Efficient IPv6 Neighbor Discovery Optimizations for Wired and Wireless Networks



Similar documents
IPv6 Associated Protocols

Security Assessment of Neighbor Discovery for IPv6

IPv6 Trace Analysis using Wireshark Nalini Elkins, CEO Inside Products, Inc.

IPv6 Functionality. Jeff Doyle IPv6 Solutions Manager

Implementing DHCPv6 on an IPv6 network

Tomás P. de Miguel DIT-UPM. dit UPM

IP(v6) security. Matěj Grégr. Brno University of Technology, Faculty of Information Technology. Slides adapted from Ing.

Domain Name Auto-Registration for Plugged-in IPv6 Nodes. <draft-kitamura-ipv6-name-auto-reg-00.txt>

Chapter 3 Configuring Basic IPv6 Connectivity

IPv6 Addressing and Subnetting

Charter Text Network Design and Configuration

CS6956: Wireless and Mobile Networks Lecture Notes: 2/11/2015. IEEE Wireless Local Area Networks (WLANs)

IPv6 Fundamentals: A Straightforward Approach

IPv6 associated protocols. Piers O Hanlon

Network Security TCP/IP Refresher

CloudEngine Series Switches. IPv6 Technical White Paper. Issue 01 Date HUAWEI TECHNOLOGIES CO., LTD.

Network Mobility Support Scheme on PMIPv6 Networks

Mobility on IPv6 Networks

IPv6 Infrastructure Security

IPv6 Diagnostic and Troubleshooting

Neighbour Discovery in IPv6

Introduction to IP v6

The Wireless Network Road Trip

Chapter 3 LAN Configuration

Step-by-Step Guide for Setting Up IPv6 in a Test Lab

Mobile IP. Bheemarjuna Reddy Tamma IIT Hyderabad. Source: Slides of Charlie Perkins and Geert Heijenk on Mobile IP

Joe Davies. Principal Writer Windows Server Information Experience. Presented at: Seattle Windows Networking User Group June 1, 2011

About the Technical Reviewers

6 Mobility Management

Security Implications of the Internet Protocol version 6 (IPv6)

IPv6 for Cisco IOS Software, File 2 of 3: Configuring

IPv6 First Hop Security Protecting Your IPv6 Access Network

Introducing Reliability and Load Balancing in Mobile IPv6 based Networks

TECHNICAL NOTE. GoFree WIFI-1 web interface settings. Revision Comment Author Date 0.0a First release James Zhang 10/09/2012

VXLAN: Scaling Data Center Capacity. White Paper

Guide to Network Defense and Countermeasures Third Edition. Chapter 2 TCP/IP

Internet Engineering Task Force. Intended status: Experimental Expires: September 6, 2012 March 5, 2012

IPv6 Security Analysis

IPv6 Infrastructure Security Jeffrey L Carrell Network Conversions Network Security Consultant, IPv6 SME/Trainer

Dedication Preface 1. The Age of IPv6 1.1 INTRODUCTION 1.2 PROTOCOL STACK 1.3 CONCLUSIONS 2. Protocol Architecture 2.1 INTRODUCTION 2.

IPv6 mobility and ad hoc network mobility overview report

About Me. Work at Jumping Bean. Developer & Trainer Contact Info: mark@jumpingbean.co.za

Basic IPv6 WAN and LAN Configuration

Definition. A Historical Example

Introduction to ISIS. ISP/IXP Workshops

Firewalls und IPv6 worauf Sie achten müssen!

Domain Name System :49:44 UTC Citrix Systems, Inc. All rights reserved. Terms of Use Trademarks Privacy Statement

Security of IPv6 and DNSSEC for penetration testers

Wireless LAN Apple Bonjour Deployment Guide

LAN TCP/IP and DHCP Setup

OVERLAYING VIRTUALIZED LAYER 2 NETWORKS OVER LAYER 3 NETWORKS

GLBP - Gateway Load Balancing Protocol

An Active Network Based Hierarchical Mobile Internet Protocol Version 6 Framework

IPv6 Autoconfiguration Best Practice Document

Detecting rogue systems

Internetworking. Problem: There is more than one network (heterogeneity & scale)

Configuration Examples. D-Link Switches L3 Features and Examples IP Multicast Routing

CCT vs. CCENT Skill Set Comparison

Optimizing SIP Application Layer Mobility over IPv6 Using Layer 2 Triggers

Accelerating Service Discovery in Ad-hoc Zero Configuration Networking

Interconnecting Cisco Networking Devices Part 2

Recent advances in IPv6 insecurities Marc van Hauser Heuse Deepsec 2010, Vienna Marc Heuse

OLD VULNERABILITIES IN NEW PROTOCOLS? HEADACHES ABOUT IPV6 FRAGMENTS

IPv6 Addressing. Awareness Objective. IPv6 Address Format & Basic Rules. Understanding the IPv6 Address Components

