Hemant Singh (shemant) wrote:

I personally think RFC 4389 is well shaken out for a doc - as we say in
our new short note, the only reason they didn't make the ND Proxy doc a
Standards Track doc because ND Proxy did not support SEND extensions.

I definitely had other concerns around RFC 4389 around the weaknesses in loop avoidance. ND proxy in essence forwards IP (ND) packets without decrementing ttl, which can lead to catastophic loops. The RFC tries to ameliorate that by detecting loops. However, the loop detection is based on receiving RAs (with the P-bit) which handles some cases. But it isn't robust against somebody connecting what was two Ethernet segments after ND proxy has sent its two P-bit RAs.

Thus I personally don't think this approach is fit as a standards track document.

The SEND extensions was work TBD with another IETF WG but that group is,
I think, 4 years and counting for not taking this work.  But there are
networks that need ND Proxy without use of SEND.

draft-ietc-csi-proxy-send is underway but is a bit subtle in its applicability. The idea around RFC 4389 is that the proxy isn't known to the other nodes. Yet proxy-send is based on explicitly assigning a ceritificate and associated trust to the proxy node. See text around
   The Secure Proxy ND becomes part of the trusted infrastructure just
   like a SEND router.  The Secure Proxy ND is granted a certificate
   that specifies the range of addresses for which it is allowed to
   perform proxying of SEND messages

Such an approach is workable for the Mobile IP scenario, because there the MN and HA have a relationship thus it is reasonable for the MN to trust the HA.

But it doesn't seem to fit the transparent case of RFC 4389.

If there are networks "that need ND proxy" as you say, and at the same time have the threats that SeND was designed to handle (the threats are listed in RFC 3756), then I think there is an architectural disconnect. To be able to secure the network some constraints need to be placed on who can advertise things in Neighbor Discovery messages and that seems to be fundamentally at odds with any transparent ND proxying.

I suspect such cases are best handled (when SeND can't be deployed on the link) by splitting what is one link into separate links (by using existing techniques like VLANs, or perhaps inventing some new technique above layer 2) so that the security threats related the shared link goes away.

I think that this is in essence what is done for IPv4 since the DHCPv4 address assignment essentially is used to establish point-to-point connectivity between the router and each peer; there is no shared multicast or broadcast traffic needed on the link to set this up. IPv6 is different in its reliance on not only link-local addresses but also on multicast RS and RA packets to do the initial setup.

Regards,

    Erik

Hemant

-----Original Message-----
From: Pekka Savola [mailto:[email protected]] Sent: Thursday, November 12, 2009 3:51 PM
To: Hemant Singh (shemant)
Cc: [email protected]
Subject: Re: speaking of ND Proxy and NBMA etc.

On Wed, 11 Nov 2009, Hemant Singh (shemant) wrote:
http://www.ietf.org/id/draft-wbeebee-6man-nd-proxy-std-00.txt

Do we already have implementations? What are the implementation experiences? Were all the features of the spec useful, or should something be changed (added, removed, clarified)?

This is not procedurally required for PS, but if there are a lot of implementations already, this would be a strong argument for going to PS.


--------------------------------------------------------------------
IETF IPv6 working group mailing list
[email protected]
Administrative Requests: https://www.ietf.org/mailman/listinfo/ipv6
--------------------------------------------------------------------

Reply via email to