Re: [OPSEC] Last Call: <draft-ietf-opsec-ipv6-eh-filtering-06.txt> (Recommendations on the Filtering of IPv6 Packets Containing IPv6 Extension Headers) to Informational RFC

"C. M. Heard" <heard@pobox.com> Sat, 24 November 2018 16:14 UTC

Return-Path: <heard@pobox.com>
X-Original-To: opsec@ietfa.amsl.com
Delivered-To: opsec@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id DC5BA130E2D; Sat, 24 Nov 2018 08:14:55 -0800 (PST)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -2
X-Spam-Level:
X-Spam-Status: No, score=-2 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, DKIM_SIGNED=0.1, DKIM_VALID=-0.1, DKIM_VALID_AU=-0.1, RCVD_IN_DNSWL_NONE=-0.0001, SPF_PASS=-0.001, URIBL_BLOCKED=0.001] autolearn=ham autolearn_force=no
Authentication-Results: ietfa.amsl.com (amavisd-new); dkim=pass (1024-bit key) header.d=pobox.com; domainkeys=pass (1024-bit key) header.from=heard@pobox.com header.d=pobox.com
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id WPsPxZDIj61f; Sat, 24 Nov 2018 08:14:54 -0800 (PST)
Received: from pb-smtp21.pobox.com (pb-smtp21.pobox.com [173.228.157.53]) (using TLSv1.2 with cipher AECDH-AES256-SHA (256/256 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id 11CEA130E09; Sat, 24 Nov 2018 08:14:53 -0800 (PST)
Received: from pb-smtp21.pobox.com (unknown [127.0.0.1]) by pb-smtp21.pobox.com (Postfix) with ESMTP id 829FB27602; Sat, 24 Nov 2018 11:14:52 -0500 (EST) (envelope-from heard@pobox.com)
DKIM-Signature: v=1; a=rsa-sha1; c=relaxed; d=pobox.com; h=mime-version :references:in-reply-to:from:date:message-id:subject:to:cc :content-type; s=sasl; bh=HjkvufqCkF2PvNOEx4Lot46kdxw=; b=My580z qFllu5BrwZAVFH90+2brSDkTDBG0A3M66JfPxOH3/35OmtEs97h5YJUu1Ajl9rsh Wz3I0eqDYONEZKnWajCbJrTOVgkMqaF22skJPHyz3n33PWz1hhAcKLwKflrjC7Cy D3EbmwEbrAL9Yt1qDM98SVW7tObOz+VjnED+A=
DomainKey-Signature: a=rsa-sha1; c=nofws; d=pobox.com; h=mime-version :references:in-reply-to:from:date:message-id:subject:to:cc :content-type; q=dns; s=sasl; b=pWKCh/Zy01f8owrK7Mc0wLOWxznZBIC/ D5Q7FKlT5N9dwWqKROmtqXHVVu+xOsJyNUIM9wq8uQ9SjclmzfoXE8rWhMlwMFQ9 jQcfEhNPvuIsPkK1jFhjMl7Uwq1qD80dnaOm2SRBFWxKHx7G38O1JZVz8pNFGGzm Yf4/KNWUCdw=
Received: from pb-smtp21.sea.icgroup.com (unknown [127.0.0.1]) by pb-smtp21.pobox.com (Postfix) with ESMTP id 7BA6F27601; Sat, 24 Nov 2018 11:14:52 -0500 (EST) (envelope-from heard@pobox.com)
Received: from mail-it1-f179.google.com (unknown [209.85.166.179]) (using TLSv1.2 with cipher ECDHE-RSA-AES128-GCM-SHA256 (128/128 bits)) (No client certificate requested) by pb-smtp21.pobox.com (Postfix) with ESMTPSA id 07989275FD; Sat, 24 Nov 2018 11:14:50 -0500 (EST) (envelope-from heard@pobox.com)
Received: by mail-it1-f179.google.com with SMTP id h65so21609822ith.3; Sat, 24 Nov 2018 08:14:50 -0800 (PST)
X-Gm-Message-State: AA+aEWate7Moch++kBbvqDNVXnRnPoz3p2tDa6ZDrvgrnB6iN2pzgZNB yKoot0cWl+rA1RRhBoYwkA6d8rLAU8KUwdGYuJ0=
X-Google-Smtp-Source: AJdET5eCun11zKfs1BelhKBPBGqwAJpGPOR+U1UCbN2q64/t9jO+Zq7US2lGbCC8KeUh60lYZfHpADAAWWv37/9Djd8=
X-Received: by 2002:a02:b529:: with SMTP id l38mr16300721jaj.25.1543076088744; Sat, 24 Nov 2018 08:14:48 -0800 (PST)
MIME-Version: 1.0
References: <CACL_3VExxwN6z-WHbp3dcdLNV1JMVf=sgMVzh-k0shNJFeADbQ@mail.gmail.com> <BLUPR0501MB2051A8FFB1DAFDCA9873B9E6AE700@BLUPR0501MB2051.namprd05.prod.outlook.com> <CACL_3VFSHqU-D+NJu=k2-p4tbjZukT7i7WEoX+5kdUtdHB4Rjw@mail.gmail.com> <CACL_3VGk0CsHObEgSwLdCp8agOWrjccB94-aynEz3Bv0w+EU+w@mail.gmail.com> <475fe28a-aafe-d3b0-e665-fe97dd1439b8@foobar.org>
In-Reply-To: <475fe28a-aafe-d3b0-e665-fe97dd1439b8@foobar.org>
From: "C. M. Heard" <heard@pobox.com>
Date: Sat, 24 Nov 2018 08:14:35 -0800
X-Gmail-Original-Message-ID: <CACL_3VGHWW8fCDo8Q9br2fwXn5zBi+kN_5a1sOTX7m7QaU8iyg@mail.gmail.com>
Message-ID: <CACL_3VGHWW8fCDo8Q9br2fwXn5zBi+kN_5a1sOTX7m7QaU8iyg@mail.gmail.com>
To: Nick Hilliard <nick@foobar.org>
Cc: IETF <ietf@ietf.org>, OPSEC <opsec@ietf.org>
Content-Type: text/plain; charset="UTF-8"
X-Pobox-Relay-ID: 1196E05C-F004-11E8-9473-CC883AD79A78-06080547!pb-smtp21.pobox.com
Archived-At: <https://mailarchive.ietf.org/arch/msg/opsec/Eq12WpdXJHYcIRE2s1mIZ4_Mzqo>
Subject: Re: [OPSEC] Last Call: <draft-ietf-opsec-ipv6-eh-filtering-06.txt> (Recommendations on the Filtering of IPv6 Packets Containing IPv6 Extension Headers) to Informational RFC
X-BeenThere: opsec@ietf.org
X-Mailman-Version: 2.1.29
Precedence: list
List-Id: opsec wg mailing list <opsec.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/opsec>, <mailto:opsec-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/opsec/>
List-Post: <mailto:opsec@ietf.org>
List-Help: <mailto:opsec-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/opsec>, <mailto:opsec-request@ietf.org?subject=subscribe>
X-List-Received-Date: Sat, 24 Nov 2018 16:14:56 -0000

