Internet DRAFT - draft-ietf-ion-ipv6-nmba
draft-ietf-ion-ipv6-nmba
HTTP/1.1 200 OK
Date: Tue, 09 Apr 2002 03:24:27 GMT
Server: Apache/1.3.20 (Unix)
Last-Modified: Sat, 16 Nov 1996 00:16:00 GMT
ETag: "32405b-87c7-328d07c0"
Accept-Ranges: bytes
Content-Length: 34759
Connection: close
Content-Type: text/plain
Network Working Group Randall Atkinson
Internet Draft cisco Systems
draft-ietf-ion-ipv6-nbma-01.txt Dimitry Haskin
James Luciani
Bay Networks
14 November 1996
IPv6 over NBMA Networks
STATUS OF THIS MEMO
This document is an Internet Draft. Internet Drafts are working
documents of the Internet Engineering Task Force (IETF), its areas, and its
working groups. Note that other groups may also distribute working
documents as Internet Drafts.
Internet Drafts are draft documents valid for a maximum of 6 months.
Internet Drafts may be updated, replaced, or obsoleted by other documents
at any time. It is not appropriate to use Internet Drafts as reference
material or to cite them other than as "work in progress".
To learn the current status of any Internet Draft, please check the
"1id-abstracts.txt" listing contained in the Internet Drafts Shadow
Directories on ftp.is.co.za (Africa), nic.nordu.net (Europe), munnari.oz.au
(Pacific Rim), ds.internic.net (US East Coast), or ftp.isi.edu (US West
Coast).
This draft is being proposed to the IETF Internetworking over NBMA (ION)
working group for consideration as a standards-track document. Editorial
corrections should be sent to the author. Because of the cross-technology
aspect of this draft, comments on this draft should be sent cross-posted to
both the IPng mailing list <ipng@sunroof.eng.sun.com> and also the
Internetworking over NBMA (ION) mailing list <ion@nexen.com>.
ABSTRACT
This draft proposes an comprehensive approach to IPv6 over Non-Broadcast
Multiple Access (NBMA) technologies that maximises reuse of existing
technology and should work equally well over Frame Relay, ATM, and other
NBMA technologies.
Atkinson, Haskin, & Luciani [Page 1]
Internet Draft IPv6 over NBMA 14 November 1996
1. INTRODUCTION
Traditional IPv6 Neighbor Discovery [NN95] and Address
Autoconfiguration [TN95] were designed for use over subnetworks where
the underlying media has a native broadcast capability. By
definition, NBMA subnetworks lack a native broadcast capability, but
are capable of concurrent connections to different nodes on a single
NBMA logical link.
The NBMA Next Hop Resolution Protocol (NHRP) has been developed
within the IETF to provide link-layer address resolution capability
over NBMA logical links in a network-layer independent manner. In
addition, NHRP may provide an important function of dynamically
discovering and resolving the address of the closest egress router to
the node associated with a target address outside the NBMA portion of
the network.
This document proposes an approach to handling IPv6 over NBMA
media that relies on use of NHRP to provide IPv6 Neighbor Discovery
and IPv6 Address Autoconfiguration support. While some ICMPv6
messages originally defined for traditional IPv6 Neighbor Discovery
[NN95] are reused for NBMA logical links, the general IPv6 Neighbor
Discovery process of that specification is not reused because NBMA
environments were outside the intended design scope of that protocol.
In addition, this document proposed the use of 6 octet interface
tokens [TN95], which are used in conjunction with IPv6 address
prefixes to autoconfigure IPv6 addresses. Longer interface tokens
are avoided to reduce the amount of IPv6 address space wasted by the
interface token.
1.1. TERMINOLOGY
The acronym "NBMA" expands to "Non-Broadcast, Multiple Access" and
refers to networking technologies that lack a native broadcast
facility. Examples of NBMA technologies include ATM, SMDS, Frame
Relay, and ISDN.
NBMA interfaces are considered to be attached to the same NBMA
logical link if these interfaces are administratively configured to
receive Router Advertisements from the same set of routers and
therefore share the same set of routing prefixes.
The terms "subnet" and "subnetwork" in this document refer to the
set of nodes connected to the same NBMA logical link (as defined just
above).
