Re: [v6ops] Implementation Status of PREF64

"STARK, BARBARA H" <bs7652@att.com> Sun, 10 October 2021 17:11 UTC

Return-Path: <bs7652@att.com>
X-Original-To: v6ops@ietfa.amsl.com
Delivered-To: v6ops@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 70C2B3A09E9 for <v6ops@ietfa.amsl.com>; Sun, 10 Oct 2021 10:11:16 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -1.899
X-Spam-Level:
X-Spam-Status: No, score=-1.899 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, DKIM_SIGNED=0.1, DKIM_VALID=-0.1, HTML_MESSAGE=0.001, RCVD_IN_MSPIKE_H2=-0.001, SPF_HELO_NONE=0.001, SPF_PASS=-0.001, URIBL_BLOCKED=0.001] autolearn=unavailable autolearn_force=no
Authentication-Results: ietfa.amsl.com (amavisd-new); dkim=pass (1024-bit key) header.d=att.onmicrosoft.com
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id MKrgy2soISge for <v6ops@ietfa.amsl.com>; Sun, 10 Oct 2021 10:11:12 -0700 (PDT)
Received: from mx0a-00191d01.pphosted.com (mx0a-00191d01.pphosted.com [67.231.149.140]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id 3AC563A09FA for <v6ops@ietf.org>; Sun, 10 Oct 2021 10:11:12 -0700 (PDT)
Received: from pps.filterd (m0048589.ppops.net [127.0.0.1]) by m0048589.ppops.net-00191d01. (8.16.1.2/8.16.1.2) with SMTP id 19AD64nT039730; Sun, 10 Oct 2021 13:11:00 -0400
Received: from alpi154.enaf.aldc.att.com (sbcsmtp6.sbc.com [144.160.229.23]) by m0048589.ppops.net-00191d01. with ESMTP id 3bkr186egt-1 (version=TLSv1.2 cipher=ECDHE-RSA-AES256-GCM-SHA384 bits=256 verify=NOT); Sun, 10 Oct 2021 13:10:59 -0400
Received: from enaf.aldc.att.com (localhost [127.0.0.1]) by alpi154.enaf.aldc.att.com (8.14.5/8.14.5) with ESMTP id 19AHAwTE012432; Sun, 10 Oct 2021 13:10:58 -0400
Received: from zlp30487.vci.att.com (zlp30487.vci.att.com [135.47.91.176]) by alpi154.enaf.aldc.att.com (8.14.5/8.14.5) with ESMTP id 19AHApwj012361 (version=TLSv1/SSLv3 cipher=DHE-RSA-AES256-GCM-SHA384 bits=256 verify=NO); Sun, 10 Oct 2021 13:10:53 -0400
Received: from zlp30487.vci.att.com (zlp30487.vci.att.com [127.0.0.1]) by zlp30487.vci.att.com (Service) with ESMTP id A20DF4005941; Sun, 10 Oct 2021 17:10:51 +0000 (GMT)
Received: from GAALPA1MSGEX1BA.ITServices.sbc.com (unknown [135.50.89.102]) by zlp30487.vci.att.com (Service) with ESMTP id 26285400579E; Sun, 10 Oct 2021 17:10:51 +0000 (GMT)
Received: from GAALPA1MSGED2CB.ITServices.sbc.com (135.50.89.133) by GAALPA1MSGEX1BA.ITServices.sbc.com (135.50.89.102) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256) id 15.1.2308.14; Sun, 10 Oct 2021 13:10:05 -0400
Received: from GAALPA1MSGETA03.tmg.ad.att.com (144.160.249.125) by GAALPA1MSGED2CB.ITServices.sbc.com (135.50.89.133) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256) id 15.1.2308.14 via Frontend Transport; Sun, 10 Oct 2021 13:10:05 -0400
