diff options
Diffstat (limited to 'doc/rfc/rfc8978.txt')
-rw-r--r-- | doc/rfc/rfc8978.txt | 629 |
1 files changed, 629 insertions, 0 deletions
diff --git a/doc/rfc/rfc8978.txt b/doc/rfc/rfc8978.txt new file mode 100644 index 0000000..7d19466 --- /dev/null +++ b/doc/rfc/rfc8978.txt @@ -0,0 +1,629 @@ + + + + +Internet Engineering Task Force (IETF) F. Gont +Request for Comments: 8978 SI6 Networks +Category: Informational J. Žorž +ISSN: 2070-1721 6connect + R. Patterson + Sky UK + March 2021 + + + Reaction of IPv6 Stateless Address Autoconfiguration (SLAAC) to Flash- + Renumbering Events + +Abstract + + In scenarios where network configuration information related to IPv6 + prefixes becomes invalid without any explicit and reliable signaling + of that condition (such as when a Customer Edge router crashes and + reboots without knowledge of the previously employed prefixes), hosts + on the local network may continue using stale prefixes for an + unacceptably long time (on the order of several days), thus resulting + in connectivity problems. This document describes this issue and + discusses operational workarounds that may help to improve network + robustness. Additionally, it highlights areas where further work may + be needed. + +Status of This Memo + + This document is not an Internet Standards Track specification; it is + published for informational purposes. + + This document is a product of the Internet Engineering Task Force + (IETF). It represents the consensus of the IETF community. It has + received public review and has been approved for publication by the + Internet Engineering Steering Group (IESG). Not all documents + approved by the IESG are candidates for any level of Internet + Standard; see Section 2 of RFC 7841. + + Information about the current status of this document, any errata, + and how to provide feedback on it may be obtained at + https://www.rfc-editor.org/info/rfc8978. + +Copyright Notice + + Copyright (c) 2021 IETF Trust and the persons identified as the + document authors. All rights reserved. + + This document is subject to BCP 78 and the IETF Trust's Legal + Provisions Relating to IETF Documents + (https://trustee.ietf.org/license-info) in effect on the date of + publication of this document. Please review these documents + carefully, as they describe your rights and restrictions with respect + to this document. Code Components extracted from this document must + include Simplified BSD License text as described in Section 4.e of + the Trust Legal Provisions and are provided without warranty as + described in the Simplified BSD License. + +Table of Contents + + 1. Introduction + 2. Analysis of the Problem + 2.1. Use of Dynamic Prefixes + 2.2. Default PIO Lifetime Values in IPv6 Stateless Address + Autoconfiguration (SLAAC) + 2.3. Recovering from Stale Network Configuration Information + 2.4. Lack of Explicit Signaling about Stale Information + 2.5. Interaction between DHCPv6-PD and SLAAC + 3. Operational Mitigations + 3.1. Stable Prefixes + 3.2. SLAAC Parameter Tweaking + 4. Future Work + 5. IANA Considerations + 6. Security Considerations + 7. References + 7.1. Normative References + 7.2. Informative References + Acknowledgments + Authors' Addresses + +1. Introduction + + IPv6 Stateless Address Autoconfiguration (SLAAC) [RFC4862] conveys + information about prefixes to be employed for address configuration + via Prefix Information Options (PIOs) sent in Router Advertisement + (RA) messages. IPv6 largely assumes prefix stability, with network + renumbering only taking place in a planned manner: old prefixes are + deprecated (and eventually invalidated) via reduced prefix lifetimes + and new prefixes are introduced (with longer lifetimes) at the same + time. However, there are several scenarios that may lead to the so- + called "flash-renumbering" events, where a prefix employed by a + network suddenly becomes invalid and replaced by a new prefix. In + some of these scenarios, the local router producing the network + renumbering event may try to deprecate (and eventually invalidate) + the currently employed prefix (by explicitly signaling the network + about the renumbering event), whereas in other scenarios, it may be + unable to do so. + + In scenarios where network configuration information related to IPv6 + prefixes becomes invalid without any explicit and reliable signaling + of that condition, hosts on the local network may continue using + stale prefixes for an unacceptably long period of time, thus + resulting in connectivity problems. + + Scenarios where this problem may arise include, but are not limited + to, the following: + + * The most common IPv6 deployment scenario for residential or small + office networks, where a Customer Edge (CE) router employs