Internet DRAFT - draft-nordmark-6man-dad-approaches
draft-nordmark-6man-dad-approaches
6MAN E. Nordmark
Internet-Draft Arista Networks
Intended status: Informational Oct 2015
Expires: April 3, 2016
Possible approaches to make DAD more robust and/or efficient
draft-nordmark-6man-dad-approaches-02
Abstract
This outlines possible approaches to solve the issues around IPv6
Duplicate Address Detection robustness and/or efficiency which are
specified in the "DAD issues" dradft.
Status of this Memo
This Internet-Draft is submitted in full conformance with the
provisions of BCP 78 and BCP 79.
Internet-Drafts are working documents of the Internet Engineering
Task Force (IETF). Note that other groups may also distribute
working documents as Internet-Drafts. The list of current Internet-
Drafts is at http://datatracker.ietf.org/drafts/current/.
Internet-Drafts are draft documents valid for a maximum of six months
and may be updated, replaced, or obsoleted by other documents at any
time. It is inappropriate to use Internet-Drafts as reference
material or to cite them other than as "work in progress."
This Internet-Draft will expire on April 3, 2016.
Copyright Notice
Copyright (c) 2015 IETF Trust and the persons identified as the
document authors. All rights reserved.
This document is subject to BCP 78 and the IETF Trust's Legal
Provisions Relating to IETF Documents
(http://trustee.ietf.org/license-info) in effect on the date of
publication of this document. Please review these documents
carefully, as they describe your rights and restrictions with respect
to this document. Code Components extracted from this document must
include Simplified BSD License text as described in Section 4.e of
the Trust Legal Provisions and are provided without warranty as
described in the Simplified BSD License.
Nordmark Expires April 3, 2016 [Page 1]
Internet-Draft DAD approaches Oct 2015
Table of Contents
1. Introduction . . . . . . . . . . . . . . . . . . . . . . . . . 3
2. Robustness Solution Approaches . . . . . . . . . . . . . . . . 3
3. Approaches to efficiency . . . . . . . . . . . . . . . . . . . 5
4. Security Considerations . . . . . . . . . . . . . . . . . . . . 6
5. Acknowledgements . . . . . . . . . . . . . . . . . . . . . . . 6
6. References . . . . . . . . . . . . . . . . . . . . . . . . . . 7
6.1. Normative References . . . . . . . . . . . . . . . . . . . 7
6.2. Informative References . . . . . . . . . . . . . . . . . . 8
Author's Address . . . . . . . . . . . . . . . . . . . . . . . . . 8
Nordmark Expires April 3, 2016 [Page 2]
Internet-Draft DAD approaches Oct 2015
1. Introduction
Duplicate Address Detection (DAD) is a procedure in IPv6 performed on
an address before it can be assigned to an interface [RFC4862]. By
default it consists of sending a single multicast Neighbor
Soliciation message and waiting for a response for one second. If no
response is received, the address is declared to not be a duplicate.
Once the address has been tested once, there is no further attempts
to check for duplicates (unless the interface is re-initialized).
The companion document [I-D.yourtchenko-6man-dad-issues] outlines a
set of issues around Duplicate Address Detection (DAD) which either
result in reduced robustness, or result in lower efficiency for
either the hosts wanting to sleep or the network handling more
multicast packets.
The reader is encourage to review the issues in that document. In
summary, the lack of robustness is due to only sending one or a few
DAD probe initially, and not having any positive acknowledgement that
"there are no duplicates". This implies that partioned links that
later heal can result in persistent undetected duplicate IPv6
addresses, including cases of "local partitions" such as the case of
a modem not having connected when the DAD probes are sent. The
inefficiences appears when there are low-powered devices on the link
that wish to sleep a significant amount of time. Such devices must
either be woken up by multicast Neighbor Soliciations sent to one of
their solicited-node multicast addresses, or they need to redo DAD
each time they wake up from sleep. Both drain the battery; the
second one results in sending a DAD probe and then waiting for a
second with the radion receiver enabled to see if a DAD message
indicates a duplicate.
2. Robustness Solution Approaches
IPv4 ARP robustness against partitions and joins is greately improved
by Address Conflict Detection (ACD) [RFC5227]. That approach is
leverages the fact that ARP requests are broadcast on the link and
also makes the ARP replies be broadcast on the link. That
combination means that a host can immediately detect when some other
host provides a different MAC address for what the host thinks is its
own IPv4 address. That is coupled with state machines and logic for
determining whether to try to reclaim the address or give up and let
the other host have it. When giving up the host will form a new IPv4
address. The ACD approach results in more broadcast traffic than
normal ARP [RFC0826] since the ARP replies are broadcast.
Applying the same approach to IPv6 would require sending the Neighbor
Nordmark Expires April 3, 2016 [Page 3]
Internet-Draft DAD approaches Oct 2015
Solicitations and Neighbor Advertisements to the all-nodes multicast
address so that a host can see when a different host is claiming/
using the same source IPv6 address. That would remove the efficiency
that Neighbor Discovery gets from "spreading" the resolution traffic
over 4 million multicast addresses.
