| RFC 8929 | IPv6 Backbone Router | November 2020 |
| Thubert, et al. | Standards Track | [Page] |
This document updates RFCs 6775 and 8505 in order to enable proxy services for IPv6 Neighbor Discovery by Routing Registrars called "Backbone Routers". Backbone Routers are placed along the wireless edge of a backbone and federate multiple wireless links to form a single Multi-Link Subnet (MLSN).¶
This is an Internet Standards Track document.¶
This document is a product of the Internet Engineering Task Force (IETF). It represents the consensus of the IETF community. It has received public review and has been approved for publication by the Internet Engineering Steering Group (IESG). Further information on Internet Standards is available in Section 2 of RFC 7841.¶
Information about the current status of this document, any errata, and how to provide feedback on it may be obtained athttps://www.rfc-editor.org/info/rfc8929.¶
Copyright (c) 2020 IETF Trust and the persons identified as the document authors. All rights reserved.¶
This document is subject to BCP 78 and the IETF Trust's Legal Provisions Relating to IETF Documents (https://trustee.ietf.org/license-info) in effect on the date of publication of this document. Please review these documents carefully, as they describe your rights and restrictions with respect to this document. Code Components extracted from this document must include Simplified BSD License text as described in Section 4.e of the Trust Legal Provisions and are provided without warranty as described in the Simplified BSD License.¶
Ethernet bridging per IEEE Std 802.1[IEEEstd8021Q] provides an efficient and reliable broadcast service for wired networks; applications and protocols have been built that heavily depend on that feature for their core operation. Unfortunately, Low-Power and Lossy Networks (LLNs) and local wireless networks generally do not provide the broadcast capabilities of Ethernet bridging in an economical fashion.¶
As a result, protocols designed for bridged networks that rely on multicast and broadcast often exhibit disappointing behaviors when employed unmodified on a local wireless medium (see[MCAST-PROBLEMS]).¶
Wi-Fi[IEEEstd80211] Access Points (APs) deployed in an Extended Service Set (ESS) act as Ethernet bridges[IEEEstd8021Q], with the property that the bridging state is established at the time of association. This ensures connectivity to the end node (the Wi-Fi Station (STA)) and protects the wireless medium against broadcast-intensive transparent bridging[IEEEstd8021Q] reactive lookups. In other words, the association process is used to register the link-layer address of the STA to the AP. The AP subsequently proxies the bridging operation and does not need to forward the broadcast lookups over the radio.¶
In the same way as transparent bridging, the IPv6[RFC8200] Neighbor Discovery (IPv6 ND) protocol[RFC4861][RFC4862] is a reactive protocol, based on multicast transmissions to locate an on-link correspondent and ensure the uniqueness of an IPv6 address. The mechanism for Duplicate Address Detection (DAD)[RFC4862] was designed for the efficient broadcast operation of Ethernet bridging. Since broadcast can be unreliable over wireless media, DAD often fails to discover duplications[DAD-ISSUES]. In practice, the fact that IPv6 addresses very rarely conflict is mostly attributable to the entropy of the 64-bit Interface IDs as opposed to the successful operation of the IPv6 ND DAD and resolution mechanisms.¶
The IPv6 ND Neighbor Solicitation (NS)[RFC4861] message is used for DAD and address lookup when a node moves or wakes up and reconnects to the wireless network. The NS message is targeted to a Solicited-Node Multicast Address (SNMA)[RFC4291] and should, in theory, only reach a very small group of nodes. But, in reality, IPv6 multicast messages are typically broadcast on the wireless medium, so they are processed by most of the wireless nodes over the subnet (e.g., the ESS fabric) regardless of how few of the nodes are subscribed to the SNMA. As a result, IPv6 ND address lookups and DADs over a large wireless network and/or LLN can consume enough bandwidth to cause a substantial degradation to the unicast traffic service.¶
Because IPv6 ND messages sent to the SNMA group are broadcast at the radio link layer, wireless nodes that do not belong to the SNMA group still have to keep their radio turned on to listen to multicast NS messages, which is a waste of energy for them. In order to reduce their power consumption, certain battery-operated devices such as Internet of Things (IoT) sensors and smartphones ignore some of the broadcasts, making IPv6 ND operations even less reliable.¶
These problems can be alleviated by reducing the IPv6 ND broadcasts over wireless access links. This has been done by splitting the broadcast domains and routing between subnets. At the extreme, this can be done by assigning a /64 prefix to each wireless node (see[RFC8273]). But deploying a single large subnet can still be attractive to avoid renumbering in situations that involve large numbers of devices and mobility within a bounded area.¶
A way to reduce the propagation of IPv6 ND broadcast in the wireless domain while preserving a large single subnet is to form a Multi-Link Subnet (MLSN). Each link in the MLSN, including the backbone, is its own broadcast domain. A key property of MLSNs is that link-local unicast traffic, link-scope multicast, and traffic with a hop limit of 1 will not transit to nodes in the same subnet on a different link, which is something that may produce unexpected behavior in software that expects a subnet to be entirely contained within a single link.¶
This specification considers a special type of MLSN with a central backbone that federates edge (LLN) links, with each link providing its own protection against rogue access and tempering or replaying packets. In particular, the use of classical IPv6 ND on the backbone requires that the all nodes are trusted and that rogue access to the backbone is prevented at all times (seeSection 11).¶
