Re: [savi] RFC6620 Page 15 - Data Trigger
"Leaf Yeh" <leaf.yeh.sdo@gmail.com> Tue, 06 May 2014 03:54 UTC
Return-Path: <leaf.yeh.sdo@gmail.com>
X-Original-To: savi@ietfa.amsl.com
Delivered-To: savi@ietfa.amsl.com
Received: from localhost (ietfa.amsl.com [127.0.0.1])
by ietfa.amsl.com (Postfix) with ESMTP id 59E0E1A06E5
for <savi@ietfa.amsl.com>; Mon, 5 May 2014 20:54:55 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -2
X-Spam-Level:
X-Spam-Status: No, score=-2 tagged_above=-999 required=5 tests=[BAYES_00=-1.9,
DKIM_SIGNED=0.1, DKIM_VALID=-0.1, DKIM_VALID_AU=-0.1,
FREEMAIL_FROM=0.001, SPF_PASS=-0.001] autolearn=ham
Received: from mail.ietf.org ([4.31.198.44])
by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024)
with ESMTP id QK67xYySBeIe for <savi@ietfa.amsl.com>;
Mon, 5 May 2014 20:54:53 -0700 (PDT)
Received: from mail-pa0-x22c.google.com (mail-pa0-x22c.google.com
[IPv6:2607:f8b0:400e:c03::22c])
by ietfa.amsl.com (Postfix) with ESMTP id CCD261A06E8
for <savi@ietf.org>; Mon, 5 May 2014 20:54:51 -0700 (PDT)
Received: by mail-pa0-f44.google.com with SMTP id ld10so5396672pab.17
for <savi@ietf.org>; Mon, 05 May 2014 20:54:48 -0700 (PDT)
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=gmail.com; s=20120113;
h=from:to:references:in-reply-to:subject:date:message-id:mime-version
:content-type:content-transfer-encoding:thread-index
:content-language;
bh=8bg9FQKvVdQj1Xi3ODwDtaY+WTKjYeXGlKd6lGKDI5w=;
b=YrlWzKJzc1Tg0MwGe+4+UPj8e35D0iNcHpqTrAJMBsm837lNY/ckNCszZLg7fEwL86
33M23mIzdCN3PqpCWJqBg9zl3n2B5SOCtLFDOwbNe36YAxPMnuhSmjElwDCt5COjhXFC
4V6SRis+XJqFb0kY6QPWZJ1BNCty2PHvu02xn+ToCmnzu/Ycx3ZKHD9u/5d+ULuFuyzS
dzsdHAMUiNN9c1mnOGsZPxOjFBm1Kmyg3PwgbngBeU5OQ7tunVpmsxQcP8DKmwqcmNFE
Tns0VMFKt7sE2zlMhxWtVtU3zQQKpZ8XkQbAZ08p0L7hFV9DMs0KM/J7QRrfrkIT73O5
nzDg==
X-Received: by 10.66.254.166 with SMTP id aj6mr1701744pad.11.1399348488147;
Mon, 05 May 2014 20:54:48 -0700 (PDT)
Received: from PC ([218.241.103.43])
by mx.google.com with ESMTPSA id ey5sm87218179pab.22.2014.05.05.20.54.45
for <multiple recipients>
(version=TLSv1 cipher=ECDHE-RSA-AES128-SHA bits=128/128);
Mon, 05 May 2014 20:54:47 -0700 (PDT)
X-Google-Original-Message-ID: <00ab01cf68de$eb075b30$c1161190$@yeh.sdo@gmail.com>
From: "Leaf Yeh" <leaf.yeh.sdo@gmail.com>
To: "'Joel M. Halpern'" <jmh@joelhalpern.com>,
"'SAVI Mailing List'" <savi@ietf.org>,
"'marcelo bagnulo braun'" <marcelo@it.uc3m.es>,
"'Eric Levy- Abegnoli \(elevyabe\)'" <elevyabe@cisco.com>
References: <536846e7.637a420a.27dc.02df@mx.google.com>
<5368508C.9060205@joelhalpern.com>
In-Reply-To: <5368508C.9060205@joelhalpern.com>
Date: Tue, 6 May 2014 11:54:41 +0800
Message-ID: <53685d07.8564420a.3494.3c0a@mx.google.com>
MIME-Version: 1.0
Content-Type: text/plain;
charset="us-ascii"
Content-Transfer-Encoding: 7bit
X-Mailer: Microsoft Office Outlook 12.0
Thread-Index: Ac9o147LhnvhC7RFQ96Xoqx9uKXDEAABQYSA
Content-Language: zh-cn
Archived-At: http://mailarchive.ietf.org/arch/msg/savi/dWHOy2FITSllpF7aGxzHjKBjEdE
Subject: Re: [savi] RFC6620 Page 15 - Data Trigger
X-BeenThere: savi@ietf.org
X-Mailman-Version: 2.1.15
Precedence: list
List-Id: Mailing list for the SAVI working group at IETF <savi.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/savi>,
<mailto:savi-request@ietf.org?subject=unsubscribe>
List-Archive: <http://www.ietf.org/mail-archive/web/savi/>
List-Post: <mailto:savi@ietf.org>
List-Help: <mailto:savi-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/savi>,
<mailto:savi-request@ietf.org?subject=subscribe>
X-List-Received-Date: Tue, 06 May 2014 03:54:55 -0000