One can envision variants on the theme of ACD that fit better with
the use of solicited-node multicast addresses. Suppose we have Host1
with IP1 that hashes to solicited-node multicast address SN1. And we
also have Host2 with IP2 and SN2.The link-layer addresses are MAC1
and MAC2, respectively. In [RFC4861] when Host1 wants to communicate
with Host2 we will see
1. Host1 multicasts a NS from IP1 to SN2. That include a claim for
IP1->MAC1 using the Source Link-layer Address option.
2. Host2 receives the NA and unicasts a NA from IP2 to IP1. That
includes a claim for IP2->MAC using the Taget Link-layer Address
option.
If we want other hosts which might think they own either IP1 or IP2
to see the NA or NS (and we don't want to send the NS and NA to all-
nodes), then we can add additional multicast packets which explicitly
send the claim and send it to the Solicited-node multicast address of
the address that is being claimed. Thus
1. Host1 multicasts a NS from IP1 to SN2. That include a claim for
IP1->MAC1 using the Source Link-layer Address option.
2. Host1 multicasts a NA from IP1 to SN1 explicitly claiming
IP1->MAC1 using the TLLAO.
3. Host2 receives the NA and unicasts a NA from IP2 to IP1. That
includes a claim for IP2->MAC using the Taget Link-layer Address
option.
4. Host2 multicasts a NA from IP2 to SN2 explicitly claiming
IP2->MAC2 using the TLLAO.
The above explicit claims can then trigger the state machine
described in ACD. The claims can probably be rate limited for any
given source address since there is no need to repeat the claim just
because a NS needs to be sent for a new IP3 etc. The impact of such
rate limitig on the ability to detect duplicates.
In the worst case the above approach turns one multicast and one
unicast into three multicasts and one unicast, but all the multicasts
are sent to solicited-node multicast addresss. Thus a host would not
need to process the additional multicast packets.
This ACD-multicast approach assumes that the multicast packets are
delivered with reasonable reliability, but does not assume perfect
delivery. If multicast reliability is lower than unicast it will
result in retransmitted multicast NS in [RFC4861]. However, the
Nordmark Expires April 3, 2016 [Page 4]
Internet-Draft DAD approaches Oct 2015
above rate limiting idea might need care to ensure that claims are
re-transmitted when the NS is re-transmitted.
A slightly different approach to on-going DAD is what is implemented
in Solaris where the node sends a periodic NA annoucement for the
address it is using, plus the ACD behavior of detecting such an NA
with a conflicting address. Presumably the NA annoucement can be
sent to the solicited-node multicast address. It might make sense to
use the Nonce option used by [I-D.ietf-6man-enhanced-dad] to avoid
issues where a host would hear its own announcement.
3. Approaches to efficiency
There exists some form of sleep proxies
[ECMA-393][http://en.wikipedia.org/wiki/Bonjour_Sleep_Proxy] which
perform handover of Neighbor Discovery protocol processing. [ECMA-
393] does not specify the handover mechanism, and there is no know
dcumentation for the handover mechanism. Even though the details are
not specified, the approach seems to allow a host to sleep without
worrying about DAD; the sleep proxy will respond to DAD probes. This
seems to entail sending multicast NAs to all-nodes to hand-over the
IP address to the proxy's MAC address before going to sleep and then
again to hand it back to the host's MAC address when it wakes up.
It is not clear whether such sleep proxies provide protection against
Single Points of Failure i.e., whether the host can hand over things
to a pair of sleep proxies.
FCFS SAVI [RFC6620] builds up state in devices to be able to detect
and prevent when some host is trying to use an IPv6 address already
used by another host on the link. This binding is built and checked
for DAD packets, but also for data packets to ensure that an attacker
can not inject a data packet with somebody elses source address.
When FCFS SAVI detects a potential problem it checks whether the IPv6
address has merely moved to a different binding anchor (e.g., port on
the switch) by sending a probe to its old anchor. Thus it assumes
the host is always awake or can be awoken to answer that probe.
Futhermore, implementation of the data triggered aspects can run into
hardware limitations since it requires something like an ACL for
every IPv6 address which has been validated.
DAD proxies as specified in [RFC6957] was designed to handle split-
horizon forwarding which means that a host would never receive a
multicast DAD probe sent by another host. This approach maintains a
binding cache built up by DAD probes and checked when handling DAD
probes. However, just like SAVI in order to handle host mobility and
legitimate host MAC address change, it the case of a potential
Nordmark Expires April 3, 2016 [Page 5]
Internet-Draft DAD approaches Oct 2015
conflict the proxy ends up verifying whether the IP address is still
present at its old port and MAC address. Hence the host can not
sleep.
One could explore something along the SAVI and DAD proxy approach
that uses timestamps to allow better sleep. In principle would could
start some fixed timer each time an IPv6 address is added or updated
in the binding cache, and during that time the proxy would respond to
DAD probes on behalf of the (potentially sleeping) host. To enable
movement between ports/anchors such an approach would have to compare
MAC address and assume that if the MAC address is the same it is the
same host. (Unclear whether that is a good idea if we end up with
random MAC addresses for better privacy.) And if a host would like
to change its MAC address it would need to wait for the timeout
before it can succeed in doing the change. Thus on one hand one
would want a long time (24 hours?) to facilitate for sleeping hosts,
and on the other hand a short time to allow for MAC address change
and movement.