In that particular topology, ND proxies can be placed at the boundary of the edge links and the backbone to handle IPv6 ND on behalf of Registered Nodes and to forward IPv6 packets back and forth. The ND proxy enables the continuity of IPv6 ND operations beyond the backbone and enables communication using Global or Unique Local Addresses between any pair of nodes in the MLSN.¶
The 6LoWPAN Backbone Router (6BBR) is a Routing Registrar[RFC8505] that provides ND proxy services. A 6BBR acting as a Bridging Proxy provides an ND proxy function with Layer 2 continuity and can be collocated with a Wi-Fi AP as prescribed by IEEE Std 802.11[IEEEstd80211]. A 6BBR acting as a Routing Proxy is applicable to any type of LLN, including LLNs that cannot be bridged onto the backbone, such as IEEE Std 802.15.4[IEEEstd802154].¶
Knowledge of which address to proxy can be obtained by snooping the IPv6 ND protocol (see[SAVI-WLAN]), but it has been found to be unreliable. An IPv6 address may not be discovered immediately due to a packet loss or if a "silent" node is not currently using one of its addresses. A change of state (e.g., due to movement) may be missed or misordered, leading to unreliable connectivity and incomplete knowledge of the state of the network.¶
With this specification, the address to be proxied is signaled explicitly through a registration process. A 6LoWPAN Node (6LN) registers all of its IPv6 addresses using NS messages with an Extended Address Registration Option (EARO) as specified in[RFC8505] to a 6LoWPAN Router (6LR) to which it is directly attached. If the 6LR is a 6BBR, then the 6LN is both the Registered Node and the Registering Node. If not, then the 6LoWPAN Border Router (6LBR) that serves the LLN proxies the registration to the 6BBR. In that case, the 6LN is the Registered Node and the 6LBR is the Registering Node. The 6BBR performs IPv6 ND operations on its backbone interface on behalf of the 6LNs that have Registered Addresses on its LLN interfaces, without the need of a broadcast over the wireless medium.¶
A Registering Node that resides on the backbone does not register to the SNMA groups associated to its Registered Addresses and defers to the 6BBR to answer or preferably forward the corresponding multicast packets to it as unicast.¶
The key words "MUST", "MUST NOT", "REQUIRED", "SHALL", "SHALL NOT", "SHOULD", "SHOULD NOT", "RECOMMENDED", "NOT RECOMMENDED", "MAY", and "OPTIONAL" in this document are to be interpreted as described in BCP 14[RFC2119][RFC8174] when, and only when, they appear in all capitals, as shown here.¶
This document introduces the following terminology:¶
This document uses the following abbreviations:¶
In this document, readers will encounter terms and concepts that are discussed in the following documents:¶
This section and its subsections present a non-normative high-level view of the operation of the 6BBR. The following sections cover the normative part.¶
Figure 1 illustrates a Backbone Link that federates a collection of LLNs as a single IPv6 subnet, with a number of 6BBRs providing ND proxy services to their attached LLNs.¶
| +-----+ +-----+ +-----+ IPv6 (default) | | (optional) | | | | Node Router | | 6LBR | | | | or +-----+ +-----+ +-----+ 6LN | Backbone Side | | ----+-------+-----------------+---+-------------+----+----- | | | +------+ +------+ +------+ | 6BBR | | 6BBR | | 6BBR | | | | | | | +------+ +------+ +------+ o Wireless Side o o o o o o o o o o o o o o o o o o o o o o o o o o o o o o o o o o o o o o o o o o o o o o o o o o o o o o LLN o o o o o o o o o o o o o o o o o o o o o o o o o o
The LLN may be a hub-and-spoke access link such as (Low-Power) IEEE Std 802.11 (Wi-Fi)[IEEEstd80211] and IEEE Std 802.15.1 (Bluetooth)[IEEEstd802151] or a mesh-under or a route-over network[RFC8505]. The proxy state can be distributed across multiple 6BBRs attached to the same backbone.¶
The main features of a 6BBR are as follows:¶
Routing Registrar services that reduce multicast within the LLN:¶
Each Backbone Router (6BBR) maintains a data structure for its Registered Addresses called a Binding Table. The abstract data that is stored in the Binding Table includes the Registered Address; anchor information on the Registering Node such as the connecting interface, link-local address, and link-layer address (LLA) of the Registering Node on that interface; the EARO including ROVR and TID; a state that can be either Reachable, Tentative, or Stale; and other information such as a trust level that may be configured, e.g., to protect a server. The combined Binding Tables of all the 6BBRs on a backbone form a distributed database of Registered Nodes that reside in the LLNs or on the IPv6 Backbone.¶
Unless otherwise configured, a 6BBR does the following:¶
The 6BBRMAY respond immediately as a proxy in lieu of the Registering Node, e.g., if the Registering Node has a sleep cycle that the 6BBR does not want to interrupt or if the 6BBR has a recent state that is deemed fresh enough to permit the proxied response. It is preferred, though, that the 6BBR checks whether the Registering Node is still responsive on the Registered Address. To that effect:¶
The first of these functions enables the 6BBR to fulfill its role as a Routing Registrar for each of its attached LLNs. The remaining functions fulfill the role of the 6BBRs as the border routers that federate the Multi-Link IPv6 Subnet.¶
The operation of IPv6 ND and ND proxy are not mutually exclusive on the backbone, meaning that nodes attached to the backbone and using IPv6 ND can transparently interact with 6LNs that rely on a 6BBR to ND proxy for them, whether the 6LNs are reachable over an LLN or directly attached to the backbone.¶
The registration mechanism[RFC8505] used to learn addresses to be proxied may coexist in a 6BBR with a proprietary snooping or the traditional bridging functionality of an AP, in order to support legacy LLN nodes that do not support this specification.¶
