RE: RFC4941bis: consequences of many addresses for the network

"Pascal Thubert (pthubert)" <pthubert@cisco.com> Thu, 23 January 2020 10:26 UTC

Return-Path: <pthubert@cisco.com>
X-Original-To: ipv6@ietfa.amsl.com
Delivered-To: ipv6@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 3F52D120178 for <ipv6@ietfa.amsl.com>; Thu, 23 Jan 2020 02:26:54 -0800 (PST)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -14.498
X-Spam-Level:
X-Spam-Status: No, score=-14.498 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, DKIM_SIGNED=0.1, DKIM_VALID=-0.1, DKIM_VALID_AU=-0.1, RCVD_IN_DNSWL_HI=-5, RCVD_IN_MSPIKE_H3=0.001, RCVD_IN_MSPIKE_WL=0.001, SPF_PASS=-0.001, URIBL_BLOCKED=0.001, USER_IN_DEF_DKIM_WL=-7.5] autolearn=ham autolearn_force=no
Authentication-Results: ietfa.amsl.com (amavisd-new); dkim=pass (1024-bit key) header.d=cisco.com header.b=EBjg6ynQ; dkim=pass (1024-bit key) header.d=cisco.onmicrosoft.com header.b=0Upn/kew
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id vbDeSVz-BMOa for <ipv6@ietfa.amsl.com>; Thu, 23 Jan 2020 02:26:52 -0800 (PST)
Received: from rcdn-iport-2.cisco.com (rcdn-iport-2.cisco.com [173.37.86.73]) (using TLSv1.2 with cipher DHE-RSA-SEED-SHA (128/128 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id 7E06F12001E for <ipv6@ietf.org>; Thu, 23 Jan 2020 02:26:52 -0800 (PST)
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/simple; d=cisco.com; i=@cisco.com; l=4032; q=dns/txt; s=iport; t=1579775212; x=1580984812; h=from:to:subject:date:message-id:references:in-reply-to: content-transfer-encoding:mime-version; bh=fndb62MnNcB77pEhgdipIW01bGscGY+6OQGNxpWS6FM=; b=EBjg6ynQua5ChSBvMzObaT8qbEiy3k5NvQjbSN1HjEpbkViZN0uZ/1GT zP7Drdo4SZVvb19hANiqnGk10RBL6QfpuqbdLlG+Yk7EqCTrGZ84lJLjR drt2usVdBDMTI8mowLVWcp25oUG0QaklDrNmpNf1zBqz1Qg/YuidKWKta I=;
IronPort-PHdr: 9a23:+sPdJhH4+4qIVm26zhs3u51GYnJ96bzpIg4Y7IYmgLtSc6Oluo7vJ1Hb+e4z1Q3SRYuO7fVChqKWqK3mVWEaqbe5+HEZON0pNVcejNkO2QkpAcqLE0r+eeb2bzEwEd5efFRk5Hq8d0NSHZW2ag==
X-IronPort-Anti-Spam-Filtered: true
X-IronPort-Anti-Spam-Result: A0DsDABMdCle/4QNJK1lHQEBAQkBEQUFAYF7gVRQBWxYIAQLKodYA4sKToIRmA+CUgNUCQEBAQwBARgLCgIBAYRAAoIeJDgTAgMNAQEEAQEBAgEFBG2FNwyFXgEBAQEDAQEQKAYBASwMCwQCAQgRBAEBHxAnCx0IAgQBEggRCYMFgkoDLgECDKIlAoE5iGGCJ4J/AQEFhQsYggwDBoE4hRuEM4JJGoFBP4ERR4JMPoEEgWABAQOBYoNAgiyNPCSheAqCOYdAhUOJTJp3jl6IYpImAgQCBAUCDgEBBYFpIoFYcBU7gmxQGA2IAYNzhRSFP3SBKYoTLIIXAQE
X-IronPort-AV: E=Sophos;i="5.70,353,1574121600"; d="scan'208";a="710504784"
Received: from alln-core-10.cisco.com ([173.36.13.132]) by rcdn-iport-2.cisco.com with ESMTP/TLS/DHE-RSA-SEED-SHA; 23 Jan 2020 10:26:51 +0000
Received: from XCH-RCD-006.cisco.com (xch-rcd-006.cisco.com [173.37.102.16]) by alln-core-10.cisco.com (8.15.2/8.15.2) with ESMTPS id 00NAQpi2025039 (version=TLSv1.2 cipher=AES256-SHA bits=256 verify=FAIL); Thu, 23 Jan 2020 10:26:51 GMT
Received: from xhs-rtp-001.cisco.com (64.101.210.228) by XCH-RCD-006.cisco.com (173.37.102.16) with Microsoft SMTP Server (TLS) id 15.0.1473.3; Thu, 23 Jan 2020 04:26:50 -0600
