Re: TSVART review of draft-ietf-6man-deprecate-atomfrag-generation

Brian E Carpenter <brian.e.carpenter@gmail.com> Mon, 29 August 2016 22:50 UTC

Return-Path: <brian.e.carpenter@gmail.com>
X-Original-To: ietf@ietfa.amsl.com
Delivered-To: ietf@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 8425612D8A9; Mon, 29 Aug 2016 15:50:29 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -2.7
X-Spam-Level:
X-Spam-Status: No, score=-2.7 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, DKIM_SIGNED=0.1, DKIM_VALID=-0.1, DKIM_VALID_AU=-0.1, FREEMAIL_FROM=0.001, RCVD_IN_DNSWL_LOW=-0.7, SPF_PASS=-0.001] autolearn=ham autolearn_force=no
Authentication-Results: ietfa.amsl.com (amavisd-new); dkim=pass (2048-bit key) header.d=gmail.com
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id qvOAlG_4IjEG; Mon, 29 Aug 2016 15:50:27 -0700 (PDT)
Received: from mail-pa0-x232.google.com (mail-pa0-x232.google.com [IPv6:2607:f8b0:400e:c03::232]) (using TLSv1.2 with cipher ECDHE-RSA-AES128-GCM-SHA256 (128/128 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id BA0A712D8B8; Mon, 29 Aug 2016 15:50:03 -0700 (PDT)
Received: by mail-pa0-x232.google.com with SMTP id ci2so631047pad.3; Mon, 29 Aug 2016 15:50:03 -0700 (PDT)
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=gmail.com; s=20120113; h=subject:to:references:cc:from:organization:message-id:date :user-agent:mime-version:in-reply-to:content-transfer-encoding; bh=4XL/4jlpxG2X/R/Md+DcVakCDkXRbeCip9Rze/t3mZQ=; b=o8WfhuKeiv44AnIlpiqf+0KQJHbr/f7nU8L90RZSXUMg3h9WoqDy9NDRAtBQr9rm5d CibklMLsANTGvCWOdM054M8WnyAf3jQbjOgqWTXixQTfxCN7buu8gzbammpfVOhsyHPc Yr9wZFgJdPH8RbxCUtf+teoxRQMzus4Zeg/njl6qwTYGR1kd9/miIEurD4wCLWrtdPgT GfopviiqB+I0SexnjNwXJF3d/vhvAOzgkaAdNKcf0v+1SAj6Air2HX7RI9Yu4boI2Goq XCKq+Cs32plInXqllFcDWf+LtRLg3q/FPNiyUyACR0pHVwlnw5aXVIqacvvx42gdb6p6 jYVA==
X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20130820; h=x-gm-message-state:subject:to:references:cc:from:organization :message-id:date:user-agent:mime-version:in-reply-to :content-transfer-encoding; bh=4XL/4jlpxG2X/R/Md+DcVakCDkXRbeCip9Rze/t3mZQ=; b=ZVpq4ag38/Hwu5TZn8tyeZY9UBgLzPTFVDMTWMgzgAZWrfgjz8fIeR1csHzMjUli7U +7+I4Py/NaoXZcBTSGd9knfOiH2vTXaqo4Z9xOn2GYEq2kVkSrwIWf+2sXb8H2cvilfL odXqi/Dprp98T/S/xEHzN4KfzJ5dDfw5tdZuVBAvABGA7NT5ISXw56Jo9VantsXd8aEl QoRIQbrzIFsqHOSYN/iEGSDoBNsoXn+Qf4LrwAa1HgNpcZFWpAbt2+yCi7R614iEml6J kgF9egt1CtmWiBIeGYGSSILW6A+2GYIieYls209iUyExVsbpgFF8SGA33DRJ5Jj5xpuj x1YA==
X-Gm-Message-State: AE9vXwN+TGOsykNewTbrQwR3laRuIIIaOPVLsR4HFo783pEZCT0c7EwiuGypUNXuCmADig==
X-Received: by 10.67.7.170 with SMTP id dd10mr718783pad.152.1472511003053; Mon, 29 Aug 2016 15:50:03 -0700 (PDT)
Received: from ?IPv6:2001:df0:0:2006:c0da:ac17:5f6d:8e76? ([2001:df0:0:2006:c0da:ac17:5f6d:8e76]) by smtp.gmail.com with ESMTPSA id n10sm51712132pap.16.2016.08.29.15.49.59 (version=TLS1_2 cipher=ECDHE-RSA-AES128-GCM-SHA256 bits=128/128); Mon, 29 Aug 2016 15:50:02 -0700 (PDT)
Subject: Re: TSVART review of draft-ietf-6man-deprecate-atomfrag-generation
To: Joe Touch <touch@isi.edu>, Fernando Gont <fgont@si6networks.com>, 6man <ipv6@ietf.org>
References: <786d5c2c-a88d-7539-9604-6df0b8ed68dd@isi.edu> <0f339ba8-cf63-e961-b19f-895c39585fb7@si6networks.com> <585f4689-d19e-dd54-e75b-4eb3644274ed@isi.edu> <a40199a0-b625-3887-aec6-7e3adfbe504a@si6networks.com> <6755d8bb-3b95-c107-cd72-b799cb2b32f1@isi.edu>
From: Brian E Carpenter <brian.e.carpenter@gmail.com>
Organization: University of Auckland
Message-ID: <ac5d10f5-9667-e446-46f3-4bbfaf5e7d18@gmail.com>
Date: Tue, 30 Aug 2016 10:50:01 +1200
User-Agent: Mozilla/5.0 (Windows NT 6.1; WOW64; rv:45.0) Gecko/20100101 Thunderbird/45.2.0
MIME-Version: 1.0
In-Reply-To: <6755d8bb-3b95-c107-cd72-b799cb2b32f1@isi.edu>
Content-Type: text/plain; charset="utf-8"
Content-Transfer-Encoding: 7bit
Archived-At: <https://mailarchive.ietf.org/arch/msg/ietf/CMWOPXIyJIoY3Vv2vbCbtxkbA3I>
Cc: "tsv-art@ietf.org" <tsv-art@ietf.org>, Transport Area <tsv-area@ietf.org>, draft-ietf-6man-deprecate-atomfrag-generation@ietf.org, IETF discussion list <ietf@ietf.org>
X-BeenThere: ietf@ietf.org
X-Mailman-Version: 2.1.17
Precedence: list
List-Id: IETF-Discussion <ietf.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/ietf>, <mailto:ietf-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/ietf/>
List-Post: <mailto:ietf@ietf.org>
List-Help: <mailto:ietf-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/ietf>, <mailto:ietf-request@ietf.org?subject=subscribe>
X-List-Received-Date: Mon, 29 Aug 2016 22:50:30 -0000

