Internet DRAFT - draft-pashby-magma-simplify-mld-snooping
draft-pashby-magma-simplify-mld-snooping
MBONE Deployment (mboned) R. Pashby
Internet-Draft Bowhead
Expires: October 14, 2006 April 12, 2006
Simplifying IPv6 MLD Snooping Switches
draft-pashby-magma-simplify-mld-snooping-01.txt
Status of this Memo
By submitting this Internet-Draft, each author represents that any
applicable patent or other IPR claims of which he or she is aware
have been or will be disclosed, and any of which he or she becomes
aware will be disclosed, in accordance with Section 6 of BCP 79.
Internet-Drafts are working documents of the Internet Engineering
Task Force (IETF), its areas, and its working groups. Note that
other groups may also distribute working documents as Internet-
Drafts.
Internet-Drafts are draft documents valid for a maximum of six months
and may be updated, replaced, or obsoleted by other documents at any
time. It is inappropriate to use Internet-Drafts as reference
material or to cite them other than as "work in progress."
The list of current Internet-Drafts can be accessed at
http://www.ietf.org/ietf/1id-abstracts.txt.
The list of Internet-Draft Shadow Directories can be accessed at
http://www.ietf.org/shadow.html.
This Internet-Draft will expire on October 14, 2006.
Copyright Notice
Copyright (C) The Internet Society (2006).
Abstract
The purpose of this draft is to simplify the design of MLD Snooping
switches and provide a method for Solicited Node multicast addresses
to be sent to every port to improve network robustment and
management.
IPv6 Addressing Architecture requires that all nodes must join the
associated Solicited-Node multicast addresses for every unicast and
anycast address it is assigned. This causes MLD snooping switches to
create potentially huge multicast forwarding tables just to handle
Pashby Expires October 14, 2006 [Page 1]
Internet-Draft Simplifying IPv6 MLD Snooping Switches April 2006
Neighbor Discovery. A simple change to alleviate this would be to
allow switches to forward a range of addresses that include the
Solicited-Node multicast addresses to every port. This also could
help in network discovery. Similarly the same allowance could be
made for Local Network Control Block (LNCB) addresses.
Table of Contents
1. Introduction . . . . . . . . . . . . . . . . . . . . . . . . . 3
2. Applicability . . . . . . . . . . . . . . . . . . . . . . . . . 4
3. MLD Snooping Switch Multicast Forwarding Rules . . . . . . . . 4
4. Security Considerations . . . . . . . . . . . . . . . . . . . . 4
5. Acknowledgments . . . . . . . . . . . . . . . . . . . . . . . . 5
6. Change Log . . . . . . . . . . . . . . . . . . . . . . . . . . 5
7. References . . . . . . . . . . . . . . . . . . . . . . . . . . 5
Author's Address . . . . . . . . . . . . . . . . . . . . . . . . . 6
Intellectual Property and Copyright Statements . . . . . . . . . . 7
Pashby Expires October 14, 2006 [Page 2]
Internet-Draft Simplifying IPv6 MLD Snooping Switches April 2006
1. Introduction
The purpose of this draft is to simplify the design of MLD Snooping
switches and provide a method for Solicited Node multicast addresses
to be sent to every port to improve network robustment and
management.
IPv6 Addressing Architecture requires that all nodes must join the
associated Solicited-Node multicast addresses for every unicast and
anycast address they are assigned. This causes MLD snooping switches
to create potentially huge multicast forwarding tables just to handle
Neighbor Discovery. A simple change to alleviate this would be to
allow switches to forward a range of addresses that include the
Solicited-Node multicast addresses to every port. This also could
help in network discovery.
mldsnoop [1] states that it is preferred that the entire IPv6 address
be used instead just the MAC address. This would cause a 2-2/3
increase in hardware than beyond what was required for IPv4.
Current layer-2 IGMP snooping switches were designed with the
criteria that the number of multicast groups that needed to be
supported were determined by the number of "real" IP multicast flows
(i.e. video conferences, financial ticker info, broadcast TV/radio,
etc). However, with the currently defined IPv6, thousands of
multicast groups need to be supported just to allow Neighbor
Discovery. This also would cause a large increase in hardware to
handle these groups with little real benefit.
Many current Operating System releases that support IPv6 do not send
MLD joins for the Solicited Node Address. This fact means that if a
layer-2 MLD snooping switch were introduced into a network, large
numbers of IPv6 networks would fail to work. Similarly, many
Operating Systems in network servers and services also do not send
MLD joins for Local Network Control groups.
Since Neighbor Discovery requires the use of multicast, any failure
of multicast forwarding causes significant impact on the operation of
IPv6 networks. There are cases that network device failures or
restarting can cause minutes of loss of multicast forwarding state in
layer-2 MLD snooping switches. Reducing the reliance of multicast
forwarding state for Neighbor Discovery will make the IPv6 network
more resilient to temporary network outages.
This document reduces the requirement that MLD snooping switches
track group joins for per-host multicast groups (e.g. Solicited Node
Multicast Address) and Local Network Control Block (LNCB) addresses.
