RE: A long HBH Options question

Ron Bonica <rbonica@juniper.net> Wed, 22 August 2018 18:30 UTC

Return-Path: <rbonica@juniper.net>
X-Original-To: ipv6@ietfa.amsl.com
Delivered-To: ipv6@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id EEB8F130E17 for <ipv6@ietfa.amsl.com>; Wed, 22 Aug 2018 11:30:09 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -2.711
X-Spam-Level:
X-Spam-Status: No, score=-2.711 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, DKIM_SIGNED=0.1, DKIM_VALID=-0.1, DKIM_VALID_AU=-0.1, RCVD_IN_DNSWL_LOW=-0.7, SPF_PASS=-0.001, T_DKIMWL_WL_HIGH=-0.01] autolearn=ham autolearn_force=no
Authentication-Results: ietfa.amsl.com (amavisd-new); dkim=pass (2048-bit key) header.d=juniper.net
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id RrZv97_KErRf for <ipv6@ietfa.amsl.com>; Wed, 22 Aug 2018 11:30:07 -0700 (PDT)
Received: from mx0a-00273201.pphosted.com (mx0a-00273201.pphosted.com [208.84.65.16]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id 22EF3128B14 for <ipv6@ietf.org>; Wed, 22 Aug 2018 11:30:07 -0700 (PDT)
Received: from pps.filterd (m0108158.ppops.net [127.0.0.1]) by mx0a-00273201.pphosted.com (8.16.0.22/8.16.0.22) with SMTP id w7MIT34p004884; Wed, 22 Aug 2018 11:30:05 -0700
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=juniper.net; h=from : to : cc : subject : date : message-id : references : in-reply-to : content-type : content-transfer-encoding : mime-version; s=PPS1017; bh=9JwyggcwtB72GaUChk1xhpFY+cAMcrAHWoH4akYDj6I=; b=mQYF3zD3zRD7vrfutMnLl77P1PBfbHrTZhtT7NUS6NXn1jgrLM3zlLrxWRcnh3xGrKMk bUlAfx9Q1hMsdWVsvrn6Qh4kOe+FSFosgXCGU3LqJomlV7lL41NEOk8z7dXRyPWTXmj1 B04Cti/2XP8ZlZb/3fGttau9NJkeZJWQXUt4R8aq0FT7hSszQXi2Aot7SdWdQ35cK9/P 2bJ1X2zE9wLTq9HOZe97Tr5HAlODRJ+23ty+vqP2Fo8kfw0yuxQP2NUD6S/AZYVJJFh2 yzACny0FoaoK2FyQYNAPxQOOgwcLzoddpO4vrJmE4JvUoRnVoVJrA4pITqf3E8u7leoD WQ==
Received: from nam03-co1-obe.outbound.protection.outlook.com (mail-co1nam03lp0022.outbound.protection.outlook.com [216.32.181.22]) by mx0a-00273201.pphosted.com with ESMTP id 2m0wmd9gcv-1 (version=TLSv1.2 cipher=ECDHE-RSA-AES256-SHA384 bits=256 verify=NOT); Wed, 22 Aug 2018 11:30:05 -0700
Received: from CO1PR05MB443.namprd05.prod.outlook.com (10.141.73.152) by CO1PR05MB380.namprd05.prod.outlook.com (10.141.51.15) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA384_P256) id 15.20.1080.13; Wed, 22 Aug 2018 18:30:03 +0000
Received: from CO1PR05MB443.namprd05.prod.outlook.com ([fe80::7de8:5a5d:b33e:cc4]) by CO1PR05MB443.namprd05.prod.outlook.com ([fe80::7de8:5a5d:b33e:cc4%13]) with mapi id 15.20.1080.010; Wed, 22 Aug 2018 18:30:02 +0000
From: Ron Bonica <rbonica@juniper.net>
To: Tom Herbert <tom@herbertland.com>
CC: "C. M. Heard" <heard@pobox.com>, 6man <ipv6@ietf.org>
Subject: RE: A long HBH Options question
Thread-Topic: A long HBH Options question
Thread-Index: AQHUObCrEtKF8KL2QES9yAPkm4SM4KTL1VyAgAAgn4CAAA59gIAAE9oA
Date: Wed, 22 Aug 2018 18:30:02 +0000
