Re: about violation of standards

Gyan Mishra <hayabusagsm@gmail.com> Tue, 23 April 2019 00:27 UTC

Return-Path: <hayabusagsm@gmail.com>
X-Original-To: ipv6@ietfa.amsl.com
Delivered-To: ipv6@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 928F5120026 for <ipv6@ietfa.amsl.com>; Mon, 22 Apr 2019 17:27:25 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -1.998
X-Spam-Level:
X-Spam-Status: No, score=-1.998 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, DKIM_SIGNED=0.1, DKIM_VALID=-0.1, DKIM_VALID_AU=-0.1, FREEMAIL_FROM=0.001, HTML_MESSAGE=0.001, RCVD_IN_DNSWL_NONE=-0.0001, SPF_PASS=-0.001, URIBL_BLOCKED=0.001] autolearn=ham autolearn_force=no
Authentication-Results: ietfa.amsl.com (amavisd-new); dkim=pass (2048-bit key) header.d=gmail.com
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id RSEwZnC_XFzF for <ipv6@ietfa.amsl.com>; Mon, 22 Apr 2019 17:27:23 -0700 (PDT)
Received: from mail-io1-xd44.google.com (mail-io1-xd44.google.com [IPv6:2607:f8b0:4864:20::d44]) (using TLSv1.2 with cipher ECDHE-RSA-AES128-GCM-SHA256 (128/128 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id 2C801120105 for <ipv6@ietf.org>; Mon, 22 Apr 2019 17:27:23 -0700 (PDT)
Received: by mail-io1-xd44.google.com with SMTP id i21so10513550iol.7 for <ipv6@ietf.org>; Mon, 22 Apr 2019 17:27:23 -0700 (PDT)
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=gmail.com; s=20161025; h=mime-version:references:in-reply-to:from:date:message-id:subject:to :cc; bh=XhFkWpanqMRhJbiA7ZpCZ5Iu4da9pGLbGfeFxNkPB9Q=; b=JMo0O9tjHFJxkXfh9+O8mjXxqKmawvCwbOW4LKf8vg9baeMWrtYsjxGVu1VkLUqWyx L5SZwV4ZkbpdCCv6+o/21gGpAbE29wliKgAe88MmaH+3/QbKzBBdSj61tUS7Gi928EqT epze5ORuFVsOgKPsl3K4ABz6rvR5G08/7SBNoX2a8AIeKOdHJLFUxqWcvo6YZHRTbr+8 fQRGjzpu6rSzJ+ttv+ksYK65kNHRt7mE76XcqUYZytuEuAjSMD28gH9lqKzHG2JDorvj FXUQiDFq19R7+O44M8+A0sC3uH0AfAeWL/ZghJcuuig127gbcOx6UypQKc03wbPtbrMv 7U5A==
