[IPv6]Re: Éric Vyncke's Discuss on draft-ietf-6man-comp-rtg-hdr-08: (with DISCUSS and COMMENT)
Tom Herbert <tom@herbertland.com> Thu, 30 May 2024 02:57 UTC
Return-Path: <tom@herbertland.com>
X-Original-To: ipv6@ietfa.amsl.com
Delivered-To: ipv6@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 7EE56C1D4A70 for <ipv6@ietfa.amsl.com>; Wed, 29 May 2024 19:57:03 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -7.097
X-Spam-Level:
X-Spam-Status: No, score=-7.097 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, DKIM_SIGNED=0.1, DKIM_VALID=-0.1, DKIM_VALID_AU=-0.1, DKIM_VALID_EF=-0.1, RCVD_IN_DNSWL_HI=-5, RCVD_IN_ZEN_BLOCKED_OPENDNS=0.001, SPF_HELO_NONE=0.001, SPF_PASS=-0.001, URIBL_DBL_BLOCKED_OPENDNS=0.001, URIBL_ZEN_BLOCKED_OPENDNS=0.001] autolearn=ham autolearn_force=no
Authentication-Results: ietfa.amsl.com (amavisd-new); dkim=pass (2048-bit key) header.d=herbertland.com
Received: from mail.ietf.org ([50.223.129.194]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id 1YEk0zmUe662 for <ipv6@ietfa.amsl.com>; Wed, 29 May 2024 19:56:59 -0700 (PDT)
Received: from mail-ed1-x52f.google.com (mail-ed1-x52f.google.com [IPv6:2a00:1450:4864:20::52f]) (using TLSv1.3 with cipher TLS_AES_128_GCM_SHA256 (128/128 bits) key-exchange X25519 server-signature RSA-PSS (2048 bits) server-digest SHA256) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id 32230C1519A7 for <ipv6@ietf.org>; Wed, 29 May 2024 19:56:59 -0700 (PDT)
Received: by mail-ed1-x52f.google.com with SMTP id 4fb4d7f45d1cf-57863a8f4b2so351740a12.0 for <ipv6@ietf.org>; Wed, 29 May 2024 19:56:59 -0700 (PDT)
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=herbertland.com; s=google; t=1717037817; x=1717642617; darn=ietf.org; h=content-transfer-encoding:cc:to:subject:message-id:date:from :in-reply-to:references:mime-version:from:to:cc:subject:date :message-id:reply-to; bh=jYTLzujSzgL/D9NmepS0O0n8ZZ0GygvCHcQUWh88FXw=; b=YLev7qxMeya0w6l5hsTwSpP1nV9XErqnigcqparZAlJ7kabd0JUY61TJlYKEX2QipQ Di22iADBESeAFAJWnL61plJtPFG1BDBZpZWaYOxZw6ZOVK6Mk5WP1twofJ4wGN+26BXN q8uDWFIzxHgRGJaEyOF6ZxuLtrGfGVZuxAnZn0dvlAgA0eA03ckZrb4GgQHDxy8hhgDU cBmXQHHMAVmVi+FMgbn2aQ1ynW8o2UR5EHLQJ7kCjm7g8euItN1dP9EhBjWRAlLdV/1L zdzP06wpgyNhxVA4pUwu8/2szi5xM9miJXJvK7qza/qH5f3K1C5C/YlvMNqDZ6iyUhZ5 8ayw==
X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20230601; t=1717037817; x=1717642617; h=content-transfer-encoding:cc:to:subject:message-id:date:from :in-reply-to:references:mime-version:x-gm-message-state:from:to:cc :subject:date:message-id:reply-to; bh=jYTLzujSzgL/D9NmepS0O0n8ZZ0GygvCHcQUWh88FXw=; b=ooa9rzmzuOcgRK/t4udDEShRivT6/k5zmxQCx/GkiZLO9+qoLMrP7rTUjSGnr1ge4d /GtNwYWR3izCqXTFBK0S1B7YtG998pFBmjZaTLaUJRGG8/y0iyhtoF0kpD1+OexGr7Xh WG5Netkh3iZIkFmlFs8Idn/Pv7lXTAgaYTQ/IS8e59VhA100Ji8KAwJw4JaCCHBiqcdc eyUM8XP8BZDeARnr7keJcXFBeezcDtpc7X9u+G5CLXfEvLXly+qhv4nFNvKQLHrQZKyM R7GLXsq6NnoT1fDARAQ83tRwtwZ2Uzvi3TDV2ggnkx17/N7F9jxLPiRhgc4Nk/+xEaw8 Ge8A==
X-Forwarded-Encrypted: i=1; AJvYcCWA7RQSqSFzZueZlVStaX5CJ/u1xFqAb9jTL0QS4GeDQMGf2X1bX757YjSb90SeeRoT6+YULVQ8NltuSbKO
X-Gm-Message-State: AOJu0YzICKIzueE7ZZ21ZKUiaXaEScfvwjTig75nxMnGeQvA7UJuRz6j XAy1sxcu5mzpZgbYTWgovMI/6jGvm9jDNodJYqCmjM6NVW9GhnjgrHR1c2AAu0tQ4LIw7ymPUi1 FA/FQ8z6J6fb+66rajmYc6P+q5kvn4aP/Vrp0
X-Google-Smtp-Source: AGHT+IGqcIdDuHdrGHxSp2+cM9YmyHQ71gf7JmOZkPkYjXQGY/yRXUH53scJ943nRaqfJY+COSJPXAhjyVgxQBgx6fs=
X-Received: by 2002:a50:f60d:0:b0:572:d1e1:b4b3 with SMTP id 4fb4d7f45d1cf-57a17790bbfmr425826a12.7.1717037817265; Wed, 29 May 2024 19:56:57 -0700 (PDT)
MIME-Version: 1.0
References: <171701017054.52762.15332933554163582477@ietfa.amsl.com> <BL0PR05MB53162C021627ADFC321DD094AEF22@BL0PR05MB5316.namprd05.prod.outlook.com> <CALx6S36DdhUimNdGMv0+Txyj6HxDe=j0oV_ytFVWfevNZjjkDw@mail.gmail.com> <CAO42Z2wYbUpi4MvSHq3ZoBHfwrLGcHhTcZsoifrP3bxvTDFAHw@mail.gmail.com>
In-Reply-To: <CAO42Z2wYbUpi4MvSHq3ZoBHfwrLGcHhTcZsoifrP3bxvTDFAHw@mail.gmail.com>
From: Tom Herbert <tom@herbertland.com>
