-mailboxtype: HOSTED
X-MS-Exchange-CrossTenant-userprincipalname: dmudric@avaya.com
X-MS-Exchange-Transport-CrossTenantHeadersStamped: DM6PR15MB3290
X-OriginatorOrg: avaya.com
Archived-At: <https://mailarchive.ietf.org/arch/msg/v6ops/oKt4rzKtjhNIPfRv6S1NcxLvm3A>
Subject: Re: [v6ops] I-D Action: draft-palet-v6ops-rfc6177-bis-00.txt
X-BeenThere: v6ops@ietf.org
X-Mailman-Version: 2.1.29
Precedence: list
List-Id: v6ops discussion list <v6ops.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/v6ops>, <mailto:v6ops-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/v6ops/>
List-Post: <mailto:v6ops@ietf.org>
List-Help: <mailto:v6ops-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/v6ops>, <mailto:v6ops-request@ietf.org?subject=subscribe>
X-List-Received-Date: Wed, 03 Jul 2019 15:51:19 -0000

Hi Jordi,

draft-ietf-v6ops-ipv6rtr-reqs, section 5.2, defines:
"routers designed to run IPv6 should
   support the following addressing conventions:
   o  The default prefix length on any interface other than a loopback
      should be a /64"

May be a new bullet can be added to make sure a router asking for /48 or /56 prefix will get it. Otherwise, it will not be possible to do SLAAC subnetting. Current standards don't allow SLAAC for prefixes longer than /64. Or, if the default prefix length is /48 or /56, the issue of not getting a shorter prefix from ISPs will be solved. Personally, I don't like wasting the address space. You stated the same in the Introduction, bullet 3. From that perspective, it would be better to start small and be able to grow, on as needed bases, without being blocked by ISPs. So, till we have a standard for SLAACs with prefixes longer than /64, it should be always possible to get /48 or /56 prefix, when needed, without any limitations. At the moment I don't see how that can be enforced without settings some defaults to /48 or /56 (not popular approach).

Regards,
Dusan.

> -----Original Message-----
> From: JORDI PALET MARTINEZ <jordi.palet@consulintel.es>
> Sent: Wednesday, July 3, 2019 7:03 AM
> To: Brian E Carpenter <brian.e.carpenter@gmail.com>; Mudric, Dusan
> (Dusan) <dmudric@avaya.com>; Lea Roberts <lea.roberts@stanford.edu>;
> JORDI PALET MARTINEZ <jordi.palet=40consulintel.es@dmarc.ietf.org>
> Cc: draft-palet-v6ops-rfc6177-bis@ietf.org; IPv6 Operations
> <v6ops@ietf.org>
> Subject: Re: [v6ops] I-D Action: draft-palet-v6ops-rfc6177-bis-00.txt
> 
> Hi all,
> 
> I've been too busy to tackle a new version of this document, but now
> working on it.
> 
> My recall on this, please correct me if I'm wrong (Brian, Mudric), is that you
> believe that:
> 
> 1) We should define end-site in the document?
> 
> 2) End-sites must be able to request a longer prefix if needed and the ISP
> must grant it?
> 
> Anything I may be missing?
> 
> Regards,
> Jordi
> @jordipalet
> 
> 
> 
> El 28/8/18 6:27, "v6ops en nombre de Brian E Carpenter" <v6ops-
> bounces@ietf.org en nombre de brian.e.carpenter@gmail.com> escribió:
> 
>     On 2018-08-28 06:23, Mudric, Dusan (Dusan) wrote:
>     > Section 4.
>     > "   b.  An end-user should be able to receive any prefix length up to /48
>     >        simply by asking."
>     >
>     > Can  this be defined in a way to make sure that new applications and
> devices will always work at end sites without a need for asking ISPs for extra
> address space? Otherwise, the end-user might not get what he/she asks for,
> without paying for the "higher grade" service. Can the definition impose up
> to /48 LAP when needed at end sites? For example, can an application
> request a home router to request an ISP for /48 prefix and, when requested,
> ISP must grant it?
