RE: A long HBH Options question
Ron Bonica <rbonica@juniper.net> Wed, 22 August 2018 18:30 UTC
Return-Path: <rbonica@juniper.net>
X-Original-To: ipv6@ietfa.amsl.com
Delivered-To: ipv6@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id EEB8F130E17 for <ipv6@ietfa.amsl.com>; Wed, 22 Aug 2018 11:30:09 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -2.711
X-Spam-Level:
X-Spam-Status: No, score=-2.711 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, DKIM_SIGNED=0.1, DKIM_VALID=-0.1, DKIM_VALID_AU=-0.1, RCVD_IN_DNSWL_LOW=-0.7, SPF_PASS=-0.001, T_DKIMWL_WL_HIGH=-0.01] autolearn=ham autolearn_force=no
Authentication-Results: ietfa.amsl.com (amavisd-new); dkim=pass (2048-bit key) header.d=juniper.net
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id RrZv97_KErRf for <ipv6@ietfa.amsl.com>; Wed, 22 Aug 2018 11:30:07 -0700 (PDT)
Received: from mx0a-00273201.pphosted.com (mx0a-00273201.pphosted.com [208.84.65.16]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id 22EF3128B14 for <ipv6@ietf.org>; Wed, 22 Aug 2018 11:30:07 -0700 (PDT)
Received: from pps.filterd (m0108158.ppops.net [127.0.0.1]) by mx0a-00273201.pphosted.com (8.16.0.22/8.16.0.22) with SMTP id w7MIT34p004884; Wed, 22 Aug 2018 11:30:05 -0700
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=juniper.net; h=from : to : cc : subject : date : message-id : references : in-reply-to : content-type : content-transfer-encoding : mime-version; s=PPS1017; bh=9JwyggcwtB72GaUChk1xhpFY+cAMcrAHWoH4akYDj6I=; b=mQYF3zD3zRD7vrfutMnLl77P1PBfbHrTZhtT7NUS6NXn1jgrLM3zlLrxWRcnh3xGrKMk bUlAfx9Q1hMsdWVsvrn6Qh4kOe+FSFosgXCGU3LqJomlV7lL41NEOk8z7dXRyPWTXmj1 B04Cti/2XP8ZlZb/3fGttau9NJkeZJWQXUt4R8aq0FT7hSszQXi2Aot7SdWdQ35cK9/P 2bJ1X2zE9wLTq9HOZe97Tr5HAlODRJ+23ty+vqP2Fo8kfw0yuxQP2NUD6S/AZYVJJFh2 yzACny0FoaoK2FyQYNAPxQOOgwcLzoddpO4vrJmE4JvUoRnVoVJrA4pITqf3E8u7leoD WQ==
Received: from nam03-co1-obe.outbound.protection.outlook.com (mail-co1nam03lp0022.outbound.protection.outlook.com [216.32.181.22]) by mx0a-00273201.pphosted.com with ESMTP id 2m0wmd9gcv-1 (version=TLSv1.2 cipher=ECDHE-RSA-AES256-SHA384 bits=256 verify=NOT); Wed, 22 Aug 2018 11:30:05 -0700
Received: from CO1PR05MB443.namprd05.prod.outlook.com (10.141.73.152) by CO1PR05MB380.namprd05.prod.outlook.com (10.141.51.15) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA384_P256) id 15.20.1080.13; Wed, 22 Aug 2018 18:30:03 +0000
Received: from CO1PR05MB443.namprd05.prod.outlook.com ([fe80::7de8:5a5d:b33e:cc4]) by CO1PR05MB443.namprd05.prod.outlook.com ([fe80::7de8:5a5d:b33e:cc4%13]) with mapi id 15.20.1080.010; Wed, 22 Aug 2018 18:30:02 +0000
From: Ron Bonica <rbonica@juniper.net>
To: Tom Herbert <tom@herbertland.com>
CC: "C. M. Heard" <heard@pobox.com>, 6man <ipv6@ietf.org>
Subject: RE: A long HBH Options question
Thread-Topic: A long HBH Options question
Thread-Index: AQHUObCrEtKF8KL2QES9yAPkm4SM4KTL1VyAgAAgn4CAAA59gIAAE9oA
Date: Wed, 22 Aug 2018 18:30:02 +0000
Message-ID: <CO1PR05MB443D2386EFA1B2F8996719BAE300@CO1PR05MB443.namprd05.prod.outlook.com>
References: <CACL_3VFn9x2o1OW5wk0nt3n71K0XpQ2Kv1X+2CJnpPA6QdMVgA@mail.gmail.com> <CALx6S36QbcQc-ZspeH66Z=yVfKLrWyuhTLzB8ui7HBtfcg++4g@mail.gmail.com> <CO1PR05MB4436DFC162726D11A0DE530AE300@CO1PR05MB443.namprd05.prod.outlook.com> <CALx6S37QeKnHJz6MG7GsiKaAFz3D4iVkv=OG=oVZwgumOaoEbA@mail.gmail.com>