The proposal would define ranges of Multicast IDs that would be
Pashby Expires October 14, 2006 [Page 3]
Internet-Draft Simplifying IPv6 MLD Snooping Switches April 2006
forwarded to all ports and would not require tracking of MLD joins
and leaves. The ranges specified are found in a corresponding
document scopedmc [2].
2. Applicability
This document does not preclude MLD snooping switches from basing
their multicast forwarding decisions on the full IPv6 address, but
does allow for switches to be designed with possibly significantly
fewer hardware resources.
This document does not relax the requirement for hosts to send MLD
joins for the Solicited Node Address, however it does relax the
requirement that an MLD snooping switch must use them for proper
operation of Neighbor Discovery. An MLD snooping switch is required
to forward the Dynamically Assigned Link-Local Scoped Multicast Ids
(DALS) to all ports.
3. MLD Snooping Switch Multicast Forwarding Rules
The following rules must be used for MLD snooping Layer 2 switches:
1. Forward packets addressed to All-Nodes Multicast address to all
ports.
2. Forward packets addressed to LNCB addresses to all ports.
3. Forward packets addressed to the DALS addresses to all ports.
4. Track MLD joins and leaves for forwarding all other multicast
groups per mldsnoop [1].
Rules 2 and 3 may be administratively be turned off, but the default
behavior should be on.
4. Security Considerations
Forwarding traffic to all ports can cause vulnerability to Denial of
Service attacks. However, there is a tradeoff between security, cost
and manageability. The perceived vulnerability is confined only to
devices on the link. It is almost impossible to remove Denial of
Service attacks from devices connected on the physical link. This
document does not increase the vulnerability over that which is
present in a non-MLD snooping switch. Also, the current mechanism
allows for this security breach by forwarding packets to all ports by
addressing them to the All-Nodes Multicast address.
There should be access controls to deny all packets addressed to
Dynamically Assigned Link-Local Scoped Addresses from being forwarded
Pashby Expires October 14, 2006 [Page 4]
Internet-Draft Simplifying IPv6 MLD Snooping Switches April 2006
onto a link.
5. Acknowledgments
Brain Haberman, John Hopkins University
Karen O'Donoghue, US Department of Navy
6. Change Log
6.1. Changes from 00 to 01
1. Editorial changes
2. Removed references to [spoof]
3. Converted to XML
4. Changed forwarding rule to allow flooding of LNCB and DAL to
administratively turned off
5. Added Change Log section
6. Removed reference RFC2375
7. References
[1] Christensen, M., Kimball, K., and F. Solensky, "Considerations
for IGMP and MLD Snooping Switches", draft-ietf-magma-snoop-12
(work in progress), February 2005.
[2] Pashby, R., "IPv6 Multicast Scoped Address Assignment",
draft-pashby-ipv6-mc-scoped-addr-01.txt (work in progress).
Pashby Expires October 14, 2006 [Page 5]
Internet-Draft Simplifying IPv6 MLD Snooping Switches April 2006
Author's Address
Ronald Pashby
Bowhead Information Technology Services
Phone: +1 540 653 6070
Email: ronald.pashby.ctr@navy.mil
Pashby Expires October 14, 2006 [Page 6]
Internet-Draft Simplifying IPv6 MLD Snooping Switches April 2006
Intellectual Property Statement
The IETF takes no position regarding the validity or scope of any
Intellectual Property Rights or other rights that might be claimed to
pertain to the implementation or use of the technology described in
this document or the extent to which any license under such rights
might or might not be available; nor does it represent that it has
made any independent effort to identify any such rights. Information
on the procedures with respect to rights in RFC documents can be
found in BCP 78 and BCP 79.
Copies of IPR disclosures made to the IETF Secretariat and any
assurances of licenses to be made available, or the result of an
attempt made to obtain a general license or permission for the use of
such proprietary rights by implementers or users of this
specification can be obtained from the IETF on-line IPR repository at
http://www.ietf.org/ipr.
The IETF invites any interested party to bring to its attention any
copyrights, patents or patent applications, or other proprietary
rights that may cover technology that may be required to implement
this standard. Please address the information to the IETF at
ietf-ipr@ietf.org.
Disclaimer of Validity
This document and the information contained herein are provided on an
"AS IS" basis and THE CONTRIBUTOR, THE ORGANIZATION HE/SHE REPRESENTS
OR IS SPONSORED BY (IF ANY), THE INTERNET SOCIETY AND THE INTERNET
ENGINEERING TASK FORCE DISCLAIM ALL WARRANTIES, EXPRESS OR IMPLIED,
INCLUDING BUT NOT LIMITED TO ANY WARRANTY THAT THE USE OF THE
INFORMATION HEREIN WILL NOT INFRINGE ANY RIGHTS OR ANY IMPLIED
WARRANTIES OF MERCHANTABILITY OR FITNESS FOR A PARTICULAR PURPOSE.
Copyright Statement
Copyright (C) The Internet Society (2006). This document is subject
to the rights, licenses and restrictions contained in BCP 78, and
except as set forth therein, the authors retain all their rights.
Acknowledgment
Funding for the RFC Editor function is currently provided by the
Internet Society.
Pashby Expires October 14, 2006 [Page 7]