Re: [v6ops] WGLC: draft-ietf-v6ops-dhcp-pd-per-device-02 -> SLAAC is still the "MUST"

Jen Linkova <furry13@gmail.com> Thu, 05 October 2023 10:26 UTC

Return-Path: <furry13@gmail.com>
X-Original-To: v6ops@ietfa.amsl.com
Delivered-To: v6ops@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 5E9E3C13AE34 for <v6ops@ietfa.amsl.com>; Thu, 5 Oct 2023 03:26:27 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -1.855
X-Spam-Level:
X-Spam-Status: No, score=-1.855 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, DKIM_SIGNED=0.1, DKIM_VALID=-0.1, DKIM_VALID_AU=-0.1, DKIM_VALID_EF=-0.1, FREEMAIL_ENVFROM_END_DIGIT=0.25, FREEMAIL_FROM=0.001, RCVD_IN_ZEN_BLOCKED_OPENDNS=0.001, SPF_HELO_NONE=0.001, SPF_PASS=-0.001, T_SCC_BODY_TEXT_LINE=-0.01, URIBL_BLOCKED=0.001, URIBL_DBL_BLOCKED_OPENDNS=0.001, URIBL_ZEN_BLOCKED_OPENDNS=0.001] autolearn=ham autolearn_force=no
Authentication-Results: ietfa.amsl.com (amavisd-new); dkim=pass (2048-bit key) header.d=gmail.com
Received: from mail.ietf.org ([50.223.129.194]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id kV_uXhBqWYxR for <v6ops@ietfa.amsl.com>; Thu, 5 Oct 2023 03:26:23 -0700 (PDT)
Received: from mail-lj1-x22b.google.com (mail-lj1-x22b.google.com [IPv6:2a00:1450:4864:20::22b]) (using TLSv1.3 with cipher TLS_AES_128_GCM_SHA256 (128/128 bits) key-exchange X25519 server-signature RSA-PSS (2048 bits) server-digest SHA256) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id 81FFAC1519A4 for <v6ops@ietf.org>; Thu, 5 Oct 2023 03:26:23 -0700 (PDT)
Received: by mail-lj1-x22b.google.com with SMTP id 38308e7fff4ca-2c008042211so9879491fa.2 for <v6ops@ietf.org>; Thu, 05 Oct 2023 03:26:23 -0700 (PDT)
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=gmail.com; s=20230601; t=1696501582; x=1697106382; darn=ietf.org; h=content-transfer-encoding:cc:to:subject:message-id:date:from :in-reply-to:references:mime-version:from:to:cc:subject:date :message-id:reply-to; bh=q1E6QqqubiqIdESB4u7bbMs/JfnfcXgdH5NeLOp3KlU=; b=fzUhvJvuSqVA+4C2Fix1ewsV23twE6YlgJ30t6+Bku/zV6CzbQsFVTSlQG5R56uQBe PfUgvtGREuTHKQF5Hka1KMup6rgdFCBEWFeihzc0SOtzWPbKCv3bRTgc0VBSbx52ZB+7 xSzX5sP3CVUCEnhfsWVPFklaqct5OOcHuadW0p5kTlXLcFRqOHcvFD1nt1Gdd6GYTXD3 HZkZp2kSabIvUNz8VadKemmEAe3IgEOg8JO9vY3r3NehhoNHEs/oCDnFlnpz1oiDzceo uZMZBoVOo78OxXuh+ybdJ1moud9sV4xKX6o5kBvNe0qti/2eINf103qMWEEFRm4U0ULN 7zXA==
X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20230601; t=1696501582; x=1697106382; h=content-transfer-encoding:cc:to:subject:message-id:date:from :in-reply-to:references:mime-version:x-gm-message-state:from:to:cc :subject:date:message-id:reply-to; bh=q1E6QqqubiqIdESB4u7bbMs/JfnfcXgdH5NeLOp3KlU=; b=Oevd7NOX8hJnwPTfuPFqxyJLuHYBe6mc5T2fyTrOfeayABDssEBEoMS/HBS+CK2aGB djNlyERa6x3j1cyGM76boUGa09nqVOVEq5NqgWxZ+OKHjzWPvZgedzd0xvz5Q7lMeetn hSdGf14mdr0M+Ju7ZqN9RCWwXeOxPLsWsMFgD2eepD6psxnS/X3b75tvEvfKvILpb2M6 Tfw74c9jL6f1advLAx+UWvqfGiDRf6Dr8z7VtmGdNlFb/q1XwOnnxf/hEEzx0LpCtOBs vharkqpfAsCUTVh0nnLspDbdWfFTBM8PnTWv7LvRb9PXBmx22jO48uW/gObQCboJgyC0 NGRg==
X-Gm-Message-State: AOJu0YyreFeEzF/qAGmud5ewx/Qrcf2q0eBhMYjZD9xo73uto/pb9Y4W RtxVjIDKrL7wQwhXv2LVCE7923L67ZpPvsGNT7o=
X-Google-Smtp-Source: AGHT+IHVxuj1RNC91UewJOFWtrf7aVv/Nl/CYcdN+w1DANmhsXa4Uawr047Fz4YnnJPbpCzK5FuF9+RJCNe/LUBZaB4=
X-Received: by 2002:a2e:8241:0:b0:2c1:9a8b:f67 with SMTP id j1-20020a2e8241000000b002c19a8b0f67mr4363249ljh.1.1696501581373; Thu, 05 Oct 2023 03:26:21 -0700 (PDT)
MIME-Version: 1.0
References: <321ec9c338434550926335cd86c2f6ca@huawei.com> <CAFU7BARTkKykS6RSv+5h8Vhz1YEud6rv20hGRHYBRfttume3nQ@mail.gmail.com> <3db61741e90c4622884c44fa42746cd3@huawei.com>
In-Reply-To: <3db61741e90c4622884c44fa42746cd3@huawei.com>
From: Jen Linkova <furry13@gmail.com>
Date: Thu, 05 Oct 2023 03:26:10 -0700
Message-ID: <CAFU7BATmEFpUzcBCrJpx5HQ=xynA8FhM1JNyZwUhH8CpU1=-YA@mail.gmail.com>
To: Vasilenko Eduard <vasilenko.eduard@huawei.com>
Cc: "v6ops@ietf.org" <v6ops@ietf.org>
Content-Type: text/plain; charset="UTF-8"
Content-Transfer-Encoding: quoted-printable
Archived-At: <https://mailarchive.ietf.org/arch/msg/v6ops/zvDHJ35KfVBp_WTI-Zad50_LCoc>
Subject: Re: [v6ops] WGLC: draft-ietf-v6ops-dhcp-pd-per-device-02 -> SLAAC is still the "MUST"
X-BeenThere: v6ops@ietf.org
X-Mailman-Version: 2.1.39
Precedence: list
List-Id: v6ops discussion list <v6ops.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/v6ops>, <mailto:v6ops-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/v6ops/>
List-Post: <mailto:v6ops@ietf.org>
List-Help: <mailto:v6ops-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/v6ops>, <mailto:v6ops-request@ietf.org?subject=subscribe>
X-List-Received-Date: Thu, 05 Oct 2023 10:26:27 -0000

