Re: Confirmation to advance: draft-ietf-6man-ipv6only-flag-05

Mark Smith <markzzzsmith@gmail.com> Mon, 27 May 2019 14:58 UTC

Return-Path: <markzzzsmith@gmail.com>
X-Original-To: ipv6@ietfa.amsl.com
Delivered-To: ipv6@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 0579F12016B for <ipv6@ietfa.amsl.com>; Mon, 27 May 2019 07:58:57 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -0.499
X-Spam-Level:
X-Spam-Status: No, score=-0.499 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, DKIM_SIGNED=0.1, DKIM_VALID=-0.1, DKIM_VALID_AU=-0.1, FREEMAIL_FROM=0.001, FROM_LOCAL_NOVOWEL=0.5, HK_RANDOM_ENVFROM=0.001, HK_RANDOM_FROM=0.999, RCVD_IN_DNSWL_NONE=-0.0001, SPF_HELO_NONE=0.001, SPF_PASS=-0.001] autolearn=no autolearn_force=no
Authentication-Results: ietfa.amsl.com (amavisd-new); dkim=pass (2048-bit key) header.d=gmail.com
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id 8Vff6sRjUgCY for <ipv6@ietfa.amsl.com>; Mon, 27 May 2019 07:58:55 -0700 (PDT)
Received: from mail-ot1-x336.google.com (mail-ot1-x336.google.com [IPv6:2607:f8b0:4864:20::336]) (using TLSv1.2 with cipher ECDHE-RSA-AES128-GCM-SHA256 (128/128 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id 1C1DF12002F for <ipv6@ietf.org>; Mon, 27 May 2019 07:58:55 -0700 (PDT)
Received: by mail-ot1-x336.google.com with SMTP id l25so15019057otp.8 for <ipv6@ietf.org>; Mon, 27 May 2019 07:58:55 -0700 (PDT)
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=gmail.com; s=20161025; h=mime-version:references:in-reply-to:from:date:message-id:subject:to :cc; bh=t9MWi2Qt96U+csrkJhRFkkRK6dy0vj3EGKOoCZhWpYA=; b=D2MrcOgtDmXksHND8aMlYzX88zTvjcfBgQawP2w2nbtu/R1i93wk3xozzwXourRN4H rUpJ8RsQO97iSdeCCQ/veTt/hPy24NdZ0rwGiWOwz76brOkJTw2BQOMWjuhSHjALLszy 5Y2UHXIcb1OEdrXXS8ppAYjnXT7HFuqB8QZs+XchVyyrlnXa9gMtnzFatcVtEuI4MEfq Vh+N2DL+69KnoCnJZ2oyDr7nbA1bftiosSfYC9cQ6UBXs1UIseR4T1CA9/DjmRhidJyl VjR1QOLacpGobMNMKnbnDq148LLVLYlGrvzduZRwiSwp5bozCmUH7JNLWASjJ+dSFEY3 /QDg==
X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20161025; h=x-gm-message-state:mime-version:references:in-reply-to:from:date :message-id:subject:to:cc; bh=t9MWi2Qt96U+csrkJhRFkkRK6dy0vj3EGKOoCZhWpYA=; b=pOIRrgWT0B9zvKPOLhmtFAeYGJwntLZm2FDhykirkpbIronCfmaGiM1FF88jGWPBhj I8X5koWMDd5Uqi0uN8JUHWk0Od0gdjJxx2UF/p/eHOkoKh6/FxHYNG+DWkjXJ7bm3VTd sHGF+VellWRhTMq8PSFb6mQ5alxxJaGLK0C3caWGqCABgTX/jZJu4V4mC2rm3Ju1MIWe 58lrePXhA5bp2+n9VXiYX9Ex+bKxoqq+LulDiG+rF23j6LB9Fzz2jGYNPr6CB3qI+rVS x5NUIN/pgrIjfBDAnh2Cz6p1S1KxNhgs5HHw7l7lqxPLA9olEFiVMQ2Cior+7Q5TwGIf Rlrg==
X-Gm-Message-State: APjAAAXG4do/3FBEJyrlLJAvJWeBn6xiUMvxge33bsjb/LaxmT4MwoHV 9CKkYYeMUT6mZcqR1zfoeb1FQSBt6ykmC97bHfI=
X-Google-Smtp-Source: APXvYqzuJCXVsWfelwCnCxzXVIoJFZ2/3B+so/78UTKh0IWW4b350WRZnYNZLmVlSLINZ99tXvvPb29tQLgy87URMDU=
X-Received: by 2002:a9d:58c5:: with SMTP id s5mr43614120oth.153.1558969134199; Mon, 27 May 2019 07:58:54 -0700 (PDT)
MIME-Version: 1.0
References: <F8BFFCAD-E58E-4736-8A1C-56579B6F6032@employees.org> <CAO42Z2xzVW3m0mN7jEn8SYyYCYhrufVnkfp3rBjJcijBkvucNQ@mail.gmail.com> <CACWOCC-35yVYXSRR0sRL-MBMHyOFZtJx9E9h14G8qqVh5T7qGA@mail.gmail.com> <232c1a43-0fd9-4eae-737b-260a3906f72a@gmail.com> <663F6C0B-7B8A-4088-B9C0-B2867B0C3EB8@gmail.com> <CAN-Dau3VJN7qNHAW-yStMrDRCa4vsDs2ObkAxswnYbcHde2t_w@mail.gmail.com> <m1hPqHO-0000J8C@stereo.hq.phicoh.net> <CAN-Dau3R=4JbcbK7tWkJKYzVjq7DvAAEjVsbCLbZdYYO8OJ0YA@mail.gmail.com> <m1hQ7Dm-0000M3C@stereo.hq.phicoh.net> <CAN-Dau040j6U+1CCn0QJiVMy2nVShHqqSFdCkM-FbMAH-2wjRA@mail.gmail.com> <m1hQCYr-0000KBC@stereo.hq.phicoh.net> <561d9dc3-c769-c774-8f65-f975ac2a10a0@gont.com.ar> <m1hT1DZ-0000HEC@stereo.hq.phicoh.net> <ce07ade8-5105-055f-4798-f4ef20a2393c@si6networks.com> <CAN-Dau02MYCrKx2BgyuYJeHBdoz6SHCnp+-byM+LMM8af0S+rA@mail.gmail.com> <40e99171-6dda-29e3-6152-da5ca5219ed9@foobar.org> <CAN-Dau0ALqfAA-Dz56oHAfOtY7E2obx5E7TgoeH357Mckp3t9g@mail.gmail.com> <093ba8e2-6f0a-4c91-9df1-cda33fffea97@foobar.org>
In-Reply-To: <093ba8e2-6f0a-4c91-9df1-cda33fffea97@foobar.org>
From: Mark Smith <markzzzsmith@gmail.com>
Date: Tue, 28 May 2019 00:58:27 +1000
Message-ID: <CAO42Z2zDJsVxy65nqwMm8SwUGjdE0vVHH4=XqO3pjGwi1U6Mgw@mail.gmail.com>
Subject: Re: Confirmation to advance: draft-ietf-6man-ipv6only-flag-05
To: Nick Hilliard <nick@foobar.org>
Cc: David Farmer <farmer@umn.edu>, 6man WG <ipv6@ietf.org>
Content-Type: text/plain; charset="UTF-8"
Archived-At: <https://mailarchive.ietf.org/arch/msg/ipv6/gzC3xOQN8HTvH6stEjLhDk_mqzM>
X-BeenThere: ipv6@ietf.org
X-Mailman-Version: 2.1.29
Precedence: list
List-Id: "IPv6 Maintenance Working Group \(6man\)" <ipv6.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/ipv6>, <mailto:ipv6-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/ipv6/>
List-Post: <mailto:ipv6@ietf.org>
List-Help: <mailto:ipv6-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/ipv6>, <mailto:ipv6-request@ietf.org?subject=subscribe>
X-List-Received-Date: Mon, 27 May 2019 14:58:57 -0000