Joel - The limits on the number of addresses a host can claim are related to keeping the bookkeeping state bounded. If a hsot causes his own claims to be lost, that is his problem, not SAVI's. I guess you mean the host can claim any number of addresses if SAVI device's memory permits. Joel - I am not sure what threat you are trying to prevent in your description. Leaf - > How about send DAD_NS to the VP received data packet for the > double-check in the above process? I intend to prevent the host abuse the source address within the on-link prefix. If SAVI device sent the DAD_NS directly back to the VP received the data, it expected the host do have initiated that source address under test as the target address, and response the DAD_NA. Best Regards, Leaf -----Original Message----- From: Joel M. Halpern [mailto:jmh@joelhalpern.com] Sent: Tuesday, May 06, 2014 11:02 AM To: Leaf Yeh; 'SAVI Mailing List'; 'marcelo bagnulo braun'; 'Eric Levy- Abegnoli (elevyabe)' Subject: Re: [savi] RFC6620 Page 15 - Data Trigger I am not sure what threat you are trying to prevent in your description. The goal of the SAVI work was to prevent one host from claiming the address another host is using. The limits on the number of addresses a host can claim are related to keeping the bookkeeping state bounded. If a hsot causes his own claims to be lost, that is his problem, not SAVI's. Yours, Joel On 5/5/14, 10:20 PM, Leaf Yeh wrote: > I read RFC6620 again, still have some questions on it. > > Section 3.2.3 Page 15 @ the state of NO_BIND > > <quote> > > Upon the reception through a Validating Port (VP) of a DATA packet > > containing IPAddr as the source address, the SAVI device SHOULD > > execute the process of sending Neighbor Solicitation messages > of > > the Duplicate Address Detection process ... The DAD_NS messages > are not > > sent through any of the ports configured as Validating Ports. > The > > DAD_NSOL messages are sent through Trusted Ports (but, of > course, > > subject to usual switch behavior and possible MLD snooping > > optimizations)... The state > > is moved to TENTATIVE. The LIFETIME is set to TENT_LT (i.e., LT: > > =TENT_LT), the BINDING ANCHOR is set to VP (i.e., P:=VP), and > the > > Creation time is set to the current value of the local clock. > > </quote> > > It seems the DAD_NS are not sent to 'any of VP', but sent to TP, after > the VP received a data packet, whose source address are not in binding > table of the SAVI device. > > If this data packet use the prefix assigned on this link, we don't > expect the DAD_NA from the TP. > > If the data packet use any IID-interface ID, i.e. the 64 bits of the > source address, the SAVI switch will set up a binding entry for each > source address. > > Then I guess we lost the finer-grained SAV here, and only can rely on > the SAVI (on-link) prefix list to filtering the 'transit traffic'. Right? > > I mean the malicious host can create a huge number of **valid** source > address within the on-link prefix. What was the design philosophy here? > > How about send DAD_NS to the VP received data packet for the > double-check in the above process? > > Best Regards, > > Leaf > > > > _______________________________________________ > savi mailing list > savi@ietf.org > https://www.ietf.org/mailman/listinfo/savi >
- [savi] RFC6620 Page 15 - Data Trigger Leaf Yeh
- Re: [savi] RFC6620 Page 15 - Data Trigger Joel M. Halpern
- Re: [savi] RFC6620 Page 15 - Data Trigger Leaf Yeh
- Re: [savi] RFC6620 Page 15 - Data Trigger Joel M. Halpern
- Re: [savi] RFC6620 Page 15 - Data Trigger Leaf Yeh
- Re: [savi] RFC6620 Page 15 - Data Trigger Leaf Yeh
- Re: [savi] RFC6620 Page 15 - Data Trigger Joel Halpern Direct