In fairness, said device can do the same sort of inspection of SLAAC
traffic.  It just looks at neighbor discovery messages instead of DHCP
messages.

<http://tools.ietf.org/html/draft-ietf-savi-fcfs>


On Sun, Feb 27, 2011 at 2:17 PM, Leigh Porter
<leigh.por...@ukbroadband.com> wrote:
>
>
> On 27 Feb 2011, at 19:07, Antonio Querubin wrote:
>
>> On Sun, 27 Feb 2011, Mikael Abrahamsson wrote:
>>
>>> On Sun, 27 Feb 2011, Leigh Porter wrote:
>>>
>>>> Does anybody have anything neat to keep logs of what host gets what ipv6 
>>>> address in an SLAAC environment?
>>>
>>> You'd have to correlate ND information in the router to some kind of record 
>>> of who has what MAC address at any given time. With SLAAC the host doesn't 
>>> "get" an IPv6 address, it "takes" one.
>>>
>>>> This is often required for legislation compliance. DHCP does this well.
>>>
>>> Which is one of the reasons why some of us want DHCPv6 support in hosts.
>>
>> So how does DHCP prevent a host from just taking or hijacking an IP address?
>>
>> Antonio Querubin
>> e-mail/xmpp:  t...@lava.net
>>
>
> You can have devices that peek at the DHCP messages and then open filters so 
> that you at least know that any host that pops up on the network has used 
> DHCP to obtain an IP address.
>
> Now you cannot usually prevent somebody from later hijacking that IP address 
> using a fake MAC unless you do something else as well but at least you have 
> something of a statefull relationship between an host and the IP address it 
> uses.
>
>
> --
> Leigh Porter
>

Reply via email to