RE: [PATCH net-next v3 0/5] net: dsa: remove .set_addr

From: Rodney Cummings
Date: Mon Oct 16 2017 - 12:29:58 EST


Hi Andrew,

I may have misunderstood.

If this MAC address is the destination, a local random MAC address doesn't work. PAUSE is using one of the 802.1Q reserved destination MAC addresses (as does LLDP, MSTP, 1588, etc). PAUSE needs to use that specially assigned address (01-80-C2-00-00-01).

I assumed we were talking about the source MAC address. For the source MAC address, I would agree that a local random MAC address works in some narrow scenarios.

My concern is that for a source MAC address, a local random MAC address is not safe in all networks, because it has the potential for duplication. That topic has been discussed quite a bit in IEEE 802.

Rodney

> -----Original Message-----
> From: Andrew Lunn [mailto:andrew@xxxxxxx]
> Sent: Monday, October 16, 2017 11:10 AM
> To: Rodney Cummings <rodney.cummings@xxxxxx>
> Cc: Vivien Didelot <vivien.didelot@xxxxxxxxxxxxxxxxxxxx>;
> netdev@xxxxxxxxxxxxxxx; linux-kernel@xxxxxxxxxxxxxxx;
> kernel@xxxxxxxxxxxxxxxxxxxx; David S. Miller <davem@xxxxxxxxxxxxx>;
> Florian Fainelli <f.fainelli@xxxxxxxxx>; David Laight
> <David.Laight@xxxxxxxxxx>
> Subject: Re: [PATCH net-next v3 0/5] net: dsa: remove .set_addr
>
> On Mon, Oct 16, 2017 at 03:23:42PM +0000, Rodney Cummings wrote:
> > I am concerned about this proposed change.
> >
> > According to IEEE Std 802.1Q, a "higher layer entity" (i.e. end
> > station) that is internal to the bridge (i.e. switch) can use the
> > same individual global MAC address that the switch is using. That
> > behavior is common.
> >
> > Use of a local semi-random MAC address is dangerous on
> > Ethernet. Local MAC addresses can only be safely used in very narrow
> > use cases, most of which are Wi-Fi. Generally speaking, local MAC
> > addresses can be duplicated in the network, which causes many
> > Ethernet protocols to break down. Therefore, general-purpose
> > implementations like DSA cannot use a local MAC address in a
> > reliable manner.
>
> Hi Rodney
>
> This is interesting. So i did some research. The Marvell Switch only
> uses this MAC address for Pause frames. Nothing else.
>
> 802.3-2015 Section 2, Annex 31B says:
>
> The globally assigned 48-bit multicast address 01-80-C2-00-00-01 has
> been reserved for use in MAC Control PAUSE frames for inhibiting
> transmission of data frames from a DTE in a full duplex mode IEEE
> 802.3 LAN. IEEE 802.1D-conformant bridges will not forward frames
> sent to this multicast destination address, regardless of the state
> of the bridgeÃââs ports, or whether or not the bridge
> implements the MAC Control sublayer. To allow generic full duplex
> flow control, stations implementing the PAUSE operation shall
> instruct the MAC (e.g., through layer management) to enable
> reception of frames with destination address equal to this multicast
> address.
>
> NOTEÃââBy definition, an IEEE 802.3 LAN operating in full
> duplex mode comprises exactly two stations, thus there is no
> ambiguity regarding the destination DTEÃââs identity. The use
> of a well-known multicast address relieves the MAC Control sublayer
> and its client from having to know, and maintain knowledge of, the
> individual 48-bit address of the other DTE in a full duplex
> environment.
>
> When MAC Control PFC operation (see Annex 31D and IEEE Std 802.1Q)
> has been enabled, MAC Control PAUSE operation shall be disabled.
>
> So, received Pause frames never leave the MAC. They don't get bridged,
> nor do they get passed up for host processing. They are purely point
> to point between two MAC peers. The destination is unambiguous. It is
> simple the other MAC peer. The destination address makes it clear it
> is a pause frame, the the source address seems to be unneeded.
>
> In this context, a random MAC addresses are safe.
>
> In the more general case, i would agree with you. Collisions are
> possible, causing problems.
>
> Andrew