[IPv6]Re: Fwd: New Version Notification for draft-herbert-deprecate-eh-00.txt
"Bonica, Ron" <ronald.bonica@hpe.com> Mon, 29 December 2025 21:31 UTC
Return-Path: <ronald.bonica@hpe.com>
X-Original-To: ipv6@mail2.ietf.org
Delivered-To: ipv6@mail2.ietf.org
Received: from localhost (localhost [127.0.0.1]) by mail2.ietf.org (Postfix) with ESMTP id 24C26A07CC18; Mon, 29 Dec 2025 13:31:45 -0800 (PST)
X-Virus-Scanned: amavisd-new at ietf.org
X-Spam-Flag: NO
X-Spam-Score: -2.794
X-Spam-Level:
X-Spam-Status: No, score=-2.794 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, DKIMWL_WL_HIGH=-0.001, DKIM_SIGNED=0.1, DKIM_VALID=-0.1, DKIM_VALID_AU=-0.1, DKIM_VALID_EF=-0.1, HTML_MESSAGE=0.001, RCVD_IN_DNSWL_LOW=-0.7, RCVD_IN_MSPIKE_H3=0.001, RCVD_IN_MSPIKE_WL=0.001, RCVD_IN_VALIDITY_RPBL_BLOCKED=0.001, RCVD_IN_VALIDITY_SAFE_BLOCKED=0.001, SPF_HELO_NONE=0.001, SPF_NONE=0.001] autolearn=ham autolearn_force=no
Authentication-Results: mail2.ietf.org (amavisd-new); dkim=pass (2048-bit key) header.d=hpe.com
Received: from mail2.ietf.org ([166.84.6.31]) by localhost (mail2.ietf.org [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id mcyjKh-EwBtz; Mon, 29 Dec 2025 13:31:43 -0800 (PST)
Received: from mx0a-002e3701.pphosted.com (mx0a-002e3701.pphosted.com [148.163.147.86]) (using TLSv1.3 with cipher TLS_AES_256_GCM_SHA384 (256/256 bits) key-exchange X25519 server-signature ECDSA (P-256) server-digest SHA256) (No client certificate requested) by mail2.ietf.org (Postfix) with ESMTPS id 7AB8CA07CC0E; Mon, 29 Dec 2025 13:31:42 -0800 (PST)
Received: from pps.filterd (m0134421.ppops.net [127.0.0.1]) by mx0b-002e3701.pphosted.com (8.18.1.11/8.18.1.11) with ESMTP id 5BTHWnBk1047076; Mon, 29 Dec 2025 21:31:41 GMT
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=hpe.com; h=cc :content-type:date:from:in-reply-to:message-id:mime-version :references:subject:to; s=pps0720; bh=NwnT2djpplfLibYbMyO6f5WovU WHv8cPzKk2TcjWbyQ=; b=Mas5cdfkHyqatl405I5Q7eWk4FeBASA9nHxI1liRR9 ZdBLqVFbKyQ1uXXtpfqrrjYvjzwhLVBfmTggc15tr4iMdHaTROyu+ft0fVtckO4W myUDXoNk3z6EZ+BA/K/8umw5dIEc9uHjZSWayfUtQ2CVPw3r3jWKstSjG+d7gDrH KNdxAV6ccijqVq4qEGHN3i4ZvXCHb4Yf00cdeOa4d5uREu6cyumujNxyVOtrlotV U6rRBCnNKRg+io1BY/8IgcYXv2z5/3WVuk9u56UC9IUYA3KmSFdhuPG/goFIzc/r P+pxlRj6M/i9TSe++H5dRkRMqKuM3xlX6qsH8IO1wkNA==
Received: from p1lg14878.it.hpe.com (p1lg14878.it.hpe.com [16.230.97.204]) by mx0b-002e3701.pphosted.com (PPS) with ESMTPS id 4bbwt51k95-1 (version=TLSv1.3 cipher=TLS_AES_256_GCM_SHA384 bits=256 verify=NOT); Mon, 29 Dec 2025 21:31:41 +0000 (GMT)
Received: from p1wg14926.americas.hpqcorp.net (unknown [10.119.18.115]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by p1lg14878.it.hpe.com (Postfix) with ESMTPS id B0EF8D291; Mon, 29 Dec 2025 21:31:40 +0000 (UTC)
Received: from p1wg14926.americas.hpqcorp.net (10.119.18.115) by p1wg14926.americas.hpqcorp.net (10.119.18.115) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id 15.2.2562.17; Mon, 29 Dec 2025 09:31:27 -1200
