Re: about violation of standards - fe80::1/128

"Pascal Thubert (pthubert)" <pthubert@cisco.com> Fri, 26 April 2019 07:11 UTC

Return-Path: <pthubert@cisco.com>
X-Original-To: ipv6@ietfa.amsl.com
Delivered-To: ipv6@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id B004612018C for <ipv6@ietfa.amsl.com>; Fri, 26 Apr 2019 00:11:31 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -14.499
X-Spam-Level:
X-Spam-Status: No, score=-14.499 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, DKIM_SIGNED=0.1, DKIM_VALID=-0.1, DKIM_VALID_AU=-0.1, HTML_MESSAGE=0.001, RCVD_IN_DNSWL_HI=-5, SPF_PASS=-0.001, URIBL_BLOCKED=0.001, USER_IN_DEF_DKIM_WL=-7.5] autolearn=ham autolearn_force=no
Authentication-Results: ietfa.amsl.com (amavisd-new); dkim=pass (1024-bit key) header.d=cisco.com header.b=j0vjVN1J; dkim=pass (1024-bit key) header.d=cisco.onmicrosoft.com header.b=MAQ8bxyH
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id s9BOWA0cl67X for <ipv6@ietfa.amsl.com>; Fri, 26 Apr 2019 00:11:29 -0700 (PDT)
Received: from alln-iport-7.cisco.com (alln-iport-7.cisco.com [173.37.142.94]) (using TLSv1.2 with cipher DHE-RSA-SEED-SHA (128/128 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id A57F212008C for <ipv6@ietf.org>; Fri, 26 Apr 2019 00:11:28 -0700 (PDT)
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/simple; d=cisco.com; i=@cisco.com; l=12367; q=dns/txt; s=iport; t=1556262688; x=1557472288; h=from:to:cc:subject:date:message-id:references: in-reply-to:mime-version; bh=y9GMgwUaYT81N1THaK0yg7x77MDZOturVLi/lCL7j9s=; b=j0vjVN1JpnPoZpIj51KQnBDiqqGTW8NKiyH8F6J7AzZMbJMqCwJn4UgY pKtE3MzffqPhSx1Ja/w/UTIlD2w+0Tnrh/j2u+Pnh3Qi2A6/csuhCYDL+ j3HaB/0Oc5mayVkXePvEyW9QzztEUQ/OpNOZa+RMdQehJQ3exWN9XKraW c=;
IronPort-PHdr: 9a23:JlY3/xwygQZSVfTXCy+N+z0EezQntrPoPwUc9psgjfdUf7+++4j5YhWN/u1j2VnOW4iTq+lJjebbqejBYSQB+t7A1RJKa5lQT1kAgMQSkRYnBZudFU3mJvPwcwQxHd9JUxlu+HToeUU=
X-IronPort-Anti-Spam-Filtered: true
X-IronPort-Anti-Spam-Result: A0AJAAAVrsJc/5RdJa1mGgEBAQEBAgEBAQEHAgEBAQGBUQUBAQEBCwGBPSQsA2hVIAQLKAqEBYNHA4RSijiCMiWJO4kXhEyBLoEkA1QOAQEYAQoKgUuCdQIXhhsjNAkOAQMBAQQBAQIBAm0cDIVLAQEBAgEBARARHQEBLAsBBAsCAQYCDjEDAgICHwYLFBECBA4FIoMAAYEdTAMNDwECAQuSHpBeAoE1iF9xgS+CeQEBBYUFDQuCDgMGgTIBhF6GaheBQD+BOAwTgkw+ghpHAQGBeBaCXTGCJop8gjaEQZQ0OAkCggiOYYNLG4ILkBKCeYNmiTyGaIw3AgQCBAUCDgEBBYFPOIFWcBU7KgGCQYIPg2+FFIU/coEpj1QBgSABAQ
X-IronPort-AV: E=Sophos;i="5.60,396,1549929600"; d="scan'208,217";a="263192716"
Received: from rcdn-core-12.cisco.com ([173.37.93.148]) by alln-iport-7.cisco.com with ESMTP/TLS/DHE-RSA-SEED-SHA; 26 Apr 2019 07:11:27 +0000
Received: from XCH-RCD-014.cisco.com (xch-rcd-014.cisco.com [173.37.102.24]) by rcdn-core-12.cisco.com (8.15.2/8.15.2) with ESMTPS id x3Q7BR3u030731 (version=TLSv1.2 cipher=AES256-SHA bits=256 verify=FAIL); Fri, 26 Apr 2019 07:11:27 GMT
