Skip to main content

IPv6 Router Advertisement Guard
draft-ietf-v6ops-ra-guard-08

Revision differences

Document history

Date Rev. By Action
2012-08-22
08 (System) post-migration administrative database adjustment to the No Objection position for Jari Arkko
2012-08-22
08 (System) post-migration administrative database adjustment to the No Objection position for Tim Polk
2012-08-22
08 (System) post-migration administrative database adjustment to the No Objection position for Ralph Droms
2012-08-22
08 (System) post-migration administrative database adjustment to the No Objection position for Dan Romascanu
2012-08-22
08 (System) post-migration administrative database adjustment to the No Objection position for Adrian Farrel
2010-11-09
08 Cindy Morgan State changed to RFC Ed Queue from Approved-announcement sent.
2010-10-27
08 (System) IANA Action state changed to No IC from In Progress
2010-10-27
08 (System) IANA Action state changed to In Progress
2010-10-27
08 Cindy Morgan IESG state changed to Approved-announcement sent
2010-10-27
08 Cindy Morgan IESG has approved the document
2010-10-27
08 Cindy Morgan Closed "Approve" ballot
2010-10-27
08 Ron Bonica State Changes to Approved-announcement to be sent from IESG Evaluation::AD Followup by Ron Bonica
2010-10-26
08 Ralph Droms
[Ballot comment]
I've cleared my DISCUSS based on the changes to section 4.1. I
think a couple of sentences in the definition of the LEARNING …
[Ballot comment]
I've cleared my DISCUSS based on the changes to section 4.1. I
think a couple of sentences in the definition of the LEARNING state
might benefit from clarification:

        A device or interface in the RA-Guard "Learning" state is
        actively acquiring information about the IPv6 routing devices
        connected.

Append "to its interfaces"?

        The learning process takes place over a pre-defined
        unique period in time, set by manual configuration or it can be
        event triggered.

It's not clear to me whether the event triggering causes the device
to enter or leave the LEARNING state.  That is, does the device
always stay in LEARNING state for a fixed period of time, or can
it stay in LEARNING state either for a fixed period of time or until
some event takes place?

        Once the L2-device has identified through "Learning" the valid
        IPv6 routers and hence also identified the valid RAs, [...]

Would this paragraph be clearer as:

When the L2-device reaches the end of the LEARNING state, it
        has a record of which interfaces are attached to links with
        valid IPv6 routers.  The L2-device transtions each interface
        from "LEARNING" into either BLOCKING state if there was no
        valid IPv6 router discovered at the interface, or transitions
        the interface into FORWARDING state if there was a valid IPv6
        router discovered.

Finally, although the state machine is described earlier in section
4.1 as "global, per-interface, or per-peer", this paragraph implies
that the BLOCKING/FORWARDING state is per-interface.
2010-10-26
08 Ralph Droms
[Ballot comment]
I've cleared my DISCUSS based on the changes to section 4.1. I think a couple of sentences in the definition of the LEARNING …
[Ballot comment]
I've cleared my DISCUSS based on the changes to section 4.1. I think a couple of sentences in the definition of the LEARNING state might benefit from clarification:

        A device or interface in the RA-Guard "Learning" state is
        actively acquiring information about the IPv6 routing devices
        connected.

Append "to its interfaces"?

        The learning process takes place over a pre-defined
        unique period in time, set by manual configuration or it can be
        event triggered.

It's not clear to me whether the event triggering causes the device
to enter or leave the LEARNING state.  That is, does the device
always stay in LEARNING state for a fixed period of time, or can
it stay in LEARNING state either for a fixed period of time or until
some event takes place?

        Once the L2-device has identified through "Learning" the valid
        IPv6 routers and hence also identified the valid RAs, [...]

Would this paragraph be clearer as:

When the L2-device reaches the end of the LEARNING state, it
        has a record of which interfaces are attached to links with
        valid IPv6 routers.  The L2-device transtions each interface
        from "LEARNING" into either BLOCKING state if there was no
        valid IPv6 router discovered at the interface, or transitions
        the interface into FORWARDING state if there was a valid IPv6
        router discovered.