Date: Wed, 29 May 2024 19:56:46 -0700
Message-ID: <CALx6S37WzEzbFfK2oYVKzeo4RaGb-A9DH5M4=7KrMnaCOqWPFA@mail.gmail.com>
To: Mark Smith <markzzzsmith@gmail.com>
Content-Type: text/plain; charset="UTF-8"
Content-Transfer-Encoding: quoted-printable
Message-ID-Hash: 6EFSBO4WUP6SOXJBJQSOGQNJZHWKZCPO
X-Message-ID-Hash: 6EFSBO4WUP6SOXJBJQSOGQNJZHWKZCPO
X-MailFrom: tom@herbertland.com
X-Mailman-Rule-Misses: dmarc-mitigation; no-senders; approved; emergency; loop; banned-address; member-moderation; header-match-ipv6.ietf.org-0; nonmember-moderation; administrivia; implicit-dest; max-recipients; max-size; news-moderation; no-subject; digests; suspicious-header
CC: Ron Bonica <rbonica@juniper.net>, The IESG <iesg@ietf.org>, "draft-ietf-6man-comp-rtg-hdr@ietf.org" <draft-ietf-6man-comp-rtg-hdr@ietf.org>, "6man-chairs@ietf.org" <6man-chairs@ietf.org>, "ipv6@ietf.org" <ipv6@ietf.org>, "bob.hinden@gmail.com" <bob.hinden@gmail.com>
X-Mailman-Version: 3.3.9rc4
Precedence: list
Subject: [IPv6]Re: Éric Vyncke's Discuss on draft-ietf-6man-comp-rtg-hdr-08: (with DISCUSS and COMMENT)
List-Id: "IPv6 Maintenance Working Group (6man)" <ipv6.ietf.org>
Archived-At: <https://mailarchive.ietf.org/arch/msg/ipv6/gvkjY8-tOzo4UzSXsZcSqZSwvmk>
List-Archive: <https://mailarchive.ietf.org/arch/browse/ipv6>
List-Help: <mailto:ipv6-request@ietf.org?subject=help>
List-Owner: <mailto:ipv6-owner@ietf.org>
List-Post: <mailto:ipv6@ietf.org>
List-Subscribe: <mailto:ipv6-join@ietf.org>
List-Unsubscribe: <mailto:ipv6-leave@ietf.org>
On Wed, May 29, 2024 at 7:05 PM Mark Smith <markzzzsmith@gmail.com> wrote: > > Hi, > > On Thu, 30 May 2024 at 10:20, Tom Herbert > <tom=40herbertland.com@dmarc.ietf.org> wrote: > > > > On Wed, May 29, 2024 at 4:23 PM Ron Bonica > > <rbonica=40juniper.net@dmarc.ietf.org> wrote: > > > > > <snip> > > > > ## Section 7 > > > > > > It is not clear to me why this document needs to make an allowance for > > > intermediate nodes (sic) that verify transport layer checksums. Transport layer > > > checksums are expected to be verified by the Transport layer endpoints and not > > > in the network. So since when the Internet architecture has changed to take > > > care of `it prevents intermediate nodes from verifying transport layer > > > checksums`? Actual references are required for such statement. And, > > > explanations should be given whether this "sentence" helps RFC 7258 pervasive > > > monitoring perhaps in the security considerations section. > > > > > > [RB] Agree. I have deleted section 7. > > > > Ron, Eric, > > > > While the expectation may be that only endpoints will verify the > > checksum, since it's in plain text there is nothing that prevents > > intermediate nodes from processing it and potentially filtering bad > > packets with bad checksums (similar to other non-standard cases of > > devices doing Deep Packet Inspection and looking at TCP options or > > other parts of transport layer headers). Also, I believe that could > > break NAT? On a more programmatic side, snooping tools will report bad > > L4 checksums in their output; this has been very useful in deployment > > for debugging checksum failures (i.e. trying to figure out where the > > error was introduced in the path). > > > > I don't immediately know of any other cases where the checksum would > > be incorrect on the wire, so this is potentially breaking a > > longstanding convention that falls under the be conservative in what > > you send philosophy. IMO, at least documenting it is prudent. > > > > As this issue only occurs for TCP, UDP and ICMPv6, and only occurs > because those protocols' pseudoheader checksum is covering the CRH > IPv6 header, I think the solution is to insert another IPv6 header > between the outer CRH IPv6 header and the TCP, UDP or ICMPv6 payload, > with the packet's originating SA and final DA. > > The TCP, UDP or ICMPv6 pseudoheader checksums would then only cover > the new IPv6 header, and that