DHCPv6 + Prefix Delegation (DHCPv6-PD) [RFC8415] to request a prefix from + an Internet Service Provider (ISP), and a sub-prefix of the leased + prefix is advertised on the LAN side of the CE router via + Stateless Address Autoconfiguration (SLAAC) [RFC4862]. In + scenarios where the CE router crashes and reboots, the CE router + may obtain (via DHCPv6-PD) a different prefix from the one + previously leased and therefore advertise (via SLAAC) a new sub- + prefix on the LAN side. Hosts will typically configure addresses + for the new sub-prefix but will also normally retain and may + actively employ the addresses configured for the previously + advertised sub-prefix, since their associated Preferred Lifetime + and Valid Lifetime allow them to do so. + + * A router (e.g., Customer Edge router) advertises autoconfiguration + prefixes (corresponding to prefixes learned via DHCPv6-PD) with + constant PIO lifetimes that are not synchronized with the + DHCPv6-PD lease time (even though Section 6.3 of [RFC8415] + requires such synchronization). While this behavior violates the + aforementioned requirement from [RFC8415], it is not an unusual + behavior. For example, this is particularly true for + implementations in which DHCPv6-PD is implemented in a different + software module than SLAAC. + + * A switch-port that a host is connected to is moved to another + subnet (VLAN) as a result of manual switch-port reconfiguration or + 802.1x reauthentication. There has been evidence that some 802.1x + supplicants do not reset network settings after successful 802.1x + authentication. If a host fails 802.1x authentication for some + reason, it may be placed in a "quarantine" VLAN; if successfully + authenticated later on, the host may end up having IPv6 addresses + from both the old ("quarantine") and new VLANs. + + * During a planned network renumbering event, a router is configured + to send an RA including a Prefix Information Option (PIO) for the + "old" prefix with the Preferred Lifetime set to zero and the Valid + Lifetime set to a small value, as well as a PIO for the new prefix + with default lifetimes. However, due to unsolicited RAs being + sent to a multicast destination address, and multicast being + rather unreliable on busy Wi-Fi networks, the RA might not be + received by local hosts. + + * An automated device config management system performs periodic + config pushes to network devices. In these scenarios, network + devices may simply immediately forget their previous + configuration, rather than withdraw it gracefully. If such a push + results in changing the prefix configured on a particular subnet, + hosts attached to that subnet might not get notified about the + prefix change, and their addresses from the "old" prefix might not + be deprecated (and eventually invalidated) in a timely manner. A + related scenario is an incorrect network renumbering event, where + a network administrator renumbers a network by simply removing the + "old" prefix from the configuration and configuring a new prefix + instead. + + Lacking any explicit and reliable signaling to deprecate (and + eventually invalidate) the stale prefixes, hosts may continue to + employ the previously configured addresses, which will typically + result in packets being filtered or blackholed either on the CE + router or within the ISP network. + + The default values for the Preferred Lifetime and Valid Lifetime of + PIOs specified in [RFC4861] mean that, in the aforementioned + scenarios, the stale addresses would be retained and could be + actively employed for new communication instances for an unacceptably + long period of time (one month and one week, respectively). This + could lead to interoperability problems, instead of hosts + transitioning to the newly advertised prefix(es) in a more timely + manner. + + Some devices have implemented ad hoc mechanisms to address this + problem, such as sending RAs to deprecate (and eventually invalidate) + apparently stale prefixes when the device receives any packets + employing a source address from a prefix not currently advertised for + address configuration on the local network [FRITZ]. However, this + may introduce other interoperability problems, particularly in + multihomed/multi-prefix scenarios. This is a clear indication that + advice in this area is warranted. + + Unresponsiveness to these flash-renumbering events is caused by the + inability of the network to deprecate (and eventually invalidate) + stale information as well as by the inability of hosts to react to + network configuration changes in a more timely manner. Clearly, it + would be desirable that these flash-renumbering events do not occur + and that, when they do occur, hosts are explicitly and reliably + notified