Received: from xhs-rcd-002.cisco.com (173.37.227.247) by XCH-RCD-014.cisco.com (173.37.102.24) with Microsoft SMTP Server (TLS) id 15.0.1473.3; Fri, 26 Apr 2019 02:11:26 -0500
Received: from xhs-rcd-002.cisco.com (173.37.227.247) by xhs-rcd-002.cisco.com (173.37.227.247) with Microsoft SMTP Server (TLS) id 15.0.1473.3; Fri, 26 Apr 2019 02:11:25 -0500
Received: from NAM02-CY1-obe.outbound.protection.outlook.com (72.163.14.9) by xhs-rcd-002.cisco.com (173.37.227.247) with Microsoft SMTP Server (TLS) id 15.0.1473.3 via Frontend Transport; Fri, 26 Apr 2019 02:11:25 -0500
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=cisco.onmicrosoft.com; s=selector1-cisco-com; h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-SenderADCheck; bh=y9GMgwUaYT81N1THaK0yg7x77MDZOturVLi/lCL7j9s=; b=MAQ8bxyHJ1T6fBYByDC//rnckTREHnZrhl+fQTdyToPSDT3ISJo/0qv0gpN0d2aFuZzzQPmgATPLdfdyqYVt2wPjPsG+sw1KZFgm8DmYRFfn8MBEWFnbE90A6QRgQGBZsX+cLPdbRXnYPj3ZFr0j/2XPOE97c9r9klULZlJ6Qvk=
Received: from MN2PR11MB3565.namprd11.prod.outlook.com (20.178.250.159) by MN2PR11MB3647.namprd11.prod.outlook.com (20.178.251.26) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id 15.20.1835.13; Fri, 26 Apr 2019 07:11:24 +0000
Received: from MN2PR11MB3565.namprd11.prod.outlook.com ([fe80::68f6:21c8:b681:c73]) by MN2PR11MB3565.namprd11.prod.outlook.com ([fe80::68f6:21c8:b681:c73%4]) with mapi id 15.20.1835.010; Fri, 26 Apr 2019 07:11:24 +0000
From: "Pascal Thubert (pthubert)" <pthubert@cisco.com>
To: Gyan Mishra <hayabusagsm@gmail.com>
CC: 神明達哉 <jinmei@wide.ad.jp>, Alexandre Petrescu <alexandre.petrescu@gmail.com>, IPv6 <ipv6@ietf.org>
Subject: Re: about violation of standards - fe80::1/128
Thread-Topic: about violation of standards - fe80::1/128
Thread-Index: AQHU+qpbfSxfmdHmF0CCqoWYm5bKp6ZLZIUAgAJ2EICAAC6aYg==
Date: Fri, 26 Apr 2019 07:11:24 +0000
Message-ID: <AF9C6177-A716-4C14-9267-683B254F6A79@cisco.com>
References: <bb7f7606-2adf-e669-8bcd-e41f17800782@gmail.com> <CAJE_bqd9frqX5-yeVPj8MYXpZ4737HqK1gmfD9cQV3A-Ea5HrQ@mail.gmail.com> <CAKQ4NaWLGh3f_dN6WVNnYs9fKL8=vfpnShAK8AczPo8LE8LjFA@mail.gmail.com> <CAJE_bqdsJ74ajnCgvm+bWZk=m_Emdy46TKc=73sHG-sf9Czsdg@mail.gmail.com> <a0973403-960b-1136-514d-fd675e318824@gmail.com> <CAJE_bqf170RceGvJvrmGkkq2tVzLx7nBi+cqQ9fU3xxmyxAE6A@mail.gmail.com>, <E2F9B771-2FF7-47C7-9926-C7C68823269D@gmail.com>
In-Reply-To: <E2F9B771-2FF7-47C7-9926-C7C68823269D@gmail.com>
Accept-Language: fr-FR, en-US
Content-Language: fr-FR
X-MS-Has-Attach:
X-MS-TNEF-Correlator:
authentication-results: spf=none (sender IP is ) smtp.mailfrom=pthubert@cisco.com;
x-originating-ip: [91.69.164.91]
x-ms-publictraffictype: Email
x-ms-office365-filtering-correlation-id: b59ac357-cf89-4ef5-437c-08d6ca166492
x-microsoft-antispam: BCL:0; PCL:0; RULEID:(2390118)(7020095)(4652040)(8989299)(4534185)(4627221)(201703031133081)(201702281549075)(8990200)(5600141)(711020)(4605104)(2017052603328)(7193020); SRVR:MN2PR11MB3647;
