<?xml version="1.0"encoding="US-ASCII"?>encoding="UTF-8"?> <!DOCTYPE rfc SYSTEM"rfc2629.dtd" [ <!ENTITY RFC2119 SYSTEM "http://xml.resource.org/public/rfc/bibxml/reference.RFC.2119.xml"> <!ENTITY RFC3756 SYSTEM "http://xml.resource.org/public/rfc/bibxml/reference.RFC.3756.xml"> <!ENTITY RFC4033 SYSTEM "http://xml.resource.org/public/rfc/bibxml/reference.RFC.4033.xml"> <!ENTITY RFC4291 SYSTEM "http://xml.resource.org/public/rfc/bibxml/reference.RFC.4291.xml"> <!ENTITY RFC4429 SYSTEM "http://xml.resource.org/public/rfc/bibxml/reference.RFC.4429.xml"> <!ENTITY RFC4541 SYSTEM "http://xml.resource.org/public/rfc/bibxml/reference.RFC.4541.xml"> <!ENTITY RFC4861 SYSTEM "http://xml.resource.org/public/rfc/bibxml/reference.RFC.4861.xml"> <!ENTITY RFC4862 SYSTEM "http://xml.resource.org/public/rfc/bibxml/reference.RFC.4862.xml"> <!ENTITY RFC6052 SYSTEM "http://xml.resource.org/public/rfc/bibxml/reference.RFC.6052.xml"> <!ENTITY RFC6105 SYSTEM "http://xml.resource.org/public/rfc/bibxml/reference.RFC.6105.xml"> <!ENTITY RFC6146 SYSTEM "http://xml.resource.org/public/rfc/bibxml/reference.RFC.6146.xml"> <!ENTITY RFC6147 SYSTEM "http://xml.resource.org/public/rfc/bibxml/reference.RFC.6147.xml"> <!ENTITY RFC6583 SYSTEM "http://xml.resource.org/public/rfc/bibxml/reference.RFC.6583.xml"> <!ENTITY RFC6775 SYSTEM "http://xml.resource.org/public/rfc/bibxml/reference.RFC.6775.xml"> <!ENTITY RFC6877 SYSTEM "http://xml.resource.org/public/rfc/bibxml/reference.RFC.6877.xml"> <!ENTITY RFC7050 SYSTEM "http://xml.resource.org/public/rfc/bibxml/reference.RFC.7050.xml"> <!ENTITY RFC7225 SYSTEM "http://xml.resource.org/public/rfc/bibxml/reference.RFC.7225.xml"> <!ENTITY RFC7556 SYSTEM "http://xml.resource.org/public/rfc/bibxml/reference.RFC.7556.xml"> <!ENTITY RFC7858 SYSTEM "http://xml.resource.org/public/rfc/bibxml/reference.RFC.7858.xml"> <!ENTITY RFC8174 SYSTEM "http://xml.resource.org/public/rfc/bibxml/reference.RFC.8174.xml"> <!ENTITY RFC8305 SYSTEM "http://xml.resource.org/public/rfc/bibxml/reference.RFC.8305.xml"> <!ENTITY RFC8505 SYSTEM "http://xml.resource.org/public/rfc/bibxml/reference.RFC.8505.xml"> <!ENTITY RFC8981 SYSTEM "http://xml.resource.org/public/rfc/bibxml/reference.RFC.8981.xml"> ]> <?xml-stylesheet type='text/xsl' href='rfc2629.xslt' ?> <?rfc toc="yes" ?> <?rfc tocompact="yes"?> <?rfc tocindent="yes"?> <?rfc symrefs="yes" ?> <?rfc sortrefs="yes"?> <?rfc iprnotified="no" ?> <?rfc strict="yes" ?> <?rfc compact="yes"?> <?rfc subcompact="no"?> <?rfc subcompact="no" ?>"rfc2629-xhtml.ent"> <rfc xmlns:xi="http://www.w3.org/2001/XInclude" ipr="trust200902" obsoletes=""category="std"updates="4861"docName="draft-ietf-6man-grand-07"> <!-- category values: std, bcp, info, exp, and historic --> <!-- ***** FRONT MATTER ***** -->docName="draft-ietf-6man-grand-07" number="9131" submissionType="IETF" category="std" consensus="true" xml:lang="en" tocInclude="true" symRefs="true" sortRefs="true" version="3"> <front><!-- The abbreviated title is used in the page header - it is only necessary if the full title is longer than 39 characters --><title abbrev="Gratuitous ND">Gratuitous Neighbor Discovery: Creating Neighbor Cache Entries onFirst-HopFirst&nbhy;Hop Routers</title><!-- add 'role="editor"' below for the editors if appropriate --><seriesInfo name="RFC" value="9131"/> <author fullname="Jen Linkova" initials="J." surname="Linkova"> <organization>Google</organization> <address> <postal> <street>1 Darling Island Rd</street> <city>Pyrmont</city> <region>NSW</region> <code>2009</code><country>AU</country><country>Australia</country> </postal><phone></phone><email>furry@google.com</email> </address> </author><date/> <!-- If the month and year are both specified and are the current ones, xml2rfc will fill in the current day for you. If only the current year is specified, xml2rfc will fill in the current day and month for you. If the year is not the current one, it is necessary to specify at least a month (xml2rfc assumes day="1" if not specified for the purpose of calculating the expiry date). With drafts it is normally sufficient to specify just the year. --> <!-- Meta-data Declarations --><date year="2021" month="September"/> <area>Internet</area> <workgroup>IPv6 Maintenance</workgroup><!-- WG name at the upperleft corner of the doc, IETF is fine for individual submissions. If this element is not present, the default is "Network Working Group", which is used by the RFC Editor as a nod to the history of the IETF. --> <keyword>template</keyword> <!-- Keywords will be incorporated into HTML output files in a meta tag but they have no effect on text or nroff output. If you submit your draft to the RFC Editor, the keywords will be used for the search engine. --><keyword>IPv6</keyword> <keyword>SLAAC</keyword> <keyword>stateless address autoconfiguration</keyword> <keyword>neighbor advertisement</keyword> <abstract> <t> Neighbor Discovery(RFC4861)(RFC 4861) is used by IPv6 nodes to determine the link-layer addresses of neighboring nodes as well as to discover and maintain reachability information. This document updatesRFC4861RFC 4861 to allow routers to proactively create a Neighbor Cache entry when a new IPv6 address is assigned to a node. It also updatesRFC4861RFC 4861 and recommends that nodestosend unsolicited Neighbor Advertisements upon assigning a new IPv6 address.The proposed changeThese changes will minimize the delay and packet loss when a node initiates connections to an off-link destination from a new IPv6 address. </t> </abstract> </front> <middle> <sectiontitle="Introduction">numbered="true" toc="default" anchor="Introduction"> <name>Introduction</name> <t> The Neighbor Discovery state machine defined in <xreftarget="RFC4861"/>target="RFC4861" format="default"/> assumes that communications between IPv6 nodesareare, in mostcases bi-directionalcases, bidirectional and if a node A is trying to communicate to its neighbor, node B, the return traffic flows could be expected.SoSo, whenthenode A starts the address resolution process, the target node B would also create an entry containing A's IPv6 and link-layer addresses in itsneighbor cache.Neighbor Cache. That entry will be used for sending the return traffic to A. </t> <t> In particular,section 7.2.5 of<xreftarget="RFC4861"/>target="RFC4861" sectionFormat="of" section="7.2.5"/> states:"When</t> <blockquote>When a valid Neighbor Advertisement is received (either solicited or unsolicited), the Neighbor Cache is searched for the target's entry. If no entry exists, the advertisementSHOULD<bcp14>SHOULD</bcp14> be silently discarded. There is no need to create an entry if none exists, since the recipient has apparently not initiated any communication with thetarget." </t>target.</blockquote> <t> While this approach is perfectly suitable for host-to-host on-link communications, it does not work so well when a host sends traffic to off-link destinations. After joining the network and receiving a RouterAdvertisementAdvertisement, the host populates itsneighbor cacheNeighbor Cache with the default router IPv6 and link-layer addresses and is able to send traffic to off-link destinations. At the sametimetime, the router does not have any cache entries for the host global addresses yet and only starts address resolution upon receiving the first packet of the return traffic flow. While waiting for the resolution tocompletecomplete, routers only keep a very small number of packets in the queue, as recommended inSection 7.2.2<xreftarget="RFC4861"/>.target="RFC4861" sectionFormat="of" section="7.2.2"/>. Any additional packets arriving before the resolution>process finishes are likely to result in droppedpacketspackets. It can cause packet loss and performance degradation that can beuser-visible.visible to users. </t> <t> This document updates the Neighbor Discovery protocol <xreftarget="RFC4861"/>target="RFC4861" format="default"/> to avoid packet loss in the scenario described above. <xreftarget="changes"/>target="changes" format="default"/> discusses the changes andanalysesanalyzes the potential impact, while normative changes to <xreftarget="RFC4861"/>target="RFC4861" format="default"/> are specified in <xreftarget="RFC_UPD"/>.target="RFC_UPD" format="default"/>. </t> <sectiontitle="Requirements Language">numbered="true" toc="default"> <name>Requirements Language</name> <t>The key words"MUST", "MUST NOT", "REQUIRED", "SHALL", "SHALL NOT", "SHOULD", "SHOULD NOT", "RECOMMENDED", "NOT RECOMMENDED", "MAY","<bcp14>MUST</bcp14>", "<bcp14>MUST NOT</bcp14>", "<bcp14>REQUIRED</bcp14>", "<bcp14>SHALL</bcp14>", "<bcp14>SHALL NOT</bcp14>", "<bcp14>SHOULD</bcp14>", "<bcp14>SHOULD NOT</bcp14>", "<bcp14>RECOMMENDED</bcp14>", "<bcp14>NOT RECOMMENDED</bcp14>", "<bcp14>MAY</bcp14>", and"OPTIONAL""<bcp14>OPTIONAL</bcp14>" in this document are to be interpreted as described inBCP 14BCP 14 <xref target="RFC2119"/> <xref target="RFC8174"/> when, and only when, they appear in all capitals, as shown here.