The registration to a proxy service uses an NS/NA exchange with EARO. The 6BBR operation resembles that of a Mobile IPv6 (MIPv6)[RFC6275] Home Agent (HA). The combination of a 6BBR and a MIPv6 HA enables full mobility support for 6LNs, inside and outside the links that form the subnet.¶
6BBRs perform IPv6 ND functions over the backbone as follows:¶
This specification adds the EARO as a possible option in RS, NS(DAD), and NA messages over the backbone. This document specifies the use of those ND messages by 6BBRs over the backbone, at a high level inSection 6 and in more detail inSection 9.¶
Note:[RFC8505] requires that the registration NS(EARO) contain a Source Link-Layer Address Option (SLLAO).[RFC4862] requires that the NS(DAD) be sent from the unspecified address for which there cannot be an SLLAO. Consequently, an NS(DAD) cannot be confused with a registration.¶
This specification allows the deployment of a 6LBR on the backbone where EDAR and EDAC messages coexist with classical ND. It also adds the capability to insert IPv6 ND options in the EDAR and EDAC messages. A 6BBR acting as a 6LR for the Registered Address can insert an SLLAO in the EDAR to the 6LBR in order to avoid causing a multicast NS(lookup) back. This enables the 6LBR to store the link-layer address associated with the Registered Address on a link and to serve as a mapping server as described in[UNICAST-LOOKUP].¶
This specification allows an address to be registered to more than one 6BBR. Consequently, a 6LBR that is deployed on the backboneMUST be capable of maintaining state for each of the 6BBRs that have registered with the same TID and same ROVR.¶
The simplest MLSN topology from the Layer 3 perspective occurs when the wireless network appears as a single-hop hub-and-spoke network as shown inFigure 2. The Layer 2 operation may effectively be hub-and-spoke (e.g., Wi-Fi) or mesh-under, with a Layer 2 protocol handling the complex topology.¶
| +-----+ +-----+ +-----+ IPv6 (default) | | (optional) | | | | Node Router | | 6LBR | | | | or +-----+ +-----+ +-----+ 6LN | Backbone Side | | ----+-------+-----------------+---+-------------+----+----- | | | +------+ +------+ +------+ | 6BBR | | 6BBR | | 6BBR | | 6LR | | 6LR | | 6LR | +------+ +------+ +------+ (6LN) (6LN) (6LN) (6LN) (6LN) (6LN) (6LN) (6LN)
Figure 3 illustrates a flow where 6LN forms an IPv6 address and registers it to a 6BBR acting as a 6LR[RFC8505]. The 6BBR applies Optimistic Duplicate Address Detection (ODAD) (seeSection 3.6) to the Registered Address to enable connectivity while the message flow is still in progress.¶
6LN(STA) 6BBR(AP) 6LBR default GW | | | | | LLN Access Link | IPv6 Backbone (e.g., Ethernet) | | | | | | RS(multicast) | | | |---------------->| | | | RA(PIO, Unicast)| | | |<----------------| | | | NS(EARO) | | | |---------------->| | | | | Extended DAR | | | |--------------->| | | | Extended DAC | | | |<---------------| | | | | | | NS-DAD(EARO, multicast) | | |--------> | | |----------------------------------->| | | | | | RS(no SLLAO, for ODAD) | | |----------------------------------->| | | if (no fresher Binding) NS(Lookup) | | | <----------------| | |<-----------------------------------| | | NA(SLLAO, not(O), EARO) | | |----------------------------------->| | | RA(unicast) | | |<-----------------------------------| | | | | IPv6 Packets in Optimistic Mode | |<---------------------------------------------------->| | | | | | | NA(EARO) |<DAD timeout> |<----------------| | |
In this example, a 6LBR is deployed on the Backbone Link to serve the whole subnet, and EDAR/EDAC messages are used in combination with DAD to enable coexistence with IPv6 ND over the backbone.¶
The RS sent initially by the 6LN (e.g., a Wi-Fi STA) is transmitted as a multicast, but since it is intercepted by the 6BBR, it is never effectively broadcast. The multiple arrows associated to the ND messages on the backbone denote a real Layer 2 broadcast.¶
A more complex MLSN topology occurs when the wireless network appears as a Layer 3 mesh network as shown inFigure 4. A so-called route-over routing protocol exposes routes between 6LRs towards both 6LRs and 6LNs, and a 6LBR acts as the Root of the Layer 3 mesh network and proxy-registers the LLN addresses to the 6BBR.¶
| +-----+ +-----+ +-----+ IPv6 (default) | | (optional) | | | | Node Router | | 6LBR | | | | or +-----+ +-----+ +-----+ 6LN | Backbone Side | | ----+-------+-----------------+---+-------------+----+----- | | | +------+ +------+ +------+ | 6BBR | | 6BBR | | 6BBR | +------+ +------+ +------+ | | | +------+ +------+ +------+ | 6LBR | | 6LBR | | 6LBR | +------+ +------+ +------+ (6LN) (6LR) (6LN) (6LR) (6LN) (6LR) (6LR) (6LR)(6LN) (6LN)(6LR) (6LR) (6LN) (6LN) (6LR)(6LN) (6LR) (6LR) (6LR) (6LN) (6LR)(6LR) (6LR) (6LR) (6LR)(6LN) (6LR) (6LR)(6LR) (6LR) (6LR) (6LR) (6LR) (6LN)(6LR) (6LR) (6LR) (6LR) (6LR) (6LN) (6LN)(6LN) (6LN) (6LN) (6LN) (6LN) (6LN) (6LN) (6LN)
Figure 5 illustrates IPv6 signaling that enables a 6LN (the Registered Node) to form a Global or a Unique Local Address and register it to the 6LBR that serves its LLN using[RFC8505] and a neighboring 6LR as relay. The 6LBR (the Registering Node) then proxies the registration[RFC8505] to the 6BBR to obtain ND proxy services from the 6BBR.¶
The RS sent initially by the 6LN is transmitted as a multicast and contained within 1-hop broadcast range where hopefully a 6LR is found. The 6LR is expected to be already connected to the LLN and capable of reaching the 6LBR, which is possibly multiple hops away, using unicast messages.¶
6LoWPAN Node 6LR 6LBR 6BBR (mesh leaf) (mesh router) (mesh root) | | | | | 6LoWPAN ND |6LoWPAN ND | 6LoWPAN ND | IPv6 ND | LLN Link |Route-Over Mesh|Ethernet/Serial| Backbone | | |/Internal Call | | IPv6 ND RS | | | |-------------->| | | |-----------> | | | |------------------> | | | IPv6 ND RA | | | |<--------------| | | | | | | | NS(EARO) | | | |-------------->| | | | 6LoWPAN ND | Extended DAR | | | |-------------->| | | | | NS(EARO) | | | |-------------->| | | | (proxied) | NS-DAD | | | |------> | | | | (EARO) | | | | | | | NA(EARO) |<timeout> | | |<--------------| | | Extended DAC | | | |<--------------| | | NA(EARO) | | | |<--------------| | | | | | |
