[IPv6]Re: Ketan Talaulikar's Discuss on draft-ietf-6man-icmpv6-reflection-15: (with DISCUSS)

Tal Mizrahi <tal.mizrahi.phd@gmail.com> Thu, 04 December 2025 05:44 UTC

Return-Path: <tal.mizrahi.phd@gmail.com>
X-Original-To: ipv6@mail2.ietf.org
Delivered-To: ipv6@mail2.ietf.org
Received: from localhost (localhost [127.0.0.1]) by mail2.ietf.org (Postfix) with ESMTP id A16779514489 for <ipv6@mail2.ietf.org>; Wed, 3 Dec 2025 21:44:40 -0800 (PST)
X-Virus-Scanned: amavisd-new at ietf.org
X-Spam-Flag: NO
X-Spam-Score: -2.099
X-Spam-Level:
X-Spam-Status: No, score=-2.099 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, DKIM_SIGNED=0.1, DKIM_VALID=-0.1, DKIM_VALID_AU=-0.1, DKIM_VALID_EF=-0.1, FREEMAIL_FROM=0.001, RCVD_IN_DNSWL_NONE=-0.0001, SPF_HELO_NONE=0.001, SPF_PASS=-0.001] autolearn=ham autolearn_force=no
Authentication-Results: mail2.ietf.org (amavisd-new); dkim=pass (2048-bit key) header.d=gmail.com
Received: from mail2.ietf.org ([166.84.6.31]) by localhost (mail2.ietf.org [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id Zg2s-7QZnHtM for <ipv6@mail2.ietf.org>; Wed, 3 Dec 2025 21:44:40 -0800 (PST)
Received: from mail-ej1-x631.google.com (mail-ej1-x631.google.com [IPv6:2a00:1450:4864:20::631]) (using TLSv1.3 with cipher TLS_AES_128_GCM_SHA256 (128/128 bits) key-exchange X25519 server-signature ECDSA (P-256) server-digest SHA256) (No client certificate requested) by mail2.ietf.org (Postfix) with ESMTPS id 236729514482 for <ipv6@ietf.org>; Wed, 3 Dec 2025 21:44:40 -0800 (PST)
Received: by mail-ej1-x631.google.com with SMTP id a640c23a62f3a-b762de65c07so70264066b.2 for <ipv6@ietf.org>; Wed, 03 Dec 2025 21:44:40 -0800 (PST)
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=gmail.com; s=20230601; t=1764827079; x=1765431879; darn=ietf.org; h=content-transfer-encoding:cc:to:subject:message-id:date:from :in-reply-to:references:mime-version:from:to:cc:subject:date :message-id:reply-to; bh=bpPU/MbHqZAt7ZI/ZheCHELr0iMipxh0lUn/DMbODt4=; b=ekb0Bs2qTYsY5uOc4OE2wyUvf+Yt8dafusEVsrzT3nk4QL1z0BiMeGPVkHRL/i5syp Q2WitQOQxxAsViWltqIlAU2iRh9w9fvbEI1rtPe7jS+RNjCqrbsxfy2omIG/HSKsvRD2 gnJKAUNSsneGSQsmLOel0YoUciFY+F8EgXdmUloSHdDyRBqPrvghIUWC7GDjs47tyfzu XFE3GWOBGPL/H4W4eMAwbEOMOJH7hOZo3kQxsnwcTX5/PjKROO9uby/53BWN0zmrCIlP efLla9bfqxSES8FJ9AiA5+9h0QiREpkLvtD1ZYZCxeT0LzBbz13eQ/Fbb/YZosEmO6Pq TauQ==
X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20230601; t=1764827079; x=1765431879; h=content-transfer-encoding:cc:to:subject:message-id:date:from :in-reply-to:references:mime-version:x-gm-gg:x-gm-message-state:from :to:cc:subject:date:message-id:reply-to; bh=bpPU/MbHqZAt7ZI/ZheCHELr0iMipxh0lUn/DMbODt4=; b=s88jDmUnlW4Ot0iAVFVGVnJ9O3DvpzO/HHd9b24DE7xmNRn0BVC7Ewy7lc814dzutN QIW8TNzmptcvCuj/3eJf4apEDdjP6k9rD9hxo67LqNZmM63x4dk3cWsu0j1qENW5qGyK u5V9JbmjnyCICv6RS9HPdHFQ12XAWdDe1VKbUGxiXXw3K51stC9e+TbBsXVjPuTxD8O/ EpttJDXodg+5aZ7pX5xs04BlTl/5AhnNpKD3k7waSqoMXdL4K/SHsoi7hE0wtbXEFwfY L0np9ylowTIfWxJW+JPlm2fY+S+k8rDHTfr+KeBFbM7IqPb7d7uiYKRqULQu8CUAzrRM PXCA==
