On 28.5.2015, at 19.20, Dave Taht <[email protected]> wrote:
>>>> (3) it is impossible to act as a dumb DNCP forwarder without publishing
>>>> a Node-State TLV and a full set of Neighbor sub-TLVs.
>>> This is not true. Given basic bridging of ‘remember one guy on end of
>>> each link’, you can do essentially bridging.
> so my use case (wanting routers without any ipv6 ips, just the fe80::,
> to be able to forward requests onward) is merely a limitation of the
> implementation?
Well, IPv6 IPs _are not forced_ by DNCP _or_ HNCP. Current implementation wants
to do the assignments now by default, but I think if you set ip6assign=0 (or
whatever the desired prefix length parameter was), you would get what you want
now too.
The light-weight bridging of DNCP described here (or some other scheme) is
something else. And for the record, I do not recommend it even if I _think_ I
made it possible when thinking of the current DNCP design originally.
> I had hoped for DNCP to be merely AHCP on a steroid, not the explosion
> of complexity that resulted.
>
> I have kind of been evolving something rather different.
>
> What I do right now leverages the source specific information in the
> routing protocol to assume that whatever is exporting a source
> specific default /60 or /56 route has a whatever::1 address in the
> first prefix of that, then self assigns itself a SLAAC/128 address
> out of the topmost /64, then uses curl over https to contact each for
> a potential prefix and other configuration information.
>
> Tis nothin but a bunch of itty bitty shell scripts like:
>
> getdefgws() {
> ip -6 route | grep '^default from' | grep / | while read d f addr via splat
> do
> mask=`echo $addr | cut -f2 -d/`
> a=`echo $addr | cut -f1 -d/`
> echo $a/$mask
> done
> }
>
> with stuff to measure the shortest and fastest paths (traceroute or ping)...
>
> and a bit of lua. distinct advantages are not having to upgrade any
> routers in the path with a new daemon,
> implicit security of the https, the state primarily lives on the
> source specific gw.
>
> disadvatages are tis hard to write it all in a shell script, and I
> imagine someone will object to someone treating somewhere::1 as a
> "special" indicator of an IP being available for configuration
> purposes, and no doubt more…
Well, sounds like you’re inventing god server for a subset of what HNCP does :)
I find it amusing that you consider https in and of itself a source of security
though. Do you actually validate your certs etc? Sounds relatively far from
zeroconf.
(And I wonder how one does e.g. OCSP without actually having network
configuration up.)
Couldn’t you just run DHCPv6 PD to the prefix::1 too? No need for magic, ready
encoding for lots of things, and support for PSK if you want it ’secure’
(arguably less painful to set up than your own cert hierarchy).
Cheers,
-Markus
_______________________________________________
homenet mailing list
[email protected]
https://www.ietf.org/mailman/listinfo/homenet