IETF Last Call conclusion for draft-ietf-6man-rfc2460bis-08

Suresh Krishnan <suresh.krishnan@ericsson.com> Wed, 15 March 2017 02:47 UTC

Return-Path: <suresh.krishnan@ericsson.com>
X-Original-To: ipv6@ietfa.amsl.com
Delivered-To: ipv6@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 2CFE212940C; Tue, 14 Mar 2017 19:47:20 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -4.201
X-Spam-Level:
X-Spam-Status: No, score=-4.201 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, RCVD_IN_DNSWL_MED=-2.3, SPF_PASS=-0.001] autolearn=ham autolearn_force=no
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id iCELpv5bVM0E; Tue, 14 Mar 2017 19:47:18 -0700 (PDT)
Received: from usplmg20.ericsson.net (usplmg20.ericsson.net [198.24.6.45]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id 7FF25129452; Tue, 14 Mar 2017 19:47:18 -0700 (PDT)
X-AuditID: c618062d-d73ff700000009d8-3d-58c8bc457bc5
Received: from EUSAAHC005.ericsson.se (Unknown_Domain [147.117.188.87]) by (Symantec Mail Security) with SMTP id C6.AE.02520.54CB8C85; Wed, 15 Mar 2017 05:00:05 +0100 (CET)
Received: from EUSAAMB107.ericsson.se ([147.117.188.124]) by EUSAAHC005.ericsson.se ([147.117.188.87]) with mapi id 14.03.0319.002; Tue, 14 Mar 2017 22:47:10 -0400
From: Suresh Krishnan <suresh.krishnan@ericsson.com>
To: "ietf@ietf.org" <ietf@ietf.org>, 6man WG <ipv6@ietf.org>
CC: "draft-ietf-6man-rfc2460bis.all@ietf.org" <draft-ietf-6man-rfc2460bis.all@ietf.org>
Subject: IETF Last Call conclusion for draft-ietf-6man-rfc2460bis-08
Thread-Topic: IETF Last Call conclusion for draft-ietf-6man-rfc2460bis-08
Thread-Index: AQHSnTZv71giYAPcbUKK9ywM4gSjvg==
Date: Wed, 15 Mar 2017 02:47:06 +0000
Message-ID: <599257D7-532D-4512-929B-D124623EAF35@ericsson.com>
Accept-Language: en-US
Content-Language: en-US
X-MS-Has-Attach: yes
X-MS-TNEF-Correlator:
x-originating-ip: [147.117.188.11]
Content-Type: multipart/signed; boundary="Apple-Mail=_935C0C0C-E7E4-489E-B3E7-4CA2A452A3C8"; protocol="application/pkcs7-signature"; micalg="sha1"
MIME-Version: 1.0
X-Brightmail-Tracker: H4sIAAAAAAAAA+NgFmpnkeLIzCtJLcpLzFFi42KZXLonXNd1z4kIg8f/9C1evb3GZvFs43wW i5dn3zM5MHssWfKTKYAxissmJTUnsyy1SN8ugStj172fbAVLXSpWnVzA2sB40K6LkZNDQsBE 4siht8wgtpDAekaJvi9FXYxcQPZyIHvHLFaQBBtQ0Yadn5lAbBEBG4mZu3rB4swCkRInHi5g A7GFBVwknu7dwQZR4ymxbuNhFghbT6Lj8RawOIuAqsSS9y1AvRwcvAL2Ek9PhIGEGQXEJL6f WsMEMVJc4taT+UwQt4lIPLx4mg3CFpV4+fgfK4StJPHx93x2kDuZBaYwSkzvXwn2AK+AoMTJ mU9YJjAKzUIyaxayullI6iCKtCWWLXwNFOcAsnUkJi9khAibSrw++hHKtpaY8esgG4StKDGl +yH7AkaOVYwcpcUFObnpRgabGIFRckyCTXcH4/3pnocYBTgYlXh4C1hPRAixJpYVV+YeYlQB an20YfUFRimWvPy8VCUR3jsLgdK8KYmVValF+fFFpTmpxYcYpTlYlMR541bfDxcSSE8sSc1O TS1ILYLJMnFwSjUwSvk3inxzNin2P5T0Of7qwgVCQkejCm+pH3I5VRiQvefVB0mrPR8aKpa3 MS+asaT7dOGTlfvWsyZl33tTcnTRqocalktm63F79KyZdFX9V9u5Mt8WBp2mHNUfa18zbf74 5c+6BJvdwbXTvbM+zRcr6ypqK/I4+O5kjZif1U1/ZpYlsU6n+xIWKLEUZyQaajEXFScCACc/ ShSaAgAA
Archived-At: <https://mailarchive.ietf.org/arch/msg/ipv6/-q1-wXMqcBnF3wQN3wSKHki5OXA>
X-BeenThere: ipv6@ietf.org
X-Mailman-Version: 2.1.22
Precedence: list
List-Id: "IPv6 Maintenance Working Group \(6man\)" <ipv6.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/ipv6>, <mailto:ipv6-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/ipv6/>
List-Post: <mailto:ipv6@ietf.org>
List-Help: <mailto:ipv6-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/ipv6>, <mailto:ipv6-request@ietf.org?subject=subscribe>
X-List-Received-Date: Wed, 15 Mar 2017 02:47:20 -0000

Thanks to everyone who commented during the IETF Last Call of draft-ietf-6man-rfc2460bis-08. The IETF last call discussion for this draft was mainly focused around the text in Section 4 that discusses the handling of extension headers. The biggest concern raised was that the current text is ambiguous on whether header insertion is allowed on intermediate nodes or not. There were some people arguing that an explicit prohibition is not necessary as the text is already clear, while others believed that explicitly listing the prohibitions will minimize any misunderstandings in the future. There was also a small number of people who wanted to explicitly allow header insertion and describe how to do it, but this was clearly out of scope for this draft (but may be in scope for future work in 6man). Overall, no one argued against the fact that the intent of the text in RFC2460 was to forbid insertion of extension headers on any other node but the source of the packet.  The only argument made against adding clarifying text was that the text was already clear. Given this, I believe there is consensus to add explicit text about header insertion into the draft before it progresses further. I have discussed this with the editor and the document shepherd and would like to propose the following text change.

OLD (from -08):

 The insertion of Extension Headers by any node other than the source
 of the packet causes serious problems.  Two examples include breaking
 the integrity checks provided by the Authentication Header Integrity
 [RFC4302], and breaking Path MTU Discovery which can result in ICMP
 error messages being sent to the source of the packet that did not
 insert the header, rather than the node that inserted the header.

 One approach to avoid these problems is to encapsulate the packet
 using another IPv6 header and including the additional extension
 header after the first IPv6 header, for example, as defined in
 [RFC2473]

 With one exception, extension headers are not processed by any node
 along a packet's delivery path, until the packet reaches the node (or
 each of the set of nodes, in the case of multicast) identified in the
 Destination Address field of the IPv6 header...

NEW:

 With one exception, extension headers are not examined, processed,
 inserted, or deleted by any node along a packet's delivery path,
 until the packet reaches the node (or each of the set of nodes, in
 the case of multicast) identified in the Destination Address field of
 the IPv6 header...

Please feel free to comment either privately or on list if you have any concerns with this resolution going forward.

Regards
Suresh

P.S.: There were also other editorial issues that were raised during last call and they should be addressed in the next version of the draft