</t> </section> <sectiontitle="Terminology"> <t> Node: anumbered="true" toc="default"> <name>Terminology</name> <dl newline="false" spacing="normal"> <dt>Node:</dt><dd>A device that implementsIP,IP <xreftarget="RFC4861"/>. </t> <t> Host: anytarget="RFC4861" format="default"/>.</dd> <dt>Host:</dt><dd>Any node that is not arouter,router <xreftarget="RFC4861"/>. </t> <t> ND: Neighbor Discovery,target="RFC4861" format="default"/>.</dd> <dt>ND:</dt><dd>Neighbor Discovery <xreftarget="RFC4861"/>. </t> <t> NC: Neighbor Cache,target="RFC4861" format="default"/>.</dd> <dt>NC:</dt><dd>Neighbor Cache <xreftarget="RFC4861"/>.target="RFC4861" format="default"/>. The Neighbor Cache entry can be in one of five states, as described insection 7.3.2 of<xreftarget="RFC4861"/>:target="RFC4861" sectionFormat="of" section="7.3.2"/>: INCOMPLETE, REACHABLE, STALE, DELAY,PROBE. </t> <t> SLAAC: IPv6or PROBE.</dd> <dt>SLAAC:</dt><dd>IPv6 Stateless AddressAutoconfiguration,Autoconfiguration <xreftarget="RFC4862"/>. </t> <t> NS: Neighbor Solicitation,target="RFC4862" format="default"/>.</dd> <dt>NS:</dt><dd>Neighbor Solicitation <xreftarget="RFC4861"/>. </t> <t> NA: Neighbor Advertisement,target="RFC4861" format="default"/>.</dd> <dt>NA:</dt><dd>Neighbor Advertisement <xreftarget="RFC4861"/>. </t> <t> RS: Router Solicitation,target="RFC4861" format="default"/>.</dd> <dt>RS:</dt><dd>Router Solicitation <xreftarget="RFC4861"/>. </t> <t> RA: Router Advertisement,target="RFC4861" format="default"/>.</dd> <dt>RA:</dt><dd>Router Advertisement <xreftarget="RFC4861"/>. </t> <t> SLLAO: Source link-layertarget="RFC4861" format="default"/>.</dd> <dt>SLLAO:</dt><dd>Source Link-Layer AddressOption, anOption. An option in the ND packets containing the link-layer address of the sender of the packet <xreftarget="RFC4861"/>. </t> <t> TLLAO: Target link-layertarget="RFC4861" format="default"/>.</dd> <dt>TLLAO:</dt><dd>Target Link-Layer AddressOption, anOption. An option in the ND packets containing the link-layer address of the target <xreftarget="RFC4861"/>. </t> <t> GUA: Globaltarget="RFC4861" format="default"/>.</dd> <dt>GUA:</dt><dd>Global Unicast Address <xreftarget="RFC4291"/>. </t> <t> DAD: Duplicatetarget="RFC4291" format="default"/>.</dd> <dt>DAD:</dt><dd>Duplicate AddressDetection,Detection <xreftarget="RFC4862"/>. </t> <t> Preferred Address: antarget="RFC4862" format="default"/>.</dd> <dt>Preferred Address:</dt><dd>An address assigned to an interface whose uniqueness has been verified using DAD and whose use by upper-layer protocols isunrestricted,unrestricted <xreftarget="RFC4862"/>.target="RFC4862" format="default"/>. Preferred addresses may be used as the source address of packets sent from theinterface. </t> <t> Optimistic DAD: ainterface.</dd> <dt>Optimistic DAD:</dt><dd>A modification ofDAD,DAD <xreftarget="RFC4429"/>. </t>target="RFC4429" format="default"/>.</dd> </dl> </section> </section> <sectiontitle="Problem Statement">numbered="true" toc="default"> <name>Problem Statement</name> <t> The most typical scenario when the problem described in this document may arise is a host joining the network, forming a newaddressaddress, and using that address for accessing the Internet: </t><t> <list style="numbers"> <t><ol spacing="normal" type="1"><li> A host joins the network and receives a Router Advertisement (RA) packet from the first-hop router (either a periodic unsolicited RA or a response to a Router Solicitation sent by the host). The RA contains information the host needs to perform SLAAC and to configure its network stack. The RA is sent from the router's link-local address to a link-local destination address and may contain the link-layer address of the router. As aresultresult, the host can populate its Neighbor Cache with the router's link-local and link-layer addresses.</t> <t></li> <li> The host starts opening connections to off-link destinations. A very common use case is a mobile device sending probes to detecttheInternet connectivity and/or the presence of a captive portal on the network. To speed up thatprocessprocess, many implementations use OptimisticDADDAD, which allows them to send probes before the DAD process is completed. At thatmomentmoment, thedevice neighbor cachedevice's Neighbor Cache contains all information required to send those probes (such as the default router link-local and link-layer addresses). Therouter neighbor cache,router's Neighbor Cache, however, might contain an entry for thedevicedevice's link-local address (if the device has been performingtheaddress resolution for therouterrouter's link-local address), but there are no entries for any of the device's global addresses.</t> <t></li> <li> Return traffic is received by the first-hop router. As the router does not have any cache entry for thehosthost's global address yet, the router starts theneighbor discoveryNeighbor Discovery process by creating an INCOMPLETE cache entry and then sending a Neighbor Solicitation to theSolicited Node Multicast Address (Section 7.3.2 of <xref target="RFC4861"/>).solicited-node multicast address (<xref target="RFC4861" sectionFormat="of" section="7.3.2"/>). As perSection 7.2.2 of<xreftarget="RFC4861"/> Routers MUSTtarget="RFC4861" sectionFormat="of" section="7.2.2"/>, routers <bcp14>MUST</bcp14> buffer at least one data packet andMAY<bcp14>MAY</bcp14> buffer more, while resolving the packet destination address. However, most router implementations limit the buffer size to a few packets only, and some implementations are known to buffer just one packet.SoSo, any subsequent packets arriving before the address resolution process is completedare causingcause packet loss by replacing older packets in the buffer.</t> <t></li> <li> If the host sends multiple probes in parallel, in the worst case, it would consider all but one of them failed. That leads to user-visible delay in connecting to the network, especially if the host implements some form of backoff mechanism and does not retransmit the probes as soon as possible.</t> </list> </t></li> </ol> <t> This scenario illustrates the problem occurring when the device connects to the network for the first time or after an inactivity period long enough for thedevicedevice's address to be removed from the router'sneighbor cache.Neighbor Cache. However, the same sequence of eventshappenhappens when the host starts using a new global address previously unseen by the router, such as a new privacy address <xreftarget="RFC8981"/>target="RFC8981" format="default"/> or if the router's Neighbor Cache has been flushed. </t> <t> While in dual-stack networks this problem might be hidden by Happy Eyeballs <xreftarget="RFC8305"/>target="RFC8305" format="default"/>, it manifests quite clearly in IPv6-only environments, especially wirelessones,environments, leading to poor user experience and contributing to a negative perception of IPv6-only solutions as unstable and non-deployable. </t> </section> <sectiontitle="Solution Requirements">numbered="true" toc="default"> <name>Solution Requirements</name> <t> It would be highly desirable to improve the Neighbor Discovery mechanics so routers have a usable cache entry for a host address by the time the router receives the first packet for that address. In particular:<list style="symbols"> <t></t> <ul spacing="normal"> <li> If the router does not have a Neighbor Cache entry for the address, a STALE entry needs to be created proactively, prior to arrival of the first packet intended for that address.