Received: from NAM02-DM3-obe.outbound.protection.outlook.com (104.47.56.40) by edgeal3.exch.att.com (144.160.249.125) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id 15.1.2308.14; Sun, 10 Oct 2021 13:09:10 -0400
ARC-Seal: i=1; a=rsa-sha256; s=arcselector9901; d=microsoft.com; cv=none; b=EXTobLGkGKFaHfFLk6CMIFVVsG4pO3YYrxysoeXT01nIOJZs8iHxDKGZtJXTqHwhNqS8RjMOSVmviOkdZH/MK7FqkxHbfK6HgNQTelXBW57nCvJhxLfLVtkQoQMHF5maYfr4D2WSbfZExBRx/sZak/42VKDd+OSGdHkF5s86AripBE/pYrYmcyTuCdNffdwb7yEJq2z14TddQxaKedU7zzmP3qxZu7chl/7m1Vr4ToxkPkOQC4SVkxXSsJhHI8PIeLe1YX/O1hKsOqjJRg6F+QSX5OwUAsx36S0nxppMaNKzJuKZX0DdfJUkzcHT83vqgPfNL3OLSRpqNawrLK1JvQ==
ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=microsoft.com; s=arcselector9901; h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-AntiSpam-MessageData-ChunkCount:X-MS-Exchange-AntiSpam-MessageData-0:X-MS-Exchange-AntiSpam-MessageData-1; bh=bfkLO8B/RP8tb/LkIEYNXMsZzMQXByYSAL9UXrU+k7g=; b=JIC+fUx9YdAF7gwEldxgpJwTjulrkYt/zpoYEInc9MnTx9hLzfGQhY9GvJQm21SFNmxtWS2fLjZxyyYFI/0k0TXVXISqVP0/rolTuhkOx6DXyFel43b/vF9DpNH3F518+roPwJjb4kYH6PUNzlAhLwYlSXYYuCmA2fZ+UAPDcqBq1O78EbLKruHqr6sWLlzmVs9ZE/oTZoODwoj4+OCKFT7ditF7sZPfriVVA6qWeizsYWl607eX400a6pYB0sY5j7ajCg1YroI4EXGGeWCfAzUs9BzfpK3jRua67kWqx1SSAd3i8Lv2F3t6LicmyLcrohXo3oXbrKzhYULc//7oDg==
ARC-Authentication-Results: i=1; mx.microsoft.com 1; spf=pass smtp.mailfrom=att.com; dmarc=pass action=none header.from=att.com; dkim=pass header.d=att.com; arc=none
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=att.onmicrosoft.com; s=selector2-att-onmicrosoft-com; h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-SenderADCheck; bh=bfkLO8B/RP8tb/LkIEYNXMsZzMQXByYSAL9UXrU+k7g=; b=MSW4d+iDXoONYdZle3jOD/JwbMgK6P5FsTjlOoislm9cMfaZqms0HwtSHmYQpvXnakrISfE0f3DnXJSi0WzJdPvWh2VnLfyJRCxZcWxDu0oJbMoiWtytVJJ1Ov5ui1SZ6OwfEL+5FDHN06OCSkyc6JF9vQ1wOXtf+XdTKqXuSKQ=
Received: from DM6PR02MB6924.namprd02.prod.outlook.com (2603:10b6:5:25f::7) by DM6PR02MB5865.namprd02.prod.outlook.com (2603:10b6:5:155::10) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id 15.20.4587.19; Sun, 10 Oct 2021 17:09:09 +0000
Received: from DM6PR02MB6924.namprd02.prod.outlook.com ([fe80::ddec:9436:4971:5d1e]) by DM6PR02MB6924.namprd02.prod.outlook.com ([fe80::ddec:9436:4971:5d1e%4]) with mapi id 15.20.4587.025; Sun, 10 Oct 2021 17:09:09 +0000
From: "STARK, BARBARA H" <bs7652@att.com>
To: 'David Farmer' <farmer@umn.edu>
CC: 'Nick Hilliard' <nick@foobar.org>, 'Lorenzo Colitti' <lorenzo=40google.com@dmarc.ietf.org>, 'v6ops list' <v6ops@ietf.org>
Thread-Topic: [v6ops] Implementation Status of PREF64
Thread-Index: AQHXsWi2DBM7IMpC8UKLfKGYAarvaKuzw5QAgABK64CAAEb8gIAACf0AgAH4SoCAAgvogIAAROwAgAA+dQCAAAd6AIAAt2YAgAA3zYmAAA5VgIAABjRhgAAdrQCAAT+pgIAATKaAgABC0QCAAFMkAIAAAS0AgAAYOoCAAAlHgIAAECaAgABgW4CAAIk4gIAABwOAgAAV5ACAACIjAIAABJcAgAAReQCAAAnwAIAIt5qAgADLB4CAAEmdgIAAHG5ggAHKBYCAABsioIAAMFmAgALR18A=
Date: Sun, 10 Oct 2021 17:09:09 +0000