The term "MARS" refers to the proposal for "Multicast Address
Resolution Servers" for use with IP multicasting over ATM.
Atkinson, Haskin, & Luciani [Page 2]
Internet Draft IPv6 over NBMA 14 November 1996
The term "interface token" refers to an interface-specific token,
usually 6 octets long, that can be used in conjunction with an IPv6
address prefix to autoconfigure an IPv6 address as part of IPv6
stateless autoconfiguration.
In this document, the words that are used to define the
significance of each particular requirement are usually capitalised.
These words are:
- MUST
This word or the adjective "REQUIRED" means that the item is an
absolute requirement of the specification.
- SHOULD
This word or the adjective "RECOMMENDED" means that there might
exist valid reasons in particular circumstances to ignore this item,
but the full implications should be understood and the case carefully
weighed before taking a different course.
- MAY
This word or the adjective "OPTIONAL" means that this item is truly
optional. One vendor might choose to include the item because a
particular marketplace requires it or because it enhances the
product, for example; another vendor may omit the same item.
2. FORMING AN IPV6 INTERFACE TOKEN
The IPv6 interface token is used when auto-configuring an IPv6
address on a network interface. IPv6 addresses are bound to logical
network interfaces rather than being bound to nodes. [DH96] There are
three cases to consider. The first case is when an IEEE 802 MAC
address is on an interface. The second case is when an IEEE 802 MAC
address is not available but an E.164, X.121, or ATM Forum NSAP-like
address is available to an interface. The last case handles
situations where none of those three address types is available or
when duplicate addresses have been detected. This specification
handles all three cases.
2.1 Interface Tokens based on IEEE 802 MAC Addresses
Interfaces having an IEEE 802 MAC address embedded into them MUST
use that IEEE 802 MAC address as the interface token for their auto-
configured IPv6 addresses on the first logical interface of that
physical interface.
Atkinson, Haskin, & Luciani [Page 3]
Internet Draft IPv6 over NBMA 14 November 1996
When multiple logical interfaces exist on a single physical
interface and those logical interfaces share a common NBMA logical
link, then the 2nd and later logical interface's interface tokens MAY
be formed by the method described below in "Interface Tokens for
other cases".
Should Duplicate Address Detection (see below) or other information
indicate that the autoconfigured address is duplicate with another
node on the same NBMA logical link, then the node MUST NOT use that
address. In this case, the node SHOULD generate an address using the
method described below for "Address Tokens for Other Cases" available
to them.
In any event, the interface token for the IPv6 address SHOULD NOT
exceed 6 bytes in length. This restriction is placed to ensure that
sufficient IPv6 address space will remain available to facilitate
hierarchical routing.
2.2 Interface Tokens based on E.164, X.121, or NSAP-like addresses
If no IEEE 802 MAC address is available but an E.164 address is
available, then the IPv6 interface token SHOULD be formed from the
E.164 address as follows. The 12 right-most digits of the E.164
address are encoded in Binary Coded Decimal (BCD) syntax to form a 6
octet IPv6 address token. If the E.164 number has less than 12
digits, then the BCD encoded value is padded with leading semi-octet
0000 to obtain the 6-octet IPv6 interface token.
If no IEEE 802 MAC address is available, but an X.121 address is
available, then the IPv6 interface token SHOULD be formed from the
X.121 address as follows. The 12 right-most decimal digits of the
X.121 number are encoded in Binary Coded Decimal (BCD) syntax to form
a 6 octet IPv6 address token. If the X.121 number has less than 12
digits, then the BCD encoded value is padded with leading semi-octet
0000 to obtain the 6-octet IPv6 interface token.
If no IEEE 802 MAC address is available, but an ATM Forum NSAP-
like address is available, then the IPv6 interface token SHOULD be
the 6 octet ESI field of the ATM Forum address.
2.3 Address Tokens for Other Cases
Many believe that manual configuration of interface tokens is
the only reasonable choice for interfaces lacking an on-board MAC
address. One argument for this is the desire to retain the same
interface token across cold reboots of nodes.
