Re: about violation of standards

Gyan Mishra <hayabusagsm@gmail.com> Tue, 23 April 2019 00:16 UTC

Return-Path: <hayabusagsm@gmail.com>
X-Original-To: ipv6@ietfa.amsl.com
Delivered-To: ipv6@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 31617120105 for <ipv6@ietfa.amsl.com>; Mon, 22 Apr 2019 17:16:21 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -1.998
X-Spam-Level:
X-Spam-Status: No, score=-1.998 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, DKIM_SIGNED=0.1, DKIM_VALID=-0.1, DKIM_VALID_AU=-0.1, FREEMAIL_FROM=0.001, HTML_MESSAGE=0.001, RCVD_IN_DNSWL_NONE=-0.0001, SPF_PASS=-0.001, URIBL_BLOCKED=0.001] autolearn=ham autolearn_force=no
Authentication-Results: ietfa.amsl.com (amavisd-new); dkim=pass (2048-bit key) header.d=gmail.com
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id 5weEoWvTtrnx for <ipv6@ietfa.amsl.com>; Mon, 22 Apr 2019 17:16:18 -0700 (PDT)
Received: from mail-io1-xd42.google.com (mail-io1-xd42.google.com [IPv6:2607:f8b0:4864:20::d42]) (using TLSv1.2 with cipher ECDHE-RSA-AES128-GCM-SHA256 (128/128 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id 39F7E120026 for <ipv6@ietf.org>; Mon, 22 Apr 2019 17:16:18 -0700 (PDT)
Received: by mail-io1-xd42.google.com with SMTP id u12so489041iop.0 for <ipv6@ietf.org>; Mon, 22 Apr 2019 17:16:18 -0700 (PDT)
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=gmail.com; s=20161025; h=mime-version:references:in-reply-to:from:date:message-id:subject:to :cc; bh=t9slk72rl4dMywoCCrgSv6eLQ+jQvVZyz9NvbcnLQjQ=; b=vcX6OgVrIW8mVeSX39AWcudNuJ3g2Eo0a2RpdIrdlpyixbyvW0PVHTw3YuJX+dfUkf qRvs2ylHyTUQogFhfR6EZxgWtmocC2RqubEeYsP88q0tivJXH/wi7EbiWx3/li8fEQ5Q gPRF6qZiI5UX79SP7ixhRT9/YccYiluoWaTgPnDsG8VU39IRyf0bKOW0w9tjMvVJtEBN lRc25lG03vz47TxWf82LiCZlfoZ7Hxw3V0Sbw5X/7/t+3ZUEiFd2aUG6R7WX2ASBF1HB gikb9VRd6irB0MIFFaGQjZAy1dybHEKDSYcyxUoNg2X9U63hSgq8WlLs0bWfQm3XfztN XTkw==
X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20161025; h=x-gm-message-state:mime-version:references:in-reply-to:from:date :message-id:subject:to:cc; bh=t9slk72rl4dMywoCCrgSv6eLQ+jQvVZyz9NvbcnLQjQ=; b=pGJ/W7lGHGeWMve7PyqOnB4eiat10iS0l0atiCqzPOShSAgnJjItVt/7tBmR8bq3nL xi1jmijUYAPe41BNumM7hgV9l8whad9PUCNlzdlG2uhuhASeJXMvWC5ubOaljEGlXTtY FroUewC6MoargpOtKVCR3r9FTAeACbMq67k6o6PSIQB6+ktKwAOsMJW+9Y51vYI7+w4K rDGkaXm7PH6PwNq36rjz91gJc63/UxLlzpS7KECyPAnYkUai8gFYlSD2qfo2wsy7nRZ/ OEFsdwRgbMedptGEHYwsLzqPnkLAUsMQNRgHnY5UgVJEXxNBDUb93KDbNVjYLHpjv5qG FsLA==
X-Gm-Message-State: APjAAAVRZe4qzua4767qUvXRh281bZnLE7hY7rIAXypPIsP2csEu5BFK 59iVrFO60kE9Kyh/sX9+uihUiq0LbgZ7UkdGl9s=
X-Google-Smtp-Source: APXvYqw/aUpQwhW5+0o3SrOYIomfTgH/TqkjJKJ7pkX5hBT5OTHOB3DfvokPUD+svLEU1lqLyghonVc2aeiYMQq9krg=
X-Received: by 2002:a5e:9203:: with SMTP id y3mr12522714iop.22.1555978577319; Mon, 22 Apr 2019 17:16:17 -0700 (PDT)
MIME-Version: 1.0
References: <bb7f7606-2adf-e669-8bcd-e41f17800782@gmail.com> <CAJE_bqd9frqX5-yeVPj8MYXpZ4737HqK1gmfD9cQV3A-Ea5HrQ@mail.gmail.com> <CAKQ4NaWLGh3f_dN6WVNnYs9fKL8=vfpnShAK8AczPo8LE8LjFA@mail.gmail.com>
In-Reply-To: <CAKQ4NaWLGh3f_dN6WVNnYs9fKL8=vfpnShAK8AczPo8LE8LjFA@mail.gmail.com>
From: Gyan Mishra <hayabusagsm@gmail.com>
Date: Mon, 22 Apr 2019 20:16:03 -0400
Message-ID: <CABNhwV0ZrPnUVwjhZJQ8CzxwZwP6Yap_UX2q8xM6W9r9KZLNSw@mail.gmail.com>
Subject: Re: about violation of standards
To: Yucel Guven <yucel.guven@gmail.com>
Cc: 神明達哉 <jinmei@wide.ad.jp>, Alexandre Petrescu <alexandre.petrescu@gmail.com>, IPv6 <ipv6@ietf.org>
Content-Type: multipart/alternative; boundary="000000000000611d470587277edc"
Archived-At: <https://mailarchive.ietf.org/arch/msg/ipv6/jz4jkbXZHtT6EPwVGFLd6LeTqzI>
X-BeenThere: ipv6@ietf.org
X-Mailman-Version: 2.1.29
Precedence: list
List-Id: "IPv6 Maintenance Working Group \(6man\)" <ipv6.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/ipv6>, <mailto:ipv6-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/ipv6/>
List-Post: <mailto:ipv6@ietf.org>
List-Help: <mailto:ipv6-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/ipv6>, <mailto:ipv6-request@ietf.org?subject=subscribe>
X-List-Received-Date: Tue, 23 Apr 2019 00:16:21 -0000