Received: from p1wg14919.americas.hpqcorp.net (16.230.19.122) by p1wg14926.americas.hpqcorp.net (10.119.18.115) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id 15.2.2562.17 via Frontend Transport; Mon, 29 Dec 2025 09:31:27 -1200
Received: from BL2PR08CU001.outbound.protection.outlook.com (192.58.206.35) by edge.it.hpe.com (16.230.19.122) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id 15.2.2562.17; Mon, 29 Dec 2025 09:31:09 -1200
ARC-Seal: i=1; a=rsa-sha256; s=arcselector10001; d=microsoft.com; cv=none; b=bALliMcSHQerL6eb+Qr7fMw5iF/1pTZ44DH5fzqodt0DZEZaRfHsaHS2AmTekvtyOwRw9rBykU9EFhw6NA8P5DK9P6yzCoRZiREl+s0JpCZ0HJuVYb7SxFdLBmTSMiBgQBxA7VDp3NGRnzjP4/4zuMsvPlGAdmF2a0kJfQG17pjWDJRRV0Z5Vw1pBMH6gZ18mb0Y/f/ofU+ciU4MBU3RHfiUpZ35yyqvjcM+0kAIBK6v7mYbugFQotJOK6OKwaQiczJ18PNiwqFV5tcsl0K3WdmTI+u2V9iO6VA7fWK0Cec5a+iPnJhKprsa7MW8ykRwWbuPiUI7McFdUFY+3PaCzQ==
ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=microsoft.com; s=arcselector10001; h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-AntiSpam-MessageData-ChunkCount:X-MS-Exchange-AntiSpam-MessageData-0:X-MS-Exchange-AntiSpam-MessageData-1; bh=NwnT2djpplfLibYbMyO6f5WovUWHv8cPzKk2TcjWbyQ=; b=LQNAjbX0L5GJ4cmqBFJlB1Ews3K5hOqaxQpRb2TOdMcfMKk0LB8MkzOBOSu2i40LVEaxpoTn+6SChVEqk0GrXaonu0LGD9mRhwNkz1SMIu4Om/DwjYxJlwxthR/yCcXBRsYIkJOM0f303qLkxKV0gtzyqePs5iUR2vlifkcEf8BcSyDVJQQVnFCxy1OwtC3gL7No4WlHCevdfLwhhhAZjlGhBQRs5SkW9dM/Cq7KTO98xYUVv89mIGa0vW0/ByD2S4n4I+KTQreSSvo3wfFDRKh4oYj99tjolQYloRoK93KZ00xmiEOdLVGahtg9lxDdK3qNRhOTSOOqgkLJZhoAZg==
ARC-Authentication-Results: i=1; mx.microsoft.com 1; spf=pass smtp.mailfrom=hpe.com; dmarc=pass action=none header.from=hpe.com; dkim=pass header.d=hpe.com; arc=none
Received: from DM4PR84MB2310.NAMPRD84.PROD.OUTLOOK.COM (2603:10b6:8:51::18) by SJ0PR84MB2230.NAMPRD84.PROD.OUTLOOK.COM (2603:10b6:a03:438::19) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id 15.20.9456.14; Mon, 29 Dec 2025 21:31:07 +0000
Received: from DM4PR84MB2310.NAMPRD84.PROD.OUTLOOK.COM ([fe80::611e:d918:927a:5994]) by DM4PR84MB2310.NAMPRD84.PROD.OUTLOOK.COM ([fe80::611e:d918:927a:5994%5]) with mapi id 15.20.9456.013; Mon, 29 Dec 2025 21:31:07 +0000
From: "Bonica, Ron" <ronald.bonica@hpe.com>
To: Tom Herbert <tom=40herbertland.com@dmarc.ietf.org>
Thread-Topic: [IPv6]Fwd: New Version Notification for draft-herbert-deprecate-eh-00.txt
Thread-Index: AQHcdrVqEz62+vTXXkyYDPIWOWVmerU4sv9igAALYACAADUObYAAJBIAgAAIqkQ=
Date: Mon, 29 Dec 2025 21:31:07 +0000
Message-ID: <DM4PR84MB2310E1B6CDDA152F21D19528F4BFA@DM4PR84MB2310.NAMPRD84.PROD.OUTLOOK.COM>
References: <176678724056.1402966.14218264572401004152@dt-datatracker-5656579b89-p6k4r> <CALx6S35pqE9LTAyWeH3ho1Qa6wMcA1_M9TOUoKW6meFGdnNViA@mail.gmail.com> <DM4PR84MB23100480ED3768A4A1EDD21AF4BFA@DM4PR84MB2310.NAMPRD84.PROD.OUTLOOK.COM> <CALx6S34d-1Bkq0u5K+68ZtRY8rnpOgOb7A2hq2VGGS9r2GbePw@mail.gmail.com> <DM4PR84MB231001288985FB3D4C8168D1F4BFA@DM4PR84MB2310.NAMPRD84.PROD.OUTLOOK.COM> <CALx6S368Z2C+w-xdabGr5W-qPQJ-SgiKeJujj2fimEnr-+resA@mail.gmail.com>