IPv6 SECURITY. May The Government of the Hong Kong Special Administrative Region

IPv6 in Axis Video Products

1 Data information is sent onto the network cable using which of the following? A Communication protocol B Data packet

TESTING IPV6 ROUTERS WITH THE NEIGHBOR DISCOVERY PROTOCOL

IPv6 INFRASTRUCTURE SECURITY WORKSHOP SESSION 10 BUILDING IPv6 INFRASTRUCTURE NETWORK SECURITY

Central America Workshop - Guatemala City Guatemala 30 January - 1 February 07. IPv6 Router s Configuration

SSVVP SIP School VVoIP Professional Certification

Introduction to LAN/WAN. Network Layer

The VRRP Project. (Virtual Router Redundancy Protocol) Design Document

SEcure Neighbour Discovery: A Report

4m. MONITORING OF ETHERNET/IP NETWORK TRAFFIC.

Guide to TCP/IP, Third Edition. Chapter 3: Data Link and Network Layer TCP/IP Protocols

HP 5120 SI Switch Series

Vulnerabili3es and A7acks

Name Service in IPv6 Mobile Ad-hoc Network

Course Overview: Learn the essential skills needed to set up, configure, support, and troubleshoot your TCP/IP-based network.

IP Routing Features. Contents

Linux as an IPv6 dual stack Firewall

Objectives. The Role of Redundancy in a Switched Network. Layer 2 Loops. Broadcast Storms. More problems with Layer 2 loops

EETS 8316 Wireless Networks Fall 2013

Personal Firewall Default Rules and Components

Getting started with IPv6 on Linux

Telematics. 9th Tutorial - IP Model, IPv6, Routing

UG103.5 EMBER APPLICATION DEVELOPMENT FUNDAMENTALS: SECURITY

SERVICE DISCOVERY AND MOBILITY MANAGEMENT

Transcription:

Efficient IPv6 Neighbor Discovery Optimizations for Wired and Wireless Networks draft-chakrabarti-nordmark-6man-efficient-nd-02 Samita Chakrabarti (Samita.chakrabarti@ericsson.com) Erik Nordmark (nordmark@cisco.com) Pascal Thubert (pthubert@cisco.com) Margaret Wasserman (mrw@lilacgrade.org)

Background The Idea was first presented at IETF 82(6man, intarea): draft-chakrabarti-nordmark-energy-aware-nd-xx Next presentation in IETF 85 with focus on general efficiency in IPv6 networks and its interaction with protocols DNA, DHCPv6, ND Proxy, MLD Snooping draft-chakrabarti-nordmark-efficient-nd-01 The solution handles classic ND and enhanced ND operations

What is Efficient-ND? Leverages 6lowpan-nd [RFC 6775] for general IPv6 links No periodic multicast RA Replaces DAD with Address Registration Option [ARO] No multicast NS messages Host-driven refresh of RA information unicast RS to refresh Adds support for mixed-mode links Combining RFC 4861 and efficiency-aware nodes on same link Defines a new E-bit in the RA so hosts know the efficiency-aware routers Allows for sleeping hosts ARO is used to check for duplicates at the router ND host scan attack removed/reduced As more hosts use ARO the rate limit for sending multicast NS can be reduced to zero when all hosts on link use ARO Interactions with DHCPv6, DNA, MLD-snooping etc. Clarifications about any change in behavior of the above protocols NEAR NEAR R R NEAR H EAH H EAH H NEAR H EAH EAH

In this edition (-02) Existing: Basic Optimization of reduced multicast ND messages and address registration New Addition Handling out-of-order registration in a link with high delay variation Addresses inter-backbone router movement Supports RPL Routing protocol with TID Partial registration or multi-registration in a wireless link with default routers by a mobile host Removal Use case analysis Details

Avoiding multicast/broadcast issues in WIFI networks A motivation to solve the following problem The WiFi bridge network amplifies the downstream broadcast and multicast traffic at both the AP and controller. There are two sources of downstream traffic. Core network traffic going toward controllers, and controllers replicate this broadcast/multicast traffic to all of it physical (Eth: LAN & WAN) and virtual (CAPWAP) interfaces Mobile client traffic going to the Core network; and controllers replicate this (IPv4-ARP, IPv6-ND) traffic to all of it physical (Eth: LAN & WAN) and virtual (CAPWAP) interfaces WIC1 RTR L2/L3 WICn Solution: Optimization on mcast, DAD, periodic RA + Introducing ARO L2/L3 L2/L3 AP1a AP1z APna APnz MC1a1 MC1an MCna1 MCnan Implementations are coming up with vendor specific solutions to avoid the amplification

