[dhcwg] Comments on draft-ietf-dhc-rfc3315bis-05

Tim Chown <Tim.Chown@jisc.ac.uk> Mon, 22 August 2016 09:45 UTC

Return-Path: <tim.chown@jisc.ac.uk>
X-Original-To: dhcwg@ietfa.amsl.com
Delivered-To: dhcwg@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 8EEF212B05F for <dhcwg@ietfa.amsl.com>; Mon, 22 Aug 2016 02:45:58 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -4.11
X-Spam-Level:
X-Spam-Status: No, score=-4.11 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, DKIM_SIGNED=0.1, HTML_MESSAGE=0.001, RCVD_IN_DNSWL_MED=-2.3, RCVD_IN_MSPIKE_H4=-0.01, RCVD_IN_MSPIKE_WL=-0.01, SPF_PASS=-0.001, T_DKIM_INVALID=0.01] autolearn=ham autolearn_force=no
Authentication-Results: ietfa.amsl.com (amavisd-new); dkim=fail (1024-bit key) reason="fail (body has been altered)" header.d=jisc365.onmicrosoft.com
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id JqRTXRLVrAmn for <dhcwg@ietfa.amsl.com>; Mon, 22 Aug 2016 02:45:54 -0700 (PDT)
Received: from eu-smtp-delivery-189.mimecast.com (eu-smtp-delivery-189.mimecast.com [146.101.78.189]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-SHA (256/256 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id DE2D412B049 for <dhcwg@ietf.org>; Mon, 22 Aug 2016 02:45:53 -0700 (PDT)
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=jisc365.onmicrosoft.com; s=selector1-jisc-ac-uk; h=From:Date:Subject:Message-ID:Content-Type:MIME-Version; bh=PwChcTIzrCaLsKndZnnNGivzJqVAhG9jyB/RYdvVXJQ=; b=GXzPMZAh+hgUNOjki+k7PNB/qbbCFyrm7kHzQl9+njGgdHog8JiMPAlKjcPvv8DCoknN4yQrK6a7xb39vQL+7dTJHb3QoftyYEXfA0mRXoUHrWfJ+n1fW9UErOqK+yOFCKOrMl52Mp3Kv4y5I3aVr3lXWI+T1RpS0Wn6zLpnm6w=
Received: from EUR02-AM5-obe.outbound.protection.outlook.com (mail-am5eur02lp0149.outbound.protection.outlook.com [213.199.180.149]) (Using TLS) by eu-smtp-1.mimecast.com with ESMTP id uk-mta-71-dX5JKQy0O0K3QkG-pWykzg-1; Mon, 22 Aug 2016 10:45:46 +0100
Received: from AMSPR07MB455.eurprd07.prod.outlook.com (10.242.106.148) by AMSPR07MB453.eurprd07.prod.outlook.com (10.242.106.143) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA384_P384) id 15.1.549.15; Mon, 22 Aug 2016 09:45:44 +0000
Received: from AMSPR07MB455.eurprd07.prod.outlook.com ([10.242.106.148]) by AMSPR07MB455.eurprd07.prod.outlook.com ([10.242.106.148]) with mapi id 15.01.0549.023; Mon, 22 Aug 2016 09:45:45 +0000
From: Tim Chown <Tim.Chown@jisc.ac.uk>
To: "dhcwg@ietf.org" <dhcwg@ietf.org>
Thread-Topic: Comments on draft-ietf-dhc-rfc3315bis-05
Thread-Index: AQHR/Fn01d1nlnpV20O8H9Rm/Dsp4w==
Date: Mon, 22 Aug 2016 09:45:45 +0000
Message-ID: <50A9F0CD-E401-4465-B0C2-6F8273F541F3@jisc.ac.uk>
Accept-Language: en-GB, en-US
Content-Language: en-US
X-MS-Has-Attach:
X-MS-TNEF-Correlator:
x-mailer: Apple Mail (2.3124)
x-ms-exchange-messagesentrepresentingtype: 1
x-originating-ip: [2001:a88:d510:1101:55c3:51ef:7d50:c1b4]