In-Reply-To: <CALx6S368Z2C+w-xdabGr5W-qPQJ-SgiKeJujj2fimEnr-+resA@mail.gmail.com>
Accept-Language: en-US
Content-Language: en-US
X-MS-Has-Attach:
X-MS-TNEF-Correlator:
msip_labels:
x-ms-publictraffictype: Email
x-ms-traffictypediagnostic: DM4PR84MB2310:EE_|SJ0PR84MB2230:EE_
x-ms-office365-filtering-correlation-id: d76ef5fa-ebd2-4762-baa7-08de472193c8
x-ms-exchange-senderadcheck: 1
x-ms-exchange-antispam-relay: 0
x-microsoft-antispam: BCL:0;ARA:13230040|1800799024|376014|366016|38070700021|7053199007|13003099007|8096899003;
x-microsoft-antispam-message-info: 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
x-forefront-antispam-report: CIP:255.255.255.255;CTRY:;LANG:en;SCL:1;SRV:;IPV:NLI;SFV:NSPM;H:DM4PR84MB2310.NAMPRD84.PROD.OUTLOOK.COM;PTR:;CAT:NONE;SFS:(13230040)(1800799024)(376014)(366016)(38070700021)(7053199007)(13003099007)(8096899003);DIR:OUT;SFP:1101;
x-ms-exchange-antispam-messagedata-chunkcount: 1
x-ms-exchange-antispam-messagedata-0: bafUycDB1eHor4V663PluJiFRWaI99p49JbTDaWP90OQrhTgp+8WO4Jn3jqdzfE6o3HOJwb2nV2jtI/V22SXtIVXBCtncx9kVsmBxyu3Q/07ehGKrMX7aSdcfdae1gm9sUiiLI+mFzcdWV7P+APs9Qo7CKgy6b9V9ZYZPzZig0cjBjMNxhElIV49EhCHH3o3kqf408RrIFLHyRHulFesu2Mh8wORAnXYpEwLw8CIgIMhz+nIVugvt4mVpBfr/9MvzOUyct/WOuoNQuSnS1kpyT5svFfsAeyEHQ3NiYOI+ExBOHz7qt65uQl7T+SnoXsh7A38EFrPWx30KTXT1sxvfQeyEU19EzEddnJJvXnNA6s6nbMd9r8JdlcqjFajfUt73LM/tB1fc64gBX4GF1U9paI8AQPfLK/S8yAe6tzTy0ywESY/wiXxH59fr9aS2rfUrWdTEDPffCGxeGnhW11Urkp4T2geije4oOVe15I0doCyfE6xYq7uoe/hf1p6QfcMMCkucYe7nX90iiuB6hZXVlnm7JMV/+vXDBbVipXQJaB7o8B1b/D66YZwTrGOZNPTQ0WeYMbDSb3LknkQprPFNr7MpBgh7XNuh4oU3wU4hiWmKRTTl51Zvo8GMvWKFRWfn7YchuqeaXgW8CCVafmK7+Eq7ORH7cL5IDVvTYtHTKxQ+xIk35kGEELFxrecEXstHpHi1cbGkZwXvPwSklO/vvsoyxBVAgVGx7Pw0Y+dO2a9kK40VDjniNd7D6nRli9buXLIa6lBHmdygff5BD16cNujyIMzVICMC7Y0Hl5lz+xxcYVTESS9wjqhviLaTVeItrW1YIYbAhA5FD9+mqFhgRK/fQAI1MsNUBXaShIDXW/zs8eyPdfENgDu4CEegZhjBunU3YkYpmbZA1VPZXaxEW5LaUY8CcPyvA9lssIJhS2X0fRUXR6ENqojBwB7GRXdGwaNnlTsJ1vEyp5D8Kox/5AUSC3BKHKcE0KF/x4Fd5g0vnMqlkrrNzUP0EAfbfJA4yfhRcd1JvN4e22HwOU+8/z0OOe3yk/QLsF6/ykIHV5kSwBnjaasgtTVr+jukCnfblZ3+WKqB9Z8b2f4J1vevXfYuWYSm7KMalgLkCDbfPGDDkjoROKHPJZ3XMvqfSaTnOuXKE+Zn3D6iRyzQf9DfE1gWeqe9AAEchowrNqgr8nFuRREgzGIkSGUXaupjRkyghfIRKJ1qGYLNRSe5SarUzYzZpSzHcf+77VkERranBmrC3po1rGnDQPJ5DGXZ2jPv5LVojbXbjL4Re7mEElO8g+sq4F9hsxV1dkjp3J0AjnYMSF+VArO/E9Z1StiTdJJvPEgq39nAl6tEgjMPST/O7Xg5HYU99B4QOsqsh4HhZb94Df3wmaCdg4e8DuzyAeUEUlx5pAgEXMxKArJBD5VSaEgB6umlnYLBKZx9RlGgE5T1bl2r9pSmAmtM79eGADT2yr1yeqcA7ZP3etfr25eitddhXz23mrVMVLi0UPLDnqUZBX3wOIT90VNHqKgXR46okiFUquQy9QjsxDF02caP7cDvRtJcZPGHV6hOQIjj6P7EBY/8zIzoEqhvyS7KpGwAJcd7+Je2n9+xuFUtpjQU+4wemXfwzXCluCgq39t0ScrVceDBkHDZ7XyzDM1I67crWLmtIawXpalA4KTFVe65E9jOFLxbdc0nYqwZ0TcJS/inNgpKeGrc1gemjTBUiTj
Content-Type: multipart/alternative; boundary="_000_DM4PR84MB2310E1B6CDDA152F21D19528F4BFADM4PR84MB2310NAMP_"