Message-ID: <DM6PR02MB69246E57E3D43C6D9BE276E9C3B49@DM6PR02MB6924.namprd02.prod.outlook.com>
References: <DDA36020-90CC-471B-83AD-3D98950F1164@delong.com> <CAKD1Yr0T-7t-UHbsJBMLpTjKhPAV5uUQkux6oby89TVUue7PyA@mail.gmail.com> <CO1PR11MB4881D400EA4681F1505040D2D8AA9@CO1PR11MB4881.namprd11.prod.outlook.com> <CAKD1Yr3TmqFxjKuZ57wS7VuPOf6rJvOwnvnQdFrRLQ=DkZ+CCw@mail.gmail.com> <CO1PR11MB4881F411A4D5BEA7A8479726D8AA9@CO1PR11MB4881.namprd11.prod.outlook.com> <D8AEA194-293B-43E4-BCAE-33CD81FB7D8C@delong.com> <CAKD1Yr2Tug-PFV7wAh0s6-gw8W3LcLG7wC1fD7Lu_hMZQYKdtw@mail.gmail.com> <08D2885E-B824-48E8-9703-DCA98771FA37@delong.com> <CAKD1Yr2EVsY3tYUf56R0Q1+KVrowtqh-HgwXj5vxzy4wd-vkTg@mail.gmail.com> <1A6ED87B-666E-439C-852F-2E5C904C0515@delong.com> <CAKD1Yr23fY2DJDvB-9eVFRsxnBnZQ0kZuZfYUfRUHYW=_D=enA@mail.gmail.com> <CAN-Dau1z0q0R61x7iY+Wg_cFRU0jmqr+fR0y=bSXxj+K-n722w@mail.gmail.com> <CAKD1Yr1T_mXfxJGHOrBfqZfexm6GTrUqnFi57710pTroKQK6uQ@mail.gmail.com> <702CB018-1A02-4B32-B9AA-7C7B31521F12@delong.com> <CAKD1Yr0jZR8Efzr_Y6FeiBvHYS8ATmDupx2ABTXXy-rSA_QjmA@mail.gmail.com> <1adb70a8-db0a-4ea6-f721-c1035343cda3@foobar.org> <DM6PR02MB69249D4F0A8003E77EC9F153C3B19@DM6PR02MB6924.namprd02.prod.outlook.com> <CAN-Dau0q7p-9NWv=9vouX51Z1Yqe_h06WwpnkMjkyj6=A7EcQw@mail.gmail.com> <DM6PR02MB692441075A30B10B3697E5F5C3B29@DM6PR02MB6924.namprd02.prod.outlook.com> <CAN-Dau0WP_4RsS65K3V4aFT8-DfxaCWTaGSuXytXeN=eWUuo7A@mail.gmail.com>
In-Reply-To: <CAN-Dau0WP_4RsS65K3V4aFT8-DfxaCWTaGSuXytXeN=eWUuo7A@mail.gmail.com>
Accept-Language: en-US
Content-Language: en-US
X-MS-Has-Attach:
X-MS-TNEF-Correlator:
authentication-results: umn.edu; dkim=none (message not signed) header.d=none;umn.edu; dmarc=none action=none header.from=att.com;
x-ms-publictraffictype: Email
x-ms-office365-filtering-correlation-id: 85bab778-f439-47f4-4ea6-08d98c10ac91
x-ms-traffictypediagnostic: DM6PR02MB5865:
x-microsoft-antispam-prvs: <DM6PR02MB5865A23E7B6A3C4742E0A9ABC3B49@DM6PR02MB5865.namprd02.prod.outlook.com>
x-ms-oob-tlc-oobclassifiers: OLM:6108;
x-ms-exchange-senderadcheck: 1
x-ms-exchange-antispam-relay: 0
x-microsoft-antispam: BCL:0;
x-microsoft-antispam-message-info: KIoGLQfPx5TVRcAF1E+uHvHAJRZEMiG711m8S8FtttlJPWvClMgAutelUI9j4rOrcSVVVGJ+y0WuhpjNghCka7d9x1xk+coWPbsGGBQIEeBgDeApPL7crggLj6oMz5QLe1jB4qiSsN2WGxx/Ns7+B89N42RwF95EP/GH5cY3pIKeFSvQJ/j3J1811nCka11E1vLa0TmC3v2QOp2aJKyLJOnpXZ96sKiBgSOiNH4a9otWIfaarozU0UYZB/gtCivWb9LDcs0jPm0HDmEZCEeJmsEW/6F7dBJ10zb+LKPUVtIP4ieb1TyYQkrm0+Fxz9Dm4cJ65KYazXivk5ciquiqwUFg5VXlPmqJDNz6H2WLyIYtO9PV8iRvySfPSyS+UU7cjD8z1EJnMZU04id9ctEAC0YHM+p2D+LVdDSc/kZeXOduTIPUZAlZgIdvlnyvehYSNkwYkBOuM/8ETr6RzMU3TChJCRCp3B8n1BuE8p4LGtshlukrxLk9h4LOwPn3E1vIG3wK0y+FJiqpi/P20Yv8muZ2fqNxygRUpUGtxHZJf34P7/IYs8EMmQwbe7AS3iO2+5fic3w/0T10Z8rlMpOBOhJXONHyEloFoN9WygNg43ea2FLf5B1Hl1p3kz9SFc7FpdLwz7a0k7c0BdJW0YjG19eHCRU8pmHkaZ+sdv8yn/JRG4+S08QKniey7ZjHaKzpSlsrLMBaCCchYaorrgZybQ==
