Re: [Int-area] New Version Notification for draft-herbert-ipv4-eh-03.txt

Tom Herbert <tom@herbertland.com> Fri, 22 March 2024 15:16 UTC

Return-Path: <tom@herbertland.com>
X-Original-To: int-area@ietfa.amsl.com
Delivered-To: int-area@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id E7C85C1D5C77 for <int-area@ietfa.amsl.com>; Fri, 22 Mar 2024 08:16:28 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -7.107
X-Spam-Level:
X-Spam-Status: No, score=-7.107 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, DKIM_SIGNED=0.1, DKIM_VALID=-0.1, DKIM_VALID_AU=-0.1, DKIM_VALID_EF=-0.1, RCVD_IN_DNSWL_HI=-5, RCVD_IN_ZEN_BLOCKED_OPENDNS=0.001, SPF_HELO_NONE=0.001, SPF_PASS=-0.001, T_SCC_BODY_TEXT_LINE=-0.01, URIBL_DBL_BLOCKED_OPENDNS=0.001, URIBL_ZEN_BLOCKED_OPENDNS=0.001] autolearn=ham autolearn_force=no
Authentication-Results: ietfa.amsl.com (amavisd-new); dkim=pass (2048-bit key) header.d=herbertland.com
Received: from mail.ietf.org ([50.223.129.194]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id l_X00El6_p9Q for <int-area@ietfa.amsl.com>; Fri, 22 Mar 2024 08:16:24 -0700 (PDT)
Received: from mail-ed1-x52e.google.com (mail-ed1-x52e.google.com [IPv6:2a00:1450:4864:20::52e]) (using TLSv1.3 with cipher TLS_AES_128_GCM_SHA256 (128/128 bits) key-exchange X25519 server-signature RSA-PSS (2048 bits) server-digest SHA256) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id DF895C1D5C6B for <int-area@ietf.org>; Fri, 22 Mar 2024 08:16:24 -0700 (PDT)
Received: by mail-ed1-x52e.google.com with SMTP id 4fb4d7f45d1cf-56890b533aaso2783308a12.3 for <int-area@ietf.org>; Fri, 22 Mar 2024 08:16:24 -0700 (PDT)
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=herbertland.com; s=google; t=1711120583; x=1711725383; darn=ietf.org; h=content-transfer-encoding:cc:to:subject:message-id:date:from :in-reply-to:references:mime-version:from:to:cc:subject:date :message-id:reply-to; bh=DQNi/Io7+Vm5yH5266suLKsApdUgVvvZHJ33VS+G06U=; b=Hvp4dlauG1IFL3O94EPR9o95rLdzJcsqFKoHbKPvWdK310IO6nCXpTyQAVqm7c/qT6 rR3Xue/UhzKpyjG3QiR1MoFO8M4+s88n3StFiclPesQPdxMPTtwHjHOMju0tXuT0NlRm KMmTX/jEHvw0SSASXjidgLD6bo0pDcXz52vBf0U85DIm1e6oyq9nNNUKKzH0Ur5Y1U05 3sPkKPUMZAkpU+dja/6IQkRXDQzaM9tO/HULaTl0ZNvo57DNZCU2s+OR1NcpnrBy+jQh 82ifBAw1ERP+v3ikyphkWRcUxQUKNQyEnxIZIX7ZdycYFq8dntjhYfs7quqT0wSMRfLU AqwA==
X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20230601; t=1711120583; x=1711725383; h=content-transfer-encoding:cc:to:subject:message-id:date:from :in-reply-to:references:mime-version:x-gm-message-state:from:to:cc :subject:date:message-id:reply-to; bh=DQNi/Io7+Vm5yH5266suLKsApdUgVvvZHJ33VS+G06U=; b=LaC+arJUivePAC0SqhfsUCHHal7PI2/EARLvhsCqp5mh7LPLStL0mjzBvI4Bhobn8m CyQF+rXj2lpt6+6mDw61LSUpAo2uvoyjoyRE7vaT9rTaj3rurxyjeM0yhnTwoYQOnLMx TowawNB/yvNmWF6a9cjnaDcnPPCqaiz1RSERS0N1Yk8sU+BQxs7kfnuxZ/eBi5YHc50n XnkjkbUV/c+sfRXHa/AMvM9wyn/eVqh5vivgZZ9i0QhwBuo3T7kcPm5A/3U3fAHvX0Ip eq8qGGuo1pLsWDD2NN7oyVpEw5S0PsZzGpVboqQ0mqnnQG1oy+inXMsqVwlokciRiHcm IAzQ==
X-Forwarded-Encrypted: i=1; AJvYcCWwAM2uZjBFxufV5Y4DHbO8ib7v3YnNPicYj88kOE+uMZQR3/6/Sim7YhqrQHWyn5UQij1qRzqIJC/VxXdLTjUFFw==
