Skip to content

Conversation

@patrasar
Copy link
Contributor

@patrasar patrasar commented Oct 21, 2022

As per rfc7761 section 4.9,
PIM messages are either unicast (e.g., Registers and Register-Stop)
or multicast with TTL 1 to the 'ALL-PIM-ROUTERS' group (e.g.,
Join/Prune, Asserts). The source address used for unicast messages
is a domain-wide reachable address; the source address used for
multicast messages is the link-local address of the interface on
which the message is being sent.

As per rfc5059 section 4,
The IP source address used for Bootstrap messages
(regardless of whether they are being originated
or forwarded) is the link-local address of the
interface on which the message is being sent.
we should process or drop multicast packet with global address. So closed the PR as of now.

PIMV6 hello packet should be accepted from LL address.
PIMV6 Join/Prune, Assert and BSM packets should be accepted from primary LL address. (Source address of the PIMV6 hello packet)

Only Register and Candidate-RP messages use Global address , so these are excluded from the check.

Signed-off-by: Sarita Patra saritap@vmware.com

As per rfc7761 section 4.9,
   PIM messages are either unicast (e.g., Registers and Register-Stop)
   or multicast with TTL 1 to the 'ALL-PIM-ROUTERS' group (e.g.,
   Join/Prune, Asserts).  The source address used for unicast messages
   is a domain-wide reachable address; the source address used for
   multicast messages is the link-local address of the interface on
   which the message is being sent.

So, here I am avoiding the hello, assert, join-prune with
source ip global address.

As per rfc5059 section 4,
 The IP source address used for Bootstrap messages
 (regardless of whether they are being originated
 or forwarded) is the link-local address of the
 interface on which the message is being sent.

So, here I am avoiding the Bootstrap with source ip global address.

Signed-off-by: Sarita Patra <saritap@vmware.com>
@patrasar patrasar force-pushed the pimv6_packet_global branch from 1eaef3e to e904703 Compare October 21, 2022 06:57
@NetDEF-CI
Copy link
Collaborator

NetDEF-CI commented Oct 21, 2022

Continuous Integration Result: FAILED

Continuous Integration Result: FAILED

Test incomplete. See below for issues.
CI System Testrun URL: https://ci1.netdef.org/browse/FRR-PULLREQ2-7998/

This is a comment from an automated CI system.
For questions and feedback in regards to this CI system, please feel free to email
Martin Winter - mwinter (at) opensourcerouting.org.