of their occurrence. However, for robustness reasons, it is + paramount for hosts to be able to recover from stale configuration + information even when these flash-renumbering events occur and the + network is unable to explicitly and reliably notify hosts about such + conditions. + + Section 2 analyzes this problem in more detail. Section 3 describes + possible operational mitigations. Section 4 describes possible + future work to mitigate the aforementioned problem. + +2. Analysis of the Problem + + As noted in Section 1, the problem discussed in this document is + exacerbated by the default values of some protocol parameters and + other factors. The following sections analyze each of them in + detail. + +2.1. Use of Dynamic Prefixes + + In network scenarios where dynamic prefixes are employed, renumbering + events lead to updated network configuration information being + propagated through the network, such that the renumbering events are + gracefully handled. However, if the renumbering event happens along + with, e.g., loss of configuration state by some of the devices + involved in the renumbering procedure (e.g., a router crashes, + reboots, and gets leased a new prefix), this may result in a flash- + renumbering event, where new prefixes are introduced without properly + phasing out the old ones. + + In simple residential or small office scenarios, the problem + discussed in this document would be avoided if DHCPv6-PD leased + "stable" prefixes. However, a recent survey [UK-NOF] indicates that + 37% of the responding ISPs employ dynamic IPv6 prefixes. That is, + dynamic IPv6 prefixes are an operational reality. + + Deployment reality aside, there are a number of possible issues + associated with stable prefixes: + + * Provisioning systems may be unable to deliver stable IPv6 + prefixes. + + * While an ISP might lease stable prefixes to the home or small + office, the Customer Edge router might in turn lease sub-prefixes + of these prefixes to other internal network devices. Unless the + associated lease databases are stored on non-volatile memory, + these internal devices might get leased dynamic sub-prefixes of + the stable prefix leased by the ISP. In other words, every time a + prefix is leased, there is the potential for the resulting + prefixes to become dynamic, even if the device leasing sub- + prefixes has been leased a stable prefix by its upstream router. + + * While there is a range of information that may be employed to + correlate network activity [RFC7721], the use of stable prefixes + clearly simplifies network activity correlation and may reduce the + effectiveness of "temporary addresses" [RFC8981]. + + * There might be existing advice for ISPs to deliver dynamic IPv6 + prefixes *by default* (e.g., see [GERMAN-DP]) over privacy + concerns associated with stable prefixes. + + * There might be scalability and performance drawbacks of either a + disaggregated distributed routing topology or a centralized + topology, which are often required to provide stable prefixes, + i.e., distributing more-specific routes or summarizing routes at + centralized locations. + + For a number of reasons (such as the ones stated above), IPv6 + deployments might employ dynamic prefixes (even at the expense of the + issues discussed in this document), and there might be scenarios in + which the dynamics of a network are such that the network exhibits + the behavior of dynamic prefixes. Rather than trying to regulate how + operators may run their networks, this document aims at improving + network robustness in the deployed Internet. + +2.2. Default PIO Lifetime Values in IPv6 Stateless Address + Autoconfiguration (SLAAC) + + The impact of the issue discussed in this document is a function of + the lifetime values employed for PIOs, since these values determine + for how long the corresponding addresses will be preferred and + considered valid. Thus, when the problem discussed in this document + is experienced, the longer the PIO lifetimes, the higher the impact. + + [RFC4861] specifies the following default PIO lifetime values: + + * Preferred Lifetime (AdvPreferredLifetime): 604800 seconds (7 days) + + * Valid Lifetime (AdvValidLifetime): 2592000 seconds (30 days) + + Under problematic circumstances, such as when the corresponding + network information has become stale without any explicit and + reliable signal from the network (as described in Section 1), it + could take hosts up to 7 days (one week) to deprecate the + corresponding addresses and up to 30 days (one month) to eventually + invalidate and remove any addresses configured for the stale prefix. + This means that it will typically take hosts an unacceptably long + period of time (on the order of several days) to recover