MIME-Version: 1.0
X-MS-Exchange-CrossTenant-AuthAs: Internal
X-MS-Exchange-CrossTenant-AuthSource: DM4PR84MB2310.NAMPRD84.PROD.OUTLOOK.COM
X-MS-Exchange-CrossTenant-Network-Message-Id: d76ef5fa-ebd2-4762-baa7-08de472193c8
X-MS-Exchange-CrossTenant-originalarrivaltime: 29 Dec 2025 21:31:07.1453 (UTC)
X-MS-Exchange-CrossTenant-fromentityheader: Hosted
X-MS-Exchange-CrossTenant-id: 105b2061-b669-4b31-92ac-24d304d195dc
X-MS-Exchange-CrossTenant-mailboxtype: HOSTED
X-MS-Exchange-CrossTenant-userprincipalname: EYnc/kBf4P29XCtwO7ocSUV08ppqeuXCh8n1dPNeq4ixlcVx+ibKX44M2djThvVUyME6w2tFwQGBdBwPmLXbaw==
X-MS-Exchange-Transport-CrossTenantHeadersStamped: SJ0PR84MB2230
X-OriginatorOrg: hpe.com
X-Authority-Analysis: v=2.4 cv=M45A6iws c=1 sm=1 tr=0 ts=6952f33d cx=c_pps a=UObrlqRbTUrrdMEdGJ+KZA==:117 a=UObrlqRbTUrrdMEdGJ+KZA==:17 a=z/mQ4Ysz8XfWz/Q5cLBRGdckG28=:19 a=lCpzRmAYbLLaTzLvsPZ7Mbvzbb8=:19 a=xqWC_Br6kY4A:10 a=wP3pNCr1ah4A:10 a=VkNPw1HP01LnGYTKEx00:22 a=48vgC7mUAAAA:8 a=MvuuwTCpAAAA:8 a=2JrL-qRpAAAA:8 a=v7Kmh0ZId6EZaytiZbYA:9 a=QEXdDO2ut3YA:10 a=qOIX6rivGe0QGzUf:21 a=frz4AuCg-hUA:10 a=_W_S_7VecoQA:10 a=u-Ic724avHVFXizCq7cn:22
X-Proofpoint-ORIG-GUID: Vod2UYPp3xb-D708gVhS3Bs5LRZF_Q08
X-Proofpoint-Spam-Details-Enc: AW1haW4tMjUxMjI5MDE5NiBTYWx0ZWRfX7rRwDYLdOa4A 7Iqt0tgfp51nLfVwgdzxg23Z7/qM5cVV8lyBh4cowz48cUGew82nkAy66tIjiW6y5NIRuQpsDYn hU7tC/xaB4Cnp6AxAEeG8La4GmXhzhrSVKVnSgJbWUdCnnQ8fo9C0frjV8WCz9NuBlUvirZVB4f A11oo9unKzHgN057X1uYtgb3WoK1vN7hXRtXkdVHIM7/rTT55Uzk82+vKMZE4Hu4eg4tHT+p/UR NxzbertymR+n7xT6i/NYSAtvV4aTe36shaOnEe1fKnHX/TFxCC68gbj0L7lW4hV9mwolFax5hmf tqi38C3oEbt32oaBZECV4VQ+SY2mvJVmKDKu3bRnVl7FGRNPp+qFzZLFUryvxvyuCwdvm57M4eS Rbo811yJwnhab8wMf22AkVAIC+KB0xSVYbdG6ZLWlaR5Gz3+V8quv5Y+BOFfot5loWZuspk9i5A uZx6uS9KiiTuC4FnlXw==
X-Proofpoint-GUID: Vod2UYPp3xb-D708gVhS3Bs5LRZF_Q08
X-HPE-SCL: -1
X-Proofpoint-Virus-Version: vendor=baseguard engine=ICAP:2.0.293,Aquarius:18.0.1121,Hydra:6.1.9,FMLib:17.12.100.49 definitions=2025-12-29_06,2025-12-29_01,2025-10-01_01
X-Proofpoint-Spam-Details: rule=outbound_notspam policy=outbound score=0 phishscore=0 suspectscore=0 impostorscore=0 bulkscore=0 lowpriorityscore=0 malwarescore=0 spamscore=0 clxscore=1015 priorityscore=1501 adultscore=0 classifier=typeunknown authscore=0 authtc= authcc= route=outbound adjust=0 reason=mlx scancount=1 engine=8.22.0-2512120000 definitions=main-2512290196
Message-ID-Hash: 4AALYV6FZJ2CLI67GJLXYNWUJMVX5XIS
X-Message-ID-Hash: 4AALYV6FZJ2CLI67GJLXYNWUJMVX5XIS
X-MailFrom: ronald.bonica@hpe.com
X-Mailman-Rule-Misses: dmarc-mitigation; no-senders; approved; emergency; loop; banned-address; member-moderation; header-match-ipv6.ietf.org-0; nonmember-moderation; administrivia; implicit-dest; max-recipients; max-size; news-moderation; no-subject; digests; suspicious-header
CC: 6MAN <6man@ietf.org>
X-Mailman-Version: 3.3.9rc6
Precedence: list
Subject: [IPv6]Re: Fwd: New Version Notification for draft-herbert-deprecate-eh-00.txt
