[spring] Re: draft-ietf-spring-srv6-security-11 early Opsdir review
Joel Halpern <jmh@joelhalpern.com> Fri, 27 March 2026 15:32 UTC
Return-Path: <jmh@joelhalpern.com>
X-Original-To: spring@mail2.ietf.org
Delivered-To: spring@mail2.ietf.org
Received: from localhost (localhost [127.0.0.1]) by mail2.ietf.org (Postfix) with ESMTP id 862F1D275800; Fri, 27 Mar 2026 08:32:11 -0700 (PDT)
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/simple; d=ietf.org; s=ietf1; t=1774625531; bh=BOKi2RdlbKh4u8Ad2wwCgFMe2M8cfhMpam4X8JktVIE=; h=Date:Subject:To:Cc:References:From:In-Reply-To; b=UyAf4y5WF437XL0am/7m0ovm9oI9f/c+epQuSGOZQqprXJkjGqDx+HorFm8ZSLbtQ P3CnFlxyA6fG0CGSkBLpkAiU/jSizukMpjVMox9ZXBjnXaL9RACshed9TLRd4/5Z3j vX+u5FF7Xf9D8z90dSS4Z8Gb8crrPCLyVhSxhtaw=
X-Virus-Scanned: amavisd-new at ietf.org
X-Spam-Flag: NO
X-Spam-Score: -2.797
X-Spam-Level:
X-Spam-Status: No, score=-2.797 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, DKIM_SIGNED=0.1, DKIM_VALID=-0.1, DKIM_VALID_AU=-0.1, DKIM_VALID_EF=-0.1, RCVD_IN_DNSWL_LOW=-0.7, RCVD_IN_MSPIKE_H3=0.001, RCVD_IN_MSPIKE_WL=0.001, RCVD_IN_VALIDITY_CERTIFIED_BLOCKED=0.001, RCVD_IN_VALIDITY_RPBL_BLOCKED=0.001, SPF_PASS=-0.001] autolearn=ham autolearn_force=no
Authentication-Results: mail2.ietf.org (amavisd-new); dkim=pass (1024-bit key) header.d=joelhalpern.com
Received: from mail2.ietf.org ([166.84.6.31]) by localhost (mail2.ietf.org [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id QyClLqn6AWp5; Fri, 27 Mar 2026 08:32:10 -0700 (PDT)
Received: from mailb2.tigertech.net (mailb2.tigertech.net [208.80.4.154]) (using TLSv1.3 with cipher TLS_AES_256_GCM_SHA384 (256/256 bits) key-exchange X25519 server-signature ECDSA (P-256) server-digest SHA256) (No client certificate requested) by mail2.ietf.org (Postfix) with ESMTPS id CDDB1D2757FB; Fri, 27 Mar 2026 08:32:10 -0700 (PDT)
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=joelhalpern.com; s=2.tigertech; t=1774625524; bh=yKkXSU0uhyM91eSqwa75INDAGhwkvsmOnt3yIRHZzR4=; h=Date:Subject:To:Cc:References:From:In-Reply-To:From; b=LrMAoNMQpEWUwCMH84VNxySLRStyKGr0VwZGTMRrpVJy83BjAtOcghqAi9OdG0wF1 ViMFuGwYLewie3vtIY/EpbcBLB6OwAQV8/QhmZJPv6Q2yHEsyQ5KtJyENVIG4Iryh5 k3lTMp5YBO80bpSY4opxtnZlIkzhuwYyaVbeZMWs=
Received: from localhost (localhost [127.0.0.1]) by mailb2.tigertech.net (Postfix) with ESMTP id 4fj4Pw5kMcz2Fpqh; Fri, 27 Mar 2026 08:32:04 -0700 (PDT)
X-Quarantine-ID: <1s_uED9gosm0>
X-Virus-Scanned: Debian amavis at b2.tigertech.net
Received: from [IPV6:2600:8806:103:9500:24d7:4864:5d36:b4c5] (unknown [IPv6:2600:8806:103:9500:24d7:4864:5d36:b4c5]) (using TLSv1.3 with cipher TLS_AES_128_GCM_SHA256 (128/128 bits) key-exchange X25519 server-signature RSA-PSS (2048 bits) server-digest SHA256) (No client certificate requested) by mailb2.tigertech.net (Postfix) with ESMTPSA id 4fj4Pv6Bbpz2Fpqf; Fri, 27 Mar 2026 08:32:03 -0700 (PDT)
Message-ID: <1d9e693a-d784-4e6d-805b-143f2079db6a@joelhalpern.com>
Date: Fri, 27 Mar 2026 11:32:02 -0400
MIME-Version: 1.0
User-Agent: Mozilla Thunderbird
To: Tal Mizrahi <tal.mizrahi.phd@gmail.com>, Jean-Michel Combes <jeanmichel.combes@gmail.com>
References: <177195214360.2334629.133943892944994060@dt-datatracker-6ff7c68975-7k42g> <CABUE3X=s8UhZ6cFgijYPcf+fcLQCsyEipj5Ey24wiBrk3Qh-gA@mail.gmail.com>
Content-Language: en-US
From: Joel Halpern <jmh@joelhalpern.com>
In-Reply-To: <CABUE3X=s8UhZ6cFgijYPcf+fcLQCsyEipj5Ey24wiBrk3Qh-gA@mail.gmail.com>
Content-Type: text/plain; charset="UTF-8"; format="flowed"
Content-Transfer-Encoding: 8bit
Message-ID-Hash: KJNPEDWVJ2NRDK2DQXMV6QC5CULLLMVD
X-Message-ID-Hash: KJNPEDWVJ2NRDK2DQXMV6QC5CULLLMVD
X-MailFrom: jmh@joelhalpern.com
X-Mailman-Rule-Misses: dmarc-mitigation; no-senders; approved; emergency; loop; banned-address; member-moderation; header-match-spring.ietf.org-0; nonmember-moderation; administrivia; implicit-dest; max-recipients; max-size; news-moderation; no-subject; digests; suspicious-header