Finally, although the state machine is described earlier in section
4.1 as "global, per-interface, or per-peer", this paragraph implies
that the BLOCKING/FORWARDING state is per-interface.
2010-10-26
08 Ralph Droms [Ballot Position Update] Position for Ralph Droms has been changed to No Objection from Discuss by Ralph Droms
2010-09-08
08 Jari Arkko [Ballot Position Update] Position for Jari Arkko has been changed to No Objection from Discuss by Jari Arkko
2010-09-03
08 Adrian Farrel [Ballot Position Update] Position for Adrian Farrel has been changed to No Objection from Discuss by Adrian Farrel
2010-09-02
08 Tim Polk
[Ballot comment]
I noticed one nit in the new Security Considerations text (Sction 7, first sentence of the second paragraph).  Here is
one possible fix: …
[Ballot comment]
I noticed one nit in the new Security Considerations text (Sction 7, first sentence of the second paragraph).  Here is
one possible fix:

OLD
          in Section 4.1 a simple mechanism to learn dynamical the valid IPv6
  routers connected to a L2-device is explained.
NEW
          In Section 4.1 a simple mechanism to dynamically learn the valid IPv6
  routers connected to a L2-device is explained.
2010-09-02
08 Tim Polk [Ballot Position Update] Position for Tim Polk has been changed to No Objection from Discuss by Tim Polk
2010-09-02
08 (System) New version available: draft-ietf-v6ops-ra-guard-08.txt
2010-09-02
08 (System) Sub state has been changed to AD Follow up from New Id Needed
2010-09-02
07 (System) New version available: draft-ietf-v6ops-ra-guard-07.txt
2010-07-16
08 (System) Removed from agenda for telechat - 2010-07-15
2010-07-15
08 Cindy Morgan State Changes to IESG Evaluation::Revised ID Needed from IESG Evaluation by Cindy Morgan
2010-07-15
08 Jari Arkko
[Ballot comment]
Review by Ari Keränen:

The "RA" abbreviation in the title should be expanded.

According to ID checklist, there should not be citations in …
[Ballot comment]
Review by Ari Keränen:

The "RA" abbreviation in the title should be expanded.

According to ID checklist, there should not be citations in the abstract:
http://www.ietf.org/id-info/checklist.html#anchor6

Overall, I find the abstract somewhat long and hard to read. Having less details and making editorial fixes would be a good idea (e.g., the phrase "End-nodes must be provisioned with certificate anchors." in the middle sounds strange, and probably is not even that relevant). Perhaps the whole first paragraph of the abstract could be removed.


2. Model and Applicability

Figure 1 does not have a caption. Also, the meaning of the diagonal lines and the horizontal line connecting the two diagonal lines was not clear.

SEND is not spelled consistently (sometimes it's "SeND").

  If this node-in-the-middle is a L2 device, it will
  not change the content of the validated RA, and avoid any of the nd-
  proxy pitfalls.

Capitalize "nd" in the "nd-proxy".


4.1. State Machine

It's hard to see when and why would one move to the BLOCKING state in the state machine. Overall, it would be helpful to have some explanation on the transitions instead of just saying that they are "triggered by manual configuration or by meeting a pre-defined criteria".


4.2. SeND-based RA-Guard

Expand abbreviations and add references where needed (e.g., CGA, RSA, CPS, CRL, NTP).

  Bootstrapping issue in this
  case can be resolved by using the configuration method to specify a
  trusted port to a first router, and send-based-ra-guard method on all
  other ports.

"send-based-ra-guard" should be spelled as in the title?


7. Security Considerations

  Once RA-Guard has setup the proper criteria, for example, it
  identified that a port is allowed to receive RAs, or it identified
  legitimate sources of RA, or certificate base, then there is no
  possible instances of accidentlly filtered legitimate RA's assuming
  the RA-Guard filter enforcement follows strictly the RA-Guard
  criteria's.

