Christian,

This is a more detailed version of what I proposed a month ago. I will
emphasize that we need something more than a MUST in an RFC to enforce
this: We need the site-local black hole and the site-local BGP route
discard to be *default* configuration in routers, and to be impossible
to remove by accident. This is no big thing to do for router vendors to
implement, we just need to reach consensus on it.

Michel.


-----Original Message-----
From: Christian Huitema 
Sent: Saturday, November 23, 2002 10:37 AM
To: [EMAIL PROTECTED]
Subject: Enforcing unreachability of site local addresses

One of the point in the discussion of the "globally unique" site local
addresses has been the discussion of their usage. In particular, if the
new addresses are globally unique, how do we prevent them from being
globally routed and creating a mess in the global routing tables; and,
on a related note, how do we make sure that they are actually local?
 
The issue is clearly complex. There are legitimate scenarios in which
two sites might want to create some kind of backdoor connection
independent of any ISP connection, in a way similar to the various
"extranet" scenarios that are common today; it could also be used in a
merger situation. There are also illegitimate scenarios in which a
powerful customer would pressure an ISP to simply advertize their
globally unique /48.
 
I believe that Bob Hinden provided the beginning of the answer when he
proposed that all routers would have a default black-hole for the site
local prefix. The implementation would be the following:
 
1) In a local site, advertise the subnet routes in the IGP, possibly a
default route for the site, and a black-hole for the site local prefix.
This guarantees internal connectivity to the valid subnets, and
unreachability for all other sites.
 
2) In an extranet scenario, import in the IGP an explicit route for the
"friendly" sites, and point it to the specific backdoor connecctions to
these sites. This will override the blackhole.
 
3) At a border router, discard all BGP route that point to the site
local prefix or subsets of it.
 
4) At a site border router or firewall, perform ingress filtering and
discard all externally sourced packets in which the source address
pretends to belong to the internal site.
 
The combination of 1 and 3 presents a powerful disencentive against the
"leakage of routes" risk: a powerful customer might pressure a local
ISP, but that would be to no avail since the packets would be dropped by
the next hop. I believe that the combination of the four rules will
provide the desired locality benefits without having to resort to
ambiguity as an enforcement mechanism.
 
-- Christian Huitema

--------------------------------------------------------------------
IETF IPng Working Group Mailing List
IPng Home Page:                      http://playground.sun.com/ipng
FTP archive:                      ftp://playground.sun.com/pub/ipng
Direct all administrative requests to [EMAIL PROTECTED]
--------------------------------------------------------------------

--------------------------------------------------------------------
IETF IPng Working Group Mailing List
IPng Home Page:                      http://playground.sun.com/ipng
FTP archive:                      ftp://playground.sun.com/pub/ipng
Direct all administrative requests to [EMAIL PROTECTED]
--------------------------------------------------------------------

Reply via email to