from these + scenarios. + +2.3. Recovering from Stale Network Configuration Information + + SLAAC hosts are unable to recover from stale network configuration + information, since: + + * In scenarios where SLAAC routers explicitly signal the renumbering + event, hosts will typically deprecate, but not invalidate, the + stale addresses, since item "e)" of Section 5.5.3 of [RFC4862] + specifies that an unauthenticated RA may never reduce the valid + lifetime of an address to less than two hours. Communication with + the new "users" of the stale prefix will not be possible, since + the stale prefix will still be considered "on-link" by the local + hosts. + + * In the absence of explicit signaling from SLAAC routers, SLAAC + hosts will typically fail to recover from stale configuration + information in a timely manner, since hosts would need to rely on + the last Preferred Lifetime and Valid Lifetime advertised for the + stale prefix, for the corresponding addresses to become deprecated + and subsequently invalidated. Please see Section 2.2 of this + document for a discussion of the default PIO lifetime values. + +2.4. Lack of Explicit Signaling about Stale Information + + Whenever prefix information has changed, a SLAAC router should + advertise not only the new information but also the stale information + with appropriate lifetime values (both the Preferred Lifetime and the + Valid Lifetime set to 0). This would provide explicit signaling to + SLAAC hosts to remove the stale information (including configured + addresses and routes). However, in certain scenarios, such as when a + CE router crashes and reboots, the CE router may have no knowledge + about the previously advertised prefixes and thus might be unable to + advertise them with appropriate lifetimes (in order to deprecate and + eventually invalidate them). + + In any case, we note that, as discussed in Section 2.3, PIOs with + small Valid Lifetimes in unauthenticated RAs will not lower the Valid + Lifetime to any value shorter than two hours (as per [RFC4862]). + Therefore, even if a SLAAC router tried to explicitly signal the + network about the stale configuration information via unauthenticated + RAs, implementations compliant with [RFC4862] would deprecate the + corresponding prefixes but would fail to invalidate them. + + | NOTE: + | + | Some implementations have been updated to honor small PIO + | lifetimes values, as proposed in [RENUM-RXN]. For example, + | please see [Linux-update]. + +2.5. Interaction between DHCPv6-PD and SLAAC + + While DHCPv6-PD is normally employed along with SLAAC, the + interaction between the two protocols is largely unspecified. Not + unusually, the two protocols are implemented in two different + software components, with the interface between the two implemented + by means of some sort of script that feeds the SLAAC implementation + with values learned from DHCPv6-PD. + + At times, the prefix lease time is fed as a constant value to the + SLAAC router implementation, meaning that, eventually, the prefix + lifetimes advertised on the LAN side will span *past* the DHCPv6-PD + lease time. This is clearly incorrect, since the SLAAC router + implementation would be allowing the use of such prefixes for a + period of time that is longer than the one they have been leased for + via DHCPv6-PD. + +3. Operational Mitigations + + The following subsections discuss possible operational workarounds + for the aforementioned problems. + +3.1. Stable Prefixes + + As noted in Section 2.1, the use of stable prefixes would eliminate + the issue in *some* of the scenarios discussed in Section 1 of this + document, such as the typical home network deployment. However, as + noted in Section 2.1, there might be reasons for which an + administrator may want or may need to employ dynamic prefixes. + +3.2. SLAAC Parameter Tweaking + + An operator may wish to override some SLAAC parameters such that, + under normal circumstances, the associated timers will be refreshed/ + reset, but in the presence of network faults (such as the one + discussed in this document), the associated timers go off and trigger + some fault recovering action (e.g., deprecate and eventually + invalidate stale addresses). + + The following router configuration variables from [RFC4861] + (corresponding to the "lifetime" parameters of PIOs) could be + overridden as follows: + + * AdvPreferredLifetime: 2700 seconds (45 minutes) + + * AdvValidLifetime: 5400 seconds (90 minutes) + + | NOTES: + | + | The aforementioned values for AdvPreferredLifetime and + | AdvValidLifetime are expected to be appropriate for most + | networks. In some networks, particularly those where the + | operator has complete control of prefix allocation and where + | hosts on the