One document matched: draft-arifumi-v6ops-addr-select-ps-00.txt
Network Working Group A. Matsumoto
Internet-Draft T. Fujisaki
Expires: December 15, 2006 NTT
R. Hiromi
K. Kanayama
Intec Netcore
June 13, 2006
Problem Statement of Default Address Selection in Multi-prefix
Environment: Operational Issues of RFC3484 Default Rules
draft-arifumi-v6ops-addr-select-ps-00.txt
Status of this Memo
By submitting this Internet-Draft, each author represents that any
applicable patent or other IPR claims of which he or she is aware
have been or will be disclosed, and any of which he or she becomes
aware will be disclosed, in accordance with Section 6 of BCP 79.
Internet-Drafts are working documents of the Internet Engineering
Task Force (IETF), its areas, and its working groups. Note that
other groups may also distribute working documents as Internet-
Drafts.
Internet-Drafts are draft documents valid for a maximum of six months
and may be updated, replaced, or obsoleted by other documents at any
time. It is inappropriate to use Internet-Drafts as reference
material or to cite them other than as "work in progress."
The list of current Internet-Drafts can be accessed at
http://www.ietf.org/ietf/1id-abstracts.txt.
The list of Internet-Draft Shadow Directories can be accessed at
http://www.ietf.org/shadow.html.
This Internet-Draft will expire on December 15, 2006.
Copyright Notice
Copyright (C) The Internet Society (2006).
Abstract
One physical network can carry multiple logical networks. Moreover,
we can use multiple physical networks at the same time in a host. In
that environment, end-hosts might have multiple IP addresses and be
required to use them selectively. Without an appropriate source/
Matsumoto, et al. Expires December 15, 2006 [Page 1]
Internet-Draft Address Selection PS June 2006
destination address selection mechanism, the host will experience
some trouble in the communication. RFC 3484 defines both the source
and destination address selection algorithms, but the multi-prefix
environment considered here needs additional rules beyond the default
operation. This document describes the possible problems that end-
hosts could encounter in an environment with multiple logical
networks.
Table of Contents
1. Introduction . . . . . . . . . . . . . . . . . . . . . . . . . 3
1.1. Scope of this document . . . . . . . . . . . . . . . . . . 3
2. Problem Statement . . . . . . . . . . . . . . . . . . . . . . 3
2.1. Source Address Selection . . . . . . . . . . . . . . . . . 3
2.1.1. Multiple Routers on Single Interface . . . . . . . . . 4
2.1.2. Ingress Filtering Problem . . . . . . . . . . . . . . 5
2.1.3. Half-Closed Network Problem . . . . . . . . . . . . . 5
2.1.4. Combined Use of Global and ULA . . . . . . . . . . . . 7
2.1.5. Site Renumbering . . . . . . . . . . . . . . . . . . . 8
2.1.6. Multicast Source Address Selection . . . . . . . . . . 8
2.1.7. Temporary Address Selection . . . . . . . . . . . . . 8
2.2. Destination Address Selection . . . . . . . . . . . . . . 9
2.2.1. IPv4 or IPv6 prioritization . . . . . . . . . . . . . 9
2.2.2. ULA and IPv4 dual-stack environment . . . . . . . . . 9
2.2.3. ULA or Global Prioritization . . . . . . . . . . . . . 10
3. Conclusion . . . . . . . . . . . . . . . . . . . . . . . . . . 11
4. Security Considerations . . . . . . . . . . . . . . . . . . . 12
5. IANA Considerations . . . . . . . . . . . . . . . . . . . . . 12
6. References . . . . . . . . . . . . . . . . . . . . . . . . . . 12
6.1. Normative References . . . . . . . . . . . . . . . . . . . 12
6.2. Informative References . . . . . . . . . . . . . . . . . . 12
Authors' Addresses . . . . . . . . . . . . . . . . . . . . . . . . 14
Intellectual Property and Copyright Statements . . . . . . . . . . 15
Matsumoto, et al. Expires December 15, 2006 [Page 2]
Internet-Draft Address Selection PS June 2006
1. Introduction
One physical network can carry multiple logical networks. In that
case, an end-host has multiple IP addresses. In the IPv4-IPv6 dual
stack environment or in a site connected to both ULA [RFC4193] and
Global scope networks, an end-host has multiple IP addresses. These
are examples of the networks that we focus on in this document. In
such an environment, an end-host will encounter some communication
trouble.