> 
>     Unfortunately we can never say "must" in this context. What ISPs will
> provide
>     for what fee is well outside the IETF's competence. As observed on
> another
>     thread, applications need to be agile, even if they work better if such a
>     request was granted.
> 
>     I'd say that once this update is done, it may be time to revisit
>     RFC4084.
> 
>     Regards
>         Brian
> 
>     >
>     > Regards,
>     > Dusan Mudric.
>     >
>     >> -----Original Message-----
>     >> From: v6ops <v6ops-bounces@ietf.org> On Behalf Of Lea Roberts
>     >> Sent: Thursday, July 19, 2018 2:08 PM
>     >> To: Brian E Carpenter <brian.e.carpenter@gmail.com>; JORDI PALET
>     >> MARTINEZ <jordi.palet=40consulintel.es@dmarc.ietf.org>
>     >> Cc: draft-palet-v6ops-rfc6177-bis@ietf.org; IPv6 Operations
>     >> <v6ops@ietf.org>
>     >> Subject: Re: [v6ops] I-D Action: draft-palet-v6ops-rfc6177-bis-00.txt
>     >>
>     >> hi Brian and Jordi -
>     >>
>     >> excellent comments and I agree also.
>     >>
>     >> thank you!!
>     >> /Lea
>     >>
>     >> On Thu, 19 Jul 2018, JORDI PALET MARTINEZ wrote:
>     >>
>     >>> Hi Brian,
>     >>>
>     >>>
>     >>>
>     >>> Thanks a lot for commenting and sorry the late answer ... too busy last
>     >> weeks.
>     >>>
>     >>>
>     >>>
>     >>> Comments in-line below (subjected to my co-author agreement),
> basically,
>     >> agree with all your inputs, except a couple of points.
>     >>>
>     >>>
>     >>>
>     >>> Thanks!
>     >>>
>     >>>
>     >>>
>     >>> Regards,
>     >>>
>     >>> Jordi
>     >>>
>     >>>
>     >>>
>     >>>
>     >>>
>     >>>
>     >>>
>     >>> -----Mensaje original-----
>     >>>
>     >>> De: v6ops <v6ops-bounces@ietf.org> en nombre de Brian E Carpenter
>     >> <brian.e.carpenter@gmail.com>
>     >>>
>     >>> Organizaci?n: University of Auckland
>     >>>
>     >>> Fecha: domingo, 8 de julio de 2018, 17:43
>     >>>
>     >>> Para: <draft-palet-v6ops-rfc6177-bis@ietf.org>, IPv6 Operations
>     >> <v6ops@ietf.org>
>     >>>
>     >>> Asunto: Re: [v6ops] I-D Action: draft-palet-v6ops-rfc6177-bis-00.txt
>     >>>
>     >>>
>     >>>
>     >>>    Hi,
>     >>>
>     >>>
>     >>>
>     >>>    Thanks for this draft.
>     >>>
>     >>>
>     >>>
>     >>>    > Abstract
>     >>>
>     >>>
>     >>>
>     >>>    This needs to be shorter. Three paragraphs is too much.
>     >>>
>     >>>
>     >>>
>     >>> For the next version, I've reduced 50% the length of the 1st paragraph.
> 3rd
>     >> paragraph, I recall is mandatory (IDNits).
>     >>>
>     >>>
>     >>>
>     >>>
>     >>>
>     >>>    > ... policy should reflect that assignment of a single subnet is
>     >>>
>     >>>    > no longer appropriate unless the recipient explicitly agrees to the
>     >>>
>     >>>    > limitations implied by such an assignment.
