Re: about violation of standards

神明達哉 <jinmei@wide.ad.jp> Mon, 22 April 2019 16:15 UTC

Return-Path: <jinmei.tatuya@gmail.com>
X-Original-To: ipv6@ietfa.amsl.com
Delivered-To: ipv6@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 6CA2E12012B for <ipv6@ietfa.amsl.com>; Mon, 22 Apr 2019 09:15:46 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -0.669
X-Spam-Level:
X-Spam-Status: No, score=-0.669 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, FREEMAIL_FORGED_FROMDOMAIN=0.25, FREEMAIL_FROM=0.001, FROM_EXCESS_BASE64=0.979, HEADER_FROM_DIFFERENT_DOMAINS=0.001, HTML_MESSAGE=0.001, RCVD_IN_DNSWL_NONE=-0.0001, SPF_PASS=-0.001] autolearn=no autolearn_force=no
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id taTMhEnq8Xck for <ipv6@ietfa.amsl.com>; Mon, 22 Apr 2019 09:15:44 -0700 (PDT)
Received: from mail-wm1-f66.google.com (mail-wm1-f66.google.com [209.85.128.66]) (using TLSv1.2 with cipher ECDHE-RSA-AES128-GCM-SHA256 (128/128 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id 28948120129 for <ipv6@ietf.org>; Mon, 22 Apr 2019 09:15:44 -0700 (PDT)
Received: by mail-wm1-f66.google.com with SMTP id z24so15134028wmi.5 for <ipv6@ietf.org>; Mon, 22 Apr 2019 09:15:44 -0700 (PDT)
X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20161025; h=x-gm-message-state:mime-version:references:in-reply-to:from:date :message-id:subject:to:cc; bh=qZ8Z6xpztqkPrA4ThbOcccDraaQRT+T6a1fwQgUH5i4=; b=TCD3Nb5sIGi64GHYrom3rvdpmgINGLXvm9ng/tGlyHd3SdP0/J6LFa1KbzHNXLyBHw Ey0wONEZ+BK1yE8Qdg1ejIO+SAgkf0bh0aKhfbeIa6UYpattU7JMD+t8yBqP93zLK8CT GKWseqKG5cDZTg52CYDcsq/roRZryxxDoQdApirIJ4NPQUecAJQtf86jv34h633Fc8na j5F2+HLDBUIZrTIPBWP80uUQsx67TWEKcd0/FLtc6rhPviUAyDEDPqSDNmp6NP0uxb8q vOpsPCXbIvaBFEEAKvNg8HvahspxZ7JU6QHYxrJc1qlH9tbiK+xRjLv9fI4l3krZK4lF F2/g==
X-Gm-Message-State: APjAAAVAOh/00kOgAlb6Z4u3/72jmVE52+/gmiEvDNCcFW1XS/MufOJH mNgpf2l+AWH3nDmUyfVV97BpouGy2hRNYdvWVdY=
X-Google-Smtp-Source: APXvYqx7NKTlAAmH/hTK/AM7UefimqI2m/MWk5nrEr/iqjL2YYDHSdxhAruVF+DjoHrfGIntZaq1gGdUdcKt87zsE9k=
X-Received: by 2002:a1c:7512:: with SMTP id o18mr13454996wmc.68.1555949742272; Mon, 22 Apr 2019 09:15:42 -0700 (PDT)
MIME-Version: 1.0
References: <bb7f7606-2adf-e669-8bcd-e41f17800782@gmail.com> <CAJE_bqd9frqX5-yeVPj8MYXpZ4737HqK1gmfD9cQV3A-Ea5HrQ@mail.gmail.com> <CAKQ4NaWLGh3f_dN6WVNnYs9fKL8=vfpnShAK8AczPo8LE8LjFA@mail.gmail.com>
In-Reply-To: <CAKQ4NaWLGh3f_dN6WVNnYs9fKL8=vfpnShAK8AczPo8LE8LjFA@mail.gmail.com>
From: 神明達哉 <jinmei@wide.ad.jp>
Date: Mon, 22 Apr 2019 09:15:30 -0700
Message-ID: <CAJE_bqdsJ74ajnCgvm+bWZk=m_Emdy46TKc=73sHG-sf9Czsdg@mail.gmail.com>
Subject: Re: about violation of standards
To: Yucel Guven <yucel.guven@gmail.com>
Cc: Alexandre Petrescu <alexandre.petrescu@gmail.com>, IPv6 <ipv6@ietf.org>
Content-Type: multipart/alternative; boundary="000000000000ad3546058720c728"
Archived-At: <https://mailarchive.ietf.org/arch/msg/ipv6/OtqA7Q2HjOYd9zcFLcnxaRxmv4U>
X-BeenThere: ipv6@ietf.org
X-Mailman-Version: 2.1.29
Precedence: list
List-Id: "IPv6 Maintenance Working Group \(6man\)" <ipv6.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/ipv6>, <mailto:ipv6-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/ipv6/>
List-Post: <mailto:ipv6@ietf.org>
List-Help: <mailto:ipv6-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/ipv6>, <mailto:ipv6-request@ietf.org?subject=subscribe>
X-List-Received-Date: Mon, 22 Apr 2019 16:15:46 -0000

At Mon, 22 Apr 2019 18:37:08 +0200,
Yucel Guven <yucel.guven@gmail.com> wrote:

> > This logic doesn't make sense to me at all.  There was a very widely
used
> > implementation of commercial router (I don't name it as it's not my
> > purpose to pick a particular vendor) that forwarded an IPv6 packet
> > whose source address is link-local from one link to another link,
> > instead of returning an ICMPv6 destination unreachable error, code 2,
> > as specified in RFC4443.
>
> That is very interesting point indeed.
> Do you mean that billions of people's data, information, etc...etc... from
> their Link-locals
> can easily be routed to somewhere that no one knows? Just because of
> "that vendor" (or vendors?)

In theory yes, but I suspect it was quite unlikely in practice,
since when the source address is link-local, the destination address
is usually also link-local.  That implementation didn't let such
packets leak to a different link; this bug only happened when the
destination address was global.  I also don't know if this
implementation still has this bug today (note the past tense).

Anyway, such details are not the main point in this thread.  I just
gave a concrete example of why it doesn't make sense to justify a
broken behavior because of a "widely used implementation".  (hmm,
actually, these two cases have some common point that may matter in
the main context: in both cases the underlying implementation is
"widely used", but the usage of the broken behavior should be pretty
rare).

> Anyways, my concern is about huge amount of addresses of the fe80::/10.
> There are 281,474,976,710,655 =  281 Trillion 474 Billion 976 million 710
> Thousand 655 addresses
> in between  fe80:0:0:0::/64  and fe80:ffff:ffff:ffff::/64.
> If we just take  fe80:1::/32 or /64, then it breaks RFC4291 due to 54
zeros..
>
> Is it right time to modify RFC4291?

I don't think it's my call, but I provided some view of mine on a
related point in a separate thread:
https://mailarchive.ietf.org/arch/msg/ipv6/nRuLvdZptV2aR3TTzvh0WCKo7fQ
https://mailarchive.ietf.org/arch/msg/ipv6/D4YaezwdzKJ31mhKiqa8J8UWhoU

I don't know if it's the "right time", but I don't refuse an attempt
of updating RFC4291 on this point outright.  In my understanding many
of the participants in the recent relevant threads were also open to
listen to such attempts; they just rightly requested a valid
justification, and they simply didn't see it (neither did I, btw).

--
JINMEI, Tatuya