[IPv6]Re: Fwd: New Version Notification for draft-herbert-deprecate-eh-00.txt
Tom Herbert <tom@herbertland.com> Sun, 28 December 2025 21:22 UTC
Return-Path: <tom@herbertland.com>
X-Original-To: ipv6@mail2.ietf.org
Delivered-To: ipv6@mail2.ietf.org
Received: from localhost (localhost [127.0.0.1]) by mail2.ietf.org (Postfix) with ESMTP id BB3BBA020E45 for <ipv6@mail2.ietf.org>; Sun, 28 Dec 2025 13:22:01 -0800 (PST)
X-Virus-Scanned: amavisd-new at ietf.org
X-Spam-Flag: NO
X-Spam-Score: -2.1
X-Spam-Level:
X-Spam-Status: No, score=-2.1 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, DKIM_SIGNED=0.1, DKIM_VALID=-0.1, DKIM_VALID_AU=-0.1, DKIM_VALID_EF=-0.1, RCVD_IN_DNSWL_NONE=-0.0001, SPF_HELO_NONE=0.001, SPF_PASS=-0.001] autolearn=ham autolearn_force=no
Authentication-Results: mail2.ietf.org (amavisd-new); dkim=pass (2048-bit key) header.d=herbertland.com
Received: from mail2.ietf.org ([166.84.6.31]) by localhost (mail2.ietf.org [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id qM9LfrGeMg1R for <ipv6@mail2.ietf.org>; Sun, 28 Dec 2025 13:22:01 -0800 (PST)
Received: from mail-lj1-x235.google.com (mail-lj1-x235.google.com [IPv6:2a00:1450:4864:20::235]) (using TLSv1.3 with cipher TLS_AES_128_GCM_SHA256 (128/128 bits) key-exchange X25519 server-signature ECDSA (P-256) server-digest SHA256) (No client certificate requested) by mail2.ietf.org (Postfix) with ESMTPS id 3242BA020E40 for <6man@ietf.org>; Sun, 28 Dec 2025 13:22:01 -0800 (PST)
Received: by mail-lj1-x235.google.com with SMTP id 38308e7fff4ca-37ba5af5951so77069091fa.1 for <6man@ietf.org>; Sun, 28 Dec 2025 13:22:01 -0800 (PST)
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=herbertland.com; s=google; t=1766956914; x=1767561714; darn=ietf.org; h=content-transfer-encoding:cc:to:subject:message-id:date:from :in-reply-to:references:mime-version:from:to:cc:subject:date :message-id:reply-to; bh=85oGifiHBMN0f+nx67ajb61+pl4tot0N7Irkq0xx8p8=; b=Xo6wyAwsSh3e65lvCGKQDzrBQ/7TyhDxpn+E6V5j2/iCSNLR5keSud9fIxQ8f9ax0U mR8hry8f8dbcABT+klNjsLKg0H6SAm2LcYM7BCOX2WXuCHVPOYPCY9wOLpMw3pOVPdI9 JO5RGvJ3wsC5puemSY6lBaNkRS2/YHWDVMYnavpWjl4Rh1vWtELxL5yfSM8uveab6z+0 pygHIYyUuQpQIFRtbqPlgDQsSOweOh94kmYpp4HjO7MCYIXrTzdU9DAaW1YcMltdpxY/ R76PSBxMo5bhe1K13V3pZzQ7BH9+eMb8QkX6ynecHdD15ZzbEGo6HMZZ8GbO0Xa/jBMB k/WQ==
X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20230601; t=1766956914; x=1767561714; h=content-transfer-encoding:cc:to:subject:message-id:date:from :in-reply-to:references:mime-version:x-gm-gg:x-gm-message-state:from :to:cc:subject:date:message-id:reply-to; bh=85oGifiHBMN0f+nx67ajb61+pl4tot0N7Irkq0xx8p8=; b=CuAySDZt29G8GJMqvB4xGidntpqni86Z4TdMjzisWJo0aXO2VcXEILXb5uewlJtQCT xcP9kPpPb8Xw2SIZDx+gJtJAs6i3ZXzq1VyH/T4UuHPNCbGDtVMhjyPzz9BcKHVAlUv/ 4FdAltDrFYFxVeMUuX+AasNBt4XGa2YdDgD2zulvry1/m3Lpo+w8VQfd1WHyqUWH3Nqx LcqPeuvbeiT30a5GJjVezTrGWCU44+SOoqYiXR96lValt+f6YUyPCPxrGS0/B/FRO5Xt HIkR/f2QE0EwZjSN9biVi9BOclT8esQ1/5Ejhp7v8HzvVPvuT9m3PSRusD2qP6G2aBLX 5uJA==
X-Gm-Message-State: AOJu0YxJXpTBZqGAcQJpqgC6euzOBNGdM/FY7qOoqc6UF+hfxTzlwTVu gpoMxe6iKvrVIfOoVLX4X9QsNfn4ixlHJm3xunf54Snyv/8tUp/PW/UG6thdSXs/LjiItkLgGZ0 e+tRod5vD6sP5Rb/8OEhFBUFVauNfZUSaklcPjEi7
