[IPv6]Re: Fwd: New Version Notification for draft-herbert-deprecate-eh-00.txt
Tom Herbert <tom@herbertland.com> Mon, 29 December 2025 23:13 UTC
Return-Path: <tom@herbertland.com>
X-Original-To: ipv6@mail2.ietf.org
Delivered-To: ipv6@mail2.ietf.org
Received: from localhost (localhost [127.0.0.1]) by mail2.ietf.org (Postfix) with ESMTP id DD536A08419F for <ipv6@mail2.ietf.org>; Mon, 29 Dec 2025 15:13:27 -0800 (PST)
X-Virus-Scanned: amavisd-new at ietf.org
X-Spam-Flag: NO
X-Spam-Score: -2.1
X-Spam-Level:
X-Spam-Status: No, score=-2.1 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, DKIM_SIGNED=0.1, DKIM_VALID=-0.1, DKIM_VALID_AU=-0.1, DKIM_VALID_EF=-0.1, RCVD_IN_DNSWL_NONE=-0.0001, SPF_HELO_NONE=0.001, SPF_PASS=-0.001] autolearn=unavailable autolearn_force=no
Authentication-Results: mail2.ietf.org (amavisd-new); dkim=pass (2048-bit key) header.d=herbertland.com
Received: from mail2.ietf.org ([166.84.6.31]) by localhost (mail2.ietf.org [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id 6bOKS_BrtnpN for <ipv6@mail2.ietf.org>; Mon, 29 Dec 2025 15:13:26 -0800 (PST)
Received: from mail-lj1-x22c.google.com (mail-lj1-x22c.google.com [IPv6:2a00:1450:4864:20::22c]) (using TLSv1.3 with cipher TLS_AES_128_GCM_SHA256 (128/128 bits) key-exchange X25519 server-signature ECDSA (P-256) server-digest SHA256) (No client certificate requested) by mail2.ietf.org (Postfix) with ESMTPS id ABE23A084191 for <6man@ietf.org>; Mon, 29 Dec 2025 15:13:26 -0800 (PST)
Received: by mail-lj1-x22c.google.com with SMTP id 38308e7fff4ca-37a33b06028so81702111fa.2 for <6man@ietf.org>; Mon, 29 Dec 2025 15:13:26 -0800 (PST)
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=herbertland.com; s=google; t=1767049999; x=1767654799; darn=ietf.org; h=content-transfer-encoding:cc:to:subject:message-id:date:from :in-reply-to:references:mime-version:from:to:cc:subject:date :message-id:reply-to; bh=slBdguxQ4cCoiwoqd+ZSm6aicKTPKJng6nkEvRhfA80=; b=As7KD4GjLXVwquq2RPQpTRGE48NUJ702NZX7kxCrjkAl3AiWMn44h13OMhGTZL1wxR PgFpRLeTvV8rhvp70ab7cgcmu95wxyO4avRRwYy04GJkwGjJsptyn+Lz8mN/JzpfLE+Q Bp3iupK2BixU1k+TCkAt7eVQKyGP38KzCdnrN7lGYskkvv4MH6TVC78BNyabTLFk1ZJ0 m98IzGw0l9VBBsaZp32pdU4uPT9fIGyDTqDbdtLwdzYtHzynYgkkjuhTQXXKfsKlbe8x ESLz5aVitlh6BgVgheKN7znFnQ3y/Op8YTUbsvWaNxD8gTs99WjwSbkJ4GR35xt9tMkS gk6g==
X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20230601; t=1767049999; x=1767654799; h=content-transfer-encoding:cc:to:subject:message-id:date:from :in-reply-to:references:mime-version:x-gm-gg:x-gm-message-state:from :to:cc:subject:date:message-id:reply-to; bh=slBdguxQ4cCoiwoqd+ZSm6aicKTPKJng6nkEvRhfA80=; b=OXdJ9G65B0M35WT/i/B1AnsSUvjOEPfeM1JA6pu2uLQGIzR58w9/7iE7YVxkk4cnrj 68oxXSG4n0vgXQXblK8MkTMNp4MqXwpz3f8IaC1U6w3PL4jXDerk1vJxtzdtmgdSY80i Jl97c70T7VmmzOVie5oaRpQNCAVaNlxlkR9K253z9VhM1ifUNC9fCqngAwZX2ZXaDa+b THZR1mxS8wL3JCYKsTwZ8HnHxUYwi05EJ17f73WsQh3xJBg4neCHciv+g9wscLfFVM51 Yj/8A+t2RjUnqX4rX1d3wUtRYfCROuLuRuURyC/diptb26KQVm0oCoOWlDrs1D8s5mWb bOag==
X-Gm-Message-State: AOJu0YwUcwrdWRHDYS2E83+Q6tIVyb3dt/6bXuaWZMBVVWVC19fTVf+A zVMVdj0Fmz5iNrwnGy9Pum+M+2GlAgIc3W2etVBUTE9uy+DgSZd7JZVwV7nHtubJlEIDE0QDy3a SxJX4HUrC3G6pBB9aWuFzz4SGlq/AFchhqycteRF+mJAf2CZLoyIAPhXJ
