RE: Liaison from BBF

David Allan I <david.i.allan@ericsson.com> Mon, 09 November 2009 23:31 UTC

Return-Path: <david.i.allan@ericsson.com>
X-Original-To: ipv6@core3.amsl.com
Delivered-To: ipv6@core3.amsl.com
Received: from localhost (localhost [127.0.0.1]) by core3.amsl.com (Postfix) with ESMTP id 3279A3A68A0 for <ipv6@core3.amsl.com>; Mon, 9 Nov 2009 15:31:49 -0800 (PST)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -6.451
X-Spam-Level:
X-Spam-Status: No, score=-6.451 tagged_above=-999 required=5 tests=[AWL=0.148, BAYES_00=-2.599, RCVD_IN_DNSWL_MED=-4]
Received: from mail.ietf.org ([64.170.98.32]) by localhost (core3.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id htwSYmgH9CtT for <ipv6@core3.amsl.com>; Mon, 9 Nov 2009 15:31:48 -0800 (PST)
Received: from imr2.ericy.com (imr2.ericy.com [198.24.6.3]) by core3.amsl.com (Postfix) with ESMTP id 4CDA73A6819 for <ipv6@ietf.org>; Mon, 9 Nov 2009 15:31:45 -0800 (PST)
Received: from eusrcmw751.eamcs.ericsson.se (eusrcmw751.exu.ericsson.se [138.85.77.51]) by imr2.ericy.com (8.13.1/8.13.1) with ESMTP id nA9NWA0T030659; Mon, 9 Nov 2009 17:32:11 -0600
Received: from eusrcmw750.eamcs.ericsson.se ([138.85.77.50]) by eusrcmw751.eamcs.ericsson.se with Microsoft SMTPSVC(6.0.3790.3959); Mon, 9 Nov 2009 17:31:25 -0600
Received: from eusaamw0706.eamcs.ericsson.se ([147.117.20.31]) by eusrcmw750.eamcs.ericsson.se with Microsoft SMTPSVC(6.0.3790.3959); Mon, 9 Nov 2009 17:31:25 -0600
Received: from EUSAACMS0703.eamcs.ericsson.se ([169.254.1.4]) by eusaamw0706.eamcs.ericsson.se ([147.117.20.31]) with mapi; Mon, 9 Nov 2009 18:31:24 -0500
From: David Allan I <david.i.allan@ericsson.com>
To: Thomas Narten <narten@us.ibm.com>
Date: Mon, 09 Nov 2009 18:31:23 -0500
Subject: RE: Liaison from BBF
Thread-Topic: Liaison from BBF
Thread-Index: AcphTaDjP3GoDl4hSZO8gFBVNP6WTwARDmGA
Message-ID: <60C093A41B5E45409A19D42CF7786DFD4DEDE9C26C@EUSAACMS0703.eamcs.ericsson.se>
References: <60C093A41B5E45409A19D42CF7786DFD4DEDE9BC10@EUSAACMS0703.eamcs.ericsson.se> <200911091500.nA9F0PSm002116@cichlid.raleigh.ibm.com>
In-Reply-To: <200911091500.nA9F0PSm002116@cichlid.raleigh.ibm.com>
Accept-Language: en-US
Content-Language: en-US
X-MS-Has-Attach:
X-MS-TNEF-Correlator:
acceptlanguage: en-US
Content-Type: text/plain; charset="us-ascii"
Content-Transfer-Encoding: quoted-printable
MIME-Version: 1.0
X-OriginalArrivalTime: 09 Nov 2009 23:31:25.0131 (UTC) FILETIME=[C0CEC1B0:01CA6194]
Cc: "ipv6@ietf.org" <ipv6@ietf.org>
X-BeenThere: ipv6@ietf.org
X-Mailman-Version: 2.1.9
Precedence: list
List-Id: "IPv6 Maintenance Working Group \(6man\)" <ipv6.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/listinfo/ipv6>, <mailto:ipv6-request@ietf.org?subject=unsubscribe>
List-Archive: <http://www.ietf.org/mail-archive/web/ipv6>
List-Post: <mailto:ipv6@ietf.org>
List-Help: <mailto:ipv6-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/ipv6>, <mailto:ipv6-request@ietf.org?subject=subscribe>
X-List-Received-Date: Mon, 09 Nov 2009 23:31:49 -0000

HI Thomas:

Unfortunately having just changed jobs I'm having trouble exactly recreating all my sources of information...