Typos: accidentlly, RA's, criteria's

Why isn't spoofing of source address and port discussed? After all, in sections 2 and 3 it is mentioned that L2 and L3 addresses can be used for filtering.

Also, it seems that it would be fairly easy to attack against the stateful RA-Guard described in the Section 4.1 by sending valid RAs during the learning period and then switch to rogue RAs.
2010-07-15
08 Jari Arkko
[Ballot discuss]
I like the stateless solution, and it should really come as standard on every switch and router.

I think the stateful 4.2 solution …
[Ballot discuss]
I like the stateless solution, and it should really come as standard on every switch and router.

I think the stateful 4.2 solution is reasonable, but I have doubts about
the 4.1 solution. A simplistic implementation of the Section 4.1 solution
could block a legitimate router that boots later than the switch, for
instance. The document says very little about how to run this solution
in a way that ensures no problems will occur.

Do we really need a medium level, somewhat complex and possibly error
prone solution in addition to the low level simple thing and the fully
fledged (4.2 + SEND) solutions?
2010-07-15
08 Jari Arkko [Ballot Position Update] New position, Discuss, has been recorded by Jari Arkko
2010-07-15
08 Jari Arkko
[Ballot comment]
Review by Ari Keränen:

The "RA" abbreviation in the title should be expanded.

According to ID checklist, there should not be citations in …
[Ballot comment]
Review by Ari Keränen:

The "RA" abbreviation in the title should be expanded.

According to ID checklist, there should not be citations in the abstract:
http://www.ietf.org/id-info/checklist.html#anchor6

Overall, I find the abstract somewhat long and hard to read. Having less details and making editorial fixes would be a good idea (e.g., the phrase "End-nodes must be provisioned with certificate anchors." in the middle sounds strange, and probably is not even that relevant). Perhaps the whole first paragraph of the abstract could be removed.


2. Model and Applicability

Figure 1 does not have a caption. Also, the meaning of the diagonal lines and the horizontal line connecting the two diagonal lines was not clear.

SEND is not spelled consistently (sometimes it's "SeND").

  If this node-in-the-middle is a L2 device, it will
  not change the content of the validated RA, and avoid any of the nd-
  proxy pitfalls.

Capitalize "nd" in the "nd-proxy".


4.1. State Machine

It's hard to see when and why would one move to the BLOCKING state in the state machine. Overall, it would be helpful to have some explanation on the transitions instead of just saying that they are "triggered by manual configuration or by meeting a pre-defined criteria".


4.2. SeND-based RA-Guard

Expand abbreviations and add references where needed (e.g., CGA, RSA, CPS, CRL, NTP).

  Bootstrapping issue in this
  case can be resolved by using the configuration method to specify a
  trusted port to a first router, and send-based-ra-guard method on all
  other ports.

"send-based-ra-guard" should be spelled as in the title?


7. Security Considerations

  Once RA-Guard has setup the proper criteria, for example, it
  identified that a port is allowed to receive RAs, or it identified
  legitimate sources of RA, or certificate base, then there is no
  possible instances of accidentlly filtered legitimate RA's assuming
  the RA-Guard filter enforcement follows strictly the RA-Guard
  criteria's.

Typos: accidentlly, RA's, criteria's

Why isn't spoofing of source address and port discussed? After all, in sections 2 and 3 it is mentioned that L2 and L3 addresses can be used for filtering.