X-Gm-Gg: AY/fxX7qz0vvdEOSRgIQpHbhXzbO/Yuepx+AU6uFiUn3zrrM4Ofw/ktmygtZMrDKZF5 stANyEEFVoi/SbZLCRZ+isVCLEapjGzLDHWarApd0LGfVTsA0ljyBMThFrfiLBbdDJxvLXttLXP UJmV7bd4H4BmhES5OTtvjTUeaPG4h5YLwTLB7V0BkuikVDVncr7I6Xu0MPiyqeWn0vXtC0AQy7o BQWrDCStZewO6cedDrfJimNZxQQcAiYARwTVq6Jx6CaPMMJLX9j854BH8UaIqJkEApagMuw/fBK QzRe0IB9uLbamVBW7i7qiV5/vntO30pLxEZsdMGzBISe7uFekedRAS4DYMGv
X-Google-Smtp-Source: AGHT+IH+7gVe9r1s3Y02Xsar25wDhGHc05ijcbDfhnO07yHiMS9kofPBEdVsmkzZWOp9LWDylU0q/Z7Yu16xTATAypg=
X-Received: by 2002:a05:651c:2101:b0:381:1b32:e28 with SMTP id 38308e7fff4ca-381216a1f7fmr106013411fa.32.1767049998505; Mon, 29 Dec 2025 15:13:18 -0800 (PST)
MIME-Version: 1.0
References: <176678724056.1402966.14218264572401004152@dt-datatracker-5656579b89-p6k4r> <CALx6S35pqE9LTAyWeH3ho1Qa6wMcA1_M9TOUoKW6meFGdnNViA@mail.gmail.com> <DM4PR84MB23100480ED3768A4A1EDD21AF4BFA@DM4PR84MB2310.NAMPRD84.PROD.OUTLOOK.COM> <CALx6S34d-1Bkq0u5K+68ZtRY8rnpOgOb7A2hq2VGGS9r2GbePw@mail.gmail.com> <DM4PR84MB231001288985FB3D4C8168D1F4BFA@DM4PR84MB2310.NAMPRD84.PROD.OUTLOOK.COM> <CALx6S368Z2C+w-xdabGr5W-qPQJ-SgiKeJujj2fimEnr-+resA@mail.gmail.com> <DM4PR84MB2310E1B6CDDA152F21D19528F4BFA@DM4PR84MB2310.NAMPRD84.PROD.OUTLOOK.COM>
In-Reply-To: <DM4PR84MB2310E1B6CDDA152F21D19528F4BFA@DM4PR84MB2310.NAMPRD84.PROD.OUTLOOK.COM>
From: Tom Herbert <tom@herbertland.com>
Date: Mon, 29 Dec 2025 15:13:07 -0800
X-Gm-Features: AQt7F2qeMdnX0tv1NC5KYnJNK0CE08nE2AcmqFYRu4P1HC5MTrQJEwibmQB8b9o
Message-ID: <CALx6S37UH_Acp7Jw91js3PnPNcdajyVTGCOQBu2ULJCJqY9nLA@mail.gmail.com>
To: "Bonica, Ron" <ronald.bonica=40hpe.com@dmarc.ietf.org>
Content-Type: text/plain; charset="UTF-8"
Content-Transfer-Encoding: quoted-printable
Message-ID-Hash: OY5YH6LS6FMXOPYMC6FH754H4UGD47SV
X-Message-ID-Hash: OY5YH6LS6FMXOPYMC6FH754H4UGD47SV
X-MailFrom: tom@herbertland.com
X-Mailman-Rule-Misses: dmarc-mitigation; no-senders; approved; emergency; loop; banned-address; member-moderation; header-match-ipv6.ietf.org-0; nonmember-moderation; administrivia; implicit-dest; max-recipients; max-size; news-moderation; no-subject; digests; suspicious-header
CC: 6MAN <6man@ietf.org>
X-Mailman-Version: 3.3.9rc6
Precedence: list
Subject: [IPv6]Re: Fwd: New Version Notification for draft-herbert-deprecate-eh-00.txt
List-Id: "IPv6 Maintenance Working Group (6man)" <ipv6.ietf.org>
Archived-At: <https://mailarchive.ietf.org/arch/msg/ipv6/uKTD_2Zitcd-gsjFl_BxeRvRYM0>
List-Archive: <https://mailarchive.ietf.org/arch/browse/ipv6>
List-Help: <mailto:ipv6-request@ietf.org?subject=help>
List-Owner: <mailto:ipv6-owner@ietf.org>
List-Post: <mailto:ipv6@ietf.org>
List-Subscribe: <mailto:ipv6-join@ietf.org>
List-Unsubscribe: <mailto:ipv6-leave@ietf.org>
On Mon, Dec 29, 2025 at 1:31 PM Bonica, Ron <ronald.bonica=40hpe.com@dmarc.ietf.org> wrote: > > Inline.......RB> > > > ________________________________ > From: Tom Herbert <tom=40herbertland.com@dmarc.ietf.org> > Sent: Monday, December 29, 2025 3:33 PM > To: Bonica, Ron <ronald.bonica@hpe.com> > Cc: 6MAN <6man@ietf.org> > Subject: Re: [IPv6]Fwd: New Version Notification for draft-herbert-deprecate-eh-00.txt > > On Mon, Dec 29, 2025 at 10:42 AM Bonica, Ron > <ronald.bonica=40hpe.com@dmarc.ietf.org> wrote: > > > > Tom, > > > > You can extend the definition of "limited domain" to include every network that deploys ACLs at its edge. But you cannot mandate or even recommend that all networks maintain the same set of ACLs at their edge. > > Hi Ron, > > Why not? SRV6 already requires SR packets to be