[IPv6]Re: Fwd: New Version Notification for draft-herbert-deprecate-eh-00.txt

Tom Herbert <tom@herbertland.com> Tue, 30 December 2025 23:11 UTC

Return-Path: <tom@herbertland.com>
X-Original-To: ipv6@mail2.ietf.org
Delivered-To: ipv6@mail2.ietf.org
Received: from localhost (localhost [127.0.0.1]) by mail2.ietf.org (Postfix) with ESMTP id A6CAEA0E3699 for <ipv6@mail2.ietf.org>; Tue, 30 Dec 2025 15:11:12 -0800 (PST)
X-Virus-Scanned: amavisd-new at ietf.org
X-Spam-Flag: NO
X-Spam-Score: -2.1
X-Spam-Level:
X-Spam-Status: No, score=-2.1 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, DKIM_SIGNED=0.1, DKIM_VALID=-0.1, DKIM_VALID_AU=-0.1, DKIM_VALID_EF=-0.1, RCVD_IN_DNSWL_NONE=-0.0001, SPF_HELO_NONE=0.001, SPF_PASS=-0.001] autolearn=ham autolearn_force=no
Authentication-Results: mail2.ietf.org (amavisd-new); dkim=pass (2048-bit key) header.d=herbertland.com
Received: from mail2.ietf.org ([166.84.6.31]) by localhost (mail2.ietf.org [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id drs0on_sV0jx for <ipv6@mail2.ietf.org>; Tue, 30 Dec 2025 15:11:12 -0800 (PST)
Received: from mail-lj1-x234.google.com (mail-lj1-x234.google.com [IPv6:2a00:1450:4864:20::234]) (using TLSv1.3 with cipher TLS_AES_128_GCM_SHA256 (128/128 bits) key-exchange X25519 server-signature ECDSA (P-256) server-digest SHA256) (No client certificate requested) by mail2.ietf.org (Postfix) with ESMTPS id 16E5AA0E3694 for <6man@ietf.org>; Tue, 30 Dec 2025 15:11:12 -0800 (PST)
Received: by mail-lj1-x234.google.com with SMTP id 38308e7fff4ca-37bbb36c990so97905951fa.0 for <6man@ietf.org>; Tue, 30 Dec 2025 15:11:11 -0800 (PST)
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=herbertland.com; s=google; t=1767136265; x=1767741065; darn=ietf.org; h=content-transfer-encoding:cc:to:subject:message-id:date:from :in-reply-to:references:mime-version:from:to:cc:subject:date :message-id:reply-to; bh=USsptFYMl151st4oRVlW0FAn7WwuX/wk9qVgCJvadSQ=; b=PyvvDz8FJVI5o76tQ2mvHhx0NQQERIVYamd4eCha9NahydSyUwL1QoIQEvM8WYTwQU 7lm71SN67GEMV2k4ENC9A9uP8InrkgpfB8ink+APbvztZC9PqfRFRwEgrivrO8wlgH2u xUxXy9s7M8FTut7xTsm2SKOIiVynpTJh/O2RPGKizC9jPDHCfVJilzvPELtVpD7iPzON XSYCxOkV9wWjPm1gACKLcI8gzusYZn/qPQjdNBAyTM9eoxvojEDu+6ZDPy/ZKVYrO7Wk 67Q+w57zoxS5MO2RFTE9POlNjIqn02WBHqKnmPwhBgEFSzJSlOSurvYkoGonIx8FsHm5 Vgpw==
X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20230601; t=1767136265; x=1767741065; h=content-transfer-encoding:cc:to:subject:message-id:date:from :in-reply-to:references:mime-version:x-gm-gg:x-gm-message-state:from :to:cc:subject:date:message-id:reply-to; bh=USsptFYMl151st4oRVlW0FAn7WwuX/wk9qVgCJvadSQ=; b=oUdG3WSdwPkPBKqQctg8XzPlUcAtr8HNquFGb9sz2LShRT2wYzuVAcU+B4YOFK5s8N Z9kc+5CF81UcSSJm+FbdGWi423r3Db+0/AKGUYJ7BGoF/XUvEWboC9OWjX1WsMYJh58P z6UdhsexUAhwWwDVe2CXxQzCBH2nhPX0I2AJqf+H86g3Zf83x+SwLVsGdmufZrTK6rQ+ PDKoC2YM4ysjqBddf2phfI2jDZB13liVUo+Na3rTzb+kuTS7c1jRKNazwOtZ+vxOhEQF uFAo6T8nRSWfDzBg9JgHqdPnoYVNkxFr0El9U+JSsSxbciaiAFYL1cxbJCh4Z9cT4TJP 4bMQ==