Also, it seems that it would be fairly easy to attack against the stateful RA-Guard described in the Section 4.1 by sending valid RAs during the learning period and then switch to rogue RAs.
2010-07-15
08 Adrian Farrel [Ballot comment]
The RFC Editor will make you remove the citations from the Abstract.
2010-07-15
08 Adrian Farrel
[Ballot discuss]
Have I misunderstood something? This looks like a layer violation. If I understand correctly, a layer 2 device is asked to examine the …
[Ballot discuss]
Have I misunderstood something? This looks like a layer violation. If I understand correctly, a layer 2 device is asked to examine the content of the data it is forwarding in order to provide a filter to remove unwanted RAs. Why is this conseidered acceptable?
2010-07-15
08 Adrian Farrel [Ballot Position Update] New position, Discuss, has been recorded by Adrian Farrel
2010-07-15
08 Gonzalo Camarillo [Ballot Position Update] New position, No Objection, has been recorded by Gonzalo Camarillo
2010-07-15
08 Dan Romascanu [Ballot Position Update] Position for Dan Romascanu has been changed to No Objection from Discuss by Dan Romascanu
2010-07-14
08 Ralph Droms
[Ballot comment]
Style comment - move citation for SeND reference from Abstract to Introduction; give expansion of SeND abbreviation on first reference in both Abstract …
[Ballot comment]
Style comment - move citation for SeND reference from Abstract to Introduction; give expansion of SeND abbreviation on first reference in both Abstract and body of document. As an aside, I see that "SeND" is actually abbreviated "SEND" in the title of RFC 3971 (according to the reference).

Figure 1 isn't actually labeled "Figure 1"; I don't understand the angled lines between the links connecting the hosts and router to the L2 device.

Just to make sure I have the correct understanding, "stateless" RA-guard could also be described as "statically-configured", in which the rules for accepting or dropping RAs are pre-defined.  If I have that right, and it wasn't quite clear to me when I read the description, it might help the reader to add an example of the static rules used in stateless RA-guard.
2010-07-14
08 Ralph Droms
[Ballot discuss]
Following up and supporting Tim's DISCUSS, I found the text in section 4.1 insufficient to understand how the state machine RA-Guard works.  Does …
[Ballot discuss]
Following up and supporting Tim's DISCUSS, I found the text in section 4.1 insufficient to understand how the state machine RA-Guard works.  Does this text:

        The information gathered is compared
        against pre-defined criteria which qualify the validity of the
        RAs.

imply deeper analysis than the rules in stateless RA-Guard?
2010-07-14
08 Ralph Droms [Ballot Position Update] New position, Discuss, has been recorded by Ralph Droms
2010-07-14
08 Ralph Droms
[Ballot comment]
Style comment - move citation for SeND reference from Abstract to Introduction; give expansion of SeND abbreviation on first reference in both Abstract …
[Ballot comment]
Style comment - move citation for SeND reference from Abstract to Introduction; give expansion of SeND abbreviation on first reference in both Abstract and body of document. As an aside, I see that "SeND" is actually abbreviated "SEND" in the title of RFC 3971 (according to the reference).

Figure 1 isn't actually labeled "Figure 1"; I don't understand the angled lines between the links connecting the hosts and router to the L2 device.

Just to make sure I have the correct understanding, "stateless" RA-guard could also be described as "statically-configured", in which the rules for accepting or dropping RAs are pre-defined.  If I have that right, and it wasn't quite clear to me when I read the description, it might help the reader to add an example of the static rules used in stateless RA-guard.
2010-07-14
08 David Harrington [Ballot Position Update] New position, No Objection, has been recorded by David Harrington
2010-07-14
08 Tim Polk
[Ballot discuss]
(1) Has the SAVI wg looked at the SEND-based solution?  It seems reasonably straightforward,
but does overlap.

(2) This may be clear to …
[Ballot discuss]
(1) Has the SAVI wg looked at the SEND-based solution?  It seems reasonably straightforward,
but does overlap.

(2) This may be clear to a reader with expertise in the field, but I found the state machine in
section 4.1 rather confusing.

(a) Transitions between States 2, 3, and 4 are not clear. what are the conditions where
RA Guard should transition from 2 to state 3 or 4?  What about transitions out of state 3 or 4?