x-ms-office365-filtering-correlation-id: f48b8fdd-8843-4c1c-24a0-08d3ca711710
x-microsoft-exchange-diagnostics: 1; AMSPR07MB453; 20:DUg/KMJKzfP/WPx+c7Byc3flGcljSsGCwCV7oTYkEn8p51p+a3f8/f+AtSuE1OiLv2jheIwbWBs76VZ4TJEX5TW0I2LEYEQcGX1nmTRoKcViz1O6YGF9TYj/fE4OTmttx9+8jpTQ1W+6tXZx4KZIbJosfJ1RKOrG657mHHT0OaU=
x-microsoft-antispam: UriScan:;BCL:0;PCL:0;RULEID:;SRVR:AMSPR07MB453;
x-microsoft-antispam-prvs: <AMSPR07MB45352E729AF68504EADD311D6E80@AMSPR07MB453.eurprd07.prod.outlook.com>
x-exchange-antispam-report-test: UriScan:(158342451672863)(100405760836317)(1591387915157);
x-exchange-antispam-report-cfa-test: BCL:0; PCL:0; RULEID:(6040176)(601004)(2401047)(8121501046)(5005006)(3002001)(10201501046); SRVR:AMSPR07MB453; BCL:0; PCL:0; RULEID:; SRVR:AMSPR07MB453;
x-forefront-prvs: 00429279BA
x-forefront-antispam-report: SFV:NSPM; SFS:(10009020)(7916002)(199003)(189002)(82746002)(229853001)(74482002)(8676002)(189998001)(86362001)(87936001)(106116001)(101416001)(2351001)(230783001)(10400500002)(102836003)(92566002)(33656002)(7906003)(7736002)(3280700002)(81166006)(106356001)(16236675004)(57306001)(7846002)(19617315012)(122556002)(1730700003)(6116002)(50226002)(450100001)(105586002)(36756003)(2906002)(2501003)(5640700001)(3660700001)(97736004)(2900100001)(110136002)(68736007)(107886002)(15975445007)(77096005)(8936002)(19580395003)(5002640100001)(81156014)(50986999)(83716003)(586003)(5660300001)(3826002)(104396002); DIR:OUT; SFP:1101; SCL:1; SRVR:AMSPR07MB453; H:AMSPR07MB455.eurprd07.prod.outlook.com; FPR:; SPF:None; PTR:InfoNoRecords; A:1; MX:1; LANG:en;
spamdiagnosticoutput: 1:99
spamdiagnosticmetadata: NSPM
MIME-Version: 1.0
X-OriginatorOrg: jisc.ac.uk
X-MS-Exchange-CrossTenant-originalarrivaltime: 22 Aug 2016 09:45:45.3878 (UTC)
X-MS-Exchange-CrossTenant-fromentityheader: Hosted
X-MS-Exchange-CrossTenant-id: 48f9394d-8a14-4d27-82a6-f35f12361205
X-MS-Exchange-Transport-CrossTenantHeadersStamped: AMSPR07MB453
X-MC-Unique: dX5JKQy0O0K3QkG-pWykzg-1
Content-Type: multipart/alternative; boundary="_000_50A9F0CDE4014465B0C26F8273F541F3jiscacuk_"
Archived-At: <https://mailarchive.ietf.org/arch/msg/dhcwg/ivd4Arh_3C0VEOGCeHpHBvhWJgg>
Subject: [dhcwg] Comments on draft-ietf-dhc-rfc3315bis-05
X-BeenThere: dhcwg@ietf.org
X-Mailman-Version: 2.1.17
Precedence: list
List-Id: <dhcwg.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/dhcwg>, <mailto:dhcwg-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/dhcwg/>
List-Post: <mailto:dhcwg@ietf.org>
List-Help: <mailto:dhcwg-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/dhcwg>, <mailto:dhcwg-request@ietf.org?subject=subscribe>
X-List-Received-Date: Mon, 22 Aug 2016 09:45:58 -0000

Hi,

This email contains a number of comments on draft-ietf-dhc-rfc3315bis-05. I haven’t de-duplicated from previous comments to the list.