If neither an IEEE 802 MAC address, nor an E.164 address, nor an
X.121 address, nor an ATM Forum NSAP-like address is available to use
in forming an IPv6 interface token, then manual configuration MAY be
Atkinson, Haskin, & Luciani [Page 4]
Internet Draft IPv6 over NBMA 14 November 1996
used to form the IPv6 interface token for autoconfiguration. Users
are encouraged to use stateful configuration (e.g. DHCP for IPv6)
instead of stateless autoconfiguration to handle such cases.
Implementations MUST permit a system administrator to manually
configure an interface token for each NBMA interface that lacks an
on-board IEEE 802 MAC address. The use of stateful autoconfiguration
or manual configuration will ensure that address token collisions do
not occur.
Alternately, an extension could be added to the NHRP protocol
which would cause an unused address (for example, an IPv6 link-local
address) to be supplied from a range of specified addresses. This
extension would be included in an NHRP Registration Request message
from a client to the NHS. When the extension were included in an
NHRP Registration Request, an unused address would be allocated from
within the range of specified addresses only if the address being
registered has already been registered with the "uniqueness"
qualifier (c.f. the "Duplicate Address Detection" section of this
draft). In this case, the NHRP Registration Reply would still
contain a NAK,but the extension will include an acceptable IPv6
address that would then be registered using a subsequent NHRP
Registration Request. This approach is for further study.
2.4 Duplicate Address Detection
Duplicate Address Detection is performed with a minor
enhancement to the NHRP protocol. The NHRP client indicates whether
the upper-layer destination address in the NHRP request is to be
treated with the "uniqueness" qualifier. To do this, a bit is added
to the Mandatory part of the appropriate NHRP messages. When set,
this bit indicates that a registration of this upper-layer to NBMA
address binding is unique. This "uniqueness" bit MUST be stored in
the NHS/NHC cache for the given entry.
Any attempt to register a binding between the upper-layer
address and an NBMA address when this bit is set MUST be rejected
with a new NAK code of "Internetworking Layer Address Already
Registered" if an existing binding with the "uniqueness" bit set
already exists in the NHS cache. Further, if this bit is set in an
NHRP Resolution Request and multiple entries exist in the NHS cache,
then only the Next Hop Entry with this bit set will be returned.
Note that even if this bit was set at registration time, there can
still be multiple Next Hop Entries that might fulfill the NHRP
Resolution Request because an entire subnet can be registered through
use of the Prefix Length extension and the address of interest might
be within such a subnet. If the "uniqueness" bit is set in a NHRP
Resolution Request and the responding NHS has one or more cache
Atkinson, Haskin, & Luciani [Page 5]
Internet Draft IPv6 over NBMA 14 November 1996
entries which match the request but do not have the "uniqueness" bit
set, then the NHRP Resolution Reply has the "P" bit set to zero and
no Next Hop Entry is included. If a client wishes to receive non-
unique Next Hop Entries, then the client must have the "uniqueness"
bit set to zero in its NHRP Resolution Request. It is suggested that
NHRP adopt a NAK code for NHRP Resolution Replies so that a reason
can be given for a failed NHRP Resolution Reply.
3. NEIGHBOR ADDRESS RESOLUTION
The NBMA Next-Hop Resolution Protocol (NHRP) defined in [KPCL95]
is used to locate the lower-layer address for a given IPv6
destination reached via an NBMA interface. This maximises technology
reuse since NHRP is an existing technology that is designed to
support multiple upper-layer protocols over NBMA networks.
The processes for initial bootstrapping, neighbor discovery, and
redirect handling are outlined below so that the relationship and
sequencing between the IPv6 Discovery messages and the NHRP messages
is clear.
None of the procedures in this section assume or imply that the
NHS is acting as a MARS, though it is permitted and might be common
that the NHS is also acting as a MARS.
3.1 Host Bootstrap Processing
The initial VC to the NHS could be created using information
manually configured into the node or using some kind of media-
specific group address (e.g. as has been proposed for the ATM UNI)
Initially, the host creates link-local IPv6 addresses using the
above procedures to generate the local-identification token of the
link-local address. The host registers this link-local IPv6 address
with its NHS by sending its link-local IPv6 address and its
corresponding lower-layer NBMA address in an NHRP Registration
Request message containing a Responder Address Extension to the NHS.
The NHS then processes this message and sends an appropriate NHRP
Registration Reply and includes its unicast address in the extension.
