[IPv6]Re: Fwd: New Version Notification for draft-iurman-6man-eh-occurrences-00.txt

Tom Herbert <tom@herbertland.com> Tue, 23 December 2025 21:29 UTC

Return-Path: <tom@herbertland.com>
X-Original-To: ipv6@mail2.ietf.org
Delivered-To: ipv6@mail2.ietf.org
Received: from localhost (localhost [127.0.0.1]) by mail2.ietf.org (Postfix) with ESMTP id F3C519E86921 for <ipv6@mail2.ietf.org>; Tue, 23 Dec 2025 13:29:50 -0800 (PST)
X-Virus-Scanned: amavisd-new at ietf.org
X-Spam-Flag: NO
X-Spam-Score: -2.1
X-Spam-Level:
X-Spam-Status: No, score=-2.1 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, DKIM_SIGNED=0.1, DKIM_VALID=-0.1, DKIM_VALID_AU=-0.1, DKIM_VALID_EF=-0.1, RCVD_IN_DNSWL_NONE=-0.0001, SPF_HELO_NONE=0.001, SPF_PASS=-0.001] autolearn=unavailable autolearn_force=no
Authentication-Results: mail2.ietf.org (amavisd-new); dkim=pass (2048-bit key) header.d=herbertland.com
Received: from mail2.ietf.org ([166.84.6.31]) by localhost (mail2.ietf.org [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id vzudmFI9aAab for <ipv6@mail2.ietf.org>; Tue, 23 Dec 2025 13:29:50 -0800 (PST)
Received: from mail-lj1-x234.google.com (mail-lj1-x234.google.com [IPv6:2a00:1450:4864:20::234]) (using TLSv1.3 with cipher TLS_AES_128_GCM_SHA256 (128/128 bits) key-exchange X25519 server-signature ECDSA (P-256) server-digest SHA256) (No client certificate requested) by mail2.ietf.org (Postfix) with ESMTPS id 59FBF9E86042 for <6man@ietf.org>; Tue, 23 Dec 2025 13:21:33 -0800 (PST)
Received: by mail-lj1-x234.google.com with SMTP id 38308e7fff4ca-37b99da107cso53178491fa.1 for <6man@ietf.org>; Tue, 23 Dec 2025 13:21:33 -0800 (PST)
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=herbertland.com; s=google; t=1766524886; x=1767129686; darn=ietf.org; h=content-transfer-encoding:cc:to:subject:message-id:date:from :in-reply-to:references:mime-version:from:to:cc:subject:date :message-id:reply-to; bh=xpEhGxLGwU9uUfUQ2TQCHT6yzfUW5fanYZegQB4BLSk=; b=FB/9pliaRBMZu6YyCzglhzIZCL2NaTms+1/5pfzifY5n1lD2zh1p6oUTWs2mwJM9za PJFzMi3/4ShseN6wNU++ue72IDPIhgYp0S9UIeGEgMeBeIXHrlC6+HdawkpymIjiF2N0 SErXlLPQZrUita+kLE8fFUNQiVZlC9uvkhmUzKEk2G8D8Vx/xxCM92OLSgCCAr1uzker rIlBqhPa1MZAkUlEOkE4B/Xadblm1HfGB94eg4QpExRkdfudFwStM26iFudTw907EG2h CXQ78j7g1hekl2ViotnTmeEplPQKvup8A60V46VlkfGadZhShsm8Dt+JEFvgAlNVwPmq k5MA==
X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20230601; t=1766524886; x=1767129686; h=content-transfer-encoding:cc:to:subject:message-id:date:from :in-reply-to:references:mime-version:x-gm-gg:x-gm-message-state:from :to:cc:subject:date:message-id:reply-to; bh=xpEhGxLGwU9uUfUQ2TQCHT6yzfUW5fanYZegQB4BLSk=; b=YDY+zQnYlIAuzx9qbv46M9RIaFvtqgq4yTFES1ngwFmZffhyztkUzIVNEhiSvKiupu n2wpcUQWMgNcGfvJ9wE+xaQU2nzXawWLzrm4wU6P5SKU7k8cOFgxD1rUci6zdR1Gb3uS yMSMZyFbBRYF3g+Sf6A9OUbb/GLriFZvU+0D5jzlgwdx24lRyX7FrBC/uKByTMV+oH7k mRzIrpZoxD3ioS1oCOvReTGJGsdUeT7kzJg5lTeVjFIYvnC9YcP0VatROgj3o8YiEYLj oHSibdvSRpBAHVPvYysE8SxL9Q7OOimXHMS1NJZP3vsfPhP0sQaslWSN53kSl/FMGSEe mXfw==