X-Gm-Gg: AY/fxX76KEobY9wdHBpx+xVnn8Yz3B/NbmeY331htMQ0s1957RtXWsWsKfuqDMVCM6f 2leuQzvylnPRPO2XvaCiyKHNYPc/9D0fhnrRFEOeCVrfTwTPQ1hYsB5bwf7bu0mmVJn27n88fxS /Kj3XWOXRRKU9ajRs+Rg7T3+KSW9jPA0tz/IcwQCj1y+qV+B/ZQ/jgtGeh2C3LKeBpSfSDiwxTR 8koKDKl6K6u5d6z0uC4J64Y2vu0LCJeJDfUKvUmUsuFpDgOLnSdVgvNsj3gXT3dLNO4fsLBFxlc 1lPskeCzeMPtWtJiLhT21waTQA9i+Hw7LNcQ6B3mbTldlsal1JvKwvnlw4c=
X-Google-Smtp-Source: AGHT+IFkHq2Uic0OdJGAh8+eHk0J/KosGv2jvQeWx53FAFjlbMC6+LE3OZvKY1M03U/TcjB8MTpe3K2wZBjHJn+Om8U=
X-Received: by 2002:a05:651c:50d:b0:37a:44c6:1756 with SMTP id 38308e7fff4ca-3812161da05mr81965681fa.22.1766956913540; Sun, 28 Dec 2025 13:21:53 -0800 (PST)
MIME-Version: 1.0
References: <176678724056.1402966.14218264572401004152@dt-datatracker-5656579b89-p6k4r> <CALx6S35pqE9LTAyWeH3ho1Qa6wMcA1_M9TOUoKW6meFGdnNViA@mail.gmail.com> <897ff468-33eb-4b73-a1b4-1ec60d8766f3@gmail.com> <CALx6S34JJrN7jTr6Kg+MU7J-4jv5WZ0GjqQSZiopq1vJ=xihGg@mail.gmail.com> <2779f7cd-7760-4aad-8e65-2489aa853ff1@gmail.com>
In-Reply-To: <2779f7cd-7760-4aad-8e65-2489aa853ff1@gmail.com>
From: Tom Herbert <tom@herbertland.com>
Date: Sun, 28 Dec 2025 13:21:42 -0800
X-Gm-Features: AQt7F2rup9JyIB9_qhxpRG_zntizmSwM9iOJJxjWpFqbStuRbl7x3y_X5BoSPzE
Message-ID: <CALx6S347ygkKc2muOCsxs7M6O0RimbpYxJFKBpkB6uA0kjSsXg@mail.gmail.com>
To: Justin Iurman <justin.iurman@gmail.com>
Content-Type: text/plain; charset="UTF-8"
Content-Transfer-Encoding: quoted-printable
Message-ID-Hash: F43O7OUFAOUYJEJLU2W6L4UCIILZC4YE
X-Message-ID-Hash: F43O7OUFAOUYJEJLU2W6L4UCIILZC4YE
X-MailFrom: tom@herbertland.com
X-Mailman-Rule-Misses: dmarc-mitigation; no-senders; approved; emergency; loop; banned-address; member-moderation; header-match-ipv6.ietf.org-0; nonmember-moderation; administrivia; implicit-dest; max-recipients; max-size; news-moderation; no-subject; digests; suspicious-header
CC: 6MAN <6man@ietf.org>
X-Mailman-Version: 3.3.9rc6
Precedence: list
Subject: [IPv6]Re: Fwd: New Version Notification for draft-herbert-deprecate-eh-00.txt
List-Id: "IPv6 Maintenance Working Group (6man)" <ipv6.ietf.org>
Archived-At: <https://mailarchive.ietf.org/arch/msg/ipv6/iWhEPmnpXIMkVkap5japfCMprQw>
List-Archive: <https://mailarchive.ietf.org/arch/browse/ipv6>
List-Help: <mailto:ipv6-request@ietf.org?subject=help>
List-Owner: <mailto:ipv6-owner@ietf.org>
List-Post: <mailto:ipv6@ietf.org>
List-Subscribe: <mailto:ipv6-join@ietf.org>
List-Unsubscribe: <mailto:ipv6-leave@ietf.org>
On Sun, Dec 28, 2025 at 1:06 PM Justin Iurman <justin.iurman@gmail.com> wrote: > > On 12/28/25 19:36, Tom Herbert wrote: > > On Sun, Dec 28, 2025 at 4:20 AM Justin Iurman <justin.iurman@gmail.com> wrote: > >> > >> Hi Tom, > >> > >> From the Abstract: > >> > >> This document describes the deprecation of IPv6 extension headers on > >> the Internet with the exception of Encapsulating Security Payload. > >> Deprecation is motivated by three factors: 1) the data shows high > >> discard rates for packets with extension headers sent over the > >> Internet, 2) extension headers can be used for Denial of Service > >> attack and are replete with other security vulnerabilities, 3) the > >> > >> Points 1 and 2 are contradictory. If