Out-of-Order Registration Handling ARO contains TID NEAR Host sends ARO-1 and then moves to a different wireless link and then sends ARO-2 after detecting L2 link move. But due to wireless network delay ARO-2 and ARO-1 arrival order is revered. TID is used to determine newest registration link ARO-1 ARO-2 Subnet A Wireless link Wireless link TID comparison also helps movement in Backbone routers, RPL (Pascal)

Address Registration Option (updated) Address Registration Option (ARO) is sent by the efficiency-aware hosts in a unicast NS message Optionally ARO may be sent by the NEAR to another NEAR in order to resolve ownership of registration TID field may be used by the NEAR routers to detect duplicate registration and as well as local mobility 0 1 2 3 0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1 +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+ Type Length = 2 Status Reserved +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+ Resvd T TID Registration Lifetime +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+ + EUI-64 + +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+ ARO with NS from Node.

Partial registration and Local Mobility Solution The Wireless node moves and registers with the closest router for efficiency ; The routers negotiates among themselves who should win the registration and then inject /delete routes to the network accordingly The Partial registration solution is not mandatory but recommended ARO Subnet A R1 R2 R3 First age is compared, if age difference is less than 1 sec, TID is compared NA with Registration Age + Status code NS (ARO) The younger registration Wins!

Address Registration Option with NA (when used between NEAR routers) Address Registration Option (ARO) is included by the efficiency-aware routers in a unicast NA message The Registration Lifetime field is used by the NEAR routers (optionally) to resolve the conflict resolution in order to update the ownership of the registration of the node 0 1 2 3 0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1 +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+ Type Length = 2 Status Reserved +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+ Resvd RSvd T TID Registration Age Lifetime +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+ + EUI-64 + +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+ Alternative Idea: use an option to ARO for age ARO with NS from Node.

Open Issues Current age information is only exchanged by NEAR but it uses the same Registration lifetime field in NA with a status code =3 to indicate that the field contains age ownership response. Should we avoid the overloading of field by introducing options to ARO?

Next Step Requesting the working group to move this document as the wg item Comments are welcome Thanks!

Backup Slides

NEAR and EAH in Mixed-Mode NEAR Sends periodic RAs for legacy hosts Supports ARO for EAH Advertises E-bit in RA Manages both Registered NCE entries and Legacy entries SHOULD have configuration knobs for Mixed vs. Efficiency-aware-only mode Recommended default mode for NEAR is Mixed-Mode NEAR MUST NOT set L bit in RA EAH First sends Multicast RS to the link to detect presence of NEAR if it did not hear a RA with E-bit upon joining the network already If it hears from both NEAR and legacy IPv6 Router, the NEAR(s) gets preference as a default router(s) Registers with more than one NEAR (if multiple are available) Efficiency-aware hosts SHOULD de-register before it moves away or switches to legacy mode

Mixed-mode Legacy host multicasts DAD probe In mixed mode, NEAR proxies based on registered NCEs Legacy host sends data packet to any router since L=0 Legacy router would multicast NS NEAR would proxy with an NA based on registered NCEs [Alternative is to require that a mixed link has only NEAR routers] EAH uses ARO for DAD In mixed mode, NEAR should multicast DAD probe before ack ing ARO

Interaction Detecting Network Attachment (DNA) Orthogonal DNA sends a unicast NS to previously know router(s) That can now include an ARO DNA also sends a multicast RS (in case moved to new link) Same as a regular RS/RA on power-on DHCPv6 ARO is used for link-local address DHCPv6 client SHOULD check DAD for assigned address. If ARO is available use that instead of multicast DAD probe Secure ND RFC 37971 recommends allowing un-secured DAD on first try Allows for NEAR to proxy DAD respose MLD snooping No use of solicited-node multicasts means less MLD snooping state

NCE Management Two Types of NCE Legacy (RFC 4861 NCE) Registered (in mixed-mode and efficiency-aware only mode) NCE types are orthogonal to NCE states All NCE are started with Legacy NCE Turns into Registered NCE upon successful processing of ARO Registered NCE are NOT garbage-collectable Registered NCE has its own life-time Registered NCE are renewed by the EAH via Registration refresh before it expired In efficiency-aware only mode a TENTATIVE legacy NCE is created for a short time and deleted if the entry does not get registered Registration lifetime and EUI-64 are recorded for Registered NCE Only one type of NCE can exist in Neighbor Cache at a time

Handling ND-DOS Attacks Only in efficiency-aware mode Tentative NCE entries are discarded if registration fails Duplicate entries must be checked before creating a valid NCE entry by checking EUI-64, MAC-address and IP-address All RS requests MUST contain SLLA option and avoids Neighbor Solicitation for the requestor s address resolution

Handling Sleepy Nodes Sleepy nodes must support efficiency-aware mode only behavior No Multicast periodic RA No Address resolution Required Address Registration ensures duplicate checks Uses Default-router for packet forwarding Sleep and Registration interval should be synchronized for maximum energy savings