As a non-normative example of a route-over mesh, the IPv6 over the TSCH mode of IEEE 802.15.4e (6TiSCH) architecture[6TiSCH] suggests using the RPL[RFC6550] and collocating the RPL root with a 6LBR that serves the LLN. The 6LBR is also either collocated with or directly connected to the 6BBR over an IPv6 link.¶
Addresses in an LLN that are reachable from the backbone by way of the 6BBR function must be registered to that 6BBR, using an NS(EARO) with the R flag set[RFC8505]. The 6BBR answers with an NA(EARO) and maintains a state for the registration in an abstract Binding Table.¶
An entry in the Binding Table is called a "Binding". A Binding may be in Tentative, Reachable, or Stale state.¶
The 6BBR uses a combination of[RFC8505] and IPv6 ND over the backbone to advertise the registration and avoid a duplication. Conflicting registrations are solved by the 6BBRs transparently to the Registering Nodes.¶
Only one 6LN may register a given address, but the address may be registered to multiple 6BBRs for higher availability.¶
Over the LLN, Binding Table management is as follows:¶
The operation of the Binding Table is specified in detail inSection 9.¶
A Registering NodeMAY register the same address to more than one 6BBR, in which case, the Registering Node uses the same EARO in all the parallel registrations. On the other hand, there is no provision in 6LoWPAN ND for a 6LN (acting as Registered Node) to select its 6LBR (acting as Registering Node), so it cannot select more than one either. To allow for this, NS(DAD) and NA messages with an EARO received over the backbone that indicate an identical Binding in another 6BBR (same Registered Address, same TID, same ROVR) are silently ignored except for the purpose of selecting the primary 6BBR for that registration.¶
A 6BBR may be either primary or secondary. The primary is the 6BBR that has the highest 64-bit Extended Unique Identifier (EUI-64) address of all the 6BBRs that share a registration for the same Registered Address, with the same ROVR and same Transaction ID, and the EUI-64 address is considered an unsigned 64-bit integer. A given 6BBR can be primary for a given address and secondary for another address, regardless of whether or not the addresses belong to the same 6LN.¶
In the following sections, it is expected that an NA will be sent over the backbone only if the node is primary or does not support the concept of primary. More than one 6BBR claiming or defending an address generates unwanted traffic, but there is no reachability issue since all 6BBRs provide reachability from the backbone to the 6LN.¶
If a Registering Node loses connectivity to its 6BBR or one of the 6BBRs to which it registered an address, it retries the registration to the (one or more) available 6BBR(s). When doing that, the Registering NodeMUST increment the TID in order to force the migration of the state to the new 6BBR and the reselection of the primary 6BBR if it is the node that was lost.¶
ODAD[RFC4429] specifies how an IPv6 address can be used before completion of DAD. ODAD guarantees that this behavior will not cause harm if the new address is a duplicate.¶
Support for ODAD avoids delays in installing the Neighbor Cache Entry (NCE) in the 6BBRs and the default router, enabling immediate connectivity to the Registered Node. As shown inFigure 3, if the 6BBR is aware of the LLA of a router, then the 6BBR sends a Router Solicitation (RS), using the Registered Address as the IP Source Address, to the known router(s). The RS is sent without an SLLAO, to avoid invalidating a preexisting NCE in the router.¶
Following ODAD, the router may then send a unicast RA to the Registered Address, and it may resolve that address using an NS(Lookup) message. In response, the 6BBR sends an NA with an EARO and the Override flag[RFC4861] that is not set. The router can then determine the freshest EARO in case of conflicting NA(EARO) messages, using the method described inSection 5.2.1 of [RFC8505]. If the NA(EARO) is the freshest answer, the default router creates a Binding with the SLLAO of the 6BBR (in Routing Proxy mode) or that of the Registering Node (in Bridging Proxy mode), so traffic from/to the Registered Address can flow immediately.¶
The backbone and the federated LLN links are considered to be different links in the MLSN, even if multiple LLNs are attached to the same 6BBR. ND messages are link-scoped and are not forwarded by the 6BBR between the backbone and the LLNs, though some packets may be reinjected in Bridging Proxy mode (seeSection 8).¶
Legacy nodes located on the backbone expect that the subnet is deployed within a single link and that there is a common Maximum Transmission Unit (MTU) for intra-subnet communication: the Link MTU. They will not perform the IPv6 Path MTU Discovery[RFC8201] for a destination within the subnet. For that reason, the MTUMUST have the same value on the backbone and on all federated LLNs in the MLSN. As a consequence, the 6BBRMUST use the same MTU value in RAs over the backbone and in the RAs that it transmits toward the LLN links.¶
A 6LBR can be deployed to serve the whole MLSN as shown inFigure 4. It may be attached to the backbone, in which case it can be discovered by its capability advertisement (seeSection 4.3 of [RFC8505]) in RA messages.¶
When a 6LBR is present, the 6BBR uses an EDAR/EDAC message exchange with the 6LBR to check if the new registration corresponds to a duplication or a movement. This is done prior to the NS(DAD) process, which may be avoided if the 6LBR already maintains a conflicting state for the Registered Address.¶
If this registration is a duplicate or not the freshest, then the 6LBR replies with an EDAC message with a status code of 1 ("Duplicate Address") or 3 ("Moved"), respectively. If this registration is the freshest, then the 6LBR replies with a status code of 0 ("Success"). In that case, if this registration is fresher than an existing registration for another 6BBR, then the 6LBR also sends an asynchronous EDAC with a status code of 4 ("Removed") to the older 6BBR.¶
