Re: [OPSEC] OT: TCP session lifetime - Re: [Tsv-art] game over, EH [Tsvart last call review of draft-ietf-opsec-ipv6-eh-filtering-06]

Gert Doering <gert@space.net> Sat, 08 December 2018 09:25 UTC

Return-Path: <gert@space.net>
X-Original-To: opsec@ietfa.amsl.com
Delivered-To: opsec@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id B49391294D7 for <opsec@ietfa.amsl.com>; Sat, 8 Dec 2018 01:25:59 -0800 (PST)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -2.6
X-Spam-Level:
X-Spam-Status: No, score=-2.6 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, RCVD_IN_DNSWL_LOW=-0.7] autolearn=unavailable autolearn_force=no
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id tMFd1Wwo8hdn for <opsec@ietfa.amsl.com>; Sat, 8 Dec 2018 01:25:58 -0800 (PST)
Received: from mobil.space.net (mobil.space.net [195.30.115.67]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id 6B65313111A for <opsec@ietf.org>; Sat, 8 Dec 2018 01:25:55 -0800 (PST)
X-Original-To: opsec@ietf.org
Received: from mobil.space.net (localhost [IPv6:::1]) by mobil.space.net (Postfix) with ESMTP id 98E1B41C40 for <opsec@ietf.org>; Sat, 8 Dec 2018 10:25:53 +0100 (CET)
X-SpaceNet-Relay: true
X-SpaceNet-Relay: true
X-SpaceNet-Relay: true
X-SpaceNet-Relay: true
X-SpaceNet-Relay: true
X-SpaceNet-Relay: true
X-SpaceNet-Relay: true
X-SpaceNet-Relay: true
X-SpaceNet-Relay: true
Received: from moebius4.space.net (moebius4.space.net [IPv6:2001:608:2:2::251]) by mobil.space.net (Postfix) with ESMTP id 7EC1E41B3A; Sat, 8 Dec 2018 10:25:53 +0100 (CET)
Received: by moebius4.space.net (Postfix, from userid 1007) id 6D9571F7A8; Sat, 8 Dec 2018 10:25:53 +0100 (CET)
Date: Sat, 8 Dec 2018 10:25:53 +0100
From: Gert Doering <gert@space.net>
To: Nico Williams <nico@cryptonector.com>
Cc: Jared Mauch <jared@puck.nether.net>, Christopher Morrow <morrowc.lists@gmail.com>, ietf <ietf@ietf.org>, draft-ietf-opsec-ipv6-eh-filtering.all@ietf.org, heard@pobox.com, opsec wg mailing list <opsec@ietf.org>, tsv-art@ietf.org, Gert Doering <gert@space.net>
Message-ID: <20181208092553.GZ1543@Space.Net>
References: <20181206125726.GG1543@Space.Net> <d078ea0f-3c2c-f782-4c1a-b54c463b48ce@gmail.com> <CAKKJt-eNCeV4hS=v99NGAYFkkmLdSO5Cp9gk2ojdbZ5vrU7img@mail.gmail.com> <90130407-2B6E-491A-AB9B-BEBB45604D50@puck.nether.net> <CABcZeBNB3scdEm0aF99KeD3F=JvqCU1yaxL1cepFhnE+dg=0Wg@mail.gmail.com> <CAL9jLaYiMbMfyLK8b97TEqNcJVaQzfyC=HZvo4F01b3KZaYdVg@mail.gmail.com> <B60C8071-9577-4935-A260-FAE0EF80AFCF@puck.nether.net> <20181207224445.GZ15561@localhost> <F6F9C969-021E-46A5-9E97-F5DBF703F7C3@puck.nether.net> <20181207230302.GA15561@localhost>
MIME-Version: 1.0
Content-Type: multipart/signed; micalg=pgp-sha256; protocol="application/pgp-signature"; boundary="COt1KesysQ0dNK/h"
Content-Disposition: inline
In-Reply-To: <20181207230302.GA15561@localhost>
X-NCC-RegID: de.space
User-Agent: Mutt/1.10.1 (2018-07-13)
Archived-At: <https://mailarchive.ietf.org/arch/msg/opsec/_2c3AqW7q6_T_phujabMjGWsfV0>
Subject: Re: [OPSEC] OT: TCP session lifetime - Re: [Tsv-art] game over, EH [Tsvart last call review of draft-ietf-opsec-ipv6-eh-filtering-06]
X-BeenThere: opsec@ietf.org
X-Mailman-Version: 2.1.29
Precedence: list
List-Id: opsec wg mailing list <opsec.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/opsec>, <mailto:opsec-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/opsec/>
List-Post: <mailto:opsec@ietf.org>
List-Help: <mailto:opsec-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/opsec>, <mailto:opsec-request@ietf.org?subject=subscribe>
X-List-Received-Date: Sat, 08 Dec 2018 09:26:00 -0000

Hi,

On Fri, Dec 07, 2018 at 05:03:03PM -0600, Nico Williams wrote:
> What I meant is that I don't understand why resetting a connection
> should still cause routes to flap.  Instead I'd expect session
> management negotiation to determine whether the thing that failed (e.g.,
> a BGP daemon) implies that the routes are gone or not.  Then RST
> injection would not be a problem.  You'd still need integrity
> protection, but then that could always have been done with TLS.

We do have BGP graceful restart.  Which just causes a bit of CPU load
on both ends while they walk multiple millions of VPNv4 routes to
reestablish common state.

Gert Doering
        -- NetMaster
-- 
have you enabled IPv6 on something today...?

SpaceNet AG                      Vorstand: Sebastian v. Bomhard, Michael Emmer
Joseph-Dollinger-Bogen 14        Aufsichtsratsvors.: A. Grundner-Culemann
D-80807 Muenchen                 HRB: 136055 (AG Muenchen)
Tel: +49 (0)89/32356-444         USt-IdNr.: DE813185279