Too-frequent change of privacy address / ND monitoring
Tim Chown
tjc at ecs.soton.ac.uk
Wed Mar 27 12:22:46 CET 2013
On 27 Mar 2013, at 08:16, Marco Sommani <marco.sommani at cnr.it> wrote:
> On 27/mar/2013, at 08:47, Erik Kline <ek at google.com> wrote:
>
>> On 27 March 2013 16:31, Fernando Gont <fernando at gont.com.ar> wrote:
>>> On 03/26/2013 09:29 AM, Marco Sommani wrote:
>>> > Phil,
>>> >
>>> > when everything works according to standards, temporary addresses are
>>> > regenerated just before the preferred lifetime times out, so you have
>>> > the possibility to alter the frequency of renewals by changing the
>>> > preferred-lifetime of the prefix in the Router-Advertisements.
>>>
>>> Privacy addresses will very likely regenerate before such timer expires.
>>> -- Actually, such timer shouldn't expire if you continue receiving RAs...
>>
>> I have in the past seen firewalls that dropped some critical packets but allowed others through (in one case: RS/RA were fine but ND was filtered, which led to IPv4 working in 3 second spurts, i.e. until NUD kicked in).
>>
>> Totally random crazy idea: could there be firewalls on some of these machines that are causing multicast RAs to be filtered but unicast RAs are fine (e.g. a unicast RA reply to an RS)? It could cause a machine to think the network went away after a unicast RA response, re-issue an RS and create a new tempaddr after the "new" unicast RA arrives.
>
>
> From my experience: I don't know about firewalls, but loss of multicast RAs sometimes is coaused by buggy implementations of igmp-snooping or mld-snooping on Ethernet switches. I have encountered some switches where igmp-sooping blocked all L2 multicasts with destination 33:33:xx:xx:xx:xx.
>
> More recently, I have found switches where mld-snooping blocks all IPv6 multicasts directed to ff02::1. I presume that the implementors did not know that mld-registers are not required for that particular group. As a turn-around, I had to enable explicitly group ff02::1 on all ports via manual configuration.
Or quirky 'first hop security' implementations.
Tim
>
-------------- next part --------------
An HTML attachment was scrubbed...
URL: <https://lists.cluenet.de/pipermail/ipv6-ops/attachments/20130327/ddd6e0d7/attachment.htm>
More information about the ipv6-ops
mailing list