X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20161025; h=x-gm-message-state:mime-version:references:in-reply-to:from:date :message-id:subject:to:cc; bh=XhFkWpanqMRhJbiA7ZpCZ5Iu4da9pGLbGfeFxNkPB9Q=; b=AgnuniuEM17wAxoYzK+IXNCqvXs03WWJhSaLbwekGUgVi1ugiSwTLttQfGGm9ixuhr H0faWdRkpxmzip0qKTXHRUBVlsEPU0AWljabQ2xqBGnJBnru2tHJUMin1dswznkvqDK+ 5g5qLiOyaknYPlDQvZHzSCnUjE4fmAfSLnodTm7vaMG10X2A4O7kqKtuxiB94nUUMrMl NDkHeXIL0Y1VvUkS+ewYq7e/HTACylzDTfCNqQvAS5NSe1ICGMdzyLTzV6QI1qvQ1BV2 Xr08xyeaPmnWzxGqDz7GsBPkxgZOJ6OrtPi+AOadSkQoRrk4Z63XysEM58i3IOVY0/14 wC4w==
X-Gm-Message-State: APjAAAXHAbmUNIQkzfmJp7lDkI1J7Fxkwq6dgs/JWaCIIXnMBubPs6VG 9+WLMtF5TvsNh2LZauW38i2v2JmAxZukFbC/vLA=
X-Google-Smtp-Source: APXvYqyU+RFDcCC8CCiVuOSqyfpbcOfd5uiG9DA2F6EJWeqjlditrcGGivWcsGUCnKTT0Xb8Sot11rKyRCS4oJNfUVU=
X-Received: by 2002:a5e:8701:: with SMTP id y1mr369923ioj.126.1555979242336; Mon, 22 Apr 2019 17:27:22 -0700 (PDT)
MIME-Version: 1.0
References: <bb7f7606-2adf-e669-8bcd-e41f17800782@gmail.com> <CAJE_bqd9frqX5-yeVPj8MYXpZ4737HqK1gmfD9cQV3A-Ea5HrQ@mail.gmail.com> <CAKQ4NaWLGh3f_dN6WVNnYs9fKL8=vfpnShAK8AczPo8LE8LjFA@mail.gmail.com> <CABNhwV0ZrPnUVwjhZJQ8CzxwZwP6Yap_UX2q8xM6W9r9KZLNSw@mail.gmail.com>
In-Reply-To: <CABNhwV0ZrPnUVwjhZJQ8CzxwZwP6Yap_UX2q8xM6W9r9KZLNSw@mail.gmail.com>
From: Gyan Mishra <hayabusagsm@gmail.com>
Date: Mon, 22 Apr 2019 20:27:09 -0400
Message-ID: <CABNhwV3-yin-5tBA8S=WPS-h-nmVpSPgc3ZCcSfRBNxTqn1FbQ@mail.gmail.com>
Subject: Re: about violation of standards
To: Yucel Guven <yucel.guven@gmail.com>
Cc: 神明達哉 <jinmei@wide.ad.jp>, Alexandre Petrescu <alexandre.petrescu@gmail.com>, IPv6 <ipv6@ietf.org>
Content-Type: multipart/alternative; boundary="00000000000004777b058727a6ca"
Archived-At: <https://mailarchive.ietf.org/arch/msg/ipv6/de24KU4O3wQBiMHT0GdzmTx_hzQ>
X-BeenThere: ipv6@ietf.org
X-Mailman-Version: 2.1.29
Precedence: list
List-Id: "IPv6 Maintenance Working Group \(6man\)" <ipv6.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/ipv6>, <mailto:ipv6-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/ipv6/>
List-Post: <mailto:ipv6@ietf.org>
List-Help: <mailto:ipv6-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/ipv6>, <mailto:ipv6-request@ietf.org?subject=subscribe>
X-List-Received-Date: Tue, 23 Apr 2019 00:27:26 -0000