</t> <t></li> <li> The solution needs to work for OptimisticaddressesAddresses as well. Devices implementingtheOptimistic DAD usually attempt to minimize the delay in connecting to the network and therefore are more likely to be affected by the problem described in this document.</t> <t></li> <li> In the case of duplicate addresses present in the network, theproposedsolution should not override the existing entry.</t> <t></li> <li> In topologies with multiple first-hoproutersrouters, the cache needs to be updated on all of them, as traffic might be asymmetric: outgoing flows leaving the network via one router while the return traffic enters the segment via another one.</t> </list> </t></li> </ul> <t> Inadditionaddition, the solution must not exacerbate issues described in <xreftarget="RFC6583"/>target="RFC6583" format="default"/> and needs to be compatible with the recommendations provided in <xreftarget="RFC6583"/>.target="RFC6583" format="default"/>. </t> </section> <section anchor="changes"title="Changesnumbered="true" toc="default"> <name>Changes to NeighborDiscovery">Discovery</name> <t> The following changes are required to minimize the delay in creating new entries in arouter neighbor cache <list style="symbols"> <t>router's Neighbor Cache: </t> <ul spacing="normal"> <li> A node sends unsolicited NAs upon assigning a new IPv6 address to its interface.</t> <t></li> <li> A router creates a new cache entry upon receiving an unsolicited NA from a host.</t> </list> </t></li> </ul> <t> The following sections discuss these changes in more detail. Normative changes are specified in <xreftarget="RFC_UPD"/>.target="RFC_UPD" format="default"/>. </t> <section anchor="hosts"title="Nodesnumbered="true" toc="default"> <name>Nodes Sending Gratuitous NeighborAdvertisements">Advertisements</name> <t>The section 7.2.6 of<xreftarget="RFC4861"/>target="RFC4861" sectionFormat="of" section="7.2.6"/> discusses using unsolicited Neighbor Advertisements to inform node neighbors of the new link-layer address quickly. The same mechanism could be used to notify the node neighbors about the new network-layer address as well: the node can sendgratuitousunsolicited Neighbor Advertisements upon assigning a new IPv6 address to its interface. </t> <t> To minimizethepotential disruption in the case of duplicateaddressesaddresses, the node should not set the Override flag for a preferred address and must not set the Override flag if the address is in the Optimistic state <xreftarget="RFC4429"/> state.target="RFC4429" format="default"/>. </t> <t> As the main purpose of sending unsolicited NAs upon configuring a new address is to proactively create a Neighbor Cache entry on the first-hop routers, the gratuitous NAs are sent to the all-routers multicast address (ff02::2). Limiting the recipients to routers only would help reduce the multicast noise level. If the link-layer devices are performingMLDMulticast Listener Discovery (MLD) snooping <xreftarget="RFC4541"/>,target="RFC4541" format="default"/>, then those unsolicited NAs willbeonly be sent to routers on the given network segment/link, instead of being flooded to all nodes. </t> <t> It should be noted that theproposedmechanism discussed here does not cause any significant increase in multicast traffic. The additional multicast unsolicitedNANAs would proactively create a STALE cache entry onroutersthe router, as discussed below. When the router receives the return trafficflowsflows, it does not need to send multicast NSes to thesolicited nodesolicited-node multicast address but wouldbe sendingsend unicast NSes instead.ThereforeTherefore, this procedure would only produce an increase in the overall amount of multicast traffic if no return traffic arrives for the address that sent the unsolicited NA or if the router does not create a STALE entry upon receiving such an NA. The increase would benegligiblenegligible, as that additional traffic is a few orders of magnitude less than the usual level of Neighbor Discovery multicast traffic. </t> </section> <sectiontitle="Routersnumbered="true" toc="default"> <name>Routers Creating Cache EntriesUponupon Receiving Unsolicited NeighborAdvertisements">Advertisements</name> <t>The section 7.2.5 of<xreftarget="RFC4861"/>target="RFC4861" sectionFormat="of" section="7.2.5"/> states:"When</t> <blockquote>When a valid Neighbor Advertisement is received (either solicited or unsolicited), the Neighbor Cache is searched for the target's entry. If no entry exists, the advertisementSHOULD<bcp14>SHOULD</bcp14> be silently discarded. There is no need to create an entry if none exists, since the recipient has apparently not initiated any communication with thetarget". </t>target.</blockquote> <t> The reasoning behind dropping unsolicited Neighbor Advertisements ("the recipient has apparently not initiated any communication with the target") is valid foronlinkon-link host-to-host communication but, as discussedabove,in <xref target="Introduction" format="default"/>, it does not really applyforto the scenario when the host is announcing its address to routers. Therefore, it would be beneficial to allow routers to create new entries upon receiving an unsolicited Neighbor Advertisement. </t> <t> This document updates <xreftarget="RFC4861"/>target="RFC4861" format="default"/> so that routers create a new Neighbor Cache entry upon receiving an unsolicited Neighbor Advertisement for an address that does not already have a Neighbor Cache entry.. The proposedThese changes do not modifyrouters behaviourthe router behavior specified in <xreftarget="RFC4861"/>target="RFC4861" format="default"/> for the scenario when the corresponding Neighbor Cache entry already exists. </t> <t> The next sectionanalysesanalyzes various scenarios ofduplicatedduplicate addresses and discusses the potential impact of creating a STALE entry for aduplicatedduplicate IPv6 address. </t> </section> </section> <section anchor="avoid_dis"title="Avoiding Disruption">numbered="true" toc="default"> <name>Avoiding Disruption</name> <t> If nodes following the recommendations in this document are using the DAD mechanism defined in <xreftarget="RFC4862"/>,target="RFC4862" format="default"/>, they would send unsolicitedNANAs as soon as the address changesthestate from tentative to preferred (after its uniqueness has been verified). However, nodes willing to minimize network stack configuration delays might be usingoptimistic addresses,Optimistic Addresses, which means there is a possibility of the address not being unique on the link.Section 2.2 of<xreftarget="RFC4429"/>target="RFC4429" sectionFormat="of" section="2.2"/> discusses measures to ensure that ND packets from theoptimistic addressOptimistic Address do not override any existingneighbor cache entriesNeighbor Cache entries, as it would causetrafficinterruption of the rightful addressownerowner's traffic in the case of an address conflict.As nodesNodes that are willing to speed up their network stack configuration are most likely to be affected by the problem outlined in thisdocumentdocument; therefore, it seems reasonable for such hosts to advertise theiroptimistic addressesOptimistic Addresses by sending unsolicited NAs. The main question to consider is the potential risk of overriding the cache entry for the rightful address owner if theoptimistic addressOptimistic Address happens to beduplicated.a duplicate. </t> <t> The following sections discuss the address collision scenario when a node sends an unsolicited NA for an address in the Optimistic state, while another node (the rightful owner) already has the same addressassigned already.assigned. This document uses the term "the rightfulowner"owner", as the same terminology is used in <xreftarget="RFC4429"/>.target="RFC4429" format="default"/>. The analysis assumes