Re: [dhcwg] [v6ops] [EXTERNAL] Re: Question to DHCPv6 Relay Implementors regarding draft-ietf-dhc-dhcpv6-pd-relay-requirements

"Bernie Volz (volz)" <volz@cisco.com> Wed, 04 November 2020 12:14 UTC

Return-Path: <volz@cisco.com>
X-Original-To: dhcwg@ietfa.amsl.com
Delivered-To: dhcwg@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id EE86E3A1043; Wed, 4 Nov 2020 04:14:58 -0800 (PST)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -9.6
X-Spam-Level:
X-Spam-Status: No, score=-9.6 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, DKIM_SIGNED=0.1, DKIM_VALID=-0.1, DKIM_VALID_AU=-0.1, DKIM_VALID_EF=-0.1, HTML_MESSAGE=0.001, RCVD_IN_MSPIKE_H2=-0.001, SPF_PASS=-0.001, URIBL_BLOCKED=0.001, USER_IN_DEF_DKIM_WL=-7.5] autolearn=ham autolearn_force=no
Authentication-Results: ietfa.amsl.com (amavisd-new); dkim=pass (1024-bit key) header.d=cisco.com header.b=B1MktgzC; dkim=pass (1024-bit key) header.d=cisco.onmicrosoft.com header.b=kotZp5V7
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id JeANEOdazlhT; Wed, 4 Nov 2020 04:14:56 -0800 (PST)
Received: from alln-iport-8.cisco.com (alln-iport-8.cisco.com [173.37.142.95]) (using TLSv1.2 with cipher DHE-RSA-SEED-SHA (128/128 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id 62C563A1056; Wed, 4 Nov 2020 04:14:56 -0800 (PST)
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/simple; d=cisco.com; i=@cisco.com; l=22747; q=dns/txt; s=iport; t=1604492096; x=1605701696; h=from:to:cc:subject:date:message-id:references: in-reply-to:mime-version; bh=M0tilv3r4Zfb+NnKPNnGJCQE1zBxdNBxYZYtZ+7PZvA=; b=B1MktgzCevgwVmrEwx+AKG7t/tVODpdztkAnQtj2yiQXQSFmfJP1p7vY DcapmF1ffzJdm3BpIjolmCxGZfFM2yeBXiILR1PbvrVR1YEt/wpYvFPSI pZyvAcPsFVQe+r7YU+d16UHSdsLSvO4cC+dcn7fiK+dV7P7a9pvsB+rDW A=;
IronPort-PHdr: 9a23:JUIGDhb8dgoaNUbZPXpJaR//LSx94ef9IxIV55w7irlHbqWk+dH4MVfC4el21QaVD4re4vNAzeHRtvOoVW8B5MOHt3YPONxJWgQegMob1wonHIaeCEL9IfKrCk5yHMlLWFJ/uX3uN09TFZXxYlTTpju56jtBUhn6PBB+c+LyHIOahs+r1ue0rpvUZQgAhDe0bb5oahusqgCEvcgNiowkIaE0mRY=
X-IronPort-Anti-Spam-Filtered: true
X-IronPort-Anti-Spam-Result: A0B0CABlmqJf/4gNJK1igliBUiMuB3BZLy4KhDODSQONUIoTiX2Eb4EugSUDVAsBAQENAQEYAQoKAgQBAYFVgnUCF4F1AiU2Bw4CAwEBCwEBBQEBAQIBBgRxhWEBC4VyAQEBBAEBEBEdAQEsCwELBAIBCBEEAQEkBAMCAgIfBgsUCQgCBA4FIoMEAYF+TQMuAQ6kEwKBO4hodoEygwQBAQWFBA0LghADBoE4gnKDcYEGhVEbggCBECgcgk8+ghtCAQGBdg+CcTOCLJA8gmo+hxqMDJBHVAqCbZV2hRMDH6Ftk02NZpJeAgQCBAUCDgEBBYFbCikqgS1wFTsqAYI+UBcCDY4rFxSDOoUUhUR0OAIGAQkBAQMJfIw7AYEQAQE
X-IronPort-AV: E=Sophos;i="5.77,450,1596499200"; d="scan'208,217";a="598762787"
Received: from alln-core-3.cisco.com ([173.36.13.136]) by alln-iport-8.cisco.com with ESMTP/TLS/DHE-RSA-SEED-SHA; 04 Nov 2020 12:14:55 +0000
Received: from XCH-RCD-002.cisco.com (xch-rcd-002.cisco.com [173.37.102.12]) by alln-core-3.cisco.com (8.15.2/8.15.2) with ESMTPS id 0A4CEtqc011911 (version=TLSv1.2 cipher=AES256-SHA bits=256 verify=FAIL); Wed, 4 Nov 2020 12:14:55 GMT
Received: from xhs-rcd-001.cisco.com (173.37.227.246) by XCH-RCD-002.cisco.com (173.37.102.12) with Microsoft SMTP Server (TLS) id 15.0.1497.2; Wed, 4 Nov 2020 06:14:54 -0600
Received: from xhs-aln-002.cisco.com (173.37.135.119) by xhs-rcd-001.cisco.com (173.37.227.246) with Microsoft SMTP Server (TLS) id 15.0.1497.2; Wed, 4 Nov 2020 06:14:54 -0600
Received: from NAM11-DM6-obe.outbound.protection.outlook.com (173.37.151.57) by xhs-aln-002.cisco.com (173.37.135.119) with Microsoft SMTP Server (TLS) id 15.0.1497.2 via Frontend Transport; Wed, 4 Nov 2020 06:14:54 -0600
