Re: [6man] New Version Notification for draft-nordmark-6man-impatient-nud-00.txt

Erik Nordmark <nordmark@acm.org> Tue, 24 May 2011 17:45 UTC

Return-Path: <nordmark@acm.org>
X-Original-To: ipv6@ietfa.amsl.com
Delivered-To: ipv6@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 01810E0782 for <ipv6@ietfa.amsl.com>; Tue, 24 May 2011 10:45:56 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -102.932
X-Spam-Level:
X-Spam-Status: No, score=-102.932 tagged_above=-999 required=5 tests=[AWL=-0.333, BAYES_00=-2.599, USER_IN_WHITELIST=-100]
Received: from mail.ietf.org ([64.170.98.30]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id SUg6Z1EhiZuh for <ipv6@ietfa.amsl.com>; Tue, 24 May 2011 10:45:55 -0700 (PDT)
Received: from a.mail.sonic.net (a.mail.sonic.net [64.142.16.245]) by ietfa.amsl.com (Postfix) with ESMTP id 75A0AE077B for <ipv6@ietf.org>; Tue, 24 May 2011 10:45:55 -0700 (PDT)
Received: from [171.70.217.188] (dhcp-171-70-217-188.cisco.com [171.70.217.188]) (authenticated bits=0) by a.mail.sonic.net (8.13.8.Beta0-Sonic/8.13.7) with ESMTP id p4OHjnVN013564 (version=TLSv1/SSLv3 cipher=AES256-SHA bits=256 verify=NO); Tue, 24 May 2011 10:45:50 -0700
Message-ID: <4DDBEECF.2010307@acm.org>
Date: Tue, 24 May 2011 10:45:51 -0700
From: Erik Nordmark <nordmark@acm.org>
User-Agent: Mozilla/5.0 (Macintosh; U; Intel Mac OS X 10.6; en-US; rv:1.9.2.17) Gecko/20110414 Lightning/1.0b2 Thunderbird/3.1.10
MIME-Version: 1.0
To: Philip Homburg <pch-v6ops@u-1.phicoh.com>
Subject: Re: [6man] New Version Notification for draft-nordmark-6man-impatient-nud-00.txt
References: <m1QObow-0001hFC@stereo.hq.phicoh.net> <4DDACD31.9020602@globis.net> <m1QOcaZ-0001hFC@stereo.hq.phicoh.net>
In-Reply-To: <m1QOcaZ-0001hFC@stereo.hq.phicoh.net>
Content-Type: text/plain; charset="ISO-8859-1"; format="flowed"
Content-Transfer-Encoding: 7bit
Cc: Ray Hunter <v6ops@globis.net>, ipv6@ietf.org
X-BeenThere: ipv6@ietf.org
X-Mailman-Version: 2.1.12
Precedence: list
List-Id: "IPv6 Maintenance Working Group \(6man\)" <ipv6.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/ipv6>, <mailto:ipv6-request@ietf.org?subject=unsubscribe>
List-Archive: <http://www.ietf.org/mail-archive/web/ipv6>
List-Post: <mailto:ipv6@ietf.org>
List-Help: <mailto:ipv6-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/ipv6>, <mailto:ipv6-request@ietf.org?subject=subscribe>
X-List-Received-Date: Tue, 24 May 2011 17:45:56 -0000

On 5/23/11 2:22 PM, Philip Homburg wrote:

> But for relatively stable links consisting of just BGP peers, it may make more
> sense to just hardwire the ND entries and disable ND.

FWIW RFC 4861 allows for this.

Section 7.3 says:
    Neighbor Unreachability Detection is used for all paths between hosts
    and neighboring nodes, including host-to-host, host-to-router, and
    router-to-host communication.  Neighbor Unreachability Detection may
    also be used between routers, but is not required if an equivalent
    mechanism is available, for example, as part of the routing
    protocols.

    Erik