In-Reply-To: <CALx6S37QeKnHJz6MG7GsiKaAFz3D4iVkv=OG=oVZwgumOaoEbA@mail.gmail.com>
Accept-Language: en-US
Content-Language: en-US
X-MS-Has-Attach:
X-MS-TNEF-Correlator:
dlp-product: dlpe-windows
dlp-version: 11.0.400.15
dlp-reaction: no-action
x-originating-ip: [66.129.241.14]
x-ms-publictraffictype: Email
x-microsoft-exchange-diagnostics: 1; CO1PR05MB380; 6:5owpG2Li2bDTPndd4YOIrqgldKGk4Wc402KD4ijCuMU+USQ/GOr5fdfj1xVirnyGlKZyvvYwN2QVLL02aLvggebkc9dUEjD8Nn/nsaLwqUX4JdDtTeR+WU9ILNjuW0K81Pww6ELB+jp9lCEWHHoNV5BkfQ9i3rVhKiMulAj3T23DIHi40cbAZhA2yObz6jWMaA8I1OebAAXMUWaVZA/YLRr79aLw/+sTAMReIkH25CtB31+WFjf6/Ap5Z08th3VUC1+lMvxAbaiT+scDNIwgBtXogj1bNniViDc5bIw+ZNB8k8EMc+jPb0TQFAlNHI1UKc4gvaICU63EOYb0nNl5QdRg7RZsxxJLzwOoQuoi8ylNsdRsG0TlAz+mYV5m88Z/wj3IgQxxLrQppZCYWzm7O0pFVUhjmqC7C2SpqggIfMBmMxT6fW8ORCqDxctf3VjrVr64DQNCKMoNWiJRvsZcNw==; 5:IVp0DbUrrMKzSq6fRrFaEWjido49pyOhyJoE10wOemYpKoOa2IgWqGJEOGUl1Dt1V5HLyxF7ib6MOh8VDYThn/AVE8AytswayqbtEX4P/vgL+PyHiA2xCUSrpb3lFYpXXLPNOCziCrzZ2eQdQ+lKmhGQcOcdPfBgW5cQDImkrPw=; 7:B/lljg1MIIwb4/tzUk7szbTIOFOtuFo6lmJhw42tfRSOmhY6BftYvwrkwCZL+aDyJbXMLXj+mlMVFWBI8BUassv9LKf7/LuYGjj9LCP+kGd35zdL1v4G4xyeqC0KSNRoeqJyhXzzb5jaWUX61wDDO3yQ/8qr3TcNdHqdQfcorp5hIuBAVdOcXuy7oaKaNlV9j9eJ9ReMVq2PmZ6/HHcBWiqhv2Lthkon7UwJ1fQiAh1t+WIyDzxVhatzW9oN8WBJ
x-ms-exchange-antispam-srfa-diagnostics: SOS;
x-ms-office365-filtering-correlation-id: 82a9127b-f881-4cc1-e125-08d6085d469c
x-ms-office365-filtering-ht: Tenant
x-microsoft-antispam: BCL:0; PCL:0; RULEID:(7020095)(4652040)(8989137)(5600074)(711020)(4618075)(4534165)(4627221)(201703031133081)(201702281549075)(8990107)(2017052603328)(7153060)(7193020); SRVR:CO1PR05MB380;
x-ms-traffictypediagnostic: CO1PR05MB380:
x-microsoft-antispam-prvs: <CO1PR05MB380B60B061FB7B76755E6BCAE300@CO1PR05MB380.namprd05.prod.outlook.com>
x-exchange-antispam-report-test: UriScan:(10436049006162)(138986009662008)(100324003535756);
x-ms-exchange-senderadcheck: 1
x-exchange-antispam-report-cfa-test: BCL:0; PCL:0; RULEID:(8211001083)(6040522)(2401047)(5005006)(8121501046)(10201501046)(3231311)(944501410)(52105095)(3002001)(93006095)(93001095)(6055026)(149027)(150027)(6041310)(20161123562045)(20161123564045)(20161123558120)(201703131423095)(201702281528075)(20161123555045)(201703061421075)(201703061406153)(20161123560045)(201708071742011)(7699016); SRVR:CO1PR05MB380; BCL:0; PCL:0; RULEID:; SRVR:CO1PR05MB380;
x-forefront-prvs: 0772E5DAD5
x-forefront-antispam-report: SFV:NSPM; SFS:(10019020)(376002)(39860400002)(396003)(136003)(346002)(366004)(13464003)(51444003)(189003)(199004)(5250100002)(305945005)(446003)(97736004)(26005)(7736002)(74316002)(486006)(11346002)(53546011)(6506007)(102836004)(2900100001)(93886005)(476003)(6116002)(53936002)(14454004)(6916009)(966005)(3846002)(8676002)(66066001)(478600001)(86362001)(33656002)(575784001)(2906002)(5660300001)(55016002)(106356001)(25786009)(76176011)(316002)(54906003)(6436002)(8936002)(6246003)(7696005)(45954006)(99286004)(105586002)(19627235002)(186003)(229853002)(81166006)(6306002)(68736007)(81156014)(256004)(14444005)(9686003)(4326008)(350894002); DIR:OUT; SFP:1102; SCL:1; SRVR:CO1PR05MB380; H:CO1PR05MB443.namprd05.prod.outlook.com; FPR:; SPF:None; LANG:en; PTR:InfoNoRecords; MX:1; A:1;