filtered as a MUST. > That's because it's bad to leak SR packets into the Internet, and very > bad to accept them from untrusted sources. The same logic seems to > apply to other extension headers, at least HBH. > > RB> Because every network has unique security requirements. For example, assume that my network processes the IPv6 Minimum Path MTU Hop-by-Hop Option [RFC 9268] on the forwarding plane. Therefore, it poses no threat to my network. Moreover, it offers benefit to my customers. Why should I filter it? > HI Ron, Is it a benefit to your users or only a potential benefit? AFAIK there is no host implementation of RFC9268 that would consume the data, if that's true then Minimum Path MTU Hop-by-Hop Option is only beneficial on paper. > > > > > Each network has unique filtering requirements. A transit network may filter destination options in packets that are bound for its own infrastructure. But it has no business filtering destination options in packets that are bound for its customers. > > Except that transit networks commonly drop Destination Options that > are bound for their customers, so they've made it their business :-(. > > > RB> This is a bug, not a feature. A bug in the implementation or the protocol? I will argue that defining Hop-by-Hop and Destination options that allow an attacker to stuff 700 unknown options in a single MTU size packet which has no purpose other than DoS attack is a protocol bug :-) > > > > > This filtering, although well-meaning, is not helpful to the customer who may rely on the filtered destination option. > > But no customers rely on Destination Options. > > RB> Can you stand by that statement? If you look at the IANA registry, many Destination Options are defined. What makes you so sure that none of them are in use? Do you have any empirical evidence? Maybe a survey of network operators? Yes, we do have evidence. Destination Options are of interest to hosts and not network operators, so if any one is to be polled it is host developers and operating systems developers. Here's the scorecard: 1) Linux kernel only supports one Destination Option which is the mobility option. It's possible other OSes support others, but even if they do there's very little interoperability (just amongst themselves). 2) Previously on the 6man list, someone pointed out that Android OS summarily drops all packets with extension headers (i.e. if they're not needed, why waste battery processing them?). 3) In the discussion on UDP Options (which are essentially a reformation of Destination Options) the QUIC advocates argued that for a requirement that UDP options must not be used with QUIC as they would undermine the security position of QUIC that all end-to-end information is encrypted-- I suspect they would advocate the same requirement that Destination Options should not be used with QUIC for the same reasons. 