X-Forwarded-Encrypted: i=1; AJvYcCVjgbemdfhEJrEABwORjTMrEY4c9mIyesTgZ6TkGn3jDxa6BiDdAF/AxoyXLHnez5ElwjPe@ietf.org
X-Gm-Message-State: AOJu0YypkRS8jMN7DooWjKmhcYdhGcVjkVxRmg6+hyK4toyhx5wPswua IYzVFH3k8le6ukuhNc0rGRl+SikzkrXtY6fOm78MgO9jpMcESagJmeWJMLtsMHnOP3sHTBBaih0 H6XvL2psNpN6F8kRNkSAmvmVTjklrjOPc7Bs1HnYy
X-Gm-Gg: AY/fxX6tWLTp7GbgHd2WlscS4W/8Cd23hGVHEREbxyU62TOXYlgUFALTLFg2ySiH3AZ yG+vK19nDrPHk9DMz84eF1CRte75P1r4c+ZsMJPVZGZbqWJkNeD6fspJm+x8oAPMtpTvzALw/jZ hzFahIwkNlcyNPPpG0HCfO0RpR8OAJ3h9Ck8PN2ELEFZdOPKftfzu+glqp8xvYeZMHcI6/dwtXT QBg4HPq0eKLerW/bYwnCS5cGCYjn1UTJVA49SMNVHdZXc/vhJ1/KIDkncZd4KDj9dJ5zQhXQGdR BktPfM0J9DRmXieNJyfMOyKxtKUyPOUq7lxeVlikdYqfGobZKwxfTamQheI=
X-Google-Smtp-Source: AGHT+IH4sDPbA/Ht7W+jCxZthhgsQjqKPRb9UznF4WLxx9DZOPutpoAYqp5QyHUPG2lDXszCUaq/H5JHRHpSosvUklM=
X-Received: by 2002:a05:651c:1602:b0:336:8dcf:1742 with SMTP id 38308e7fff4ca-38113248c46mr112922391fa.12.1767136264647; Tue, 30 Dec 2025 15:11:04 -0800 (PST)
MIME-Version: 1.0
References: <176678724056.1402966.14218264572401004152@dt-datatracker-5656579b89-p6k4r> <CALx6S35pqE9LTAyWeH3ho1Qa6wMcA1_M9TOUoKW6meFGdnNViA@mail.gmail.com> <7BB77C6F-E6C7-412C-A8D3-6228FE1F556A@gmx.de> <dc481be2-14ec-436a-b9c6-2a2ae570272f@gmail.com> <CAO42Z2xUzQYzyc3xyxuTHw7bEcSLq3gDV0EDx=zGHcAujh_wFA@mail.gmail.com> <ec5124ec-6047-4e25-987a-cc02abd0ef0b@gmail.com>
In-Reply-To: <ec5124ec-6047-4e25-987a-cc02abd0ef0b@gmail.com>
From: Tom Herbert <tom@herbertland.com>
Date: Tue, 30 Dec 2025 15:10:53 -0800
X-Gm-Features: AQt7F2q07ykdYLKmBYVs4KjJHwgHDbr_eEuyPeh_f_t74jNy76V-PKHpVhxUrOo
Message-ID: <CALx6S34mxd_Ary=fROVZgPDR7zqkfPs8kWpO9DYmU8B+9V=z+A@mail.gmail.com>
To: Brian E Carpenter <brian.e.carpenter@gmail.com>
Content-Type: text/plain; charset="UTF-8"
Content-Transfer-Encoding: quoted-printable
Message-ID-Hash: 6LUBBTITQWQL2OAHEUTGM4NE56CLIMPP
X-Message-ID-Hash: 6LUBBTITQWQL2OAHEUTGM4NE56CLIMPP
X-MailFrom: tom@herbertland.com
X-Mailman-Rule-Misses: dmarc-mitigation; no-senders; approved; emergency; loop; banned-address; member-moderation; header-match-ipv6.ietf.org-0; nonmember-moderation; administrivia; implicit-dest; max-recipients; max-size; news-moderation; no-subject; digests; suspicious-header
CC: Sebastian Moeller <moeller0@gmx.de>, 6MAN <6man@ietf.org>
X-Mailman-Version: 3.3.9rc6
Precedence: list
Subject: [IPv6]Re: Fwd: New Version Notification for draft-herbert-deprecate-eh-00.txt
List-Id: "IPv6 Maintenance Working Group (6man)" <ipv6.ietf.org>
Archived-At: <https://mailarchive.ietf.org/arch/msg/ipv6/Fof0KxbYnkKCVTYwWSSAS_B33O4>
List-Archive: <https://mailarchive.ietf.org/arch/browse/ipv6>
List-Help: <mailto:ipv6-request@ietf.org?subject=help>
List-Owner: <mailto:ipv6-owner@ietf.org>
List-Post: <mailto:ipv6@ietf.org>
List-Subscribe: <mailto:ipv6-join@ietf.org>
List-Unsubscribe: <mailto:ipv6-leave@ietf.org>