x-forefront-antispam-report: CIP:255.255.255.255; CTRY:; LANG:en; SCL:1; SRV:; IPV:NLI; SFV:NSPM; H:DM6PR02MB6924.namprd02.prod.outlook.com; PTR:; CAT:NONE; SFS:(4636009)(366004)(8676002)(54906003)(2906002)(5660300002)(76116006)(52536014)(71200400001)(6506007)(26005)(30864003)(186003)(122000001)(7696005)(66946007)(64756008)(38100700002)(508600001)(4326008)(33656002)(38070700005)(86362001)(66476007)(82202003)(40140700001)(9686003)(316002)(55016002)(66574015)(6916009)(8936002)(83380400001)(66446008)(66556008)(559001)(579004); DIR:OUT; SFP:1101;
x-ms-exchange-antispam-messagedata-chunkcount: 1
x-ms-exchange-antispam-messagedata-0: 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
x-ms-exchange-transport-forked: True
Content-Type: multipart/alternative; boundary="_000_DM6PR02MB69246E57E3D43C6D9BE276E9C3B49DM6PR02MB6924namp_"
MIME-Version: 1.0
X-MS-Exchange-CrossTenant-AuthAs: Internal
X-MS-Exchange-CrossTenant-AuthSource: DM6PR02MB6924.namprd02.prod.outlook.com
X-MS-Exchange-CrossTenant-Network-Message-Id: 85bab778-f439-47f4-4ea6-08d98c10ac91
X-MS-Exchange-CrossTenant-originalarrivaltime: 10 Oct 2021 17:09:09.0781 (UTC)
X-MS-Exchange-CrossTenant-fromentityheader: Hosted
X-MS-Exchange-CrossTenant-id: e741d71c-c6b6-47b0-803c-0f3b32b07556
X-MS-Exchange-CrossTenant-mailboxtype: HOSTED
X-MS-Exchange-CrossTenant-userprincipalname: T27Zv8XfGUCspgWMygaMmn+4ZsuUYfkLCu6AYQrJ+Q8Jkuy4EmdJH79k9V7DA1x2
X-MS-Exchange-Transport-CrossTenantHeadersStamped: DM6PR02MB5865
X-OriginatorOrg: att.com
X-TM-SNTS-SMTP: AD6F5857DF1D0A96F36A551CF125EF6FD6A186D535E1643B613CD07ADCDF94C42
X-Proofpoint-GUID: qv_SFqvK02yv83HVLq2SaFA65xiu4XzK
X-Proofpoint-ORIG-GUID: qv_SFqvK02yv83HVLq2SaFA65xiu4XzK
X-Proofpoint-Virus-Version: vendor=baseguard engine=ICAP:2.0.182.1,Aquarius:18.0.790,Hydra:6.0.391,FMLib:17.0.607.475 definitions=2021-10-10_05,2021-10-07_02,2020-04-07_01
X-Proofpoint-Spam-Details: rule=outbound_policy_notspam policy=outbound_policy score=0 bulkscore=0 adultscore=0 spamscore=0 impostorscore=0 clxscore=1015 malwarescore=0 lowpriorityscore=0 priorityscore=1501 mlxscore=0 mlxlogscore=999 phishscore=0 suspectscore=0 classifier=spam adjust=0 reason=mlx scancount=1 engine=8.12.0-2109230001 definitions=main-2110100118
Archived-At: <https://mailarchive.ietf.org/arch/msg/v6ops/oL0wlBj0OX4ekuNW897EbKLQ64M>
Subject: Re: [v6ops] Implementation Status of PREF64
X-BeenThere: v6ops@ietf.org
X-Mailman-Version: 2.1.29
Precedence: list
List-Id: v6ops discussion list <v6ops.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/v6ops>, <mailto:v6ops-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/v6ops/>
List-Post: <mailto:v6ops@ietf.org>
List-Help: <mailto:v6ops-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/v6ops>, <mailto:v6ops-request@ietf.org?subject=subscribe>
X-List-Received-Date: Sun, 10 Oct 2021 17:11:17 -0000