x-ms-traffictypediagnostic: MN2PR11MB3647:
x-ms-exchange-purlcount: 1
x-microsoft-antispam-prvs: <MN2PR11MB364762881D0F15A95152CCB9D83E0@MN2PR11MB3647.namprd11.prod.outlook.com>
x-forefront-prvs: 001968DD50
x-forefront-antispam-report: SFV:NSPM; SFS:(10009020)(136003)(346002)(366004)(39860400002)(396003)(376002)(189003)(199004)(6512007)(54896002)(236005)(86362001)(97736004)(6486002)(6436002)(229853002)(256004)(6306002)(36756003)(8676002)(81156014)(53936002)(81166006)(14444005)(6916009)(82746002)(25786009)(6246003)(4326008)(316002)(7736002)(26005)(186003)(68736007)(11346002)(966005)(14454004)(486006)(478600001)(3846002)(6116002)(2906002)(1411001)(33656002)(606006)(8936002)(99286004)(54906003)(76176011)(66574012)(83716004)(6506007)(53546011)(5660300002)(102836004)(71190400001)(93886005)(66066001)(71200400001)(66476007)(91956017)(73956011)(66556008)(64756008)(66446008)(66946007)(76116006)(2616005)(446003)(476003)(244885003); DIR:OUT; SFP:1101; SCL:1; SRVR:MN2PR11MB3647; H:MN2PR11MB3565.namprd11.prod.outlook.com; FPR:; SPF:None; LANG:en; PTR:InfoNoRecords; MX:1; A:1;
received-spf: None (protection.outlook.com: cisco.com does not designate permitted sender hosts)
x-ms-exchange-senderadcheck: 1
x-microsoft-antispam-message-info: CfNW8spjEEUzIaRyHjXO9yxcpqipO8QN1/z7cf6DgTx+/1/Hu6rTbd+TVA3wLdNLu8QGOSdy7+VZZyaRrhYnkwIVN3e5dk49W/T+met6CKiPzcs6SJf4D6iX5q5WbtRJWLtTPsB8baVcdA6hH5jhmzJt2Y1PtbwJqOf4zPUt9TTMpVxXSs5ymf3pW/x1RxbsmIWs34kGKwT/Kx8gZQlEOt1xYMJ0yEg//pXaWC/jx1gR5Rv26TKcPGfSlckyclB5Up08Aj1vFziorHOtBt5xFXr5dIqQASi9PkYBherdu7Y6z+jDStWJpXezbbFRQwjJ517C0pLEGzLhTfGPHgLCFd6E8zfs4Om3QkbKJIgyOsqnIxSelHGV85Ow9PKftqKGNp+qixWweFW4XbJc50N5RrxKnpZ+UEdawF0++2OTGVE=
Content-Type: multipart/alternative; boundary="_000_AF9C6177A7164C149267683B254F6A79ciscocom_"
MIME-Version: 1.0
X-MS-Exchange-CrossTenant-Network-Message-Id: b59ac357-cf89-4ef5-437c-08d6ca166492
X-MS-Exchange-CrossTenant-originalarrivaltime: 26 Apr 2019 07:11:24.3701 (UTC)
X-MS-Exchange-CrossTenant-fromentityheader: Hosted
X-MS-Exchange-CrossTenant-id: 5ae1af62-9505-4097-a69a-c1553ef7840e
X-MS-Exchange-CrossTenant-mailboxtype: HOSTED
X-MS-Exchange-Transport-CrossTenantHeadersStamped: MN2PR11MB3647
X-OriginatorOrg: cisco.com
X-Outbound-SMTP-Client: 173.37.102.24, xch-rcd-014.cisco.com
X-Outbound-Node: rcdn-core-12.cisco.com
Archived-At: <https://mailarchive.ietf.org/arch/msg/ipv6/Wvx3vyw9q-nfDozIUuMkJE0dzQo>
X-BeenThere: ipv6@ietf.org
X-Mailman-Version: 2.1.29
Precedence: list
List-Id: "IPv6 Maintenance Working Group \(6man\)" <ipv6.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/ipv6>, <mailto:ipv6-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/ipv6/>
List-Post: <mailto:ipv6@ietf.org>
List-Help: <mailto:ipv6-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/ipv6>, <mailto:ipv6-request@ietf.org?subject=subscribe>
X-List-Received-Date: Fri, 26 Apr 2019 07:11:32 -0000