that the host performsDuplicate Address Detection,DAD, assection 5.4 of<xreftarget="RFC4862"/>target="RFC4862" sectionFormat="of" section="5.4"/> requires that DADMUST<bcp14>MUST</bcp14> be performed on all unicast addresses prior to assigning them to an interface. </t> <section anchor="avoid_dis_exists"title="Neighbornumbered="true" toc="default"> <name>Neighbor Cache Entry Exists in Any State Other ThanINCOMPLETE">INCOMPLETE</name> <t> If therouterrouter's Neighbor Cache entry for the target address already exists in any state other than INCOMPLETE, then as persection 7.2.5 of<xreftarget="RFC4861"/>target="RFC4861" sectionFormat="of" section="7.2.5"/>, an unsolicited NA with the Override flag cleared would change the entry state from REACHABLE to STALE but would not update the entry in any other way. Therefore, even if the host sends an unsolicited NA from its OptimisticaddressAddress, therouterrouter's cache entry would not be updated with the newLink-Layer addresslink-layer address, and no impacttoon the traffic for the rightful address owner is expected. </t> <t> The return traffic intended for the host with the OptimisticaddressAddress would be sent to the rightful owner. However, this is unavoidable with or without the unsolicited NA mechanism. </t> </section> <section anchor="avoid_dis_inc"title="Neighbornumbered="true" toc="default"> <name>Neighbor Cache EntryisIs in INCOMPLETEstate">State</name> <t> Another corner case is the INCOMPLETE cache entry for the address.<list style="numbers"> <t></t> <ol spacing="normal" type="1"><li> The router receives a packet for the rightful owner of the address.</t> <t></li> <li> The router starts the address resolution process by creating an INCOMPLETE entry and sends the multicast NS.</t> <t></li> <li> More packets arrive at the router for the address in question.</t> <t></li> <li> The host configures an OptimisticaddressAddress and sends an unsolicited NA.</t> <t></li> <li> The router creates a STALE entry and sends the buffered packet(s) to the host (while at least some of those packets are actually intended for the rightful owner).</t> <t></li> <li> As the STALE entry was used to send packets, the router changes the entry state to DELAY and waits up to DELAY_FIRST_PROBE_TIME([RFC4861], 5 secs)(5 seconds) <xref target="RFC4861"/> before sending a unicast NS.</t> <t></li> <li> The rightful owner responds to the multicast NS sent at Step 2 with a solicited NA with the Override flag set.</t> <t></li> <li> The router updates the entry with the TLLAO supplied (the rightfulownerowner's link-layer address) and sets the entry state to REACHABLE (as the NA has the Solicited flag set).</t> </list> </t></li> </ol> <t> As aresultresult, some packets(ones(packets in the buffer at Step 6 and all packets arriving between Step 6 and Step 8) are delivered to the host with theOptimisitc address,Optimistic Address, while some of them, if not all, are intended for the rightful owner. Without the unsolicited NA,packet whichone or more packets that are in the buffer at Step 8 (usually just onepacketpacket, but some routers may buffer a few) would have been delivered to the rightful owner and the rest of the packets would have been dropped. However, the probability of such a scenario is ratherlowlow, as it would require the following things to happen almost simultaneously (within tens of milliseconds in most cases):<list style="symbols"> <t></t> <ul spacing="normal"> <li> One host starts using a new IPv6 address and sending traffic without sending an unsolicited NA first.</t> <t></li> <li> Another host configures the same IPv6 address in Optimistic mode before the router completes the address resolution process for the rightful owner.</t> </list> </t></li> </ul> <t> It should be noted that in this scenario therigthfulrightful owner does not send any unsolicited NAs before sending packets. If the rightful owner implements the functionality described in this document and sends unsolicited NAs upon configuring its address, then the router creates a STALE entry for the address, causing all packetsareto be delivered to the rightful owner (see <xreftarget="avoid_dis_exists"/>).target="avoid_dis_exists" format="default"/>). The rightful owner would experience no disruption but might receive some packets intended for the host with an Optimisticaddress.Address. </t> <t> This section focuses on the scenario when the solicited NA from the rightful owner arrives after the unsolicited one sent from the OptimisticaddressAddress (Step 7 and Step44, respectively). If the solicited NA arrivesfirstfirst, it changes the NC entry state from INCOMPLETE to REACHABLE. As discussed in <xreftarget="avoid_dis_exists"/>,target="avoid_dis_exists" format="default"/>, there will be no disruption for the rightful owner if the router already has a REACHABLE entry for the address when an unsolicited NA is received. </t> </section> <section anchor="avoid_dis_nonexists"title="Neighbornumbered="true" toc="default"> <name>Neighbor Cache Entry Does NotExist">Exist</name> <t> There are two distinct scenarioswhichthat can lead to the situation when the router does not haveaan NC entry for the IPv6 address:<list style="numbers"> <t></t> <ol spacing="normal" type="1"><li> The rightful owner of the address has not been using it for off-link communication recently or has never used it at all.</t> <t></li> <li> The rightful owner just started sending packets from thataddressaddress, but the router has not received any return traffic yet.</t> </list></li> </ol> <t> The impact on the rightful owner's traffic flows would be different in those cases. </t> <sectiontitle="Thenumbered="true" toc="default"> <name>The Rightful Owner Is Not Sending PacketsFrom The Address">from the Address</name> <t> In thisscenarioscenario, the following events are expected to happen:<list style="numbers"> <t></t> <ol spacing="normal" type="1"><li> The host configures the address and sets its state to Optimistic.</t> <t></li> <li> The host sends an unsolicited NA with the Override flag set to zero and starts sending traffic from the Optimisticaddress. </t> <t>Address. </li> <li> The router creates a STALE entry for the address and the host link-layer address.</t> <t></li> <li> The host starts DAD and detects the address duplication.</t> <t></li> <li> The router receives the return traffic for theduplicatedduplicate address. As the NC entry isSTALESTALE, it sends traffic using that entry, changes it toDELAYDELAY, and waits up to DELAY_FIRST_PROBE_TIME(<xref target="RFC4861"/>) seconds. </t> <t>seconds <xref target="RFC4861" format="default"/>. </li> <li> The router changes the NC entry state to PROBE and sends up to MAX_UNICAST_SOLICIT(<xref target="RFC4861"/>)unicast NSes <xref target="RFC4861" format="default"/> separated by RetransTimer milliseconds(<xref target="RFC4861"/>)<xref target="RFC4861" format="default"/> to the host link-layer address.</t> <t></li> <li> As the host has already detected the addressconflict alreadyconflict, it does not respond to the unicast NSes. (It is unlikely that the host has not completed the DAD process at this stage, as DELAY_FIRST_PROBE_TIME (5 seconds) is much higher than the DAD duration (DupAddrDetectTransmits*RetransTimer*1000 + MAX_RTR_SOLICITATION_DELAYsecs, section 5.4 of <xref target="RFC4862"/>).seconds) (<xref target="RFC4862" sectionFormat="of" section="5.4"/>).) The default value for the DAD process would be 1*1*1000 + 1 = 2secs,seconds <xreftarget="RFC4861"/>.target="RFC4861" format="default"/>. If the host has completed DAD but did not detect the addressconflictconflict, then there are two hosts with the same address in thePreferredpreferred state andthedisruption is inevitable anyway.</t> <t></li> <li> As the router receives no response for the unicast NSes, it deletes the NC entry.