IPv6 header would not be changed during > transport over CRH. > > Middle boxes shouldn't be validating the TCP, UDP or ICMPv6 > pseudoheaders in that case, as the new IPv6 header should hide those > payloads from the middlebox. However, even if a middlebox did validate > the pseudheader checksums, they would pass because the new IPv6 header > isn't changed in flight over the CRH substrate. > > (An alternative perspective. CRH (and SRv6) are replacements for MPLS. > TCP, UDP or ICMP were never "bare" or directly in MPLS, there was > always an IP header in between the MPLS and TCP, UDP or ICMP headers, > so there also should be for CRH and SRv6. MPLS is a data link layer > protocol from the perspective of the network layer, and therefore so > are CRH and SRv6.) Mark, Mark, I'm not sure we need a solution, I just think we need to document the change so people are aware of the potential impact. Also, I believe that with CRH there is no way to determine the final destination of a packet without external information that may be temporal. This could also affect ops (like if we're doing a post mortem on traces from the network we'd need the routing table from the time the logs were taken. It might be hard to do connection tracking as well. I think this should be documented as well. Tom > > Regards, > Mark. > > > > > > > > > > Tom > > > > > > > > > > > ## Section 11 > > > > > > While not a real DISCUSS criteria, I am really surprised to see an IPv4-like > > > notation for CRH SID. > > > > > > [RB] Why not. IPv4-like is a convenient and familiar notation for 32-bit values. > > > > > > ## Section 12 > > > > > > As AH is end-to-end, intermediate nodes do not have the shared secret, hence > > > `The CRH is not compatibile with AH processing at intermediate nodes.` is > > > useless and confusing. Please remove. Very similar to the DISCUSS about section > > > 7. > > > > > > [RB] Agree. I have removed that sentence. > > > > > > > > > ---------------------------------------------------------------------- > > > COMMENT: > > > ---------------------------------------------------------------------- > > > > > > > > > # COMMENTS (non-blocking) > > > > > > ## Abstract > > > > > > Can we really write `deployed` for an experimental I-D? > > > > > > [RB] The purpose of any IETF experiment is to demonstrate that something can be deployed. You nay want to deploy in a low-risk environment at first. But if you can't demonstrate deployability, why bother. > > > > > > ## Section 1 > > > > > > s/to its destination/to its destination(s)/ (think multicast/anycast). Twice in > > > the section ;) > > > > > > [RB] Done > > > > > > > > > > > > Suggest to move the motivation to its own section. > > > > > > ## Section 3 > > > > > > Any recommendation on when to do `The first CRH SID in the path can be omitted > > > from the list.`? > > > > > > What is the expected behavior of any CRH-aware router and final node(s) when > > > `the Type- specific data field MUST be padded with zeros` is not respected ? > > > > > > ## Section 4 > > > > > > Can the IPv6 address in the CRH-FIB be a link-local or multicast or can only be > > > a unicast ? Section 5 gives some more explanations, but an early one would be > > > better. > > > > > > ## Section 5 > > > > > > The first bullet can probably be removed as it is the normal behavior of any > > > IPv6 node per RFC 8200. > > > > > > `If Hdr Ext Len indicates that the CRH is larger than the implementation can > > > process, ` suggest using code 6 per > > > https://urldefense.com/v3/__https://www.iana.org/assignments/icmpv6-parameters/icmpv6-parameters.xhtml*icmpv6-parameters-codes-5__;Iw!!NEt6yMaO-gk!DVJoms2WoGvxmxqkffXENdtHNjV3fbIs-eqSaGApHrZ_QLRG6sy7korNjjBzml5sJ7eFURmc25Y-TxM$ > > > > > > While wasting octets with too large CRH (i.e., larger than the minimum length) > > > is a bad thing, does it deserve to discard the packet on transit ? Why not > > > requesting the