In-line, with <bhs2>.
Barbara

Ok, the IETF shouldn't pick N, I'm ok with that. But, does that mean you think it is inappropriate for host implementations to enforce some number of IPv6 addresses be available? Or, are you saying that is completely up to network operators?
<bhs2> My primary objection is to the suggestion that IETF should specify "N". Host devices (including malware and privacy-violating IP-enabled TVs that scan the local network and use microphones to listen to sounds inside the home, etc) will do whatever they want. I think a lot of the things host implementations do are inappropriate. Personally, I do think it's inappropriate for my DVRs, DVD player, oven, refrigerator, and TVs to have lots of GUA IPv6 addresses. This makes it really hard for me to track what devices are on my home network. But that's neither here nor there. This is IETF. I think for IETF to recommend "N" (because no matter how much a BCP might say "MUST", it's still only a recommendation) for all devices is highly inappropriate.</bhs2>
 I will note a few things;
 1. The IETF hasn't picked a value of  N, but it has, through RFC7934, said that N>1.
<bhs2> For "general-purpose" devices, only.</bhs2>
2. In effect Android already enforces, N>1, by only supporting the self-assigned addressing model of SLAAC.
3. However, by not supporting a DHCPv6 client, Android doesn't support the managed-assignment addressing model of DHCPv6.
 In an effort to find a compromise that allows Android to support DHCPv6 and therefore the managed-assignment addressing model, I'm suggesting it is reasonable for DHCPv6 clients to require the availability of more than one IPv6 address before it enables it's IPv6 stack, and it sounds like Lorenzo is at least open to discuss such a comprise.
<bhs2> Android is already allowed (by IETF, legally, etc - by pretty much everyone except Google) to support DHCPv6. IETF doesn't need to take any action, whatsoever, to "allow" Android to support DHCPv6. BTW, my Chromecast (which I'm guessing is not Android) has a single DHCPv6-assigned address. It seems to work just fine. But I wouldn't characterize it as general-purpose.</bhs2>
 However, it seems that some people are insisting that network operators should be able to assign one and only one IPv6 address per client. Personally, I think this argument is utterly futile, is creating a deadlock, and it is holding back the deployment of IPv6. However, this deadlock is not caused only by Android not supporting DHCPv6, but it is also caused by those that insist that assigning one and only one address is a valid IPv6 deployment strategy, and that network operators should have ultimate and unilateral control in this matter.
<bhs2> Why does my Chromecast need multiple IPv6 addresses assigned to it? And why is my assigning my Chromecast a single IPv6 address not a valid strategy? It sure makes it easy for me to see what my Chromecast is doing. I like being able to see what devices are doing inside my home network. Unlike some people in IETF, I don't think the Internet (or my LAN branch of it) is for host devices (to do whatever they want and dictate to people what the people are and aren't allowed to do wrt managing a home network). </bhs2>
I'm willing to concede that network operators need to allocate more than one IPv6 address per client.. Furthermore, I think it is very important that all major operating systems allow for both IPv6 address assignment models, self-assigned (SLAAC) and managed-assignment (DHCPv6).
 <bhs2> I agree. And all but one major OS already does.</bhs2>
I'm having visions of IETF becoming not unlike the Texas legislature in its desire to dictate "morality".
Barbara

Insisting the network operators have ultimate and unilateral control of this issue is equally dictating "morality".

<bhs> Just a few points:
- RFC7934 is scoped to "general-purpose end hosts" (which is not defined and therefore you can define the term any way that makes sense for you). RFC7934 is very specifically *not* scoped to all hosts.

Are all Android devices general-purpose? Probably not. However, the overwhelming majority are, at least by my understanding of the intent of RFC7934. So, it doesn't seem unreasonable to me for Android to treat all Android devices as general-purpose from a device implementation perspective. Therefore, I think RFC7934 applies, but more importantly the makers of Android seem to think it applies to their devices.