X-Forwarded-Encrypted: i=1; AJvYcCUf+njiocjZYo3wbXppmJPGbyCPjymFnm1Lnyhfc8irLmD0Uc4cLfQDOns9BTZ6aAMxAAuq@ietf.org
X-Gm-Message-State: AOJu0YysU7a1pc8C8iyPVtQNql9AoNOqaCze5h6bM6Q5yqW9Gvkpd/5N s2k9R54VcsIYExa4m6UqO6YFyjqloagqeIbCAhOBX9S+5gC62WgMnyUet0leqv57ZP7XjI6L3wD 2Vu5gbyN/Gb7Qike3KDK1wTRbOrDjgNuaqOpiqb8+
X-Gm-Gg: AY/fxX643tkYOvGar46DhTlQJjR5GIPS4Lnb0OCH6OWLCMhxQdB8XC9et3cutxHdALf zWX4P8+CP6yz8776x36/iZ0u7IEGyMEgLTN//GtcpiW//QXfYCPl9bujLns+OQKZrLRTNqLhHsS 6gzgOms/3AzKxBpPSy+qEp0/8KtScTgILxxnGEeUK7d0uCkyxddfnfZ7DIKwBTpGqxolSoqL6X7 npubZ15Kk3vJkWNK7/e115edJlJVKlUm57TWlisG3DNtWtxYdiGL0i9zdZAUOGkIeOsbtGfFCDy p2Ukjjr3SBdWd5Yhn/AiX/w+yQZvWtmY5w2XWV30VAhe0olmtAQHjNQa2n8G
X-Google-Smtp-Source: AGHT+IGlqMGASqI4qmQO6sSUlP7Wcc+vygTEZmeZ9HBru3YBZY+My6XU1jk1X80U0HYl4DCqPHHt4LnJVUoiN/Tjy/E=
X-Received: by 2002:a2e:bc01:0:b0:37b:9b58:dd0e with SMTP id 38308e7fff4ca-3812158f5cdmr52229541fa.10.1766524885765; Tue, 23 Dec 2025 13:21:25 -0800 (PST)
MIME-Version: 1.0
References: <176651727681.861963.1665571528282296202@dt-datatracker-5656579b89-p6k4r> <af5fd42c-fbb9-4606-a8c6-208a7ff6bc6f@gmail.com> <C6D81618-1EE3-411B-A33B-08DA13D97615@gmail.com> <9da3faac-479d-4638-ba91-bd81f6d38692@gmail.com> <CALx6S37OGUD_ysrd6AvMa13SVMv8SiWYs5F_RR_i3rzcMXMrEw@mail.gmail.com> <26504d91-3c61-4a0c-8943-d82e3acedd89@gmail.com>
In-Reply-To: <26504d91-3c61-4a0c-8943-d82e3acedd89@gmail.com>
From: Tom Herbert <tom@herbertland.com>
Date: Tue, 23 Dec 2025 13:21:14 -0800
X-Gm-Features: AQt7F2rsi7byDSkCPqAcFM6RFO8HrFLIFrLfLSrufT5rPZcTlwBR-6ICT8htUPk
Message-ID: <CALx6S378CDW3TC2zz=NFpw+dtms8fokbVOzW0aCAYRuOC_G3Tw@mail.gmail.com>
To: Justin Iurman <justin.iurman@gmail.com>
Content-Type: text/plain; charset="UTF-8"
Content-Transfer-Encoding: quoted-printable
Message-ID-Hash: WV7IJRP5P6KOV4XI2NI5IZU7TYITQHOK
X-Message-ID-Hash: WV7IJRP5P6KOV4XI2NI5IZU7TYITQHOK
X-MailFrom: tom@herbertland.com
X-Mailman-Rule-Misses: dmarc-mitigation; no-senders; approved; emergency; loop; banned-address; member-moderation; header-match-ipv6.ietf.org-0; nonmember-moderation; administrivia; implicit-dest; max-recipients; max-size; news-moderation; no-subject; digests; suspicious-header
CC: Bob Hinden <bob.hinden@gmail.com>, 6man@ietf.org
X-Mailman-Version: 3.3.9rc6
Precedence: list
Subject: [IPv6]Re: Fwd: New Version Notification for draft-iurman-6man-eh-occurrences-00.txt
List-Id: "IPv6 Maintenance Working Group (6man)" <ipv6.ietf.org>
Archived-At: <https://mailarchive.ietf.org/arch/msg/ipv6/pbizp34fW57-O-CVJQrG2_J1y4E>
List-Archive: <https://mailarchive.ietf.org/arch/browse/ipv6>
List-Help: <mailto:ipv6-request@ietf.org?subject=help>
List-Owner: <mailto:ipv6-owner@ietf.org>
List-Post: <mailto:ipv6@ietf.org>
List-Subscribe: <mailto:ipv6-join@ietf.org>
List-Unsubscribe: <mailto:ipv6-leave@ietf.org>