On Tue, Dec 30, 2025 at 2:58 PM Brian E Carpenter
<brian.e.carpenter@gmail.com> wrote:
>
> On 31-Dec-25 10:54, Mark Smith wrote:
> > If IPv6 EHs are such a big problem, why haven't IPv4 options been removed decades ago?
>
> I think because everybody knows that the Internet is opaque to them, so it's never been worth anybody's time to write an RFC. The difference with IPv6 is that they have long been touted as an IPv6 advantage, so people keep trying to use them for new things.
>
> >
> > It's starting to sound a bit chicken little to me.
>
> Well, as Tom has been pointing out, the concern about DoS is real enough, which is why common operational practice is to filter them. And the Internet was already stated to be opaque to IPv4 options when I first started attending IETF meetings, even though DoS was not much of an active threat then. So the sky isn't falling, because operators have already mitigated the risk, both for IPv4 (since 1990s) and IPv6.

Brian,

Also, there is a lot more code to support extension headers than IPv4
options, and that code is deployed across billions of devices.
Maintaining code for a protocol that is unused is not free. And if
code isn't being used and maintained and potential issues aren't being
addressed then the code is nothing more than a liability and it needs
to be removed. It really does come down to "use it or lose it".

Tom

>
>     Brian
>
> >
> > On Wed, 31 Dec 2025, 06:49 Brian E Carpenter, <brian.e.carpenter@gmail.com <mailto:brian.e.carpenter@gmail.com>> wrote:
> >
> >     Sebastian,
> >
> >      > It seems sad, that we are on the path of making that impossible.
> >
> >     Indeed. However, there is a difference between:
> >
> >     (a) Changing the IETF Standard to remove EH from the protocol (except for a few exceptions such as ESP).
> >
> >     (b) Issuing an operational Best Current Practice strongly recommending filtering EH (except for a few exceptions) at network boundaries.
> >
> >     (b) would leave space for future changes that (a) would exclude.
> >
> >     Regards/Ngā mihi
> >          Brian Carpenter
> >
> >     On 31-Dec-25 08:26, Sebastian Moeller wrote:
> >      > Hi Tom,
> >      >
> >      > so I agree that this might be the wisest thing to do.
> >      > I am a bit sad though, because I have this pet usage for which an EH might actually be a decent solution:
> >      > Late 2023 there was a draft (Congestion Signaling (CSIG) draft-ravi-ippm-csig-00) that offered a way forward for better congestion/capacity signalling beyond drops and 1bit ECN marking.
> >      > It was an IMHO undeservedly shunned draft that showed ways to bring capacity signalling into the not so new-anymore millenium. To recap, the core of the idea was that all hops along a path (which might be a single switch in the original design or multiple routers) aggregate information about their capacity along a path, e.g. the minimum relative available capacity, and the endpoint can extract relevant capacity changes along the path from that and hence can react to looming capacity shortfalls instead of simply slow.staring itself into transient over-load.
> >      >
> >      > Somewhat unfortunately It had picked L2 as the home for the information, making it purposefully unsuitable for internet usage#. IMHO the same principle of information collection works just as well over the internet, except we replace L2 headers and L2 switches with L3 headers and L3-routers... So I am searching for an L3 header with preferably predictable position that can be modified potentially by all nodes along a path and that can also be read by the endpoint. My limited understanding of EHs told me that either a Hop-by-Hop option (which can be modified by all hops along a path) or an unencrypted destination option (that will be read be the endpoint) are candidates here (and for the DO one would need to accept on path modification*).
> >      > It seems sad, that we are on the path of making that impossible.
> >      >
> >      > Regards
> >      >       Sebastian
> >      >
> >      >