source to enforce this mimimum length? > > > > > > `If the search does not return a CRH-FIB entry` is the code 0 the most suitable > > > code ? If not, why not creating one ? Or even using ICMPv6 code 1 'destination > > > unreachable' ? > > > > > > `If Segments Left is greater than 0` this will always be the case per first > > > bullet `If Segments Left equals 0` ;-) > > > > > > The reader will welcome a justification of `CRH-FIB entry contains a multicast > > > address, discard the packet and`. > > > > > > ## Section 6 > > > > > > I guess that this is linked to RFC 4302 (AH), so, please state this clearly. > > > > > > ## Section 7 > > > > > > Is it about `Destination Address Transparency` or privacy ? > > > > > > ## Section 8 > > > > > > `Each CRH SID is processed by exactly one node.` isn't it rather "Each CRH SID > > > is processed by exactly one CRH-configured router whose one address matches the > > > packet destination address" ? > > > > > > ## Section 9 > > > > > > The title should rather be "operational considerations" > > > > > > What are the "representations described herein" in ` It is recommended that the > > > experimental versions of PING use the text representations described herein` ? > > > Is it about section 11 ? Then please add a forward reference. > > > > > > ## Section 10 > > > > > > This is the usual considerations about ICMP, please consider to remove this > > > section. Or refer for section 5 of RFC 4443. > > > > > > ## Section 11 > > > > > > Beside the above semi-DISCUSS, please state that hexadecimal should be in lower > > > case. > > > > > > ## Section 12 > > > > > > `The Source Address does not identify an interface on a trusted node.` is there > > > any hint how this can be done ? How will it scale if all CRH-enabled router > > > must know all the specific address of all trusted nodes ? The same scalability > > > issue for `The ACL discards packets whose source address identifies an > > > interface on a trusted node.` > > > > > > ## Section 13 > > > > > > If the Wireshark/tcpdump modifications (cited in section 9) are public, then > > > references to code will be welcome. > > > > > > `Interoperability among these implementations has not yet been demonstrated.` > > > should rather be in section 14 'experimental results' > > > > > > ## Section 14 > > > > > > I am indeed very curious to see the experimental result of > > > ``` > > > Mechanism used to populate the FIB > > > Scale of deployment > > > ``` > > > even if the text states in one year after publication as an RFC, this work > > > started back in 2019 and was adopted in 2023, do we already have some results ? > > > > > > What are the possible next steps as seen by the authors / 6MAN WG is the > > > experiment is assumed to be successful ? And what are the criteria to declare a > > > successful experiment ? > > > > > > # NITS (non-blocking / cosmetic) > > > > > > ## Section 12 > > > > > > s/This is becasue /This is because/ > > > > > > > > > > > > -------------------------------------------------------------------- > > > IETF IPv6 working group mailing list > > > ipv6@ietf.org > > > Administrative Requests: > > > -------------------------------------------------------------------- > > > > -------------------------------------------------------------------- > > IETF IPv6 working group mailing list > > ipv6@ietf.org > > Administrative Requests: > > --------------------------------------------------------------------
- [IPv6]Éric Vyncke's Discuss on draft-ietf-6man-co… Éric Vyncke via Datatracker
- [IPv6]Re: Éric Vyncke's Discuss on draft-ietf-6ma… Ron Bonica
- [IPv6]Re: Éric Vyncke's Discuss on draft-ietf-6ma… Tom Herbert
- [IPv6]Re: Éric Vyncke's Discuss on draft-ietf-6ma… Ron Bonica
- [IPv6]Re: Éric Vyncke's Discuss on draft-ietf-6ma… Mark Smith
- [IPv6]Re: Éric Vyncke's Discuss on draft-ietf-6ma… Tom Herbert
- [IPv6]Re: Éric Vyncke's Discuss on draft-ietf-6ma… Eric Vyncke (evyncke)