Re: about violation of standards

Yucel Guven <yucel.guven@gmail.com> Mon, 22 April 2019 15:37 UTC

Return-Path: <yucel.guven@gmail.com>
X-Original-To: ipv6@ietfa.amsl.com
Delivered-To: ipv6@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 166E112011B for <ipv6@ietfa.amsl.com>; Mon, 22 Apr 2019 08:37:26 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -1.999
X-Spam-Level:
X-Spam-Status: No, score=-1.999 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, DKIM_SIGNED=0.1, DKIM_VALID=-0.1, DKIM_VALID_AU=-0.1, FREEMAIL_FROM=0.001, HTML_MESSAGE=0.001, RCVD_IN_DNSWL_NONE=-0.0001, SPF_PASS=-0.001] autolearn=ham autolearn_force=no
Authentication-Results: ietfa.amsl.com (amavisd-new); dkim=pass (2048-bit key) header.d=gmail.com
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id G1joldtR_1Lt for <ipv6@ietfa.amsl.com>; Mon, 22 Apr 2019 08:37:24 -0700 (PDT)
Received: from mail-oi1-x241.google.com (mail-oi1-x241.google.com [IPv6:2607:f8b0:4864:20::241]) (using TLSv1.2 with cipher ECDHE-RSA-AES128-GCM-SHA256 (128/128 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id E1CDF120113 for <ipv6@ietf.org>; Mon, 22 Apr 2019 08:37:23 -0700 (PDT)
Received: by mail-oi1-x241.google.com with SMTP id v84so8763498oif.4 for <ipv6@ietf.org>; Mon, 22 Apr 2019 08:37:23 -0700 (PDT)
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=gmail.com; s=20161025; h=mime-version:references:in-reply-to:from:date:message-id:subject:to :cc; bh=J3btIBWeC09wW0TiWfIkhD2VhKDn8bpPpcgLwRpxxlw=; b=MMQBpcb1bO7jVfMnMLhyK3DrFXEOEz8XhNCRFnCNdwtBuvmjyKI+IQtD2lQdxrdBzs 7oGG5qTMvdxEIp0BLp8s8KkB4LlApGtnrHy57Qy6YBHtMEw5GhbIjI316WzqKzSlsohv QrosJKEhYit+BCTsdMgELbdxyuM5+bEK2OKEjaNiJ6kTTWAxhFdbYzDD7B2TFIWaHDfY 1191PRbX4UF9uIkCBptSnbj19XnCplxh7h5v2YAZO6dM+4apVO+4IhrBq/eQmhEKxQj4 yp5u6MnotTsm/pONZgv++UP1QM5BmwzuD1uO8cRU3325TpAWucZ7usRUtILZxHGn6J52 gq6A==
X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20161025; h=x-gm-message-state:mime-version:references:in-reply-to:from:date :message-id:subject:to:cc; bh=J3btIBWeC09wW0TiWfIkhD2VhKDn8bpPpcgLwRpxxlw=; b=kjz38xeaCg/o26NDGT+kFuiiD29wXxhCEOfQBV1x9niMzo5uErrLnju1wSRMUJ2cW1 nw0EsPzJZQOdsNUDHdzsz1PC3i8MRM0gxaeH/xvrhiwbd8Yp9YYYENhPrMiNhQFPs+8V ig69vjEE9TJRBYhzRbosFNLT6HrXnycPZKjua3+QX5RXb8w5MvfjOiPNYpuCSTnMRJ+I sVa73vDoRkg7BsYAn01OfoNeqPrscWq/Er/Z2R3wPeZjrwvCHNzQH3Sztn8rVbcyswZk 24YZdwwp9o4etuyOr/CaCDk+9SGlUEKD8p8TiEPlk8KWU5f3c6pC7wzx1y0wghzCv/8f N8lQ==
X-Gm-Message-State: APjAAAXcAdS4S6pyoAIrOV4F/FDiHt7WIc2bVdoYmtRvbfKs5WLAAK0V WwaWShVJuHZGXL0UGNh/xzIbiB9MS/gdnG8NiJCe3eTD
X-Google-Smtp-Source: APXvYqw0PSUpvYSeUr4VB2YnmCb/a/MUI8j9EaLQoWNIg15vHQsgddBE6q1/298rywhEA9OqRIWB+ygospZvW7/3L14=
X-Received: by 2002:aca:ecc5:: with SMTP id k188mr10065277oih.125.1555947443106; Mon, 22 Apr 2019 08:37:23 -0700 (PDT)
MIME-Version: 1.0
References: <bb7f7606-2adf-e669-8bcd-e41f17800782@gmail.com> <CAJE_bqd9frqX5-yeVPj8MYXpZ4737HqK1gmfD9cQV3A-Ea5HrQ@mail.gmail.com>
In-Reply-To: <CAJE_bqd9frqX5-yeVPj8MYXpZ4737HqK1gmfD9cQV3A-Ea5HrQ@mail.gmail.com>
From: Yucel Guven <yucel.guven@gmail.com>
Date: Mon, 22 Apr 2019 18:37:08 +0200
Message-ID: <CAKQ4NaWLGh3f_dN6WVNnYs9fKL8=vfpnShAK8AczPo8LE8LjFA@mail.gmail.com>
Subject: Re: about violation of standards
To: 神明達哉 <jinmei@wide.ad.jp>
Cc: Alexandre Petrescu <alexandre.petrescu@gmail.com>, IPv6 <ipv6@ietf.org>
Content-Type: multipart/alternative; boundary="000000000000a2ba080587203e33"
Archived-At: <https://mailarchive.ietf.org/arch/msg/ipv6/Kf13V_g_8rPrx1ziL9uqiv4kTtg>
X-BeenThere: ipv6@ietf.org
X-Mailman-Version: 2.1.29
Precedence: list
List-Id: "IPv6 Maintenance Working Group \(6man\)" <ipv6.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/ipv6>, <mailto:ipv6-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/ipv6/>
List-Post: <mailto:ipv6@ietf.org>
List-Help: <mailto:ipv6-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/ipv6>, <mailto:ipv6-request@ietf.org?subject=subscribe>
X-List-Received-Date: Mon, 22 Apr 2019 15:37:26 -0000