On Tue, Dec 23, 2025 at 1:05 PM Justin Iurman <justin.iurman@gmail.com> wrote:
>
> Tom,
>
> On 12/23/25 21:55, Tom Herbert wrote:
> > On Tue, Dec 23, 2025 at 12:31 PM Justin Iurman <justin.iurman@gmail.com> wrote:
> >>
> >> Bob,
> >>
> >> I don't think it does, but I may be wrong. Could you point me to the
> >> text you have in mind?
> >>
> >> This draft enforces the number of occurrences of all Extension Headers,
> >> not the number of options inside a Hop-by-Hop or Destination Options
> >> header nor the processing of Hbh/options. Which is, IMHO, different from
> >> RFC 9673. The idea came after a discussion with Tom on the mailing list
> >> (regarding draft-ietf-6man-eh-limits), and his concern about DoS attacks
> >> on hosts, mainly for the Destination Options header which could appear
> >> many times (i.e., at least more than two). I believe this draft solves
> >> that concern and at the same time avoids the need to publish
> >> draft-ietf-6man-eh-limits, which by the way may also require changes in
> >> rfc8504-bis Section 5.3 (e.g., maybe a smaller limit on the number of
> >> options, current is 8). Other concerns about the size of EHs and/or
> >> options in draft-ietf-6man-eh-limits don't need to be addressed IMHO, as
> >> already discussed and explained previously on the mailing list. Overall,
> >> I see this draft + rfc8504-bis + RFC 9673 as an acceptable solution,
> >> compared to draft-ietf-6man-eh-limits.
> >
> > Justin,
> >
> > This was already addressed in eh-limits draft:
> >
> > "
> > A host or intermediate MAY enforce the recommended extension
> > header ordering and number of occurrences of extension headers
> > described in Section 4.1 of [RFC8200].  Per the ordering
> > recommendations, each extension header can occur at most once in a
> > packet with the exception of Destination Options header which can
> > occur twice.  The recommended extension header ordering per
> > [RFC8200] is:
> >
> >        -  IPv6 header
> >        -  Hop-by-Hop Options header
> >        -  Destination Options header
> >        -  Routing header
> >        -  Fragment header
> >        -  Authentication header
> >        -  Encapsulating Security Payload header
> >        -  Destination Options header
> >        -  Upper-Layer header
> >
> >   If a host or intermediate node enforces extension header ordering
> >   and a packet is received with extension headers out of order or
> >   the number of occurrences of an extension header is greater than
> >   one, or two for the Destination Options header, then the receiving
> >   node MUST discard the packet and MAY send an ICMP Parameter
> >   Problem message with code 0 (Erroneous Header Field Encountered)
> >   [RFC4443] to the packet's source address.
> > "
> >
> > Also, this draft is only for one tiny part of the problem and I don't
> > believe it is really addressing the core issue which is the high drop
> > rates of packets with extension headers.
>
> Correct. However, we already discussed why draft-ietf-6man-eh-limits was
> trying to do too much by specifying limits on the size of EHs and Hbh/Do
> options (feedback from WG members and the IESG). And since you did not
> want to remove these problematic parts in the draft, I see this draft as
> a good trade-off and the only way forward.