The EDAR messageSHOULD carry the SLLAO used in NS messages by the 6BBR for that Binding, and the EDAC messageSHOULD carry the Target Link-Layer Address Option (TLLAO) associated with the currently accepted registration. This enables a 6BBR to locate the new position of a mobile 6LN in the case of a Routing Proxy operation and opens the capability for the 6LBR to serve as a mapping server in the future.¶
Note that if link-local addresses are registered, then the scope of uniqueness on which the address duplication is checked is the total collection of links that the 6LBR serves, as opposed to the sole link on which the link-local address is assigned.¶
On the backbone side, the 6BBRMUST join the SNMA group corresponding to a Registered Address as soon as it creates a Binding for that address and maintain that SNMA membership as long as it maintains the registration. The 6BBR uses either the SNMA or plain unicast to defend the Registered Addresses in its Binding Table over the backbone (as specified in[RFC4862]). The 6BBR advertises and defends the Registered Addresses over the Backbone Link using RS, NS(DAD), and NA messages with the Registered Address as the Source or Target Address.¶
The 6BBRMUST place an EARO in the IPv6 ND messages that it generates on behalf of the Registered Node. Note that an NS(DAD) does not contain an SLLAO and cannot be confused with a proxy registration such as performed by a 6LBR.¶
IPv6 ND operates as follows on the backbone:¶
This specification adds information about proxied addresses that helps to sort out a duplication (different ROVR) from a movement (same ROVR, different TID); in the latter case, the older registration is sorted out from the fresher one (by comparing TIDs).¶
When a Registering Node moves from one 6BBR to the next, the 6BBRs send NA messages over the backbone to update existing NCEs. A node that receives multiple NA messages with an EARO option and the same ROVRMUST favor the NA with the freshest EARO over the others.¶
The new 6BBRMAY set the Override flag in the NA messages if it does not compete with the Registering Node for the NCE in backbone nodes. This is assured if the Registering Node is attached via an interface that cannot be bridged onto the backbone, making it impossible for the Registering Node to defend its own addresses there. This may also be signaled by the Registering Node through a protocol extension that is not in scope for this specification.¶
When the Binding is in Tentative state, the 6BBR acts as follows:¶
When the Binding is no longer in Tentative state, the 6BBR acts as follows:¶
In any state, the 6BBR acts as follows:¶
This behavior is specified in more detail inSection 9.¶
This specification enables proxy operation for the IPv6 ND resolution of LLN devices, and a prefix that is used across an MLSNMAY be advertised as on-link over the backbone. This is done for backward compatibility with existing IPv6 hosts by setting the L flag in the Prefix Information Option (PIO) of RA messages[RFC4861].¶
For movement involving a slow reattachment, the NUD procedure defined in[RFC4861] may timeout too quickly. Nodes on the backboneSHOULD support[RFC7048] whenever possible.¶
A Routing Proxy provides IPv6 ND proxy functions for Global and Unique Local Addresses between the LLN and the backbone, but not for link-local addresses. It operates as an IPv6 border router and provides a full link-layer isolation.¶
In this mode, it is not required that the link-layer addresses of the 6LNs be visible at Layer 2 over the backbone. Thus, it is useful when the messaging over the backbone that is associated with wireless mobility becomes expensive, e.g., when the Layer 2 topology is virtualized over a wide area IP underlay.¶
This mode is definitely required when the LLN uses a link-layer address format that is different from that on the backbone (e.g., EUI-64 versus EUI-48). Since a 6LN may not be able to resolve an arbitrary destination in the MLSN directly, a prefix that is used across a MLSNMUST NOT be advertised as on-link in RA messages sent towards the LLN.¶
In order to maintain IP connectivity, the 6BBR installs a connected host route to the Registered Address on the LLN interface, via the Registering Node as identified by the source address and the SLLAO in the NS(EARO) messages.¶
When operating as a Routing Proxy, the 6BBRMUST use its Layer 2 address on its backbone interface in the SLLAO of the RS messages and the TLLAO of the NA messages that it generates to advertise the Registered Addresses.¶
For each Registered Address, multiple peers on the backbone may have resolved the address with the 6BBR link-layer address, maintaining that mapping in their Neighbor Cache. The 6BBRSHOULD maintain a list of the peers on the backbone that have associated its link-layer address with the Registered Address. If that Registered Address moves to another 6BBR, the previous 6BBRSHOULD unicast a gratuitous NA to each such peer, to supply the LLA of the new 6BBR in the TLLAO for the address. A 6BBR that does not maintain this listMAY multicast a gratuitous NA message; this NA will possibly hit all the nodes on the backbone, whether or not they maintain an NCE for the Registered Address. In either case, the 6BBRMAY set the Override flag if it is known that the Registered Node cannot attach to the backbone; this will avoid interruptions and save probing flows in the future.¶
If a correspondent fails to receive the gratuitous NA, it will keep sending traffic to a 6BBR to which the node was previously registered. Since the previous 6BBR removed its host route to the Registered Address, it will look up the address over the backbone, resolve the address with the LLA of the new 6BBR, and forward the packet to the correct 6BBR. The previous 6BBRSHOULD also issue a redirect message[RFC4861] to update the cache of the correspondent.¶