Inappropriate source address selection at the end-host causes
unexpected asymmetric routing or filtering by a router on the way
back or discard due to there being no route to the host.
Considering a multi-prefix environment, the destination address
selection is also important for correct communication establishment.
The key to the appropriate process will come from the way to
configure the source address and destination address to the
interfaces at the end-hosts by the network policy of the site.
RFC 3484 [RFC3484] defines both source and destination address
selection algorithms. In most cases, the host will be able to
communicate with the targeted host using the algorithms. But there
are still problematic cases such as when multiple default routes are
supplied. This document describes such possibilities of false
dropping during address selection.
In addition, the provision of an address policy table is an important
matter. RFC 3484 describes all the algorithms for setting the
address policy table but it makes no mention of the provisions of
address policy and does not define how to set it except manually.
1.1. Scope of this document
There has been a lot of discussion about "multiple addresses/
prefixes" but the multi-homing issues for redundancy are out of our
scope. Cooperation with a mechanism like shim6 is rather desirable.
We focus on an end-site network environment. The scope of this
document is to sort out problematic cases of false dropping of the
address selection within a multi-prefix environment.
2. Problem Statement
2.1. Source Address Selection
Matsumoto, et al. Expires December 15, 2006 [Page 3]
Internet-Draft Address Selection PS June 2006
2.1.1. Multiple Routers on Single Interface
==================
| Internet |
==================
| |
2001:db8::/32 | | 3ffe:1800::/32
+----+-+ +-+----+
| ISP1 | | ISP2 |
+----+-+ +-+----+
| |
2001:db8:a::/48 | | 3ffe:1800:a::/48
+------+---+ +----+-----+
| Gateway1 | | Gateway2 |
+--------+-+ +-+--------+
| |
2001:db8:a:1::/64 | | 3ffe:1800:a:1::/64
| |
-----+-+-----+------
|
+-+----+ 2001:db8:a:1:EUI64
| Host | 3ffe:1800:a:1:EUI64
+------+
[Fig. 1]
Generally speaking, there is no interaction between next-hop
determination and address selection. In this example, when Host
sends a packet via Gateway1, the Host does not necessarily choose the
address 2001:db8:a:1::EUI64 given by Gateway1 as the source address.
This causes the same problem as described in the next section
'Ingress Filtering Problem'.
To solve this case, one approach is to configure correctly both the
routing configuration and address selection policy at Host. You can
use RFC 4191 [RFC4191] to deliver routing information to hosts.
Another approach is to configure the gateways but not the Host and
make use of packet redirection between the gateways.
Matsumoto, et al. Expires December 15, 2006 [Page 4]
Internet-Draft Address Selection PS June 2006
2.1.2. Ingress Filtering Problem
==================
| Internet |
==================
| |
2001:db8::/32 | | 3ffe:1800::/32
+----+-+ +-+----+
| ISP1 | | ISP2 |
+----+-+ +-+----+
| |
2001:db8:a::/48 | | 3ffe:1800:a::/48
++-------++
| Gateway |
+----+----+
| 2001:db8:a:1::/64
| 3ffe:1800:a:1::/64
------+---+----------
|
+-+----+ 2001:db8:a:1:EUI64
| Host | 3ffe:1800:a:1:EUI64
+------+
[Fig. 2]
When a relatively small site, which we call a "customer network", is
attached to two upstream ISPs, each ISP delegates a network address
block, which is usually /48, and a host has multiple IPv6 addresses.
