v6ops | J. Linkova |
Internet-Draft | |
Intended status: Informational | July 13, 2020 |
Expires: January 14, 2021 |
Neighbor Cache Entries on First-Hop Routers: Operational Considerations
draft-ietf-v6ops-nd-cache-init-03
Neighbor Discovery (RFC4861) is used by IPv6 nodes to determine the link-layer addresses of neighboring nodes as well as to discover and maintain reachability information. This document discusses how the neighbor discovery state machine on a first-hop router is causing user-visible connectivity issues when a new (not being seen on the network before) IPv6 address is being used.
This Internet-Draft is submitted in full conformance with the provisions of BCP 78 and BCP 79.
Internet-Drafts are working documents of the Internet Engineering Task Force (IETF). Note that other groups may also distribute working documents as Internet-Drafts. The list of current Internet-Drafts is at https://datatracker.ietf.org/drafts/current/.
Internet-Drafts are draft documents valid for a maximum of six months and may be updated, replaced, or obsoleted by other documents at any time. It is inappropriate to use Internet-Drafts as reference material or to cite them other than as "work in progress."
This Internet-Draft will expire on January 14, 2021.
Copyright (c) 2020 IETF Trust and the persons identified as the document authors. All rights reserved.
This document is subject to BCP 78 and the IETF Trust's Legal Provisions Relating to IETF Documents (https://trustee.ietf.org/license-info) in effect on the date of publication of this document. Please review these documents carefully, as they describe your rights and restrictions with respect to this document. Code Components extracted from this document must include Simplified BSD License text as described in Section 4.e of the Trust Legal Provisions and are provided without warranty as described in the Simplified BSD License.
The section 7.2.5 of [RFC4861] states: "When a valid Neighbor Advertisement is received (either solicited or unsolicited), the Neighbor Cache is searched for the target's entry. If no entry exists, the advertisement SHOULD be silently discarded. There is no need to create an entry if none exists, since the recipient has apparently not initiated any communication with the target."
This approach is perfectly suitable for host-to-host communications, which are in most cases bi-directional, and it could be expected that if a host A has an ND cache entry for the host B IPv6 address, host B also has the corresponding ND entry for the host A address in its cache. However when a host communicates to off-link destinations via its first-hop router, that logic does not apply. The most typical scenario when the problem may arise is a host joining the network, forming a new address and using that address for accessing the Internet:
This scenario illustrates the problem happening when the device connects to the network for the first time or after a timeout long enough for the device address to be removed from the router's neighbor cache. However the same sequence of events happen when the host starts using a new GUA previously unseen by the router, such as a new privacy address [RFC4941] or if the router's Neighbor Cache has been flushed.
While in dual-stack networks this problem might be hidden by Happy Eyeballs [RFC8305] it manifests quite clearly in IPv6-only environments, especially wireless ones, leading to poor user experience and contributing to negative perception of IPv6-only solutions as unstable and non-deployable.
This document discusses operational implications of not proactively creating Neighbor Cache entries on first-hop routers and summarizes various approaches to mitigate the problem.
The key words "MUST", "MUST NOT", "REQUIRED", "SHALL", "SHALL NOT", "SHOULD", "SHOULD NOT", "RECOMMENDED", "NOT RECOMMENDED", "MAY", and "OPTIONAL" in this document are to be interpreted as described in BCP 14 [RFC2119] [RFC8174] when, and only when, they appear in all capitals, as shown here.
ND: Neighbor Discovery, [RFC4861].
SLAAC: IPv6 Stateless Address Autoconfiguration, [RFC4862].
NS: Neighbor Solicitation, [RFC4861].
NA: Neighbor Advertisement, [RFC4861].
RS: Router Solicitation, [RFC4861].
RA: outer Advertisement, [RFC4861].
SLLA: Source link-layer Address, an option in the ND packets containing the link-layer address of the sender of the packet, [RFC4861].
TLLA: Target link-layer Address, an option in the ND packets containing the link-layer address of the target, [RFC4861].
GUA: Global Unicast Address, [RFC4291].
DAD: Duplicate Address Detection, [RFC4862].
Optimistic DAD: a modification of DAD, [RFC4429].
FCFS SAVI: First-Come, First-Served Source Address Validation, [RFC6620].
It would be highly desirable to improve the Neighbor Discovery mechanics so routers have a usable cache entry for a host address by the time the first packet for that address is received by the router. In particular:
In addition the solution MUST NOT exacerbate issues described in [RFC6583] and MUST be compatible with the recomendations provided in [RFC6583].
The Neighbor Discovery is designed to allow IPv6 nodes to discover neighboring nodes reachability and learn IPv6 to link-layer addresses mapping. Therefore ND seems to be the most appropriate tool to inform the first-hop routers about addresses the host is going to use.