X-Forwarded-Encrypted: i=1; AJvYcCVXblGTOGhenPIYt7TUOPiZI6jQNVnlriRkjiFkddNjCuezxUsIseAkZrNo+ufH/QMlKuK7@ietf.org
X-Gm-Message-State: AOJu0YwN5te8+U6hdn6wn6Kc/3BJahwt0RhAnZwYH4VaPHxOauhzUAAD +4uCQclwbW/S5QXfMiWRQHOBhAQo+uKr9fVm/NpijoFcWuWyKwg8dexYchkbBfoLedj5ZYmmZCb f8JfSx37KDOpcqlICBKRCvvmPUSUahjU=
X-Gm-Gg: ASbGncvMWaNvijaRqyP2FrBD4mFyMi4VZO0kqIB75L63zkqds3XnjTvAydUAvJuBFqD ycYDEtB9PZT4Vz7gSIi8jUPsxyxIXcWXZZjf8snAdaRl4dHcBEUCcBuNdSkzA3l4CiQqh6oEVxF FLnxJHehEPnP5uP9zkq0exB6n3TACBavOHv5yLKF5Xw0StTcqftCWFLsbAHE+6QDW6XXEOVWd7Z DxqWhU/JGXpRUyio85LHKZQiuDk8ezDhKbFO5X40/zjznJB2MJHP1MXMqs8jjd/DBUO0Bx/iqD6 xaRJng==
X-Google-Smtp-Source: AGHT+IHZHwNyA2qxmQilTjeifjhAMJewQV8gI4Iy7HatjQlWNmrXkAr5c133JC4tyNfoFpw3je2VnDjEfQX9jz/5S6E=
X-Received: by 2002:a17:907:1c1b:b0:b3f:f207:b748 with SMTP id a640c23a62f3a-b79ec3f09f6mr175996366b.10.1764827078823; Wed, 03 Dec 2025 21:44:38 -0800 (PST)
MIME-Version: 1.0
References: <176476785625.3997352.709554547453583554@dt-datatracker-5bd94c585b-wk4l4>
In-Reply-To: <176476785625.3997352.709554547453583554@dt-datatracker-5bd94c585b-wk4l4>
From: Tal Mizrahi <tal.mizrahi.phd@gmail.com>
Date: Thu, 04 Dec 2025 07:44:27 +0200
X-Gm-Features: AWmQ_bn319c5AcI3_0In9LPMu5HswATpeWL52Fa_rSUzbuz7wjmRHevc80cJT5k
Message-ID: <CABUE3XnURkOXzYOJ-pKRctXtYRbhwO1np2w-cHbKhg-SGoKF=A@mail.gmail.com>
To: Ketan Talaulikar <ketant.ietf@gmail.com>
Content-Type: text/plain; charset="UTF-8"
Content-Transfer-Encoding: quoted-printable
Message-ID-Hash: VB2VADGKQ7PKH5R7DJIQUD46RYM6M5ZJ
X-Message-ID-Hash: VB2VADGKQ7PKH5R7DJIQUD46RYM6M5ZJ
X-MailFrom: tal.mizrahi.phd@gmail.com
X-Mailman-Rule-Misses: dmarc-mitigation; no-senders; approved; emergency; loop; banned-address; member-moderation; header-match-ipv6.ietf.org-0; nonmember-moderation; administrivia; implicit-dest; max-recipients; max-size; news-moderation; no-subject; digests; suspicious-header
CC: The IESG <iesg@ietf.org>, 6man-chairs@ietf.org, draft-ietf-6man-icmpv6-reflection@ietf.org, ipv6@ietf.org
X-Mailman-Version: 3.3.9rc6
Precedence: list
Subject: [IPv6]Re: Ketan Talaulikar's Discuss on draft-ietf-6man-icmpv6-reflection-15: (with DISCUSS)
List-Id: "IPv6 Maintenance Working Group (6man)" <ipv6.ietf.org>
Archived-At: <https://mailarchive.ietf.org/arch/msg/ipv6/epIFE9ubcYPRuTVjH4htgNYP9ws>
List-Archive: <https://mailarchive.ietf.org/arch/browse/ipv6>
List-Help: <mailto:ipv6-request@ietf.org?subject=help>
List-Owner: <mailto:ipv6-owner@ietf.org>
List-Post: <mailto:ipv6@ietf.org>
List-Subscribe: <mailto:ipv6-join@ietf.org>
List-Unsubscribe: <mailto:ipv6-leave@ietf.org>

Hi Ketan,

Thanks for reviewing the updated version and thanks for the comments.
Please see below, marked [TM].