Message-ID: <CO1PR05MB443D2386EFA1B2F8996719BAE300@CO1PR05MB443.namprd05.prod.outlook.com>
References: <CACL_3VFn9x2o1OW5wk0nt3n71K0XpQ2Kv1X+2CJnpPA6QdMVgA@mail.gmail.com> <CALx6S36QbcQc-ZspeH66Z=yVfKLrWyuhTLzB8ui7HBtfcg++4g@mail.gmail.com> <CO1PR05MB4436DFC162726D11A0DE530AE300@CO1PR05MB443.namprd05.prod.outlook.com> <CALx6S37QeKnHJz6MG7GsiKaAFz3D4iVkv=OG=oVZwgumOaoEbA@mail.gmail.com>
In-Reply-To: <CALx6S37QeKnHJz6MG7GsiKaAFz3D4iVkv=OG=oVZwgumOaoEbA@mail.gmail.com>
Accept-Language: en-US
Content-Language: en-US
X-MS-Has-Attach:
X-MS-TNEF-Correlator:
dlp-product: dlpe-windows
dlp-version: 11.0.400.15
dlp-reaction: no-action
x-originating-ip: [66.129.241.14]
x-ms-publictraffictype: Email
x-microsoft-exchange-diagnostics: 1; CO1PR05MB380; 6:5owpG2Li2bDTPndd4YOIrqgldKGk4Wc402KD4ijCuMU+USQ/GOr5fdfj1xVirnyGlKZyvvYwN2QVLL02aLvggebkc9dUEjD8Nn/nsaLwqUX4JdDtTeR+WU9ILNjuW0K81Pww6ELB+jp9lCEWHHoNV5BkfQ9i3rVhKiMulAj3T23DIHi40cbAZhA2yObz6jWMaA8I1OebAAXMUWaVZA/YLRr79aLw/+sTAMReIkH25CtB31+WFjf6/Ap5Z08th3VUC1+lMvxAbaiT+scDNIwgBtXogj1bNniViDc5bIw+ZNB8k8EMc+jPb0TQFAlNHI1UKc4gvaICU63EOYb0nNl5QdRg7RZsxxJLzwOoQuoi8ylNsdRsG0TlAz+mYV5m88Z/wj3IgQxxLrQppZCYWzm7O0pFVUhjmqC7C2SpqggIfMBmMxT6fW8ORCqDxctf3VjrVr64DQNCKMoNWiJRvsZcNw==; 5:IVp0DbUrrMKzSq6fRrFaEWjido49pyOhyJoE10wOemYpKoOa2IgWqGJEOGUl1Dt1V5HLyxF7ib6MOh8VDYThn/AVE8AytswayqbtEX4P/vgL+PyHiA2xCUSrpb3lFYpXXLPNOCziCrzZ2eQdQ+lKmhGQcOcdPfBgW5cQDImkrPw=; 7:B/lljg1MIIwb4/tzUk7szbTIOFOtuFo6lmJhw42tfRSOmhY6BftYvwrkwCZL+aDyJbXMLXj+mlMVFWBI8BUassv9LKf7/LuYGjj9LCP+kGd35zdL1v4G4xyeqC0KSNRoeqJyhXzzb5jaWUX61wDDO3yQ/8qr3TcNdHqdQfcorp5hIuBAVdOcXuy7oaKaNlV9j9eJ9ReMVq2PmZ6/HHcBWiqhv2Lthkon7UwJ1fQiAh1t+WIyDzxVhatzW9oN8WBJ
x-ms-exchange-antispam-srfa-diagnostics: SOS;
x-ms-office365-filtering-correlation-id: 82a9127b-f881-4cc1-e125-08d6085d469c
x-ms-office365-filtering-ht: Tenant
x-microsoft-antispam: BCL:0; PCL:0; RULEID:(7020095)(4652040)(8989137)(5600074)(711020)(4618075)(4534165)(4627221)(201703031133081)(201702281549075)(8990107)(2017052603328)(7153060)(7193020); SRVR:CO1PR05MB380;
x-ms-traffictypediagnostic: CO1PR05MB380:
x-microsoft-antispam-prvs: <CO1PR05MB380B60B061FB7B76755E6BCAE300@CO1PR05MB380.namprd05.prod.outlook.com>
x-exchange-antispam-report-test: UriScan:(10436049006162)(138986009662008)(100324003535756);
x-ms-exchange-senderadcheck: 1
x-exchange-antispam-report-cfa-test: BCL:0; PCL:0; RULEID:(8211001083)(6040522)(2401047)(5005006)(8121501046)(10201501046)(3231311)(944501410)(52105095)(3002001)(93006095)(93001095)(6055026)(149027)(150027)(6041310)(20161123562045)(20161123564045)(20161123558120)(201703131423095)(201702281528075)(20161123555045)(201703061421075)(201703061406153)(20161123560045)(201708071742011)(7699016); SRVR:CO1PR05MB380; BCL:0; PCL:0; RULEID:; SRVR:CO1PR05MB380;
x-forefront-prvs: 0772E5DAD5
