Re: A long HBH Options question
"C. M. Heard" <heard@pobox.com> Wed, 22 August 2018 00:40 UTC
Return-Path: <heard@pobox.com>
X-Original-To: ipv6@ietfa.amsl.com
Delivered-To: ipv6@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 662D2130DE5 for <ipv6@ietfa.amsl.com>; Tue, 21 Aug 2018 17:40:02 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -2.701
X-Spam-Level:
X-Spam-Status: No, score=-2.701 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, DKIM_SIGNED=0.1, DKIM_VALID=-0.1, DKIM_VALID_AU=-0.1, RCVD_IN_DNSWL_LOW=-0.7, SPF_PASS=-0.001] autolearn=ham autolearn_force=no
Authentication-Results: ietfa.amsl.com (amavisd-new); dkim=pass (1024-bit key) header.d=pobox.com; domainkeys=pass (1024-bit key) header.from=heard@pobox.com header.d=pobox.com
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id wmbf1b35krBs for <ipv6@ietfa.amsl.com>; Tue, 21 Aug 2018 17:40:00 -0700 (PDT)
Received: from pb-smtp2.pobox.com (pb-smtp2.pobox.com [64.147.108.71]) (using TLSv1.2 with cipher AECDH-AES256-SHA (256/256 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id 929E1130DFA for <ipv6@ietf.org>; Tue, 21 Aug 2018 17:39:59 -0700 (PDT)
Received: from pb-smtp2.pobox.com (unknown [127.0.0.1]) by pb-smtp2.pobox.com (Postfix) with ESMTP id 2CBDC11A04C for <ipv6@ietf.org>; Tue, 21 Aug 2018 20:39:58 -0400 (EDT)
DKIM-Signature: v=1; a=rsa-sha1; c=relaxed; d=pobox.com; h=mime-version :from:date:message-id:subject:to:cc:content-type :content-transfer-encoding; s=sasl; bh=WL5/ERI8Pe2NeTN9gDqyx2DBl TI=; b=PAKRCZwvVXoP+UBido/DpiIVC6QYeZKWOZPndl+NavwKIAUZkdZL5FWsl QN57gyHLgezQeJ0/ysI3UhTKbvu41qSgw/lgjnOXDva029uUlx0GDDM1Hw8PLkqn brBp+RCr/a5ZB7kcRkVE0RI+HpZ8bOHvK5u9FeruRm49AwV8OY=
DomainKey-Signature: a=rsa-sha1; c=nofws; d=pobox.com; h=mime-version :from:date:message-id:subject:to:cc:content-type :content-transfer-encoding; q=dns; s=sasl; b=UGePyffGNsg/RC3E7/i 0CfmyO7oiyyInZ3dlYo2Jdjrqoidh7XR56k16o0Q8/dJzTW5hRN2S3Cs6yyO/d6x UtQRuYRSMZZpTUDfWKr+oOHo6ESGKc3fdv05MhrXVoSDLt+PpSGdpUetopmS/LMV vs/oHaWpgfwJ9BwYK11HgGyI=
Received: from pb-smtp2.nyi.icgroup.com (unknown [127.0.0.1]) by pb-smtp2.pobox.com (Postfix) with ESMTP id 2655B11A04B for <ipv6@ietf.org>; Tue, 21 Aug 2018 20:39:58 -0400 (EDT)
Received: from mail-oi0-f50.google.com (unknown [209.85.218.50]) (using TLSv1.2 with cipher ECDHE-RSA-AES128-GCM-SHA256 (128/128 bits)) (No client certificate requested) by pb-smtp2.pobox.com (Postfix) with ESMTPSA id AF9B111A04A for <ipv6@ietf.org>; Tue, 21 Aug 2018 20:39:57 -0400 (EDT)
Received: by mail-oi0-f50.google.com with SMTP id 13-v6so421744ois.1 for <ipv6@ietf.org>; Tue, 21 Aug 2018 17:39:57 -0700 (PDT)
X-Gm-Message-State: APzg51ALQsD4svC6cdF0oAEvH+Vz4VJw4K5rNluTdnxhZ7g8gqQjUCtD C/NhSitc4nBWnzYuA7HkA+YwSMqZKr7SCQkE8QU=
X-Google-Smtp-Source: ANB0VdY/1S5SCvYsZqwdVAZZV8qVGlpD9l0RcqKE5yofXmLMyrIv/ADFW6NQzd1ps2VQXA4HSNKZ/PMl8EiWYyYFXIA=
X-Received: by 2002:aca:b154:: with SMTP id a81-v6mr1837101oif.34.1534898397130; Tue, 21 Aug 2018 17:39:57 -0700 (PDT)
MIME-Version: 1.0
From: "C. M. Heard" <heard@pobox.com>
Date: Tue, 21 Aug 2018 17:39:45 -0700
X-Gmail-Original-Message-ID: <CACL_3VFn9x2o1OW5wk0nt3n71K0XpQ2Kv1X+2CJnpPA6QdMVgA@mail.gmail.com>
Message-ID: <CACL_3VFn9x2o1OW5wk0nt3n71K0XpQ2Kv1X+2CJnpPA6QdMVgA@mail.gmail.com>
Subject: Re: A long HBH Options question
To: Ronald Bonica <rbonica@juniper.net>
Cc: 6man <ipv6@ietf.org>
Content-Type: text/plain; charset="UTF-8"
Content-Transfer-Encoding: quoted-printable
X-Pobox-Relay-ID: E522B71C-A5A3-11E8-B596-BFB3E64BB12D-06080547!pb-smtp2.pobox.com
Archived-At: <https://mailarchive.ietf.org/arch/msg/ipv6/xhmk_z-0OC-CHBCRoMvUfMBPRmc>
X-BeenThere: ipv6@ietf.org
X-Mailman-Version: 2.1.27
Precedence: list
List-Id: "IPv6 Maintenance Working Group \(6man\)" <ipv6.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/ipv6>, <mailto:ipv6-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/ipv6/>
