Re: I-D Action: draft-smith-6man-in-flight-eh-insertion-harmful-00.txt

Fernando Gont <fgont@si6networks.com> Mon, 14 October 2019 22:01 UTC

Return-Path: <fgont@si6networks.com>
X-Original-To: ipv6@ietfa.amsl.com
Delivered-To: ipv6@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 7CDA0120104 for <ipv6@ietfa.amsl.com>; Mon, 14 Oct 2019 15:01:22 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -1.899
X-Spam-Level:
X-Spam-Status: No, score=-1.899 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, RCVD_IN_DNSWL_NONE=-0.0001, SPF_HELO_NONE=0.001, SPF_PASS=-0.001, URIBL_BLOCKED=0.001] autolearn=ham autolearn_force=no
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id iEMc2MltdIeX for <ipv6@ietfa.amsl.com>; Mon, 14 Oct 2019 15:01:19 -0700 (PDT)
Received: from fgont.go6lab.si (fgont.go6lab.si [91.239.96.14]) (using TLSv1.2 with cipher AECDH-AES256-SHA (256/256 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id 6C58F120019 for <ipv6@ietf.org>; Mon, 14 Oct 2019 15:01:19 -0700 (PDT)
Received: from [192.168.3.68] (unknown [186.137.78.253]) (using TLSv1.2 with cipher ECDHE-RSA-AES128-GCM-SHA256 (128/128 bits)) (No client certificate requested) by fgont.go6lab.si (Postfix) with ESMTPSA id 4BCF886681; Tue, 15 Oct 2019 00:01:12 +0200 (CEST)
Subject: Re: I-D Action: draft-smith-6man-in-flight-eh-insertion-harmful-00.txt
To: Brian E Carpenter <brian.e.carpenter@gmail.com>, Mark Smith <markzzzsmith@gmail.com>, Nick Hilliard <nick@foobar.org>
Cc: 6man <ipv6@ietf.org>
References: <157059901123.30422.11220423219059958820@ietfa.amsl.com> <362b80f7-fedc-7227-2931-0006e6b81812@gmail.com> <f2548b48-2d8d-01f0-f05c-0027a5cdeb91@foobar.org> <57b3a7bd-3dc3-d8be-0ac4-7218abdd94d8@gmail.com> <51fdb3bc-3155-c0c8-a34b-f68868885a24@foobar.org> <CAO42Z2yq_9-fSixu8f8ut3uVm00MFGcf6gFPjn725D+_tk2LXw@mail.gmail.com> <f634d33a-78c6-a678-f343-adc1b46859ef@gmail.com>
From: Fernando Gont <fgont@si6networks.com>
Openpgp: preference=signencrypt
Message-ID: <366aa614-0383-e7a2-f7fa-3616d7ce213f@si6networks.com>
Date: Mon, 14 Oct 2019 16:57:17 -0500
User-Agent: Mozilla/5.0 (X11; Linux x86_64; rv:60.0) Gecko/20100101 Thunderbird/60.9.0
MIME-Version: 1.0
In-Reply-To: <f634d33a-78c6-a678-f343-adc1b46859ef@gmail.com>
Content-Type: text/plain; charset="utf-8"
Content-Language: en-US
Content-Transfer-Encoding: 7bit
Archived-At: <https://mailarchive.ietf.org/arch/msg/ipv6/U9uy231Mr0jaafuBCZ29gGnVK0g>
X-BeenThere: ipv6@ietf.org
X-Mailman-Version: 2.1.29
Precedence: list
List-Id: "IPv6 Maintenance Working Group \(6man\)" <ipv6.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/ipv6>, <mailto:ipv6-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/ipv6/>
List-Post: <mailto:ipv6@ietf.org>
List-Help: <mailto:ipv6-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/ipv6>, <mailto:ipv6-request@ietf.org?subject=subscribe>
X-List-Received-Date: Mon, 14 Oct 2019 22:01:23 -0000

On 13/10/19 19:19, Brian E Carpenter wrote:
> One comment at the end:
> 
> On 14-Oct-19 11:48, Mark Smith wrote:
>> On Sun, 13 Oct 2019 at 21:25, Nick Hilliard <nick@foobar.org> wrote:
>>>
>>> Brian E Carpenter wrote on 13/10/2019 01:36:
>>>> The packet is too dumb to know anything ;-). My question is how each
>>>> node it traverses knows. Indeed, Mark's draft describes a scenario
>>>> where the controlled domain argument breaks, because the exit node
>>>> might not know that the packet had suffered EH insertion. The
>>>> draft-voyer- scenario is not like that, because the affected IPv6
>>>> headers are created locally and identifiable as such.
>>>
>>> the world isn't nearly this pigeonholed though.  The edge around this
>>> "controlled domain" that you're implicitly suggesting is sharply-defined
>>> is in reality more of a blurry smear.  Think tunnels, leaks, back-doors,
>>> "SD-WAN" (whatever that means), policy routing, routed VPNs, etc.
>>>
>>> If the ietf wants to define a new ipv6-like protocol which is not
>>> guaranteed to be interoperable with 8200, there's still space in
>>> www.iana.org/assignments/version-numbers to accommodate this :-)
>>>
>>
>> This is one of the fundamental observations.
>>
>>  The trouble is calling this sort of closed/limited domain variant
>> that doesn't obey RFC 8200 "IPv6".
>>
>> Protocols are more than just packet structures and reserved values,
>> they also specify field value rules, interpretations and permitted and
>> non-permitted behaviours. All of these latter properties are relied on
>> and expected by other implementations.
>>
>> I think there are parallels with how human languages work.
>>
>> For example, If I define the word "dog" (noun) to mean "wash" (verb)
>> within the domain of my house, can I still claim English is being
>> spoken in my house? The spelling and pronunciation of "dog" is the
>> same, but the meaning of "dog" and where it can be used in sentences
>> is different.
>>
>> So it isn't English being spoken in my house anymore, even though it
>> resembles it, and there is quite a lot of commonality. English
>> dictionaries can't be reliably used for any word definitions in my
>> house once just one word is redefined. The more words I redefine the
>> less applicable the conventional English dictionary is in my house,
>> even though the word spellings and soundings continue to be the same.
>>
>> This could be solved by calling it "Mark's English" or "Mark's Version
>> Of English", which clearly states it is different to conventional
>> English dictionary English. There needs to be a "Mark's English"
>> dictionary.
>>
>> So as Nick said, if the IETF want to have non-interoperable versions
>> or variants of "IPv6", then they need different version numbers
>> somewhere or somehow - either minor e.g. 6.1, 6.2, or major e.g.
>> IPv10.
> 
> Be careful what you wish for. It would be easy enough to define a
> (probably hop-by-hop) option for this:
>       +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
>       |   110xxxxx    |   00000001    | IPv6 version  |
>       +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+

It's easier than that. There's an in IP version field in the IPv{4,6}
header.

Thanks,
-- 
Fernando Gont
SI6 Networks
e-mail: fgont@si6networks.com
PGP Fingerprint: 6666 31C6 D484 63B2 8FB1 E3C4 AE25 0D55 1D4E 7492