x-forefront-antispam-report: SFV:NSPM; SFS:(10019020)(376002)(39860400002)(396003)(136003)(346002)(366004)(13464003)(51444003)(189003)(199004)(5250100002)(305945005)(446003)(97736004)(26005)(7736002)(74316002)(486006)(11346002)(53546011)(6506007)(102836004)(2900100001)(93886005)(476003)(6116002)(53936002)(14454004)(6916009)(966005)(3846002)(8676002)(66066001)(478600001)(86362001)(33656002)(575784001)(2906002)(5660300001)(55016002)(106356001)(25786009)(76176011)(316002)(54906003)(6436002)(8936002)(6246003)(7696005)(45954006)(99286004)(105586002)(19627235002)(186003)(229853002)(81166006)(6306002)(68736007)(81156014)(256004)(14444005)(9686003)(4326008)(350894002); DIR:OUT; SFP:1102; SCL:1; SRVR:CO1PR05MB380; H:CO1PR05MB443.namprd05.prod.outlook.com; FPR:; SPF:None; LANG:en; PTR:InfoNoRecords; MX:1; A:1;
received-spf: None (protection.outlook.com: juniper.net does not designate permitted sender hosts)
x-microsoft-antispam-message-info: Yrhf1ADXcRNv/q3y+TnjL+1e7VXnjVYIeXCHjNyNvOjiV8bDz6Yi66EQYx+mc2bobu9ZEprY4GkUPwfCzs22hwYBwnH3PcISEbLpKBiRAGKD8vZNAagGdQSdAOfNug632PY2MfmqctTrKjZOiTiUk7wk5ll7WpvpobFrrM+5oJjuTbxtddR/EqHBLKS6wk7cJ4B5vpKdGKwhGcjB7mA1p8H6pA4sNwqW41gypJj8Dsx+xAHy/e6+DNzl1TXb4IdZ2A+y6kQFasSiC5Ptz3/ii1O+X0LHwNoiXlq5yLPfpp2rJQGvATcSzkB0PkAMM8pjwp1CETRTgF89wacxmJUynncIMOXMW5v2Bpyi1SfNhJY=
spamdiagnosticoutput: 1:99
spamdiagnosticmetadata: NSPM
Content-Type: text/plain; charset="utf-8"
Content-Transfer-Encoding: base64
MIME-Version: 1.0
X-OriginatorOrg: juniper.net
X-MS-Exchange-CrossTenant-Network-Message-Id: 82a9127b-f881-4cc1-e125-08d6085d469c
X-MS-Exchange-CrossTenant-originalarrivaltime: 22 Aug 2018 18:30:02.8545 (UTC)
X-MS-Exchange-CrossTenant-fromentityheader: Hosted
X-MS-Exchange-CrossTenant-id: bea78b3c-4cdb-4130-854a-1d193232e5f4
X-MS-Exchange-Transport-CrossTenantHeadersStamped: CO1PR05MB380
X-Proofpoint-Virus-Version: vendor=fsecure engine=2.50.10434:, , definitions=2018-08-22_09:, , signatures=0
X-Proofpoint-Spam-Details: rule=outbound_spam_notspam policy=outbound_spam score=0 priorityscore=1501 malwarescore=0 suspectscore=0 phishscore=0 bulkscore=0 spamscore=0 clxscore=1015 lowpriorityscore=0 mlxscore=0 impostorscore=0 mlxlogscore=999 adultscore=0 classifier=spam adjust=0 reason=mlx scancount=1 engine=8.0.1-1807170000 definitions=main-1808220182
Archived-At: <https://mailarchive.ietf.org/arch/msg/ipv6/GFDGYwnj_obswCtJzMfzrY_56Iw>
X-BeenThere: ipv6@ietf.org
X-Mailman-Version: 2.1.27
Precedence: list
List-Id: "IPv6 Maintenance Working Group \(6man\)" <ipv6.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/ipv6>, <mailto:ipv6-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/ipv6/>
List-Post: <mailto:ipv6@ietf.org>
List-Help: <mailto:ipv6-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/ipv6>, <mailto:ipv6-request@ietf.org?subject=subscribe>
X-List-Received-Date: Wed, 22 Aug 2018 18:30:10 -0000

Tom,

Fair enough. The first item is out of scope for your draft. The second will be included. The third and fourth are already in your draft.