</t> <t></li> <li> If return packets for communication initiated atstepStep 2 are still arriving, the router buffers a small number of those packets and starts the address resolution process again by sending a multicast NS to thesolicited nodesolicited-node multicast address. The rightful ownerrespondsresponds, and therouterrouter's NC entry is updated with the rightfulownerowner's link-local address. The bufferedpacket(s)packet or packets are sent to that address. Any packets still arriving after the address resolutionstillprocess has completed are sent to the rightful address owner as well.</t> </list></li> </ol> <t> The rightful owner is not experiencing anydisruptiondisruption, as it does not send any traffic. It would only start receiving packets intended for another host after Step 8 is completed and only if return packets for the communication initiated atstepStep 2 are still arriving. </t> <t> However, the samebehaviourbehavior would be observed if the changesproposedspecified in this document are not implemented. If the host starts sending packets from its OptimisticaddressAddress but thenchangesdetects that the addressstate to Duplicated,is a duplicate, the first return packet would trigger the address resolution process and would be buffered until the resolution is completed. The buffered packet(s) and any packets still arriving after the address is resolved would be forwarded to the rightful owner of the address.SoSo, the rightful owner might still receive one or more packets from the flows intended for another host. Therefore, it's safe to conclude that theproposedchanges specified in this document do not introduce any disruption for the rightful owner of the duplicated address. </t> </section> <section anchor="dis_start"title="Thenumbered="true" toc="default"> <name>The Rightful Owner Has Started Sending PacketsFrom The Address">from the Address</name> <t> In thisscenarioscenario, the following events are happening:<list style="numbers"> <t></t> <ol spacing="normal" type="1"><li> The rightful owner starts sending traffic from the address(e.g.(e.g., the address has just been configured or has not been recently used).</t> <t></li> <li> The host configures the address and sets its state to Optimistic.</t> <t></li> <li> The host sends an unsolicited NA with the Override flag set to zero and starts sending traffic from the Optimisticaddress. </t> <t>Address. </li> <li> The router creates a STALE entry for the address and the host link-layer address.</t> <t></li> <li> The host starts DAD and detects the address duplication.</t> <t></li> <li> The router receives the return traffic for the IPv6 address in question. Some flows are intended for the rightful owner of theduplicatedduplicate address, while some are for the new host. As the NC entry isSTALESTALE, it sends traffic using that entry, changes it toDELAYDELAY, and waits up to DELAY_FIRST_PROBE_TIME(<xref target="RFC4861"/>) seconds. </t> <t>seconds <xref target="RFC4861" format="default"/>. </li> <li> The router changes the NC entry state to PROBE and sends up to MAX_UNICAST_SOLICIT(<xref target="RFC4861"/>)unicast NSes <xref target="RFC4861" format="default"/> separated by RetransTimer milliseconds(<xref target="RFC4861"/>)<xref target="RFC4861" format="default"/> to the host link-layer address.</t> <t></li> <li> As the host has already detected the addressconflict alreadyconflict, it does not respond to the unicast NSes.</t> <t></li> <li> As the router receives no response for the unicast NSes, it deletes the NC entry.</t> <t></li> <li> The next packetre-createsrecreates the entry and triggers the resolution process. The router buffers the packet and sends a multicast NS to thesolicited nodesolicited-node multicast address. The rightful ownerrespondsresponds, and therouterrouter's NC entry is updated with the rightfulownerowner's link-local address.</t> </list> </t></li> </ol> <t> As aresultresult, the traffic for the address of the rightful owner would be sent to the host with theduplicatedduplicate address instead. The duration of the disruption can be estimated as DELAY_FIRST_PROBE_TIME*1000 + (MAX_UNICAST_SOLICIT - 1)*RetransTimer milliseconds. As per the constants defined inSection 10 of<xreftarget="RFC4861"/>target="RFC4861" sectionFormat="of" section="10"/>, this interval is equal to 5*1000 + (3 - 1)*1000 =7000ms7000 milliseconds, or 7 seconds. </t> <t> However, it should be noted that the probability of such a scenario is rather low.SimilarySimilar to the scenario discussed in <xreftarget="avoid_dis_inc"/>,target="avoid_dis_inc" format="default"/>, it would require the following things to happen almost simultaneously (within tens of milliseconds in most cases):<list style="symbols"> <t></t> <ul spacing="normal"> <li> One host starts using a new IPv6 address and sending traffic without sending an unsolicited NA first.</t> <t></li> <li> Another host configures the same IPv6 address in Optimistic mode before the router receives the return traffic for the first host.</t> </list> </t></li> </ul> <t> As discussed in <xreftarget="avoid_dis_inc"/>,target="avoid_dis_inc" format="default"/>, the disruptiontofor the rightful owner can easily bepreventprevented if that node implements the mechanism described inthethis document. Sending unsolicited NAs beforeinitiatininginitiating off-link communication would create a STALE entry in therouterrouter's NC and prevent anytarffictraffic to that addressto befrom being sent to the host with the OptimisticaddressAddress (see <xreftarget="avoid_dis_exists"/>).target="avoid_dis_exists" format="default"/>). </t> </section> </section> </section> <section anchor="RFC_UPD"title="Modificationsnumbered="true" toc="default"> <name>Modifications to RFC-MandatedBehavior">Behavior</name> <t> All normative text in this memo is contained in this section. </t> <sectiontitle="Modificationnumbered="true" toc="default"> <name>Modification toRFC4861 NeighborRFC 4861 (Neighbor Discovery for IP version 6(IPv6)">(IPv6))</name> <sectiontitle="Modificationnumbered="true" toc="default"> <name>Modification tothe section 7.2.5">Section 7.2.5 of RFC 4861</name> <t> This document makes the following changes tothe section 7.2.5 of<xreftarget="RFC4861"/>: </t> <t> ------------------------------------------------------------------ </t> <t> OLD TEXT: </t> <t> ------------------------------------------------------------------target="RFC4861" sectionFormat="of" section="7.2.5"/>: </t><t> When<t>The text in RFC 4861 is as follows:</t> <blockquote>When a valid Neighbor Advertisement is received (either solicited or unsolicited), the Neighbor Cache is searched for the target's entry. If no entry exists, the advertisementSHOULD<bcp14>SHOULD</bcp14> be silently discarded. There is no need to create an entry if none exists, since the recipient has apparently not initiated any communication with thetarget. </t> <t> ------------------------------------------------------------------ </t> <t> NEW TEXT: </t> <t> ------------------------------------------------------------------ </t> <t> Whentarget.</blockquote> <t>This document updates the text as follows:</t> <blockquote><t>When a valid Neighbor Advertisement is received (either solicited or unsolicited), the Neighbor Cache is searched for the target's entry. If no entryexists: <list style="symbols"> <t>exists:</t> <ul spacing="normal"> <li> HostsSHOULD<bcp14>SHOULD</bcp14> silently discard the advertisement. There is no need to create an entry if none exists, since the recipient has apparently not initiated any communication with the target.</t> <t></li> <li> RoutersSHOULD<bcp14>SHOULD</bcp14> create a new entry for the target address with the link-layer address set to the Targetlink-layer address optionLink-Layer Address Option (if supplied). The entry's reachability stateMUST<bcp14>MUST</bcp14> be set to STALE. If the received Neighbor Advertisement does not contain the Targetlink-layer address optionLink-Layer Address Option, the advertisementSHOULD<bcp14>SHOULD</bcp14> be silently discarded.