>     >>>
>     >>>
>     >>>
>     >>>    I *strongly* suggest deleting the "unless" clause. It leaves a
>     >>>
>     >>>    loophole, and it could easily be hidden in shrink-wrap terms
>     >>>
>     >>>    and conditions so that a subscriber would agree without even
>     >>>
>     >>>    knowing about it. Reduce this simply to:
>     >>>
>     >>>
>     >>>
>     >>>       ... policy should reflect that assignment of a single subnet is
>     >>>
>     >>>       never appropriate.
>     >>>
>     >>>
>     >>>
>     >>> Agreed and done.
>     >>>
>     >>>
>     >>>
>     >>>
>     >>>
>     >>>    > 1.  Introduction
>     >>>
>     >>>    ....
>     >>>
>     >>>    >    1.  It is extremely discouraged that /128s be given out.  While
> there
>     >>>
>     >>>    >        may be some cases where assigning only a single address may
> be
>     >>>
>     >>>    >        justified, a site, by definition, implies multiple subnets and
>     >>>
>     >>>    >        multiple devices.
>     >>>
>     >>>
>     >>>
>     >>>    I find this a bit weak. Try:
>     >>>
>     >>>
>     >>>
>     >>>       1.  It is extremely discouraged that /128s be given out.  While there
>     >>>
>     >>>           may be some applications where assigning only a single address
> may
>     >> be
>     >>>
>     >>>           tolerated, a site, by definition, implies multiple subnets and
>     >>>
>     >>>           multiple devices. Also, a /128 prevents any form of privacy-based
>     >>>
>     >>>           addressing.
>     >>>
>     >>>
>     >>>
>     >>> Agreed!
>     >>>
>     >>>
>     >>>
>     >>>    >    4.  This revision has been created to more clearly assert the
>     >>>
>     >>>    >        requirement to ensure that address assignments to end-sites
>     >>>
>     >>>    >        provide a sufficiently big number of subnets (/64 on classic
>     >>>
>     >>>    >        networks) to each end-site, taking under consideration the
> end-
>     >>>
>     >>>    >        site's future expected needs, new deployment expectations
> and
>     >> new
>     >>>
>     >>>    >        protocol requirements, among others.  Once all these are
>     >>>
>     >>>    >        considered, it seems unlikely that a single subnet (/64) or even
>     >>>
>     >>>    >        a small number of them should be assigned, unless very clearly
>     >>>
>     >>>    >        justified and agreed to by the end-site.
>     >>>
>     >>>
>     >>>
>     >>>    The "unless" clause is dangerous because of shrink-wrap terms and
>     >>>
>     >>>    conditions. I suggest deleting it.
>     >>>
>     >>>
>     >>>
>     >>> Agreed!
>     >>>
>     >>>
>     >>>
>     >>>    > 2.  Considerations Regarding the Prefix Length
>     >>>
>     >>>    ....
>     >>>
>     >>>    >    This consideration should be noticed, across this document, in the
>     >>>
>     >>>    >    sense that end-sites usually have subnets that use, by default,
>     >>>
>     >>>    >    SLAAC, and consequently, the LAP is mandatorily a /64.  Other
>     >>>
>     >>>    >    technologies, may have a different LAP, which must be used
>     >>>
>     >>>    >    accordingly.
>     >>>
>     >>>
>     >>>
>     >>>    I suggest s/Other/Future/ since /64 prevails everywhere today.
>     >>>
>     >>>
>     >>>
>     >>> Agreed!
>     >>>
>     >>>
>     >>>
>     >>>    > 3.  On /48 Assignments to End-Sites
>     >>>
>     >>>    ....
>     >>>
>     >>>    >    An important
>     >>>
>     >>>    >    goal in IPv6 is to significantly change the default and minimal end
>     >>>
>     >>>    >    site assignment, from "a single address" to "multiple networks"
> and
>     >>>
>     >>>    >    to ensure that end-sites can easily obtain address space.
