Last Call: <draft-ietf-6man-enhanced-dad-12.txt> (Enhanced Duplicate Address Detection) to Proposed Standard

The IESG <> Tue, 20 January 2015 14:57 UTC

Return-Path: <>
Received: from localhost ( []) by (Postfix) with ESMTP id BCEA61B2A88; Tue, 20 Jan 2015 06:57:36 -0800 (PST)
X-Virus-Scanned: amavisd-new at
X-Spam-Flag: NO
X-Spam-Score: -101.9
X-Spam-Status: No, score=-101.9 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, USER_IN_WHITELIST=-100] autolearn=ham
Received: from ([]) by localhost ( []) (amavisd-new, port 10024) with ESMTP id uIjxMAHrg5lJ; Tue, 20 Jan 2015 06:57:35 -0800 (PST)
Received: from (localhost [IPv6:::1]) by (Postfix) with ESMTP id 31A711B2DB6; Tue, 20 Jan 2015 06:57:35 -0800 (PST)
Content-Type: text/plain; charset="us-ascii"
MIME-Version: 1.0
Content-Transfer-Encoding: 7bit
From: The IESG <>
To: IETF-Announce <>
Subject: Last Call: <draft-ietf-6man-enhanced-dad-12.txt> (Enhanced Duplicate Address Detection) to Proposed Standard
X-Test-IDTracker: no
X-IETF-IDTracker: 5.10.0.p8
Auto-Submitted: auto-generated
Precedence: bulk
Message-ID: <>
Date: Tue, 20 Jan 2015 06:57:35 -0800
Archived-At: <>
X-Mailman-Version: 2.1.15
List-Id: "IETF announcement list. No discussions." <>
List-Unsubscribe: <>, <>
List-Archive: <>
List-Post: <>
List-Help: <>
List-Subscribe: <>, <>
X-List-Received-Date: Tue, 20 Jan 2015 14:57:36 -0000

The IESG has received a request from the IPv6 Maintenance WG (6man) to
consider the following document:
- 'Enhanced Duplicate Address Detection'
  <draft-ietf-6man-enhanced-dad-12.txt> as Proposed Standard

The IESG plans to make a decision in the next few weeks, and solicits
final comments on this action. Please send substantive comments to the mailing lists by 2015-02-03. Exceptionally, comments may be
sent to instead. In either case, please retain the
beginning of the Subject line to allow automated sorting.


   IPv6 Loopback Suppression and Duplicate Address Detection (DAD) are
   discussed in Appendix A of RFC4862.  That specification mentions a
   hardware-assisted mechanism to detect looped back DAD messages.  If
   hardware cannot suppress looped back DAD messages, a software
   solution is required.  Several service provider communities have
   expressed a need for automated detection of looped back Neighbor
   Discovery (ND) messages used by DAD.  This document includes
   mitigation techniques and outlines the Enhanced DAD algorithm to
   automate the detection of looped back IPv6 ND messages used by DAD.
   For network loopback tests, the Enhanced DAD algorithm allows IPv6 to
   self-heal after a loopback is placed and removed.  Further, for
   certain access networks the document automates resolving a specific
   duplicate address conflict.  This document updates RFC4861, RFC4862,
   and RFC4429.

The file can be obtained via

IESG discussion can be tracked via

No IPR declarations have been submitted directly on this I-D.