On Wed, Dec 3, 2025 at 3:17 PM Ketan Talaulikar via Datatracker
<noreply@ietf.org> wrote:
>
> Ketan Talaulikar has entered the following ballot position for
> draft-ietf-6man-icmpv6-reflection-15: Discuss
>
> When responding, please keep the subject line intact and reply to all
> email addresses included in the To and CC lines. (Feel free to cut this
> introductory paragraph, however.)
>
>
> Please refer to https://www.ietf.org/about/groups/iesg/statements/handling-ballot-positions/
> for more information about how to handle DISCUSS and COMMENT positions.
>
>
> The document, along with other ballot positions, can be found here:
> https://datatracker.ietf.org/doc/draft-ietf-6man-icmpv6-reflection/
>
>
>
> ----------------------------------------------------------------------
> DISCUSS:
> ----------------------------------------------------------------------
>
> Thanks to the authors and the WG for their work on this document.
>
> I have a few points that I would like to discuss with the authors/WG.
>
> Note: This ballot has been updated based on v15 of the document. The original
> numbering of points has been retained and points that are closed have been
> deleted.
>
> <discuss-2> I am a bit confused by the very strict and exact check for the
> message size against the payload size allowed in the Reflect-All object. What
> if (due to some reason), the extension header size were to change, or some
> extension headers inserted/removed in flight? Regardless of whether those
> things are allowed by RFC8200, they could be happening in the network. This
> strict check in the spec prevents the detection of such changes - there would
> only be an error reported and that is not very helpful to know what has
> changed.

[TM] The text in version 15 has been updated compared to previous versions:

   The total length of the ICMPv6 Extended
   Echo Reply message is equal to the total length of the corresponding
   request message, unless the probed node's policy restricts the reply
   length or the reply size would exceed the MTU, in which cases the
   reply might be shorter.

Thus, if necessary, the reply is shorter than the request, but not
longer to avoid amplification. Therefore, this text is not as strict
in this context as in previous versions of the document.

> What would be the problem if the Reflect-All object carried space
> sufficient for the exact originated payload but the responder is allowed to put
> in as much information as required to carry the payload in the response? Am I
> missing something else that warrants such a strict check?

[TM] Right, that is how it works. The only limitation is that the
reply length does not exceed the request length. Within this
limitation, the probed node copies as much as possible from the
request, starting from the beginning of the IP header, into the
Reflect-All object. This includes as much of the object payload as
possible.

Here is an example:

Request:
- 40B IPv6 header
- 8B ICMPv6 header
- 4B ICMPv6 extension header
- 4B object header
- 100B object payload

Reply:
- 40B IPv6 header
- 8B ICMPv6 header
- 4B ICMPv6 extension header
- 4B object header
- 100B object payload, consisting of 56B of the request's headers
(40+8+4+4 bytes), and the first 44B of the request's object payload.

Notably, the probed node truncates as much as needed from the request
in order to prevent the reply from being longer than the request.

Please let us know if we missed something here.


>
> <discuss-5> Section 5 says:
>
> If the 'Reflect All' object is sufficiently long, the reply message includes
> the initial octets of the 'Reflect All' object. A notable use case for
> including arbitrary data in the object payload is the inclusion of a
> transmission timestamp, similar to how conventional Ping utilities incorporate
> timestamps into the ICMP payload. If the initial octets of the 'Reflect All'
> object payload contain a timestamp and the object is long enough, the timestamp
> is reflected back to the probing node, enabling round-trip time calculations.
>
> This kind of approach is a big problem for interoperability. If a timestamp is
> desired then it should be well specified as another ICMP Extension Header
> object with a proper format. Let us please not publish specs with such secret
> and private communication channel ideas.

[TM] It is important to emphasize that there is no requirement for
interoperability, since the timestamp in the example is generated and
used by the probing node. The timestamp use case is identical to how
existing ICMP Echo Request and Reply are used in common Ping
implementations. This use case in ICMP Echo was never standardized
because it does not require interoperability.

>
> Also, the text on what the responder needs to do is not clear. I believe the
> intention is that it will form a new ICMPv6 packet (without any extension
> headers normally?) and in that encode the original IPv6 packet carrying the
> ICMPv6 reflection request in the Reflect-All object payload - in doing so, it
> will take the contents of the request only until the start of the Reflect-All
> object. Am I correct?

[TM] The probed node is not aware of whether there is a timestamp in
the request, and there is no specific functionality that is required
from the probed node in this context. For example, if the timestamp is
incorporated into the first 8 bytes of the object payload of the
request, then as long as the Reflect-All object in the reply is long
enough to include the first 8 bytes of the request's object payload,
the probing node will get the timestamp back and will be able to use
it as existing Ping utilities work today.


Please let us know if this makes sense.

Cheers,
Tal.