Re: A long HBH Options question

"C. M. Heard" <heard@pobox.com> Wed, 22 August 2018 00:40 UTC

Return-Path: <heard@pobox.com>
X-Original-To: ipv6@ietfa.amsl.com
Delivered-To: ipv6@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 662D2130DE5 for <ipv6@ietfa.amsl.com>; Tue, 21 Aug 2018 17:40:02 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -2.701
X-Spam-Level:
X-Spam-Status: No, score=-2.701 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, DKIM_SIGNED=0.1, DKIM_VALID=-0.1, DKIM_VALID_AU=-0.1, RCVD_IN_DNSWL_LOW=-0.7, SPF_PASS=-0.001] autolearn=ham autolearn_force=no
Authentication-Results: ietfa.amsl.com (amavisd-new); dkim=pass (1024-bit key) header.d=pobox.com; domainkeys=pass (1024-bit key) header.from=heard@pobox.com header.d=pobox.com
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id wmbf1b35krBs for <ipv6@ietfa.amsl.com>; Tue, 21 Aug 2018 17:40:00 -0700 (PDT)
Received: from pb-smtp2.pobox.com (pb-smtp2.pobox.com [64.147.108.71]) (using TLSv1.2 with cipher AECDH-AES256-SHA (256/256 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id 929E1130DFA for <ipv6@ietf.org>; Tue, 21 Aug 2018 17:39:59 -0700 (PDT)
Received: from pb-smtp2.pobox.com (unknown [127.0.0.1]) by pb-smtp2.pobox.com (Postfix) with ESMTP id 2CBDC11A04C for <ipv6@ietf.org>; Tue, 21 Aug 2018 20:39:58 -0400 (EDT)
DKIM-Signature: v=1; a=rsa-sha1; c=relaxed; d=pobox.com; h=mime-version :from:date:message-id:subject:to:cc:content-type :content-transfer-encoding; s=sasl; bh=WL5/ERI8Pe2NeTN9gDqyx2DBl TI=; b=PAKRCZwvVXoP+UBido/DpiIVC6QYeZKWOZPndl+NavwKIAUZkdZL5FWsl QN57gyHLgezQeJ0/ysI3UhTKbvu41qSgw/lgjnOXDva029uUlx0GDDM1Hw8PLkqn brBp+RCr/a5ZB7kcRkVE0RI+HpZ8bOHvK5u9FeruRm49AwV8OY=
DomainKey-Signature: a=rsa-sha1; c=nofws; d=pobox.com; h=mime-version :from:date:message-id:subject:to:cc:content-type :content-transfer-encoding; q=dns; s=sasl; b=UGePyffGNsg/RC3E7/i 0CfmyO7oiyyInZ3dlYo2Jdjrqoidh7XR56k16o0Q8/dJzTW5hRN2S3Cs6yyO/d6x UtQRuYRSMZZpTUDfWKr+oOHo6ESGKc3fdv05MhrXVoSDLt+PpSGdpUetopmS/LMV vs/oHaWpgfwJ9BwYK11HgGyI=
Received: from pb-smtp2.nyi.icgroup.com (unknown [127.0.0.1]) by pb-smtp2.pobox.com (Postfix) with ESMTP id 2655B11A04B for <ipv6@ietf.org>; Tue, 21 Aug 2018 20:39:58 -0400 (EDT)
Received: from mail-oi0-f50.google.com (unknown [209.85.218.50]) (using TLSv1.2 with cipher ECDHE-RSA-AES128-GCM-SHA256 (128/128 bits)) (No client certificate requested) by pb-smtp2.pobox.com (Postfix) with ESMTPSA id AF9B111A04A for <ipv6@ietf.org>; Tue, 21 Aug 2018 20:39:57 -0400 (EDT)
Received: by mail-oi0-f50.google.com with SMTP id 13-v6so421744ois.1 for <ipv6@ietf.org>; Tue, 21 Aug 2018 17:39:57 -0700 (PDT)
X-Gm-Message-State: APzg51ALQsD4svC6cdF0oAEvH+Vz4VJw4K5rNluTdnxhZ7g8gqQjUCtD C/NhSitc4nBWnzYuA7HkA+YwSMqZKr7SCQkE8QU=
X-Google-Smtp-Source: ANB0VdY/1S5SCvYsZqwdVAZZV8qVGlpD9l0RcqKE5yofXmLMyrIv/ADFW6NQzd1ps2VQXA4HSNKZ/PMl8EiWYyYFXIA=
X-Received: by 2002:aca:b154:: with SMTP id a81-v6mr1837101oif.34.1534898397130; Tue, 21 Aug 2018 17:39:57 -0700 (PDT)
MIME-Version: 1.0
From: "C. M. Heard" <heard@pobox.com>
Date: Tue, 21 Aug 2018 17:39:45 -0700
X-Gmail-Original-Message-ID: <CACL_3VFn9x2o1OW5wk0nt3n71K0XpQ2Kv1X+2CJnpPA6QdMVgA@mail.gmail.com>
Message-ID: <CACL_3VFn9x2o1OW5wk0nt3n71K0XpQ2Kv1X+2CJnpPA6QdMVgA@mail.gmail.com>
Subject: Re: A long HBH Options question
To: Ronald Bonica <rbonica@juniper.net>
Cc: 6man <ipv6@ietf.org>
Content-Type: text/plain; charset="UTF-8"
Content-Transfer-Encoding: quoted-printable
X-Pobox-Relay-ID: E522B71C-A5A3-11E8-B596-BFB3E64BB12D-06080547!pb-smtp2.pobox.com
Archived-At: <https://mailarchive.ietf.org/arch/msg/ipv6/xhmk_z-0OC-CHBCRoMvUfMBPRmc>
X-BeenThere: ipv6@ietf.org
X-Mailman-Version: 2.1.27
Precedence: list
List-Id: "IPv6 Maintenance Working Group \(6man\)" <ipv6.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/ipv6>, <mailto:ipv6-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/ipv6/>
List-Post: <mailto:ipv6@ietf.org>
List-Help: <mailto:ipv6-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/ipv6>, <mailto:ipv6-request@ietf.org?subject=subscribe>
X-List-Received-Date: Wed, 22 Aug 2018 00:40:03 -0000