Get source / Pull Request: Successful

Building Stage: Successful

Basic Tests: Incomplete

Topotests Ubuntu 18.04 arm8 part 4: Incomplete (check logs for details)
Addresssanitizer topotests part 1: Incomplete (check logs for details)
Successful on other platforms/tests
  • Topotests Ubuntu 18.04 amd64 part 0
  • Topotests Ubuntu 18.04 arm8 part 6
  • Topotests Ubuntu 18.04 arm8 part 1
  • Topotests Ubuntu 18.04 amd64 part 7
  • Topotests debian 10 amd64 part 6
  • Addresssanitizer topotests part 3
  • Topotests Ubuntu 18.04 i386 part 5
  • Addresssanitizer topotests part 2
  • Topotests debian 10 amd64 part 5
  • Topotests Ubuntu 18.04 arm8 part 2
  • Fedora 29 rpm pkg check
  • Addresssanitizer topotests part 9
  • CentOS 7 rpm pkg check
  • Topotests Ubuntu 18.04 amd64 part 4
  • Topotests Ubuntu 18.04 amd64 part 3
  • Topotests debian 10 amd64 part 7
  • Topotests Ubuntu 18.04 i386 part 2
  • Addresssanitizer topotests part 8
  • Topotests Ubuntu 18.04 i386 part 7
  • Topotests Ubuntu 18.04 arm8 part 8
  • Ubuntu 18.04 deb pkg check
  • Topotests Ubuntu 18.04 i386 part 0
  • Addresssanitizer topotests part 6
  • Topotests Ubuntu 18.04 amd64 part 1
  • Topotests Ubuntu 18.04 amd64 part 2
  • Topotests Ubuntu 18.04 i386 part 3
  • Topotests Ubuntu 18.04 i386 part 8
  • Addresssanitizer topotests part 0
  • Debian 10 deb pkg check
  • Topotests debian 10 amd64 part 3
  • Topotests debian 10 amd64 part 8
  • Topotests Ubuntu 18.04 amd64 part 6
  • Addresssanitizer topotests part 4
  • Topotests Ubuntu 18.04 arm8 part 9
  • Debian 9 deb pkg check
  • Topotests Ubuntu 18.04 arm8 part 3
  • Topotests debian 10 amd64 part 9
  • Topotests Ubuntu 18.04 i386 part 4
  • Topotests debian 10 amd64 part 4
  • Topotests Ubuntu 18.04 amd64 part 9
  • Topotests Ubuntu 18.04 arm8 part 0
  • Topotests Ubuntu 18.04 i386 part 9
  • Topotests debian 10 amd64 part 2
  • Topotests Ubuntu 18.04 amd64 part 8
  • Topotests Ubuntu 18.04 arm8 part 7
  • Addresssanitizer topotests part 7
  • Static analyzer (clang)
  • Topotests debian 10 amd64 part 0
  • Topotests Ubuntu 18.04 amd64 part 5
  • Ubuntu 20.04 deb pkg check
  • Ubuntu 16.04 deb pkg check
  • Topotests Ubuntu 18.04 arm8 part 5
  • Addresssanitizer topotests part 5
  • Topotests debian 10 amd64 part 1
  • Topotests Ubuntu 18.04 i386 part 6
  • Topotests Ubuntu 18.04 i386 part 1

@NetDEF-CI
Copy link
Collaborator

NetDEF-CI commented Oct 21, 2022

Continuous Integration Result: SUCCESSFUL

Continuous Integration Result: SUCCESSFUL

Congratulations, this patch passed basic tests

Tested-by: NetDEF / OpenSourceRouting.org CI System

CI System Testrun URL: https://ci1.netdef.org/browse/FRR-PULLREQ2-7999/

This is a comment from an automated CI system.
For questions and feedback in regards to this CI system, please feel free to email
Martin Winter - mwinter (at) opensourcerouting.org.

@NetDEF-CI
Copy link
Collaborator

Continuous Integration Result: SUCCESSFUL

Congratulations, this patch passed basic tests

Tested-by: NetDEF / OpenSourceRouting.org CI System

CI System Testrun URL: https://ci1.netdef.org/browse/FRR-PULLREQ2-7998/

This is a comment from an automated CI system.
For questions and feedback in regards to this CI system, please feel free to email
Martin Winter - mwinter (at) opensourcerouting.org.

@mobash-rasool
Copy link
Contributor

I think this change may not be required. The RFC section mentioned here is talking about the sending of the messages. So while sending we need to ensure this part but while receiving it we should not discard the packet. This may not work with other vendors who might be using global address. Unless RFC does not say discard it or use must keyword, we should not discard it. Let's find out more on this before proceeding with this change.

@patrasar
Copy link
Contributor Author

For now, we are planning to allow multicast PIMV6 packet with source global ipV6 address while sending we are sending multicast packet with link-local address only.
In future, if we need to block PIMV6 multicast packet with source IP global address, we will reopen this pull request.

@eqvinox
Copy link
Contributor

eqvinox commented Dec 8, 2022

(discussion in #12008, this should be reopened I think.)

@patrasar patrasar reopened this Dec 16, 2022
@patrasar
Copy link
Contributor Author

(discussion in #12008, this should be reopened I think.)

Hi @eqvinox, I have reopened this PR as per your suggestion.
Please review.

Thanks,
Sarita

@github-actions
Copy link

This PR is stale because it has been open 180 days with no activity. Comment or remove the autoclose label in order to avoid having this PR closed.

@Jafaral Jafaral removed the autoclose label Jul 11, 2024
@github-actions github-actions bot added the rebase PR needs rebase label Jul 11, 2024
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment

Projects

None yet

Development

Successfully merging this pull request may close these issues.

5 participants