ARC-Seal: i=1; a=rsa-sha256; s=arcselector9901; d=microsoft.com; cv=none; b=YRFCYal+8gDWN1sqQwMGV+3DW55/ewFT8TFUvfruEYtv8SJXLyTWQvUglAEwm7DJKTrmV+smzlmVpH+CBEO7PT/XkKGF4ioWDoizFfTOYOecXG9I5NmcTT0P8JutsB0UWleJ6yBuNTao7LoxgQAiodHlXXbDpMjwT3tU3lrgLZ8A5jD1Vi7RzzYtdhvlGR7YW+0Zt3YSKtgqqSGAXPEFduS+miJ4i1tp0vDBRWMRWlpuoFC4D58BhipA/UfXX1FEk810bjL8gFb8OunxShEP9QwSh3Oy5Myy876NHmIbMxcr2DQ1D2yNzI5kJfUWm5YASYpNBeuVksX5mtlqKWbJbg==
ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=microsoft.com; s=arcselector9901; h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-SenderADCheck; bh=M0tilv3r4Zfb+NnKPNnGJCQE1zBxdNBxYZYtZ+7PZvA=; b=m6BX8vGmcoXycDEqI0DnopiKANvaFf9O3mFj/W6yZqDeCM4ntWQ+hDyhb54bDUEf/DeNLUZrKKUgByuo/LNBqQtB0/or8MxTkgDgHtfQDZKBHf0qk92iC1Qb85d/NricyxOrPY7cglA5FVLnYmorpraMNDbGuVULU6Eqc4fXrQ6k75QlFaGqDRdY9fICCorJ62ZpauWrPbqIifUmNkveCKUVidgDD8nA9cRu57OZb1ekgTd2SkM+RR7//IQaM6N85mKMASauVcAoBlG1yNq/NaYHNTsUhDUs5HkreKhMWf9iqmU7mWGaoZoRUtEy1mgDFrondrssB11CQlsV79WvlA==
ARC-Authentication-Results: i=1; mx.microsoft.com 1; spf=pass smtp.mailfrom=cisco.com; dmarc=pass action=none header.from=cisco.com; dkim=pass header.d=cisco.com; arc=none
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=cisco.onmicrosoft.com; s=selector2-cisco-onmicrosoft-com; h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-SenderADCheck; bh=M0tilv3r4Zfb+NnKPNnGJCQE1zBxdNBxYZYtZ+7PZvA=; b=kotZp5V7myiqkczJ+TEXp6z9NC9z1L0PEoFV5IbQZi2+HGV6Lig7TGwZAI14gm8Xsxw3bCAnRQfkQzlOgrzXbSyAz/LC1CrPSnjMI2reUDg+KhmwIOIP8aC78fnjWiVa6AFncaxVhb/u8cRkqvLn5wBiaqqq8ELQl0Ug05yh/gg=
Received: from BN7PR11MB2547.namprd11.prod.outlook.com (2603:10b6:406:af::18) by BN8PR11MB3748.namprd11.prod.outlook.com (2603:10b6:408:86::21) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id 15.20.3499.29; Wed, 4 Nov 2020 12:14:52 +0000
Received: from BN7PR11MB2547.namprd11.prod.outlook.com ([fe80::1dc1:e7f4:84ef:3711]) by BN7PR11MB2547.namprd11.prod.outlook.com ([fe80::1dc1:e7f4:84ef:3711%6]) with mapi id 15.20.3499.032; Wed, 4 Nov 2020 12:14:52 +0000
From: "Bernie Volz (volz)" <volz@cisco.com>
To: "ianfarrer@gmx.com" <ianfarrer@gmx.com>
CC: Jen Linkova <furry13@gmail.com>, Michael Richardson <mcr+ietf@sandelman.ca>, dhcwg <dhcwg@ietf.org>, v6ops list <v6ops@ietf.org>
Thread-Topic: [dhcwg] [v6ops] [EXTERNAL] Re: Question to DHCPv6 Relay Implementors regarding draft-ietf-dhc-dhcpv6-pd-relay-requirements
Thread-Index: AQHWoWMb7h/SuZNgk0iBKtkQ2d57eamVg+CAgAJkrICAFvSAAIAJKGCX
Date: Wed, 04 Nov 2020 12:14:52 +0000
Message-ID: <BDA018BA-70A6-4DC3-92FA-21506C72F6D9@cisco.com>
References: <5F6947F2-F7DF-4907-8DD5-28C2B20A91DE@gmx.com> <CAFU7BAT87uhUKZM-G9MjCgtmGbdCwXorP3SfMJm7_Ax7pvwDjg@mail.gmail.com> <f2a9e0188cd84f52adce279cfb04cbcc@boeing.com> <D259F559-8528-428A-A9DF-0D9FB07E6BE4@gmx.com> <BN7PR11MB2547029C572CB32F3C593AD7CF0B0@BN7PR11MB2547.namprd11.prod.outlook.com> <ff36a6d9f0834b5bbf331c6c40df16b8@boeing.com> <A0B74F43-07A4-47C2-B773-3F2071CFCED3@cisco.com> <CAFU7BARUKw_c2c9+3k9kJ0UqrATTruGKPGkVb5NPTo=vspb0NA@mail.gmail.com> <19432.1602258078@localhost> <644565BC-5818-4244-A34A-1B39C3FC9175@gmx.com> <BYAPR11MB25496B31F581D4E32D46542ACF040@BYAPR11MB2549.namprd11.prod.outlook.com> <CAFU7BARy-GFLDx=jRPu8Mst_Lc9fVRNTMT1MxOpEKqJ+qq9oaw@mail.gmail.com>, <BCD1B4F1-32F3-4ECB-8A97-C4E58D746F22@gmx.com>