On Thu, Oct 5, 2023 at 2:55 AM Vasilenko Eduard
<vasilenko.eduard@huawei.com> wrote:
> > So to increase the applicability
>
> Actually, restricting to 1 mechanism from 3 is to"decrease applicability", not "increase".
>
> Let network administrators decide what to use between the "DHCP-PD client" and the real host.

It's not always up to the administrator to decide. If the host needs
SLAAC, not much the administrator can do: either provide the
SLAAC-suitable prefix, or have a device with a broken connectivity.

> I expect that in the 3GPP TE case, SLAAC would be enforced.
>
> But to block other mechanisms outside the Android domain – is too much.

The draft doesn't block anything. It's an informational document
describing a deployment scenario - one of many. However I think it
would be a good idea to ensure that that scenario allows the
administrator to connect an arbitrary device to the network and do not
limit the solution to the cases when the devices can operate w/o SLAAC
- I guess it would be a completely different draft.
Let me give you an example: most network segments in my network
contain no Android devices at all, so it has nothing to do with
Android not supporting DHCPv6-PD. However if I disable SLAAC on those
segments and provide DHCPv6 IA_NA only, the network connectivity would
be broken for the vast majority of the devices. The reason is - as
I've mentioned before - that currently all implementations I know do
require SLAAC for forming 464xlat addresses.

