RFC 7527
Enhanced Duplicate Address Detection, April 2015
- File formats:
- Status:
- PROPOSED STANDARD
- Updates:
- RFC 4429, RFC 4861, RFC 4862
- Authors:
- R. Asati
H. Singh
W. Beebee
C. Pignataro
E. Dart
W. George - Stream:
- IETF
- Source:
- 6man (int)
Cite this RFC: TXT | XML | BibTeX
DOI: https://doi.org/10.17487/RFC7527
Discuss this RFC: Send questions or comments to the mailing list ipv6@ietf.org
Other actions: Submit Errata | Find IPR Disclosures from the IETF | View History of RFC 7527
Abstract
IPv6 Loopback Suppression and Duplicate Address Detection (DAD) are discussed in Appendix A of RFC 4862. That specification mentions a hardware-assisted mechanism to detect looped back DAD messages. If hardware cannot suppress looped back DAD messages, a software solution is required. Several service provider communities have expressed a need for automated detection of looped back Neighbor Discovery (ND) messages used by DAD. This document includes mitigation techniques and outlines the Enhanced DAD algorithm to automate the detection of looped back IPv6 ND messages used by DAD. For network loopback tests, the Enhanced DAD algorithm allows IPv6 to self-heal after a loopback is placed and removed. Further, for certain access networks, this document automates resolving a specific duplicate address conflict. This document updates RFCs 4429, 4861, and 4862.
For the definition of Status, see RFC 2026.
For the definition of Stream, see RFC 8729.