List-Id: "IPv6 Maintenance Working Group (6man)" <ipv6.ietf.org>
Archived-At: <https://mailarchive.ietf.org/arch/msg/ipv6/G1yNKnfaAfxy6HOeH0CFYOUL8Is>
List-Archive: <https://mailarchive.ietf.org/arch/browse/ipv6>
List-Help: <mailto:ipv6-request@ietf.org?subject=help>
List-Owner: <mailto:ipv6-owner@ietf.org>
List-Post: <mailto:ipv6@ietf.org>
List-Subscribe: <mailto:ipv6-join@ietf.org>
List-Unsubscribe: <mailto:ipv6-leave@ietf.org>
Inline.......RB> ________________________________ From: Tom Herbert <tom=40herbertland.com@dmarc.ietf.org> Sent: Monday, December 29, 2025 3:33 PM To: Bonica, Ron <ronald.bonica@hpe.com> Cc: 6MAN <6man@ietf.org> Subject: Re: [IPv6]Fwd: New Version Notification for draft-herbert-deprecate-eh-00.txt On Mon, Dec 29, 2025 at 10:42 AM Bonica, Ron <ronald.bonica=40hpe.com@dmarc.ietf.org> wrote: > > Tom, > > You can extend the definition of "limited domain" to include every network that deploys ACLs at its edge. But you cannot mandate or even recommend that all networks maintain the same set of ACLs at their edge. Hi Ron, Why not? SRV6 already requires SR packets to be filtered as a MUST. That's because it's bad to leak SR packets into the Internet, and very bad to accept them from untrusted sources. The same logic seems to apply to other extension headers, at least HBH. RB> Because every network has unique security requirements. For example, assume that my network processes the IPv6 Minimum Path MTU Hop-by-Hop Option [RFC 9268] on the forwarding plane. Therefore, it poses no threat to my network. Moreover, it offers benefit to my customers. Why should I filter it? > > Each network has unique filtering requirements. A transit network may filter destination options in packets that are bound for its own infrastructure. But it has no business filtering destination options in packets that are bound for its customers. Except that transit networks commonly drop Destination Options that are bound for their customers, so they've made it their business :-(. RB> This is a bug, not a feature. > > This filtering, although well-meaning, is not helpful to the customer who may rely on the filtered destination option. But no customers rely on Destination Options. RB> Can you stand by that statement? If you look at the IANA registry, many Destination Options are defined. What makes you so sure that none of them are in use? Do you have any empirical evidence? Maybe a survey of network operators? The unreliability, lack of security, and fact that there's no defined Destination options that are useful ensure that. RB> Can you support the statement that there are no defined Destination Options that are useful? In order to do this, you would have to do a survey of RFCs that define Destination options and explain why each Destination Option is useless. Do you really want to take on this task. I am especially concerned with the lack