>     >>>
>     >>>
>     >>>
>     >>>    I suggest adding something like this:
>     >>>
>     >>>
>     >>>
>     >>>    As the operational costs of carrier-grade NAT and address+port
> sharing
>     >>>
>     >>>    have shown, availability of multiple addresses and prefixes to end
> sites
>     >>>
>     >>>    that need them will be a considerable saving to their ISPs.
>     >>>
>     >>>
>     >>>
>     >>> Agreed!
>     >>>
>     >>>
>     >>>
>     >>>    >    It might be tempting to give home sites a single /64, since that is
>     >>>
>     >>>    >    already significantly more address space compared with today's
> IPv4
>     >>>
>     >>>    >    practice.  However, this precludes the expectation that even
> home
>     >>>
>     >>>    >    sites will grow to support multiple subnets going forward.  Hence,
> it
>     >>>
>     >>>
>     >>>
>     >>>    s/expectation/certainty/
>     >>>
>     >>>
>     >>>
>     >>> Agreed!
>     >>>
>     >>>
>     >>>
>     >>>    ....
>     >>>
>     >>>    >    A key goal of the recommendations in [RFC3177] is to
>     >>>
>     >>>    >    ensure that upon renumbering, one does not have to deal with
>     >>>
>     >>>    >    renumbering into a smaller subnet size.
>     >>>
>     >>>
>     >>>
>     >>>    Perhaps add:
>     >>>
>     >>>
>     >>>
>     >>>    In particular this would apply to any site that switches to
>     >>>
>     >>>    an ISP that provides a longer prefix.
>     >>>
>     >>>
>     >>>
>     >>> Agreed!
>     >>>
>     >>>
>     >>>
>     >>>    >    It should be noted that similar arguments apply to the
> management of
>     >>>
>     >>>    >    zone files in the DNS.  In particular, managing the reverse
>     >>>
>     >>>    >    (ip6.arpa) tree is simplified when all links are numbered using the
>     >>>
>     >>>    >    same subnet ids
>     >>>
>     >>>
>     >>>
>     >>>    s/numbered/renumbered/
>     >>>
>     >>>
>     >>>
>     >>> Agreed!
>     >>>
>     >>>
>     >>>
>     >>>    ....
>     >>>
>     >>>    >    years, and we don't recover back the /48's, we will be able to use
>     >>>
>     >>>    >    IPv6 addressing space for over 100.000 years.
>     >>>
>     >>>
>     >>>
>     >>>    Perhaps add:
>     >>>
>     >>>
>     >>>
>     >>>    This document does not advocate careless use of address space, but
>     >>>
>     >>>    there is objectively no reason to be restrictve.
>     >>>
>     >>>
>     >>>
>     >>> Agreed!
>     >>>
>     >>>
>     >>>
>     >>>    ....
>     >>>
>     >>>    >    Today typically, a home has already a considerable number of
> possible
>     >>>
>     >>>    >    subnets (a common CE has 4 LAN ports, 2 WiFi radios which
> support
>     >>>
>     >>>    >    several SSIDs each one, VoIP subnet, IPTV subnet, additional
> VLANs)
>     >>>
>     >>>    >    and if downstream routers are used, there is a need for further
>     >>>
>     >>>    >    subnets.  This means that in a short term, assigning a /60 (16
>     >>>
>     >>>    >    subnets), it is already a really bad decision, as it may enforce IPv6
>     >>>
>     >>>    >    NAT between the main CE and downstream routers.
>     >>>
>     >>>
>     >>>
>     >>>    I suggest deleting "as it may enforce IPv6 NAT between the main CE
> and
>     >>>
>     >>>    downstream routers". Firstly it puts NAT into the reader's mind.
> Secondly,
>     >>>
>     >>>    it isn't the only solution - IIDs shorter than 64 could also be
> implemented.
>     >>>
>     >>>
>     >>>
>     >>> Agreed!
>     >>>
>     >>>
>     >>>
>     >>>    > 4.  Impact on IPv6 Standards
>     >>>
>     >>>
>     >>>
>     >>>    I propose to simply delete this section.