On Tue, 21 Aug 2018 19:16:55 +0000, Ron Bonica wrote:
> [ … ] let's assume that:
>
> - A packet contains an HBH option and the high-order bits of the HBH
>   Option type are "10" [could also be "01" or "11']
>
> - The packet traverses Router A and Router B on route to its
>   destination
>
> - Router A is not configured to process HBH options
>
> - Router B is configured to process HBH options
>
> - Neither Router A nor Router B recognize the HBH option contained by
>   the above-mentioned packet.
>
> I think that RFC 8200 requires the following behavior:
>
> - Router A forwards the packet to Router B, without examining the HBH
>   Options header
>
> - Router B discards the packet, because it doesn't recognize the
>   option.
>
> Is this the required behavior?

Yes.

> If so, does this behavior cause cognitive dissonance for anybody else?

It sure does.

> I am thinking that the "act" bits are meaningless in the HBH extension
> header. This discussion may also be applicable to
> draft-herbert-ipv6-update-dest-ops.

The "act" bits are not exactly meaningless, but only the encoding "00"
will elicit consistent behavior from nodes that  comply with RFC 8200
and don't recognize the option. To me, it would seem quite odd if the
designer of any new HbH option were to choose an encoding with
"act" bits other than "00". For already allocated options, any encoding
other than "00" will not have the results expected by those who
designed the options assuming that the rules in RFC 2460 would be
followed. Thus, that the maintainers of existing HbH options with the
"act" bits other than "00" should probably re-examine the option
encoding in light of the change wrought by RFC 8200. Here is the list:

0x63  RPL (RFC 6553, PS)
0x6D  MPL (RFC 7731, PS)
0xC2  Jumbo Payload (RFC 2675, PS)
0xEE  IP_DFF (RFC 6971, Experimental)

The ROLL WG has in fact taken this step with the RPL option, though for
reasons independent of the change made in RFC 8200. The thinking
behind the original design in RFC 6553 was that it was undesirable for
the RPL option to escape from the RPL domain in which it was originated,
so "act" was set to "01" to force nodes external to the domain to
silently discard escaped packets. That thinking has been revised, and
there is a document in last call that will deprecate the existing
code point and get a new one (probably 0x23) with "act" set to "00".

A re-examination of already allocated destination options would be
called for if the change proposed in draft-herbert-ipv6-update-dest-ops
were to be implemented. Here is that list:

0xC9  Home Address (RFC 6275, PS)
0x8A  Endpoint Identification (DEPRECATED)
0x8B  ILNP Nonce (RFC 6744, Experimental)
0x8C  Line-Identification (RFC 6788, PS)

The Home Address option would actually not be affected by the
proposed change in draft-herbert-ipv6-update-dest-ops since it
isn't allowed to appear appear before a Routing Header. I have
not examined the others, however.

Mike Heard