Re: A problem with RFC 6465's Uniform Format for Extension Headers

Mark ZZZ Smith <markzzzsmith@yahoo.com.au> Wed, 12 February 2014 08:28 UTC

Return-Path: <markzzzsmith@yahoo.com.au>
X-Original-To: ipv6@ietfa.amsl.com
Delivered-To: ipv6@ietfa.amsl.com
Received: from localhost (ietfa.amsl.com [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 7512F1A0878 for <ipv6@ietfa.amsl.com>; Wed, 12 Feb 2014 00:28:48 -0800 (PST)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -1.498
X-Spam-Level:
X-Spam-Status: No, score=-1.498 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, DKIM_SIGNED=0.1, DKIM_VALID=-0.1, DKIM_VALID_AU=-0.1, FREEMAIL_FROM=0.001, FROM_LOCAL_NOVOWEL=0.5, HK_RANDOM_ENVFROM=0.001, RCVD_IN_DNSWL_NONE=-0.0001] autolearn=no
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id q-u92PPlb4II for <ipv6@ietfa.amsl.com>; Wed, 12 Feb 2014 00:28:46 -0800 (PST)
Received: from nm33-vm2.bullet.mail.bf1.yahoo.com (nm33-vm2.bullet.mail.bf1.yahoo.com [72.30.239.202]) by ietfa.amsl.com (Postfix) with ESMTP id 1F0C81A0869 for <6man@ietf.org>; Wed, 12 Feb 2014 00:28:46 -0800 (PST)
Received: from [98.139.212.153] by nm33.bullet.mail.bf1.yahoo.com with NNFMP; 12 Feb 2014 08:28:45 -0000
Received: from [98.139.212.245] by tm10.bullet.mail.bf1.yahoo.com with NNFMP; 12 Feb 2014 08:28:45 -0000
Received: from [127.0.0.1] by omp1054.mail.bf1.yahoo.com with NNFMP; 12 Feb 2014 08:28:45 -0000
X-Yahoo-Newman-Property: ymail-3
X-Yahoo-Newman-Id: 94178.67689.bm@omp1054.mail.bf1.yahoo.com
Received: (qmail 35871 invoked by uid 60001); 12 Feb 2014 08:28:45 -0000
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=yahoo.com.au; s=s1024; t=1392193724; bh=emFsCpbLFII9/f4rPQCDjFeAS5c2U9SWDYuk3TYFTYU=; h=X-YMail-OSG:Received:X-Rocket-MIMEInfo:X-Mailer:References:Message-ID:Date:From:Reply-To:Subject:To:Cc:In-Reply-To:MIME-Version:Content-Type:Content-Transfer-Encoding; b=eCgCO24gMNirjWRs07XakIHnAEAw+7WD3iq7cAll59F1ZVLSwppjbAITd4RdMYntMIctNjg7J9m6QwC//K9eNgz/3RqK8kY4sT0Qkalh1CZGpbBrt9OMmEvpm2ELF2cZnPw79KTE54OytlRZRpPaZlkO+jLvqQOw4x+Hf71Ftrk=
DomainKey-Signature: a=rsa-sha1; q=dns; c=nofws; s=s1024; d=yahoo.com.au; h=X-YMail-OSG:Received:X-Rocket-MIMEInfo:X-Mailer:References:Message-ID:Date:From:Reply-To:Subject:To:Cc:In-Reply-To:MIME-Version:Content-Type:Content-Transfer-Encoding; b=ssy1/WQGYhcOo2Sjihi3gTFY1hg5MEESFlRGkdGaT1/Gl21ov0Yyh4MeZrvWXHFh7JURjzOQcGN4FBVlmCJO7QV81yOGtWELb0lvYXyUaiYhMbVZIoNlJADV/VB0OdGb4ADJfNAoXoy6tCgu+LF9dBwFehp0qZDOVTbs781GWbM=;