4) The high drop rates of Destination Options on the Internet discourage serious applications developers from using them. Why should we, i.e. application developers, use a protocol feature that is very likely to be dropped and IETF has no plan to address the drops? > > The unreliability, lack > of security, and fact that there's no defined Destination options that > are useful ensure that. > > RB> Can you support the statement that there are no defined Destination Options that are useful? In order to do this, you would have to do a survey of RFCs that define Destination options and explain why each Destination Option is useless. Do you really want to take on this task. As I mentioned wrt PMTU HBH option there's "potentially useful" and then there's "useful". Considering that the most deployed OS running on billions of hosts only supports one legacy Destination Options, I think it's safe to say that there are no Destination options that are remotely close to being widely useful after 25+ years of IPv6. Personally, I am skeptical that there's even _any_ Destination options being productively used at all in real deployment, but obviously that is something I cannot prove. > > I am especially concerned with the lack of > security in Destination since that seems like an egregious security > hole that can always be avoided by just setting the data inside the > encryption envelope of a transport protocol. > > RB> I don't understand this statement. The Destination Option is encapsulated in the ESP. That's only true if ESP is in use. If there's no ESP then Destinations Options can be sent in plain text. Note that the draft makes an allowance for ESP and Destination Options after ESP. Tom > > > Tom > > > > > > > Ron > > > > > > > > ________________________________ > > From: Tom Herbert <tom=40herbertland.com@dmarc.ietf.org> > > Sent: Monday, December 29, 2025 10:14 AM > > To: Bonica, Ron <ronald.bonica@hpe.com> > > Cc: 6MAN <6man@ietf.org> > > Subject: Re: [IPv6]Fwd: New Version Notification for draft-herbert-deprecate-eh-00.txt > > > > On Mon, Dec 29, 2025 at 6:58 AM Bonica, Ron > > <ronald.bonica=40hpe.com@dmarc.ietf.org> wrote: > > > > > > Tom, > > > > > > Please disregard my previous comments regarding this draft. On second reading, the draft has a much more significant problem. > > > > > > In the introduction, you say: > > > > > > "This document proposes that extension headers be deprecated on the Internet by discarding packets with extension headers at the boundaries of limited domains [RFC8799]." > > > > > > In Section 2, where all of the normative language appears, you define ACLs that SHOULD or MUST be deployed at limited domain boundaries. > > > > > > It seems to me that this draft does not deprecate extension headers on the Internet at all. The ACLs defined in Section 2 won't do anything to restrict extension headers sent across three provider networks that do not participate in limited domains. > > > > > > In reality, this draft defines a one-size-fits-all limited domain. Do you really want to do that? > > > > Ron, > > > > A provider network is a limited domain, It is potentially dangerous > > for a provider network to accept packets with extension headers from > > an untrusted party, i.e. anyone on the Internet. By necessity provider > > networks need to establish ACLs at ingress points in their network to > > at least filter packets with extension headers especially Hop-by-Hop > > Options and Routing headers which can target the providers > > infrastructure. > > > > > > > > Two operators might need to deploy limited domains. However, one operator might want to filter one set of extension headers while another operator might want to filter a different set. > > > > > > At very least, you should change