Re: End-to-end (was Re: Non-Last Small IPv6 Fragments)

Tom Herbert <tom@herbertland.com> Wed, 16 January 2019 17:28 UTC

Return-Path: <tom@herbertland.com>
X-Original-To: ipv6@ietfa.amsl.com
Delivered-To: ipv6@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 8C197124BAA for <ipv6@ietfa.amsl.com>; Wed, 16 Jan 2019 09:28:25 -0800 (PST)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -2.041
X-Spam-Level:
X-Spam-Status: No, score=-2.041 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, DKIMWL_WL_MED=-0.142, DKIM_SIGNED=0.1, DKIM_VALID=-0.1, RCVD_IN_DNSWL_NONE=-0.0001, URIBL_BLOCKED=0.001] autolearn=ham autolearn_force=no
Authentication-Results: ietfa.amsl.com (amavisd-new); dkim=pass (2048-bit key) header.d=herbertland-com.20150623.gappssmtp.com
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id k3oobHrBQqW9 for <ipv6@ietfa.amsl.com>; Wed, 16 Jan 2019 09:28:24 -0800 (PST)
Received: from mail-qk1-x72b.google.com (mail-qk1-x72b.google.com [IPv6:2607:f8b0:4864:20::72b]) (using TLSv1.2 with cipher ECDHE-RSA-AES128-GCM-SHA256 (128/128 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id DA4901228B7 for <ipv6@ietf.org>; Wed, 16 Jan 2019 09:28:23 -0800 (PST)
Received: by mail-qk1-x72b.google.com with SMTP id a1so4247335qkc.5 for <ipv6@ietf.org>; Wed, 16 Jan 2019 09:28:23 -0800 (PST)
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=herbertland-com.20150623.gappssmtp.com; s=20150623; h=mime-version:references:in-reply-to:from:date:message-id:subject:to :cc; bh=SILeRdCARQa9MTMKvmjBuZN83J6PFqutmJCc9Ucuq/c=; b=KOCUrlVO+7zZkNHF2p7GTh3KrdC/IKhwWLLCtyVIMA1vyrcCDfak5+HOlOVkjxWFEA V2Tt6JwVLGY4MszCMvRuxzO8beZE7lZ7vlnNhtysz6Xsgx2gXDNnlSXTau7r471KY2rB Qf4eFH+xLM7McrDYEXucISqtJAB4mxE7lHAy/evwDIc9NERDP86Ui8P9ycxIKgR2bJGx Dm7N3KVsoOGMwPE7hDHimPoAcQM4oOgAARijENeK0b7Fk7xSr+BfAb57D8/9o1y3zoWa dZe+fU/78cGvGL6EjgVXMqr1ifs1cht/an2OL7HeDRiHhYlNfhwpoEaqiVTWntXRZ609 S9+Q==
X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20161025; h=x-gm-message-state:mime-version:references:in-reply-to:from:date :message-id:subject:to:cc; bh=SILeRdCARQa9MTMKvmjBuZN83J6PFqutmJCc9Ucuq/c=; b=JAZKBBOtAZgqz9XGBxnBHxz+83dlLHfT7u937ZNue1Tn/QlvAUVgS8yvZGSbmy6Cfo 67dSd9UJKhIE8Kv+sRQHEwwTWBvCL1u81WHYxEbpZQiZ5xpI9r29d5ChNBk3LeWVtxC5 33JEjjpehO/MK/3jf4p0kS1mJHLgRTsQO4/nSiWRj+y97LcUuzW8QKPdyRkLduCYHNjg MvFuIyepRYtxma4NNo2y5sGQgF+zj+CtDNKthZcSmLP7TtLg/YrsKJLgxKYhvARmcaS4 dJEqClinRtmT/8IRBRx6PnR+oaxsNyUfS4uJr1sXhBE/o/Q/iceEwqZiTo0tfcI0ebCe ccjw==
X-Gm-Message-State: AJcUuke600497/PBHbNQgH54hOAQBVKyi7d0XmN0mlxu22XBDClggq/2 Fu0x6BMy/CJykwrRmxauDTdNBePas0h4J9mVBorXweRDPvI=
X-Google-Smtp-Source: ALg8bN7gCBVDIjKDJQ1LaSxoMGbJDGswWYyzs4MstqqZq44lNKCsnDSWPavtBMWsmjJLbdtP5NhYqxO8VENPHc03Rco=
X-Received: by 2002:a37:d4d9:: with SMTP id s86mr7484175qks.190.1547659702715; Wed, 16 Jan 2019 09:28:22 -0800 (PST)
MIME-Version: 1.0
References: <CAOSSMjV0Vazum5OKztWhAhJrjLjXc5w5YGxdzHgbzi7YVSk7rg@mail.gmail.com> <4c56f504-7cd7-6323-b14a-d34050d13f4e@foobar.org> <9E6D4A6E-8ABA-4BAB-BEC5-969078323C96@employees.org> <CAAedzxpdF+yhBXfnwUcaQb-HkgdaqXRU3L+S7v8sS1F0OkwM9A@mail.gmail.com> <78a8a0e0-8808-364c-41f7-f81f90362432@gont.com.ar> <CALx6S37YnSbOUgVoWEA46aN88a3CfERWemhQKi_GOrP_g+=rFQ@mail.gmail.com> <308d9dff-87c4-cc63-6792-fcbfce722d1e@gont.com.ar> <CALx6S34kseXuKrrbB44=wz7OQBysUmbJh++N79Da9Kx1rseAUw@mail.gmail.com> <3f87c4ec-636a-790e-0a6a-0a6b4c2f3a35@foobar.org> <046F449C-E19E-4891-968E-975A03162364@lists.zabbadoz.net> <e7a1d5d2-7d7d-00fd-a178-fc2c7f25a167@foobar.org> <251b73fd-d08b-018c-4a24-c524dafbe25b@gmail.com> <e8786213-b1ac-0a8d-093d-579ce84dc126@foobar.org> <9b0c0ead-752f-fa8a-56b5-1a400ba16d22@huitema.net> <CALx6S35H0QYo6cs+7c0gFoysxhL7fmQSNW=BOrya_A4AY6H3JA@mail.gmail.com> <2db935ba-36e1-93b8-08d5-4a0c1e902d71@si6networks.com> <CALx6S34C4UuQWK2fzdkZ7F0ZaEgmaLWzH582PVpEx-XN6FywNA@mail.gmail.com> <028f01e0-8639-ded4-049b-54a976877bf3@si6networks.com>
In-Reply-To: <028f01e0-8639-ded4-049b-54a976877bf3@si6networks.com>
From: Tom Herbert <tom@herbertland.com>
Date: Wed, 16 Jan 2019 09:28:11 -0800
Message-ID: <CALx6S35Csx6cS3Bi7QzUz5FH8dRq1V7tP0yAhgPs-yY19eVFAA@mail.gmail.com>
Subject: Re: End-to-end (was Re: Non-Last Small IPv6 Fragments)
To: Fernando Gont <fgont@si6networks.com>
Cc: Christian Huitema <huitema@huitema.net>, "Bjoern A. Zeeb" <bzeeb-lists@lists.zabbadoz.net>, IPv6 List <ipv6@ietf.org>
Content-Type: text/plain; charset="UTF-8"
Archived-At: <https://mailarchive.ietf.org/arch/msg/ipv6/ePzgWxZ4IqFvAYvOzsvzte0ea-Q>
X-BeenThere: ipv6@ietf.org
X-Mailman-Version: 2.1.29
Precedence: list
List-Id: "IPv6 Maintenance Working Group \(6man\)" <ipv6.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/ipv6>, <mailto:ipv6-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/ipv6/>
List-Post: <mailto:ipv6@ietf.org>
List-Help: <mailto:ipv6-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/ipv6>, <mailto:ipv6-request@ietf.org?subject=subscribe>
X-List-Received-Date: Wed, 16 Jan 2019 17:28:26 -0000