of security in Destination since that seems like an egregious security hole that can always be avoided by just setting the data inside the encryption envelope of a transport protocol. RB> I don't understand this statement. The Destination Option is encapsulated in the ESP. Tom > > > Ron > > > > ________________________________ > From: Tom Herbert <tom=40herbertland.com@dmarc.ietf.org> > Sent: Monday, December 29, 2025 10:14 AM > To: Bonica, Ron <ronald.bonica@hpe.com> > Cc: 6MAN <6man@ietf.org> > Subject: Re: [IPv6]Fwd: New Version Notification for draft-herbert-deprecate-eh-00.txt > > On Mon, Dec 29, 2025 at 6:58 AM Bonica, Ron > <ronald.bonica=40hpe.com@dmarc.ietf.org> wrote: > > > > Tom, > > > > Please disregard my previous comments regarding this draft. On second reading, the draft has a much more significant problem. > > > > In the introduction, you say: > > > > "This document proposes that extension headers be deprecated on the Internet by discarding packets with extension headers at the boundaries of limited domains [RFC8799]." > > > > In Section 2, where all of the normative language appears, you define ACLs that SHOULD or MUST be deployed at limited domain boundaries. > > > > It seems to me that this draft does not deprecate extension headers on the Internet at all. The ACLs defined in Section 2 won't do anything to restrict extension headers sent across three provider networks that do not participate in limited domains. > > > > In reality, this draft defines a one-size-fits-all limited domain. Do you really want to do that? > > Ron, > > A provider network is a limited domain, It is potentially dangerous > for a provider network to accept packets with extension headers from > an untrusted party, i.e. anyone on the Internet. By necessity provider > networks need to establish ACLs at ingress points in their network to > at least filter packets with extension headers especially Hop-by-Hop > Options and Routing headers which can target the providers > infrastructure. > > > > > Two operators might need to deploy limited domains. However, one operator might want to filter one set of extension headers while another operator might want to filter a different set. > > > > At very least, you should change the title of the document and remove claims about deprecating extension headers on the Internet. > > But that;s the point. We want to eliminate the use of extension > headers on the open Internet, The mechanism to enforce that is to drop > packets with extension headers at boundary points. > > Tom > > > > > Ron > > > > > > > > ________________________________ > > From: Tom Herbert <tom=40herbertland.com@dmarc.ietf.org> > > Sent: Friday, December 26, 2025 5:16 PM > > To: 6MAN <6man@ietf.org> > > Subject: [IPv6]Fwd: New Version Notification for draft-herbert-deprecate-eh-00.txt > > > > Happy Holidays 6man! > > > > I've posted a new draft on deprecating extension headers