X-YMail-OSG: bGRsahQVM1lafOsb0v07D88XsusqiKPMwANy19j1elxV5rT wxuL3A.Re3npC6a0UeYF1dNCc3a6ItHVC9VXjBVup.8W6cFxLdihYtZKZS4m JLoqSuOjyqRLfsVyVSJaVXR2Z5soX6yn8pTC_Y118QXNOdbT5xoDpJ1U9wf8 h9Jk.VrZ0IcemkWPhf7e7njN9pzVs2SjlsVjBFjWZ3f6r12j0vL0ePSZb.7G xZa5cIpjO777HfWTMqWdfRcj4_jaXnmdNlfxCbb4YpIsNwd5CoRZRpZ.ldrT clK1R2JiKPLRdTWweOOyYD0wh68KhS4nwZ3He1V42ePQVnOzJT6cEsNhC4xM u8SmJAaFWxM7tcQJQnUDODbYLe0zp1k37dXP3I0JkzoVgQ_EIMgmL9O4dRA9 QFsCq3GiNEqZa_FrtqxHgjUqEY3nFY52bj0qL_y8Pbr9QmqFHC8wH1dIhEit ZTNiOrY7ILxIcgQlh0Aas3rbmPMUENoMOZpTzu6XA_kuh1reDP2avEOMmYaU f0h.77G4APGQHyseClPEph5cN0QCPpJPvQJZvzoxc6BlM6QG.0LyZZNKKLZ. KAQ3C1IaTyXROzDB_JzBA1j8-
Received: from [49.183.54.168] by web162201.mail.bf1.yahoo.com via HTTP; Wed, 12 Feb 2014 00:28:44 PST
X-Rocket-MIMEInfo: 002.001, CgoKCi0tLS0tIE9yaWdpbmFsIE1lc3NhZ2UgLS0tLS0KPiBGcm9tOiBGZXJuYW5kbyBHb250IDxmZXJuYW5kb0Bnb250LmNvbS5hcj4KPiBUbzogTWFyayBaWlogU21pdGggPG1hcmt6enpzbWl0aEB5YWhvby5jb20uYXU.OyBGZXJuYW5kbyBHb250IDxmZ29udEBzaTZuZXR3b3Jrcy5jb20.OyBPbGUgVHJvYW4gPG90cm9hbkBlbXBsb3llZXMub3JnPgo.IENjOiBUaG9tYXMgTmFydGVuIDxuYXJ0ZW5AdXMuaWJtLmNvbT47IEMuIE0uIEhlYXJkIDxoZWFyZEBwb2JveC5jb20.OyBUaW0gQ2hvd24gPHRqY0BlY3MBMAEBAQE-
X-Mailer: YahooMailWebService/0.8.176.634
References: <20140130230740.25350.9524.idtracker@ietfa.amsl.com> <52EAF63A.7050108@si6networks.com> <52F1B8CE.4070803@ericsson.com> <52F1BD1F.2080007@si6networks.com> <m3k3d82zz6.wl%narten@us.ibm.com> <52F383A0.7030002@si6networks.com> <m28utnbwj9.wl%randy@psg.com> <52F44A73.3000609@si6networks.com> <86BA587E-A7F8-47B9-AC74-98D3DB9A7E46@employees.org> <52F4DDC7.8070606@si6networks.com> <1391817989.71306.YahooMailNeo@web162204.mail.bf1.yahoo.com> <52F927E0.5080706@gont.com.ar>
Message-ID: <1392193724.5329.YahooMailNeo@web162201.mail.bf1.yahoo.com>
Date: Wed, 12 Feb 2014 00:28:44 -0800
From: Mark ZZZ Smith <markzzzsmith@yahoo.com.au>
Subject: Re: A problem with RFC 6465's Uniform Format for Extension Headers
To: Fernando Gont <fernando@gont.com.ar>, Fernando Gont <fgont@si6networks.com>, Ole Troan <otroan@employees.org>
In-Reply-To: <52F927E0.5080706@gont.com.ar>
MIME-Version: 1.0
Content-Type: text/plain; charset="iso-8859-1"
Content-Transfer-Encoding: quoted-printable
Cc: Thomas Narten <narten@us.ibm.com>, "C. M. Heard" <heard@pobox.com>, Tim Chown <tjc@ecs.soton.ac.uk>, "6man@ietf.org" <6man@ietf.org>, Suresh Krishnan <suresh.krishnan@ericsson.com>
X-BeenThere: ipv6@ietf.org
X-Mailman-Version: 2.1.15
Precedence: list
Reply-To: Mark ZZZ Smith <markzzzsmith@yahoo.com.au>
List-Id: "IPv6 Maintenance Working Group \(6man\)" <ipv6.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/ipv6>, <mailto:ipv6-request@ietf.org?subject=unsubscribe>
List-Archive: <http://www.ietf.org/mail-archive/web/ipv6/>
List-Post: <mailto:ipv6@ietf.org>
List-Help: <mailto:ipv6-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/ipv6>, <mailto:ipv6-request@ietf.org?subject=subscribe>
X-List-Received-Date: Wed, 12 Feb 2014 08:28:48 -0000