                                                           Ron


> -----Original Message-----
> From: Tom Herbert <tom@herbertland.com>
> Sent: Wednesday, August 22, 2018 1:17 PM
> To: Ron Bonica <rbonica@juniper.net>
> Cc: C. M. Heard <heard@pobox.com>; 6man <ipv6@ietf.org>
> Subject: Re: A long HBH Options question
> 
> On Wed, Aug 22, 2018 at 9:43 AM, Ron Bonica <rbonica@juniper.net> wrote:
> > Hi Tom,
> >
> 
> Hi Ron,
> 
> > Judging by the feedback, those experiencing cognitive dissonance
> > constitute a small minority. Maybe our concerns are better addressed
> > with medication than clarifications ;-)
> >
> > However, if you want to reduce the number of pills that I take every day,
> you might add the following clarifications to your document:
> >
> > - What do the "act" bits mean when they appear in an HBH option?
> 
> That would be a good clarification of HBH processing in RFC8200.
> 
> > - What does the "chg" bit mean when it appears in an option where Opt
> Data Len is equal to 0.
> 
> Okay.
> 
> > - What does the "chg" bit mean when it appears in a Destination Options
> header precedes the Routing Options header.
> > - What does the "chg" bit mean when it appears in a Destination Options
> header follows the Routing Options header (or the packet does not contain a
> routing header).
> 
> I think that's already covered in the draft (section 3). Please let me know if it's
> not clear.
> 
> Tom
> 
> >
> >
> > Ron
> >
> >
> >> -----Original Message-----
> >> From: Tom Herbert <tom@herbertland.com>
> >> Sent: Wednesday, August 22, 2018 10:28 AM
> >> To: C. M. Heard <heard@pobox.com>
> >> Cc: Ron Bonica <rbonica@juniper.net>; 6man <ipv6@ietf.org>
> >> Subject: Re: A long HBH Options question
> >>
> >> On Tue, Aug 21, 2018 at 5:39 PM, C. M. Heard <heard@pobox.com>
> wrote:
> >> > On Tue, 21 Aug 2018 19:16:55 +0000, Ron Bonica wrote:
> >> >> [ … ] let's assume that:
> >> >>
> >> >> - A packet contains an HBH option and the high-order bits of the HBH
> >> >>   Option type are "10" [could also be "01" or "11']
> >> >>
> >> >> - The packet traverses Router A and Router B on route to its
> >> >>   destination
> >> >>
> >> >> - Router A is not configured to process HBH options
> >> >>
> >> >> - Router B is configured to process HBH options
> >> >>
> >> >> - Neither Router A nor Router B recognize the HBH option contained by
> >> >>   the above-mentioned packet.
> >> >>
> >> >> I think that RFC 8200 requires the following behavior:
> >> >>
> >> >> - Router A forwards the packet to Router B, without examining the HBH
> >> >>   Options header
> >> >>
> >> >> - Router B discards the packet, because it doesn't recognize the
> >> >>   option.
> >> >>
> >> >> Is this the required behavior?
> >> >
> >> > Yes.
> >> >
> >> >> If so, does this behavior cause cognitive dissonance for anybody else?