The comments are in order of appearance in the draft.

There are a few typos that I assume will be picked up by the RFC Editor, e.g. p.6 “which definition” (whose) and p.7 “filled” (filed), but it would be nice to minimise these. I’ve not noted them below.

Section 1.2
p.7 RFC4477 discussed dual-stack DHCP issues, and recommended separate servers per protocol (and thus not adding IPv4 options to DHCPv6). It may be worth citing, but some of the discussion may now be dated.
The section doesn’t discuss how merging of responses from DHCPv4 and DHCPv6 might be done. It should probably be flagged, but marked out of scope for 3315bis. I know we started discussing this years ago (draft-ietf-dhc-dual-stack-merge-01), but no consensus was reached as far as I recall.

Section 1.3
p.7 Perhaps say here that DHCP can be initiated by the client when required, or triggered by a server through an authenticated Reconfigure message.

Section 3
p.9 Will this draft will be parked until the 2460-bis and 4291-bis documents are completed?
The language of the first paragraph in Section 3 is a little clumsy.
Is the well-known multicast address (ff05::1:3) in common use? I’m not aware of any sites using it, rather they manually configure dhcp server addresses in relays.
The thinking on M/O flags in RFC4861 has moved on since 3315 was written. I guess it still needs to be mentioned, but it says “compatibility with SLAAC is a design requirement of DHCP” and the evidence of draft-ietf-v6ops-dhcpv6-slaac-problem-07 is rather to the contrary! (though not sure what to say here… it would be good to encourage more consistent behaviour - is there anything we can add to 3315bis to address the issues raised in draft-ietf-v6ops-dhcpv6-slaac-problem-07?

Section 4.1
p.10 Should this say IP and DHCP or IPv6 and DHCPv6?

Section 5.4
p.18 Should this example explain behaviour for PD when there are hierarchical routers within the site (as per RFC7368)? Or that where RAs are then issued by requesting routers their valid lifetime should be less than the lifetime of the PD?  (This and address examples are given in 17.1.10.1 which could be forward referenced)

Section 5.5
p.19 Is it worth adding a Section 5.6 here that briefly explains the renumbering case and use of Reconfigure messages? It would be nice to capture the work of 6RENUM here, and for the reader to appreciate that support for renumbering is useful.  I don’t think Reconfigure is otherwise mentioned in Section 5. This could also warn against “infinite” lifetimes.  As might RFC4242.

Section 6.1
p.19 Add a reference to the IANA Registry here? (http://www.iana.org/assignments/ipv6-multicast-addresses/ipv6-multicast-addresses.xhtml). And again, is site-scope multicast in common use (compared to manual server configuration on relays)?

Section 6.6
p.23 T1 and T2 are introduced here with no explanation of what they are. Perhaps forward reference to relevant options in Section 20?
It would also be good to repeat the warnings given later about infinite lifetimes here.

Section 8.1
p.25 There’s many references to “site-scoped” (unicast) addresses in 3315bis. Should these not all be removed? Also, ULAs are Global scope, so not sure they should be differentiated here or not.

p.28 “Despite our best efforts” reads oddly.

Section 10
p.31 The DUIDs are all explained here. But will 3315bis add any text for the RFC6939 model, whereby MAC addresses can be added as an option that relays will forward? There’s growing implementation support for this (e.g. Cisco relays, ISC DHCP), and it’s commonly requested by campus admins who I speak to. Or is this considered a “hack”? (RFC6939 is Standards Track, not Experimental…)

Section 12.1
p. 33 Perhaps add a pointer at the end of this section to RFC7824 and RFC7707 on address allocations from a DHCP pool, or point to discussion of these in Sections 21 and 22.