Hi Jinmei Tatuya,

> This logic doesn't make sense to me at all.  There was a very widely used
> implementation of commercial router (I don't name it as it's not my
> purpose to pick a particular vendor) that forwarded an IPv6 packet
> whose source address is link-local from one link to another link,
> instead of returning an ICMPv6 destination unreachable error, code 2,
> as specified in RFC4443.

That is very interesting point indeed.
Do you mean that billions of people's data, information, etc...etc... from
their Link-locals
can easily be routed to somewhere that no one knows? Just because of
"that vendor" (or vendors?)
If that's the case, I really wonder about what can be done with "127.0.0.1".

Anyways, my concern is about huge amount of addresses of the fe80::/10.
There are 281,474,976,710,655 =  281 Trillion 474 Billion 976 million 710
Thousand 655 addresses
in between  fe80:0:0:0::/64  and fe80:ffff:ffff:ffff::/64.
If we just take  fe80:1::/32 or /64, then it breaks RFC4291 due to 54 zeros.

Is it right time to modify RFC4291?







On Thu, Apr 18, 2019 at 11:03 PM 神明達哉 <jinmei@wide.ad.jp> wrote:

> On Thu, Apr 18, 2019 at 11:59 AM Alexandre Petrescu <
> alexandre.petrescu@gmail.com> wrote:
>
> >    In private conversation this debate happened:
>
> >    is an implementation that uses fe80:1::2 address on an interface a
> >    violation of standards? (RFC 4291 does not allow for '1' to be there).
>
> >    My point of view is that as long as that mplementation is widely used,
> >    that is not a violation of standards.  Rather, the situation makes it
> >    that that standard is not in agreement with implementations..
>
> This logic doesn't make sense to me at all.  There was a very widely used
> implementation of commercial router (I don't name it as it's not my
> purpose to pick a particular vendor) that forwarded an IPv6 packet
> whose source address is link-local from one link to another link,
> instead of returning an ICMPv6 destination unreachable error, code 2,
> as specified in RFC4443.  According to that logic, this implementation
> would be considered not violating the RFC "because it's widely used";
> most people call it an implementation bug.
>
> Regarding Linux, I'd note that link-local addresses are automatically
> generated by the system, and the generated address conforms to the
> format specified in Section 2.5.6 of RFC4291.  More specifically, its
> intermediate 54 bits are all set to 0.  Plus, as far as I know, the
> vast majority of people never bother to change the auto-generated
> link-local addresses.  In that sense the use of addresses like
> "fe80:1::2" are not really widely used, even if the implementation
> that allows its users to manually configure such addresses is widely
> used.
>
> Almost any implementation has some weapon that allows its user to
> shoot their feet, often violating protocol standards.  An extreme case
> is a tool like bpf, with which you can send out almost any broken
> packets to the wire.  BPF is widely used tools, but as far as I know
> no one uses the existence of that tool to justify the violation of the
> standard.
>
> Now, I'm open to the discussion of possibly updating RFC4291 to allow
> non-0 value in the intermediate 54-bit field, starting from the fact
> that it currently violates the standard.  But I don't buy an argument
> that a behavior against the current standard is not a violation simply
> because there's a system utility of a widely used OS that allows that
> particular behavior.
>
> --
> JINMEI, Tatuya
> --------------------------------------------------------------------
> IETF IPv6 working group mailing list
> ipv6@ietf.org
> Administrative Requests: https://www.ietf.org/mailman/listinfo/ipv6
> --------------------------------------------------------------------
>