> >> >
> >> > It sure does.
> >> >
> >> >> I am thinking that the "act" bits are meaningless in the HBH
> >> >> extension header. This discussion may also be applicable to
> >> >> draft-herbert-ipv6-update-dest-ops.
> >> >
> >> > The "act" bits are not exactly meaningless, but only the encoding "00"
> >> > will elicit consistent behavior from nodes that  comply with RFC
> >> > 8200 and don't recognize the option. To me, it would seem quite odd
> >> > if the designer of any new HbH option were to choose an encoding with
> "act"
> >> > bits other than "00". For already allocated options, any encoding
> >> > other than "00" will not have the results expected by those who
> >> > designed the options assuming that the rules in RFC 2460 would be
> >> > followed. Thus, that the maintainers of existing HbH options with
> >> > the "act" bits other than "00" should probably re-examine the
> >> > option encoding in light of the change wrought by RFC 8200. Here is the
> list:
> >> >
> >> > 0x63  RPL (RFC 6553, PS)
> >> > 0x6D  MPL (RFC 7731, PS)
> >> > 0xC2  Jumbo Payload (RFC 2675, PS)
> >> > 0xEE  IP_DFF (RFC 6971, Experimental)
> >> >
> >> > The ROLL WG has in fact taken this step with the RPL option, though
> >> > for reasons independent of the change made in RFC 8200. The
> >> > thinking behind the original design in RFC 6553 was that it was
> >> > undesirable for the RPL option to escape from the RPL domain in
> >> > which it was originated, so "act" was set to "01" to force nodes
> >> > external to the domain to silently discard escaped packets. That
> >> > thinking has been revised, and there is a document in last call
> >> > that will deprecate the existing code point and get a new one
> >> > (probably 0x23) with "act" set to
> >> "00".
> >> >
> >> > A re-examination of already allocated destination options would be
> >> > called for if the change proposed in
> >> > draft-herbert-ipv6-update-dest-ops
> >> > were to be implemented. Here is that list:
> >> >
> >> > 0xC9  Home Address (RFC 6275, PS)
> >> > 0x8A  Endpoint Identification (DEPRECATED) 0x8B  ILNP Nonce (RFC
> >> > 6744,
> >> > Experimental) 0x8C  Line-Identification (RFC 6788, PS)
> >> >
> >> Mike,
> >>
> >> Thanks for looking into this.
> >>
> >> Neither RFC6744 nor RFC6788 explicitly prohibit putting the option in
> >> front of a routing header, but I don't think doing that would make
> >> much sense in either case. In case of ILNP nonce, the option is used
> >> to communicate to a peer node information about the reverse path so
> >> it's really intended for the transport destination endpoint.
> >> Line-Identification is only used in conjunction with a ND packet
> >> being tunneled in the payload so only the ultimate destination should
> >> do anything with the option. It would be a good idea if
> >> specifications for new Destination Options explicitly said whether or not
> they can appear before a Routing header.
> >>
> >> Tom
> >>
> >> > The Home Address option would actually not be affected by the
> >> > proposed change in draft-herbert-ipv6-update-dest-ops since it
> >> > isn't allowed to appear appear before a Routing Header. I have not
> >> > examined the others, however.
> >> >
> >> > Mike Heard
> >> >
> >> > -------------------------------------------------------------------
> >> > - IETF IPv6 working group mailing list ipv6@ietf.org Administrative
> >> > Requests:
> >> > https://urldefense.proofpoint.com/v2/url?u=https-
> 3A__www.ietf.org_m
> >> > ail
> >> > man_listinfo_ipv6&d=DwIFaQ&c=HAkYuh63rsuhr6Scbfh0UjBXeMK-
> >> ndb3voDTXcWzo
> >> > CI&r=Fch9FQ82sir-BoLx84hKuKwl-
> >> AWF2EfpHcAwrDThKP8&m=kq67Q11JdAIfRhVwF5c
> >> > N-DpFwRB9d3ip8DQlPOmzaII&s=UJLxrCn-N92TYQRkRq9QD_0-
> >> Du3MfKXlx3a1n1bVe7U
> >> > &e=
> >> > -------------------------------------------------------------------
> >> > -