CC: ops-dir@ietf.org, draft-ietf-spring-srv6-security.all@ietf.org, spring@ietf.org
X-Mailman-Version: 3.3.9rc6
Precedence: list
Subject: [spring] Re: draft-ietf-spring-srv6-security-11 early Opsdir review
List-Id: "Source Packet Routing in NetworkinG (SPRING)" <spring.ietf.org>
Archived-At: <https://mailarchive.ietf.org/arch/msg/spring/UA5iwzxm2DL2Wh1OXRcovYERD0g>
List-Archive: <https://mailarchive.ietf.org/arch/browse/spring>
List-Help: <mailto:spring-request@ietf.org?subject=help>
List-Owner: <mailto:spring-owner@ietf.org>
List-Post: <mailto:spring@ietf.org>
List-Subscribe: <mailto:spring-join@ietf.org>
List-Unsubscribe: <mailto:spring-leave@ietf.org>
Regarding one item: On 3/27/2026 4:53 AM, Tal Mizrahi wrote: > Dear Jean-Michel, > > Many thanks for a very thorough review. > We have revised the document and we believe that the current version > resolves almost all the issues: > https://datatracker.ietf.org/doc/draft-ietf-spring-srv6-security/12 > > Please see the replies below, marked [TM], along with a couple of text > update suggestions that we would be happy to hear your opinion about. > > Thanks, > Tal. > > > On Tue, Feb 24, 2026 at 6:55 PM Jean-Michel Combes via Datatracker > <noreply@ietf.org> wrote: >> <snip> >> >> 7.1.2. SRH Filtering >> >> Filtering can be performed based on the presence of an SRH. More >> generally, [RFC9288] provides recommendations on the filtering of >> IPv6 packets containing IPv6 extension headers at transit routers. >> However, filtering based on the presence of an SRH is not necessarily >> useful for two reasons: 1. The SRH is optional for SID processing as >> described in [RFC8754] section 3.1 and 4.1. 2. A packet containing >> an SRH may not be destined to the SR domain, it may be simply >> transiting the domain. >> >> <JMC> >> <Major issue> >> “2. A packet containing an SRH may not be destined to the SR domain” >> IMHO, not consistent with Section 6.2.1.2, Section 6.2.2.2 and Section 6.2.3.2: >> where does this packet come from? </Major issue> </JMC> >> >> For these reasons SRH filtering is not necessarily a useful method of >> mitigation. >> >> <JMC> >> <Major issue> >> IMHO, not consistent with RFC 8402, Section 8.2: >> “Therefore, by default, the explicit routing information MUST NOT be leaked >> through the boundaries of the administered domain.” IMHO, not consistent also >> with Section 6.2.1.2, Section 6.2.2.2 and Section 6.2.3.2 </Major issue> </JMC> > [TM] Here is a proposal for updated text: > OLD: > A packet containing an SRH may not be destined to the SR domain. > NEW: > A packet containing an SRH may not be destined to the SR domain. This > scenario is mitigated by encapsulating packets on the domain boundary, > as discussed in Section 7.2. While inter‑SR‑domain scenarios are > generally out of scope for this document’s threat model, the > operational practices recommended here aim to preserve > interoperability and avoid blanket behaviors that would break SR when > adjacent networks follow different practices. Personally, I would recommend stronger text about the putative inter-domain usage. Instead of: "While inter-SR-domain scenarios are generally out of scope for this document's threat model" I would suggest "While inter-SR-domain scenarios are a violation of the trust model described above" and then continue with the text about not gratuitously breaking things. Yours, Joel > >> Hope that helps. >> >> Thanks in advance for your reply. >> >> Best regards, >> >> JMC. >> >> >>
- [spring] draft-ietf-spring-srv6-security-11 early… Jean-Michel Combes via Datatracker
- [spring] Re: draft-ietf-spring-srv6-security-11 e… Tal Mizrahi
- [spring] Re: draft-ietf-spring-srv6-security-11 e… Joel Halpern
- [spring] Re: draft-ietf-spring-srv6-security-11 e… Tal Mizrahi
- [spring] Re: draft-ietf-spring-srv6-security-11 e… Jean-Michel Combes
- [spring] Re: draft-ietf-spring-srv6-security-11 e… Tal Mizrahi
- [spring] Re: draft-ietf-spring-srv6-security-11 e… Jean-Michel Combes