A Bridging Proxy provides IPv6 ND proxy functions between the LLN and the backbone while preserving the forwarding continuity at the link layer. It acts as a Layer 2 bridge for all types of unicast packets including link-scoped, and it appears as an IPv6 Host on the backbone.¶
The Bridging Proxy registers any Binding, including a link-local address to the 6LBR (if present), and defends it over the backbone in IPv6 ND procedures.¶
To achieve this, the Bridging Proxy intercepts the IPv6 ND messages and may reinject them on the other side, respond directly, or drop them. For instance, an NS(Lookup) from the backbone that matches a Binding can be responded to directly or turned into a unicast on the LLN side to let the 6LN respond.¶
As a Bridging Proxy, the 6BBRMUST use the Registering Node's Layer 2 address in the SLLAO of the NS/RS messages and the TLLAO of the NA messages that it generates to advertise the Registered Addresses. The Registering Node's Layer 2 address is found in the SLLAO of the registration NS(EARO) and maintained in the Binding Table.¶
The MLSN prefixSHOULD NOT be advertised as on-link in RA messages sent towards the LLN. If a destination address is seen as on-link, then a 6LN may use NS(Lookup) messages to resolve that address. In that case, the 6BBRMUST either answer the NS(Lookup) message directly or reinject the message on the backbone, as either a Layer 2 unicast or a multicast.¶
If the Registering Node owns the Registered Address, meaning that the Registering Node is the Registered Node, then its mobility does not impact existing NCEs over the backbone. In a network where proxy registrations are used, meaning that the Registering Node acts on behalf of the Registered Node, if the Registered Node selects a new Registering Node, then the existing NCEs across the backbone pointing at the old Registering Node must be updated. In that case, the 6BBRSHOULD attempt to fix the existing NCEs across the backbone pointing at other 6BBRs using NA messages as described inSection 7.¶
This method can fail if the multicast message is not received; one or more correspondent nodes on the backbone might maintain a stale NCE, and packets to the Registered Address may be lost. When this condition happens, it is eventually discovered and resolved using NUD as defined in[RFC4861].¶
Upon receiving a registration for a new address (i.e., an NS(EARO) with the R flag set), the 6BBR creates a Binding and operates as a 6LR according to[RFC8505], interacting with the 6LBR if one is present.¶
An implementation of a Routing Proxy that creates a BindingMUST also create an associated host route pointing to the Registering Node in the LLN interface from which the registration was received.¶
Acting as a 6BBR, the 6LR operation is modified as follows:¶
This specification enables nodes on a Backbone Link to coexist along with nodes implementing IPv6 ND[RFC4861] as well as other non-normative specifications such as[SAVI-WLAN]. It is possible that not all IPv6 addresses on the backbone are registered and known to the 6LBR, and an EDAR/EDAC exchange with the 6LBR might succeed even for a duplicate address. Consequently, the 6BBR still needs to perform IPv6 ND DAD over the backbone after an EDAC with a status code of 0 ("Success") or 9 ("6LBR Registry Saturated").¶
For the DAD operation, the Binding is placed in Tentative state for a duration of TENTATIVE_DURATION (Section 12), and an NS(DAD) message is sent as a multicast message over the backbone to the SNMA associated with the Registered Address[RFC4862]. The EARO from the registrationMUST be placed unchanged in the NS(DAD) message.¶
If a registration is received for an existing Binding with a non-null Registration Lifetime and the registration is fresher (same ROVR, fresher TID), then the Binding is updated with the new Registration Lifetime, TID, and possibly Registering Node. In Tentative state (seeSection 9.1), the current DAD operation continues unaltered. In other states (see Sections9.2 and9.3 ), the Binding is placed in Reachable state for the Registration Lifetime, and the 6BBR returns an NA(EARO) to the Registering Node with a status code of 0 ("Success").¶
Upon a registration that is identical (same ROVR, TID, and Registering Node), the 6BBR does not alter its current state. In Reachable state, it returns an NA(EARO) back to the Registering Node with a status code of 0 ("Success"). A registration that is not as fresh (same ROVR, older TID) is ignored.¶
If a registration is received for an existing Binding and a Registration Lifetime of 0, then the Binding is removed, and the 6BBR returns an NA(EARO) back to the Registering Node with a status code of 0 ("Success"). An implementation of a Routing Proxy that removes a BindingMUST remove the associated host route pointing on the Registering Node.¶
The old 6BBR removes its Binding Table entry and notifies the Registering Node with a status code of 3 ("Moved") if a new 6BBR claims a fresher registration (same ROVR, fresher TID) for the same address. The old 6BBRMAY preserve a temporary state in order to forward packets in flight. The state may be, for instance, an NCE that was formed when an NA message was received. It may also be a Binding Table entry in Stale state, pointing at the new 6BBR on the backbone or any other abstract cache entry that can be used to resolve the link-layer address of the new 6BBR. The old 6BBRSHOULD also use REDIRECT messages pointing at the new 6BBR to update the correspondents of the Registered Address, as specified in[RFC4861].¶
The Tentative state covers a DAD period over the backbone during which an address being registered is checked for duplication using the procedures defined in[RFC4862].¶
For a Binding in Tentative state:¶
When the TENTATIVE_DURATION (Section 12) timer elapses, the Binding is placed in Reachable state for the Registration Lifetime, and the 6BBR returns an NA(EARO) to the Registering Node with a status code of 0 ("Success").¶