When the source address of an outgoing packet is not the one that is
delegated by an upstream ISP, there is a possibility that the packet
will be dropped at the ISP by its Ingress Filter. Ingress
filtering(uRPF: unicast Reverse Path Forwarding) is becoming more and
more popular among ISPs in order to mitigate the damage of DoS
attacks.
In this example, when the Gateway chooses the default route to ISP2
and the Host chooses 2001:db8:a:1::EUI64 as the source address for
packets sent to a host(2001:fa8::1) somewhere in the Internet, the
packets may be dropped at ISP2 because of Ingress Filtering.
One possible solution for this problem is to adopt source-address-
based routing at the customer site's gateway, but this manner of
routing is not very popular at the moment.
2.1.3. Half-Closed Network Problem
You can see a second typical source address selection problem in a
Matsumoto, et al. Expires December 15, 2006 [Page 5]
Internet-Draft Address Selection PS June 2006
multihome site with global-closed mixed connectivity like the figure
below. In this case, Host-A is in a multihomed network and has two
IPv6 addresses, one delegated from each of the upstream ISPs. Note
that ISP2 is a closed network and does not have connectivity to the
Internet.
+--------+
| Host-C | 3ffe:503:c:1:EUI64
+-----+--+
|
============== +--------+
| Internet | | Host-B | 3ffe:1800::EUI64
============== +--------+
| |
2001:db8::/32 | | 3ffe:1800::/32
+----+-+ +-+---++
| ISP1 | | ISP2 | (Closed Network/VPN tunnel)
+----+-+ +-+----+
| |
2001:db8:a::/48 | | 3ffe:1800:a::/48
++-------++
| Gateway |
+----+----+
| 2001:db8:a:1::/64
| 3ffe:1800:a:1::/64
------+---+----------
|
+--+-----+ 2001:db8:a:1:EUI64
| Host-A | 3ffe:1800:a:1:EUI64
+--------+
[Fig. 3]
This network environment is commonly used in practice because the
access-line to the ISP2 might actually be a VPN tunnel over ISP1 and
the Internet.
When Host-A starts the connection to Host-B in ISP2, the source
address of a sending packet will be the one delegated from ISP2, that
is 3ffe:1800:a:1:EUI64, because of rule 8 (longest matching prefix)
in RFC 3484.
Host-C is located somewhere in the Internet and has an IPv6 address
3ffe:503:c:1:EUI64. When Host-A sends a packet to Host-C, the
longest matching algorithm chooses 3ffe:1800:a:1:EUI64 for the source
address. In this case, the packet goes through ISP1 and may be
filtered by ISP1's ingress filter. Even if the packet is fortunately
not filtered by ISP1, a return packet from Host-C cannot possibly be
Matsumoto, et al. Expires December 15, 2006 [Page 6]
Internet-Draft Address Selection PS June 2006
delivered to Host-A because the return packet is destined for 3ffe:
1800:a:1:EUI64, which is closed from the Internet.
In this case, source-address-based routing alone described in the
previous section does not solve the problem. What is important is
that each host chooses a correct source address for a given
destination address as far as NAT does not exist in the IPv6 world.
2.1.4. Combined Use of Global and ULA
============
| Internet |
============
|
|
+----+----+
| ISP |
+----+----+
|
2001:db8:a::/48 |
+----+----+
| Gateway |
+-+-----+-+
| | 2001:db8:a:100::/64
fd01:2:3:200:/64 | | fd01:2:3:100:/64
-----+--+- -+--+----
| |
fd01:2:3:200:EUI64 | | 2001:db8:a:100:EUI64
+----+----+ +-+----+ fd01:2:3:100:EUI64
| Printer | | Host |
+---------+ +------+
[Fig. 4]
In NAP [I-D.ietf-v6ops-nap], the use of ULA is recommended from a
security point of view. That document proposes the use of ULA for
internal communication and filtering those packets with ULA address
at Gateway.