In-Reply-To: <BCD1B4F1-32F3-4ECB-8A97-C4E58D746F22@gmx.com>
Accept-Language: en-US
Content-Language: en-US
X-MS-Has-Attach:
X-MS-TNEF-Correlator:
authentication-results: gmail.com; dkim=none (message not signed) header.d=none;gmail.com; dmarc=none action=none header.from=cisco.com;
x-originating-ip: [24.233.121.124]
x-ms-publictraffictype: Email
x-ms-office365-filtering-correlation-id: ebc0f29f-f401-40b6-a5ff-08d880bb3c22
x-ms-traffictypediagnostic: BN8PR11MB3748:
x-microsoft-antispam-prvs: <BN8PR11MB3748CAF54671AEB1CDB42BF1CFEF0@BN8PR11MB3748.namprd11.prod.outlook.com>
x-ms-oob-tlc-oobclassifiers: OLM:10000;
x-ms-exchange-senderadcheck: 1
x-microsoft-antispam: BCL:0;
x-microsoft-antispam-message-info: 3JidtTGftCoyjZtIEcKW3D1nK1zDvltcMyOm91LiYus34lfinkMG5kQYYH1T8mFXiuXk1T0zWmnMdjOBoszEXFPjyc6HWY7c7I5HhXfePmjEMxFR3aC3T3/0LpZv1R12t2ZOoZGtkaXIUjbs0TgYeI8yHE+90rC1jS3OF9R8kGZBCcbbeCiHybznbgmFrc4QYjOsa9Zs4qOxkkNFtbN8yO4cfmFxFoA9R8ZMdo7Pc5wk0+AblB/6w57M9rzI3NJ6qCAFFq7Oo9In6B4Ty0joYDe1tsGqgCfXLC91u6RJQ+seCrEdDfJhlo6yoEQ14P0uNEzzP8qpj6HLW8n7PJt5ZECvhLFEnhUfvm0ofwz2TK74X/1uIq39ogRxuYIrUo0kCR/eA1u+UyufTtRzjE58alcHFnOht+V93BxjNlBFavFQHWxzlIpGnJCLgE0ONshjBqjMJYEEsIOAZ4Qu7Fmpup5OaprqYhjlyUq+MhCNtvY=
x-forefront-antispam-report: CIP:255.255.255.255; CTRY:; LANG:en; SCL:1; SRV:; IPV:NLI; SFV:NSPM; H:BN7PR11MB2547.namprd11.prod.outlook.com; PTR:; CAT:NONE; SFS:(346002)(136003)(376002)(396003)(39860400002)(366004)(5660300002)(6512007)(8676002)(66946007)(91956017)(186003)(66574015)(316002)(71200400001)(8936002)(6486002)(2906002)(6506007)(33656002)(6916009)(86362001)(53546011)(66476007)(76116006)(2616005)(54906003)(478600001)(4326008)(83380400001)(26005)(66556008)(64756008)(966005)(66446008)(36756003)(518174003)(401264004); DIR:OUT; SFP:1101;
x-ms-exchange-antispam-messagedata: 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
x-ms-exchange-transport-forked: True
Content-Type: multipart/alternative; boundary="_000_BDA018BA70A64DC392FA21506C72F6D9ciscocom_"
MIME-Version: 1.0
X-MS-Exchange-CrossTenant-AuthAs: Internal
X-MS-Exchange-CrossTenant-AuthSource: BN7PR11MB2547.namprd11.prod.outlook.com
X-MS-Exchange-CrossTenant-Network-Message-Id: ebc0f29f-f401-40b6-a5ff-08d880bb3c22
X-MS-Exchange-CrossTenant-originalarrivaltime: 04 Nov 2020 12:14:52.8159 (UTC)
X-MS-Exchange-CrossTenant-fromentityheader: Hosted
X-MS-Exchange-CrossTenant-id: 5ae1af62-9505-4097-a69a-c1553ef7840e
X-MS-Exchange-CrossTenant-mailboxtype: HOSTED
X-MS-Exchange-CrossTenant-userprincipalname: mx2uPz95Ht9EWaGX79p8TbYwSsiMxh+j3aJ+KLDEwoUykquO8swQzYSap6aspcVa
X-MS-Exchange-Transport-CrossTenantHeadersStamped: BN8PR11MB3748
X-OriginatorOrg: cisco.com
X-Outbound-SMTP-Client: 173.37.102.12, xch-rcd-002.cisco.com
X-Outbound-Node: alln-core-3.cisco.com
Archived-At: <https://mailarchive.ietf.org/arch/msg/dhcwg/dqEA4hSoOcrsSRqQIejSziYgQBE>
Subject: Re: [dhcwg] [v6ops] [EXTERNAL] Re: Question to DHCPv6 Relay Implementors regarding draft-ietf-dhc-dhcpv6-pd-relay-requirements
X-BeenThere: dhcwg@ietf.org
X-Mailman-Version: 2.1.29
Precedence: list
List-Id: <dhcwg.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/dhcwg>, <mailto:dhcwg-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/dhcwg/>
List-Post: <mailto:dhcwg@ietf.org>
List-Help: <mailto:dhcwg-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/dhcwg>, <mailto:dhcwg-request@ietf.org?subject=subscribe>
X-List-Received-Date: Wed, 04 Nov 2020 12:14:59 -0000

