Thanks, Jim and Francis, for your timely answers to my
question.  Yes, like Jari pointed out, we are working
on using IPsec for SEND, and we need to understand ND
better to make it *right*.  However, that discussion
belongs to the very silent SEND mailing list, and should
be continued only there, IMHO.  (I've inserted Reply-To:
headers to facilitate that...)

Now, the ND specs as such are clear.  No problem with
that.  It is just that the design rationale behind the
specs in not written anywhere (as usual), and that was
the reason for asking my question.  We are not attempting
to redefine or even revise the ND architecture, we are
attempting to understand it fully so that we can design
proper security for it.

Now, if I read correctly what you Jim and Francis are saying,
there seems to be a number of reasons for the design.
Please correct me if I get this wrong; I am rewriting what
I read to see if I understand it correctly.

  1. Architecture

     It was deemed architecturally good to place ND
     at the IP/ICMP layer rather than below it.  The
     main benefits from this are the following:

        - allows extension headers to be used
        - allows IPsec protection for ND
        - allows using routing and destination options

  2. Implementation

     Early implementation experience showed that as
     a consequence of the design, implementation becomes
     simpler.  In particular, NUD and prefix assimilation
     become part of the IP layer.

     I have one further question about that: what do
     you mean with prefix assimilation?  I didn't find
     the term in RFC2461 or RFC2462.


The reasons for the link layer address options were
the following:

  3. Extensibility (with extension headers etc).

     This seems to be a direct consequence of the
     architectural design decision.

  4. Support for future functionality like proxy ND

     Again, this seems to follow the architectural
     principle layed out above.

  5. Better support for the Override bit

     Now, I have a question about the Override bit.
     I didn't quite understand how it could be used
     for "node discovery during first phase when
     link-layer addresses are not shared".

     What did you mean with that, Jim?

Finally, the reasons for not peeking at the actual
link layer addresses used in the link layer frame can
be summarized as follows:

  6. Separation of function

     This again follows the architectural principle.
     Especially, it was viewed that checking the
     link-layer addresses is a link layer function,
     and it should be separate from the IP layer.

Is that all or am I missing something?  Or is there
something above that doesn't belong there?

Now, if you want to discuss how security fits in this
all, may I suggest that we do it on the SEND list?
(Personally I have trouble in keeping track with
 the IPv6 list volume, as I have also other things
 to do but participate to the IETF work.)

--Pekka Nikander

--------------------------------------------------------------------
IETF IPng Working Group Mailing List
IPng Home Page:                      http://playground.sun.com/ipng
FTP archive:                      ftp://playground.sun.com/pub/ipng
Direct all administrative requests to [EMAIL PROTECTED]
--------------------------------------------------------------------

Reply via email to