discard rates are high, then a DoS > >> attack is theoretical/unpractical. > > > > Happy Holidays Justin. > > Tom, > > > There's no contradiction here. The high discard rates discourage > > developers from developing and deploying extension headers on the > > Internet. EH is still reachable to many destinations so an attack > > would be effective to those destinations. At best the high drop rates > > have mitigated attacks, not eliminated them. Of course, if we don't > > address the vulnerabilities on the basis that the protocol isn't used > > then that's poor engineering. > > I'm not saying it's not possible, just that it's unlikely considering > the current situation. Which is also why I proposed to fix that part of > RFC 8200 in eh-occurrences (and I believe you also did in eh-limits). > > Back to a question I had: why does it have to be all or nothing when > talking about EHs? IMO, fixing that part in RFC 8200 + adapting limits > of options in a Hbh or DO in rfc8504-bis would be a good short-term > compromise. > > >> high loss rates are a disincentive to develop new extension headers > >> or options that might be useful or fix known problems. This document > >> recommends that extension headers, other than Encapsulating Security > >> Payload, be relegated to use only in limited domains and that packets > >> with extension headers should be discarded at boundary routers of > >> limited domains. > >> > >> As already discussed in other threads, I don't think it'd be reasonable > >> to disable/deprecate/you-name-it the Destination Options Header on the > >> public Internet and relegate it to limited domains only. I don't have a > >> strong opinion for other EHs, but my intuition tells me it wouldn't be a > >> good idea for the future. Just because there aren't any use cases at the > >> moment doesn't mean you won't have them in a few years. > > > > How many years exactly until we'll be able to reliably use extension > > headers on the Internet? What's your plan to address the issues and > > convince developers it's finally okay for them to use in their > > As mentioned, I only see the DO as a good candidate here. > > > applications? For Destination Options, how will you convince a > > developer that they should send end-to-end data in plain text over the > > Internet without any Integrity checks instead of just putting the data > > inside the encryption envelope of a transport protocol? Consider that > > First, because you may need that data in Layer-3 instead of Layer-4. > Second, you can just use ESP+Dest to avoid filtering and hardware > limitation, and have confidentiality+integrity. So, it is doable if you > really want to at the moment. Justin, The draft would allow ESP with a Destination Options header. What the draft deprecates is using plain text Destination Options on the Internet (i.e. Destination Options not sent in ESP). If nothing else, the lack of security precludes any serious use of plain text Destination Options being sent over the Internet. Do you agree with this? If you don't, please describe the use case for a Destination Option that exposes end to end