Internet-Draft | LTA Algorithm | April 2023 |
Gont, et al. | Expires 29 October 2023 | [Page] |
In renumbering scenarios where an IPv6 prefix suddenly becomes invalid, hosts on the local network will continue using stale prefixes for an unacceptably long period of time, thus resulting in connectivity problems. This document specifies an algorithm that allows host implementations to infer when configuraton information has changed, such that they can phase stale information out in a timelier manner.¶
This Internet-Draft is submitted in full conformance with the provisions of BCP 78 and BCP 79.¶
Internet-Drafts are working documents of the Internet Engineering Task Force (IETF). Note that other groups may also distribute working documents as Internet-Drafts. The list of current Internet-Drafts is at https://datatracker.ietf.org/drafts/current/.¶
Internet-Drafts are draft documents valid for a maximum of six months and may be updated, replaced, or obsoleted by other documents at any time. It is inappropriate to use Internet-Drafts as reference material or to cite them other than as "work in progress."¶
This Internet-Draft will expire on 29 October 2023.¶
Copyright (c) 2023 IETF Trust and the persons identified as the document authors. All rights reserved.¶
This document is subject to BCP 78 and the IETF Trust's Legal Provisions Relating to IETF Documents (https://trustee.ietf.org/license-info) in effect on the date of publication of this document. Please review these documents carefully, as they describe your rights and restrictions with respect to this document. Code Components extracted from this document must include Revised BSD License text as described in Section 4.e of the Trust Legal Provisions and are provided without warranty as described in the Revised BSD License.¶
In scenarios where network configuration information becomes invalid without any explicit signaling of that condition, hosts on the local network will continue using stale SLAAC [RFC4862] information for an unacceptably long period of time, thus resulting in connectivity problems. This problem has been discussed in detail in [RFC8978].¶
This document specifies and algorithm that allows SLAAC host implementations to infer when configuraton information has become stale, such that they can phase out stale information in a timelier manner.¶
The key words "MUST", "MUST NOT", "REQUIRED", "SHALL", "SHALL NOT", "SHOULD", "SHOULD NOT", "RECOMMENDED", "NOT RECOMMENDED", "MAY", and "OPTIONAL" in this document are to be interpreted as described in BCP 14 [RFC2119] [RFC8174] when, and only when, they appear in all capitals, as shown here.¶
This section specifies an algorithm, "Lifetime Avoidance" (LTA) algorithm, that allows hosts to infer that previously-advertised configuration information (such as autoconfiguration prefixes) has become stale, such that the stale information can be deprecated in a timelier manner. Most of the value of this algorithm is in being able to mitigate the problem discussed in [RFC8978] at hosts themselves, without relying on changes in SLAAC router implementations.¶
The algorithm consists of two conceptual building-blocks:¶
Possible configuration changes can be inferred when a SLAAC router (as identified by its link-local address) ceases to advertise a previously-advertised information. Therefore, hosts can record what configuration information has been advertised by each local router, and infer a configuration change when a router ceases to advertise previously-advertises configuration information.¶
Inscenarios where possible configuration changes have been detected, hosts should poll the local router via unicasted Router Solicitations (RS) to verify that the router in question has indeed ceased to advertise the aforementioned information. If this condition is confirmed, the corresponding configuration information should be discarded.¶
In the context of multi-prefix/multi-router networks [RFC8028] [RFC8504], SLAAC configuration information should be associated with each advertising router. Thus, when a router ceases to advertise some configuration information:¶
Implementation of this kind of heuristic allows a timelier reaction to network configuration changes even in scenarios where there is no explicit signaling from the network, thus improving robustness.¶
[RFC4861] does not require routers to convey all RA options in the same message. Therefore, the algorithm specified in this section is designed such that it can cope with this corner case that, while not found in the deployed Internet, is allowed by [RFC4861].¶
The LTA algorithm SHOULD be applied to the following Neighbor Discovery options:¶
In the context of multi-prefix/multi-router networks [RFC8028] [RFC8504], each option from Section 3.1 is associated with each advertising SLAAC router. Therefore, hosts should record what configuration information has been advertised by each local router.¶
Additionally, hosts associate with piece of configuration information received via SLAAC options a timestamp (INFO_LAST variable below) that records the time at which this information was last advertised by a particular router.¶
The algorithm specified in this document employs the following variables:¶
A timestamp associated with each piece of SLAAC information (from Section 3.1) received from each SLAAC advertising router.¶
Initialization when a new SLAAC advertising router is learned:¶
LTA_MODE=FALSE LTA_LAST=0 RS_LAST=0 RS_COUNT=0 LTA_CYCLE=RA_WIN+RS_RNDTIME+RS_COUNT_MAX*RS_TIMEOUT¶
Upon receipt of a Router Advertisement message, and after normal processing of the message, perform the following actions:¶
TIME= time() For each piece of SLAAC configuration information advertised by this router in the received RA: INFO_LAST= TIME IF LTA_MODE==FALSE && TIME > (LTA_LAST+LTA_CYCLE) IF this RA is missing any previously-advertised information: LTA_MODE=TRUE LTA_LAST=TIME¶
The goal of checking "(LTA_LAST+LTA_CYCLE)" is to prevent the host from re-entering the LTA_mode in a short period of time in the theoretical corner-case where:¶
Time-driven events:¶
IF LTA_MODE==TRUE: TIME=time() IF TIME > (LTA_LAST + LTA_CYCLE) Disaasociate any options for which INFO_LAST < LTA_LAST LTA_MODE= FALSE RS_COUNT= 0 ELSE IF TIME > (LTA_LAST + RA_WIN + RS_RNDTIME) && TIME > (RS_LAST + RS_TIMEOUT) && RS_COUNT < RS_COUNT_MAX: IF for all options INFO_LAST >= LTA_LAST LTA_MODE= FALSE RS_COUNT= 0 ELSE SendRS() RS_LAST=TIME RS_COUNT++¶
NOTES:¶
This document has no actions for IANA.¶
An attacker could for Router Advertisement messages wit missing Neighbor Discovery options (such as PIOs), to trigger the algorithm specified in this document, with te goal of illegitimatelly causing valid prefixes to be removed. In any case, and for all practical purposes, this attack vector does not really represent any greater risk than other ND attack vectors. In scenarios where RA-based attacks are of concern, proper mitigations such as RA-Guard [RFC6105] [RFC7113] or SEND [RFC3971] should be implemented.¶
The authors would like to thank (in alphabetical order) [TBD], for providing valuable comments on earlier versions of this document.¶
Fernando would like to thank Alejandro D'Egidio and Sander Steffann for a discussion of these issues, which led to the publication of [RFC8978], and eventually to this document.¶
Fernando would also like to thank Brian Carpenter who, over the years, has answered many questions and provided valuable comments that has benefited his protocol-related work.¶