Received: from xhs-rtp-002.cisco.com (64.101.210.229) by xhs-rtp-001.cisco.com (64.101.210.228) with Microsoft SMTP Server (TLS) id 15.0.1473.3; Thu, 23 Jan 2020 05:26:49 -0500
Received: from NAM12-DM6-obe.outbound.protection.outlook.com (64.101.32.56) by xhs-rtp-002.cisco.com (64.101.210.229) with Microsoft SMTP Server (TLS) id 15.0.1473.3 via Frontend Transport; Thu, 23 Jan 2020 05:26:49 -0500
ARC-Seal: i=1; a=rsa-sha256; s=arcselector9901; d=microsoft.com; cv=none; b=UyCqLrGVBPKA2COp6t0O6pNyJm5qDJfGhJ+LeYq7L5DcGT3EWt4hatDae72QeK+9HGzwPIXEaxccyOrDl89c7J8724RDGIfWnD7SDxu3bkTDZ8d1P4bo1w7O4RSjMc6WHZq/WmRVmpri0mAdrXOAcgukgYwzz8jiMVx65Wx1T6Xmpa209z1m1gUs9Fs/A66VhRElcVx7n8wQ+svm/3inYYy4Z6UnGACZ+605PLVn/xg9gdaXS50145Fekkveqi3XevXah0mb3pqQ2Lb9FQFgK5QPIjXbFb6M6FKmcof0OlPWdPmM0ZP+Y8w4qhY5gmK/EJ9RuAYnUl76cyp47CI6jw==
ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=microsoft.com; s=arcselector9901; h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-SenderADCheck; bh=tJ5tmi7oTMLHm0PMrLuWyvQgfFE/RUMeeY6WxX7VFx0=; b=mL4le53tDkV9gyi0pouNCOH6c1gXRmUI6Zrt1Df5dF64pXmtVs64nAZCi31FxmvF9jMeRHrHh4vfjV8VBqyE47+qr+H+X38w+V+AEetcIdXY+2M5qxMSDHnq/SMFLiBA+1uhAmMwqKFImO7m85KfxtcVEQOlbjSoGHVM9N4skDYbcjzIM8gX98DHPDTvZU6omVH1qz0sAb/p0fNWVPVCSU/v9JGDmPa0bHhQqWfa73JkAB7EA348uEYlpawWOBxXZvWrzZM49b/T79hitF53E8dqxs0kDQW/vaMF0K5a4h+42Si60/1pWz2BhqQIgUxJu3b7y26L4XL14BxlFOf/KA==
ARC-Authentication-Results: i=1; mx.microsoft.com 1; spf=pass smtp.mailfrom=cisco.com; dmarc=pass action=none header.from=cisco.com; dkim=pass header.d=cisco.com; arc=none
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=cisco.onmicrosoft.com; s=selector2-cisco-onmicrosoft-com; h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-SenderADCheck; bh=tJ5tmi7oTMLHm0PMrLuWyvQgfFE/RUMeeY6WxX7VFx0=; b=0Upn/kewVNjZITlLWLuNOKItLxVgg3LDlM4fePZ3vCdHCDhmYSj1BKdEDSuitU2y3Xk+muoT0OoxOCvFsHNzYF2e6+oLDwNSo62Vae+stCNPoH71Xy2GWMUfCyaNMKpCvJAIfjlQkdRjoZhN3+xFZmE/cjEXK+TgKVUx7dOf+lE=
Received: from MN2PR11MB3565.namprd11.prod.outlook.com (20.178.250.159) by MN2PR11MB3806.namprd11.prod.outlook.com (20.178.254.82) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id 15.20.2644.24; Thu, 23 Jan 2020 10:26:48 +0000
Received: from MN2PR11MB3565.namprd11.prod.outlook.com ([fe80::fd76:1534:4f9a:452a]) by MN2PR11MB3565.namprd11.prod.outlook.com ([fe80::fd76:1534:4f9a:452a%3]) with mapi id 15.20.2644.027; Thu, 23 Jan 2020 10:26:48 +0000
From: "Pascal Thubert (pthubert)" <pthubert@cisco.com>
To: "otroan@employees.org" <otroan@employees.org>, 6man WG <ipv6@ietf.org>
Subject: RE: RFC4941bis: consequences of many addresses for the network
Thread-Topic: RFC4941bis: consequences of many addresses for the network
Thread-Index: AQHV0ct5x17hjGfK3kqevW8Gxhyx/qf4Apww
Date: Thu, 23 Jan 2020 10:26:34 +0000
Deferred-Delivery: Thu, 23 Jan 2020 10:25:53 +0000
Message-ID: <MN2PR11MB3565330989D411525D30B90DD80F0@MN2PR11MB3565.namprd11.prod.outlook.com>
References: <03C832CE-7282-4320-BF1B-4CB7167FE6BE@employees.org>
In-Reply-To: <03C832CE-7282-4320-BF1B-4CB7167FE6BE@employees.org>
Accept-Language: fr-FR, en-US
Content-Language: en-US
X-MS-Has-Attach:
X-MS-TNEF-Correlator:
authentication-results: spf=none (sender IP is ) smtp.mailfrom=pthubert@cisco.com;
x-originating-ip: [2a01:cb1d:4ec:2200:d60:aaf3:e8aa:949a]
x-ms-publictraffictype: Email
x-ms-office365-filtering-correlation-id: 45311b9b-e310-4f3d-763c-08d79feec105
x-ms-traffictypediagnostic: MN2PR11MB3806:
x-microsoft-antispam-prvs: <MN2PR11MB380645DCFABAD24C6125DC17D80F0@MN2PR11MB3806.namprd11.prod.outlook.com>
x-ms-oob-tlc-oobclassifiers: OLM:10000;
x-forefront-prvs: 029174C036
x-forefront-antispam-report: SFV:NSPM; SFS:(10009020)(4636009)(376002)(366004)(346002)(39860400002)(136003)(396003)(199004)(189003)(8936002)(7696005)(478600001)(66446008)(66946007)(64756008)(76116006)(966005)(186003)(66556008)(33656002)(53546011)(81156014)(55016002)(86362001)(6506007)(8676002)(81166006)(2906002)(52536014)(5660300002)(66476007)(71200400001)(110136005)(9686003)(316002)(6666004); DIR:OUT; SFP:1101; SCL:1; SRVR:MN2PR11MB3806; H:MN2PR11MB3565.namprd11.prod.outlook.com; FPR:; SPF:None; LANG:en; PTR:InfoNoRecords; A:1; MX:1;
received-spf: None (protection.outlook.com: cisco.com does not designate permitted sender hosts)
x-ms-exchange-senderadcheck: 1
x-microsoft-antispam: BCL:0;
x-microsoft-antispam-message-info: eTVOrr9u7vl/rtwVfLRI9biH5gE0OpkBxkgBju/Ur+BjvVDTx6FuYDVfL0VtY0AO2f9U0xnaTg94TLMC+gA7k9WyLpACzms20Wjfyr1Cd1nlWMObeA/D1eKg0WtbfAl2kZ69PVPTzbNKGtc4+Yqkll9hGggbqeCkg69wzvZ0quC5oVwtTEBWdfRZz644jmV2GX5WkOBh7sLVwTC0YgkbVeUKacuZg0PSwYXPJSK6Kr0hgTIEGxFnv1m1Bx8FXcrDv+cqSbbF6+gbJXNPHqEruCgc02HfsKlC10Bu6i2IFGBWkKeohZGTfGQGNiGHc97MMgwz0h1wJBT6ogP2l598O/h8A44hoS9iM5CyHKbRDq69yvsuXv5NDdHC4uR8U7ey4Zd+J7IShcGlem212qILanqCr2QWxE8QC1CCC51Cn5NjIQmjYUtm9bOkMrURmGmRcuRyn9m6ME4Tzi7ETCd1UMzt/fSjit/7XcmoSggWwwo=
x-ms-exchange-transport-forked: True
Content-Type: text/plain; charset="us-ascii"
Content-Transfer-Encoding: quoted-printable
MIME-Version: 1.0
X-MS-Exchange-CrossTenant-Network-Message-Id: 45311b9b-e310-4f3d-763c-08d79feec105
X-MS-Exchange-CrossTenant-originalarrivaltime: 23 Jan 2020 10:26:48.3898 (UTC)
X-MS-Exchange-CrossTenant-fromentityheader: Hosted
X-MS-Exchange-CrossTenant-id: 5ae1af62-9505-4097-a69a-c1553ef7840e
X-MS-Exchange-CrossTenant-mailboxtype: HOSTED
X-MS-Exchange-CrossTenant-userprincipalname: I0qrmgd9lxQTlhU1gNXII7Xr/2nREWO6rjrh8aYwO5se6YA4zxTnG9mfzDiFfeoljrdzAzl/EzdPpwjcBMS4MA==
X-MS-Exchange-Transport-CrossTenantHeadersStamped: MN2PR11MB3806
X-OriginatorOrg: cisco.com
X-Outbound-SMTP-Client: 173.37.102.16, xch-rcd-006.cisco.com
X-Outbound-Node: alln-core-10.cisco.com
Archived-At: <https://mailarchive.ietf.org/arch/msg/ipv6/d1UnNDyulKda2T9CvlImnPQJdto>
X-BeenThere: ipv6@ietf.org
X-Mailman-Version: 2.1.29
Precedence: list
List-Id: "IPv6 Maintenance Working Group \(6man\)" <ipv6.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/ipv6>, <mailto:ipv6-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/ipv6/>
List-Post: <mailto:ipv6@ietf.org>
List-Help: <mailto:ipv6-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/ipv6>, <mailto:ipv6-request@ietf.org?subject=subscribe>
X-List-Received-Date: Thu, 23 Jan 2020 10:26:54 -0000

