Hello,

I'm now working on the rfc2462bis document, and I've done the work for
most of the issues I raised in the previous draft and presented in
Minneapolis with my own proposed resolutions (which should be
discussed and agreed by the wg, of course).  I've revised the
rfc2462bis text with the resolutions, which will be posted before the
I-D cutoff date for initial submissions (Feb 9th).

The attached below is a summary of the proposals.  I believe most of
them are trivial or based on the consensus of the wg (so I'm simply
posting a summary), but I'll make separate threads for those that
might be controversial.  There are still some open issues, for which
I'll make separate threads to hear opinions/comments.

You can see detailed notes and specific changes at the rt.psg.com
issue tracker:

https://rt.psg.com/
user/password=ietf/ietf
issue queue: ipv6-2462bis

Please make comments if you find problems in the proposals by making a
separate thread.  If the comments can easily be addressed, I'll put
the resolution to the new revision before submitting it.

Thanks,

                                        JINMEI, Tatuya
                                        Communication Platform Lab.
                                        Corporate R&D Center, Toshiba Corp.
                                        [EMAIL PROTECTED]

Issues that have proposals (basically from
draft-jinmei-ipv6-rfc2462bis-00.txt, and IDs at the issue tracker for
reference):

ID    Issue/Proposed Resolution
------------------------------------------------------------------
264   There is dead code in the DoS prevention algorithm in Section
      5.5.3
      => Proposed Resolution: simply remove the redundant code.

265   Unclear text about a corner case in the inbound Neighbor
      Advertisement processing.
      => Proposed Resolution: clarify that a unicasted NS/NA should be
      discarded.

266   Unclear text about StoredLifetime.
      => Proposed Resolution: clarify the text (no change in the
      behavior, but replace StoredLifetime with RemainingLifetime for
      clarification)

267   since the wg are going to deprecate SL addresses, it would also
      make sense to remove references to site-local from this document.
      => Proposed Resolution: remove references to site-local and
      revise wording around the keyword.

268   Source address selection issues with regards to deprecated
      addresses.  E.g., which one should be preferred as a source
      address, between a deprecated address and a smaller-scope address?
      => Proposed Resolution: add a simple note on this and a
      reference to RFC3484. detailed description on this is out of
      scope of this document.

269   The semantics of "new communication" is not very clear; is a
      passively opened TCP connection a new communication? What if an
      application specifies a deprecated address as a source address?
      => Proposed Resolution: revise the first paragraph of Section
      5.5.4 so that
        - it clearly says incoming TCP-SYN to a deprecated address
          must be accepted.
        - it clearly says if the application specifies to use a
          deprecated address explicitly, the protocol stack must
          accept that.

270   There was a question about the semantics where the on-link (L)
      flag is 0 and the autonomous (A) flag is 1.
      => Proposed Resolution: no change for this.

271   An implementation may want to use stable storage for
      autoconfigured addresses.
      => Proposed Resolution: add a subsection in Section 5 to mention
      this (without mandating anything).  DAD must be run after rebooting.
      (Note: this resolution may be controversial)

272   This document may need to be aligned with the SEND requirement
      draft in its security consideration.
      => Proposed Resolution: revise the second paragraph of Security
      Considerations so that:
      - add an informative reference to send-psreq
      - note that the use of IPsec is not always feasible

273   802.11 specification requires a link-layer filtering that
      conflicts with the condition to make DAD work correctly.
      => Proposed Resolution: add a note in Appendix A about this
      issue.  Also refer to the wlan-dad draft (or perhaps the 802.11


274   There is conflict with the Multicast Listener Discovery
      specification about random delay for the first packet. The address
      autoconfiguration requires a random delay for a DAD packet if it
      is the first packet from the node, but an MLD report packet should
      usually be sent before the DAD packet.
      => Proposed Resolution: add a workaround to impose a random
      delay for DAD NS even after the first MLD.
      (Note: this resolution may be controversial since it may affect
      exiting implementations)

276   There is a possible denial of service attack not discussed: What
      if a malicious node intentionally sends prefixes for other LANs?
      => Proposed Resolution: no change for this (this is actually
      covered by send-psreq)
      (Note: we may still have to note this because this points out
      the two-hour rule for DoS avoidance may cause another DoS)


278   Whether a router (not a host) can autoconfigure itself using the
      stateless autoconfiguration protocol may need to be discussed.
      => Proposed Resolution: do nothing (this was actually pretty
      clear)
      (Note: but we may have to clarify if the definition of "router" is
      per-interface basis)

279   Should this document define a 'not-yet-ready' status of an
      autoconfigured address to help renumbering operation?
      => Proposed Resolution: nope.

280   The requirement about the interface failure upon DAD failure may
      be too strong. Does it make sense to loosen it, e.g., allowing
      automatic recovery?
      => Proposed Resolution: add "An implementation MAY try an
      automatic recovery technique from this failure and re-enable the
      interface."
      (Note: this may not be enough, based on a discussion in last
      November)

321   Preferred lifetime and the 'two-hour' rule
      => Proposed Resolution: clearly say that the preferred lifetime
      should be set the advertised value unless the prefix information
      option is ignored in the "two-hour" rules.

Issues that are still open

275   Many DAD related issues have been discussed, including if it is
      okay to omit DAD in some environments or if DAD can be replaced
      with DIID (duplicate interface ID detection).

277   The semantics of the M/O flags is not very clear.

281   It is not very clear if this document always require a 64-bit
      Interface ID.

--------------------------------------------------------------------
IETF IPv6 working group mailing list
[EMAIL PROTECTED]
Administrative Requests: https://www1.ietf.org/mailman/listinfo/ipv6
--------------------------------------------------------------------

Reply via email to