There is no serious problem related to address selection in this
case, thanks to the unlikeness of ULA and Global Unicast Address for
now. RFC 3484's longest matching rule chooses the correct address
for both intra-site and extra-site communication.
In a few years, however, the longest matching rule will not be able
to choose the correct address anymore: the moment the assignment of
those Global Unicast Addresses whose beginning bit is 1 starts. In
RFC 4291 [RFC4291], almost all the space of IPv6, including those
Matsumoto, et al. Expires December 15, 2006 [Page 7]
Internet-Draft Address Selection PS June 2006
with beginning bit 1, is assigned as Global Unicast Addresses.
2.1.5. Site Renumbering
RFC 4192 [RFC4192] describes a recommended procedure for renumbering
a network from one prefix to another. An auto-configured address has
a lifetime, so by stopping advertisement of the old prefix it is
eventually invalidated.
However, it takes a long time to invalidate the old prefix. Also you
cannot stop routing to the old prefix because there could be a long-
lived TCP or UDP session that uses the old prefix.
+-----+---+
| Gateway |
+----+----+
| 2001:db8:a:1::/64 (new)
| 3ffe:1800:a:1::/64 (old)
------+---+----------
|
+--+-----+ 2001:db8:a:1:EUI64 (new)
| Host-A | 3ffe:1800:a:1:EUI64 (old)
+--------+
[Fig. 5]
2.1.6. Multicast Source Address Selection
This case is an example of Site-local or Global prioritization. When
you send a multicast packet across site-borders, the source address
of the multicast packet must be a global scope address. The longest
matching algorithm, however, selects a ULA address if the sending
host has both a ULA and a global address.
2.1.7. Temporary Address Selection
RFC 3041 [RFC3041] defines a Temporary Address, which is a cutting-
edge technique. The usage of Temporary Address has both pros and
cons. It is good for viewing web-pages or communicating with the
general public, but it is bad for a service that uses address-based
authentication.
It would be better if you could turn the temporary address on and
off. It would also be better if you could switch its usage per
service(destination address). The same situation can be found when
using HA and CoA in MobileIP network.
Matsumoto, et al. Expires December 15, 2006 [Page 8]
Internet-Draft Address Selection PS June 2006
2.2. Destination Address Selection
2.2.1. IPv4 or IPv6 prioritization
The default policy table gives IPv6 addresses higher precedence than
IPv4 addresses. There seem to be many cases, however, where network
administrators want to control the address selection policy of end-
hosts the other way around.
+---------+
| Tunnel |
| Service |
+--+---++-+
| ||
| ||
===========||==
| Internet || |
===========||==
| ||
10.2.0.0/16 | ||
+----+-+ ||
| ISP | ||
+----+-+ ||
| ||
IPv4 (Native) | || IPv6 (Tunnel)
10.2.30.0/32 | ||
++-----++-+
| Gateway |
+----+----+
| 2001:db8:a:1::/64
| 192.168.0.0/24
|
------+---+----------
|
+-+----+ 2001:db8:a:1:EUI64
| Host | 192.168.0.100
+------+
[Fig. 6]
In the figure above, a site has native IPv4 and tunneled IPv6
connectivity. Therefore, the administrator may want to set a higher
priority for using IPv4 than using IPv6 because the quality of the
tunnel network seems to be worse than that of the native transport.
2.2.2. ULA and IPv4 dual-stack environment
This is a special form of IPv4 and IPv6 prioritization. When an ISP
Matsumoto, et al. Expires December 15, 2006 [Page 9]
Internet-Draft Address Selection PS June 2006
has IPv4 Internet connectivity but does not yet have IPv6 Internet
connectivity, and the ISP wants to provide site-local IPv6
connectivity, ULA is the best choice for site-local IPv6
connectivity. Each customer host will have both an IPv4 global or
private address and a ULA. Here, when this host tries to connect to
Host-C that has registered both A and AAAA records in the DNS, the
host will choose AAAA as the destination address and ULA for the
source address. This will clearly result in a connection failure.