received-spf: None (protection.outlook.com: juniper.net does not designate permitted sender hosts)
x-microsoft-antispam-message-info: Yrhf1ADXcRNv/q3y+TnjL+1e7VXnjVYIeXCHjNyNvOjiV8bDz6Yi66EQYx+mc2bobu9ZEprY4GkUPwfCzs22hwYBwnH3PcISEbLpKBiRAGKD8vZNAagGdQSdAOfNug632PY2MfmqctTrKjZOiTiUk7wk5ll7WpvpobFrrM+5oJjuTbxtddR/EqHBLKS6wk7cJ4B5vpKdGKwhGcjB7mA1p8H6pA4sNwqW41gypJj8Dsx+xAHy/e6+DNzl1TXb4IdZ2A+y6kQFasSiC5Ptz3/ii1O+X0LHwNoiXlq5yLPfpp2rJQGvATcSzkB0PkAMM8pjwp1CETRTgF89wacxmJUynncIMOXMW5v2Bpyi1SfNhJY=
spamdiagnosticoutput: 1:99
spamdiagnosticmetadata: NSPM
Content-Type: text/plain; charset="utf-8"
Content-Transfer-Encoding: base64
MIME-Version: 1.0
X-OriginatorOrg: juniper.net
X-MS-Exchange-CrossTenant-Network-Message-Id: 82a9127b-f881-4cc1-e125-08d6085d469c
X-MS-Exchange-CrossTenant-originalarrivaltime: 22 Aug 2018 18:30:02.8545 (UTC)
X-MS-Exchange-CrossTenant-fromentityheader: Hosted
X-MS-Exchange-CrossTenant-id: bea78b3c-4cdb-4130-854a-1d193232e5f4
X-MS-Exchange-Transport-CrossTenantHeadersStamped: CO1PR05MB380
X-Proofpoint-Virus-Version: vendor=fsecure engine=2.50.10434:, , definitions=2018-08-22_09:, , signatures=0
X-Proofpoint-Spam-Details: rule=outbound_spam_notspam policy=outbound_spam score=0 priorityscore=1501 malwarescore=0 suspectscore=0 phishscore=0 bulkscore=0 spamscore=0 clxscore=1015 lowpriorityscore=0 mlxscore=0 impostorscore=0 mlxlogscore=999 adultscore=0 classifier=spam adjust=0 reason=mlx scancount=1 engine=8.0.1-1807170000 definitions=main-1808220182
Archived-At: <https://mailarchive.ietf.org/arch/msg/ipv6/GFDGYwnj_obswCtJzMfzrY_56Iw>
X-BeenThere: ipv6@ietf.org
X-Mailman-Version: 2.1.27
Precedence: list
List-Id: "IPv6 Maintenance Working Group \(6man\)" <ipv6.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/ipv6>, <mailto:ipv6-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/ipv6/>
List-Post: <mailto:ipv6@ietf.org>
List-Help: <mailto:ipv6-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/ipv6>, <mailto:ipv6-request@ietf.org?subject=subscribe>
X-List-Received-Date: Wed, 22 Aug 2018 18:30:10 -0000
Tom, Fair enough. The first item is out of scope for your draft. The second will be included. The third and fourth are already in your draft. Ron > -----Original Message----- > From: Tom Herbert <tom@herbertland.com> > Sent: Wednesday, August 22, 2018 1:17 PM > To: Ron Bonica <rbonica@juniper.net> > Cc: C. M. Heard <heard@pobox.com>; 6man <ipv6@ietf.org> > Subject: Re: A long HBH Options question > > On Wed, Aug 22, 2018 at 9:43 AM, Ron Bonica <rbonica@juniper.net> wrote: > > Hi Tom, > > > > Hi Ron, > > > Judging by the feedback, those experiencing cognitive dissonance > > constitute a small minority. Maybe our concerns are better addressed > > with medication than clarifications ;-) > > > > However, if you want to reduce the number of pills that I take every day, > you might add the following clarifications to your document: > > > > - What do the "act" bits mean when they appear in an HBH option? > > That would be a good clarification of HBH processing in RFC8200. > > > - What does the "chg" bit mean