Section 4.4 of [RFC4861] says:
"A node sends Neighbor Advertisements in response to Neighbor Solicitations and sends unsolicited Neighbor Advertisements in order to (unreliably) propagate new information quickly."
Propagating information about new GUA as quickly as possible is exactly what is required to solve the problem outlined in this document. Therefore the host might send an unsolicited NA with the target link-layer address option to advertise its GUA as soon as the said address enters Optimistic or Preferred state.
The proposed solution is discussed in [I-D.ietf-6man-grand]. In summary the following changes to [RFC4861] are suggested:
It should be noted that some routing and switching platforms have implemented such behaviour already. Administrators could enable creating neighbor discovery cache entries based on unsolicited NA packets sent from the previously unknown neighbors on that interface.
Network devices implementing FCFS SAVI might drop Neighbor Advertisements received through a Validating Port which is in the TENTATIVE state (see Section 2.3.2 of[RFC6620]). Therefore hosts using Optimistic DAD might not benefit from the proposed solution if FCFS SAVI is implemeneted on the network infrastructure. [I-D.ietf-6man-grand] discusses in more details how the proposed solution interacts with SAVI.
The problem could be addressed from different angles. Possible approaches are:
It should be noted that some of those options are already implemented by some vendors. The following sections discuss those approaches and the reasons they were discarded.
One of the possible approaches might be to declare that everything is working as intended and let the upper-layer protocols to deal with packet loss. The obvious drawbacks include:
The most radical approach would be to move away from the reactive ND as defined in [RFC4861] and expand the registration-based ND ([RFC6775], [RFC8505]) used in Low-Power Wireless Personal Area Networks (6LoWPANs) to the rest of IPv6 deployments. This option requires some investigation and discussions and seems to be an overkill for the problem described in this document.
The host could force creating a STALE entry for its GUA in the router ND cache by sending the following Neighbor Solicitation message:
The main disadvantages of this approach are:
The host could send a router solicitation message to 'all routers' multicast address, using its GUA as a source. If the host link-layer address is included in the Source Link-Layer Address option, the router would create a STALE entry for the host GUA as per the section 6.2.6 of [RFC4861]. However this approach can not be used if the GUA is in optimistic state: the section 2.2 of [RFC4429] explicitly prohibits using an Optimistic Address as the source address of a Router Solicitation with a SLLAO as it might disrupt the rightful owner of the address in the case of a collision. So for the optimistic addresses the host can send an RS without SLLAO included. In that case the router may respond with either a multicast or a unicast RA (only the latter would create a cache entry).
This approach has the following drawbacks:
Routers may be able to learn about new addresses by gleaning from the DAD Neighbor Solicitation messages. The router could listen to all solicited node multicast address groups and upon receiving a Neighbor Solicitation from the unspecified address search its Neighbor Cache for the solicitation's Target Address. If no entry exists the router may create an entry, set its reachability state to 'INCOMPLETE' and start the address resolution for that entry.
The same solution was proposed in [I-D.halpern-6man-nd-pre-resolve-addr]. Some routing vendors support such optimization already. However this approach has a number of drawbacks and therefore should not be used as the only solution:
The host may force the router to start address resolution by sending a data packet such as ping or traceroute to its default router link-local address, using the GUA as a source address. As the RTT to the default router is lower than RTT to any off-link destinations it's quite likely that the router would start the neighbor discovery process for the host GUA before the first packet of the returning traffic arrives.
The downside of this approach includes:
When a router receives a transit packet it might check the presence of the neighbor cache entry for the packet source address and if the entry does not exist start address resolution process. This approach does ensure that a Neighbor Cache entry is proactively created every time a new, previously unseen GUA is used for sending offlink traffic. However this approach has a number of limitations, in particular:
This memo asks the IANA for no new parameters.
This memo documents the operational issue and does not introduce any new security considerations. Security considerations of the proposed solution are discussed in the corresponding section of [I-D.ietf-6man-grand].
Thanks to the following people (in alphabetical order) for their review and feedback: Mikael Abrahamsson, Lorenzo Colitti, Owen DeLong, Igor Gashinsky, Fernando Gont, Tatuya Jinmei, Erik Kline, Warren Kumari, Jordi Palet Martinez, Michael Richardson, Dave Thaler, Pascal Thubert, Loganaden Velvindron, Eric Vyncke.
[I-D.halpern-6man-nd-pre-resolve-addr] | Chen, I. and J. Halpern, "Triggering ND Address Resolution on Receiving DAD-NS", Internet-Draft draft-halpern-6man-nd-pre-resolve-addr-00, January 2014. |
[RFC4941] | Narten, T., Draves, R. and S. Krishnan, "Privacy Extensions for Stateless Address Autoconfiguration in IPv6", RFC 4941, DOI 10.17487/RFC4941, September 2007. |