information to untrusted parties, and allows those parties to change the data as they please or even insert their own Destination Options header in packets without detection. Tom > > > we have more than twenty-five years of history with IPv6 and IPv4 > > options going back even farther-- not a single Destination option has > > ever been defined that would be even remotely considered useful, much > > less needed, over the Internet. Given all this, I don't believe that > > Destination Options will ever be productively used on the Internet-- > > the cost-value proposition just isn't there and never will be IMO. > > That's a pretty strong opinion, but unfortunately we don't have a > crystal ball. > > Justin > > > Tom > > > >> > >> Justin > >> > >> On 12/26/25 23:16, Tom Herbert wrote: > >>> Happy Holidays 6man! > >>> > >>> I've posted a new draft on deprecating extension headers on the > >>> Internet. Comment are appreciated! > >>> > >>> Thanks, > >>> Tom > >>> > >>> ---------- Forwarded message --------- > >>> From: <internet-drafts@ietf.org> > >>> Date: Fri, Dec 26, 2025 at 2:14 PM > >>> Subject: New Version Notification for draft-herbert-deprecate-eh-00.txt > >>> To: Tom Herbert <tom@herbertland.com> > >>> > >>> > >>> A new version of Internet-Draft draft-herbert-deprecate-eh-00.txt has been > >>> successfully submitted by Tom Herbert and posted to the > >>> IETF repository. > >>> > >>> Name: draft-herbert-deprecate-eh > >>> Revision: 00 > >>> Title: Deprecating IPv6 Extension Headers on the Internet > >>> Date: 2025-12-26 > >>> Group: Individual Submission > >>> Pages: 10 > >>> URL: https://www.ietf.org/archive/id/draft-herbert-deprecate-eh-00.txt > >>> Status: https://datatracker.ietf.org/doc/draft-herbert-deprecate-eh/ > >>> HTMLized: https://datatracker.ietf.org/doc/html/draft-herbert-deprecate-eh > >>> > >>> > >>> Abstract: > >>> > >>> This document describes the deprecation of IPv6 extension headers on > >>> the Internet with the exception of Encapsulating Security Payload. > >>> Deprecation is motivated by three factors: 1) the data shows high > >>> discard rates for packets with extension headers sent over the > >>> Internet, 2) extension headers can be used for Denial of Service > >>> attack and are replete with other security vulnerabilities, 3) the > >>> high loss rates are a disincentive to develop new extension headers > >>> or options that might be useful or fix known problems. This document > >>> recommends that extension headers, other than Encapsulating Security > >>> Payload, be relegated to use only in limited domains and that packets > >>> with extension headers should be discarded at boundary routers of > >>> limited domains. > >>> > >>> > >>> > >>> The IETF Secretariat > >>> > >>> -------------------------------------------------------------------- > >>> IETF IPv6 working group mailing list > >>> ipv6@ietf.org > >>> List Info: https://mailman3.ietf.org/mailman3/lists/ipv6@ietf.org/ > >>> -------------------------------------------------------------------- > >> >
- [IPv6]Fwd: New Version Notification for draft-her… Tom Herbert
- [IPv6]Re: Fwd: New Version Notification for draft… Justin Iurman
