DAD in N:1 VLANs Reminding the issue – following Broadband Forum liaison to IETF#76 Christophe ALTER Broadband Forum Ambassador France Telecom Orange.

Slides:



Advertisements
Similar presentations
Ethernet Switch Features Important to EtherNet/IP
Advertisements

LinkSec Architecture Attempt 3
Bridging & Broadcast Scenarios Carlos Ribeiro CTBC Telecom.
© 2006 Cisco Systems, Inc. All rights reserved.Cisco ConfidentialPresentation_ID 1 IPv6 via IPv4 SP Networks - 6rd draft-townsley-ipv6-6rd-01.txt (also.
Copyright © 2004 Juniper Networks, Inc. Proprietary and Confidentialwww.juniper.net 1 181th IETF - Quebec VPLS PE Model with E-Tree Support Yuanlong Jiang.
Copyright © 2004 Juniper Networks, Inc. Proprietary and Confidentialwww.juniper.net 1 79th IETF - Beijing VPLS PE Model with E-Tree Support Yuanlong Jiang.
Copyright © 2004 Juniper Networks, Inc. Proprietary and Confidentialwww.juniper.net 1 80th IETF - Prague VPLS PE Model with E-Tree Support Yuanlong Jiang.
1 Introducing the Specifications of the Metro Ethernet Forum.
1 Introducing the Specifications of the Metro Ethernet Forum.
1 Introducing the Specifications of the Metro Ethernet Forum.
1 Introducing the Specifications of the Metro Ethernet Forum.
1 Introducing the Specifications of the Metro Ethernet Forum.
1 Introducing the Specifications of the Metro Ethernet Forum.
SAVI Requirements and Solutions for ISP IPv6 Access Network ISP-access-01.txt.
Chapter 1: Introduction to Scaling Networks
Christophe Jelger – CS221 Network and Security - Universität Basel Christophe Jelger Post-doctoral researcher IP Multicasting.
Scalable Security in a Multi-Client Environment - Private VLANs Designing VLANs in Networks.
LAN Segmentation Virtual LAN (VLAN).
© 2008 Cisco Systems, Inc. All rights reserved.Cisco ConfidentialPresentation_ID 1 Chapter 3: VLANs Routing & Switching.
10: ICMPv6 Neighbor Discovery
1 ICS 156: Lecture 2 (part 2) Data link layer protocols Address resolution protocol Notes on lab 2.
IPv4 - IPv6 Integration and Coexistence Strategies Warakorn Sae-Tang Network Specialist Professional Service Department A Subsidiary.
Neighbor Discovery for IPv6 Mangesh Kaushikkar. Overview Introduction Terminology Protocol Overview Message Formats Conceptual Model of a Host.
Transitioning to IPv6 April 15,2005 Presented By: Richard Moore PBS Enterprise Technology.
© 2006 Cisco Systems, Inc. All rights reserved.IP6FD v2.0—2-1 IPv6 Operations Defining and Configuring Neighbor Discovery.
BUDAPEST UNIVERSITY OF TECHNOLOGY AND ECONOMICS Budapest University of Technology and Economics Revolutionary IPv6 Access Solution Levente Kovács Authors:
IP over ETH over IEEE draft-riegel-16ng-ip-over-eth-over Max Riegel
Media Access Control (MAC) addresses in the network access layer ▫ Associated w/ network interface card (NIC) ▫ 48 bits or 64 bits IP addresses for the.
 As defined in RFC 826 ARP consists of the following messages ■ ARP Request ■ ARP Reply.
CCNPv5 Minimizing Service Loss and Data Theft in a Campus Network 1 Minimizing Service Loss and Data Theft in a Switched BCMSN Module 8 – Sec 2.
Instructor & Todd Lammle
SAVI IP Source Guard draft-baker-sava- implementation Fred Baker.
IPv6 Address Provisioning In IPv6 world there are three provisioning aspects wich are independent of whether the IPv6 node is a Host or CE router: IPv6.
Traffic Management - OpenFlow Switch on the NetFPGA platform Chun-Jen Chung( ) Sriram Gopinath( )
Sanjay Goel, School of Business/Center for Information Forensics and Assurance University at Albany Proprietary Information 1 Unit Outline Information.
Networking Components
