Re: [Efficientnd-dt] "DAD issues" draft

Erik Nordmark <nordmark@sonic.net> Thu, 23 October 2014 23:27 UTC

Return-Path: <nordmark@sonic.net>
X-Original-To: efficientnd-dt@ietfa.amsl.com
Delivered-To: efficientnd-dt@ietfa.amsl.com
Received: from localhost (ietfa.amsl.com [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 714451A6F5D for <efficientnd-dt@ietfa.amsl.com>; Thu, 23 Oct 2014 16:27:57 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -2.61
X-Spam-Level:
X-Spam-Status: No, score=-2.61 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, RCVD_IN_DNSWL_LOW=-0.7, T_RP_MATCHES_RCVD=-0.01] autolearn=ham
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id fI7RhN68SgWw for <efficientnd-dt@ietfa.amsl.com>; Thu, 23 Oct 2014 16:27:55 -0700 (PDT)
Received: from d.mail.sonic.net (d.mail.sonic.net [64.142.111.50]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id 054461A1BC0 for <efficientnd-dt@ietf.org>; Thu, 23 Oct 2014 16:27:54 -0700 (PDT)
Received: from [172.20.28.121] ([205.167.46.2]) (authenticated bits=0) by d.mail.sonic.net (8.14.9/8.14.9) with ESMTP id s9NNRorw004241 (version=TLSv1/SSLv3 cipher=DHE-RSA-AES256-SHA bits=256 verify=NOT); Thu, 23 Oct 2014 16:27:51 -0700
Message-ID: <54498EEE.8010006@sonic.net>
Date: Thu, 23 Oct 2014 16:27:42 -0700
From: Erik Nordmark <nordmark@sonic.net>
User-Agent: Mozilla/5.0 (Macintosh; Intel Mac OS X 10.10; rv:31.0) Gecko/20100101 Thunderbird/31.2.0
MIME-Version: 1.0
To: Andrew Yourtchenko <ayourtch@cisco.com>, efficientnd-dt@ietf.org
References: <alpine.OSX.2.00.1410152204250.57244@ayourtch-mac>
In-Reply-To: <alpine.OSX.2.00.1410152204250.57244@ayourtch-mac>
Content-Type: text/plain; charset="windows-1252"; format="flowed"
Content-Transfer-Encoding: 7bit
X-Sonic-CAuth: UmFuZG9tSVbYr6d2NIHy3BcAM3kYRWJJxzGzXmu+6tYC77irEIRmRlfbbx4gzF6cC5CwzSaYhplUAuyeFef42Ht03vdvJV/b
X-Sonic-ID: C;npCkNAxb5BGkTAAb/FJGkA== M;vqnANAxb5BGkTAAb/FJGkA==
X-Sonic-Spam-Details: 0.0/5.0 by cerberusd
Archived-At: http://mailarchive.ietf.org/arch/msg/efficientnd-dt/ktdOh_1wKMGNK0TaZm9hbUL9vk4
Subject: Re: [Efficientnd-dt] "DAD issues" draft
X-BeenThere: efficientnd-dt@ietf.org
X-Mailman-Version: 2.1.15
Precedence: list
List-Id: 6man Efficient ND Design Team discussion list <efficientnd-dt.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/efficientnd-dt>, <mailto:efficientnd-dt-request@ietf.org?subject=unsubscribe>
List-Archive: <http://www.ietf.org/mail-archive/web/efficientnd-dt/>
List-Post: <mailto:efficientnd-dt@ietf.org>
List-Help: <mailto:efficientnd-dt-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/efficientnd-dt>, <mailto:efficientnd-dt-request@ietf.org?subject=subscribe>
X-List-Received-Date: Thu, 23 Oct 2014 23:27:57 -0000

On 10/15/14 1:07 PM, Andrew Yourtchenko wrote:
> 3.  Interaction with Spanning Tree Protocol
>
>     When a port on an STP-enabled switch comes up, it goes through three
>     phases of Listening then Learning then Forwarding.  The default is to
>     keep it for 15 seconds in Listening and 15 seconds in Learning
>     states.  During this time no user traffic is forwarded by the switch
>     from and to this port.  Therefore, if a DAD process happens during
>     this period it is guaranteed to not detect any duplicates.  This
>     results in DAD being ineffective for link-local and otherwise pre
>     configured addresses.

STP is one instance of a somewhat predictable outage.
If a link uses some modems (e.g., DSL and cable modems whose up/down 
status is not visible to the IP stack) we could also have outages that 
last for tens of seconds making DAD be ineffective. Thus it might make 
sense to add a sentence about this being a more general issue than only STP.


> 7.  Partition-join tolerance
>
>     [RFC4862] explicitly mentions this problem: "Note that the method for
>     detecting duplicates is not completely reliable, and it is possible
>     that duplicate addresses will still exist (e.g., if the link was
>     partitioned while Duplicate Address Detection was performed)."
It might make sense to add a reference to ACD (RFC 5227) as an example 
of a way to detect duplicates in IPv4/ARP - at the cost of broadcast ARP 
responses.

    Erik