[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]

ReMIME-Version: 1.0






holbrook@cisco.com wrote:
> Hi, Pekka.  My replies, re the ssm-arch draft:
> 
> 
>>ssm-arch-01:
>>
>>==> In many places, there if a referrence to "IPv6 SSM address range
>>FF2x::".  According to e.g. RFC3306, this perhaps should be FF3x:: -- or a 
>>lot of clarification is required!
> 
> 
> You're right.  As I said in a recent reply to the list these should
> all be FF3x: and will be in the next revision.
> 
> 
>>No globally agreed-upon administratively-scoped address range [ADMIN-
>>SCOPE] is currently defined for source-specific multicast.  Note that 
>>there is no possibility of address conflict between hosts in different  
>>administrative domains (or between two hosts of any kind).
>>Administrative scoping of SSM addresses can be implemented within an
>>administrative domain by filtering at domain boundary routers.
>>
>>==> this seems to be an obvious oversight.
>>Administrative scoping for SSM is very much existant for IPv6.
> 
> 
> It's there in v6 because it just falls out of the IPv6 addressing
> architecture.  I'm not personally convinced that there is a need for
> an administratively scoped SSM address range.  I'd like to hear
> arguments, though.
> 
> If the working group comes to an agreement that we should provide
> admin scoping for SSM in IPv4, I'd like to defer the details to a
> separate draft and not hold this one up.  I think it will be fairly
> contentious trying to nail down the specific admin-scoped SSM address
> ranges.
> 
> Assuming that we defer admin-scoping to a separate draft, is there any
> text change you'd like to see in *this* draft?
> 

I don't see a need for additional text in this document.

> 
>>Source Routing [RFC791] (both Loose and Strict) in combination with
>>source address spoofing may be used to allow an impostor of the true
>>channel source to inject packets onto an SSM channel.  An SSM router
>>MUST have a configuration option to disable source routing to an SSM    
>>destination addresses, and the default value SHOULD be to disable Source
>>Routing to an SSM destination address.  Anti-source spoofing mechanisms
>>like source address filtering at the edges of the network are also
>>strongly encouraged.
>>
>>==> this seems overly specificative to me.  IMO, if the default is to 
>>disable source routing to multicast addresses, I believe there is no need 
>>for a knob.  In any case, this is a bit like an implementation
>>issue.
> 
> 
> I think I agree with you, that mandating a configuration option is not
> really the right way to say this.  Trying to translate your comments
> into text:
> 
>   Source Routing [RFC791] (both Loose and Strict) in combination with
>   source address spoofing may be used to allow an impostor of the true
>   channel source to inject packets onto an SSM channel.  An SSM router
>   SHOULD by default disallow source routing to an SSM destination
>   addresses.  A router MAY have a configuration option to allow source
>   routing.  Anti-source spoofing mechanisms such as source address
>   filtering at the edges of the network are also strongly encouraged.
> 
> Comments?

The IPv6 spec (RFC 2460) specifically forbids the use of multicast
addresses in the routing header.  But, I don't see a comparable
restriction for v4.

And I would assume that the above text would go in the Security
Considerations section.

Brian