----- Original Message -----
> From: Fernando Gont <fernando@gont.com.ar>
> To: Mark ZZZ Smith <markzzzsmith@yahoo.com.au>; Fernando Gont <fgont@si6networks.com>; Ole Troan <otroan@employees.org>
> Cc: Thomas Narten <narten@us.ibm.com>; C. M. Heard <heard@pobox.com>; Tim Chown <tjc@ecs.soton.ac.uk>; "6man@ietf.org" <6man@ietf.org>; Suresh Krishnan <suresh.krishnan@ericsson.com>
> Sent: Tuesday, 11 February 2014 6:26 AM
> Subject: Re: A problem with RFC 6465's Uniform Format for Extension Headers
> 
> On 02/07/2014 09:06 PM, Mark ZZZ Smith wrote:
>>> 
>>>  If, say, tomorrow you come up with this shiny cool new Dst 
>>>  Opt-based extension for clients, then, from starters, you would 
>>>  have to think of a back-up plan, because in more than 40% cases 
>>>  your packets would get dropped just because of that extension. -- 
>>>  that's where we are right now.
>>> 
>> 
>>  End-to-end crypto might the backup plan.
> 
> Depends on what you mean by end-to-end crypto, and in what context.
> 
> SSL/TLS for say, web servers and mailservers, fine.
> 
> IPsec for the general case...mmm.. unlikely.
> 
> Is there any plan for solving the authentication of nodes? Is everyone
> expected to get/buy a certificate?
> 

Any or all of them. In the latter case, BTNS mode of IPsec (RFC5386) would probably be better than NSA can have everything(tm) IP because it shrinks their window to be a MITM.


> 
> 
>>  I think it might be worth remembering that as per the IETF88 Plenary,
>>  end-to-end encryption is the general direction, and that middle boxes
>>  less effective/in-effective because of it. So putting a lot of time
>>  and effort into facilitating them might be wasted effort.
> 
> It's a 1-page to 5-page document (and that's including bolierplates).
> 

I'm not saying to no do it, just that if e.g., somebody like Google, Apple or Microsoft roll out an update that enables crypto on a very popular service (similar to how within days, millions of iPhones and iPads used MPTCP for Siri), the traffic that these middleboxes are inspecting might "go dark" or become hidden "overnight". If there is a lot of effort involved, it would be wasted if that sort of event happened.

> 
> 
>>  I also think multipathing, to take advantage of smartphone/tablet's
>>  multi-homing to the network will also mean middle boxes become less
>>  effective/in-effective. IOS 7 is already using MPTCP for Siri for
>>  example+.
> 
> This is a comment from the URL you posted:
> 
>>  Yes, it works! Thanks Kristian.
>>  However here in Italy 3G carriers filter out TCP options.. so SIRI gives
>>  up and stops trying to use mptcp in the long run.
> 

"Encapsulation of TCP and other Transport Protocols over UDP"
http://tools.ietf.org/html/draft-cheshire-tcp-over-udp-00


"In fact, TCP options are expected to work
more reliably with TCP-over-UDP, because middleboxes will be less able to easily interfere with such options, modifying them, stripping them, or dropping packets containing TCP options, as they often dotoday with native TCP                     packets.  In particular, Multipath TCP-over-UDP
is expected to work more reliably than native Multipath TCP [RFC6824], because middleboxes that interfere with use of those TCP options will be less able to do that when the packets are encapsulated inside UDP."

;-)


> 
> Cheers,
> -- 
> Fernando Gont
> e-mail: fernando@gont.com.ar || fgont@si6networks.com
> PGP Fingerprint: 7809 84F5 322E 45C7 F1C9 3945 96EE A9EF D076 FFF1
>