</t> </list> </t> <t> ------------------------------------------------------------------ </t></li> </ul> </blockquote> </section> <section anchor="UPD726"title="Modificationnumbered="true" toc="default"> <name>Modification tothe section 7.2.6">Section 7.2.6 of RFC 4861</name> <t> This documentproposesmakes the following changes tothe section 7.2.6 of<xreftarget="RFC4861"/>: </t> <t> OLD TEXT: </t> <t> ------------------------------------------------------------------target="RFC4861" sectionFormat="of" section="7.2.6"/>: </t><t> Also,<t>The text in RFC 4861 is as follows:</t> <blockquote>Also, a node belonging to an anycast addressMAY<bcp14>MAY</bcp14> multicast unsolicited Neighbor Advertisements for the anycast address when the node's link-layer addresschanges. </t> <t> ------------------------------------------------------------------ </t> <t> NEW TEXT: </t> <t> ------------------------------------------------------------------ </t> <t> Also,changes.</blockquote> <t>This document updates the text as follows:</t> <blockquote><t>Also, a node belonging to an anycast addressMAY<bcp14>MAY</bcp14> multicast unsolicited Neighbor Advertisements for the anycast address when the node's link-layer addresschanges. </t> <t> Achanges.</t> <t>A node may also wish to notify its first-hop routers when it configures a new global IPv6 address so the routers can proactively populate theirneighbor cachesNeighbor Caches with the corresponding entries. In suchcasescases, a nodeSHOULD<bcp14>SHOULD</bcp14> send up to MAX_NEIGHBOR_ADVERTISEMENT Neighbor Advertisement messages. If the address ispreferredpreferred, then the Override flagSHOULD NOT<bcp14>SHOULD NOT</bcp14> be set. If the address is in the Optimisticstatestate, then the Override flagMUST NOT<bcp14>MUST NOT</bcp14> be set. The destination addressSHOULD<bcp14>SHOULD</bcp14> be set to the all-routers multicast address. These advertisementsMUST<bcp14>MUST</bcp14> be separated by at least RetransTimer seconds. The first advertisementSHOULD<bcp14>SHOULD</bcp14> be sent as soon as one of the following eventshappens: </t> <t> <list style="symbols"> <t>ifhappens:</t> <dl newline="false" spacing="normal"> <dt>If Optimistic DAD <xreftarget="RFC4429"/>target="RFC4429" format="default"/> isused: aused:</dt><dd>A new OptimisticaddressAddress is assigned to the nodeinterface.</t> <t> ifinterface.</dd> <dt>If Optimistic DAD is notused: anused:</dt><dd>An address changes the state from tentative topreferred. </t> </list> ------------------------------------------------------------------ </t>preferred.</dd> </dl> </blockquote> </section> </section> </section> <sectiontitle="Solution Limitations">numbered="true" toc="default"> <name>Solution Limitations</name> <t> The solution described in this document provides some improvement for a node configuring a new IPv6 address and startingsendingto send traffic from it. However, that approach does not completely eliminate the scenario when a router receives some transit traffic for an address without the corresponding Neighbor Cache entry. For example:<list style="symbols"> <t>If</t> <ul spacing="normal"> <li>If the host starts using analready configuredalready-configured IPv6 address after a long period of inactivity, the router might not have the NC entry for that address anymore, as old/expired entries are deleted.</t> <t>Clearing</li> <li>Clearing therouterrouter's Neighbor Cache would triggerthepacket loss for all actively used addresses removed from thecache.</t> </list> </t>cache.</li> </ul> </section> <section anchor="others"title="Solutionsnumbered="true" toc="default"> <name>Solutions Considered butDiscarded">Discarded</name> <t> There are other possible approaches to address theproblem, forproblem. For example:<list style="symbols"> <t></t> <ul spacing="normal"> <li> Just do nothing.</t> <t> Migrating</li> <li> Migrate from the "reactive" Neighbor Discovery(<xref target="RFC4861"/>)<xref target="RFC4861" format="default"/> to the registration-based mechanisms(<xref target="RFC8505"/>). </t> <t> Creating<xref target="RFC8505" format="default"/>. </li> <li> Create new entries inroutersthe router's Neighbor Cache by gleaning from Neighbor Discovery DAD messages.</t> <t> Initiates</li> <li> Initiate bidirectional communication from the host to the router using the host GUA.</t> <t> Making</li> <li> Make the probing logic on hosts more robust.</t> <t> Increasing</li> <li> Increase the buffer size on routers.</t> <t></li> <li> Transitdataplanedata plane traffic from an unknown address (an addressw/owithout the correspondingneighbor cacheNeighbor Cache entry)triggersto trigger an address resolution process on the router.</t> </list> </t></li> </ul> <t> It should be noted that some of those options are already implemented by some vendors. The following sections discuss those approaches and the reasons they were discarded. </t> <sectiontitle="Do Nothing">numbered="true" toc="default"> <name>Do Nothing</name> <t> One of the possible approaches might be to declare that everything is working as intended and let the upper-layer protocols deal with packet loss. The obvious drawbacks include:<list style="symbols"> <t></t> <ul spacing="normal"> <li> Unhappy users.</t> <t></li> <li> Many support tickets.</t> <t></li> <li> More resistance todeploydeploying IPv6 andIPv6-OnlyIPv6-only networks.</t> </list> </t></li> </ul> </section> <sectiontitle="Changenumbered="true" toc="default"> <name>Change to the Registration-Based NeighborDiscovery">Discovery</name> <t> The most radical approach would be to move away from the reactive ND as defined in <xreftarget="RFC4861"/>target="RFC4861" format="default"/> and expand the registration-based ND(<xref target="RFC6775"/>,<xreftarget="RFC8505"/>)target="RFC6775" format="default"/> <xref target="RFC8505" format="default"/> used in IPv6 over Low-Power Wireless Personal Area Networks (6LoWPANs) to the rest of the IPv6 deployments. This option requires some investigation and discussion. However, significant changes to the existing IPv6 implementations would be needed, so an unclear adoption timeline makes this approach less preferable thanone proposedthe approach specified in this document. </t> </section> <sectiontitle="Hostnumbered="true" toc="default"> <name>Host Sending NS to the Router Address from ItsGUA">GUA</name> <t> The host could forcecreatingthe creation of a STALE entry for its GUA in therouter ND cacherouter's Neighbor Cache by sending the following Neighbor Solicitation message:<list style="symbols"> <t></t> <ul spacing="normal"> <li> The NS source address is the host GUA.</t> <t></li> <li> The destination address is the default router IPv6 address.</t> <t></li> <li> The Source Link-Layer AddressoptionOption contains the host link-layer address.</t> <t></li> <li> The target address is thehosthost's default router address (the default router address the host received in the RA).</t> </list> </t></li> </ul> <t> The main disadvantages of this approachare: <list style="symbols"> <t> Wouldare as follows: </t> <ul spacing="normal"> <li> It would not work for OptimisticaddressesAddresses, assection 2.2 of<xreftarget="RFC4429"/>target="RFC4429" sectionFormat="of" section="2.2"/> explicitly prohibits sending Neighbor Solicitations from an Optimistic Address.</t> <t></li> <li> If first-hop redundancy is deployed in the network, the NS would reach the active router only, so all backup routers (or all active routers except one) would not get theirneighbor cacheNeighbor Cache updated.</t> <t></li> <li> Some wireless devices are known to alter ND packets and perform variousnon-obviousnonobvious forms of ND proxy actions. In some cases, unsolicited NAs might not even reach the routers.