Erik,

> -----Original Message-----
> From: ipv6-boun...@ietf.org [mailto:ipv6-boun...@ietf.org] On Behalf Of Erik 
> Nordmark
> Sent: Wednesday, December 02, 2009 11:31 PM
> To: Hemant Singh (shemant)
> Cc: ipv6@ietf.org; Pekka Savola
> Subject: Re: speaking of ND Proxy and NBMA etc.
> 
> Hemant Singh (shemant) wrote:
> 
> > I personally think RFC 4389 is well shaken out for a doc - as we say in
> > our new short note, the only reason they didn't make the ND Proxy doc a
> > Standards Track doc because ND Proxy did not support SEND extensions.
> 
> I definitely had other concerns around RFC 4389 around the weaknesses in
> loop avoidance. ND proxy in essence forwards IP (ND) packets without
> decrementing ttl, which can lead to catastophic loops. The RFC tries to
> ameliorate that by detecting loops. However, the loop detection is based
> on receiving RAs (with the P-bit) which handles some cases. But it isn't
> robust against somebody connecting what was two Ethernet segments after
> ND proxy has sent its two P-bit RAs.
> 
> Thus I personally don't think this approach is fit as a standards track
> document.
> 
> > The SEND extensions was work TBD with another IETF WG but that group is,
> > I think, 4 years and counting for not taking this work.  But there are
> > networks that need ND Proxy without use of SEND.
> 
> draft-ietc-csi-proxy-send is underway but is a bit subtle in its
> applicability. The idea around RFC 4389 is that the proxy isn't known to
> the other nodes. Yet proxy-send is based on explicitly assigning a
> ceritificate and associated trust to the proxy node. See text around
>     The Secure Proxy ND becomes part of the trusted infrastructure just
>     like a SEND router.  The Secure Proxy ND is granted a certificate
>     that specifies the range of addresses for which it is allowed to
>     perform proxying of SEND messages
> 
> Such an approach is workable for the Mobile IP scenario, because there
> the MN and HA have a relationship thus it is reasonable for the MN to
> trust the HA.
> 
> But it doesn't seem to fit the transparent case of RFC 4389.
> 
> If there are networks "that need ND proxy" as you say, and at the same
> time have the threats that SeND was designed to handle (the threats are
> listed in RFC 3756), then I think there is an architectural disconnect.
> To be able to secure the network some constraints need to be placed on
> who can advertise things in Neighbor Discovery messages and that seems
> to be fundamentally at odds with any transparent ND proxying.
> 
> I suspect such cases are best handled (when SeND can't be deployed on
> the link) by splitting what is one link into separate links (by using
> existing techniques like VLANs, or perhaps inventing some new technique
> above layer 2) so that the security threats related the shared link goes
> away.
> 
> I think that this is in essence what is done for IPv4 since the DHCPv4
> address assignment essentially is used to establish point-to-point
> connectivity between the router and each peer; there is no shared
> multicast or broadcast traffic needed on the link to set this up.
> IPv6 is different in its reliance on not only link-local addresses but
> also on multicast RS and RA packets to do the initial setup.

Some links rely on unicast RS/RA and not multicast. Wouldn't
unicast-only proxy ND avoid the looping issues you were
concerned with?

Fred
fred.l.temp...@boeing.com

> Regards,
> 
>      Erik
> 
> > Hemant
> >
> > -----Original Message-----
> > From: Pekka Savola [mailto:pek...@netcore.fi]
> > Sent: Thursday, November 12, 2009 3:51 PM
> > To: Hemant Singh (shemant)
> > Cc: ipv6@ietf.org
> > Subject: Re: speaking of ND Proxy and NBMA etc.
> >
> > On Wed, 11 Nov 2009, Hemant Singh (shemant) wrote:
> >> http://www.ietf.org/id/draft-wbeebee-6man-nd-proxy-std-00.txt
> >
> > Do we already have implementations?  What are the implementation
> > experiences?  Were all the features of the spec useful, or should
> > something be changed (added, removed, clarified)?
> >
> > This is not procedurally required for PS, but if there are a lot of
> > implementations already, this would be a strong argument for going to
> > PS.
> >
> 
> --------------------------------------------------------------------
> IETF IPv6 working group mailing list
> ipv6@ietf.org
> Administrative Requests: https://www.ietf.org/mailman/listinfo/ipv6
> --------------------------------------------------------------------
--------------------------------------------------------------------
IETF IPv6 working group mailing list
ipv6@ietf.org
Administrative Requests: https://www.ietf.org/mailman/listinfo/ipv6
--------------------------------------------------------------------

Reply via email to