> >      > #) IMHO not the most sensible approach for a draft for the _internet_ engineering task force....
> >      > *) I am fine with that, I could not care less about theoretical taxonomy of different EH types
> >      >
> >      >
> >      >> On 26. Dec 2025, at 23:16, Tom Herbert <tom=40herbertland.com@dmarc.ietf.org <mailto:40herbertland.com@dmarc.ietf.org>> wrote:
> >      >>
> >      >> Happy Holidays 6man!
> >      >>
> >      >> I've posted a new draft on deprecating extension headers on the
> >      >> Internet. Comment are appreciated!
> >      >>
> >      >> Thanks,
> >      >> Tom
> >      >>
> >      >> ---------- Forwarded message ---------
> >      >> From: <internet-drafts@ietf.org <mailto:internet-drafts@ietf.org>>
> >      >> Date: Fri, Dec 26, 2025 at 2:14 PM
> >      >> Subject: New Version Notification for draft-herbert-deprecate-eh-00.txt
> >      >> To: Tom Herbert <tom@herbertland.com <mailto:tom@herbertland.com>>
> >      >>
> >      >>
> >      >> A new version of Internet-Draft draft-herbert-deprecate-eh-00.txt has been
> >      >> successfully submitted by Tom Herbert and posted to the
> >      >> IETF repository.
> >      >>
> >      >> Name:     draft-herbert-deprecate-eh
> >      >> Revision: 00
> >      >> Title:    Deprecating IPv6 Extension Headers on the Internet
> >      >> Date:     2025-12-26
> >      >> Group:    Individual Submission
> >      >> Pages:    10
> >      >> URL: https://www.ietf.org/archive/id/draft-herbert-deprecate-eh-00.txt <https://www.ietf.org/archive/id/draft-herbert-deprecate-eh-00.txt>
> >      >> Status: https://datatracker.ietf.org/doc/draft-herbert-deprecate-eh/ <https://datatracker.ietf.org/doc/draft-herbert-deprecate-eh/>
> >      >> HTMLized: https://datatracker.ietf.org/doc/html/draft-herbert-deprecate-eh <https://datatracker.ietf.org/doc/html/draft-herbert-deprecate-eh>
> >      >>
> >      >>
> >      >> Abstract:
> >      >>
> >      >>    This document describes the deprecation of IPv6 extension headers on
> >      >>    the Internet with the exception of Encapsulating Security Payload.
> >      >>    Deprecation is motivated by three factors: 1) the data shows high
> >      >>    discard rates for packets with extension headers sent over the
> >      >>    Internet, 2) extension headers can be used for Denial of Service
> >      >>    attack and are replete with other security vulnerabilities, 3) the
> >      >>    high loss rates are a disincentive to develop new extension headers
> >      >>    or options that might be useful or fix known problems.  This document
> >      >>    recommends that extension headers, other than Encapsulating Security
> >      >>    Payload, be relegated to use only in limited domains and that packets
> >      >>    with extension headers should be discarded at boundary routers of
> >      >>    limited domains.
> >      >>
> >      >>
> >      >>
> >      >> The IETF Secretariat
> >      >>
> >      >> --------------------------------------------------------------------
> >      >> IETF IPv6 working group mailing list
> >      >> ipv6@ietf.org <mailto:ipv6@ietf.org>
> >      >> List Info: https://mailman3.ietf.org/mailman3/lists/ipv6@ietf.org/ <https://mailman3.ietf.org/mailman3/lists/ipv6@ietf.org/>
> >      >> --------------------------------------------------------------------
> >      >
> >      > --------------------------------------------------------------------
> >      > IETF IPv6 working group mailing list
> >      > ipv6@ietf.org <mailto:ipv6@ietf.org>
> >      > List Info: https://mailman3.ietf.org/mailman3/lists/ipv6@ietf.org/ <https://mailman3.ietf.org/mailman3/lists/ipv6@ietf.org/>
> >      > --------------------------------------------------------------------
> >     --------------------------------------------------------------------
> >     IETF IPv6 working group mailing list
> >     ipv6@ietf.org <mailto:ipv6@ietf.org>
> >     List Info: https://mailman3.ietf.org/mailman3/lists/ipv6@ietf.org/ <https://mailman3.ietf.org/mailman3/lists/ipv6@ietf.org/>
> >     --------------------------------------------------------------------
> >