X-Gm-Message-State: AOJu0Yy/9u8iEuJMO6CcIxF0BusNpVfCVce2O8fKL7O0QChN2jIn63CX z4WrAyW+10X8PMAG0YblwN59ZWPd0Y1cB13g0nBBI3ij50i4hk6MnduNF1HvEl3aoq61uwDabsL OaJhHhWaBwFUwG2WIRMFx/Ca3LHY7eDI52I3RofV1g4B0gOBdPQ==
X-Google-Smtp-Source: AGHT+IFqFLO5IfFFjsryC9+YGtVfSjDFUbR+weRf3RVfNkNgs3AytEg6akHWpCsG98/OQVlQVZ7cjuGDFu8oxLbhvM4=
X-Received: by 2002:a50:9b44:0:b0:568:be6d:e5e5 with SMTP id a4-20020a509b44000000b00568be6de5e5mr1599126edj.37.1711120583150; Fri, 22 Mar 2024 08:16:23 -0700 (PDT)
MIME-Version: 1.0
References: <170865175505.14082.3856617737779580933@ietfa.amsl.com> <CALx6S363oh+7rNMaMa0s+9A-xeyLBy+ct-Q_Bx0xQm_di1PPJA@mail.gmail.com> <ZeZjGyxmuapXz5tb@faui48e.informatik.uni-erlangen.de> <CALx6S34OFL7tzabL+RMvB3nkad5k9esCD_dFpMi6DUtUEG-Dmg@mail.gmail.com> <ZedO1u7aheBhZ26N@faui48e.informatik.uni-erlangen.de> <ZfurRK_oNVES2hVz@faui48e.informatik.uni-erlangen.de> <CALx6S36L57vPa5YkiV3khYbFpPPgPUVynWaRVno0BufvXcALeA@mail.gmail.com> <Zfu5GQ7101lMnHGs@faui48e.informatik.uni-erlangen.de> <DCE2D4E2-9C5D-40B7-952F-7424E7FCBAFE@strayalpha.com> <CALx6S37XnjWcpeGZUQWXFyE0jP=XyodmUBBh+69SonLw3ndvaQ@mail.gmail.com> <57C622DE-2C8E-4415-805D-7053309B0D01@strayalpha.com> <CALx6S36Dpn0qC9e0ZGaK-ckbT58hRkeLHDKkNqmmJn0vQ5ONUw@mail.gmail.com> <B1CC8B09-A701-4401-8BEA-C31DE0FD0FD3@strayalpha.com> <CALx6S354xQHqk4y+0dTkTQ524n5vrN01gJe57FBjbV1UuToWLA@mail.gmail.com> <FF84650B-6739-4D12-B390-977627A1296E@strayalpha.com> <CALx6S34ePRxNNqx1TOSon9=QgKvq0wJh7mMFRH7gr2OUjZ_zmw@mail.gmail.com> <E89DABED-3612-4B18-93FF-4FB31A072508@strayalpha.com> <CALx6S34F0FTyUhf8ew0tAuyaLJquRPdiOHVnT0OE7pFAQY+c_Q@mail.gmail.com> <0087c4475ce244848354c2755cb8e3f3@huawei.com> <SN6PR08MB392050BC6FEA009B4BDBDF16E6312@SN6PR08MB3920.namprd08.prod.outlook.com>
In-Reply-To: <SN6PR08MB392050BC6FEA009B4BDBDF16E6312@SN6PR08MB3920.namprd08.prod.outlook.com>
From: Tom Herbert <tom@herbertland.com>
Date: Fri, 22 Mar 2024 08:16:11 -0700
Message-ID: <CALx6S354H_bExgjeRiqbB7KoBZoHqnRHOHPNR1Th70-ZLzCJOA@mail.gmail.com>
To: "Robinson, Herbie" <Herbie.Robinson=40stratus.com@dmarc.ietf.org>
Cc: Antoine FRESSANCOURT <antoine.fressancourt@huawei.com>, Joe Touch <touch@strayalpha.com>, Toerless Eckert <tte@cs.fau.de>, int-area <int-area@ietf.org>
Content-Type: text/plain; charset="UTF-8"
Content-Transfer-Encoding: quoted-printable
Archived-At: <https://mailarchive.ietf.org/arch/msg/int-area/QYtMErEC82FAFaKaf7HcBltlOCk>
Subject: Re: [Int-area] New Version Notification for draft-herbert-ipv4-eh-03.txt
X-BeenThere: int-area@ietf.org
X-Mailman-Version: 2.1.39
Precedence: list
List-Id: IETF Internet Area WG Mailing List <int-area.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/int-area>, <mailto:int-area-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/int-area/>
List-Post: <mailto:int-area@ietf.org>
List-Help: <mailto:int-area-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/int-area>, <mailto:int-area-request@ietf.org?subject=subscribe>
X-List-Received-Date: Fri, 22 Mar 2024 15:16:29 -0000

On Fri, Mar 22, 2024 at 7:40 AM Robinson, Herbie
<Herbie.Robinson=40stratus.com@dmarc.ietf.org> wrote:
>
> Legitimate reasons for a middle box to look at transport headers:
>

Herbie,

Whether something is "legitimate" is a matter of opinion, protocol
conformance typically is not.

