Re: [OSPF] OSPFv3 Autoconfiguration - draft-ietf-ospf-ospfv3-autoconfig-05.txt

Acee Lindem <acee.lindem@ericsson.com> Fri, 07 February 2014 01:11 UTC

Return-Path: <acee.lindem@ericsson.com>
X-Original-To: ospf@ietfa.amsl.com
Delivered-To: ospf@ietfa.amsl.com
Received: from localhost (ietfa.amsl.com [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 5B2091A0585 for <ospf@ietfa.amsl.com>; Thu, 6 Feb 2014 17:11:56 -0800 (PST)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -1.901
X-Spam-Level:
X-Spam-Status: No, score=-1.901 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, SPF_PASS=-0.001] autolearn=ham
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id AfdYoPW0Ko7X for <ospf@ietfa.amsl.com>; Thu, 6 Feb 2014 17:11:54 -0800 (PST)
Received: from usevmg20.ericsson.net (usevmg20.ericsson.net [198.24.6.45]) by ietfa.amsl.com (Postfix) with ESMTP id 1F1FD1A0584 for <ospf@ietf.org>; Thu, 6 Feb 2014 17:11:54 -0800 (PST)
X-AuditID: c618062d-b7f858e0000031c7-44-52f432d47dcd
Received: from EUSAAHC003.ericsson.se (Unknown_Domain [147.117.188.81]) by usevmg20.ericsson.net (Symantec Mail Security) with SMTP id DB.53.12743.4D234F25; Fri, 7 Feb 2014 02:11:48 +0100 (CET)
Received: from EUSAAMB101.ericsson.se ([147.117.188.118]) by EUSAAHC003.ericsson.se ([147.117.188.81]) with mapi id 14.02.0387.000; Thu, 6 Feb 2014 20:11:50 -0500
From: Acee Lindem <acee.lindem@ericsson.com>
To: Curtis Villamizar <curtis@ipv6.occnc.com>
Thread-Topic: [OSPF] OSPFv3 Autoconfiguration - draft-ietf-ospf-ospfv3-autoconfig-05.txt
Thread-Index: AQHPIrUalidEs1+lNkOnzIePWuX0dJqpUY0A
Date: Fri, 07 Feb 2014 01:11:49 +0000
Message-ID: <7113CE23-C2B0-40C7-9968-22C224571B3B@ericsson.com>
References: <201402052058.s15KwoGH012796@maildrop2.v6ds.occnc.com>
In-Reply-To: <201402052058.s15KwoGH012796@maildrop2.v6ds.occnc.com>
Accept-Language: en-US
Content-Language: en-US
X-MS-Has-Attach:
X-MS-TNEF-Correlator:
x-originating-ip: [147.117.188.10]
Content-Type: text/plain; charset="us-ascii"
Content-ID: <DFADB22F25CF1A4F8795EA6A56E347BE@ericsson.com>
Content-Transfer-Encoding: quoted-printable
MIME-Version: 1.0
X-Brightmail-Tracker: H4sIAAAAAAAAA+NgFnrCLMWRmVeSWpSXmKPExsUyuXRPoO4Voy9BBgfnW1tMnnWGzaLl3j12 ByaPJUt+Mnksu3+RLYApissmJTUnsyy1SN8ugSvjb9sLloIvohVXfu9jbWCcJtjFyMkhIWAi cbF5ASuELSZx4d56ti5GLg4hgSOMEjtvfGUHSQgJLGOUeLmzGMRmE9CReP7oHzOILSKgK9F3 4zIbiM0sICvxbFsTWFxYIFJi7s1NQL0cQDVREj82CUOUG0lc+/qbEcRmEVCRONMynQXE5hWw l/hyZwIbxConiaNPjoHVcAo4S2yZtQ3sNkag276fWsMEsUpc4taT+UwQNwtILNlznhnCFpV4 +fgf1C9KEpOWnmOFqNeRWLD7E9SZ1hIb3hyGsrUlli18zQxxg6DEyZlPWCYwis9CsmIWkvZZ SNpnIWmfhaR9ASPrKkaO0uLUstx0I4NNjMCYOibBpruDcc9Ly0OM0hwsSuK8X946BwkJpCeW pGanphakFsUXleakFh9iZOLglGpgXK9jM/VRCMdSQ2N2r6cHi7nlQhTe/a+e31swaacGT73U CjFb42D5NONtzC+PL7hxgt9Exn8l2wS/uRdCzRLbdKaEPL9VHt8gvnV5YIiqzffyXJlWzZAr sys+lcT8fnCh0zXkcdGX9BUxujcTYmoWZ5e/mtXvbhLl4mq6XefTRBaRnVsS5uorsRRnJBpq MRcVJwIA58E0VHcCAAA=
Cc: OSPF List <ospf@ietf.org>
Subject: Re: [OSPF] OSPFv3 Autoconfiguration - draft-ietf-ospf-ospfv3-autoconfig-05.txt
X-BeenThere: ospf@ietf.org
X-Mailman-Version: 2.1.15
Precedence: list
List-Id: The Official IETF OSPG WG Mailing List <ospf.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/ospf>, <mailto:ospf-request@ietf.org?subject=unsubscribe>
List-Archive: <http://www.ietf.org/mail-archive/web/ospf/>
List-Post: <mailto:ospf@ietf.org>
List-Help: <mailto:ospf-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/ospf>, <mailto:ospf-request@ietf.org?subject=subscribe>
X-List-Received-Date: Fri, 07 Feb 2014 01:11:56 -0000