(b) Further, State 2 (LEARNING) ends with the following text:

        In this state, the RA-Guard enabled device or interface is
        either blocking all RAs until their validity is verified or,
        alternatively it can temporarily forward the RAs until the
        decision is being made.

Given that State 2 can block or forward RAS, how does LEARNING differ from the
BLOCKING and FORWARDING states?
2010-07-14
08 Sean Turner [Ballot comment]
I support Tim's DISCUSS position.
2010-07-14
08 Sean Turner [Ballot Position Update] New position, No Objection, has been recorded by Sean Turner
2010-07-14
08 Tim Polk [Ballot Position Update] New position, Discuss, has been recorded by Tim Polk
2010-07-14
08 Stewart Bryant [Ballot Position Update] New position, No Objection, has been recorded by Stewart Bryant
2010-07-14
08 Stewart Bryant
[Ballot comment]
Just some minor issues with definition of abbreviations:

"When operating IPv6 in a shared L2 network segment without complete
SeND support by all …
[Ballot comment]
Just some minor issues with definition of abbreviations:

"When operating IPv6 in a shared L2 network segment without complete
SeND support by all devices"

Need a REF to SeND - it is in the Abstract but not in the main body of the doc.

=======

"RA-Guard can be seen as a superset of SEND"
s/SEND/SeND/  ?

=======

In section 4.2

CGA, CPS, CPANTP and CRL all used without expansion or definition

=======
2010-07-14
08 Dan Romascanu
[Ballot discuss]
I have a fundamental qestion concerning the solution proposed by this document. If the RA-Guard mechanism is effective only when all messages between …
[Ballot discuss]
I have a fundamental qestion concerning the solution proposed by this document. If the RA-Guard mechanism is effective only when all messages between IPv6 devices in the target environment traverse controlled L2 networking devices, would not a L2 solution built upon port-access control IEEE 802.1X and MAC Security IEEE 802.1AE be sufficient and the default choice for a network operator?
2010-07-14
08 Dan Romascanu [Ballot Position Update] New position, Discuss, has been recorded by Dan Romascanu
2010-07-13
08 Peter Saint-Andre [Ballot Position Update] New position, No Objection, has been recorded by Peter Saint-Andre
2010-07-13
08 Robert Sparks [Ballot Position Update] New position, No Objection, has been recorded by Robert Sparks
2010-07-12
08 Russ Housley [Ballot comment]
Please consider the editorial comments in the Gen-ART Review by
  Miguel Garcia on 2010-07-12.
2010-07-12
08 Russ Housley [Ballot Position Update] New position, No Objection, has been recorded by Russ Housley
2010-07-12
08 Ron Bonica State Changes to IESG Evaluation from Waiting for AD Go-Ahead by Ron Bonica
2010-07-12
08 (System) State has been changed to Waiting for AD Go-Ahead from In Last Call by system
2010-07-11
08 Alexey Melnikov [Ballot Position Update] New position, No Objection, has been recorded by Alexey Melnikov
2010-07-11
08 Samuel Weiler Request for Telechat review by SECDIR is assigned to Nicolas Williams
2010-07-11
08 Samuel Weiler Request for Telechat review by SECDIR is assigned to Nicolas Williams
2010-07-09
08 Lars Eggert [Ballot Position Update] New position, No Objection, has been recorded by Lars Eggert
2010-07-08
08 Cindy Morgan [Note]: 'Fred Baker (fred@cisco.com) is the document shepherd.' added by Cindy Morgan
2010-07-06
08 Ron Bonica Placed on agenda for telechat - 2010-07-15 by Ron Bonica
2010-07-06
08 Ron Bonica [Note]: 'Fred Baker begin_of_the_skype_highlighting     end_of_the_skype_highlighting begin_of_the_skype_highlighting�����end_of_the_skype_highlighting (fred@cisco.com) is the document shepherd.' added by Ron Bonica
2010-07-06
08 Ron Bonica [Ballot Position Update] New position, Yes, has been recorded for Ronald Bonica
2010-07-06
08 Ron Bonica Ballot has been issued by Ron Bonica
2010-07-06
08 Ron Bonica Created "Approve" ballot
2010-07-01
08 Amanda Baber [Note]: 'Fred Baker begin_of_the_skype_highlighting�����end_of_the_skype_highlighting (fred@cisco.com) is the document shepherd.' added by Amanda Baber
2010-07-01
08 Amanda Baber IANA comments:

As described in the IANA Considerations section, we understand this
document to have NO IANA Actions.
2010-06-28
08 Amy Vezza Last call sent
2010-06-28
08 Amy Vezza State Changes to In Last Call from Last Call Requested by Amy Vezza
2010-06-27
08 Ron Bonica Last Call was requested by Ron Bonica
2010-06-27
08 Ron Bonica State Changes to Last Call Requested from Publication Requested by Ron Bonica
2010-06-27
08 Ron Bonica [Note]: 'Fred Baker begin_of_the_skype_highlighting     end_of_the_skype_highlighting (fred@cisco.com) is the document shepherd.' added by Ron Bonica
2010-06-27
08 (System) Ballot writeup text was added
2010-06-27
08 (System) Last call text was added
2010-06-27
08 (System) Ballot approval text was added
2010-06-21
08 Samuel Weiler Request for Early review by SECDIR Completed. Reviewer: Nicolas Williams.
2010-06-15
06 (System) New version available: draft-ietf-v6ops-ra-guard-06.txt
2010-06-14
08 Cindy Morgan [Note]: 'Fred Baker (fred@cisco.com) is the document shepherd.' added by Cindy Morgan
2010-06-14
08 Cindy Morgan
> (1.a) Who is the Document Shepherd for this document? Has the
> Document Shepherd personally reviewed this version of the
> document and, in …
> (1.a) Who is the Document Shepherd for this document? Has the
> Document Shepherd personally reviewed this version of the
> document and, in particular, does he or she believe this
> version is ready for forwarding to the IESG for publication?

Fred Baker. Yes, I believe that it is ready to move forward.

> (1.b) Has the document had adequate review both from key WG members
> and from key non-WG members? Does the Document Shepherd have
> any concerns about the depth or breadth of the reviews that
> have been performed?

Yes. Working group discussion has not been active, but has supported the document.

> (1.c) Does the Document Shepherd have concerns that the document
> needs more review from a particular or broader perspective,
> e.g., security, operational complexity, someone familiar with
> AAA, internationalization or XML?

I think it would be appropriate to get security and operational review.

> (1.d) Does the Document Shepherd have any specific concerns or
> issues with this document that the Responsible Area Director
> and/or the IESG should be aware of? For example, perhaps he
> or she is uncomfortable with certain parts of the document, or
> has concerns whether there really is a need for it. In any
> event, if the WG has discussed those issues and has indicated
> that it still wishes to advance the document, detail those
> concerns here. Has an IPR disclosure related to this document
> been filed? If so, please include a reference to the
> disclosure and summarize the WG discussion and conclusion on
> this issue.

I think the solution is simple and solid.

> (1.e) How solid is the WG consensus behind this document? Does it
> represent the strong concurrence of a few individuals, with
> others being silent, or does the WG as a whole understand and
> agree with it?

IPv6 Operations is a quiet bunch. The discussion, mostly in IETF meetings, has been to the point and supportive.

> (1.f) Has anyone threatened an appeal or otherwise indicated extreme
> discontent? If so, please summarise the areas of conflict in
> separate email messages to the Responsible Area Director. (It
> should be in a separate email because this questionnaire is
> entered into the ID Tracker.)

No

> (1.g) Has the Document Shepherd personally verified that the
> document satisfies all ID nits? (See the
> Internet-Drafts Checklist
>
> and
> http://tools.ietf.org/tools/idnits/
> ). Boilerplate checks are
> not enough; this check needs to be thorough. Has the document
> met all formal review criteria it needs to, such as the MIB
> Doctor, media type and URI type reviews?