If the registration is successful, then the NHS reply will have a NAK
code of zero. Otherwise, the NHS reply will indicate why the
registration failed.
The host has now registered its link-local IPv6 address with the
NHS.
The host then sends an NHRP Resolution Request containing the
host's link-local address as the IPv6 Source Address and the link-
local all-routers multicast address as the IPv6 Destination Address
Atkinson, Haskin, & Luciani [Page 6]
Internet Draft IPv6 over NBMA 14 November 1996
to the Next-Hop Server (NHS). The NHS will respond with an NHRP
Resolution Reply containing all of the cached bindings between the
link-local all-routers multicast IPv6 address and corresponding
lower-layer NBMA addresses.
The host now knows the lower-layer NBMA address(es) for the IPv6
router(s) on its NBMA logical link.
If the NHS is also the IPv6 router for the host's NBMA logical
link, then the router SHOULD immediately send a unicast IPv6 Router
Advertisement to the requesting host.
If no IPv6 Router Advertisement is received, the host SHOULD
send an IPv6 Router Solicitation message to each known IPv6 router
for its NBMA logical link. Those routers will in turn send a unicast
IPv6 Router Advertisement back to the requesting host. The IPv6
Router Solicitation message MUST be sent as a unicast lower-layer
message though it MAY contain the link-local scope all-routers
multicast address as the IPv6 Destination Address. Routers SHOULD use
the IP Authentication Header to authenticate IPv6 Router
Advertisement messages whenever the router has an appropriate IP
Security Association with the destination node for the IPv6 Router
Advertisement.
At this point, the host knows the unicast IPv6 address(es) of
its router(s), the lower-layer address of its router(s), its routing
prefix(es), and whether it needs to perform stateful IPv6
configuration.
If stateless IPv6 autoconfiguration was indicated by the
received Router Advertisement(s), the host now configures its global
IPv6 address(es) as described in [TN95] and uses the NHRP
Registration Request to register its global IPv6 address(es) with the
NHS.
If stateful autoconfiguration was indicated in the IPv6 Router
Advertisement, then the host MUST follow the stateful configuration
procedure described in [DHCPv6], using NHRP as necessary to obtain
lower- layer addresses for IPv6 addresses. Once its global IPv6
address(es) is (are) configured, the node uses the NHRP Registration
Request message to register those addresses with the NHS.
3.2 Ongoing Host Processing
The NHRP client resolves anycast addresses using the NHRP
Resolution Request message to the NHS, taking care to indicate that
the target IPv6 address is an anycast address. When NHRP is used to
resolve an IPv6 Anycast address, the NHRP "Additional Next Hop
Atkinson, Haskin, & Luciani [Page 7]
Internet Draft IPv6 over NBMA 14 November 1996
Entries Extension" will be included with the NHRP Resolution Reply if
more than one IPv6 node has registered that IPv6 Anycast address with
the NHS.
The host MAY establish and maintain connections with all routers
for the purpose of sending Router Solicits and receiving Router
Advertisements if it wishes to. If it does not do this, then the
host SHOULD periodically establish/remove connections to handle
periodic transmission of IPv6 Router Solicit messages and reception
of corresponding IPv6 Router Advertisement messages.
The interval between IPv6 Router Solicit messages determines how
quickly a host can react to changes in the IPv6 routing prefix. It
is recommended that the default interval between IPv6 Router Solicit
messages be no smaller than the minimum time between unsolicited IPv6
Router Advertisements (i.e. 3 seconds).
[NOTE: The authors are interested in finding out from the WG what the WG
believes the default interval between RS messages should be. One
alternative value might be 10 minutes. Perhaps this value should be
derived in part from one of the advertisement lifetimes carried in IPv6
Router Advertisement messages.]
3.3 Router Bootstrap Processing
Initially, the router creates link-local IPv6 addresses using
the above procedures to generate the local-identification token of
the link-local address. Then the router configures the globally
routable IPv6 addresses on those interfaces supporting IPv6 routing.
Because it is a router, it already knows its global routing prefixes.