The 6BBR also attempts to take over any existing Binding from other 6BBRs and to update existing NCEs in backbone nodes. This is done by sending an NA message with an EARO and the Override flag not set over the backbone (see Sections7 and8).¶
The Reachable state covers an active registration after a successful DAD process.¶
If the Registration Lifetime is of a long duration, an implementation might be configured to reassess the availability of the Registering Node at a lower period, using a NUD procedure as specified in[RFC7048]. If the NUD procedure fails, the BindingSHOULD be placed in Stale state immediately.¶
For a Binding in Reachable state:¶
When the Registration Lifetime timer elapses, the Binding is placed in Stale state for a duration of STALE_DURATION (Section 12).¶
The Stale state enables tracking of the backbone peers that have a NCE pointing to this 6BBR in case the Registered Address shows up later.¶
If the Registered Address is claimed by another 6LN on the backbone, with an NS(DAD) or an NA, the 6BBR does not defend the address.¶
For a Binding in Stale state:¶
When the STALE_DURATION (Section 12) timer elapses, the BindingMUST be removed.¶
A Registering NodeMUST implement[RFC8505] in order to interact with a 6BBR (which acts as a Routing Registrar). Following[RFC8505], the Registering Node signals that it requires IPv6 ND proxy services from a 6BBR by registering the corresponding IPv6 address using an NS(EARO) message with the R flag set.¶
The Registering Node may be the 6LN owning the IPv6 address or a 6LBR that performs the registration on its behalf in a route-over mesh.¶
A 6LNMUST register all of its IPv6 addresses to its 6LR, which is the 6BBR when they are connected at Layer 2. Failure to register an address may result in the address being unreachable by other parties. This would happen, for instance, if the 6BBR propagates the NS(Lookup) from the backbone only to the LLN nodes that do not register their addresses.¶
The Registering NodeMUST refrain from using multicast NS(Lookup) when the destination is not known as on-link, e.g., if the prefix is advertised in a PIO with the L flag not set. In that case, the Registering Node sends its packets directly to its 6LR.¶
The Registering NodeSHOULD also followBCP 202 [RFC7772] in order to limit the use of multicast RAs. ItSHOULD also implement "Simple Procedures for Detecting Network Attachment in IPv6"[RFC6059] (DNA procedures) to detect movements and support "Packet-Loss Resiliency for Router Solicitations"[RFC7559] in order to improve reliability for the unicast RS messages.¶
The procedures in this document modify the mechanisms used for IPv6 ND and DAD and should not affect other aspects of IPv6 or higher-level-protocol operation. As such, the main classes of attacks that are in play are those that work to block Neighbor Discovery or to forcibly claim an address that another node is attempting to use. In the absence of cryptographic protection at higher layers, the latter class of attacks can have significant consequences, with the attacker being able to read all the "stolen" traffic that was directed to the target of the attack.¶
This specification applies to LLNs and a backbone in which the individual links are protected against rogue access on the LLN by authenticating a node that attaches to the network and encrypting the transmissions at the link layer and on the backbone side, using the physical security and access control measures that are typically applied there; thus, packets may neither be forged nor overheard.¶
In particular, the LLN link layer is required to provide secure unicast to/from the Backbone Router and secure broadcast from the routers in a way that prevents tampering with or replaying the ND messages.¶
For the IPv6 ND operation over the backbone, and unless the classical ND is disabled (e.g., by configuration), the classical ND messages are interpreted as emitted by the address owner and have precedence over the 6BBR that is only a proxy.¶
As a result, the security threats that are detailed inSection 11.1 of [RFC4861] fully apply to this specification as well. In short:¶
This means that any rogue access to the backbone must be prevented at all times, and nodes that are attached to the backbone must be fully trusted / never compromised.¶
Using address registration as the sole ND mechanism on a link and coupling it with[RFC8928] guarantees the ownership of a Registered Address within that link.¶
A possible attack over the backbone can be done by sending an NS with an EARO and expecting the NA(EARO) back to contain the TID and ROVR fields of the existing state. With that information, the attacker can easily increase the TID and take over the Binding.¶
If the classical ND is disabled on the backbone and the use of[RFC8928] and a 6LBR are mandated, the network will benefit from the following new advantages:¶
This specification introduces a 6BBR that is a router on the path of the LLN traffic and a 6LBR that is used for the lookup. They could be interesting targets for an attacker. A compromised 6BBR can accept a registration but block the traffic or refrain from proxying. A compromised 6LBR may unduly accept the transfer of ownership of an address or block a newcomer by faking that its address is a duplicate. But those attacks are possible in a classical network from a compromised default router and a DHCP server, respectively, and can be prevented using the same methods.¶
A possible attack over the LLN can still be done by compromising a 6LR. A compromised 6LR may modify the ROVR of EDAR messages in flight and transfer the ownership of the Registered Address to itself or a tier. It may also claim that a ROVR was validated when it really wasn't and reattribute an address to itself or to an attached 6LN. This means that 6LRs, as well as 6LBRs and 6BBRS, must still be fully trusted / never compromised.¶
This specification mandates checking on the 6LBR on the backbone before doing the classical DAD, in case the address already exists. This may delay the DAD operation and should be protected by a short timer, in the order of 100 ms or less, which will only represent a small extra delay versus the 1 s wait of the DAD operation.¶