My concern  with all this is that you have to have and show even one use
case where 2^64  64 bits of station id is not enough bits and you need to
encroach on the 54 bit all 0's field.

Just give me one example showing me a use case that 1.84467441E+19 is just
not big big enough.

Gyan

On Mon, Apr 22, 2019, 11:37 AM Yucel Guven <yucel.guven@gmail.com> wrote:

>
> Hi Jinmei Tatuya,
>
> > This logic doesn't make sense to me at all.  There was a very widely used
> > implementation of commercial router (I don't name it as it's not my
> > purpose to pick a particular vendor) that forwarded an IPv6 packet
> > whose source address is link-local from one link to another link,
> > instead of returning an ICMPv6 destination unreachable error, code 2,
> > as specified in RFC4443.
>
> That is very interesting point indeed.
> Do you mean that billions of people's data, information, etc...etc... from
> their Link-locals
> can easily be routed to somewhere that no one knows? Just because of
> "that vendor" (or vendors?)
> If that's the case, I really wonder about what can be done with
> "127.0.0.1".
>
> Anyways, my concern is about huge amount of addresses of the fe80::/10.
> There are 281,474,976,710,655 =  281 Trillion 474 Billion 976 million 710
> Thousand 655 addresses
> in between  fe80:0:0:0::/64  and fe80:ffff:ffff:ffff::/64.
> If we just take  fe80:1::/32 or /64, then it breaks RFC4291 due to 54
> zeros.
>
> Is it right time to modify RFC4291?
>
>
>
>
>
>
>
> On Thu, Apr 18, 2019 at 11:03 PM 神明達哉 <jinmei@wide.ad.jp> wrote:
>
>> On Thu, Apr 18, 2019 at 11:59 AM Alexandre Petrescu <
>> alexandre.petrescu@gmail.com> wrote:
>>
>> >    In private conversation this debate happened:
>>
>> >    is an implementation that uses fe80:1::2 address on an interface a
>> >    violation of standards? (RFC 4291 does not allow for '1' to be
>> there).
>>
>> >    My point of view is that as long as that mplementation is widely
>> used,
>> >    that is not a violation of standards.  Rather, the situation makes it
>> >    that that standard is not in agreement with implementations..
>>
>> This logic doesn't make sense to me at all.  There was a very widely used
>> implementation of commercial router (I don't name it as it's not my
>> purpose to pick a particular vendor) that forwarded an IPv6 packet
>> whose source address is link-local from one link to another link,
>> instead of returning an ICMPv6 destination unreachable error, code 2,
>> as specified in RFC4443.  According to that logic, this implementation
>> would be considered not violating the RFC "because it's widely used";
>> most people call it an implementation bug.
>>
>> Regarding Linux, I'd note that link-local addresses are automatically
>> generated by the system, and the generated address conforms to the
>> format specified in Section 2.5.6 of RFC4291.  More specifically, its
>> intermediate 54 bits are all set to 0.  Plus, as far as I know, the
>> vast majority of people never bother to change the auto-generated
>> link-local addresses.  In that sense the use of addresses like
>> "fe80:1::2" are not really widely used, even if the implementation
>> that allows its users to manually configure such addresses is widely
>> used.
>>
>> Almost any implementation has some weapon that allows its user to
>> shoot their feet, often violating protocol standards.  An extreme case
>> is a tool like bpf, with which you can send out almost any broken
>> packets to the wire.  BPF is widely used tools, but as far as I know
>> no one uses the existence of that tool to justify the violation of the
>> standard.
>>
>> Now, I'm open to the discussion of possibly updating RFC4291 to allow
>> non-0 value in the intermediate 54-bit field, starting from the fact
>> that it currently violates the standard.  But I don't buy an argument
>> that a behavior against the current standard is not a violation simply
>> because there's a system utility of a widely used OS that allows that
>> particular behavior.
>>
>> --
>> JINMEI, Tatuya
>> --------------------------------------------------------------------
>> IETF IPv6 working group mailing list
>> ipv6@ietf.org
>> Administrative Requests: https://www.ietf.org/mailman/listinfo/ipv6
>> --------------------------------------------------------------------
>>
> --------------------------------------------------------------------
> IETF IPv6 working group mailing list
> ipv6@ietf.org
> Administrative Requests: https://www.ietf.org/mailman/listinfo/ipv6
> --------------------------------------------------------------------
>