(part 3).  Switches, also known as switching hubs, have become an increasingly important part of our networking today, because when working with hubs,
Networking Components Mike Yardley LTEC 4550 Assignment 3
CECS 5460 – Assignment 3 Stacey VanderHeiden Güney.
Network Redundancy Multiple paths may exist between systems. Redundancy is not a requirement of a packet switching network. Redundancy was part of the.
Security in MobileIP Fahd Ahmad Saeed. Wireless Domain Problem Wireless domain insecure Data gets broadcasted to everyone, and anyone hearing this can.
NETWORKING COMPONENTS By Scott H. Bowers. HUB A hub can be easily mistaken for a switch, physically there are no defining characteristics, both have power.
Common Devices Used In Computer Networks
BROADBAND TECHNOLOGIES & SERVICES Broadband Technologies -Core Network
Concerns about designating the MAG as a Default Router James Kempf NETLMM Interim Sept. 27, 2006.
1 Multilink Subnets draft-thaler-ipngwg-multilink-subnets-00.txt Dave Thaler Christian Huitema Microsoft.
NETWORKING COMPONENTS AN OVERVIEW OF COMMONLY USED HARDWARE Christopher Johnson LTEC 4550.
Computer Networks 15-1 Chapter 15. Connecting LANs, Backbone Networks, and Virtual LANs 15.1 Connecting devices 15.2 Backbone networks 15.3 Virtual LANs.
© 2006 Cisco Systems, Inc. All rights reserved. BSCI v3.0—8-1 Implementing IPv6 Implementing Dynamic IPv6 Addresses.
Traffic Management - OpenFlow Switch on the NetFPGA platform Chun-Jen Chung( ) Sriram Gopinath( )
Switch Features Most enterprise-capable switches have a number of features that make the switch attractive for large organizations. The following is a.
Duplicate Address Detection Proxy (draft-costa-6man-dad-proxy-00)
NET 324 D Networks and Communication Department Lec1 : Network Devices.
Guidance of Using Unique Local Addresses draft-liu-v6ops-ula-usage-analysis-05 draft-liu-v6ops-ula-usage-analysis-05 Bing Liu(speaker), Sheng Jiang, Cameron.
© 2006 Cisco Systems, Inc. All rights reserved.Cisco Public BSCI Module 8 Lesson 3 1 BSCI Module 8 Lesson 3 Implementing Dynamic IPv6 Addresses.
Attacking on IPv6 W.lilakiatsakun Ref: ipv6-attack-defense-33904http://
Ασύρματες και Κινητές Επικοινωνίες Ενότητα # 10: Mobile Network Layer: Mobile IP Διδάσκων: Βασίλειος Σύρης Τμήμα: Πληροφορικής.
Network Components Kortney Horton LTEC October 20, 2013 Assignment 3.
IPv6 Neighbor Discovery over Syam Madanapalli Samsung ISO IETF 64 – Vancouver, Canada November 8 th 2005.
Layer 2 Control Protocol BoF (L2CP) IETF 65, Dallas, TX Wojciech Dec Matthew Bocci
V6OPS WG IETF-72 IPv6 in Broadband Networks draft-kaippallimalil-v6ops-ipv6-bbnet Presented by: David Miles Kaippallimalil John Frank Xia July 2008.
XRBLOCK IETF 85 Atlanta Network Virtualization Architecture Design and Control Plane Requirements draft-fw-nvo3-server2vcenter-01 draft-wu-nvo3-nve2nve.
Networks DEVICES. Repeater device to amplify or regenerate digital signals received while setting them from one part of a network into another. Works.
Address Resolution Protocol Yasir Jan 20 th March 2008 Future Internet.
Ethernet Basics – 7 IP Addressing. Introducing IP Addressing  IP address (TCP/IP address)  Not unique (but should be), user assigned  Layer 3  4 byte.
Sheng Jiang (Speaker) Xu Chen Xuan Song Huawei Neighbor Cache Protection in Neighbor Discover Protocol draft-jiang-v6ops-nc-prtection-01 IETF 77 V6OPS.
Revisiting Ethernet: Plug-and-play made scalable and efficient
IS3120 Network Communications Infrastructure
e-business and Information Systems
Chapter 15. Connecting Devices
Presentation transcript:

DAD in N:1 VLANs Reminding the issue – following Broadband Forum liaison to IETF#76 Christophe ALTER Broadband Forum Ambassador France Telecom Orange

2 Multipoint-to-point access architecture Ethernet bridging in the Access Node Multiple subscribers are connected to a given VLAN (VLAN per service - no VLAN per Customer) All subscribers have layer 2 connectivity with the Broadband Network Gateway (BNG) No layer 2 connectivity between subscribers Access/Aggregation Nodes DSLAM / OLT BNG IP Edge Router IP Backbone N Subscribers X 1 VLAN

3 Multipoint-to-point access architecture A popular Ethernet architecture in broadband service provider networks –Call it split-horizon, E-Tree, N:1 VLAN or multipoint-to-point –Found in xDSL and FTTx deployments (Broadband Forum), Enterprise networks (Metro Ethernet Forum) and Cable deployments Chosen mainly for scalability –Typically s subscribers per VLAN –Avoids overloading every subscriber with every other subscriber broadcasts –Provides privacy between subscribers

4 Issue to be resolved Deriving LLAs from MACs doesnt prevent LLA duplicates –Because there might be duplicate MAC addresses in (untrusted) subscribers domains –Although MAC uniqueness in the service providers (trusted) domain is somehow ensured (typically through MAC Address Translation by the Access Node, c.f. Broadband Forum WT- 145) DAD is needed to prevent / resolve duplicate link local addresses - helping hosts that use DAD –But subscribers dont have layer 2 connectivity to each other –Although they are connected to the BNG through a single VLAN Some helper function is needed in the IP Edge Router to allow DAD to work in split horizon environments –This is what SAVI is kindly requested to define.

5 DAD-NS: Hey, Id like to use LLA1 ; anyone already using it ? DAD-NA: is already in use, please choose another Access/Aggregation Nodes DSLAM / OLT BNG IP Edge Router IP Backbone N Subscribers X 1 VLAN ? Issue to be resolved

Backup / Archives The following slides were presented to IETF#76 by Dave Allan, Broadband Forum WG Chair

7 Mapping Terminology Access Node Residential Gateway Last mile media Aggregation Network Host/Home router L2 bridge with L3 helpers Edge Router IPv6 Land Broadband Network Gateway Unlike a normal bridge The AN has a few diodes in it… UntrustedTrusted

8 Background (From BBF ) In order to enable IPv6 connectivity, every host must first of all create a link-local address (of the range FE80::/64) in order to allow communication on a single link. The procedure for creating link-local addresses is defined in RFC 4862 [1]. When an IPv6 interface becomes active it will first concatenate its Interface ID with the link-local prefix FF08::/64. The Interface ID for an Ethernet interface is derived from the EUI-64 identifier as spedified in RFC 2464 [2]. This 64-bit identifier in turn is derived from the 48-bit interface MAC address. –For example: an interface MAC address 00- 1B-E9-58-B0-6D would be mapped to a 64-bit Interface ID 02-1B-E9-FF-FE-58-B0-6D. As a result, the link-local address would be FE80::21B:E9FF:FE58:B06D. Under such conditions, if the interface MAC address is unique, then the derived link-local address will also be unique. –Direct inheritance

9 Current state of the art in Uniqueness (From BBF ) To protect against cases where the Interface ID would not be unique, IPv6 nodes test their address on the IPv6 link using Duplicate Address Detection (DAD). This test is performed to ensure uniqueness of the link-local address on the link. In case the Interface ID is derived from the MAC address, then link-local addresses should always be unique. The above procedures work well in a trusted environment. Contrary to a trusted network deployment, a broadband access network is generally an untrusted network: –a malicious user may try to spoof a link-local address (e.g. by connecting a PC to a bridged modem and configuring a specific link-local address on the PC) –a malicious user may try to flood the network with a large number of different link-local addresses, leading to a Denial of Service attack on the BNG –If two devices happen to have the same Ethernet MAC address as a consequence of incompetent manufacture, the link-local address derived for that interface will also be non-unique, provided it is derived from the EUI-64 identifier. This has been identified as an inconveniently frequent scenario (impacting ~4% of access nodes at any given time)

10 Complication (From BBF ) Even if the customer equipment was benign and altruistic w.r.t. network behaviour, direct layer 2 user-to- user communication is controlled in a broadband access network by means of split-horizon forwarding, per TR As a result, link-local connectivity only exists between the host and the BNG/edge router. There is no way for the individual hosts to know whether they are using duplicate link-local addresses as direct observation of neighbours traffic is precluded. –Editorial comment: This is not unique to BBF TR101, numerous link layers exhibit this behaviour (e.g. HFC or PON), and this can be virtualized at the networking level (e.g. MEF ETREE service definition, 802.1ad (2005) Asymmetric VID, 802.1ah/.1aq also support this model)

11 Consequences (From BBF ) When deploying a plain IPv6 router that is not subscriber-aware, different hosts / RGs using the same link-local address would force the router to overwrite the corresponding entry in the Neighbor Cache. This can lead to a Theft of Service attack.

12 What is Needed (From BBF ) When numerous hosts share an Ethernet broadcast domain, the BNG/edge router needs to support a mechanism that ensures duplicate link-local addresses can be handled correctly without necessarily depending on cooperative action by the hosts – it is explicitly required to do something to make this happen