Justin,

I don't see how this is a good trade-off nor the only way forward for
solving the undepoyability of extension headers. IMO, if we're not
going to address the real issues with extension headers then the best
way forward is to deprecate them.

Tom

>
> Justin
>
> > Tom
> >
> >>
> >> Justin
> >>
> >> On 12/23/25 20:57, Bob Hinden wrote:
> >>> Justin,
> >>>
> >>> I suggest you take a look at RFC 9673 "IPv6 Hop-by-Hop Options Processing Procedures”.   I believe it covers this topic for hop-by-hop options.
> >>>
> >>> Bob
> >>>
> >>>
> >>>> On Dec 23, 2025, at 11:26 AM, Justin Iurman <justin.iurman@gmail.com> wrote:
> >>>>
> >>>> Hi everyone,
> >>>>
> >>>> Happy holidays!
> >>>>
> >>>> This new draft aims to mitigate the risk of DoS attacks due to an abusive use of IPv6 Extension Headers. This problem is related to non-normative language combined with ambiguous wording in RFC 8200. This is one of the concerns raised in draft-ietf-6man-eh-limits. Feedback welcome!
> >>>>
> >>>> Cheers,
> >>>> Justin
> >>>>
> >>>> -------- Forwarded Message --------
> >>>> Subject: New Version Notification for draft-iurman-6man-eh-occurrences-00.txt
> >>>> Date: Tue, 23 Dec 2025 11:14:36 -0800
> >>>> From: internet-drafts@ietf.org
> >>>> To: Justin Iurman <justin.iurman@uliege.be>
> >>>>
> >>>> A new version of Internet-Draft draft-iurman-6man-eh-occurrences-00.txt has
> >>>> been successfully submitted by Justin Iurman and posted to the
> >>>> IETF repository.
> >>>>
> >>>> Name:     draft-iurman-6man-eh-occurrences
> >>>> Revision: 00
> >>>> Title:    Mitigating DoS attacks in IPv6 by clarifying the number of occurrences of Extension Headers
> >>>> Date:     2025-12-23
> >>>> Group:    Individual Submission
> >>>> Pages:    5
> >>>> URL: https://www.ietf.org/archive/id/draft-iurman-6man-eh-occurrences-00.txt
> >>>> Status:   https://datatracker.ietf.org/doc/draft-iurman-6man-eh-occurrences/
> >>>> HTMLized: https://datatracker.ietf.org/doc/html/draft-iurman-6man-eh-occurrences
> >>>>
> >>>>
> >>>> Abstract:
> >>>>
> >>>>     This document updates RFC 8200 by specifying normative requirements
> >>>>     on the number of occurrences of IPv6 Extension Headers.  Operational
> >>>>     experience has demonstrated that permitting multiple occurrences of
> >>>>     the same Extension Header can create parsing ambiguity, increase
> >>>>     attack surface, and complicate packet processing in general.  This is
> >>>>     especially true for both the Hop-by-Hop Options Header and the
> >>>>     Destination Options Header, which can contain a number of options.
> >>>>     This document restricts IPv6 packets to carry at most one instance of
> >>>>     each Extension Header, with the exception of the Destination Options
> >>>>     Header, which is permitted to appear twice as specified in RFC 8200.
> >>>>
> >>>>
> >>>>
> >>>> The IETF Secretariat
> >>>>
> >>>>
> >>>> --------------------------------------------------------------------
> >>>> IETF IPv6 working group mailing list
> >>>> ipv6@ietf.org
> >>>> List Info: https://mailman3.ietf.org/mailman3/lists/ipv6@ietf.org/
> >>>> --------------------------------------------------------------------
> >>>
> >>
> >> --------------------------------------------------------------------
> >> IETF IPv6 working group mailing list
> >> ipv6@ietf.org
> >> List Info: https://mailman3.ietf.org/mailman3/lists/ipv6@ietf.org/
> >> --------------------------------------------------------------------
>