On Sat, Nov 24, 2018 at 7:37 AM Nick Hilliard <nick@foobar.org> wrote:
> C. M. Heard wrote on 23/11/2018 16:20:
> > while promoting a **/_default deny_/** policy with respect to unknown
> > extension headers, experimental extension headers, and experimental
> > options. If every transit router followed that advice, it would be
> > impossible to transmit packets containing these things across the open
> > Internet. It is especially egregious to dispense that advice for
> > unknown extension headers, since that would severely impede deployment
> > of any new extension headers OR any new transport protocols in the open
> > Internet (as the document itself notes, unknown extension headers are
> > indistinguishable from unknown upper-layer protocol headers). This part
> > of the document's advice does nothing to improve the situation reported
> > in RFC 7872; if anything, it makes the situation worse. It certainly
> > will not make the Internet work better.
>
> transit operators would generally take the view that any data-plane
> packet which needs to be put through a slow path will be rate limited up
> to 100% loss.  We can argue endlessly at the IETF about the pros and
> cons of this from a protocol development and management point of view
> but at the end of the day, transit operators have networks to run, and
> there is a jarring disparity between data-plane forwarding speed and
> control-plane processing capacity.  If you expect one to bleed into the
> other, something needs to give.  This is often going to be
> silicon-specific; what is slow-pathed on one platform may not be
> slow-pathed on another, so generalised statements are difficult in this
> situation.

It's not clear to me what that has to do with the specific comments
that I made (and that you elided).  I would understand if I had brought
up handling of, say, HbH options rather than default drop policies for
unknown (and experimental) header types.  Perhaps you could clarify.

> Transit operators are going to make their own decisions about what to do
> about packet filtering, and take any specific recommendation in an ID
> like this with a grain of salt.  In that respect, this document needs to
> be seen as a store of information to help people make informed decisions
> about what to do rather than being a prescriptive list.

Agreed, that's the most useful part of the document. But it does in
addition give specific advice, and that advice should be reasonable
as a default.

My primary objection is to the advice that says discard unknown
EHs and upper-layer protocols by default.  That advice needs to
be more nuanced -- as is the advice for unknown option types
given in Sec. 4.4.5,   I see no reason why these cases should
get different advice.

Mike Heard