This specification uses the following constants:¶
In LLNs with long-lived addresses such as Low-Power WAN (LPWANs), STALE_DURATIONSHOULD be configured with a relatively long value to cover an interval when the address may be reused and before it is safe to expect that the address was definitively released. A good default value is 24 hours. In LLNs where addresses are renewed rapidly, e.g., for privacy reasons, STALE_DURATIONSHOULD be configured with a relatively shorter value -- 5 minutes by default.¶
This document has no IANA actions.¶
With the current specification, the 6LBR is not leveraged to avoid multicast NS(Lookup) on the backbone. This could be done by adding a lookup procedure in the EDAR/EDAC exchange.¶
By default, the specification does not have a fine-grained trust model: all nodes that can authenticate to the LLN link layer or attach to the backbone are equally trusted. It would be desirable to provide a stronger authorization model, e.g., whereby nodes that associate their address with a proof of ownership[RFC8928] should be trusted more than nodes that do not. Such a trust model and related signaling could be added in the future to override the default operation and favor trusted nodes.¶
As an alternate to the ND Proxy operation, the registration may be redistributed as a host route in a routing protocol that would operate over the backbone; this is already happening in IoT networks[RPL-LEAVES] and Data Center Routing[RIFT] and could be extended to other protocols, e.g., BGP[RFC4271] and OSPFv3[RFC5340]. The registration may also be advertised in an overlay protocol such as Mobile IPv6 (MIPv6)[RFC6275], the Locator/ID Separation Protocol (LISP)[RFC6830], or Ethernet VPN (EVPN)[RFC7432].¶
This document specifies ND proxy functions that can be used to federate an IPv6 Backbone Link and multiple IPv6 LLNs into a single MLSN. The ND proxy functions enable IPv6 ND services for DAD and address lookup that do not require broadcasts over the LLNs.¶
The term LLN is used to cover multiple types of WLANs and WPANs, including (Low-Power) Wi-Fi, BLUETOOTH(R) Low Energy, IEEE Std 802.11ah and IEEE Std 802.15.4 wireless meshes, and the types of networks listed in "Requirements Related to Various Low-Power Link Types" (seeAppendix B.3 of [RFC8505]).¶
Each LLN in the subnet is attached to a 6BBR. The Backbone Routers interconnect the LLNs and advertise the addresses of the 6LNs over the Backbone Link using ND proxy operations.¶
This specification updates IPv6 ND over the backbone to distinguish address movement from duplication and eliminate Stale state in the backbone routers and backbone nodes once a 6LN has roamed. This way, mobile nodes may roam rapidly from one 6BBR to the next, and requirements are met per "Requirements Related to Mobility" (seeAppendix B.1 of [RFC8505]).¶
A 6LN can register its IPv6 addresses and thereby obtain ND proxy services over the backbone, meeting the requirements expressed in "Requirements Related to Proxy Operations" (seeAppendix B.4 of [RFC8505].¶
The negative impact of the IPv6 ND-related broadcasts can be limited to one of the federated links, enabling the number of 6LNs to grow. The Routing Proxy operation avoids the need to expose the link-layer addresses of the 6LNs onto the backbone, keeping the Layer 2 topology simple and stable. This meets the requirements in "Requirements Related to Scalability" (seeAppendix B.6 of [RFC8505]), as long as the 6BBRs are dimensioned for the number of registrations that each needs to support.¶
In the case of a Wi-Fi access link, a 6BBR may be collocated with the AP, a Fabric Edge (FE), or a Control and Provisioning of Wireless Access Points (CAPWAP)[RFC5415] Wireless LAN Controller (WLC). In those cases, the wireless client (STA) is the 6LN that makes use of[RFC8505] to register its IPv6 address(es) to the 6BBR acting as the Routing Registrar. The 6LBR can be centralized and either connected to the Backbone Link or reachable over IP. The 6BBR ND proxy operations eliminate the need for wireless nodes to respond synchronously when a lookup is performed for their IPv6 addresses. This provides the function of a Sleep Proxy for ND[DAD-APPROACHES].¶
For the Time-Slotted Channel Hopping (TSCH) mode of[IEEEstd802154], the 6TiSCH architecture[6TiSCH] describes how a 6LoWPAN ND host could connect to the Internet via a RPL mesh network, but doing so requires extensions to the 6LOWPAN ND protocol to support mobility and reachability in a secure and manageable environment. The extensions detailed in this document also work for the 6TiSCH architecture, serving the requirements listed in "Requirements Related to Routing Protocols" (seeAppendix B.2 of [RFC8505]).¶
The registration mechanism may be seen as a more reliable alternate to snooping[SAVI-WLAN]. Note that registration and snooping are not mutually exclusive. Snooping may be used in conjunction with the registration for nodes that do not register their IPv6 addresses. The 6BBR assumes that if a node registers at least one IPv6 address to it, then the node registers all of its addresses to the 6BBR. With this assumption, the 6BBR can possibly cancel all undesirable multicast NS messages that would otherwise have been delivered to that node.¶
Scalability of the MLSN[RFC4903] requires avoidance of multicast/broadcast operations as much as possible even on the backbone[MCAST-PROBLEMS]. Although hosts can connect to the backbone using IPv6 ND operations, multicast RAs can be saved by using[RS-REFRESH], which also requires the support of[RFC7559].¶
Many thanks toDorothy Stanley,Thomas Watteyne, andJerome Henry for their various contributions. Also, many thanks toTimothy Winters andErik Nordmark for their help, review, and support in preparation for the IESG cycle and toKyle Rose,Elwyn Davies,Barry Leiba,Mirja Kühlewind,Alvaro Retana,Roman Danyliw, and especiallyDominique Barthel andBenjamin Kaduk for their useful contributions through the IETF Last Call and IESG process.¶