</t> </list> </t></li> </ul> </section> <sectiontitle="Hostnumbered="true" toc="default"> <name>Host Sending Router Solicitation fromits GUA">Its GUA</name> <t> The host could send arouter solicitationRouter Solicitation message to'all routers'the all-routers multicast address, using its GUA as a source. If the host link-layer address is included in the Source Link-Layer Addressoption,Option, the router would create a STALE entry for the host GUA as perthe section 6.2.6 of<xreftarget="RFC4861"/>.target="RFC4861" sectionFormat="of" section="6.2.6"/>. However, this approach cannot be used if the GUA is inoptimisticthe Optimistic state:section 2.2 of<xreftarget="RFC4429"/>target="RFC4429" sectionFormat="of" section="2.2"/> explicitly prohibits using an Optimistic Address as the source address of a Router Solicitation with aSLLAOSLLAO, as it mightdisruptcause disruption for the rightful owner of the address in the case of a collision.SoSo, for theoptimistic addressesOptimistic Addresses, the host can send an RS without a SLLAO included. In thatcasecase, the router may respond with either a multicast oraunicast RA (only the latter would create a cache entry). </t> <t> This approach has the following drawbacks:<list style="symbols"> <t></t> <ul spacing="normal"> <li> If the address is in the Optimisticstatestate, the RS cannot contain a SLLAO. As aresultresult, the router would only create a cache entry if solicited RAs are sent as unicast. Routers sending solicited RAs as multicast would not create a new cacheentryentry, as they do not need to send a unicast packet back to the host.</t> <t></li> <li> There might be a random delay between receiving an RS and sending a unicast RA back (and creating a cacheentry)entry), which might undermine the idea of creating the cache entry proactively.</t> <t></li> <li> Some wireless devices are known to intercept ND packets and perform variousnon-obviousnonobvious forms of ND proxy actions. In somecasescases, the RS might not even reach the routers.</t> </list> </t></li> </ul> </section> <sectiontitle="Routersnumbered="true" toc="default"> <name>Routers Populating Their Caches by GleaningFromfrom Neighbor DiscoveryPackets">Packets</name> <t> Routers may be able to learn about new addresses by gleaning from the DAD Neighbor Solicitation messages. The router could listen to allsolicited nodesolicited-node multicast address groupsandand, upon receiving a Neighbor Solicitation from the unspecifiedaddressaddress, search its Neighbor Cache for the solicitation'sTarget Address.target address. If no entry exists, the router may create an entry, set its reachability state to'INCOMPLETE'INCOMPLETE, and start the address resolution process for that entry. </t> <t> The same solution was proposed in <xreftarget= "I-D.halpern-6man-nd-pre-resolve-addr" />.target="I-D.halpern-6man-nd-pre-resolve-addr" format="default"/>. Some routing vendors already support suchoptimization already.optimization. However, this approach has a number of drawbacks and therefore should not be used as the only solution:<list style="symbols"> <t></t> <ul spacing="normal"> <li> Routers need to receive all multicast Neighbor Discoverypackets whichpackets; this might negatively impactthe routersa router's CPU.</t> <t></li> <li> If the router starts the address resolution process as soon as it receives the DAD NeighborSolicitationSolicitation, the host mightbestill be performing DAD and the target address might be tentative. In that case, the hostSHOULD<bcp14>SHOULD</bcp14> silently ignore the received Neighbor Solicitation from the router as perthe Section 5.4.3 of<xreftarget="RFC4862"/>.target="RFC4862" sectionFormat="of" section="5.4.3"/>. As aresultresult, the router might not be able to complete the address resolution process before the return traffic arrives.</t> </list> </t></li> </ul> </section> <sectiontitle="Initiating Hosts-to-Routers Communication">numbered="true" toc="default"> <name>Initiating Host-to-Router Communication</name> <t> The host may force the router to start address resolution by sending a data packet such as ping or traceroute to its default router link-local address, using the GUA as a source address. As the RTT to the default router is lower than the RTT to any off-linkdestinationsdestinations, it's quite likely that the router would start theneighbor discoveryNeighbor Discovery process for the host GUA before the first packet of the returning traffic arrives. </t> <t> This approach has the following drawbacks:<list style="symbols"> <t></t> <ul spacing="normal"> <li> Data packets to therouterrouter's link-local address could be blocked by a security policy or control plane protection mechanism.</t> <t></li> <li> It introduces an additional overhead forroutersthe router's control plane (in addition to processing ND packets, the data packet needs to be processed as well).</t> <t></li> <li> Unless the data packet is sent to'all routers'the all-routers ff02::2 multicast address, if the network provides a first-hopredundancyredundancy, then only the active router would create a new cache entry.</t> </list> </t></li> </ul> </section> <sectiontitle="Makingnumbered="true" toc="default"> <name>Making the Probing Logic on Hosts MoreRobust">Robust</name> <t>TheoreticallyTheoretically, the probing logic on hosts might be modified todealbetter deal with initial packet loss. For example, only one probe can besentsent, orprobesprobe retransmit intervals can be reduced. However, this approach has a number of drawbacks:<list style="symbols"> <t>It</t> <ul spacing="normal"> <li>It would require updating all possible applicationsperformingthat perform probing, while theproposedsolution described in this document is implementedon operating systems level.</t>at the operating-system level.</li> <li> <t>Some implementations need to send multiple probes. Examples include but are not limited to:<list style="symbols"> <t>Sending</t> <ul spacing="normal"> <li>Sending AAAA and Arecordsrecord DNS probes inparallel.</t> <t>Detectingparallel.</li> <li>Detecting captiveportalsportals, which oftenrequirerequires sending multiplepackets.</t> </list> </t>packets.</li> </ul> </li> <li> <t>While it would increase the probabilityofthat the probingtowill complete successfully, there are multiple cases when packet loss would still occur:<list style="symbols"> <t></t> <ul spacing="normal"> <li> The probe response consists of multiple packets, so all but the first one are dropped.</t> <t></li> <li> There are multiple applications on the same host sendingtraffictraffic, and return packets arrivesimultaneously.</t> <t>simultaneously.</li> <li> There are multiple first-hop routers in the network. The first probe packet creates the NC entry on one of them. The subsequent return traffic flows might cross other routers and still experience theissue.</t> </list> </t> <t>issue.</li> </ul> </li> <li> Reducing the probe retransmit intervalunnecessaryunnecessarily increasesthenetwork utilization and might causethenetwork congestion.</t> </list> </t></li> </ul> </section> <sectiontitle="Increasingnumbered="true" toc="default"> <name>Increasing the Buffer Size onRouters">Routers</name> <t> Increasing the buffer size and buffering more packets would exacerbate issues described in <xreftarget="RFC6583"/>target="RFC6583" format="default"/> and make the router more vulnerable to ND-baseddenial of servicedenial-of-service attacks. </t> </section> <sectiontitle="Transit Dataplanenumbered="true" toc="default"> <name>Transit Data Plane TrafficFromfrom a New AddressTriggeringto Trigger AddressResolution">Resolution</name> <t> When a router receives a transit packet sourced byaan on-link neighbor node, it might check for the presence ofthe neighbor cachea Neighbor Cache entry for the packet source addressandand, if the entry does not exist, start the address resolution process. This approach does ensure that a Neighbor Cache entry is proactively created every time a new, previously unseen GUA is used for sendingofflinkoff-link traffic. However, this approach has a number oflimitations, inlimitations. In particular:<list style="symbols"> <t>If</t> <ul spacing="normal"> <li>If traffic flows areasymmetricalasymmetrical, the return traffic might not transit the same router as the original trafficwhichthat triggered the addressresolution. Soresolution process. So, theneighbor cacheNeighbor Cache entry is created on the "wrong" router, not the onewhichthat actually needs theneighbor cacheNeighbor Cache entry for the host address.