Here is an abstract thougut ...

So given BAD Unix allows you to write onto the 54 bit all 0s field not
following the standard due inability to provide those checks due to coding
complexity.

So router and switch firewall and load balancer and server can still due to
their inability to check the link local can still code whatever they want
it's just that the inter vendor interoperability may not work is the
disclaimer if not following the RFC 4291 standard.

We can all sing kum bay ah and all finally agree to disagree but all have a
consensus.

Gyan

On Mon, Apr 22, 2019, 8:16 PM Gyan Mishra <hayabusagsm@gmail.com> wrote:

> My concern  with all this is that you have to have and show even one use
> case where 2^64  64 bits of station id is not enough bits and you need to
> encroach on the 54 bit all 0's field.
>
> Just give me one example showing me a use case that 1.84467441E+19 is
> just not big big enough.
>
> Gyan
>
> On Mon, Apr 22, 2019, 11:37 AM Yucel Guven <yucel.guven@gmail.com> wrote:
>
>>
>> Hi Jinmei Tatuya,
>>
>> > This logic doesn't make sense to me at all.  There was a very widely
>> used
>> > implementation of commercial router (I don't name it as it's not my
>> > purpose to pick a particular vendor) that forwarded an IPv6 packet
>> > whose source address is link-local from one link to another link,
>> > instead of returning an ICMPv6 destination unreachable error, code 2,
>> > as specified in RFC4443.
>>
>> That is very interesting point indeed.
>> Do you mean that billions of people's data, information, etc...etc...
>> from their Link-locals
>> can easily be routed to somewhere that no one knows? Just because of
>> "that vendor" (or vendors?)
>> If that's the case, I really wonder about what can be done with
>> "127.0.0.1".
>>
>> Anyways, my concern is about huge amount of addresses of the fe80::/10.
>> There are 281,474,976,710,655 =  281 Trillion 474 Billion 976 million 710
>> Thousand 655 addresses
>> in between  fe80:0:0:0::/64  and fe80:ffff:ffff:ffff::/64.
>> If we just take  fe80:1::/32 or /64, then it breaks RFC4291 due to 54
>> zeros.
>>
>> Is it right time to modify RFC4291?
>>
>>
>>
>>
>>
>>
>>
>> On Thu, Apr 18, 2019 at 11:03 PM 神明達哉 <jinmei@wide.ad.jp> wrote:
>>
>>> On Thu, Apr 18, 2019 at 11:59 AM Alexandre Petrescu <
>>> alexandre.petrescu@gmail.com> wrote:
>>>
>>> >    In private conversation this debate happened:
>>>
>>> >    is an implementation that uses fe80:1::2 address on an interface a
>>> >    violation of standards? (RFC 4291 does not allow for '1' to be
>>> there).
>>>
>>> >    My point of view is that as long as that mplementation is widely
>>> used,
>>> >    that is not a violation of standards.  Rather, the situation makes
>>> it
>>> >    that that standard is not in agreement with implementations..
>>>
>>> This logic doesn't make sense to me at all.  There was a very widely used
>>> implementation of commercial router (I don't name it as it's not my
>>> purpose to pick a particular vendor) that forwarded an IPv6 packet
>>> whose source address is link-local from one link to another link,
>>> instead of returning an ICMPv6 destination unreachable error, code 2,
>>> as specified in RFC4443.  According to that logic, this implementation
>>> would be considered not violating the RFC "because it's widely used";
>>> most people call it an implementation bug.
>>>
>>> Regarding Linux, I'd note that link-local addresses are automatically
>>> generated by the system, and the generated address conforms to the
>>> format specified in Section 2.5.6 of RFC4291.  More specifically, its
>>> intermediate 54 bits are all set to 0.  Plus, as far as I know, the
>>> vast majority of people never bother to change the auto-generated
>>> link-local addresses.  In that sense the use of addresses like
>>> "fe80:1::2" are not really widely used, even if the implementation
>>> that allows its users to manually configure such addresses is widely
>>> used.
>>>
>>> Almost any implementation has some weapon that allows its user to
>>> shoot their feet, often violating protocol standards.  An extreme case
>>> is a tool like bpf, with which you can send out almost any broken
>>> packets to the wire.  BPF is widely used tools, but as far as I know
>>> no one uses the existence of that tool to justify the violation of the
>>> standard.
>>>
>>> Now, I'm open to the discussion of possibly updating RFC4291 to allow
>>> non-0 value in the intermediate 54-bit field, starting from the fact
>>> that it currently violates the standard.  But I don't buy an argument
>>> that a behavior against the current standard is not a violation simply
>>> because there's a system utility of a widely used OS that allows that
>>> particular behavior.
>>>
>>> --
>>> JINMEI, Tatuya
>>> --------------------------------------------------------------------
>>> IETF IPv6 working group mailing list
>>> ipv6@ietf.org
>>> Administrative Requests: https://www.ietf.org/mailman/listinfo/ipv6
>>> --------------------------------------------------------------------
>>>
>> --------------------------------------------------------------------
>> IETF IPv6 working group mailing list
>> ipv6@ietf.org
>> Administrative Requests: https://www.ietf.org/mailman/listinfo/ipv6
>> --------------------------------------------------------------------
>>
>