There’s a difference here Gyan.

Those implementations are liberal in what they accept, which here means that they will not deny connectivity to a peer that doesn’t strictly conform the RFCs as they were at the time this particular software was compiled.

It also means that we can probably change those RFCs if we really want to, and it may not as painful as some voices claim. Certainly a step to take before doing anything would be to evaluate that.

Now depending on which function you talk about in the router there is a capability to check for Martian formats. You’d be surprised at what gets caught. But turning those things on usually causes a lot more problems than it solves, and in the end the Postel principle stands...

Regards,

Pascal

Le 26 avr. 2019 à 06:25, Gyan Mishra <hayabusagsm@gmail.com<mailto:hayabusagsm@gmail.com>> a écrit :

What I am trying to say and this is very confusing is that CISCO and other BSD Linux based OS don’t have the ability to check for valid IPv6 global unicast or link local configuration that it is following the RFC Standards as with IPv4.

So just because it works does not mean it is correct or ok or that the standards should now change because it works on various OSs that are not following the RFC that we now chant to make that now ok and standard.

We need more justification then that to change the standards.

In one of the other threads I mentioned that if we are trying to improve or enhance the standard because we have valid future user cases that would require having a new “subnet id” 54 bit  field then it’s ok as we are improving with newer RFC revision making the older one obsolete.

For backwards compatibility the all’s 0s 54 bits would be for legacy devices supporting RFC 4291 so they are not impacted and anything on newer coder can now look at supporting the new RFC.

Gyan

Sent from my iPhone

On Apr 24, 2019, at 10:49 AM, 神明達哉 <jinmei@wide.ad.jp<mailto:jinmei@wide.ad.jp>> wrote:

At Wed, 24 Apr 2019 16:29:59 +0200,
Alexandre Petrescu <alexandre.petrescu@gmail.com<mailto:alexandre.petrescu@gmail.com>> wrote:

> As a response, I would like to ask whether fe80::1/128 on lo is a
> violation of standards.

First off, assuming you refer to the behavior of BSD variants
(including MacOS X), it's not 'lo' but 'loN' (normally just lo0 but
can also be lo1, lo2, etc, if these are also configured).  The world
doesn't only consist of Linux.

Secondly, again assuming it's BSD variants, it's not /128 but /64.

Third, I don't see which standard it might violate.  Could you be
more specific?

If you simply mean whether an implementation could choose to use ::1
as the mandatory link-local address on a loopback interface and skip
assigning an fe80 address on it, then I'd say it should be allowed as
we discussed off-list.  But IMO that would also require some update to
RFC4291, which is hopefully much less controversial than using a non-0
value in the intermediate 54-bit field.  And in any case, that doesn't
mean assigning an fe80 address on such an interface is a violation.

--
JINMEI, Tatuya
--------------------------------------------------------------------
IETF IPv6 working group mailing list
ipv6@ietf.org<mailto:ipv6@ietf.org>
Administrative Requests: https://www.ietf.org/mailman/listinfo/ipv6
--------------------------------------------------------------------
--------------------------------------------------------------------
IETF IPv6 working group mailing list
ipv6@ietf.org<mailto:ipv6@ietf.org>
Administrative Requests: https://www.ietf.org/mailman/listinfo/ipv6
--------------------------------------------------------------------