[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]
Re: 6to4; ISATAP interfaces configured over same IPv4 address (was: Re: FYI Isatap implementations info)
Hi Karen,
It looks like we have reached conclusions on this topic. Conclusions
are that, if a 6to4 interface and isatap interface are configured over
the same IPv4 address, a received packet's inner IPv6 source address
is first checked to see if it has an on-link prefix on the isatap interface.
Next, if the packet does not belong to the isatap interface, it is checked
to see if it belongs to the 6to4 interface.
Can we consider this case now closed?
Fred
ftemplin@iprg.nokia.com
Karen E. Nielsen (AH/TED) wrote:
Hi Fred,
If a 6to4 interface and ISATAP interface are configured
over the same
IPv4 address, it would have to be a global IPv4 address
assigned to an
interface connected to the global Internet due to 6to4
requirements. In
that case, I believe the correct behavior should be for the
6to4 interface
to take precedence for packets received with an on-link
6to4 prefix in
the IPv6 destination, and for the ISATAP interface to take
precedence
for all others. Comments?
When I say takes precedence over I (still) mean the following:
First Priority: If the prefix of the source address in
the inner
IPv6 header of the encapsulated packet matches a prefix of the
ISATAP interface, the packet is processed by this
tunnel interface.
This would seem like the correct natural choice, since it
seems consistent
with the notion of "intra-site". Again, I assume by this you
are intending
to include link-locals? (Perhaps that's *all* you are
intending to include?)
Prefixes local to the Intra-site of the Isatap interface
including link-locals are what I intend to include.
Second Priority: If the prefix of either the source or
destination address
in the inner IPv6 header is a 6to4 prefix, the packet
is processed by the 6to4 tunnel interface.
Let's take a closer look at the cases; please tell me if I
mis-represent
anything:
1) If both the source and destination are 6to4, then the packet is
originating
and terminating within the 6to4 domain. So, use of the 6to4
interface would
seem natural and appropriate. (Note that the destination
might not
belong to
*this* 6to4 router in which case L3 might forward
(redirect?) the
packet to
the correct 6to4 router - but, this is irrelevant for L2.5
decapsulation.)
I agree, though in case the destination is 6to4 but doesn't belong to this router,
the packet will and should be silently discarded by the 6to4 tunnel interface.
[in compliance with e.g. section 5.2 of draft-ietf-v6ops-6to4-security-02.txt].
2) If the destination is 6to4, but the source is not 6to4, then the
packet is
originating from behind a 6to4 relay router and
terminating within the
6to4 domain. Again, the 6to4 interface seems the natural choice.
I agree.
3) If the source is 6to4, but the destination is not 6to4,
then the packet
is originating from within the 6to4 domain and will eventually
terminate within the native IPv6 Internet. To do this,
it will have
to transition from the 6to4 domain to the native IPv6
Internet via
a relay router which may/may not occur on *this* 6to4 router.
Is the 6to4 interface the correct interface to
decapsulate for this
case?
It seems somewhat less obvious to me, but still a better
choice than
the ISATAP interface when the source prefix is not on-link.
If the 6to4 interface isn't a 6to4 relay interface
the 6to4 interface will and should discard the packet silently.
**Here again it should be emphasized that these rules are
not intended to
apply to the Isatap router-to-router tunnelling situation.**
I am fine with leaving this aspect out from the current discussion.
I am not 100 % sure what you mean by an on-link 6to4 prefix.
I think I may have been stuck with a mis-conception that 6to4
interfaces
should only decapsulate packets with an IPv6 destination prefix of
2002:V4ADDR::/48, where "V4ADDR" is assigned to one of the
node's IPv4 interfaces.
I can imagine that you refer to one of the following 2 situations:
(I)
_ _ _ _ - - - - - - - - - - - - - -
| | ___ | Global Internet/exterior
|
| 6to4 |-v6-/ R \ | _ _ _ _ _ |
| Site | \___/-globalV4ADDR-| Intra | |
|_ _ _ _| | -site | |
- - - - - - - - - - - - - -
(II) - - - - - - - - - -
___ | Global Internet/ |
/ R \ | _ _ _ _ _ exterior|
\___/-globalV4ADDR-| Intra | |
| -site | |
| of 6to4 | |
| prefix | |
- - - - - - - - - -
In both situations a packet with the mentioned inner source address
should be from within the intra-site and should be processed
by the Isatap
interface and not the 6to4 interface turned towards the exterior.
In (I), then in our 6to4 implementation, the packet with the
mentioned source address,
will be discarded by the 6to4 tunnel interfaces as we rely
on trusted relay routers.
It wil not be accepted as a packet from a 6to4 border router
since the v6 and the v4 sources
don't add up.
In (II)
The packet is a packet coming from and destined for the
Intra-site and should
be processed by the intra-site router interface (i.e. the Isatap
interface). Again
the 6to4 interface would discard the packet,
further It should be redirected but thats another matter.
I'm not prepared to comment on this in detail since I'm not
entirely sure
what you are referring to by "the mentioned inner source address", and
your examples might have been motivated by the misconception
I mentioned
above. Perhaps this discussion is obviated by the examination
of the cases
I provided earlier?
I apologize. The above was an attempt to explain why the
Isatap source address check should precede the 6to4 destination check when allocating
the appropriate tunnel interface on the inbound path in case
where both 6to4 and isatap interfaces are anchored on the same ipv4 interface.
But then I understand now that we may be in agreement on that.
By "mentioned inner source address", I mean an encapsulated packet where inner
source address matches a prefix of the ISATAP interface.
BR, Karen