>     >>>
>     >>>
>     >>>
>     >>>    Firstly, RFC3056 is deprecated so it's irrelevant today.
>     >>>
>     >>>    Secondly, the argument about ULAs (RFC4193) doesn't hold up.
>     >>>
>     >>>    ULAs are like any other /48 prefix - if you are forced to
>     >>>
>     >>>    renumber into a longer prefix, you lose some subnet bits.
>     >>>
>     >>>    That is already covered in the middle of section 3 (the
>     >>>
>     >>>    "key goal" sentence quoted above).
>     >>>
>     >>>
>     >>>
>     >>>
>     >>>
>     >>> I recall we deprecated the 6to4 anycast, but not 6to4, in fact 6to4 to
> 6to4
>     >> traffic is still useful for peer to peer.
>     >>>
>     >>>
>     >>>
>     >>>    > 6.  Security Considerations
>     >>>
>     >>>    >
>     >>>
>     >>>    >    This document has no known security implications.
>     >>>
>     >>>
>     >>>
>     >>>    Really? More prefix space offers more potential for scanning
>     >>>
>     >>>    attacks. More prefix space also allows the use of slightly
>     >>>
>     >>>    randomized prefixes and/or prefix-per host.
>     >>>
>     >>>
>     >>>
>     >>>    Also of course, a /128 would prevent any form of privacy-based
>     >>>
>     >>>    addressing.
>     >>>
>     >>>
>     >>>
>     >>> I've introduced new text on those points.
>     >>>
>     >>>
>     >>>
>     >>>    > 8.  Acknowledgements
>     >>>
>     >>>    >
>     >>>
>     >>>    >    The authors of this document will like to acknowledge the authors
> of
>     >>>
>     >>>    >    previous versions (Thomas Narten and Geoff Huston)
>     >>>
>     >>>
>     >>>
>     >>>    RFC3177 was signed by the whole IAB and IESG seated in 2001, and its
>     >>>
>     >>>    Acknowledgements read:
>     >>>
>     >>>
>     >>>
>     >>>    >>    This document originated from the IETF IPv6 directorate, with
> much
>     >>>
>     >>>    >>    input from the IAB and IESG.  The original text forming the basis
> of
>     >>>
>     >>>    >>    this document was contributed by Fred Baker and Brian
> Carpenter.
>     >>>
>     >>>    >>    Allison Mankin and Thomas Narten merged the original
> contributions
>     >>>
>     >>>    >>    into a single document, and Alain Durand edited the document
>     >> through
>     >>>
>     >>>    >>    its final stages.
>     >>>
>     >>>
>     >>>
>     >>> Agreed!
>     >>>
>     >>>
>     >>>
>     >>>    Regards
>     >>>
>     >>>        Brian
>     >>>
>     >>>
>     >>>
>     >>>    _______________________________________________
>     >>>
>     >>>    v6ops mailing list
>     >>>
>     >>>    v6ops@ietf.org
>     >>>
>     >>>    https://urldefense.proofpoint.com/v2/url?u=https-
>     >>
> 3A__www.ietf.org_mailman_listinfo_v6ops&d=DwIDaQ&c=BFpWQw8bsuKp
>     >>
> l1SgiZH64Q&r=UT3Bk9cbLeaJxhf3iCrhIoUWB8YLZU23029sMQGQ2kY&m=-
>     >>
> 5rgYq_nYMbSH2HXHnHFCFi2KDYzOClhSiLn0au8Wu0&s=iEq1tUDbeQL4f3SLM
>     >> f1-xihjJYT0KAAN_BWTl9-779c&e=
>     >>>
>     >>>
>     >>>
>     >>>
>     >>>
>     >>>
>     >>> **********************************************
>     >>> IPv4 is over
>     >>> Are you ready for the new Internet ?