Hi ... looks good but perhaps MAC address is too Ethernet specific and just link-layer address would be better?

- Bernie

On Oct 29, 2020, at 12:24 PM, "ianfarrer@gmx.com" <ianfarrer@gmx.com> wrote:


Hi,

Sorry for the delay in reply, I’ve been out of the office for the last few weeks for various reasons.

Here’s a new wording proposal incorporating Jen & Bernie’s suggestions:

R-4
To prevent routing loops, the relay SHOULD implement a configurable policy to drop packets
received on a DHCP-PD client facing interface with a destination address in a prefix delegated
to a client connected to that interface, as follows:  For point-to-point links, when the packet’s
ingress and egress interfaces match. For multi-access links, when the packet’s ingress and
egress interface match, and the source MAC and next-hop MAC addresses match. An
ICMPv6 Type 1, Code 6 (Destination Unreachable, reject route to destination) error message MAY
be sent as per [RFC4443], section 3.1.  The ICMP policy SHOULD be configurable.

Thanks,
Ian

On 15. Oct 2020, at 03:51, Jen Linkova <furry13@gmail.com<mailto:furry13@gmail.com>> wrote:

On Wed, Oct 14, 2020 at 12:44 AM Bernie Volz (volz) <volz@cisco.com<mailto:volz@cisco.com>> wrote:
If not, perhaps we just say:

R-4
To prevent routing loops, the relay SHOULD implement a configurable policy to drop traffic received from an uplink interface as follows:

I'm not sure 'from an uplink interface' makes sense. In the case of a
routing loop caused by an amnesiac DHCP-PD client it would be a
downstream interface.
The scenario when such traffic arrives from an uplink interface is
'the uplink router believes the prefix is delegated to the client but
the relay does not have a route pointing to the client so it sends
traffic back' - so more likely 'an amnesiac relay' case.

