[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]
Re: [ssm] what to say about scoping for v6 [was ...last call...]
On Wed, 12 Mar 2003, Brian Haberman wrote:
> >>How your SSM-enabled router will/would react now, or in 1-2 years is a
> >>complete question mark.
> >
> >
> > Perhaps I'm not creative enough, but I can't imagine any
> > implementation of scoped addresses that would not apply scope limits
> > to both the source and destination.
Different unicast and multicast codepaths? Or..
> Neither can I. In fact, that is one of the items in the scoped
> addressing architecture that everyone agrees on. Both S & G have
> to be checked when a scoped boundary is encountered.
.. not *implementing* scoped address architecture at all while supporting
SSM?
I certainly don't want to require scoped addrarch for SSM implementation;
moreover, I don't want to give users the expectation that using e.g.
(fec0::1, ff3e::1) would just somehow magically get discarded somewhere
near the manually configured site border by SSM routers.
I see a lot of cases. Most IPv6 routers today, as far as I've looked,
forward site-local source addresses quite nicely anywhere I want..
> > In fact, I would be ok with putting in text saying that for SSM joins
> > and data, the scope boundaries MUST be applied to the source address
> > in addition to the destination address.
> >
>
> That is what the scoped addressing architecture already says.
> Do we need to repeat it?
I'd like a mention of why it is a problem better, and leaving the actual
behaviour undefined or TBD in scoped addrarch.
> >> Note that when forwarding or processing SSM, the scope of both S and G
> >> may have to be considered [SCOPED-ARCH]; in particular, if the unicast
> >> scope of S is smaller than respective multicast scope of G, the packets
> >> might end up forwarded outside of the scope of S. Therefore, limited
> >
> >
> > I would prefer not to say this because I think it is not likely to
> > ever be allowed.
I agree here: it's not likely be allowed, but the *security
considerations* part of it is that it *does* happen when/if scoped
addrarch hasn't been implemented in the designated routers etc. -- this
was a balance between specification status and operational reality.
> > I'd be happy saying just that "scopes should not be
> > used as a security mechanism..." and leaving it at that.
If a variation of that where it's explicit that it applies to the source
address is added, that's ~ok.
> > I think
> > it's overkill to say that limited scope addresses must be avoided with
> > SSM, because I think they work fine as long as boundaries are applied
> > to the source as well.
(For what it's worth, I was referring to unicast S scoped *only*, if it
makes any difference.)
The point is that I'm having some doubts whether boundaries *are* actually
applied to the source..
--
Pekka Savola "You each name yourselves king, yet the
Netcore Oy kingdom bleeds."
Systems. Networks. Security. -- George R.R. Martin: A Clash of Kings
_______________________________________________
ssm mailing list
ssm@ietf.org
https://www1.ietf.org/mailman/listinfo/ssm