I'd like to put forward some additional points which should perhaps be
concise enough to clarify the liaison and questions a bit more. 
There are actually two issues, out of which the duplicate MAC address
issue is IMO a far less tractable problem (as it needs to be solved at
L2 for anything to work).
1. Within a shared L2 domain with constrained forwarding (aka NBMA), for
two users A & B with *different* MAC addresses, user B may spoof the LL
address of user A and thus lead possibly to a DoS attack (on a FCFS
basis). Similarly user B may try to spoof the LL address of N users
(again on an FCFS basis). Does SAVI propose to solve this problem and if
so how?

2. A duplicate MAC address in a shared broadcast domain is a
possibility. 
At L2, this problem is tractable by any one of
a) denying the dupe addresses access to the network service on a FCFS
basis (common practice today)
b) assigning each duped MAC to a different broadcast domain
c) MAC address translation (MAC NAT). 
Solution c) requires some form of ALGs (for v4 and v6). Eg In the v6
case any EUI-64 derived LL addresses will still be the same and thus an
ND ALG appears needed. What is the IETF's opinion about this type of
solution (c), if any?

Regards,
Woj.

> -----Original Message-----
> From: ipv6-boun...@ietf.org [mailto:ipv6-boun...@ietf.org] On 
> Behalf Of David Allan I
> Sent: 10 November 2009 00:31
> To: Thomas Narten
> Cc: ipv6@ietf.org
> Subject: RE: Liaison from BBF
> 
> HI Thomas:
> 
> Unfortunately having just changed jobs I'm having trouble 
> exactly recreating all my sources of information...
> 
> The following was one anecdotal example offered during our 
> discussions in the spring..."...in a real nationwide telco 
> today with approximately 3.5million DSL ports there is about 
> 300-400 duplicate MAC@ alarms active on the DSLAMs at any 
> time, and this is only where 2 of the same MAC@ appear on the 
> same DSLAM (384-1000 users each)..."
> 
> TO take it back up a notch...
> 
> In a perfect world where all MACs were properly unique and 
> all implementations correctly constructed link local via 
> EUI-64 we'd all be happy campers, it works as intended. 
> Unfortunately that is not the case and we seem to have a 
> hierarchy of grief.....
> 
> 1) Some carriers have deployed MAC address translation in the 
> Access node/DSLAM to ensure MAC uniqueness. This means ALG 
> functionality is required for Ethernet OAM and other 
> protocols, and while fixing MAC uniqueness, does not address 
> duplicates in link local construction unless NAT of the lower 
> 64 bits of LLA is included in the mix.
> 
> 2) Our liaisons with IEEE on the subject and some proposals 
> to the forum focus on the fact that uniquness only needs to 
> exist in a given Ethernet broadcast domain, hence keeping a 
> few extra VLANs in the back pocket to shift duplicate 
> customers to solves the problem, and my math suggested this 
> would inflate VID usage by a corresponding few percent. Issue 
> being this then breaks down if the link local address is not 
> constructed from the MAC, and RFCs have been trotted out at 
> the BBF on NOT using the EUI-64 specifically to defeat 
> traffic analysis attacks. This being an expected deployment 
> scenario when wireless media in the home is considered and an 
> emerging class of FMC capable terminals is deployed. 
> 
> So a solution analogous to DAD appears to be needed, that 
> originates with the edge router, where if the detected 
> duplicate does not subsequently behave in a prescribed manner 
> service may then be denied in the interest of the common 
> good. As DAD is already deployed that would appear to be a 
> path of least resistance vs waiting years for a roll out of a 
> fix. However if my memory serves correctly, unicast from the 
> edge router would be a desirable form and I am unsure if that 
> is supported in standards or implementations...
> 
> Cheers
> D
> 
> 
> 
> 
> 
> -----Original Message-----
> From: Thomas Narten [mailto:nar...@us.ibm.com]
> Sent: Tuesday, November 10, 2009 12:00 AM
> To: David Allan I
> Cc: ipv6@ietf.org
> Subject: Re: Liaison from BBF
> 
> Sorry, I still don't get it. We need more detail!
> 
> Two things stand out:
> 
> > If two devices happen to have the same Ethernet MAC address as a 
> > consequence of incompetent manufacture, the link-local 
> address derived 
> > for that interface will also be non-unique, provided it is derived 
> > from the EUI-64 identifier. This has been identified as an 
> > inconveniently frequent scenario (impacting ~4% of access 
> nodes at any 
> > given time)
> 
> this 4% figure seems *very* high. Can you please provide more 
> details on how you reached that number?
> 
> Also, if you have two devices on the same link sharing the 
> same MAC address, you have problems. Period. Having duplicate 
> IP addresses is only one symptom. If you fix that problem, 
> but still have duplicate MAC addresses in use, it is not 
> clear to me that your network will function correctly. Have 
> you done the analysis to be sure that the duplicate MAC 
> address scenario is something that is solvable in practice?
> 
> > When numerous hosts share an Ethernet broadcast domain, the 
> BNG/edge 
> > router needs to support a mechanism that ensures duplicate 
> link-local 
> > addresses can be handled correctly without necessarily depending on 
> > cooperative action by the hosts
> > 
> > it is explicitly required to do something to make this happen
> 
> Again, it is not clear to me what "handling correctly" even means.
> 
> Finally, the charts say you are worried about a "malicious user"
> sending out bogus ND packets. ND simply can't deal with this 
> sort of hostile environment, and there is no easy way to fix 
> this. Is that what you are asking this group to fix?
> 
> For that matter, ARP doesn't address this problem either. Is 
> there a new problem that shows up with IPv6 that didn't exist 
> with IPv4? And if not, what is wrong with using the IPv4 
> solutions (assuming they exist)?
> 
> Thomas
> --------------------------------------------------------------------
> IETF IPv6 working group mailing list
> ipv6@ietf.org
> Administrative Requests: https://www.ietf.org/mailman/listinfo/ipv6
> --------------------------------------------------------------------
> 
--------------------------------------------------------------------
IETF IPv6 working group mailing list
ipv6@ietf.org
Administrative Requests: https://www.ietf.org/mailman/listinfo/ipv6
--------------------------------------------------------------------

Reply via email to