On 2011-09-29 14:13, Mark Andrews wrote:
> In message <4e838725.9010...@gmail.com>, Brian E Carpenter writes:
>> On 2011-09-28 21:42, François-Xavier Le Bail wrote:
>> ...
>>> So, if the RFC 3484, Section 4 "Candidate Source Addresses" is involved 
>> in
>>> the reply to datagrams sent to an anycast address, it might be useful to
>>> reassess the restrictions that excluded an anycast address from the 
>> "candidate set", at least for the replies.
>>
>> You would need to start a thread proposing a specific change to
>> draft-ietf-6man-rfc3484-revise if you want this to be done.
>>
>> I'm not convinced; as Ole said, anycast remains a special case
>> for certain applications, so it will be hard to define a safe
>> general rule.
>>
>>    Brian
> 
> Just for reference, in the last week, there was a compliant in
> bind-users that we were rejecting replies to queries sent to the
> all routers IPv6 anycast address because the source address of the
> reply did not match the destination address of the query.  The
> anycast address can be used as source address relatively safely,
> even for TCP, if you constrain the packets to be fragmented at
> network MTU and to also include a fragment header in case they are
> going through a IPv4/IPv6 translator.  With anycast you don't want
> to trigger PMTU discovery.
> 
> Mark

There's a similar issue in RFC3068 (anycast 6to4), which is
described in RFC6343, so I will not give details here.

    Brian

--------------------------------------------------------------------
IETF IPv6 working group mailing list
ipv6@ietf.org
Administrative Requests: https://www.ietf.org/mailman/listinfo/ipv6
--------------------------------------------------------------------

Reply via email to