</t> <t></li> <li> The functionality needs to be limited to explicitly configured networks/interfaces, as the router needs to distinguish betweenonlinkon-link addresses(ones(addresses for which the router needs to have Neighbor Cacheentries for)entries) and the rest of the address space. The proactive address resolution process must only be triggered by packets from the prefixes known to be on-link. Otherwise, traffic from spoofed source addresses or any transit traffic could lead toneighbor cacheNeighbor Cache exhaustion.</t> <t></li> <li> Implementing such functionality is much more complicated than all othersolutionssolutions, as it would involve complexdata-control planes interaction. </t> </list> </t>interactions between the data plane and the control plane. </li> </ul> </section> </section> <section anchor="IANA"title="IANA Considerations">numbered="true" toc="default"> <name>IANA Considerations</name> <t> Thismemo asks the IANA fordocument has nonew parameters.IANA actions. </t> </section> <section anchor="Security"title="Security Considerations">numbered="true" toc="default"> <name>Security Considerations</name> <t> One of the potential attack vectors to consider isacachespoofing whenspoofing, where the attacker might try to install a cache entry for the victim's IPv6 address and the attacker'sLink-Layerlink-layer address. However, it should be noted that this document does not propose any changes for the scenario when theND cacheNeighbor Cache forthea given IPv6 address already exists. Therefore, there are no new vectors for an attacker to override an existing cache entry. </t> <t> <xreftarget="avoid_dis"/>target="avoid_dis" format="default"/> describes some corner cases when a host withthe duplicateda duplicate OptimisticaddressAddress might get some packets intended for the rightful owner of the address.HoweverHowever, such scenarios do not introduce any new attack vectors: even without theproposed changes,changes discussed in this document, an attacker can easily override therouters neighbor cacherouter's Neighbor Cache and redirect the traffic by sending NAs with the Solicited flag set. As discussed in <xreftarget="dis_start"/>target="dis_start" format="default"/>, theworst caseworst-case scenario might cause a disruption for up to 7 seconds.ThisBecause this scenario is highly unlikely, this risk of disruption is consideredacceptable due to very low probability of that scenario.acceptable. More importantly, for all cases described in <xreftarget="avoid_dis"/>target="avoid_dis" format="default"/>, the rightful owner can prevent disruption caused by an accidental address duplication just by implementing the mechanism described in this document. If the rightful owner sends unsolicited NAs before using the address, the STALE entry would be created on therouter NCrouter's NC, and any subsequent unsolicited NAs sent from the host with an OptimisticaddressAddress would not override the NC entry. </t> <t> A malicious host could attempt to exhaust theneighbor cacheNeighbor Cache on the router by creating a large number of STALE entries. However, this attack vector is notnewnew, and the mechanism specified in this document does not increase the risk of such an attack: the attacker could do it, for example, by sendingaan NS or RS packet with a SLLAO included. All recommendations from <xreftarget="RFC6583"/>target="RFC6583" format="default"/> still apply. </t> <t> Announcing a new address to the all-routers multicast address may inform an on-link attacker about IPv6 addresses assigned to the host. However, hiding information about the specific IPv6 address should not be considered a securitymeasuremeasure, as such information is usually disclosed via DAD to all nodes anyway if MLD snooping is not enabled. Network administrators can also mitigate this issue by enabling MLD snooping on the link-layer devices to prevent IPv6 link-local multicast packets from being flooded to allonlinkon-link nodes. If peer-to-peeronlinkon-link communications are not desirable forthea given networksegmentsegment, they should be prevented by properlayer-2Layer 2 security mechanisms. Therefore, the risk of allowing hosts to send unsolicited Neighbor Advertisements to the all-routers multicast address is low. </t> <t> It should be noted that theproposedmechanism discussed in this document allows hosts to proactively inform their routers about global IPv6 addresses existing on-link. Routers could use that information to distinguish between used and unused addresses to mitigateND cacheNeighbor Cache exhaustion DoS attacks as described inSection 4.3.2<xreftarget="RFC3756"/>target="RFC3756" sectionFormat="of" section="4.3.2"/> and in <xreftarget="RFC6583"/>.target="RFC6583" format="default"/>. </t> </section> </middle> <back> <displayreference target="I-D.halpern-6man-nd-pre-resolve-addr" to="ND-ADDR-RES"/> <references> <name>References</name> <references> <name>Normative References</name> <xi:include href="https://xml2rfc.ietf.org/public/rfc/bibxml/reference.RFC.2119.xml"/> <xi:include href="https://xml2rfc.ietf.org/public/rfc/bibxml/reference.RFC.4291.xml"/> <xi:include href="https://xml2rfc.ietf.org/public/rfc/bibxml/reference.RFC.4429.xml"/> <xi:include href="https://xml2rfc.ietf.org/public/rfc/bibxml/reference.RFC.4861.xml"/> <xi:include href="https://xml2rfc.ietf.org/public/rfc/bibxml/reference.RFC.4862.xml"/> <xi:include href="https://xml2rfc.ietf.org/public/rfc/bibxml/reference.RFC.8174.xml"/> </references> <references> <name>Informative References</name> <xi:include href="https://xml2rfc.ietf.org/public/rfc/bibxml/reference.RFC.3756.xml"/> <xi:include href="https://xml2rfc.ietf.org/public/rfc/bibxml/reference.RFC.4541.xml"/> <xi:include href="https://xml2rfc.ietf.org/public/rfc/bibxml/reference.RFC.6583.xml"/> <xi:include href="https://xml2rfc.ietf.org/public/rfc/bibxml/reference.RFC.6775.xml"/> <xi:include href="https://xml2rfc.ietf.org/public/rfc/bibxml/reference.RFC.8305.xml"/> <xi:include href="https://xml2rfc.ietf.org/public/rfc/bibxml/reference.RFC.8505.xml"/> <xi:include href="https://xml2rfc.ietf.org/public/rfc/bibxml/reference.RFC.8981.xml"/> <xi:include href="https://datatracker.ietf.org/doc/bibxml3/reference.I-D.halpern-6man-nd-pre-resolve-addr.xml"/> </references> </references> <section anchor="Acknowledgements"title="Acknowledgements">numbered="false" toc="default"> <name>Acknowledgements</name> <t> Thanks to the following people (in alphabetical order) for their comments,reviewreview, and feedback:Mikael Abrahamsson, Stewart Bryant, Lorenzo Colitti, Roman Danyliw, Owen DeLong, Martin Duke, Igor Gashinsky, Carles Gomez, Fernando Gont, Tatuya Jinmei, Benjamin Kaduk, Scott Kelly, Erik Kline, Warren Kumari, Barry Leiba, Jordi<contact fullname="Mikael Abrahamsson"/>, <contact fullname="Stewart Bryant"/>, <contact fullname="Lorenzo Colitti"/>, <contact fullname="Roman Danyliw"/>, <contact fullname="Owen DeLong"/>, <contact fullname="Martin Duke"/>, <contact fullname="Igor Gashinsky"/>, <contact fullname="Carles Gomez"/>, <contact fullname="Fernando Gont"/>, <contact fullname="Tatuya Jinmei"/>, <contact fullname="Benjamin Kaduk"/>, <contact fullname="Scott Kelly"/>, <contact fullname="Erik Kline"/>, <contact fullname="Warren Kumari"/>, <contact fullname="Barry Leiba"/>, <contact fullname="Jordi PaletMartinez, Erik Nordmark, Michael Richardson, Dan Romascanu, Zaheduzzaman Sarker, Michael Scharf, John Scudder, Mark Smith, Dave Thaler, Pascal Thubert, Loganaden Velvindron, Eric Vyncke.Martinez"/>, <contact fullname="Erik Nordmark"/>, <contact fullname="Michael Richardson"/>, <contact fullname="Dan Romascanu"/>, <contact fullname="Zaheduzzaman Sarker"/>, <contact fullname="Michael Scharf"/>, <contact fullname="John Scudder"/>, <contact fullname="Mark Smith"/>, <contact fullname="Dave Thaler"/>, <contact fullname="Pascal Thubert"/>, <contact fullname="Loganaden Velvindron"/>, and <contact fullname="Éric Vyncke"/>. </t> </section></middle> <!-- *****BACK MATTER ***** --> <back> <references title="Normative References"> &RFC2119; &RFC4291; &RFC4429; &RFC4861; &RFC4862; &RFC8174; </references> <references title="Informative References"> &RFC3756; &RFC4541; &RFC6583; &RFC6775; &RFC8305; &RFC8505; &RFC8981; <?rfc include="reference.I-D.halpern-6man-nd-pre-resolve-addr" ?> </references></back> </rfc>