Re: Usable extension headers [Re: New Version Notification for draft-voyer-6man-extension-header-insertion-08.txt]

Ole Troan <otroan@employees.org> Fri, 29 November 2019 08:06 UTC

Return-Path: <otroan@employees.org>
X-Original-To: ipv6@ietfa.amsl.com
Delivered-To: ipv6@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id CA0671200DB for <ipv6@ietfa.amsl.com>; Fri, 29 Nov 2019 00:06:22 -0800 (PST)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -1.9
X-Spam-Level:
X-Spam-Status: No, score=-1.9 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, SPF_HELO_NONE=0.001, SPF_PASS=-0.001] autolearn=ham autolearn_force=no
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id XC3CqW64M2YO for <ipv6@ietfa.amsl.com>; Fri, 29 Nov 2019 00:06:21 -0800 (PST)
Received: from clarinet.employees.org (clarinet.employees.org [198.137.202.74]) (using TLSv1.2 with cipher ADH-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id 5F91512008D for <6man@ietf.org>; Fri, 29 Nov 2019 00:06:21 -0800 (PST)
Received: from astfgl.hanazo.no (unknown [IPv6:2a02:2121:34e:7636:cc3f:ba58:76c8:1667]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by clarinet.employees.org (Postfix) with ESMTPSA id 9589C4E11BD9; Fri, 29 Nov 2019 08:06:20 +0000 (UTC)
Received: from [IPv6:::1] (localhost [IPv6:::1]) by astfgl.hanazo.no (Postfix) with ESMTP id 72D83241E68D; Fri, 29 Nov 2019 09:06:17 +0100 (CET)
Content-Type: text/plain; charset="us-ascii"
Mime-Version: 1.0 (Mac OS X Mail 13.0 \(3601.0.10\))
Subject: Re: Usable extension headers [Re: New Version Notification for draft-voyer-6man-extension-header-insertion-08.txt]
From: Ole Troan <otroan@employees.org>
In-Reply-To: <07f06c2f-adb0-7e8c-0c7a-e7988c7baa40@gmail.com>
Date: Fri, 29 Nov 2019 09:06:17 +0100
Cc: Tim Chown <Tim.Chown@jisc.ac.uk>, 6MAN <6man@ietf.org>
Content-Transfer-Encoding: quoted-printable
Message-Id: <655FB627-D605-465B-AB17-2DE1FD94FBD8@employees.org>
References: <157422734071.5406.14331301768750185617.idtracker@ietfa.amsl.com> <851F7007-3DD5-42F3-8884-8842DA07EE53@cisco.com> <1cfd682f-d6bc-a697-38a7-933aa0485b8a@si6networks.com> <D4436EF5-2B97-44A4-915D-EF7611590B51@steffann.nl> <ccf6cbe6-c837-64e3-b25e-d3fa8e3b7bcb@si6networks.com> <E68CE93F-4C3E-44FB-B4B5-7C6FC6799E47@gmail.com> <554baf9b-2a7f-8098-8203-e7d3277b549b@gmail.com> <CALx6S36L5AWEaXmccpKoENxOEv-XRCmTsq1bCqi06J_YgJGZdg@mail.gmail.com> <ecb3c877-c347-fd3a-86de-8f05fe8b7459@gmail.com> <CALx6S353m9b9b2b+Yt3x-g=BZuE6vwcOoGGfq4BPONVscnQ=xg@mail.gmail.com> <d9c2e11b-53b4-e281-e869-28802a76c72f@gmail.com> <CALx6S346p=M09ZPY_xM2X3gkPp_0KUVZU_u4UeLUagomRnjhPw@mail.gmail.com> <79d22e5a-0145-9ad9-e965-d3744b58c3bf@gmail.com> <d791c9eee34c4e019292fc74d629217c@boeing.com> <5d2af468-be61-d2ca-5bf0-35d5f71fdb6c@gmail.com> <6A41AB04-F56B-46E1-8B8B-3E24B928A042@jisc.ac.uk> <1B629A88-AE10-4F65-8D3D-FD2702B6D63D@employees.org> <07f06c2f-adb0-7e8c-0c7a-e7988c7baa40@gmail.com>
To: Brian E Carpenter <brian.e.carpenter@gmail.com>
X-Mailer: Apple Mail (2.3601.0.10)
Archived-At: <https://mailarchive.ietf.org/arch/msg/ipv6/CXahABhvFBT70uauTQ_A2IjiQjI>
X-BeenThere: ipv6@ietf.org
X-Mailman-Version: 2.1.29
Precedence: list
List-Id: "IPv6 Maintenance Working Group \(6man\)" <ipv6.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/ipv6>, <mailto:ipv6-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/ipv6/>
List-Post: <mailto:ipv6@ietf.org>
List-Help: <mailto:ipv6-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/ipv6>, <mailto:ipv6-request@ietf.org?subject=subscribe>
X-List-Received-Date: Fri, 29 Nov 2019 08:06:23 -0000

Brian,

> On 28 Nov 2019, at 23:06, Brian E Carpenter <brian.e.carpenter@gmail.com> wrote:
> 
> On 29-Nov-19 00:03, Ole Troan wrote:
> ...> RFC7872 was (IMNSHO) based on the flawed belief that any end-host/service end-point should accept arbitrary extension headers.
> 
> I don't think so. The extension header mechanism was designed on a "consenting adults" model where all that matters is that both end points support a particular header type. (With two exceptions: the fragment header and the hop-by-hop options header, which are both significant en route. The routing header is *not* an exception to that model.) RFC7872 might be construed as testing whether that model is viable, but it doesn't imply any particular belief about end systems afaik.

The belief in the document is that what you get from Alexa's list of web sites will give you an address of a fully compliant IPv6 system. And that it will support:

   o IPv6 packets with a Destination Options header of 8 bytes;

   o  IPv6 packets resulting in two IPv6 fragments of 512 bytes each
      (approximately); and

   o  IPv6 packets with a Hop-by-Hop Options header of 8 bytes.

The IP address you get back from an AAAA query of the Alexa list is rarely an IPv6 host. The IP address represents an abstract service point.
There is a fairly complicated set of infrastructure behind that IP addresss. Load balancers, NATs, NAT64s etc.
But the point is that the service profile is known in the infrastructure.

And if there are no valid use case for any packet with a DH, FH or HBH. Why would you think that an operator of such a service should not drop those packets on the floor?
That's the flawed assumption in this document.

HBH is different, as a router punt flag. RFC7872 essentially asks "if we ever came up with a useful HBH option, how would it fare in the Internet?". One would expect numbers to be skewed since no Internet deployable HBH option existed at the point of measurement.
There are improvements in RFC8200 and I'd believe most old boxes that had serious problems with HBH are largely phased out. And we for the first time have an Internet wide HBH option defined (PMTUD). Gorry et al is running measurements of that now. And I believe he has already found some ASs that block HBH.

Cheers,
Ole