I have major, fundamental objection to the premises on which this draft is
based on.  However, I think we should be able to find consensus on the way
forward.

Fundamental objection
---------------------

The document assumes that it is always desirable to do
load-sharing with the equivalent routers.  I don't agree with this
assumption.

If the router's capacity is sufficient so that it can forward all the
traffic sent by its nodes, there is actually very little need for load
sharing.  On the contrary -- sharing load between routers produces
difficult-to-debug scenarios when some destinations (which are distributed
to some routers) fail in mysterious ways while others work just fine.

Due to that, I, as an operator, would not wish to enable load-sharing on
hosts except when I specifically require that kind of functionality.

So, I'd propose that this document does not describe that the hosts MUST
share the load, but rather describes how the hosts MUST behave if they wish
to share the load -- and if turned on by default, require that there 
MUST be a way to toggle load balancing off.  A difficult issue to settle
might be whether to recommend (and if so, how strongly) to enable
load-sharing by default.

substantial
-----------

[ND] does not require any particular behavior in this respect.  It
specifies that an implementation may always choose the same router
(e.g., the first in the list) or may cycle through the routers in
a round-robin manner.  Both of these suggestions are problematic.

Clearly, always choosing the same router does not provide load
sharing.  Some problems with naive tie-breaking techniques such as
round-robin and random are discussed in [MULTIPATH].  While the
destination cache provides some stability since the determination
is not per-packet, cache evictions or timeouts can still result in
unstable or unpredictable paths over time, lowering the
performance and making it harder to diagnose problems.  Round-
robin selection may also result in synchronization issues among
hosts, where in the worst case the load is concentrated on one
router at a time.

==> I don't think this document clearly described both of the above
suggestion (1st paragraph): but rather how round-robin and random have
issues.  That is, it does not cleatly describe why choosing the same router
is undesirable.

As mentioned in [MULTIPATH], when next-hop selection is
predictable, an application can synthesize traffic that will all
hash the same, making it possible to launch a denial-of-service
attack against the load sharing algorithm, and overload a
particular router.  A special case of this is when the same
(single) next-hop is always selected, such as in the algorithm
allowed by [ND].  Introducing hashing can make such an attack more
difficult; the more unpredictable the hash is, the harder it
becomes to conduct a denial-of-service attack against any single
router.

==> these threats appear to have no clear threat model.  What's the point of
such an attack, as you're already on-link, and can already DoS the routers
there using a number of means?  Introducing hashing doesn't help much here --
you're making an assumption that the attacker is a "friendly" node.  A
maliscious node will just a) send the packets through raw sockets, DoSing
the routers directly, or b) overload both of the routers :).  It seems the
security considerations needs a rewrite... 



editorial
---------

==> all the empty lines in the document appear to have been duplicated for
some reason.

Abstract

The original IPv6 conceptual sending algorithm does not require
load-sharing among equivalent IPv6 routers, and suggests schemes

==> s/IPv6/IPv6 Neighbor Discovery/

Subsequent traffic to the same
destination address continues to use the same router unless there
is some reason to change to a different router (e.g., a redirect
message is received, or a router is found to be unreachable).

==> s/a router/the router/

9.  Full Copyright Statement

==> IPR boilerplate prior to this document would not hurt.

-- 
Pekka Savola                 "You each name yourselves king, yet the
Netcore Oy                    kingdom bleeds."
Systems. Networks. Security. -- George R.R. Martin: A Clash of Kings


--------------------------------------------------------------------
IETF IPv6 working group mailing list
[EMAIL PROTECTED]
Administrative Requests: https://www1.ietf.org/mailman/listinfo/ipv6
--------------------------------------------------------------------

Reply via email to