The router then uses the NHRP Registration Request message(s) to
register each of its globally routable addresses with the NHS. In
the absence of a standards-track NHS synchronisation method, the
router SHOULD register its IPv6 addresses for a given NBMA logical
link with each known NHS for that NBMA logical link. The router MUST
NOT register an IPv6 address belonging to one NBMA logical link with
the NHS for a different NBMA logical link.
Then, the router registers each IPv6 interface's lower-layer
NBMA address and the IPv6 link-local all-routers multicast address
with each appropriate NHS, taking care that the "uniqueness" bit is
NOT set in in the NHRP Registration Request message. As above, the
router MUST NOT register an interface's (lower-layer address, IPv6
link-local all-routers multicast address) pair with an NHS that does
not serve that interface's NBMA logical link.
If the IPv6 router is its own NHS and there is no other NHS for
Atkinson, Haskin, & Luciani [Page 8]
Internet Draft IPv6 over NBMA 14 November 1996
any of the attached NBMA logical links, then the above procedure can
be internalised. If the IPv6 router is its own NHS and other NHSs
exist for one or more of the attached NBMA logical links, then the
above procedure needs to be followed only for the non-internal NHSs.
3.4 Neighbor Address Discovery
Once bootstrapped using the above procedure, the host MUST use
the NHRP Resolution Request and NHRP Resolution Response messages to
obtain the lower layer address corresponding to any IPv6 unicast
address not already having a lower-layer address known to the host.
In the case where the target IPv6 address is associated with a node
not on the attached NBMA network, NHRP will respond with the lower-
layer NBMA address of the closest egress router to the node
associated with the target IPv6 address. Thus, short-cut routing is
automatically provided to IPv6 nodes connected via NBMA.
3.5 Redirects
The ICMP Redirect messages defined for traditional IPv6 Neighbor
Discovery are also used over NBMA networks.[NN95]
Routers on NBMA networks MAY include the Target Link-Layer
Address option in the ICMPv6 Redirect message if that target link-
layer address is known. Routers MUST limit the rate at which ICMPv6
Redirect messages are sent, as is detailed in [CD96]. Routers SHOULD
use the IPv6 Authentication Header or IPv6 Encapsulating Security
Payload to authenticate ICMPv6 Redirect messages whenever an
appropriate IP Security Association exists for the destination of
such a message.
Hosts on NBMA networks that receive a ICMPv6 Redirect message
not containing a Target Link-Layer Address option via an NBMA
interface MUST then use the NHRP Resolution Request procedure to
determine the appropriate lower-layer address to use for the
redirected IPv6 address. Nodes MAY ignore unauthenticated ICMPv6
Redirect messages.
3.6 Neighbor Unreachability Detection (NUD)
Although the IPv6 Neighbor Solicit and Neighbor Advertisement
messages are replaced by NHRP messages for the purpose of determining
the lower-layer address of neighbors, the Neighbor Solicit and
Neighbor Advertisement messages are retained for use in Neighbor
Unreachability Detection.
If the IPv6 Neighbor Solicit and Neighbor Advertisement
exchanges indicate that a remote node has become unreachable, then
the other node SHOULD send a NHRP Resolution Request message to
Atkinson, Haskin, & Luciani [Page 9]
Internet Draft IPv6 over NBMA 14 November 1996
attempt to determine the current reachability of the remote node.
Over NBMA networks, the Neighbor Solicit and Neighbor
Advertisement messages are always unicast and they are only used for
the purpose of Neighbor Unreachability Detection after the existence
of the neighbor was established via NHRP. The Source Link-layer
Address Option MAY be used with Neighbor Solicit or Neighbor
Advertisement messages over NBMA networks, however NHRP MUST be used
for initial determination of lower-layer addresses except for the
case of a received ICMPv6 Redirect containing a Target Link-Layer
Address Option or for the case where manual configuration is supplied
(e.g. an administratively configured host route). Neighbor Solicit
and Neighbor Advertisement messages sent over NBMA networks MUST NOT
contain either the unspecified address or a multicast address.
Receipt of NHRP messages is considered reachability confirmation
for the node whose IP address is associated with that lower-layer
address. Otherwise, the process described in Sections 7.2.3, 7.2.4,
7.2.5, and 7.3 of [NN95] is followed.