the title of the document and remove claims about deprecating extension headers on the Internet. > > > > But that;s the point. We want to eliminate the use of extension > > headers on the open Internet, The mechanism to enforce that is to drop > > packets with extension headers at boundary points. > > > > Tom > > > > > > > > Ron > > > > > > > > > > > > ________________________________ > > > From: Tom Herbert <tom=40herbertland.com@dmarc.ietf.org> > > > Sent: Friday, December 26, 2025 5:16 PM > > > To: 6MAN <6man@ietf.org> > > > Subject: [IPv6]Fwd: New Version Notification for draft-herbert-deprecate-eh-00.txt > > > > > > Happy Holidays 6man! > > > > > > I've posted a new draft on deprecating extension headers on the > > > Internet. Comment are appreciated! > > > > > > Thanks, > > > Tom > > > > > > ---------- Forwarded message --------- > > > From: <internet-drafts@ietf.org> > > > Date: Fri, Dec 26, 2025 at 2:14 PM > > > Subject: New Version Notification for draft-herbert-deprecate-eh-00.txt > > > To: Tom Herbert <tom@herbertland.com> > > > > > > > > > A new version of Internet-Draft draft-herbert-deprecate-eh-00.txt has been > > > successfully submitted by Tom Herbert and posted to the > > > IETF repository. > > > > > > Name: draft-herbert-deprecate-eh > > > Revision: 00 > > > Title: Deprecating IPv6 Extension Headers on the Internet > > > Date: 2025-12-26 > > > Group: Individual Submission > > > Pages: 10 > > > URL: https://urldefense.com/v3/__https://www.ietf.org/archive/id/draft-herbert-deprecate-eh-00.txt__;!!NpxR!iJ1sQxfMiPDQYMZn18vwro6QhGiB_k4p3EvJg7ODewoap9PfftZsk4cvvHTzhpIGg7mnU8PtaH0heh7EWXQLiuQQRp5zUmhp$ > > > Status: https://urldefense.com/v3/__https://datatracker.ietf.org/doc/draft-herbert-deprecate-eh/__;!!NpxR!iJ1sQxfMiPDQYMZn18vwro6QhGiB_k4p3EvJg7ODewoap9PfftZsk4cvvHTzhpIGg7mnU8PtaH0heh7EWXQLiuQQRgm9B6Th$ > > > HTMLized: https://urldefense.com/v3/__https://datatracker.ietf.org/doc/html/draft-herbert-deprecate-eh__;!!NpxR!iJ1sQxfMiPDQYMZn18vwro6QhGiB_k4p3EvJg7ODewoap9PfftZsk4cvvHTzhpIGg7mnU8PtaH0heh7EWXQLiuQQRpZo_F9M$ > > > > > > > > > Abstract: > > > > > > This document describes the deprecation of IPv6 extension headers on > > > the Internet with the exception of Encapsulating Security Payload. > > > Deprecation is motivated by three factors: 1) the data shows high > > > discard rates for packets with extension headers sent over the > > > Internet, 2) extension headers can be used for Denial of Service > > > attack and are replete with other security vulnerabilities, 3) the > > > high loss rates are a disincentive to develop new extension headers > > > or options that might be useful or fix known problems. This document > > > recommends that extension headers, other than Encapsulating Security > > > Payload, be relegated to use only in limited domains and that packets > > > with extension headers should be discarded at boundary routers of > > > limited domains. > > > > > > > > > > > > The IETF Secretariat > > > > > > -------------------------------------------------------------------- > > > IETF IPv6 working group mailing list > > > ipv6@ietf.org > > > List Info: https://urldefense.com/v3/__https://mailman3.ietf.org/mailman3/lists/ipv6@ietf.org/__;!!NpxR!iJ1sQxfMiPDQYMZn18vwro6QhGiB_k4p3EvJg7ODewoap9PfftZsk4cvvHTzhpIGg7mnU8PtaH0heh7EWXQLiuQQRnxNN22L$ > > > --------------------------------------------------------------------