when it appears in an option where Opt > Data Len is equal to 0. > > Okay. > > > - What does the "chg" bit mean when it appears in a Destination Options > header precedes the Routing Options header. > > - What does the "chg" bit mean when it appears in a Destination Options > header follows the Routing Options header (or the packet does not contain a > routing header). > > I think that's already covered in the draft (section 3). Please let me know if it's > not clear. > > Tom > > > > > > > Ron > > > > > >> -----Original Message----- > >> From: Tom Herbert <tom@herbertland.com> > >> Sent: Wednesday, August 22, 2018 10:28 AM > >> To: C. M. Heard <heard@pobox.com> > >> Cc: Ron Bonica <rbonica@juniper.net>; 6man <ipv6@ietf.org> > >> Subject: Re: A long HBH Options question > >> > >> On Tue, Aug 21, 2018 at 5:39 PM, C. M. Heard <heard@pobox.com> > wrote: > >> > On Tue, 21 Aug 2018 19:16:55 +0000, Ron Bonica wrote: > >> >> [ … ] let's assume that: > >> >> > >> >> - A packet contains an HBH option and the high-order bits of the HBH > >> >> Option type are "10" [could also be "01" or "11'] > >> >> > >> >> - The packet traverses Router A and Router B on route to its > >> >> destination > >> >> > >> >> - Router A is not configured to process HBH options > >> >> > >> >> - Router B is configured to process HBH options > >> >> > >> >> - Neither Router A nor Router B recognize the HBH option contained by > >> >> the above-mentioned packet. > >> >> > >> >> I think that RFC 8200 requires the following behavior: > >> >> > >> >> - Router A forwards the packet to Router B, without examining the HBH > >> >> Options header > >> >> > >> >> - Router B discards the packet, because it doesn't recognize the > >> >> option. > >> >> > >> >> Is this the required behavior? > >> > > >> > Yes. > >> > > >> >> If so, does this behavior cause cognitive dissonance for anybody else? > >> > > >> > It sure does. > >> > > >> >> I am thinking that the "act" bits are meaningless in the HBH > >> >> extension header. This discussion may also be applicable to > >> >> draft-herbert-ipv6-update-dest-ops. > >> > > >> > The "act" bits are not exactly meaningless, but only the encoding "00" > >> > will elicit consistent behavior from nodes that comply with RFC > >> > 8200 and don't recognize the option. To me, it would seem quite odd > >> > if the designer of any new HbH option were to choose an encoding with > "act" > >> > bits other than "00". For already allocated options, any encoding > >> > other than "00" will not have the results expected by those who > >> > designed the options assuming that the rules in RFC 2460 would be > >> > followed. Thus, that the maintainers of existing HbH options with > >> > the "act" bits other than "00" should probably re-examine the > >> > option encoding in light of the change wrought by RFC 8200. Here is the > list: > >> > > >> > 0x63 RPL (RFC 6553, PS) > >> > 0x6D MPL (RFC 7731, PS) > >> > 0xC2 Jumbo Payload (RFC 2675, PS) > >> > 0xEE IP_DFF (RFC 6971, Experimental) > >> > > >> > The ROLL WG has in fact taken this step with the RPL option, though > >> > for reasons independent of the change made in RFC 8200. The > >> > thinking behind the original