> > The draft doesn't say the client MUST use SLAAC.
>
> It does:
>
> " The server MUST provide a prefix short enough for the client to assign addresses to its interfaces and connected systems via SLAAC"

This sentence requires *the server* to provide the prefix suitable for
SLAAC - in case the client needs it. If the client (and connected
systems) are happy with DHCPv6 IA_NA or manual config or smth else -
fine, the proposed solution would still work.
So I do not see where the draft puts any requirements on the client -
actually, please wait till the end of the week, -03 would make it
explicit that the draft doesn't put any requirements to the client,
re: what to do with the delegated prefix - it's about the network
part.

> And section 5 is very misleading in the SLAAC direction.

May I ask you to wait two days, we are rewriting section 5 so it would
contain facts and facts only - so hopefully it will be less
misleading.

> > -----Original Message-----
>
> > From: Jen Linkova [mailto:furry13@gmail.com]
>
> > Sent: Thursday, October 5, 2023 12:43 PM
>
> > To: Vasilenko Eduard <vasilenko.eduard@huawei.com>
>
> > Cc: v6ops@ietf.org
>
> > Subject: Re: [v6ops] WGLC: draft-ietf-v6ops-dhcp-pd-per-device-02 -> SLAAC
>
> > is still the "MUST"
>
> >
>
> > On Thu, Oct 5, 2023 at 2:09 AM Vasilenko Eduard
>
> > <vasilenko.eduard=40huawei.com@dmarc.ietf.org> wrote:
>
> > > Section 7, second bullet. I strongly object "MUST" for SLAAC.
>
> > >
>
> > > "Client" may use 3 mechanisms to re-distribute the DHCP-PD prefix:
>
> > > 1. SLAAC
>
> > > 2. DHCP
>
> > > 3. Local algorithm (if VMs or Containers are local to the "client").
>
> >
>
> > It's not about  how the client distributes the addresses from the
>
> > delegate prefix, it's about what devices *downstream* support.
>
> > So to increase the applicability of the solution and support an
>
> > arbitrary device, SLAAC is needed.
>
> > In particular, currently even if a device supports DHCPv6 IA_NA for
>
> > address assignment, all implementations I'm aware of would require a
>
> > PIO with A=1 to form a 464xlat address. So even if *all* systems use
>
> > DHCPv6 IA_NA, you'd need  a SLAAC suitable prefix to make those
>
> > systems work in IPv6-only mode.
>
> >
>
> > > It is wrong that section 5 and section 7 restrict the use case to only the first
>
> > option.
>
> >
>
> > Quite the opposite, actually. The draft doesn't prescribe what the
>
> > client does with the prefix (wait for -03, we are making the text more
>
> > clear on that) - the client can do whatever it wants. The draft
>
> > doesn't say the client MUST use SLAAC. It only prescribes that the
>
> > server guarantees that the client can use SLAAC if it desires.
>
> > It would be unreasonable to restrict this solution to exclude devices
>
> > which need SLAAC (e.g. for 464XLAT) - that would limit the
>
> > applicability drastically for absolutely no reason.
>
> >
>
> > > On 9/30/2023 4:42 PM, Xipengxiao wrote:
>
> > >
>
> > > Hi Folks,
>
> > >
>
> > > This message initiates a WGLC for draft-ietf-v6ops-dhcp-pd-per-device-02.
>
> > The call will end on Oct 14, 2023.  Your opinion will be valued.
>
> > >
>
> > > Ron & XiPeng
>
> > >
>
> > >
>
> > >
>
> > > _______________________________________________
>
> > > v6ops mailing list
>
> > > v6ops@ietf.org
>
> > > https://www.ietf.org/mailman/listinfo/v6ops
>
> > > _______________________________________________
>
> > > v6ops mailing list
>
> > > v6ops@ietf.org
>
> > > https://www.ietf.org/mailman/listinfo/v6ops
>
> >
>
> >
>
> >
>
> > --
>
> > SY, Jen Linkova aka Furry
>
>



-- 
SY, Jen Linkova aka Furry