+--------+
| Host-C | AAAA = 2001:db8::80
+-----+--+ A = 192.47.163.1
|
============
| Internet |
============
| no IPv6 connectivity
+----+-+
| ISP |
+----+-+
|
| fd01:2:3::/48 (ULA)
| 10.2.0.0/16
IPv4 NAT ++--------+
| Gateway |
+----+----+
| fd01:2:3:4::/64 (ULA)
| 192.168.0.0/24
------+---+----------
|
+-+----+ fd01:2:3:4::100 (ULA)
| Host | 192.168.0.100
+------+
[Fig. 7]
2.2.3. ULA or Global Prioritization
It is very common to differentiate services by the client's source
address. IP-address-based authentication is an extreme example of
this. Another typical example is a web service that has pages for
the public and internal pages for employees or involved parties. Yet
another example is DNS zone splitting.
However, ULA and IPv6 global address both have global scope, and
default rules do not specify which address should be given priority.
This point makes IPv6 implementation of address-based service
differentiation a bit harder.
Matsumoto, et al. Expires December 15, 2006 [Page 10]
Internet-Draft Address Selection PS June 2006
+------+
| Host |
+-+--|-+
| |
===========|==
| Internet | |
===========|==
| |
| |
+----+-+ +-->+------+
| ISP +------+ DNS | 2001:db8:a::80
+----+-+ +-->+------+ fc12:3456:789a::80
| |
2001:db8:a::/48 | |
fc12:3456:789a::/48 | |
+----+----|+
| Gateway ||
+---+-----|+
| | 2001:db8:a:100::/64
| | fc12:3456:789a:100:/64
--+-+---|-----
| |
+-+---|+ 2001:db8:a:100:EUI64
| Host | fc12:3456:789a:100:EUI64
+------+
[Fig. 7]
3. Conclusion
We have covered problems related to destination or source address
selection. These problems have their roots in the situation where
end-hosts have multiple IP addresses. In this situation, every end-
host must choose an appropriate destination and source address, which
cannot be achieved only by routers.
It should be noted that end-hosts must be informed about routing
policies of their upstream networks for appropriate address
selection. A site administrator must consider every possible address
false-selection problem and take countermeasures beforehand.
Almost all the problem cases raised in this document can be solved by
configuring the policy table at end-hosts. The problem for a site-
administrator is that he does not have the means to deliver policies
to end-hosts. Therefore, we proposed a method for policy
distribution in the form of DHCPv6 option [I-D.fujisaki-dhc-addr-
select-opt]. The usage of this mechanisim is illustrated in another
Matsumoto, et al. Expires December 15, 2006 [Page 11]
Internet-Draft Address Selection PS June 2006
I-D [I-D.arifumi-ipv6-policy-dist].
4. Security Considerations
This is a problem statement draft. Security considerations need to
be identified for each solution.
5. IANA Considerations
This document has no actions for IANA.
6. References
6.1. Normative References
[I-D.arifumi-ipv6-policy-dist]
Matsumoto, A., "Practical Usages of Default Address
Selection Policy Distribution",
draft-arifumi-ipv6-policy-dist-00 (work in progress),
December 2005.
[I-D.fujisaki-dhc-addr-select-opt]
Fujisaki, T., "Distributing Default Address Selection
Policy using DHCPv6",
draft-fujisaki-dhc-addr-select-opt-01 (work in progress),
December 2005.
[RFC3484] Draves, R., "Default Address Selection for Internet
Protocol version 6 (IPv6)", RFC 3484, February 2003.
6.2. Informative References
[I-D.ietf-v6ops-nap]
Velde, G., "IPv6 Network Architecture Protection",
draft-ietf-v6ops-nap-02 (work in progress), October 2005.
[RFC3041] Narten, T. and R. Draves, "Privacy Extensions for
Stateless Address Autoconfiguration in IPv6", RFC 3041,
January 2001.