For point-to-point links, when the packet's ingress and egress interfaces match. For multi-access links, when the packet's ingress and egress interface match, and the source MAC and next-hop MAC addresses match. An ICMPv6 Type 1, Code 6 (Destination Unreachable, reject route to
destination) error message MAY be sent as per [RFC4443], section 3.1.  The ICMP policy SHOULD be configurable.

- Bernie

-----Original Message-----
From: ianfarrer@gmx.com<mailto:ianfarrer@gmx.com> <ianfarrer@gmx.com<mailto:ianfarrer@gmx.com>>
Sent: Tuesday, October 13, 2020 9:16 AM
To: Michael Richardson <mcr+ietf@sandelman.ca<mailto:mcr+ietf@sandelman.ca>>; Jen Linkova <furry13@gmail.com<mailto:furry13@gmail.com>>
Cc: Bernie Volz (volz) <volz@cisco.com<mailto:volz@cisco.com>>; dhcwg <dhcwg@ietf.org<mailto:dhcwg@ietf.org>>; 6man <ipv6@ietf.org<mailto:ipv6@ietf.org>>; v6ops list <v6ops@ietf.org<mailto:v6ops@ietf.org>>
Subject: Re: [dhcwg] [v6ops] [EXTERNAL] Re: Question to DHCPv6 Relay Implementors regarding draft-ietf-dhc-dhcpv6-pd-relay-requirements

Hi,

Thanks for all of the discussion on this. We’ve reworked the requirement as follows:

R-4
To prevent routing loops, the relay SHOULD implement a configurable policy to drop client traffic as follows:  For point-to-point links, when the packet's ingress and egress interfaces match. For multi-access links, when the packet's ingress and egress interface match, and the source MAC and next-hop MAC addresses match. An ICMPv6 Type 1, Code 6 (Destination Unreachable, reject route to
destination) error message MAY be sent back to the client.  The ICMP policy SHOULD be configurable.

Thanks,
Ian

On 9. Oct 2020, at 17:41, Michael Richardson <mcr+ietf@sandelman.ca<mailto:mcr+ietf@sandelman.ca>> wrote:


Jen Linkova <furry13@gmail.com<mailto:furry13@gmail.com>> wrote:
I think there is confusion re: the scenario we are talking about.
I've attached the diagram for the case which concerns me.
So:
- The Relay R has an interface eth0 connected to a switch S.
- Devices A and B are connected to the same switch and using R as a
default gateway.
- The prefix 2001:db8::/56 was delegated to a client A via the relay R.

a friendly amendment to your example to aid in human comprehension:
   } - The prefix 2001:db8:0000:0123:/64 was delegated to a client A via the relay R.
   }  - R installs a route for 2001:db8:0000:0123:/64 towards A via eth0.

- The device B (which has an address NOT from the delegated prefix,
but from another /64 assigned to that common link, let's sat
2001:db8:cafe::/64) sends a packet to an address from the delegated

now, my brain can more clearly see that 2001:db8:cafe::/64 is not
within 2001:db8:0000:0123:/64, while I had to use a few extra brain
cells to see that it wasn't in that ::/56 :-)

What I'd expect to happen (with DHCP-PD or without - e.g. if R has a
static route towards A, not a dynamic route produced by PD):
- the packet is sent to A. Well, if A does not have a route to
2001:db8::42 then indeed a routing loop might happen. But if A does
have a route, the packet will be delivered.

What seems to be required by R4:
- R detects that the packet is received via eth0 and needs to be sent
back to eth0. R4 seems to require such packets to be dropped.
So if B would never be able to communicate to any address in the
delegated prefix, right?

Am I missing anything?

I think that you got it right.

Perhaps the missing piece of the rule is don’t send it back to where it came from, based on link layer addresses (or link if point-to-point).

Yes. If R4 was saying 'drop the packet if it comes from the same
link-layer address you are going to send it back' - it would make
total sense. But I don't think routers do *that*.

Yes, if we made the check on L2 address, then it would work.
And I agree that routers are exactly doing that.

I think that it also works if B is a router with additional interfaces
downstream, unless there are multiple paths.

--
Michael Richardson <mcr+IETF@sandelman.ca<mailto:mcr+IETF@sandelman.ca>>   . o O ( IPv6 IøT consulting )
         Sandelman Software Works Inc, Ottawa and Worldwide

--------------------------------------------------------------------
IETF IPv6 working group mailing list
ipv6@ietf.org<mailto:ipv6@ietf.org>
Administrative Requests: https://www.ietf.org/mailman/listinfo/ipv6
--------------------------------------------------------------------



--
SY, Jen Linkova aka Furry