[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]
Re: IPv6 broadband provisioning
On 29 dec 2007, at 1:46, David Miles wrote:
It is the N:1 VLAN model that needs an method to insert some "access
node specific" information into the DHCPv6 exchange.
Right, N:1.
However, you assume the presence of DHCPv6. I think it would be
reasonable to assume that a CPE that can route IPv6 will use DHCPv6
prefix delegation to obtain an address block, but if the CPE bridges
IPv6, then the question is whether the host(s) behind that CPE will
support DHCPv6 address configuration. Since this is rare today that's
a dangerous assumption.
I'm not sure we need to use global-unicast addresses on the WAN CPE
interface so I'd hazard to say that RA with PIO is not needed.
You need this anyway if you want to support sites that don't do DHCPv6.
Also, if you give the CPE a global unicast address using RAs as per my
original idea then you could do DHCPv6 with the unicast option so
there's no need to implement DHCPv6 snooping.
Just do stateless autoconfig for link-local
There is no stateless autoconfiguration for link locals.
then move to DHCPv6 for prefix delegation (ie, M-bit=0, O-bit=1 in
the RA).
Hm, is that the appropriate combination for DHCPv6 PD?
From a customer's perspective, is a global-unicast WAN address
useful? From an ISP and vendor perspective it may add additional
complexities. What do you think about such an approach? This would
remove the need to add anything to RA between the ISP router and the
CPE.
Since that was the core of my idea your idea and mine seem complete
opposites. :-)
I'm thinking implementing the RA handling in aggregation switches is
easier than implementing DHCPv6 snooping, and with RAs you can support
bridging CPEs with today's IPv6 implementations so deployment will be
easier.
But I guess a lot depends on the way the DSL people end up doing
authentication.
What you have described is the very reason that the DSL Forum
implemented L2 DHCP(v4) Relay Agents in TR-101.
DHCP is the only reasonable way to autoconfigure addresses in IPv4. In
IPv6, things are different.
This last part removes the need for the DSLAM to implement a
complete IPv6 stack that would require configuration and
participation in ND, etc.
That's not necessary in my model, the aggregation switch only needs to
be able to send RAs that are always the same except for a few bits in
the prefix option. (Probably in reply to router solicitations.) There
is no need for a full or even a partial IPv6 implementation or much in
the way of parsing incoming messages.
I would like to explore this part with others as part of discussions
within the DHC WG on this issue.
I don't think that makes sense, none of this requires changes to DHCPv6.
In the n:1 IPoE world we need to consider the layer 2 Ethernet
network as much as IPv6, so some mechanisms you describe for DoS
prevention need to be extended to MAC addresses. To this extent we
would usually admit a single learnt MAC per DSL line (does this also
imply a single link-local?? I guess EUI-64 may not be MAC derived?)
I gather that Windows Vista uses a non-MAC derived link local address.
In any event, I don't think it's against the specs to do this so it
must be accommodated.
I would prefer it if a subscriber could connect multiple IPv6 hosts to
a bridging CPE, but if that leads to too many headaches, I guess it's
acceptable to stick to the common IPv4 model where there is either a
single host or a device with some routing functionality hooked up to a
bridging CPE.
The issue that I see is that of duplicate MAC addresses. I don't see
an easy way to protect against that. How does this work today in a N:1
model?
The nasty subject of ND and DAD comes up in the N:1 VLAN approach
because a "split-horizon" forwarding model is in place.
Not sure what the issue is with neighbor discovery. As for DAD, for
global unicast that's not an issue because different subscribers use
different prefixes. So that leaves link locals. This can be solved by
having the ISP router do proxy ND for this specific purpose to address
the corner case where the link local address isn't MAC-derived. (The
MAC address was unique, right...?)
RFC 2460 defines a "link" as a medium over which nodes can
communicate at a link-layer. The problem with the N:1 VLAN model is
that nodes cannot communicate with one-another via the link-layer,
only with the L3 router (BNG). This fundamental problem manifests
itself during DAD - consider this:
- When a node sends a DAD (for link-local addressing) it uses an
unspecified source and the destination is set to the solicited-node
MC address of the target
- Because the network is running split-horizon, only the ISP
router(s) will receive these DADs.
- The routers cannot relay these messages back into the N:1 VLAN,
because the node sending the DAD (still with a tentative address)
will immediately stop address auto-configuration if it receives a
DAD with the target-address equal to its tentative address.
It's unclear what happens in the case where the original DAD message
loops back to the sending host. Hopefully hosts are smart enough to
detect and ignore this condition.
I think proxy ND will help here, at least in the case where the two
hosts with the same link local address are both active enough for the
router to have their info in the neighbor cache.