Re: Last Call: <draft-ietf-6man-rfc4291bis-07.txt> (IP Version 6 Addressing Architecture) to Internet Standard

Jared Mauch <> Fri, 24 February 2017 03:05 UTC

Return-Path: <>
Received: from localhost (localhost []) by (Postfix) with ESMTP id D1927129AF9; Thu, 23 Feb 2017 19:05:41 -0800 (PST)
X-Virus-Scanned: amavisd-new at
X-Spam-Flag: NO
X-Spam-Score: -4.203
X-Spam-Status: No, score=-4.203 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, RCVD_IN_DNSWL_MED=-2.3, RP_MATCHES_RCVD=-0.001, SPF_HELO_PASS=-0.001, SPF_PASS=-0.001] autolearn=ham autolearn_force=no
Received: from ([]) by localhost ( []) (amavisd-new, port 10024) with ESMTP id kgw40jKK6_oc; Thu, 23 Feb 2017 19:05:40 -0800 (PST)
Received: from ( []) by (Postfix) with ESMTP id D5D9C129A9A; Thu, 23 Feb 2017 19:05:40 -0800 (PST)
Received: from [IPv6:2603:3015:3603:8e00:c505:8fff:dbfd:7e6f] (unknown [IPv6:2603:3015:3603:8e00:c505:8fff:dbfd:7e6f]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by (Postfix) with ESMTPSA id E9221540C70; Thu, 23 Feb 2017 22:05:23 -0500 (EST)
Content-Type: text/plain; charset=utf-8
Mime-Version: 1.0 (Mac OS X Mail 10.2 \(3259\))
Subject: Re: Last Call: <draft-ietf-6man-rfc4291bis-07.txt> (IP Version 6 Addressing Architecture) to Internet Standard
From: Jared Mauch <>
In-Reply-To: <>
Date: Thu, 23 Feb 2017 22:05:22 -0500
Content-Transfer-Encoding: quoted-printable
Message-Id: <>
References: <20170221101339.GC84656@Vurt.local> <> <54c81141-e4f5-4436-9479-9c02be6c09bb@Spark> <> <> <> <4936e96b-fc82-4de0-9188-ced9547deb2f@Spark> <> <> <> <> <>
To: Lorenzo Colitti <>
X-Mailer: Apple Mail (2.3259)
Archived-At: <>
Cc:,, 6man WG <>, IETF-Discussion Discussion <>
X-Mailman-Version: 2.1.17
Precedence: list
List-Id: "IPv6 Maintenance Working Group \(6man\)" <>
List-Unsubscribe: <>, <>
List-Archive: <>
List-Post: <>
List-Help: <>
List-Subscribe: <>, <>
X-List-Received-Date: Fri, 24 Feb 2017 03:05:42 -0000

> On Feb 22, 2017, at 10:56 AM, Lorenzo Colitti <> wrote:
> RFC6583-style attacks (of which the class addressed by RFC6164 is a subset) are low payoff and pretty easy to mitigate using very small changes to ND implementations

The duration of time it takes to roll out new code is measured in years in a backbone.  Some vendors are still missing negative-arp caching for v4 in 2017, so I’m having trouble treating this as a low-payoff attack.  Even when it’s not intended as an attack, the side-effects are well documented, and is something the IETF NOC team has experienced first-hand.

Not all vendors, hardware or implementations are equal, and convergence here takes some time.  Setting the right standard in the first place helps, and when doing a -bis, it’s furthermore important to incorporate the operational lessons learned.  If the WG decides to not listen, that’s certainly it’s prerogative but does not move the standards forward.

For me, this is just one of many things in IPv6 that requires servicing, so not the end of the world if this one doesn’t get fixed, but being overly prescriptive here is begging for trouble.

- Jared