>
>
> Firewalls need to look at port numbers to perform their quite necessary job.

For applications and hosts firewalls are not all necessary to do their
job and have created way more problems for developers than they solve.
In fact, in the 6man meeting the other day someone pointed out that
the effect of NAT has been to move the problems and complexity out of
the network into the host and application-- as a host developer I  can
say that this statement is spot on.

>
> Anything forwarding packets (including NICs) needs to make sure TCP packets for a given IP/port/IP/port go through the same path to avoid re-ordering.

That would be great if TCP was the only transport protocol. But it's
not. What about UDP, DCCP, SCTP, GRE, IPsec, IPIP, IP fragments, and
others?  There is a simple answer for this, use the IPv6 flow label
instead of port number to get the proper effect regardless of the
encapsulated IP protocol and routers don't need to parse deep into the
packet to find the port numbers. IPv4 doesn't have a flow label, but
this draft proposes using IPID for that with non-fragmented packets.

>
> Note that firewalls usually have a hardware assisted fast path and a software based slow path.  Any new protocol features will kick packets into the slow path until the hardware gets updated (and that’s if the hardware gets updated).

Right, and this is exactly what drives use to limit packets on the
Internet to perpetually use the least common denominator of support in
the network. The result is an ossified Internet that we can no longer
evolve-- IMO that's not a good thing!

Tom

>
>
>
>
>
> ________________________________
>
> Hello,
>
>
>
> Interestingly, there is a similar discussion going on in Spring around the C-SID draft, about whether people think it is legitimate for intermediate nodes to be able to parse / process / check information that are supposed to be used by end nodes or not. This goes with checksum, port numbers, segment IDs, etc.
>
>
>
> I think that acknowledging the possibility for middleboxes to look at and modify fields that are supposed to be looked at and checked by end nodes is an issue, and breaks fundamental end to end assumptions that are foundational in the Internet design. Thus, I think we should allow shim headers (you can name them IPv4 extension headers if you want) to be deployed between IPv4 header and Transport layer protocol, provided they get a proper protocol number. Of course, this will break the operation of middleboxes that try to look at information in transport headers, but they should not look at those information in the first place, or at least do it in a robust way.
>
>
>
> Best regards,
>
>
>
> Antoine
>
>
>
> From: Int-area <int-area-bounces@ietf.org> On Behalf Of Tom Herbert
> Sent: vendredi 22 mars 2024 04:49
> To: Joe Touch <touch@strayalpha.com>
> Cc: Toerless Eckert <tte@cs.fau.de>; int-area <int-area@ietf.org>
> Subject: Re: [Int-area] New Version Notification for draft-herbert-ipv4-eh-03.txt
>
>
>
>
>
> On Thu, Mar 21, 2024, 8:28 PM touch@strayalpha.com <touch@strayalpha.com> wrote:
>
> <Joe>
>
>
>
> You’ve just described a transport protocol that the intermediate nodes know.
>
>
>
> Joe,
>
>
>
> A transport protocol doesn't meet the requirements. They don't work with any transport protocol other than themselves,
>
>
>
> They do when you define them that way, i.e., “here’s a transport protocol header A, after which you can use any transport protocol, as indicated in field X”.
>
>
>
> and intermediate nodes cannot robustly parse transport headers
>
>
>
> They can’t parse these either. But, if upgraded to do so for headers “A”, as per above.
>
>
>
> This has to be L3 protocol.
>
>
>
> It’s not. It’s L4, or at least that’s what it is* to IP.
>
>
>
> Joe,
>
>
>
> Please give one concrete example of a transport protocol explicitly designed to be processed and modified by intermediate nodes. If you say TCP as in modifying port numbers for NAT, I'll point out it that the TCP was never designed for this, it breaks TCP Auth option, and QUIC closed this architectural aberration by encrypting the transport layer so that intermediate nodes can't muck with it :-)
>
>
>
> IMO, network nodes have no business participating in transport layer, doing so has led to a lot of protocol ossification.
>
>
>
> Tom
>
>
>
>
>
>
>
> IPv6 can call them extensions because all IPv6 nodes already know what to do with them, even for codepoints they’ve never seen. IPv4 implementations have no knowledge of this new transport protocol - only those who have been upgraded.
>
>
>
> No different in principle - or implementation - than DCCP or SCTP.
>
> No easier to deploy.
>
> No more unique utility, IMO.
>
>
>
> Joe
>
>
>
> *All protocol layers are relative, so you COULD do the following:
>
>
>
> IPa IPb UDPc UDPd
>
>
>
> To IPa, its view of itself is layer 3, IPb is layer 4, not an extension to layer 3.
>
>
>
> To IPb, its view of itself is layer 3, IPa is layer 2 and UDPc is layer 4.
>
>