Skip to main content

Detecting Network Attachment in IPv4 (DNAv4)
draft-ietf-dhc-dna-ipv4-18

Revision differences

Document history

Date Rev. By Action
2012-08-22
18 (System) post-migration administrative database adjustment to the No Objection position for Sam Hartman
2005-12-23
18 Amy Vezza State Changes to RFC Ed Queue from Approved-announcement sent by Amy Vezza
2005-12-20
18 Amy Vezza IESG state changed to Approved-announcement sent
2005-12-20
18 Amy Vezza IESG has approved the document
2005-12-20
18 Amy Vezza Closed "Approve" ballot
2005-12-02
18 (System) New version available: draft-ietf-dhc-dna-ipv4-18.txt
2005-12-02
18 (System) Removed from agenda for telechat - 2005-12-01
2005-12-01
18 Amy Vezza State Changes to Approved-announcement to be sent from IESG Evaluation by Amy Vezza
2005-12-01
18 Amy Vezza [Ballot Position Update] New position, No Objection, has been recorded for Alex Zinin by Amy Vezza
2005-12-01
18 Amy Vezza [Ballot Position Update] New position, No Objection, has been recorded for Bill Fenner by Amy Vezza
2005-12-01
18 Allison Mankin [Ballot Position Update] New position, No Objection, has been recorded for Allison Mankin by Allison Mankin
2005-12-01
18 Bert Wijnen [Ballot Position Update] New position, No Objection, has been recorded for Bert Wijnen by Bert Wijnen
2005-11-28
18 Margaret Cullen
[Ballot comment]
Comment/question from Jari Arrko's Mobility Directorate review:

>    [c] If secure detection of network attachment is required.
>        The …
[Ballot comment]
Comment/question from Jari Arrko's Mobility Directorate review:

>    [c] If secure detection of network attachment is required.
>        The reachability test utilizes ARP which is insecure.

What, specifically, is your model of "secure detection of network attachment"? How do I implement this requirement in a host i.e. what feature must be on for me to skip DNAv4?
Do you mean that if DHCP authentication is on then we skip DNAv4?

Also, some forms of secure ARP (e.g. Cisco's DHCP-secured
ARP) appear to work without host involvement and would appear to be compatible with DNAv4.
2005-11-28
18 Margaret Cullen
[Ballot comment]
Comment/question from Jari Arrko's Mobility Directorate review:

>    [c] If secure detection of network attachment is required.
>        The …
[Ballot comment]
Comment/question from Jari Arrko's Mobility Directorate review:

>    [c] If secure detection of network attachment is required.
>        The reachability test utilizes ARP which is insecure.

What, specifically, is your model of "secure detection of network attachment"? How do I implement this requirement in a host i.e. what feature must be on for me to skip DNAv4?
Do you mean that if DHCP authentication is on then we skip DNAv4?

Also, some forms of secure ARP (e.g. Cisco's DHCP-secured
ARP) appear to work without host involvement and would appear to be compatible with DNAv4.
2005-11-23
18 Margaret Cullen
[Note]: 'This document has changed substantially since the IESG reviewed version -12 based on post-LC comments. Back for a re-review before sending to the RFC …
[Note]: 'This document has changed substantially since the IESG reviewed version -12 based on post-LC comments. Back for a re-review before sending to the RFC Editor.' added by Margaret Wasserman
2005-11-07
18 Margaret Cullen State Changes to IESG Evaluation from Approved-announcement to be sent by Margaret Wasserman
2005-11-03
18 Margaret Cullen
[Note]: 'This document has changed substantially since the IESG reviewed version -12 based on post-LC comments.  Back for a re-review before sending to the RFC …
[Note]: 'This document has changed substantially since the IESG reviewed version -12 based on post-LC comments.  Back for a re-review before sending to the RFC Editor.' added by Margaret Wasserman
2005-11-03
18 Margaret Cullen Placed on agenda for telechat - 2005-12-01 by Margaret Wasserman
2005-11-03
18 Margaret Cullen
[Note]: 'This document has changed substantially since the IESG review version -12 based on post-LC comments.  Back for a re-review before sending to the RFC …
[Note]: 'This document has changed substantially since the IESG review version -12 based on post-LC comments.  Back for a re-review before sending to the RFC Editor.' added by Margaret Wasserman
2005-11-03
18 Margaret Cullen State Changes to Approved-announcement to be sent from IESG Evaluation::AD Followup by Margaret Wasserman
2005-10-25
17 (System) New version available: draft-ietf-dhc-dna-ipv4-17.txt
2005-10-11
18 Margaret Cullen Note field has been cleared by Margaret Wasserman
2005-09-29
16 (System) New version available: draft-ietf-dhc-dna-ipv4-16.txt
2005-09-09
18 Margaret Cullen [Note]: 'The -15 version addresses Stuart''s concerns.  Waiting for confirmation from WG chairs that the WG has reviewed/approved the changest.' added by Margaret Wasserman
2005-08-15
15 (System) New version available: draft-ietf-dhc-dna-ipv4-15.txt
2005-08-08
14 (System) New version available: draft-ietf-dhc-dna-ipv4-14.txt
2005-07-27
18 Margaret Cullen
Issues raised by Stuart Cheshire...