on the > > Internet. Comment are appreciated! > > > > Thanks, > > Tom > > > > ---------- Forwarded message --------- > > From: <internet-drafts@ietf.org> > > Date: Fri, Dec 26, 2025 at 2:14 PM > > Subject: New Version Notification for draft-herbert-deprecate-eh-00.txt > > To: Tom Herbert <tom@herbertland.com> > > > > > > A new version of Internet-Draft draft-herbert-deprecate-eh-00.txt has been > > successfully submitted by Tom Herbert and posted to the > > IETF repository. > > > > Name: draft-herbert-deprecate-eh > > Revision: 00 > > Title: Deprecating IPv6 Extension Headers on the Internet > > Date: 2025-12-26 > > Group: Individual Submission > > Pages: 10 > > URL: https://urldefense.com/v3/__https://www.ietf.org/archive/id/draft-herbert-deprecate-eh-00.txt__;!!NpxR!iJ1sQxfMiPDQYMZn18vwro6QhGiB_k4p3EvJg7ODewoap9PfftZsk4cvvHTzhpIGg7mnU8PtaH0heh7EWXQLiuQQRp5zUmhp$ > > Status: https://urldefense.com/v3/__https://datatracker.ietf.org/doc/draft-herbert-deprecate-eh/__;!!NpxR!iJ1sQxfMiPDQYMZn18vwro6QhGiB_k4p3EvJg7ODewoap9PfftZsk4cvvHTzhpIGg7mnU8PtaH0heh7EWXQLiuQQRgm9B6Th$ > > HTMLized: https://urldefense.com/v3/__https://datatracker.ietf.org/doc/html/draft-herbert-deprecate-eh__;!!NpxR!iJ1sQxfMiPDQYMZn18vwro6QhGiB_k4p3EvJg7ODewoap9PfftZsk4cvvHTzhpIGg7mnU8PtaH0heh7EWXQLiuQQRpZo_F9M$ > > > > > > Abstract: > > > > This document describes the deprecation of IPv6 extension headers on > > the Internet with the exception of Encapsulating Security Payload. > > Deprecation is motivated by three factors: 1) the data shows high > > discard rates for packets with extension headers sent over the > > Internet, 2) extension headers can be used for Denial of Service > > attack and are replete with other security vulnerabilities, 3) the > > high loss rates are a disincentive to develop new extension headers > > or options that might be useful or fix known problems. This document > > recommends that extension headers, other than Encapsulating Security > > Payload, be relegated to use only in limited domains and that packets > > with extension headers should be discarded at boundary routers of > > limited domains. > > > > > > > > The IETF Secretariat > > > > -------------------------------------------------------------------- > > IETF IPv6 working group mailing list > > ipv6@ietf.org > > List Info: https://urldefense.com/v3/__https://mailman3.ietf.org/mailman3/lists/ipv6@ietf.org/__;!!NpxR!iJ1sQxfMiPDQYMZn18vwro6QhGiB_k4p3EvJg7ODewoap9PfftZsk4cvvHTzhpIGg7mnU8PtaH0heh7EWXQLiuQQRnxNN22L$ > > --------------------------------------------------------------------
- [IPv6]Fwd: New Version Notification for draft-her… Tom Herbert
- [IPv6]Re: Fwd: New Version Notification for draft… Justin Iurman
- [IPv6]Re: Fwd: New Version Notification for draft… Tom Herbert
- [IPv6]Re: Fwd: New Version Notification for draft… Ole Trøan
- [IPv6]Re: Fwd: New Version Notification for draft… Tom Herbert