- [IPv6]Fwd: New Version Notification for draft-her… Tom Herbert
- [IPv6]Re: Fwd: New Version Notification for draft… Justin Iurman
- [IPv6]Re: Fwd: New Version Notification for draft… Tom Herbert
- [IPv6]Re: Fwd: New Version Notification for draft… Ole Trøan
- [IPv6]Re: Fwd: New Version Notification for draft… Tom Herbert
- [IPv6]Re: Fwd: New Version Notification for draft… Justin Iurman
- [IPv6]Re: Fwd: New Version Notification for draft… Tom Herbert
- [IPv6]Re: Fwd: New Version Notification for draft… Tom Herbert
- [IPv6]Re: Fwd: New Version Notification for draft… Timothy Winters
- [IPv6]Re: Fwd: New Version Notification for draft… Bonica, Ron
- [IPv6]Re: Fwd: New Version Notification for draft… Brian E Carpenter
- [IPv6]Re: Fwd: New Version Notification for draft… Ole Trøan
- [IPv6]Re: Fwd: New Version Notification for draft… Eliot Lear
- [IPv6]Re: Fwd: New Version Notification for draft… Bonica, Ron
- [IPv6]Re: Fwd: New Version Notification for draft… Mike Simpson
- [IPv6]Re: Fwd: New Version Notification for draft… Justin Iurman
- [IPv6]Re: Fwd: New Version Notification for draft… Brian E Carpenter
- [IPv6]Re: Fwd: New Version Notification for draft… Tom Herbert
- [IPv6]Re: Fwd: New Version Notification for draft… Adrian Farrel
- [IPv6]Re: Fwd: New Version Notification for draft… Eliot Lear
- [IPv6]Re: Fwd: New Version Notification for draft… Tom Herbert
- [IPv6]Re: Fwd: New Version Notification for draft… Bonica, Ron
- [IPv6]Re: Fwd: New Version Notification for draft… Bonica, Ron
- [IPv6]Re: Fwd: New Version Notification for draft… Tom Herbert
- [IPv6]Re: Fwd: New Version Notification for draft… Bonica, Ron
- [IPv6]Re: Fwd: New Version Notification for draft… Bonica, Ron
- [IPv6]Re: Fwd: New Version Notification for draft… Brian E Carpenter
- [IPv6]Re: Fwd: New Version Notification for draft… David Farmer
- [IPv6]Re: Fwd: New Version Notification for draft… Tom Herbert
- [IPv6]Re: Fwd: New Version Notification for draft… Sebastian Moeller
- [IPv6]Re: Fwd: New Version Notification for draft… Brian E Carpenter
- [IPv6]Re: Fwd: New Version Notification for draft… Ole Trøan
- [IPv6]Re: Fwd: New Version Notification for draft… Mark Smith
- [IPv6]Re: Fwd: New Version Notification for draft… Nick Hilliard
- [IPv6]Re: Fwd: New Version Notification for draft… Brian E Carpenter
- [IPv6]Re: Fwd: New Version Notification for draft… Tom Herbert
- [IPv6]Re: Fwd: New Version Notification for draft… Tom Herbert
- [IPv6]Re: Fwd: New Version Notification for draft… Brian E Carpenter
- [IPv6]Re: Fwd: New Version Notification for draft… Tom Herbert
- [IPv6]Re: Fwd: New Version Notification for draft… Tom Herbert
- [IPv6]Re: Fwd: New Version Notification for draft… Tom Herbert
- [IPv6]Re: Fwd: New Version Notification for draft… Tom Herbert
- [IPv6]Re: Fwd: New Version Notification for draft… Tom Herbert
- [IPv6]Re: Fwd: New Version Notification for draft… Christian Huitema
- [IPv6]Re: Fwd: New Version Notification for draft… Eliot Lear
- [IPv6]Re: Fwd: New Version Notification for draft… Tom Herbert
- [IPv6]Re: Fwd: New Version Notification for draft… Fernando Gont
- [IPv6]Re: Fwd: New Version Notification for draft… Mark Smith
- [IPv6]Re: Fwd: New Version Notification for draft… Brian E Carpenter