>     >>> https://urldefense.proofpoint.com/v2/url?u=http-
>     >>
> 3A__www.consulintel.es&d=DwIDaQ&c=BFpWQw8bsuKpl1SgiZH64Q&r=UT3
>     >> Bk9cbLeaJxhf3iCrhIoUWB8YLZU23029sMQGQ2kY&m=-
>     >>
> 5rgYq_nYMbSH2HXHnHFCFi2KDYzOClhSiLn0au8Wu0&s=GMRLdItF8yKbUdE9
>     >> NuXE-U48uk7OHNuEijym9jhE--s&e=
>     >>> The IPv6 Company
>     >>>
>     >>> This electronic message contains information which may be privileged
> or
>     >> confidential. The information is intended to be for the exclusive use of
> the
>     >> individual(s) named above and further non-explicilty authorized
> disclosure,
>     >> copying, distribution or use of the contents of this information, even if
>     >> partially, including attached files, is strictly prohibited and will be
> considered a
>     >> criminal offense. If you are not the intended recipient be aware that
> any
>     >> disclosure, copying, distribution or use of the contents of this
> information,
>     >> even if partially, including attached files, is strictly prohibited, will be
>     >> considered a criminal offense, so you must reply to the original sender
> to
>     >> inform about this communication and delete it.
>     >>>
>     >>>
>     >>>
>     >>> _______________________________________________
>     >>> v6ops mailing list
>     >>> v6ops@ietf.org
>     >>> https://urldefense.proofpoint.com/v2/url?u=https-
>     >>
> 3A__www.ietf.org_mailman_listinfo_v6ops&d=DwIDaQ&c=BFpWQw8bsuKp
>     >>
> l1SgiZH64Q&r=UT3Bk9cbLeaJxhf3iCrhIoUWB8YLZU23029sMQGQ2kY&m=-
>     >>
> 5rgYq_nYMbSH2HXHnHFCFi2KDYzOClhSiLn0au8Wu0&s=iEq1tUDbeQL4f3SLM
>     >> f1-xihjJYT0KAAN_BWTl9-779c&e=
> 
>     _______________________________________________
>     v6ops mailing list
>     v6ops@ietf.org
>     https://urldefense.proofpoint.com/v2/url?u=https-
> 3A__www.ietf.org_mailman_listinfo_v6ops&d=DwIFaQ&c=BFpWQw8bsuKpl
> 1SgiZH64Q&r=UT3Bk9cbLeaJxhf3iCrhIoUWB8YLZU23029sMQGQ2kY&m=rzAc
> KPhTqXxGVQd-
> 3DoZlMutejQ5CWoImJNuCub7j0s&s=eUE0LS0GCy7rETlpmjDcvzkZeVTV4tBW
> NnFai4MeJT4&e=
> 
> 
> 
> 
> **********************************************
> IPv4 is over
> Are you ready for the new Internet ?
> https://urldefense.proofpoint.com/v2/url?u=http-
> 3A__www.theipv6company.com&d=DwIFaQ&c=BFpWQw8bsuKpl1SgiZH64Q
> &r=UT3Bk9cbLeaJxhf3iCrhIoUWB8YLZU23029sMQGQ2kY&m=rzAcKPhTqXxG
> VQd-
> 3DoZlMutejQ5CWoImJNuCub7j0s&s=Y1UJwTVJV8MiA6O7TnkI_7TJJ9SZJX6iX
> GCG8fkAG_0&e=
> The IPv6 Company
> 
> This electronic message contains information which may be privileged or
> confidential. The information is intended to be for the exclusive use of the
> individual(s) named above and further non-explicilty authorized disclosure,
> copying, distribution or use of the contents of this information, even if
> partially, including attached files, is strictly prohibited and will be considered a
> criminal offense. If you are not the intended recipient be aware that any
> disclosure, copying, distribution or use of the contents of this information,
> even if partially, including attached files, is strictly prohibited, will be
> considered a criminal offense, so you must reply to the original sender to
> inform about this communication and delete it.
> 
>