Re: A problem with RFC 6465's Uniform Format for Extension Headers

Brian E Carpenter <brian.e.carpenter@gmail.com> Thu, 06 February 2014 19:46 UTC

Return-Path: <brian.e.carpenter@gmail.com>
X-Original-To: ipv6@ietfa.amsl.com
Delivered-To: ipv6@ietfa.amsl.com
Received: from localhost (ietfa.amsl.com [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 581171A0415 for <ipv6@ietfa.amsl.com>; Thu, 6 Feb 2014 11:46:38 -0800 (PST)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -2
X-Spam-Level:
X-Spam-Status: No, score=-2 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, DKIM_SIGNED=0.1, DKIM_VALID=-0.1, DKIM_VALID_AU=-0.1, FREEMAIL_FROM=0.001, SPF_PASS=-0.001] autolearn=ham
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id OJhz9UYZnbXO for <ipv6@ietfa.amsl.com>; Thu, 6 Feb 2014 11:46:36 -0800 (PST)
Received: from mail-pa0-x22c.google.com (mail-pa0-x22c.google.com [IPv6:2607:f8b0:400e:c03::22c]) by ietfa.amsl.com (Postfix) with ESMTP id C25361A03CA for <6man@ietf.org>; Thu, 6 Feb 2014 11:46:36 -0800 (PST)
Received: by mail-pa0-f44.google.com with SMTP id kq14so2125160pab.31 for <6man@ietf.org>; Thu, 06 Feb 2014 11:46:35 -0800 (PST)
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=gmail.com; s=20120113; h=message-id:date:from:organization:user-agent:mime-version:to:cc :subject:references:in-reply-to:content-type :content-transfer-encoding; bh=5Y2QciVqcYgiyIi/LZZgUq0oKKUxAjRQjyJ/K0maYCM=; b=e+dnhj69zNVBd7jIyYC4DpUmgqAoaWqNub58gmgWdpYk4taHSgY8hrs9sIRR01U73c JMP8Pi1eThkv7gsnD2eHES+iF54WFcqHZUQXoW68Z2PBGgp/7xCEHO2kyVUkvrLJt/FT /RJCnMRx7DxFQtWmfaQDiv2klQ6De6HWyezzgMipxripDJi1SpFaOYCc806Q/KocAk6X dE8AGZaW6b3BQ2agcWdevEscDmyDHNlGFlDOPV5d2+Ms0nETTFj7286egk7SxMbrFwBL rQWEQ3Drcg0OSbVOhVI2zCcEHcTLyDRVpkyunGTdGj5OOwIXolB1kedDEJkyYdL4rAIV lh4A==
X-Received: by 10.66.189.226 with SMTP id gl2mr2681874pac.65.1391715995616; Thu, 06 Feb 2014 11:46:35 -0800 (PST)
Received: from [192.168.178.23] (33.195.69.111.dynamic.snap.net.nz. [111.69.195.33]) by mx.google.com with ESMTPSA id jk16sm6152295pbb.34.2014.02.06.11.46.32 for <multiple recipients> (version=TLSv1 cipher=ECDHE-RSA-RC4-SHA bits=128/128); Thu, 06 Feb 2014 11:46:34 -0800 (PST)
Message-ID: <52F3E6A1.5010109@gmail.com>
Date: Fri, 07 Feb 2014 08:46:41 +1300
From: Brian E Carpenter <brian.e.carpenter@gmail.com>
Organization: University of Auckland
User-Agent: Thunderbird 2.0.0.6 (Windows/20070728)
MIME-Version: 1.0
To: Thomas Narten <narten@us.ibm.com>
Subject: Re: A problem with RFC 6465's Uniform Format for Extension Headers
References: <20140130230740.25350.9524.idtracker@ietfa.amsl.com> <52EAF63A.7050108@si6networks.com> <52F1B8CE.4070803@ericsson.com> <52F1BD1F.2080007@si6networks.com> <m3k3d82zz6.wl%narten@us.ibm.com>
In-Reply-To: <m3k3d82zz6.wl%narten@us.ibm.com>
Content-Type: text/plain; charset="UTF-8"
Content-Transfer-Encoding: 7bit
Cc: "C. M. Heard" <heard@pobox.com>, Fernando Gont <fgont@si6networks.com>, Tim Chown <tjc@ecs.soton.ac.uk>, "6man@ietf.org" <6man@ietf.org>, Suresh Krishnan <suresh.krishnan@ericsson.com>
X-BeenThere: ipv6@ietf.org
X-Mailman-Version: 2.1.15
Precedence: list
List-Id: "IPv6 Maintenance Working Group \(6man\)" <ipv6.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/ipv6>, <mailto:ipv6-request@ietf.org?subject=unsubscribe>
List-Archive: <http://www.ietf.org/mail-archive/web/ipv6/>
List-Post: <mailto:ipv6@ietf.org>
List-Help: <mailto:ipv6-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/ipv6>, <mailto:ipv6-request@ietf.org?subject=subscribe>
X-List-Received-Date: Thu, 06 Feb 2014 19:46:38 -0000

On 07/02/2014 01:21, Thomas Narten wrote:
> At Wed, 05 Feb 2014 01:25:03 -0300, Fernando Gont wrote:
>> 1) If this problem remains un-addressed, then it's impossible to
>> differentiate between new upper-layer headers (e.g. a new transport
>> protocol) and new extension headers. Since such new extension headers
>> might be leveraged for malicious purposes, the end-result is that
>> middle-boxes are going to block *everything* (see RFC7045), which means:
>>
>>   + no new extension headers
>>   + no new transport protocols
>>
>> ... so I think we really don't want to go there.
> 
> But we are already there. Folk won't deploy anything other than
> TCP/UDP because NAT won't deal with it. That has already been reality
> and is the reason that other or new transport protocols appear to be
> virtually undeployable today.
> 
> Reality is that existing middleboxes tend to process what they
> understand and have been explicitely coded to deal with. They just
> punt on anything else because that is the easiest/safest thing to do.
> 
> I see little that we can do to change that.

I think we still have a chance with IPv6; of course the game is
over for IPv4. That's why I worked on RFC 7045, and why I think
it's worth trying to knock off this problem too. The current situation
described in Fernando's draft is guaranteed to produce opaque
middleboxes; we can at least make it possible to do better.

    Brian