On Wed, Jan 16, 2019 at 8:36 AM Fernando Gont <fgont@si6networks.com> wrote:
>
> On 16/1/19 12:41, Tom Herbert wrote:
> > On Tue, Jan 15, 2019 at 11:52 PM Fernando Gont <fgont@si6networks.com> wrote:
> >>
> >> On 15/1/19 19:42, Tom Herbert wrote:
> >> [....]
> >>> packets. This uses a modifiable HBH options and is completely
> >>> idependent of the transport layer.
> >>
> >> You cannot use HBH in the public Internet. Well, you can... but there
> >> high chances your packets will be dropped.
> >>
> > Fernando,
> >
> > By that same thinking we can't use any extension headers at all,
>
> Indeed.
>
>
>
> > any
> > transport protocol other then TCP (and maybe UDP), ICMP, the TCP
> > authentication option, TCP fast open, UDP options, or even IPv6 on the
> > Internet.
>
> I assume that such options focus on specific scenarios (e.g. TCP-AO for
> BGP), or they have fall-back options (e.g. traditional open for TCP-FO).
> Otherwise they are doomed to fail.
>
>
>
> > As for HBH, RFC8200 relaxed the requirement that intermediate nodes
> > need to process them. If a node just wants to get to the transport
> > layer it can skip over the EH very with a few simple operations. I see
> > no excuse for new devices being deployed to systematically drop HBH or
> > destination options EHs. If they are  doing that then their
> > implementation does not comply with the IPv6 standard and we shouldn't
> > have any compunction about publically calling them out on that.
>
> See https://tools.ietf.org/html/draft-gont-v6ops-ipv6-ehs-packet-drops
>
> The folks running the networks have work to do. And will certainly not
> pay extra money for functionality that somehow is currently not
> required. Vendors will not invest extra to sell devices at the same price.
>
I'm not sure what you mean by "functionality that somehow is currently
not required.". Who determines what is required?

> We can call them out. Vendors for selling boxes that perform very badly
> for packets that contain EHs, and operators for "looking into packets in
> the middle of the network, breaking the sacred e2e principle (or some
> interpretation of it)".
>
> Then I guess *we* will be called out to pretend doing engineering, while
> doing stuff that doesn't work in practice.
>
There is engineering happening. The requirement that every node needs
to process HBH options where there could be hundreds of options in a
single packet was, in retrospect, completely impractical to expect to
be supported. So, RFC8200 relaxed the nodes must process requirement,
and we can define some reasonable limits as to how many options can be
processed. These are examples of updating standards that make
engineering feasible.

> We burying our heads into sand doesn't help the situation, either...
>

Agreed. If someone were to *prove* conclusively that it is impossible
to support even the minimum requirement that allows device to skip
over HBH options, then I would agree that it may make sense to give up
and deprecate them. But until we have that proof in hand, the problem
is real and needs to be dealt with.

Tom

> --
> Fernando Gont
> SI6 Networks
> e-mail: fgont@si6networks.com
> PGP Fingerprint: 6666 31C6 D484 63B2 8FB1 E3C4 AE25 0D55 1D4E 7492
>
>
>
>