On 30/08/2016 10:14, Joe Touch wrote:
> Hi, Fernando,
> 
> 
> On 8/29/2016 3:05 PM, Fernando Gont wrote:
>> On 08/28/2016 01:33 PM, Joe Touch wrote:
>>> Hi, Fernando,
>>>
>>> First, I'd like to note something more important about this doc - the
>>> abstract itself argues that this change should update the core IPv6
>>> spec. Given that is already well underway, why is this document even
>>> needed?
>> The document says it clearly: "documenting the
>>    motivation for removing this functionality in the revision of the
>>    core IPv6 protocol specification."
>>
>> You just don't remove a feature from a spec silently, without a
>> rationale. And the place to include the rationale wasn't rfc2460bis --
>> hence this dcument.
> 
> I don't agree. RFC2460bis should not need a roadmap to explain all of
> the associated changes and their rationales. That should be in 2460bis.

2460bis has pointers in such cases (and should include a pointer
to deprecate-atomfrag when it becomes an RFC). I don't think it is
helpful to readers of 2460bis to burden it with all the rationales.

> Otherwise, changes need to be made incrementally - that's a lot of extra
> load on the IETF and a lot of complexity to figure out why things are
> the way the end up.

I don't think 2460bis will be the end of history, any more than 791 was
the end of IPv4 history. Incremental change will continue.

