Re: Mirja Kühlewind's Discuss on draft-ietf-6man-rfc2460bis-09: (with DISCUSS and COMMENT)

Suresh Krishnan <suresh.krishnan@gmail.com> Mon, 17 April 2017 03:57 UTC

Return-Path: <suresh.krishnan@gmail.com>
X-Original-To: ipv6@ietfa.amsl.com
Delivered-To: ipv6@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id D684B127076; Sun, 16 Apr 2017 20:57:33 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -1.999
X-Spam-Level:
X-Spam-Status: No, score=-1.999 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, DKIM_SIGNED=0.1, DKIM_VALID=-0.1, DKIM_VALID_AU=-0.1, FREEMAIL_FROM=0.001, RCVD_IN_DNSWL_NONE=-0.0001, SPF_PASS=-0.001, URIBL_BLOCKED=0.001] autolearn=ham autolearn_force=no
Authentication-Results: ietfa.amsl.com (amavisd-new); dkim=pass (2048-bit key) header.d=gmail.com
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id 6aSUiCJvyfz9; Sun, 16 Apr 2017 20:57:32 -0700 (PDT)
Received: from mail-ua0-x235.google.com (mail-ua0-x235.google.com [IPv6:2607:f8b0:400c:c08::235]) (using TLSv1.2 with cipher ECDHE-RSA-AES128-GCM-SHA256 (128/128 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id 51AAE1201F2; Sun, 16 Apr 2017 20:57:32 -0700 (PDT)
Received: by mail-ua0-x235.google.com with SMTP id f10so47014333uaa.2; Sun, 16 Apr 2017 20:57:32 -0700 (PDT)
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=gmail.com; s=20161025; h=mime-version:in-reply-to:references:from:date:message-id:subject:to :cc:content-transfer-encoding; bh=9qSpwBJiuyxckedV/XhoXy+EnzY8fg3sSjqfpbHew2Y=; b=koQH4LQu5efIp09KuO0r9mNRqoaMjKpA+MTZh5gByON6oNd3K4MebJqfQH/18KvNZq BMRBTfE7lHGfdKHPZnUEoPkWYK09towaJapkV22gJLsFyv4InhatGc/xxx/+FZYwM9UU VYMML1UANN89k0iY2H+0N8XtKjUtdae27AbsQgeD85rtC0BUIWsHoGtG8VHpLxARBL/p ATxzuUVNQ6/Kz7/emT7GAqHngvIHPxhfhfit2JKa4G36Isc/51zH10WCZNfkDaAUBr7a mG39LB3asugJTAjtLfYuMLQ5BYg41LWTQnBVqhURTmjW6vv8dHmBoPx0PC8PJ3ZL1LQb EN2A==
X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20161025; h=x-gm-message-state:mime-version:in-reply-to:references:from:date :message-id:subject:to:cc:content-transfer-encoding; bh=9qSpwBJiuyxckedV/XhoXy+EnzY8fg3sSjqfpbHew2Y=; b=RTc8sKRoroZ7x/y+tgpLiPq62UPgA+j6D/eEUv0tsoZBsBUpte5VnVF34aXQZJ4rB/ NoiNvqI2KLw0zk33IeTv8MDrckyfwDxPGPJr8wfOaqDqh95C/2BKCsMvVhJhVGtvK0Qc 4IbYqLax7fzXrg71bKN7XFYhS7MWhI1BkKmsIhCkfqEsV+iR5rrBVJI+ykMZV/8t+yoh Nmx3tcdDdF6fyLPlB5YSaKtAOCLrDA4ij7uaUTw6p9/25p9o9nH/EzgXHI+ASQYgTqo+ WXGZqJCHMT0cXNPb+euD4+Nf1i8HV454jNOuUbEmkRGzB8jqdkX8bfSxQhxpQE7AIoY1 1Ggw==
X-Gm-Message-State: AN3rC/42ozlpJfWg5rDxuoKW6PFs6iCIPFqx2ByKpaAyabf5U5e1JNkj emdm7wWhIl0XGHqDsckVn6IWLw/+bw==
X-Received: by 10.176.81.246 with SMTP id h51mr9047506uaa.75.1492401451160; Sun, 16 Apr 2017 20:57:31 -0700 (PDT)
MIME-Version: 1.0
Received: by 10.103.123.214 with HTTP; Sun, 16 Apr 2017 20:57:30 -0700 (PDT)
In-Reply-To: <90DFC565-B4E7-45E2-BE6A-0B67895E87F8@gmail.com>
References: <149201127005.15808.3277140025315157500.idtracker@ietfa.amsl.com> <248F8BA5-48D6-4933-B45F-7F1B20477C2C@employees.org> <3C06A5F9-19B9-48E1-BB67-57D540E5E38D@kuehlewind.net> <A5628A89-3830-4851-87F1-AE8329597DAE@gmail.com> <58B249A0-2F0B-4AD6-890D-BB0F0594DEE1@kuehlewind.net> <0c7d3a7b-99c9-dbef-d6cc-9a4a94cb9c9f@gmail.com> <4AE56E75-78D4-43EA-8118-8195FD8A3D08@kuehlewind.net> <4fc2ef36-cd17-58f1-8089-a5645f08ad45@gmail.com> <D7EE44C3-04DB-4CFD-836F-2BFA74A35268@employees.org> <90DFC565-B4E7-45E2-BE6A-0B67895E87F8@gmail.com>
From: Suresh Krishnan <suresh.krishnan@gmail.com>
Date: Sun, 16 Apr 2017 23:57:30 -0400
Message-ID: <CA+MHpBr7aeuyd8h5n6U6Q4jD_gtLCKsPJUgQqQuhgkEE3DGwqg@mail.gmail.com>
Subject: Re: Mirja Kühlewind's Discuss on draft-ietf-6man-rfc2460bis-09: (with DISCUSS and COMMENT)
To: Bob Hinden <bob.hinden@gmail.com>
Cc: Ole Trøan <otroan@employees.org>, draft-ietf-6man-rfc2460bis@ietf.org, IPv6 List <ipv6@ietf.org>, "Mirja Kuehlewind (IETF)" <ietf@kuehlewind.net>, IESG <iesg@ietf.org>, Brian Carpenter <brian.e.carpenter@gmail.com>, 6man-chairs@ietf.org
Content-Type: text/plain; charset="UTF-8"
Content-Transfer-Encoding: quoted-printable
Archived-At: <https://mailarchive.ietf.org/arch/msg/ipv6/2SkiipcUaeGK_jgDHjJ1QJ_dXNc>
X-BeenThere: ipv6@ietf.org
X-Mailman-Version: 2.1.22
Precedence: list
List-Id: "IPv6 Maintenance Working Group \(6man\)" <ipv6.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/ipv6>, <mailto:ipv6-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/ipv6/>
List-Post: <mailto:ipv6@ietf.org>
List-Help: <mailto:ipv6-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/ipv6>, <mailto:ipv6-request@ietf.org?subject=subscribe>
X-List-Received-Date: Mon, 17 Apr 2017 03:57:34 -0000