design in RFC 6553 was that it was > >> > undesirable for the RPL option to escape from the RPL domain in > >> > which it was originated, so "act" was set to "01" to force nodes > >> > external to the domain to silently discard escaped packets. That > >> > thinking has been revised, and there is a document in last call > >> > that will deprecate the existing code point and get a new one > >> > (probably 0x23) with "act" set to > >> "00". > >> > > >> > A re-examination of already allocated destination options would be > >> > called for if the change proposed in > >> > draft-herbert-ipv6-update-dest-ops > >> > were to be implemented. Here is that list: > >> > > >> > 0xC9 Home Address (RFC 6275, PS) > >> > 0x8A Endpoint Identification (DEPRECATED) 0x8B ILNP Nonce (RFC > >> > 6744, > >> > Experimental) 0x8C Line-Identification (RFC 6788, PS) > >> > > >> Mike, > >> > >> Thanks for looking into this. > >> > >> Neither RFC6744 nor RFC6788 explicitly prohibit putting the option in > >> front of a routing header, but I don't think doing that would make > >> much sense in either case. In case of ILNP nonce, the option is used > >> to communicate to a peer node information about the reverse path so > >> it's really intended for the transport destination endpoint. > >> Line-Identification is only used in conjunction with a ND packet > >> being tunneled in the payload so only the ultimate destination should > >> do anything with the option. It would be a good idea if > >> specifications for new Destination Options explicitly said whether or not > they can appear before a Routing header. > >> > >> Tom > >> > >> > The Home Address option would actually not be affected by the > >> > proposed change in draft-herbert-ipv6-update-dest-ops since it > >> > isn't allowed to appear appear before a Routing Header. I have not > >> > examined the others, however. > >> > > >> > Mike Heard > >> > > >> > ------------------------------------------------------------------- > >> > - IETF IPv6 working group mailing list ipv6@ietf.org Administrative > >> > Requests: > >> > https://urldefense.proofpoint.com/v2/url?u=https- > 3A__www.ietf.org_m > >> > ail > >> > man_listinfo_ipv6&d=DwIFaQ&c=HAkYuh63rsuhr6Scbfh0UjBXeMK- > >> ndb3voDTXcWzo > >> > CI&r=Fch9FQ82sir-BoLx84hKuKwl- > >> AWF2EfpHcAwrDThKP8&m=kq67Q11JdAIfRhVwF5c > >> > N-DpFwRB9d3ip8DQlPOmzaII&s=UJLxrCn-N92TYQRkRq9QD_0- > >> Du3MfKXlx3a1n1bVe7U > >> > &e= > >> > ------------------------------------------------------------------- > >> > -
- A long HBH Options question Ron Bonica
- Re: A long HBH Options question Ole Troan
- Re: A long HBH Options question Bob Hinden
- Re: A long HBH Options question Brian E Carpenter
- Re: A long HBH Options question Tom Herbert
- Re: A long HBH Options question Brian E Carpenter
- Re: A long HBH Options question C. M. Heard
- Re: A long HBH Options question Jen Linkova
- Re: A long HBH Options question Ole Troan
- Re: A long HBH Options question C. M. Heard
- Re: A long HBH Options question Nick Hilliard
- Re: A long HBH Options question Tom Herbert
- RE: A long HBH Options question Ron Bonica
- Re: A long HBH Options question Tom Herbert
- RE: A long HBH Options question Ron Bonica