- [IPv6]Re: Fwd: New Version Notification for draft… Justin Iurman
- [IPv6]Re: Fwd: New Version Notification for draft… Tom Herbert
- [IPv6]Re: Fwd: New Version Notification for draft… Tom Herbert
- [IPv6]Re: Fwd: New Version Notification for draft… Timothy Winters
- [IPv6]Re: Fwd: New Version Notification for draft… Bonica, Ron
- [IPv6]Re: Fwd: New Version Notification for draft… Brian E Carpenter
- [IPv6]Re: Fwd: New Version Notification for draft… Ole Trøan
- [IPv6]Re: Fwd: New Version Notification for draft… Eliot Lear
- [IPv6]Re: Fwd: New Version Notification for draft… Bonica, Ron
- [IPv6]Re: Fwd: New Version Notification for draft… Mike Simpson
- [IPv6]Re: Fwd: New Version Notification for draft… Justin Iurman
- [IPv6]Re: Fwd: New Version Notification for draft… Brian E Carpenter
- [IPv6]Re: Fwd: New Version Notification for draft… Tom Herbert
- [IPv6]Re: Fwd: New Version Notification for draft… Adrian Farrel
- [IPv6]Re: Fwd: New Version Notification for draft… Eliot Lear
- [IPv6]Re: Fwd: New Version Notification for draft… Tom Herbert
- [IPv6]Re: Fwd: New Version Notification for draft… Bonica, Ron
- [IPv6]Re: Fwd: New Version Notification for draft… Bonica, Ron
- [IPv6]Re: Fwd: New Version Notification for draft… Tom Herbert
- [IPv6]Re: Fwd: New Version Notification for draft… Bonica, Ron
- [IPv6]Re: Fwd: New Version Notification for draft… Bonica, Ron
- [IPv6]Re: Fwd: New Version Notification for draft… Brian E Carpenter
- [IPv6]Re: Fwd: New Version Notification for draft… David Farmer
- [IPv6]Re: Fwd: New Version Notification for draft… Tom Herbert
- [IPv6]Re: Fwd: New Version Notification for draft… Sebastian Moeller
- [IPv6]Re: Fwd: New Version Notification for draft… Brian E Carpenter
- [IPv6]Re: Fwd: New Version Notification for draft… Ole Trøan
- [IPv6]Re: Fwd: New Version Notification for draft… Mark Smith
- [IPv6]Re: Fwd: New Version Notification for draft… Nick Hilliard
- [IPv6]Re: Fwd: New Version Notification for draft… Brian E Carpenter
- [IPv6]Re: Fwd: New Version Notification for draft… Tom Herbert
- [IPv6]Re: Fwd: New Version Notification for draft… Tom Herbert
- [IPv6]Re: Fwd: New Version Notification for draft… Brian E Carpenter
- [IPv6]Re: Fwd: New Version Notification for draft… Tom Herbert
- [IPv6]Re: Fwd: New Version Notification for draft… Tom Herbert
- [IPv6]Re: Fwd: New Version Notification for draft… Tom Herbert
- [IPv6]Re: Fwd: New Version Notification for draft… Tom Herbert
- [IPv6]Re: Fwd: New Version Notification for draft… Tom Herbert
- [IPv6]Re: Fwd: New Version Notification for draft… Christian Huitema
- [IPv6]Re: Fwd: New Version Notification for draft… Eliot Lear
- [IPv6]Re: Fwd: New Version Notification for draft… Tom Herbert
- [IPv6]Re: Fwd: New Version Notification for draft… Fernando Gont
- [IPv6]Re: Fwd: New Version Notification for draft… Mark Smith
- [IPv6]Re: Fwd: New Version Notification for draft… Brian E Carpenter