The document contains no formal grammar. The idnits check reports one unused reference, to RFC 4861 "Neighbor Discovery for IP version 6". One could describe the entire document as a reference to that specification...

> (1.h) Has the document split its references into normative and
> informative? Are there normative references to documents that
> are not ready for advancement or are otherwise in an unclear
> state? If such normative references exist, what is the
> strategy for their completion? Are there normative references
> that are downward references, as described in [RFC3967]? If
> so, list these downward references to support the Area
> Director in the Last Call procedure for them [RFC3967].

The references are so divided.

> (1.i) Has the Document Shepherd verified that the document IANA
> consideration section exists and is consistent with the body
> of the document? If the document specifies protocol
> extensions, are reservations requested in appropriate IANA
> registries? Are the IANA registries clearly identified? If
> the document creates a new registry, does it define the
> proposed initial contents of the registry and an allocation
> procedure for future registrations? Does it suggest a
> reasonable name for the new registry? See [RFC5226]. If the
> document describes an Expert Review process has Shepherd
> conferred with the Responsible Area Director so that the IESG
> can appoint the needed Expert during the IESG Evaluation?

There are no extra IANA consideration for this document, and section 6 says as much.

> (1.j) Has the Document Shepherd verified that sections of the
> document that are written in a formal language, such as XML
> code, BNF rules, MIB definitions, etc., validate correctly in
> an automated checker?

There is no formal grammar in this document.

> (1.k) The IESG approval announcement includes a Document
> Announcement Write-Up. Please provide such a Document
> Announcement Write-Up? Recent examples can be found in the
> "Action" announcements for approved documents. The approval
> announcement contains the following sections:
>
> Technical Summary

It is particularly easy to experience "rogue" routers on an unsecured link [reference4]. Devices acting as a rougue router may send illegitimate RAs. Section 6 of SeND [RFC3971] provides a full solution to this problem, by enabling routers certification. This solution does, however, require all nodes on an L2 network segment to support SeND, as well as it carries some deployment challenges. End- nodes must be provisioned with certificate anchors. The solution works better when end-nodes have access to a Certificate Revocation List server, and to a Network Time Protocol server, both typically off-link, which brings some bootstrap issues.

When using IPv6 within a single L2 network segment it is possible and sometimes desirable to enable layer 2 devices to drop rogue RAs before they reach end-nodes. In order to distinguish valid from rogue RAs, the L2 devices can use a spectrum of criterias, from a static scheme that blocks RAs received on un-trusted ports, or from un-trusted sources, to a more dynamic scheme that uses SeND to challenge RA sources.

This document reviews various techniques applicable on the L2 devices to reduce the threat of rogue RAs.

> Working Group Summary

Working group discussion was generally supportive.

> Document Quality

The document is generally clear and concise.
2010-06-14
08 Cindy Morgan Draft Added by Cindy Morgan in state Publication Requested
2010-05-31
05 (System) New version available: draft-ietf-v6ops-ra-guard-05.txt
2009-11-28
04 (System) New version available: draft-ietf-v6ops-ra-guard-04.txt
2009-05-28
03 (System) New version available: draft-ietf-v6ops-ra-guard-03.txt
2009-04-16
(System) Posted related IPR disclosure: Cisco System's Statement of IPR related to draft-ietf-v6ops-ra-guard-02
2009-03-05
02 (System) New version available: draft-ietf-v6ops-ra-guard-02.txt
2008-09-10
01 (System) New version available: draft-ietf-v6ops-ra-guard-01.txt
2008-08-06
08 Samuel Weiler Request for Early review by SECDIR is assigned to Nicolas Williams
2008-08-06
08 Samuel Weiler Request for Early review by SECDIR is assigned to Nicolas Williams
2008-07-01
00 (System) New version available: draft-ietf-v6ops-ra-guard-00.txt