In essence the above forms an implicit request for the proxy to
handle DAD on behalf of the host, with a fixed time limit. If the
host can instead make that time explicit, then the host can also
remove the proxy behavior (by passing a time of zero). Such a "proxy
for me" request can leverage the ARO option defined for 6LoWPan in
[RFC6775] but use it only for the purposes of DAD offload to the
proxy. That option can also carry an additional identifier which can
be used to distinguish between the same host aka same identifier
changing the MAC address. In the RFC that is an EUI-64 and in
[I-D.chakrabarti-nordmark-energy-aware-nd] in is a more generalized
identifier field. For redundancy the ARO can be sent to more than
one proxy.
4. Security Considerations
If the working group decides to pursue one of the outlined approaches
to improve the robustness and/or efficiency of DAD, then the security
issues for that partiticular approach will need to be studied.
In general DAD is subject to a Denial of Service attack since a
malicious host can claim all the IPv6 addresses [RFC4218].
5. Acknowledgements
Sowmini Varadhan pointed out the Solaris approach to use periodic NA
annoucements to increase robustness.
Nordmark Expires April 3, 2016 [Page 6]
Internet-Draft DAD approaches Oct 2015
6. References
6.1. Normative References
[I-D.yourtchenko-6man-dad-issues]
Yourtchenko, A. and E. Nordmark, "A survey of issues
related to IPv6 Duplicate Address Detection",
draft-yourtchenko-6man-dad-issues-01 (work in progress),
March 2015.
[RFC0826] Plummer, D., "Ethernet Address Resolution Protocol: Or
Converting Network Protocol Addresses to 48.bit Ethernet
Address for Transmission on Ethernet Hardware", STD 37,
RFC 826, DOI 10.17487/RFC0826, November 1982,
<http://www.rfc-editor.org/info/rfc826>.
[RFC4218] Nordmark, E. and T. Li, "Threats Relating to IPv6
Multihoming Solutions", RFC 4218, DOI 10.17487/RFC4218,
October 2005, <http://www.rfc-editor.org/info/rfc4218>.
[RFC4861] Narten, T., Nordmark, E., Simpson, W., and H. Soliman,
"Neighbor Discovery for IP version 6 (IPv6)", RFC 4861,
DOI 10.17487/RFC4861, September 2007,
<http://www.rfc-editor.org/info/rfc4861>.
[RFC4862] Thomson, S., Narten, T., and T. Jinmei, "IPv6 Stateless
Address Autoconfiguration", RFC 4862, DOI 10.17487/
RFC4862, September 2007,
<http://www.rfc-editor.org/info/rfc4862>.
[RFC5227] Cheshire, S., "IPv4 Address Conflict Detection", RFC 5227,
DOI 10.17487/RFC5227, July 2008,
<http://www.rfc-editor.org/info/rfc5227>.
[RFC6620] Nordmark, E., Bagnulo, M., and E. Levy-Abegnoli, "FCFS
SAVI: First-Come, First-Served Source Address Validation
Improvement for Locally Assigned IPv6 Addresses",
RFC 6620, DOI 10.17487/RFC6620, May 2012,
<http://www.rfc-editor.org/info/rfc6620>.
[RFC6775] Shelby, Z., Ed., Chakrabarti, S., Nordmark, E., and C.
Bormann, "Neighbor Discovery Optimization for IPv6 over
Low-Power Wireless Personal Area Networks (6LoWPANs)",
RFC 6775, DOI 10.17487/RFC6775, November 2012,
<http://www.rfc-editor.org/info/rfc6775>.
[RFC6957] Costa, F., Combes, J-M., Ed., Pougnard, X., and H. Li,
"Duplicate Address Detection Proxy", RFC 6957,
Nordmark Expires April 3, 2016 [Page 7]
Internet-Draft DAD approaches Oct 2015
DOI 10.17487/RFC6957, June 2013,
<http://www.rfc-editor.org/info/rfc6957>.
6.2. Informative References
[I-D.chakrabarti-nordmark-energy-aware-nd]
Chakrabarti, S., Nordmark, E., and M. Wasserman, "Energy
Aware IPv6 Neighbor Discovery Optimizations",
draft-chakrabarti-nordmark-energy-aware-nd-02 (work in
progress), March 2012.
[I-D.ietf-6man-enhanced-dad]
Asati, R., Singh, H., Beebee, W., Pignataro, C., Dart, E.,
and W. George, "Enhanced Duplicate Address Detection",
draft-ietf-6man-enhanced-dad-15 (work in progress),
March 2015.
Author's Address
Erik Nordmark
Arista Networks
Santa Clara, CA
USA
Email: nordmark@arista.com
Nordmark Expires April 3, 2016 [Page 8]