Brian, I agree with the suggestion. My understanding is that this is used for on-link queries (especially the name lookup) which is a link local multicast.
We also need to get comments on the proposal of limiting the multicast id to 0xFF000000 - 0xFFFFFFFF (overlaying the Solicited Node range). Here is my comments on the multicast range. I would like to support this draft, because it provides enhanced network management capabilities. However with the current multicast address selection, I cannot recommend that any equipment with this implemented to be connected to any mission critical networks (e.g. nuclear reactor control, combat systems, navigation control, real-time financial) that utilize multicast. The problem with MD5 hashing the name and using the 32 bits directly for the lower 32 bits of the multicast address is that, an unsuspecting host can be flooded with multicast traffic, just because it joined the multicast group for name lookup queries. This could cause the host to fail in performing its real-time mission critical task. A small probability of this occurring is not acceptable, if making it zero is easily accomplished by limiting the range. The solution is to map the hashed name into a range of multicast ids that will not collide with other "real" multicast streams. I recommend that 24 bits of the hash are used and a 0xFF be appended, mapping it into the Solicited Node range. I have another draft, draft-pashby-mboned-mc-scoped-addr-00 that further defines the ranges that are specified by RFC3307. These further breakdowns, will isolate other multicast traffic colliding with the Solicited Node range. This draft was scheduled to be discussed in the mboned wg, but was not discussed when mboned wg and imad bof were combined. I understand this breaks implementations, but I would rather break implementations that are written to a draft, rather than allow implementations that could cause catastrophic problems in real-time mission critical networks. Ron -----Original Message----- From: [EMAIL PROTECTED] [mailto:[EMAIL PROTECTED] Behalf Of Brian Haberman Sent: Tuesday, September 20, 2005 13:13 To: IPv6 WG Subject: Re: IPv6 WG Last Call: <draft-ietf-ipngwg-icmp-name-lookups-12.txt> On Aug 1, 2005, at 2:08, Pekka Savola wrote: > On Fri, 15 Jul 2005, Bob Hinden wrote: >> This starts a two week IPv6 working group last call on advancing: >> >> Title : IPv6 Node Information Queries >> Author(s) : M. Crawford, B. Haberman >> Filename : draft-ietf-ipngwg-icmp-name-lookups-12.txt >> Pages : 14 >> Date : 2005-7-14 >> >> to Experimental. Please send substantive comments to the IPv6 >> mailing list. Editorial comments can be sent to the authors. > > Sorry for missing the DL by a couple of days, but here are my comments > anyway. > > I've been very critical of the node information queries in the past, > and > still am, but as it's going to Experimental, I'm not as concerned. > However, > I think there are still a couple of very important things which need > to be > settled so that a) it can be used safely and b) it won't jeopardize > the real > use of IPv6 ICMP messages. > > Specifically, I'm very concerned about its use with global addresses, > over > the Internet. This has a potential to turn into a kitchen sink > protocol, > which can be used to do query anything at all from a random node. > This is > exactly the thing that makes want to firewall administrators filter out > all ICMPv6 messages just to be sure messages like this won't be used > in the systems. I don't think we want that. > > I have no objection to having a protocol like this used between > consenting > adults between link-local addresses or even global addresses if done > over a > single link -- but extending it (or providing extendibility) beyond > that > seems unwise. > > My suggestion how to deal with this is to: > - add that a node MUST send all non-link-local node information > queries > with Hop Count 255; HC=255 MAY [or SHOULD] be used with other > traffic > as well; and > - a node MUST, unless explicitly configured otherwise, discard any > node > information queries w/ non-link-local queries which don't have > HC=255. > > This only breaks backward compat for node information queries sent w/ > global > addresses, over one hop away. I think we could live with that. It > should > provide a sufficiently simple security model for ensuring NIQ's won't > be > used inappropriately. > I would like to solicit opinions from the working group on the suggestions above. Specifically, the proposal would render existing implementations non-conformant to the spec. The primary goal of this work has been to document what the existing code bases support, so I will not make this change unless I see a true consensus to do so. Please provide comments by Sept. 28, 2005. Regards, Brian -------------------------------------------------------------------- IETF IPv6 working group mailing list [email protected] Administrative Requests: https://www1.ietf.org/mailman/listinfo/ipv6 -------------------------------------------------------------------- -------------------------------------------------------------------- IETF IPv6 working group mailing list [email protected] Administrative Requests: https://www1.ietf.org/mailman/listinfo/ipv6 --------------------------------------------------------------------