- [IPv6]Re: Fwd: New Version Notification for draft… Tom Herbert
- [IPv6]Re: Fwd: New Version Notification for draft… Ole Trøan
- [IPv6]Re: Fwd: New Version Notification for draft… Tom Herbert
- [IPv6]Re: Fwd: New Version Notification for draft… Justin Iurman
- [IPv6]Re: Fwd: New Version Notification for draft… Tom Herbert
- [IPv6]Re: Fwd: New Version Notification for draft… Tom Herbert
- [IPv6]Re: Fwd: New Version Notification for draft… Timothy Winters
- [IPv6]Re: Fwd: New Version Notification for draft… Bonica, Ron
- [IPv6]Re: Fwd: New Version Notification for draft… Brian E Carpenter
- [IPv6]Re: Fwd: New Version Notification for draft… Ole Trøan
- [IPv6]Re: Fwd: New Version Notification for draft… Eliot Lear
- [IPv6]Re: Fwd: New Version Notification for draft… Bonica, Ron
- [IPv6]Re: Fwd: New Version Notification for draft… Mike Simpson
- [IPv6]Re: Fwd: New Version Notification for draft… Justin Iurman
- [IPv6]Re: Fwd: New Version Notification for draft… Brian E Carpenter
- [IPv6]Re: Fwd: New Version Notification for draft… Tom Herbert
- [IPv6]Re: Fwd: New Version Notification for draft… Adrian Farrel
- [IPv6]Re: Fwd: New Version Notification for draft… Eliot Lear
- [IPv6]Re: Fwd: New Version Notification for draft… Tom Herbert
- [IPv6]Re: Fwd: New Version Notification for draft… Bonica, Ron
- [IPv6]Re: Fwd: New Version Notification for draft… Bonica, Ron
- [IPv6]Re: Fwd: New Version Notification for draft… Tom Herbert
- [IPv6]Re: Fwd: New Version Notification for draft… Bonica, Ron
- [IPv6]Re: Fwd: New Version Notification for draft… Bonica, Ron
- [IPv6]Re: Fwd: New Version Notification for draft… Brian E Carpenter
- [IPv6]Re: Fwd: New Version Notification for draft… David Farmer
- [IPv6]Re: Fwd: New Version Notification for draft… Tom Herbert
- [IPv6]Re: Fwd: New Version Notification for draft… Sebastian Moeller
- [IPv6]Re: Fwd: New Version Notification for draft… Brian E Carpenter
- [IPv6]Re: Fwd: New Version Notification for draft… Ole Trøan
- [IPv6]Re: Fwd: New Version Notification for draft… Mark Smith
- [IPv6]Re: Fwd: New Version Notification for draft… Nick Hilliard
- [IPv6]Re: Fwd: New Version Notification for draft… Brian E Carpenter
- [IPv6]Re: Fwd: New Version Notification for draft… Tom Herbert
- [IPv6]Re: Fwd: New Version Notification for draft… Tom Herbert
- [IPv6]Re: Fwd: New Version Notification for draft… Brian E Carpenter
- [IPv6]Re: Fwd: New Version Notification for draft… Tom Herbert
- [IPv6]Re: Fwd: New Version Notification for draft… Tom Herbert
- [IPv6]Re: Fwd: New Version Notification for draft… Tom Herbert
- [IPv6]Re: Fwd: New Version Notification for draft… Tom Herbert
- [IPv6]Re: Fwd: New Version Notification for draft… Tom Herbert
- [IPv6]Re: Fwd: New Version Notification for draft… Christian Huitema
- [IPv6]Re: Fwd: New Version Notification for draft… Eliot Lear
- [IPv6]Re: Fwd: New Version Notification for draft… Tom Herbert
- [IPv6]Re: Fwd: New Version Notification for draft… Fernando Gont
- [IPv6]Re: Fwd: New Version Notification for draft… Mark Smith
- [IPv6]Re: Fwd: New Version Notification for draft… Brian E Carpenter