The NHRP Purge Request message is used to invalidate cached IPv6
to lower-layer NBMA address bindings in IPv6 nodes connected to the
NBMA network.[KPCL95] Hence, the conceptual IPv6 "Neighbor Cache"
entry corresponding to the address in the NHRP Purge Request message
MUST be deleted (in an implementation-dependent way) by an IPv6 node
that receives a valid NHRP Purge Request message for an IPv6 address.
The conceptual IPv6 "Default Router List" entry corresponding to the
address in the NHRP Purge Request message MUST be deleted (in an
implementation-dependent way) by an IPv6 node that receives a valid
NHRP Purge Request message for an IPv6 address that is known to be a
router. Unsolicited Neighbor Advertisements are NOT sent over NBMA
networks and section 7.2.6 of [NN95] does not apply to NBMA networks.
Upon receipt of a valid NHRP Purge Request, a NHRP Purge Reply
message MUST be sent unless the NHRP Purge Request explicitly
indicates that it does not require a reply. [KPCL95]
4. LOWER-LAYER ENCAPSULATIONS
The encapsulation method standardised in RFC-1483 shall be used
for IPv6 traffic carried over ATM Adaptation Layer 5 (AAL 5).[Hei93]
The encapsulation method standardised in RFC-1490 shall be used for
IPv6 traffic carried over Frame Relay. [BBM93] The encapsulation
method standardised in RFC-1356 shall be used for IPv6 traffic
carried over X.25 and ISDN in the Packet Mode. [MRU92] The
encapsulation method standardised in RFC-1209 shall be used for IPv6
traffic carried over SMDS.[PL91] NHRP traffic will always be
encapsulated as described in [KPLC95].
Atkinson, Haskin, & Luciani [Page 10]
Internet Draft IPv6 over NBMA 14 November 1996
In all of these cases, the SNAP NLPID encapsulation with the
IPv6 EtherType (namely, 86DD hexadecimal) is used instead of using
the IPv4 NLPID or SNAP NLPID with the IPv4 EtherType. This reduces
the dependence on the IP version numbers, which is important because
some historical IPv4 implementations have not dependably checked the
version numbers of the packets. This will also add consistency to
the IPv6 encapsulation methods used on the various NBMA media.
On a virtual circuit carrying only IPv6, the IPv6 packets MAY be
sent without a lower layer encapsulation (e.g. RFC-1483 VC-based
multiplexing) provided that all nodes on that virtual circuit are
configured to only send IPv6 over that virtual circuit.[Hei93]
5. CONFORMANCE REQUIREMENTS
The term "conforming implementation" is defined to have the same
meaning as "compliant implementation" for this specification.
A conforming implementation of this specification MUST implement
and comply with the Next-Hop Resolution Protocol (NHRP) as specified
in [KPCL95], the Neighbor Discovery for IPv6 as specified in [NN95]
except for the Neighbor Solicit and Neighbor Advertisement messages,
the IPv6 Address Configuration as specified in [TN95] except as noted
in this specification, and MUST follow the procedures and processes
outlined in this document. In cases where one process is outlined in
this document and a different conflicting process is outlined in
[NN95] and/or [TN95], then the process described here is used over
NBMA networks instead of the process described in those other
documents.
All conforming implementations of this specification MUST also
implement the IP Security Architecture [Atk95a] and the IP
Authentication Header [Atk95b] so that users are able to use
cryptographic authentication. All conforming implementations SHOULD
also implement the Internet Key Management Protocol (IKMP) once that
has been published as a standards-track RFC.
All conforming implementations of this specification MUST use
the IP Authentication Header [Atk95b] to authenticate IPv6 Neighbor
Discovery messages when an appropriate IPsec Security Association
[Atk95a] exists.
All conforming implementations of this specification MUST use
the NHRP Authentication Extension to authenticate NHRP messages when
an appropriate NHRP Security Association exists.[KPCL95] NHRP
Security Associations based on MD5 MUST be preferred to NHRP Security
Associations based on Cleartext Passwords in all conforming
implementations.
Atkinson, Haskin, & Luciani [Page 11]
Internet Draft IPv6 over NBMA 14 November 1996
SECURITY CONSIDERATIONS
Unlike traditional IPv6 Neighbor Discovery, NHRP is not built
upon IP. This design decision was made so that NHRP can be used for
multi-protocol networks and is not limited to IPv4 or IPv6 networks.