On Tue, 28 May 2019 at 00:00, Nick Hilliard <nick@foobar.org> wrote:
>
> David Farmer wrote on 24/05/2019 14:35:
> > On Fri, May 24, 2019 at 3:59 AM Nick Hilliard <nick@foobar.org> wrote:
> >     the usual ietf position is that operational misconfig - including
> >     daemons crashing - is out of scope for protocol development.  If it's
> >     out of scope, there's no real issue regarding consensus.
> >
> >     Obviously, from an operational point of view, if DHCP service is
> >     important on a network, the operator is at liberty to install redundant
> >     servers / relays.
> >
> > WHAT ARE ARE YOU SAYING?
>
> nothing more than the sober reality of GIGO - garbage in, garbage out.
> DHCP, as a protocol, expects correct configuration.
>
> Is it a problem with the protocol if someone mis-types a MAC address in
> the config?  Or specifies the wrong next-hop gateway?  Or makes a
> mistake in an autoconfig URL?  All these things could be fatal for the
> device under configuration.  Fixing this is not a protocol-layer problem.
>
> > The IETF SHOULD NOT concern itself with
> > accidental misconfiguration? And SHOULD only create fragile and brittle
> > protocols? The IETF SHOULD NOT seek robustness in its protocols?
>
> These issues are, to some degree at least, orthogonal to each other: you
> can build solid protocols which are inherently susceptible to problems
> with misconfigs. On the other hand, implementations can be built to work
> around this by implementing sanity checking.
>
> Regarding misconfigs and crashing in general, DHCP has been around for a
> long time. This means that people understand how it works - i.e.
> misconfigs can usually be solved quickly - and the implementations are
> generally pretty robust - i.e. crashes are rare and if you need
> resilience, you can use multiple separate servers / relays (a
> protocol-layer feature).

Hosts should trust the configuration information the network provides.

It's binary.

What I don't understand it some people seem to be quite fine with
rogue RAs, meaning they're happy to have hosts universally trust
received RAs, rogue or not, until this flag was proposed.

If a host can't trust the configuration information that the network
provides, then that obligates the network operator to make the
information that the network provides to always be trustworthy, by
implementing RA Guard, or isolating unstrusted hosts to their own
individual point-to-point links with their only other peer being an RA
issuing router.

If this flag is received and it is to be considered potentially bogus,
then anything already received in any RAs is already potentially
bogus. The whole RA should be considered bogus, as should all other
RAs received from any other RA issuers on the link.

Hosts can be assured of what they received by implementing and
requiring SEND. If a network doesn't implement SEND, then the network
is implying that what ever is received is not bogus, regardless of its
source.

In other words, without any form of authentication i.e. SEND, it is a
simple as trusting everything received or trusting nothing received.
If RAs are being accepted by hosts, rather than being universally
ignored, then they should be trusting everything in the RA received,
including this flag.

>
> Nick
>
> --------------------------------------------------------------------
> IETF IPv6 working group mailing list
> ipv6@ietf.org
> Administrative Requests: https://www.ietf.org/mailman/listinfo/ipv6
> --------------------------------------------------------------------