Subject: Re: [dhcwg] I-D ACTION:draft-ietf-dhc-dna-ipv4-13.txt
From: Ralph Droms
To: Undisclosed-Recipient:;
Cc: Stig Venaas
Date: Wed, 27 Jul 2005 00:10:51 -0400 …
Issues raised by Stuart Cheshire...


Subject: Re: [dhcwg] I-D ACTION:draft-ietf-dhc-dna-ipv4-13.txt
From: Ralph Droms
To: Undisclosed-Recipient:;
Cc: Stig Venaas
Date: Wed, 27 Jul 2005 00:10:51 -0400
X-Spam: [F=0.0001020200; B=0.500(0); S=0.010(2005070601); MH=0.500(2005072613); R=0.010(s287/n31069)]

Margaret - Stuart's comments raise a process issue, in that this
document has gone through IETF last call, and the -13 rev includes
changes to the document based on comments received during the IETF last
call. 

Considering the diffs between the -12 and -13 revs of the doc
(http://tools.ietf.org/wg/dhc/draft-ietf-dhc-dna-ipv4/draft-ietf-dhc-
dna-ipv4-13-from-12.diff.html), another IETF last call on this doc might
be in order.

I think Stuart's comments can be dealt with quickly - in fact, John
Schnizlein has already responded to Stuart's point 3 - in an IETF last
call.  I note that Stuart says he has "a long list of comments" that
perhaps should be reveiwed during a last call.