Section 12.3
p.33 Perhaps add that the client may have an IA_NA and an IA_TA.  It’s an open question as to whether a client may do IA_TA only.

Section 31.1
p.35 Maybe move the rate-limiting text (or replicate it) in Section 21.

Section 17
p.43 Update reference to RFC2462 to RFC4862, but anyway I think the pointer should be to RFC4861 where the M/O flags are described?

Section 17.1
p.45 In the DISCUSSION, it may be worth clarifying whether RFC6939 works via unicast; I recall it only works via a relay, which would be another reason to avoid unicast (if true, and you want to use RFC6939...).

Section 17.1.10.1
p.60 There was discussion in 6man/v6ops about using a /64 from the delegated prefix for a site for numbering the uplink. I think Jordi’s recent survey of ISPs showed this was more common than expected? So do we want to say MUST NOT assign here?  (I have no strong feeling myself…)

p.61 There may be complexities here if a client gets other configuration info from both DHCPv4 and DHCPv6… esp. if it merges without noting the source of the options it prioritised.

Section 17.2.9
p.74 Is the “server selection process” described somewhere?  If so, cite it, if not, it probably should be?

Section 18
p.77 I’d argue that from current usage, the first paragraph should say something stronger about including unicast addresses, mirroring common practice, and limited (is there any?) use of the all-dhcp-servers site-scope multicast address (ff05::1:3). Given a lot of work in the IETF on minimising use of multicast on links, do we want to say something stronger about not using the multicast site-scope WKA?

Section 18.1.1 and 18.1.2
p.78 Again, site-scope addresses mentioned three times on this page need to remove.
“If not” should be “If no”.
ULAs are not mentioned here; these can be considered within Globals, or may be called out separately (but it emphasised that they are Global scope).

Section 20.4
p.88 Change “client contacts” to “client should contact” (x2) to mirror the text for the PD option?

p.90 The “infinity” lifetime again mentioned here, with a health warning, but should we be stronger in language, as not least it kills renumbering. Worth a SHOULD NOT use infinite lifetime, so those doing it need to think about their specific reason to ignore that?

Section 20.5
p.91 I’m not sure about the text here on requesting an extension to the lifetime for an IA_TA. WOuldn’t the host simply deprecate the current temporary address (so it’s still usable by an existing TCP session) and request a new preferred IA_TA?  I had assumed DHCP worked the same as RAs here, e.g. generate a new temporary address every 24 hours, but keep the previous N addresses, in a deprecated state?
But does the DHCP server then need to keep state on the deprecated addresses to avoid reallocation to another host? Does that mean the host really needs to request N temporary addresses, and it’s the host’s job to choose which is preferred, with the DHCP server noting all those allocated (whether the host marks them deprecated or not)?  (I may be overthinking this! :)

Section 20.6
p.93 Again a mention of infinite lifetimes - perhaps we need a separate section early on with the clear health warning, rather than replicating it each time?  Not sure.

Section 20.14
p.101
Does it really matter in IPv6 that a handful of addresses may be committed by servers but not used by clients?  Again this may be a good place to reference the address allocation strategies in RFC7824 and RFC7707, or forward reference to sections 21 and 22.

Section 20.22
p.112 Does the PD option need a health warning on infinite lifetimes?

Section 20.25
p.114 Maybe add it is useful for renumbering.

Section 21
p.116
“This threat model does not consider the privacy of the contents of DHCP messages to be important” - despite RFC7824?
Add a reference to RFC7707 on scanning attacks.

Section 22
p.117
Move the para on scanning to section 21 and cite RFC7707.
The “Deriving the IID” paragraph repeats advice in RFC7824.

Section 24
p.118 is ff05::1:3 obsolete? :)

Tim