network may spend long periods of time sleeping + | (e.g., sensors with limited battery), longer values may be + | appropriate. + | + | A CE router advertising a sub-prefix of a prefix leased via + | DHCPv6-PD will periodically refresh the Preferred Lifetime and + | the Valid Lifetime of an advertised prefix to + | AdvPreferredLifetime and AdvValidLifetime, respectively, as + | long as the resulting lifetimes of the corresponding prefixes + | do not extend past the DHCPv6-PD lease time [RENUM-CPE]. + + RATIONALE: + + * In the context of [RFC8028], where it is clear that use of + addresses configured for a given prefix is tied to using the next- + hop router that advertised the prefix, it does not make sense for + the Preferred Lifetime of a PIO to be larger than the Router + Lifetime (AdvDefaultLifetime) of the corresponding Router + Advertisement messages. The Valid Lifetime is set to a larger + value to cope with transient network problems. + + * Lacking RAs that refresh information, addresses configured for + advertised prefixes become deprecated in a more timely manner; + therefore, Rule 3 of [RFC6724] causes other configured addresses + (if available) to be used instead. + + * Reducing the Valid Lifetime of PIOs helps reduce the amount of + time a host may maintain stale information and the amount of time + an advertising router would need to advertise stale prefixes to + invalidate them. Reducing the Preferred Lifetime of PIOs helps + reduce the amount of time it takes for a host to prefer other + working prefixes (see Section 12 of [RFC4861]). However, we note + that while the values suggested in this section are an improvement + over the default values specified in [RFC4861], they represent a + trade-off among a number of factors, including responsiveness, + possible impact on the battery life of connected devices + [RFC7772], etc. Thus, they may or may not provide sufficient + mitigation to the problem discussed in this document. + +4. Future Work + + Improvements in Customer Edge routers [RFC7084], such that they can + signal hosts about stale prefixes to deprecate (and eventually + invalidate) them accordingly, can help mitigate the problem discussed + in this document for the "home network" scenario. Such work is + currently being pursued in [RENUM-CPE]. + + Improvements in the SLAAC protocol [RFC4862] and some IPv6-related + algorithms, such as "Default Address Selection for Internet Protocol + Version 6 (IPv6)" [RFC6724], would help improve network robustness. + Such work is currently being pursued in [RENUM-RXN]. + + The aforementioned work is considered out of the scope of this + present document, which only focuses on documenting the problem and + discussing operational mitigations. + +5. IANA Considerations + + This document has no IANA actions. + +6. Security Considerations + + This document discusses a problem that may arise in scenarios where + flash-renumbering events occur and proposes workarounds to mitigate + the aforementioned problem. This document does not introduce any new + security issues; therefore, the same security considerations as for + [RFC4861] and [RFC4862] apply. + +7. References + +7.1. Normative References + + [RFC4861] Narten, T., Nordmark, E., Simpson, W., and H. Soliman, + "Neighbor Discovery for IP version 6 (IPv6)", RFC 4861, + DOI 10.17487/RFC4861, September 2007, + <https://www.rfc-editor.org/info/rfc4861>. + + [RFC4862] Thomson, S., Narten, T., and T. Jinmei, "IPv6 Stateless + Address Autoconfiguration", RFC 4862, + DOI 10.17487/RFC4862, September 2007, + <https://www.rfc-editor.org/info/rfc4862>. + + [RFC6724] Thaler, D., Ed., Draves, R., Matsumoto, A., and T. Chown, + "Default Address Selection for Internet Protocol Version 6 + (IPv6)", RFC 6724, DOI 10.17487/RFC6724, September 2012, + <https://www.rfc-editor.org/info/rfc6724>. + + [RFC8028] Baker, F. and B. Carpenter, "First-Hop Router Selection by + Hosts in a Multi-Prefix Network", RFC 8028, + DOI 10.17487/RFC8028, November 2016, + <https://www.rfc-editor.org/info/rfc8028>. + + [RFC8415] Mrugalski, T., Siodelski, M., Volz, B., Yourtchenko, A., + Richardson, M., Jiang, S., Lemon, T., and T. Winters, + "Dynamic Host Configuration Protocol for IPv6 (DHCPv6)", + RFC 8415, DOI 10.17487/RFC8415, November 2018, + <https://www.rfc-editor.org/info/rfc8415>. + +7.2. Informative References + + [DEFAULT-ADDR] + Linkova, J., "Default Address Selection and Subnet + Renumbering", Work in Progress, Internet-Draft, draft- + linkova-6man-default-addr-selection-update-00, 30 March + 2017, <https://tools.ietf.org/html/draft-linkova-6man- + default-addr-selection-update-00>. + + [FRITZ] Gont, F., "Quiz: Weird IPv6 Traffic on the Local Network + (updated with solution)", SI6 Networks, February 2016, + <https://www.si6networks.com/2016/02/16/quiz-weird-ipv6- + traffic-on-the-local-network-updated-with-solution/>. + + [GERMAN-DP] + BFDI, "Einführung von IPv6: Hinweise für Provider im + Privatkundengeschäft und Hersteller" [Introduction of + IPv6: Notes for providers in the consumer market and + manufacturers], Entschliessung der 84. Konferenz der + Datenschutzbeauftragten des Bundes und der Lander + [Resolution of the 84th Conference of the Federal and + State Commissioners for Data Protection], November 2012, + <http://www.bfdi.bund.de/SharedDocs/Publikationen/ + Entschliessungssammlung/DSBundLaender/84DSK_EinfuehrungIPv + 6.pdf?