Hi Curtis, 
I agree and believe the significance of this use case where a new router is inserted into an auto-configured domain has been greater exaggerated.
Thanks,
Acee
On Feb 5, 2014, at 3:58 PM, Curtis Villamizar <curtis@ipv6.occnc.com> wrote:

> 
> In message <CF17DD4E.2696B%acee.lindem@ericsson.com>
> Acee Lindem writes:
> 
>> The OSPFv3 autoconfiguration draft was cloned and presented in the
>> ISIS WG (http://www.ietf.org/id/draft-liu-isis-auto-conf-00.txt). In
>> the ISIS WG, there was a concern that the resolution of a duplicate
>> system ID did not include the amount of time the router was
>> operational when determining which router would need to choose a new
>> router ID. With additional complexity, we could incorporate router
>> uptime into the resolution process. One way to do this would be to:
>> 
>>     1. Add a Router Uptime TLV to the OSPFv3 AC-LSA. It would include
>>        the uptime in seconds.
>> 
>>     2. Use the Router Uptime TLV as the primary determinant in
>>        deciding which router must choose a new OSPFv3 Router
>>        ID. Router uptimes less than 3600 (MaxAge) seconds apart are
>>        considered equal.
>> 
>>     3. When an OSPFv3 Hello is received with a different link-local
>>     	source address but a different router-id, unicast the OSPFv3
>>     	AC-LSA to the neighbor so that OSPFv3 duplicate router
>>     	resolution can proceed as in the case where it is received
>>     	through the normal flooding process. This is somewhat of a
>>     	hack as the we'd also need to accept OSPF Link State Updates
>>     	from a neighbor that is not in Exchange State or greater.
>> 
>> An alternative to #3 would be to use Link-Local Signaling (LLS) for
>> signaling the contents of the OSPFv3 AC-LSA. However, you'd only want
>> to send the Router-Uptime and Router Hardware Fingerprint when a
>> duplicate Router-ID is detected. This requires implementing the
>> resolution two ways but may be preferable since it doesn't require
>> violating the flooding rules.
>> 
>> In any case, I'd like to get other opinions as to whether this problem
>> is worth solving.
>> 
>> Thanks,
>> Acee
> 
> 
> Acee,
> 
> If the basis for router-id on boot up results in a fixed value, and if
> a duplicate will occur on a give network, then which of two duplicate
> routers gets that value may change after one of them reboots.  If
> uptime is not considered, it will never change as long as one router
> stays up at any given time.
> 
> We are talking about a very low probability event (a duplicate) except
> if this is a DoS attack and then either using or not using uptime
> won't matter since the attacker will claim an impossibly long uptime.
> 
> Curtis