Regards
     Brian

> 
> 
>>
>>
>>
>>
>>
>>>>> The impact of this change does not appear to have been explored. Section
>>>>> 3 ends with a claim that links where this translation issue would be a
>>>>> problem are rare, but there is no evidence presented as to whether
>>>>> current RFC 6145 translators would be capable of complying with the
>>>>> changes in this doc, e.g., to be able to generate IPv4 IDs as needed.
>>>>> I.e., this document needs to update RFC6145 Sec 5.1 to require that IPv4
>>>>> ID generation MUST be supported (and used), rather than MAY.
>>>> RFC 6145 has been revised as RFC7915.
>>> The second sentence of this draft cites 6145. You raise a good point,
>>> but given 7915 obsoletes 6145 (rather than updating it), all references
>>> throughout should then refer to 7915 instead.
>> Not really. We're documenting why this feature is being removed -- hence
>> there's a place for referencing RFC6145 ("state of affairs before any
>> updates") and RFC7915.
>>
>> All references to RFC6145 are of the form "legacy translators", or
>> "RFC6145 was...".
> 
> I don't think it's useful to refer in this doc to a spec that is already
> obsoleted.
> 
> This is further reason why it's not useful to issue separate change
> docs. It gets confusing as to what you're arguing and why.
> 
>>
>>>> The document concludes that the translator should create IPv4 IDs rather
>>>>> than relying on atomic fragments as a source of that information (as per
>>>>> RFC2460) because there is no benefit, but are two reasons why this
>>>>> method is directly hazardous as well: 1) RFC 2460 does not require that
>>>>> the IPv6 ID field is generated to ensure that the low 16-bits are unique
>>>>> as required for use as IPv4 IDs as defined in RFC 6145, and 2) RFC 6145
>>>>> translation could result in collisions where two distinct IPv6
>>>>> destinations are translated into the same IPv4 address, such that IDs
>>>>> that might have been generated to be unique in the IPv6 context could
>>>>> end up colliding when used in the translated IPv4 context. I.e., this
>>>>> does not require ECMP as implied in Section 3.
>>>> mmm.. not sure I follow. When we refer to ECMP in Section 3 we're
>>>> actually describing the only possible scenario in which relying on the
>>>> ID in the Frag Header could be of use (i.e., possibly result in lower
>>>> collision rates).
>>> I'm not speaking of when the ID in the Frag Header can be useful. I'm
>>> speaking of other more likely cases where using the low 16 bits of the
>>> IPv6 ID field can generate IPv4 collisions.
>> So you argue in favor of adding an extra bullet noting that RFC2460 does
>> not require the lower 16 bits to be unique? (just double-checking). If
>> so, fine with me.
> 
> Yes - specifically, 2460 does not require that the lower 16 bits of the
> ID are generated in a way that would comply with the expectations of
> using just those bits for IPv4.
> 
>>
>>>>> Minor issues:
>>>>>
>>>>> IMO, it remains unwise to continue to imply that networks should treat
>>>>> packets with fragment headers as an attack. Fragmentation support is
>>>>> critical to tunneling (see draft-ietf-intarea-tunnels) and we need to
>>>>> find ways to support their use safely. The text should be edited to
>>>>> explain that the primary motivation here is to avoid generating
>>>>> erroneous IPv4 ID fields, rather than to react to the incorrect
>>>>> classification of fragment headers as incompatible with the Internet.
>>>> Not sure what you mean.
>>>>
>>>> We're not implying that packets employing FH are an attack. FWIW, I
>>>> don't personally think so. We do think that, when employing
>>>> fragmentation, you open the door to a number of attack vectors. See
>>>> e.g., Section 5 of draft-gont-v6ops-ipv6-ehs-packet-drops-03.txt.
>>> Some of the attacks described are based on the widespread dropping of a
>>> valid IPv6 packet with valid IPv6 extension headers.
>>>
>>> IMO, it is important to be clear that this makes users of a legitimate
>>> IPv6 capability vulnerable because of incorrect behavior of routers. 
>> 1) The attack I referenced is just one possible attack. If you employ
>> fragmentation, an atacker could just send forged packets meant to cause
>> collisions of frag IDs such that your packets are dropped -- clearly
>> employing an extra feature (as in this case), creates an attack vector.
> There are many possible attacks but you focus on the one where routers
> drop packets because they have frag EHs.
> 
>> 2) The bahavior in routers is a policy. We may not like it. BUt it's a
>> policy, not incorrect behavior.
> EHs are not optional in RFC2460. Dropping because you see them is not
> policy - it forces the router to fail to support a required feature of IPv6.
> 
> 
>>
>>> It
>>> seems important to remind readers that the real issue here is the
>>> non-compliant routers. If that information isn't present, it implies
>>> that it is the use of the EHs that is incorrect and should be avoided in
>>> general. That's impossible for fragmentation - it is a critical
>>> capability without which tunneling cannot exist.
>> Fragmentation has been considered harmful for ages.
> 
> And is finally being understood as fundamentally necessary for tunneling.
> 
>>  And yes, we're
>> saying that if you *do not need it*, you shouldn't use it.
> Yes, if you don't need tunnels, you shouldn't use them either, but that
> doesn't mean tunnels shouldn't be used in general.
> 
> 
>>
>>>>> The claim that links with IPv6 MTUs smaller than 1260 are rare needs to
>>>>> be supported with evidence. I appreciate that such evidence may be
>>>>> difficult to observe. In the absence of evidence, the statement should
>>>>> be more clear that there is no evidence to the contrary -- which is not
>>>>> the same as being able to claim that they *are* in fact rare.
>>>> I see your point. Any suggestion on how to tweak the text?
>>> It depends on what you know. AFAICT, we have no information on this
>>> issue. If that's the case, then the text should just state the impact on
>>> such links and say that "there is no evidence yet as to the prevalence
>>> of their use".
>> I'll talk to my co-authors about this one.
> 
> AOK.
> 
> Thanks,
> Joe
> 
>