Hi Mirja/Bob,


On Sun, Apr 16, 2017 at 11:38 AM, Bob Hinden <bob.hinden@gmail.com> wrote:
> Hi,
>
>> On Apr 16, 2017, at 4:57 AM, otroan@employees.org wrote:
>>
>> Brian, Mirja,
>>
>>>>> This combination of circumstances creates a "Catch-22" situation
>>>>> [Heller] for the deployment of any newly standardised extension
>>>>> header except for local use.  It cannot be widely deployed because
>>>>> existing middleboxes will drop it on many paths through the Internet.
>>>>> However, most middleboxes will not be updated to allow the new header
>>>>> to pass until it has been proved safe and useful on the open
>>>>> Internet, which is impossible until the middleboxes have been
>>>>> updated.
>>>>>
>>>>> So, defining new IPv6 extension headers is not recommended, because
>>>>> they probably won't work across the Internet. But it isn't a MUST NOT,
>>>>> because if there was a compelling operational case, we could do it and
>>>>> the middleboxes would follow.
>>>>
>>>> First of all yes, giving further explanation/background is definitely a good thing to do, and maybe also provide a reference to rfc7045 if appropriate.
>>>>
>>>> I think I agree that I would not like to make a normative statement here, given that the circumstances are not due to the protocol design itself but because of the current deployment situation we have (which in theory could change in future).
>>>>
>>>> However, instead of making a clear recommendation to not every define a new extension header, I think I would prefer if the text was phrased in the a way that would make the risk clear, give a clear recommendation to rather use destination options if suitable, and then say nothing else.
>>>>
>>>> Maybe you can work on some new text and then have a quick (?) check with the wg which text is preferred. If there is clear consensus for one way by the wg I will not further block this.
>>>
>>> I think I will leave that for the document editor. A large part of RFC7045 is about this issue but Bob can probably see best how to integrate it here.
>>
>> I think what is in the document already is representing the working group consensus.
>> The issues of new / unknown extension headers, and how to distinguish these from new transport protocols have been discussed from many angles. The two main reasons for the strong recommendation against new extension headers are:
>> - most uses are already accommodated with the 3 existing containers options (routing. hbh and destination)
>> - sharing the same number space with IP protocols, makes it hard for intermediate devices depending on parsing the header chain to find transport information if new headers were introduced.
>>
>> There is already an opening / provision in the text for new extension headers. The text only asks for these considerations to be made, before proposing new ones.
>
> I agree.
>
> I also note that the text in this section was derived from RFC6564, which updated RFC2460.  Specifically from Section 3 of RFC6564:
>
>    Mindful of the need for compatibility with existing IPv6 deployments,
>    new IPv6 extension headers MUST NOT be created or specified, unless
>    no existing IPv6 extension header can be used by specifying a new
>    option for that existing IPv6 extension header.

Yes. This text was arrived at after a lot of discussion in the 6man WG
during the development of the draft that became RFC6564.

>
> New extension headers are allowed (just not recommended) and the next paragraph in the Section specifies a format that should be used for new Extension headers.  I think there is a lot of flexibility going forward.

Yep. I think the above warning is issued because a node processing an
unknown extension header will simply drop it, and this makes
incremental deployability of these new extension headers difficult
over the Internet.

Thanks
Suresh