The following was one anecdotal example offered during our discussions in the spring..."...in a real nationwide telco today with approximately 3.5million DSL ports there is about 300-400 duplicate MAC@ alarms active on the DSLAMs at any time, and this is only where 2 of the same MAC@ appear on the same DSLAM (384-1000 users each)..."

TO take it back up a notch...

In a perfect world where all MACs were properly unique and all implementations correctly constructed link local via EUI-64 we'd all be happy campers, it works as intended. Unfortunately that is not the case and we seem to have a hierarchy of grief.....

1) Some carriers have deployed MAC address translation in the Access node/DSLAM to ensure MAC uniqueness. This means ALG functionality is required for Ethernet OAM and other protocols, and while fixing MAC uniqueness, does not address duplicates in link local construction unless NAT of the lower 64 bits of LLA is included in the mix.

2) Our liaisons with IEEE on the subject and some proposals to the forum focus on the fact that uniquness only needs to exist in a given Ethernet broadcast domain, hence keeping a few extra VLANs in the back pocket to shift duplicate customers to solves the problem, and my math suggested this would inflate VID usage by a corresponding few percent. Issue being this then breaks down if the link local address is not constructed from the MAC, and RFCs have been trotted out at the BBF on NOT using the EUI-64 specifically to defeat traffic analysis attacks. This being an expected deployment scenario when wireless media in the home is considered and an emerging class of FMC capable terminals is deployed. 

So a solution analogous to DAD appears to be needed, that originates with the edge router, where if the detected duplicate does not subsequently behave in a prescribed manner service may then be denied in the interest of the common good. As DAD is already deployed that would appear to be a path of least resistance vs waiting years for a roll out of a fix. However if my memory serves correctly, unicast from the edge router would be a desirable form and I am unsure if that is supported in standards or implementations...

Cheers
D





-----Original Message-----
From: Thomas Narten [mailto:narten@us.ibm.com] 
Sent: Tuesday, November 10, 2009 12:00 AM
To: David Allan I
Cc: ipv6@ietf.org
Subject: Re: Liaison from BBF

Sorry, I still don't get it. We need more detail!

Two things stand out:

> If two devices happen to have the same Ethernet MAC address as a 
> consequence of incompetent manufacture, the link-local address derived 
> for that interface will also be non-unique, provided it is derived 
> from the EUI-64 identifier. This has been identified as an 
> inconveniently frequent scenario (impacting ~4% of access nodes at any 
> given time)

this 4% figure seems *very* high. Can you please provide more details on how you reached that number?

Also, if you have two devices on the same link sharing the same MAC address, you have problems. Period. Having duplicate IP addresses is only one symptom. If you fix that problem, but still have duplicate MAC addresses in use, it is not clear to me that your network will function correctly. Have you done the analysis to be sure that the duplicate MAC address scenario is something that is solvable in practice?

> When numerous hosts share an Ethernet broadcast domain, the BNG/edge 
> router needs to support a mechanism that ensures duplicate link-local 
> addresses can be handled correctly without necessarily depending on 
> cooperative action by the hosts
> 
> it is explicitly required to do something to make this happen

Again, it is not clear to me what "handling correctly" even means.

Finally, the charts say you are worried about a "malicious user"
sending out bogus ND packets. ND simply can't deal with this sort of hostile environment, and there is no easy way to fix this. Is that what you are asking this group to fix?

For that matter, ARP doesn't address this problem either. Is there a new problem that shows up with IPv6 that didn't exist with IPv4? And if not, what is wrong with using the IPv4 solutions (assuming they exist)?

Thomas