[RFC4191] Draves, R. and D. Thaler, "Default Router Preferences and
More-Specific Routes", RFC 4191, November 2005.
[RFC4192] Baker, F., Lear, E., and R. Droms, "Procedures for
Renumbering an IPv6 Network without a Flag Day", RFC 4192,
Matsumoto, et al. Expires December 15, 2006 [Page 12]
Internet-Draft Address Selection PS June 2006
September 2005.
[RFC4193] Hinden, R. and B. Haberman, "Unique Local IPv6 Unicast
Addresses", RFC 4193, October 2005.
[RFC4291] Hinden, R. and S. Deering, "IP Version 6 Addressing
Architecture", RFC 4291, February 2006.
Matsumoto, et al. Expires December 15, 2006 [Page 13]
Internet-Draft Address Selection PS June 2006
Authors' Addresses
Arifumi Matsumoto
NTT PF Lab
Midori-Cho 3-9-11
Musashino-shi, Tokyo 180-8585
Japan
Phone: +81 422 59 3334
Email: arifumi@nttv6.net
Tomohiro Fujisaki
NTT PF Lab
Midori-Cho 3-9-11
Musashino-shi, Tokyo 180-8585
Japan
Phone: +81 422 59 7351
Email: fujisaki@syce.net
Ruri Hiromi
Intec Netcore, Inc.
Shinsuna 1-3-3
Koto-ku, Tokyo 136-0075
Japan
Phone: +81 3 5665 5069
Email: hiromi@inetcore.net
Ken-ichi Kanayama
Intec Netcore, Inc.
Shinsuna 1-3-3
Koto-ku, Tokyo 136-0075
Japan
Phone: +81 3 5665 5069
Email: kanayama@inetcore.net
Matsumoto, et al. Expires December 15, 2006 [Page 14]
Internet-Draft Address Selection PS June 2006
Intellectual Property Statement
The IETF takes no position regarding the validity or scope of any
Intellectual Property Rights or other rights that might be claimed to
pertain to the implementation or use of the technology described in
this document or the extent to which any license under such rights
might or might not be available; nor does it represent that it has
made any independent effort to identify any such rights. Information
on the procedures with respect to rights in RFC documents can be
found in BCP 78 and BCP 79.
Copies of IPR disclosures made to the IETF Secretariat and any
assurances of licenses to be made available, or the result of an
attempt made to obtain a general license or permission for the use of
such proprietary rights by implementers or users of this
specification can be obtained from the IETF on-line IPR repository at
http://www.ietf.org/ipr.
The IETF invites any interested party to bring to its attention any
copyrights, patents or patent applications, or other proprietary
rights that may cover technology that may be required to implement
this standard. Please address the information to the IETF at
ietf-ipr@ietf.org.
Disclaimer of Validity
This document and the information contained herein are provided on an
"AS IS" basis and THE CONTRIBUTOR, THE ORGANIZATION HE/SHE REPRESENTS
OR IS SPONSORED BY (IF ANY), THE INTERNET SOCIETY AND THE INTERNET
ENGINEERING TASK FORCE DISCLAIM ALL WARRANTIES, EXPRESS OR IMPLIED,
INCLUDING BUT NOT LIMITED TO ANY WARRANTY THAT THE USE OF THE
INFORMATION HEREIN WILL NOT INFRINGE ANY RIGHTS OR ANY IMPLIED
WARRANTIES OF MERCHANTABILITY OR FITNESS FOR A PARTICULAR PURPOSE.
Copyright Statement
Copyright (C) The Internet Society (2006). This document is subject
to the rights, licenses and restrictions contained in BCP 78, and
except as set forth therein, the authors retain all their rights.
Acknowledgment
Funding for the RFC Editor function is currently provided by the
Internet Society.
Matsumoto, et al. Expires December 15, 2006 [Page 15]
| PAFTECH AB 2003-2026 | 2026-04-24 04:31:34 |