<bhs2> My husband's Nook eReader is an Android device. I wouldn't classify it as general-purpose. But I only let that device connect to my guest network (along with the Nest devices, where they hopefully can't threaten the rest of my network). It does get SLAAC there. But I don't see any reason why it needs multiple IPv6 GUA addresses. </bhs2>
 - I used the term "private network operators" in my comment and not "network operators". Just to be clear, "private network operators" include enterprises, small businesses, and home owners and not ISPs. I make no statement about ISPs. So you're saying that I should not be allowed to operate my home network any way I want (so long as that doesn't interfere with others' rights - e.g., doesn't allow my devices or my network to be used as part of a DDoS attack) because the IETF has claimed it has rights to dictate my home network and device addressing policies? <sarcasm>Maybe IETF should encourage legislators to pass a law that anyone can sue somebody (bounty of $10k?) for helping a home network owner subvert an IETF BCP.

And, you seem to be saying the makers of Android have no right to determine what protocols they will implement in their products.

<bhs2> That's not at all what I'm saying. Google owns the Android OS and I'm not aware of any country or international law that says Google doesn't have the right to determine what protocols to implement. Which means they do have the right. Furthermore, I support their right. But that doesn't mean I have to approve of their doing this. And it certainly doesn't mean IETF needs to bless this decision or try to negotiate a way for Google to agree to add support for IA_NA. I'm saying IETF has no business blessing this decision or negotiating away other device manufacturer and user/people rights in order to get Google to support IA_NA. </bhs2>

You have the right to determine the rules for your network, but you don't have the right to expect every product on the market to be compatible with all the rules you choose. Of course you have the right to choose not to buy those products. And, the makers of products have the right to choose not to sell products that are compatible with your rules. That is free enterprise, and how free markets work.

<bhs2> Agreed. Which is why there are no Android devices on my primary home network, and no general-purpose Android devices on any part of my network.</bhs2>

</sarcasm> And you think that my objection to IETF claiming rights over my network is *me* dictating morality? Really? No. I absolutely, 100%, claim full ownership of my home network and its policies (other than those that could interfere with other living human beings' networks and devices). If you can explain how my only allowing a host to have a single address is harmful (presents a security risk) *to somebody else* then let's discuss. If you're patronizingly trying to prevent me from what you think would be self-harm (e.g., allowing home owners to assign just a single address might cause some home owners mental anguish) or because you think hosts should have rights, then there's nothing for us to discuss.

The IETF's job, in my mind, is to find the middle ground. That is to create specifications and recommendations that reasonably balance and harmonize all stakeholders needs, but there has to be some give and take in that.

You have the right to determine the rules for your network, but the makers of Android have a right to determine the kinds of networks and the protocols they will support.

That is why I'm saying network operators, public or private, don't have ultimate and unilateral control, they have, and should have, a lot of control, but that control is moderated by the makers of equipment, and the actual users, when they are not directly the operator of the network.

I'm simply trying to find compromise. I very much want Android to implement DHCPv6. I think the managed-assignment addressing model it provides is important for lots of reasons, not the least of which is, for use on networks with highly protected data. However, nothing about the managed-assignment addressing model and DHCPv6, is incompatible with allowing, or even requiring, multiple addresses per device. And, the one and only one addressing model is very much IPv4 thinking, at least in my opinion. In IPv6 it is very much possible to support multiple managed addresses at the same time.

<bhs2> I agree it would be nice if Android implemented IA-NA. But I'm not willing to negotiate away my right to buy non-Android devices that support just a single IA_NA address in order to achieve that. This isn't something I'm willing to compromise on. If Android wants to implement IA_NA in a way that requires 5 or 10 or 20 addresses to be then it already has that right - there's nothing stopping it (outside Google). Just like it has the right (as we have established above) not to do IA_NA, at all. IETF doesn't need to say or write anything for Android to be able to do this. No negotiation needed. What you're suggesting, is to negotiate away current capabilities that people have from other devices in exchange for Android to allow its OS a little more freedom. It's like a hostage negotiation. I object strongly to such negotiation.</bhs2>

If the parties in this dispute dig their heels in, and are not willing to consider some compromise, we will be stuck with the status quo. I personally find the status quo unacceptable, and it has our industry in a very sad state, if I may say so.

Barbara   // BTW, I changed the <1 to >1 in the quoted text

Well one of them, I changed the other one.

Thanks.

--
===============================================
David Farmer               Email:farmer@umn.edu<mailto:Email%3Afarmer@umn.edu>
Networking & Telecommunication Services
Office of Information Technology
University of Minnesota
2218 University Ave SE        Phone: 612-626-0815
Minneapolis, MN 55414-3029   Cell: 612-812-9952
===============================================