Re: rationale for the default of DupAddrDetectTransmits (Re: IPv6 Routing & ND vs. Addressing)

Ole Troan <otroan@employees.org> Mon, 17 July 2017 17:06 UTC

Return-Path: <otroan@employees.org>
X-Original-To: ipv6@ietfa.amsl.com
Delivered-To: ipv6@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 3EF95131668 for <ipv6@ietfa.amsl.com>; Mon, 17 Jul 2017 10:06:15 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -1.899
X-Spam-Level:
X-Spam-Status: No, score=-1.899 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, HTML_MESSAGE=0.001, MIME_QP_LONG_LINE=0.001, RP_MATCHES_RCVD=-0.001, SPF_PASS=-0.001, URIBL_BLOCKED=0.001] autolearn=ham autolearn_force=no
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id NeDiD0O-UZdk for <ipv6@ietfa.amsl.com>; Mon, 17 Jul 2017 10:06:14 -0700 (PDT)
Received: from accordion.employees.org (accordion.employees.org [198.137.202.74]) (using TLSv1.2 with cipher AECDH-AES256-SHA (256/256 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id 08AA11300CE for <ipv6@ietf.org>; Mon, 17 Jul 2017 10:06:14 -0700 (PDT)
Received: from [10.227.125.145] (77.16.77.145.tmi.telenormobil.no [77.16.77.145]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by accordion.employees.org (Postfix) with ESMTPSA id 4E4D92D5003; Mon, 17 Jul 2017 17:06:13 +0000 (UTC)
Content-Type: multipart/alternative; boundary="Apple-Mail-B1B30C3D-23FA-4060-9277-86C4B636DD1C"
Mime-Version: 1.0 (1.0)
Subject: Re: rationale for the default of DupAddrDetectTransmits (Re: IPv6 Routing & ND vs. Addressing)
From: Ole Troan <otroan@employees.org>
X-Mailer: iPhone Mail (14G57)
In-Reply-To: <CAJE_bqf=uoRKKyb3wLS3QG4AqyJdjrFDHYfkBsH8dvMJajns3A@mail.gmail.com>
Date: Mon, 17 Jul 2017 19:06:10 +0200
Cc: Brian E Carpenter <brian.e.carpenter@gmail.com>, "Pascal Thubert (pthubert)" <pthubert@cisco.com>, "ipv6@ietf.org" <ipv6@ietf.org>
Content-Transfer-Encoding: 7bit
Message-Id: <C34277D8-7A4D-49E2-9F12-D55E49461C28@employees.org>
References: <CAJE_bqf=uoRKKyb3wLS3QG4AqyJdjrFDHYfkBsH8dvMJajns3A@mail.gmail.com>
To: 神明達哉 <jinmei@wide.ad.jp>
Archived-At: <https://mailarchive.ietf.org/arch/msg/ipv6/vGOEq7s7fo1syvGyPYt_PYQ_KSo>
X-BeenThere: ipv6@ietf.org
X-Mailman-Version: 2.1.22
Precedence: list
List-Id: "IPv6 Maintenance Working Group \(6man\)" <ipv6.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/ipv6>, <mailto:ipv6-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/ipv6/>
List-Post: <mailto:ipv6@ietf.org>
List-Help: <mailto:ipv6-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/ipv6>, <mailto:ipv6-request@ietf.org?subject=subscribe>
X-List-Received-Date: Mon, 17 Jul 2017 17:06:15 -0000


> On 17 Jul 2017, at 18:42, 神明達哉 <jinmei@wide.ad.jp> wrote:
> 
> At Mon, 17 Jul 2017 08:58:18 +1200,
> Brian E Carpenter <brian.e.carpenter@gmail.com> wrote:
> 
>>> I looked up RFC4862 to find out how many DAD attempts there were,
>>> because I'd assumed 3 to 4, and if so, then if that many attempts
>>> failed, I'd say the link is well beyond its capacity. Something would
>>> need to be done to remedy a link capacity problem in that case.
>>> 
>>> I was surprised to find, as Ole mentioned, the number of attempts was
>>> only 1 rather than 3 or 4.
>> 
>> I'm more than surprised. I think that's a bug and IMHO it should be fixed.
> 
> Although it's probably true that at the time of RFC4862 we didn't
> expect networks with much higher packet loss to be so dominantly
> deployed, I don't necessarily think the current parameter of RFC4862
> is a "bug".  First off, "1" is just the default of
> DupAddrDetectTransmits, not a fixed constant.  Secondly, my
> understanding is that DAD as defined in RFC4862 (or its predecessors)
> has never been considered a very reliable duplicate detection
> mechanism, so it didn't bother to make it arbitrarily less unreliable
> by default (when 1 is may not be enough, there's no guarantee that 3
> or 4 is enough anyway).  I also thought the "official answer" for a
> high packet-loss environment is to use a more sophisticated mechanism
> such as RFC4429.
> 
> (That said, I wouldn't necessarily be opposed to updating the default
> value if and when we update RFC4862 so it will match the latest
> deployments for leaf networks better).

It's a tradeoff between how long it takes before the address is usable. 

I wasn't aware tgat 4429 was more robust. 

During the efficient nd work, Erik did:
https://tools.ietf.org/html/draft-nordmark-6man-dad-approaches-02

And
https://tools.ietf.org/html/draft-yourtchenko-6man-dad-issues-01

I think we essentially need ACD. 

cheers 
Ole