List-Post: <mailto:ipv6@ietf.org>
List-Help: <mailto:ipv6-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/ipv6>, <mailto:ipv6-request@ietf.org?subject=subscribe>
X-List-Received-Date: Wed, 22 Aug 2018 00:40:03 -0000
On Tue, 21 Aug 2018 19:16:55 +0000, Ron Bonica wrote: > [ … ] let's assume that: > > - A packet contains an HBH option and the high-order bits of the HBH > Option type are "10" [could also be "01" or "11'] > > - The packet traverses Router A and Router B on route to its > destination > > - Router A is not configured to process HBH options > > - Router B is configured to process HBH options > > - Neither Router A nor Router B recognize the HBH option contained by > the above-mentioned packet. > > I think that RFC 8200 requires the following behavior: > > - Router A forwards the packet to Router B, without examining the HBH > Options header > > - Router B discards the packet, because it doesn't recognize the > option. > > Is this the required behavior? Yes. > If so, does this behavior cause cognitive dissonance for anybody else? It sure does. > I am thinking that the "act" bits are meaningless in the HBH extension > header. This discussion may also be applicable to > draft-herbert-ipv6-update-dest-ops. The "act" bits are not exactly meaningless, but only the encoding "00" will elicit consistent behavior from nodes that comply with RFC 8200 and don't recognize the option. To me, it would seem quite odd if the designer of any new HbH option were to choose an encoding with "act" bits other than "00". For already allocated options, any encoding other than "00" will not have the results expected by those who designed the options assuming that the rules in RFC 2460 would be followed. Thus, that the maintainers of existing HbH options with the "act" bits other than "00" should probably re-examine the option encoding in light of the change wrought by RFC 8200. Here is the list: 0x63 RPL (RFC 6553, PS) 0x6D MPL (RFC 7731, PS) 0xC2 Jumbo Payload (RFC 2675, PS) 0xEE IP_DFF (RFC 6971, Experimental) The ROLL WG has in fact taken this step with the RPL option, though for reasons independent of the change made in RFC 8200. The thinking behind the original design in RFC 6553 was that it was undesirable for the RPL option to escape from the RPL domain in which it was originated, so "act" was set to "01" to force nodes external to the domain to silently discard escaped packets. That thinking has been revised, and there is a document in last call that will deprecate the existing code point and get a new one (probably 0x23) with "act" set to "00". A re-examination of already allocated destination options would be called for if the change proposed in draft-herbert-ipv6-update-dest-ops were to be implemented. Here is that list: 0xC9 Home Address (RFC 6275, PS) 0x8A Endpoint Identification (DEPRECATED) 0x8B ILNP Nonce (RFC 6744, Experimental) 0x8C Line-Identification (RFC 6788, PS) The Home Address option would actually not be affected by the proposed change in draft-herbert-ipv6-update-dest-ops since it isn't allowed to appear appear before a Routing Header. I have not examined the others, however. Mike Heard
- A long HBH Options question Ron Bonica
- Re: A long HBH Options question Ole Troan
- Re: A long HBH Options question Bob Hinden
- Re: A long HBH Options question Brian E Carpenter
- Re: A long HBH Options question Tom Herbert
- Re: A long HBH Options question Brian E Carpenter
- Re: A long HBH Options question C. M. Heard
- Re: A long HBH Options question Jen Linkova
- Re: A long HBH Options question Ole Troan
- Re: A long HBH Options question C. M. Heard
- Re: A long HBH Options question Nick Hilliard
- Re: A long HBH Options question Tom Herbert
- RE: A long HBH Options question Ron Bonica
- Re: A long HBH Options question Tom Herbert
- RE: A long HBH Options question Ron Bonica