- Ralph

On Tue, 2005-07-12 at 16:47 +0100, Stuart Cheshire wrote:
> I just read draft-ietf-dhc-dna-ipv4-13.txt.
>
> I support the goals, but I think the current document misses the target.
> I have a long list of comments, but these are the three major ones:
>
> 1. Hints and heuristics
>
> It seems to me that the reliance on hints and heuristics is vastly
> overstated. The biggest and best heuristic of network attachment is the
> MAC address of the default gateway, which can be verified with a trivial
> ARP request (i.e. the proposed DNA mechanism itself), thereby negating
> much of the usefulness of all the other hints. The document even has a
> section for IP-layer hints, and then says they're pointless and shouldn't
> be used. Given than an ARP request can be answered in under 1ms, any hint
> or heuristic has to be significantly faster than that, or it's
> self-defeating.
>
> The argument in Appendix A that you don't want to delay the normal DHCP
> INIT-REBOOT process while waiting for DNA is bogus. There's no reason why
> a host that wants rapid attachment to the network (which is, after all,
> the whole point of DNA) wouldn't do both simultaneously, and then just
> wait and see which approach yields a fruitful result quickest.
>
> 2. Why only one MLN candidate?
>
> Why limit a host to picking just one candidate network to verify?
>
> The drafts says, "In the absence of other information, the MLN defaults
> to the network to which the host was most recently attached." Consider a
> laptop computer that moves daily between Ethernet at work and Ethernet at
> home. If each time it picks its most recently attached as its best guess,
> it's going to be wrong 100% of the time.
>
> It would be much better if a device simply sent ten ARP Requests for the
> last ten default gateway addresses it has seen, and then sees which, if
> any, are answered.
>
> If you don't want to hit the network with ten back-to-back wire-rate ARP
> Requests, then they can be staggered 100ms apart, starting with the most
> recently seen network, then the previous, and so on.
>
> Most network gateways should be able to answer an ARP Request almost
> instantaneously, since answering ARP Requests is something they have to
> do all the time anyway, and if they're slow at that, then that would
> adversely impact the performance of pretty much all IP traffic flowing
> through the gateway.
>
> This stream of ARP Requests would of course be going on concurrently with
> DHCP INIT-REBOOT processing, and as soon as one of them yields a fruitful
> result, the device should stop.
>
> It's simple, it's fast, and it yields the desired result.
>
> 3. Probe packets
>
> The document struggles with its incompatibility with the existing
> widespread use of a zero-sender ARP as an ARP Probe, which means, "I want
> to know if this address is in use, AND IF NOT I INTEND TO USE IT MYSELF."
> This is the issue James Carlson pointed out.
>
> This document needs an ARP Request with these semantics: "I just want to
> know if this address is in use, and I have no intention of claiming it as
> my own address; I may believe I already have an address of my own, but
> I'm not yet willing to reveal what that is."
>
> What could that packet be?
>
> Given that the host does not want to announce its address until it is
> certain of it, it can't put that address in ar$spa.
>
> The host can't put zero in ar$spa, because that implies, "I intend to use
> ar$tpa as my own."
>
> Therefore, it has to put something else. It just has to be a non-zero
> value that can't be an actual IP address already in use by a host on that
> link.
>
> There are many possibilities:
>
> 0.0.0.1
> 127.0.0.1
> 255.255.255.255
>
> Any of those values would work. They are not zero, so the packet doesn't
> look like a probe, and they're not any IP address that could be in use by
> any other host on that link, so they can't inadvertently stomp over
> someone else's ARP cache entry.
>
> Fixing this would eliminate much of the specification that's currently
> awkward, clumsy, self-contradictory and unimplementable. For example:
>
>      Note: Some routers may refuse to answer an ARP Probe, in which
>      case the reachability test will fail.  A host also may encounter a
>      router that utilizes ARP Probes for DAD, as described in [ACD].
>      Such routers will not interpret ARP Probes as an indication of an
>      address conflict, except where they are themselves doing Duplicate
>      Address Detection (DAD).  To avoid triggering conflict detection
>      on these routers, a host implementing DNAv4 that receives ARP
>      Probe from a router SHOULD NOT send ARP Probes to that router as
>      part of the DNAv4 reachability test.
>
> A host "that receives ARP Probe from a router SHOULD NOT..."
>
> How does a host KNOW it will receive ARP Probes from a router? How long
> should it wait to see? DNA is supposed to be fast, right, so how long do
> we want it to wait? Even after it's waited, how does it know the router
> is not booting up and, at that very instant, is about to send its own ARP
> Probes? How does a host know it's a router sending ARP Probes, and not
> some other host on the network performing DNA? What does it mean by,
> "SHOULD NOT send ARP Probes to that router as part of the DNAv4
> reachability test"? I thought that sending ARPs was ALL of the DNAv4
> reachability test. What other parts are there?
>
> Using ARP Requests with a 0.0.0.1 source address would eliminate all of
> these self-contradictions and awkward special cases.
>
> Stuart Cheshire
>  * Wizard Without Portfolio, Apple Computer, Inc.
>  * www.stuartcheshire.org
>
>
> _______________________________________________
> dhcwg mailing list
> dhcwg@ietf.org
> https://www1.ietf.org/mailman/listinfo/dhcwg
2005-07-27
18 Margaret Cullen [Note]: 'On hold pending resolution of Stuart Cheshire''s issues (see below) and WG review of changes between -12 and -13.' added by Margaret Wasserman
2005-07-27
18 Margaret Cullen State Changes to IESG Evaluation::AD Followup from Approved-announcement to be sent by Margaret Wasserman
2005-07-27
18 Margaret Cullen State Changes to Approved-announcement to be sent from IESG Evaluation::AD Followup by Margaret Wasserman
2005-06-28
18 Sam Hartman [Ballot Position Update] Position for Sam Hartman has been changed to No Objection from Discuss by Sam Hartman
2005-06-28
13 (System) New version available: draft-ietf-dhc-dna-ipv4-13.txt
2005-06-24
18 Amy Vezza State Changes to IESG Evaluation::AD Followup from IESG Evaluation by Amy Vezza
2005-06-23
18 Mark Townsley [Ballot Position Update] New position, No Objection, has been recorded for Mark Townsley by Mark Townsley
2005-06-22
18 David Kessens [Ballot Position Update] New position, No Objection, has been recorded for David Kessens by David Kessens
2005-06-22
18 Jon Peterson [Ballot Position Update] New position, No Objection, has been recorded for Jon Peterson by Jon Peterson
2005-06-22
18 Ted Hardie [Ballot Position Update] Position for Ted Hardie has been changed to No Objection from Undefined by Ted Hardie
2005-06-22
18 Brian Carpenter [Ballot Position Update] New position, No Objection, has been recorded for Brian Carpenter by Brian Carpenter
2005-06-22
18 Ted Hardie
[Ballot comment]
The document says:

Experience has shown that IPv4 Link-Local
addresses are often assigned inappropriately, compromising both
performance and connectivity.

Is there a citation …
[Ballot comment]
The document says:

Experience has shown that IPv4 Link-Local
addresses are often assigned inappropriately, compromising both
performance and connectivity.

Is there a citation for this, or was this experience shared with the working group?
2005-06-22
18 Ted Hardie [Ballot Position Update] New position, Undefined, has been recorded for Ted Hardie by Ted Hardie
2005-06-21
18 Sam Hartman
[Ballot discuss]
Section 2.1 of the document discusses implementations of DNAV4 using
snooping versions of OSPF and RIP to understand what prefixes are on a …
[Ballot discuss]
Section 2.1 of the document discusses implementations of DNAV4 using
snooping versions of OSPF and RIP to understand what prefixes are on a
subnet without fully participating in a routing protocol.  While this
practice is encouraged by this specification, no reference to how to
do it is provided.  If such a reference exists it needs to be
included.  If no such reference exists, please confirm that sufficient
detail is provided that implementations are unlikely to break the
routing infrastructure by misimplementing this feature.
2005-06-21
18 Sam Hartman [Ballot Position Update] New position, Discuss, has been recorded for Sam Hartman by Sam Hartman
2005-06-20
18 Russ Housley [Ballot Position Update] New position, No Objection, has been recorded for Russ Housley by Russ Housley
2005-06-20
18 Scott Hollenbeck [Ballot Position Update] New position, No Objection, has been recorded for Scott Hollenbeck by Scott Hollenbeck
2005-06-16
18 Margaret Cullen State Changes to IESG Evaluation from Waiting for AD Go-Ahead by Margaret Wasserman
2005-06-16
18 Margaret Cullen Placed on agenda for telechat - 2005-06-23 by Margaret Wasserman
2005-06-16
18 Margaret Cullen Note field has been cleared by Margaret Wasserman
2005-06-16
18 Margaret Cullen Ballot has been issued by Margaret Wasserman
2005-06-16
18 Margaret Cullen [Ballot Position Update] New position, Yes, has been recorded for Margaret Wasserman
2005-06-16
18 Margaret Cullen Ballot has been issued by Margaret Wasserman
2005-06-16
18 Margaret Cullen Created "Approve" ballot
2005-06-06
12 (System) New version available: draft-ietf-dhc-dna-ipv4-12.txt
2005-05-31
18 Michelle Cotton Late IANA Last Call Comments:
We understand this document to have NO IANA Actions.
2005-05-24
18 (System) State has been changed to Waiting for AD Go-Ahead from Revised ID Needed by system
2005-05-22
18 Margaret Cullen [Note]: 'Requires boilerplate update before IESG review. Issue tracker at: http://www.drizzle.com/~aboba/DNA shows pending issue #24.' added by Margaret Wasserman
2005-05-22
18 Margaret Cullen State Changes to In Last Call::Revised ID Needed from In Last Call by Margaret Wasserman
2005-05-22
18 Margaret Cullen [Note]: 'Requires boilerplate update before approval?  Issue tracker at: http://www.drizzle.com/~aboba/DNA shows pending issue #24.' added by Margaret Wasserman
2005-05-22
18 Margaret Cullen [Note]: 'Requires boilerplate update before approval?  Issue tracker at: http://www.drizzle.com/~aboba/DNA/dnaissues.html shows pending issue #24.' added by Margaret Wasserman
2005-05-22
18 Margaret Cullen [Note]: 'Requires boilerplate update before approval?' added by Margaret Wasserman
2005-05-22
18 Margaret Cullen
Submission Questionnaire:


draft-ietf-dhc-dna-ipv4-09.txt is ready for IESG review; here is the chairs' questionnaire:

1) Have the chairs personally reviewed this version of the ID and …
Submission Questionnaire:


draft-ietf-dhc-dna-ipv4-09.txt is ready for IESG review; here is the chairs' questionnaire:

1) Have the chairs personally reviewed this version of the ID and do
  they believe this ID is sufficiently baked to forward to the IESG
  for publication?

Yes and yes.

2) Has the document had adequate review from both key WG members and
  key non-WG members? Do you have any concerns about the depth or
  breadth of the reviews that have been performed?

Yes and no.

3) Do you have concerns that the document needs more review from a
  particular (broader) perspective (e.g., security, operational
  complexity, someone familiar with AAA, etc.)?

No.

4) Do you have any specific concerns/issues with this document that
  you believe the ADs and/or IESG should be aware of? For example,
  perhaps you are uncomfortable with certain parts of the document,
  or whether there really is a need for it, etc., but at the same
  time these issues have been discussed in the WG and the WG has
  indicated it wishes to advance the document anyway.

No concerns.

5) How solid is the WG consensus behind this document?  Does it
  represent the strong concurrence of a few individuals, with others
  being silent, or does the WG as a whole understand and agree with
  it?

WG has expressed strong concurrence of a few individuals with no
objections.

6) Has anyone threatened an appeal or otherwise indicated extreme
  discontent?  If so, please summarize what are they upset about.

No.

7) Have the chairs verified that the document adheres to _all_ of the
  ID nits?  (see http://www.ietf.org/ID-nits.html).

This draft uses RFC 2026 IPR boilerplate.  idnits also found a couple
of examples of hyphenation and wierd spacing.

8) For Standards Track and BCP documents, the IESG approval
  announcement includes a writeup section with the following
  sections:

  - Technical Summary

  (Abstract from "Detection of Network Attachment (DNA) in IPv4")
  The time required to detect movement (or lack of movement) between
  subnets, and to obtain (or continue to use) a valid IPv4 address may
  be significant as a fraction of the total delay in moving between
  points of attachment.  This document synthesizes experience garnered
  over the years in the deployment of hosts supporting ARP, DHCP and
  IPv4 Link-Local addresses.  A procedure is specified for detection of
  network attachment in order to better accommodate mobile hosts.

  The document addresses a need for compilation of experiences with
  various protocol specifications and formal description of protocol
  operation based on those experiences.  Members of the dhc WG
  provided significant expert input based on experience with DHCP
  client/server deployment and operation.

  - Working Group Summary

  The dhc WG was actively involved in the development of this
  document and provided significant input.  The consensus of the WG
  is to submit the document for publication.  The issues raised
  during discussion of this document, including the WG last call, are
  listed at http://www.drizzle.com/~aboba/DNA/dnaissues.html

  - Protocol Quality

  This document does not define a protocol; rather, it provides a
  formal description of procedures for host movement that are useful
  in protocols like DHCP and IPv4 link-local addresses.  The quality
  of the document is excellent.