Hello Ole

There are a number of cases where the address creates a state in the network:
- in case there's routing taking place within the subnet (e.g., RPL in the an IOT LLN and RIFT or eVPN in a data center)
- in case the network protects the address ownership since ND doesn't (SEND being what it is) and does minimal SAVI
- in case the network tries to implement ND proxy which is mandated by IEEE std 802.11
- in case Jen's draft is used to proactively assign ND state in the routers

In order to protect itself, the network blocks excessive amounts of addresses for a same device. It would serve this list to recognize it as a fact of life.

Sadly it is very hard with IPv6 ND alone to decide which address(es) to keep and which to remove. For the temporary addresses, LRU seems to work most of the time, with  a reasonable count of like 8 as suggested below. But some nodes like printers (silently) keep a permanent addresses that should survive the churn of other temporary addresses.

To serve the hosts correctly, the network is missing a classical but so useful information of lifetime that allows the state associated to the address to age out if not renewed. It is also classical in many IPv6-based standards (e.g., MIPv6, NEMO and RPL) that the nodes have  a chance to release a binding by indicating a lifetime of zero. The shortest path to get that is generalizing RFC 8505 to all MAC layers. *Is there any reason we do not?*

Conversely the network cannot signal how many addresses per node will be served properly in parallel. It cannot recommend lifetime values for temporary addresses and quasi-permanent addresses. It cannot signal that it rebooted and that all state need to be rebuilt. We need new RA information for that. I can write the draft within a few days if the group is willing to progress the work.

All the best,

Pascal

> -----Original Message-----
> From: ipv6 <ipv6-bounces@ietf.org> On Behalf Of otroan@employees.org
> Sent: jeudi 23 janvier 2020 09:59
> To: 6man WG <ipv6@ietf.org>
> Subject: RFC4941bis: consequences of many addresses for the network
> 
> While reviewing RFC4941bis (https://tools.ietf.org/html/draft-ietf-6man-
> rfc4941bis) I think I found one gap.
> 
> A discussion of the consequences of a host having many (active) addresses on
> the network.
> 
> A 4941bis implementation following the defaults, would at the maximum use
> 8 active addresses.
> (Valid lifetime of one week and one new address per day.)
> 
> Shorter regeneration intervals or other approaches like a new address per
> connection could lead to dramatic numbers.
> 
> If we use Ethernet as an example, each new address requires state in the
> network. In the ND cache in first-hop routers, and in SAVI binding tables in
> bridges. Given ND's security properties these tables must be policed by the
> network. A host with a very liberal address regeneration policy might be
> viewed as performing an attack.
> 
> There is no signal available in SLAAC apart from DAD to reject an address. If
> the network runs out of resources (or prohibits the additional address by
> policy) the address will not be served. The host has to be deal with that
> situation.
> 
> SLAAC is also missing a mechanism to release an address. Which leads me to
> think that the address regeneration interval must not be shorter than the ND
> cache scavenger timeout (which in many networks is high to avoid cache churn
> and high level of address re-resolutions).
> 
> I would like to hear from other network-side implementors and operators.
> Is there an issue here?
> 
> Best regards,
> Ole
> 
> --------------------------------------------------------------------
> IETF IPv6 working group mailing list
> ipv6@ietf.org
> Administrative Requests: https://www.ietf.org/mailman/listinfo/ipv6
> --------------------------------------------------------------------