Although this precludes the use of IP security mechanisms [Atk95a]
[Atk95b] to authenticate NHRP, this is not a decrease in security
relative to traditional IPv6 Neighbor Discovery because NHRP includes
its own cryptographic authentication mechanism (NHRP's Authentication
Type = 2) having similar security properties.
Acceptance of unauthenticated NHRP response messages can lead to
denial of service attacks. Use of the IP Authentication Header for
IPv6 traffic can preclude IP-layer host masquerading attacks that
would otherwise be possible if a node accepted unauthenticated NHRP
response messages.
Acceptance of unauthenticated ICMPv6 Neighbor Discovery messages
can lead to various attacks. Use of the IP Authentication Header can
preclude or significantly mitigate many of these attacks.
Security issues specific to IP Security are discussed in
[Atk95a] and [Atk95b]. Security issues specific to NHRP are discussed
in [KPCL95]. Security issues specific to traditional IPv6 Neighbor
Discovery are discussed in [NN95]. The reader is encouraged to read
all of these for more information on security issues relating to this
specification.
ACKNOWLEDGEMENTS
This document is largely based on the existing technology cited in
the references. The author is obliged to the contributers to those
drafts for helping to create that technology.
The author wishes to thank (in alphabetical order) Bruce Cole,
Francis Dupont, Bob Gilligan, Joel Halpern, Andy Malis, and Erik
Nordmark for their review and critique of an earlier version of this
draft.
REFERENCES
[Atk95a] Randall J. Atkinson, IP Security Architecture, RFC-1825,
August 1995.
[Atk95b] Randall J. Atkinson, IP Authentication Header, RFC-1826,
August 1995.
[BBM93] Terry Bradley, Caralyn Brown, & Andy Malis, "Multiprotocol
Interconnect over Frame Relay", RFC-1490, July 1993.
Atkinson, Haskin, & Luciani [Page 12]
Internet Draft IPv6 over NBMA 14 November 1996
[CD96] Alex Conta & Steve Deering, "Internet Control Message Protocol
for IPv6 (ICMPv6)", RFC-1885, January 1996.
[DH96] Steve Deering & Robert Hinden, "Internet Protocol, version 6
Specification", RFC-1883, January 1996.
[Hei93] Juha Heinanen, "Multiprotocol Encapsulation over ATM AAL 5",
RFC-1483, July 1993.
[KPCL95] Dave Katz, David Piscitello, Bruce Cole, & James V. Luciani,
"NBMA Next Hop Resolution Protocol (NHRP)", Work in Progress,
draft-ietf-rolc-nhrp-*.txt, December 1995.
[MRU92] Andy Malis, David Robinson, & Robert Ullman, "Multiprotocol
Interconnect on X.25 and ISDN in the Packet Mode", RFC-1356,
August 1992.
[NN95] Thomas Narten & Erik Nordmark, "Neighbor Discovery for IPv6",
work in progress, draft-ietf-ipngwg-discovery-*.txt, November 1995.
[PL91] Dave Piscitello & Joseph Lawrence, "The Transmission of IP
Datagrams over the SMDS Service.", RFC-1209, March 1991.
[TN95] Susan Thomson & Thomas Narten, "IPv6 Stateless Address
Autoconfiguration", draft-ietf-addrconf-ipv6-auto-*.txt,
December 1995.
Atkinson, Haskin, & Luciani [Page 13]
Internet Draft IPv6 over NBMA 14 November 1996
DISCLAIMER
The views and specifications here are those of the authors and are not
necessarily those of their employers.
AUTHOR INFORMATION
Randall Atkinson <rja@cisco.com>
cisco Systems
170 West Tasman Drive
San Jose, CA 95134-1706
USA
Telephone: +1 (408) 526-6566
Dimitry Haskin <dhaskin@BayNetworks.com>
Bay Networks
2 Federal Street
Billerica, MA 01821
USA
Telephone: +1 (508) 436-8124
James V. Luciani <luciani@baynetworks.com>
Bay Networks
3 Federal Street
Billerica, MA 01821
USA
Telephone: +1 (508) 439-4734
Atkinson, Haskin, & Luciani [Page 14]
--