  Please provide such a writeup. (We will hopefully use it as is, but
  may make some changes.) For recent examples, have a look at the
  "protocol action" announcements for approved documents.
2005-05-10
18 Amy Vezza Last call sent
2005-05-10
18 Amy Vezza State Changes to In Last Call from Last Call Requested by Amy Vezza
2005-05-10
18 Margaret Cullen State Changes to Last Call Requested from AD Evaluation::AD Followup by Margaret Wasserman
2005-05-10
18 Margaret Cullen Last Call was requested by Margaret Wasserman
2005-05-10
18 (System) Ballot writeup text was added
2005-05-10
18 (System) Last call text was added
2005-05-10
18 (System) Ballot approval text was added
2005-04-13
11 (System) New version available: draft-ietf-dhc-dna-ipv4-11.txt
2005-03-28
18 (System) Sub state has been changed to AD Follow up from New Id Needed
2005-03-28
10 (System) New version available: draft-ietf-dhc-dna-ipv4-10.txt
2005-03-20
18 Margaret Cullen State Changes to AD Evaluation::Revised ID Needed from AD Evaluation by Margaret Wasserman
2005-03-20
18 Margaret Cullen
AD review comments sent to the author and the WG:

To: Bernard Aboba
From: Margaret Wasserman
Subject: AD Review Comments On:  draft-ietf-dhc-dna-ipv4-09.txt
Cc: Mark Townsley …
AD review comments sent to the author and the WG:

To: Bernard Aboba
From: Margaret Wasserman
Subject: AD Review Comments On:  draft-ietf-dhc-dna-ipv4-09.txt
Cc: Mark Townsley , dhcwg@ietf.org

Hi Bernard,

I have two questions about draft-ietf-dhc-dna-ipv4-09.txt that I would like to discuss before I send this document to IETF LC.

(1) Could you explain why sending an ARP request to the default gateway(s) of the MLPA (as described in section 2.2)  is a better mechanism to confirm what IPv4 configuration parameters should be used than re-initiating DHCPv4 and/or attempting to renew the DHCPv4 lease (as described in section 2.3)?

The only text in the document that might explain this seems to be:

  In contrast to a DHCP exchange, which may be between a DHCP client
  and an off-link DHCP server, the reachability test is designed to
  verify bi-directional connectivity to the default gateway(s) on the
  MLPA.

But, I'm not sure why this is better than using DHCP and/or how this compensates for the possibility that the mechanisms described in this document may result in a two step process:  an ARP exchange (with a 200ms timeout) followed by a DHCP exchange.  Has there been some analysis and/or empirical testing that shows that this mechanism produces superior results?

(2) Is it assumed that the host would not send any non-DNA-related IPv4 traffic using its presumed address on the MPLA during the reachability test and address acquisition phases?  If so, would it make sense to state that restriction here?  Do you expect that packets would be queued until the address status is resolved?  Or that upper layers would receive errors consistent with an interface that has not addresses configured?

Thanks,
Margaret
2005-02-25
18 Margaret Cullen State Changes to AD Evaluation from Publication Requested by Margaret Wasserman
2005-02-21
18 Dinara Suleymanova Draft Added by Dinara Suleymanova in state Publication Requested
2004-10-18
09 (System) New version available: draft-ietf-dhc-dna-ipv4-09.txt
2004-07-21
08 (System) New version available: draft-ietf-dhc-dna-ipv4-08.txt
2004-04-16
07 (System) New version available: draft-ietf-dhc-dna-ipv4-07.txt
2004-03-15
06 (System) New version available: draft-ietf-dhc-dna-ipv4-06.txt
2004-01-28
05 (System) New version available: draft-ietf-dhc-dna-ipv4-05.txt
2003-10-23
04 (System) New version available: draft-ietf-dhc-dna-ipv4-04.txt
2003-10-09
03 (System) New version available: draft-ietf-dhc-dna-ipv4-03.txt
2003-09-29
02 (System) New version available: draft-ietf-dhc-dna-ipv4-02.txt
2003-09-12
01 (System) New version available: draft-ietf-dhc-dna-ipv4-01.txt
2003-08-14
00 (System) New version available: draft-ietf-dhc-dna-ipv4-00.txt