__blob=publicationFile>. + + [Linux-update] + Gont, F., "Subject: [net-next] ipv6: Honor all IPv6 PIO + Valid Lifetime values", message to the netdev mailing + list, 19 April 2020, + <https://patchwork.ozlabs.org/project/netdev/ + patch/20200419122457.GA971@archlinux- + current.localdomain/>. + + [RENUM-CPE] + Gont, F., Zorz, J., Patterson, R., and B. Volz, "Improving + the Reaction of Customer Edge Routers to IPv6 Renumbering + Events", Work in Progress, Internet-Draft, draft-ietf- + v6ops-cpe-slaac-renum-07, 16 February 2021, + <https://tools.ietf.org/html/draft-ietf-v6ops-cpe-slaac- + renum-07>. + + [RENUM-RXN] + Gont, F., Zorz, J., and R. Patterson, "Improving the + Robustness of Stateless Address Autoconfiguration (SLAAC) + to Flash Renumbering Events", Work in Progress, Internet- + Draft, draft-ietf-6man-slaac-renum-02, 19 January 2021, + <https://tools.ietf.org/html/draft-ietf-6man-slaac-renum- + 02>. + + [RFC7084] Singh, H., Beebee, W., Donley, C., and B. Stark, "Basic + Requirements for IPv6 Customer Edge Routers", RFC 7084, + DOI 10.17487/RFC7084, November 2013, + <https://www.rfc-editor.org/info/rfc7084>. + + [RFC7721] Cooper, A., Gont, F., and D. Thaler, "Security and Privacy + Considerations for IPv6 Address Generation Mechanisms", + RFC 7721, DOI 10.17487/RFC7721, March 2016, + <https://www.rfc-editor.org/info/rfc7721>. + + [RFC7772] Yourtchenko, A. and L. Colitti, "Reducing Energy + Consumption of Router Advertisements", BCP 202, RFC 7772, + DOI 10.17487/RFC7772, February 2016, + <https://www.rfc-editor.org/info/rfc7772>. + + [RFC8981] Gont, F., Krishnan, S., Narten, T., and R. Draves, + "Temporary Address Extensions for Stateless Address + Autoconfiguration in IPv6", RFC 8981, + DOI 10.17487/RFC8981, February 2021, + <https://www.rfc-editor.org/info/rfc8981>. + + [RIPE-690] Žorž, J., Steffann, S., Dražumerič, P., Townsley, M., + Alston, A., Doering, G., Palet Martinez, J., Linkova, J., + Balbinot, L., Meynell, K., and L. Howard, "Best Current + Operational Practice for Operators: IPv6 prefix assignment + for end-users - persistent vs non-persistent, and what + size to choose", RIPE 690, October 2017, + <https://www.ripe.net/publications/docs/ripe-690>. + + [UK-NOF] Palet Martinez, J., "IPv6 Deployment Survey and BCOP", UK + NOF 39, January 2018, + <https://indico.uknof.org.uk/event/41/contributions/542/>. + +Acknowledgments + + The authors would like to thank (in alphabetical order) Brian + Carpenter, Alissa Cooper, Roman Danyliw, Owen DeLong, Martin Duke, + Guillermo Gont, Philip Homburg, Sheng Jiang, Benjamin Kaduk, Erik + Kline, Murray Kucherawy, Warren Kumari, Ted Lemon, Juergen + Schoenwaelder, Éric Vyncke, Klaas Wierenga, Robert Wilton, and Dale + Worley for providing valuable comments on earlier draft versions of + this document. + + The authors would like to thank (in alphabetical order) Mikael + Abrahamsson, Luis Balbinot, Brian Carpenter, Tassos Chatzithomaoglou, + Uesley Correa, Owen DeLong, Gert Doering, Martin Duke, Fernando + Frediani, Steinar Haug, Nick Hilliard, Philip Homburg, Lee Howard, + Christian Huitema, Ted Lemon, Albert Manfredi, Jordi Palet Martinez, + Michael Richardson, Mark Smith, Tarko Tikan, and Ole Troan for + providing valuable comments on a previous document on which this + document is based. + + Fernando would like to thank Alejandro D'Egidio and Sander Steffann + for a discussion of these issues. Fernando would also like to thank + Brian Carpenter who, over the years, has answered many questions and + provided valuable comments that have benefited his protocol-related + work. + + The problem discussed in this document has been previously documented + by Jen Linkova in [DEFAULT-ADDR] and also in [RIPE-690]. Section 1 + borrows text from [DEFAULT-ADDR], authored by Jen Linkova. + +Authors' Addresses + + Fernando Gont + SI6 Networks + Segurola y Habana 4310, 7mo Piso + Villa Devoto + Ciudad Autónoma de Buenos Aires + Argentina + + Email: fgont@si6networks.com + URI: https://www.si6networks.com + + + Jan Žorž + 6connect, Inc. + + Email: jan@6connect.com + + + Richard Patterson + Sky UK + + Email: richard.patterson@sky.uk |