[spring] Re: draft-ietf-spring-srv6-security-11 early Opsdir review
Jean-Michel Combes <jeanmichel.combes@gmail.com> Wed, 08 April 2026 13:06 UTC
Return-Path: <jeanmichel.combes@gmail.com>
X-Original-To: spring@mail2.ietf.org
Delivered-To: spring@mail2.ietf.org
Received: from localhost (localhost [127.0.0.1]) by mail2.ietf.org (Postfix) with ESMTP id 956CAD8137E4 for <spring@mail2.ietf.org>; Wed, 8 Apr 2026 06:06:42 -0700 (PDT)
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/simple; d=ietf.org; s=ietf1; t=1775653602; bh=rrTGWI7FCGlc1uOKBCkHNREeBZXxIyiTStTjJIhR6mc=; h=References:In-Reply-To:From:Date:Subject:To:Cc; b=TdmiuWZEFjL5UV55fGn17bx98Y/eWI6UkeHfMJFm+tr80bp6yeo2uYzVIpHFRNEfg ErxcExBq+3j04RT9bmjZG4CiEz2OPSkzBhC7By0Ftsns/NB4aQYUIykafVbuBD9UGD u55sjWBxiH/xEySadKYoCNdPx2Ytu8uHwH5/Cd+U=
X-Virus-Scanned: amavisd-new at ietf.org
X-Spam-Flag: NO
X-Spam-Score: -0.855
X-Spam-Level:
X-Spam-Status: No, score=-0.855 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, DKIM_SIGNED=0.1, DKIM_VALID=-0.1, DKIM_VALID_AU=-0.1, DKIM_VALID_EF=-0.1, FREEMAIL_FROM=0.001, HTML_MESSAGE=0.001, NORMAL_HTTP_TO_IP=0.001, NUMERIC_HTTP_ADDR=1.242, RCVD_IN_DNSWL_NONE=-0.0001, SPF_HELO_NONE=0.001, SPF_PASS=-0.001] autolearn=ham autolearn_force=no
Authentication-Results: mail2.ietf.org (amavisd-new); dkim=pass (2048-bit key) header.d=gmail.com
Received: from mail2.ietf.org ([166.84.6.31]) by localhost (mail2.ietf.org [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id OsqAxdD8w2Ut for <spring@mail2.ietf.org>; Wed, 8 Apr 2026 06:06:41 -0700 (PDT)
Received: from mail-vk1-xa33.google.com (mail-vk1-xa33.google.com [IPv6:2607:f8b0:4864:20::a33]) (using TLSv1.3 with cipher TLS_AES_128_GCM_SHA256 (128/128 bits) key-exchange X25519 server-signature ECDSA (P-256) server-digest SHA256) (No client certificate requested) by mail2.ietf.org (Postfix) with ESMTPS id 9ABC9D812C2D for <spring@ietf.org>; Wed, 8 Apr 2026 06:02:43 -0700 (PDT)
Received: by mail-vk1-xa33.google.com with SMTP id 71dfb90a1353d-56a8fdaddebso2086566e0c.0 for <spring@ietf.org>; Wed, 08 Apr 2026 06:02:43 -0700 (PDT)
ARC-Seal: i=1; a=rsa-sha256; t=1775653357; cv=none; d=google.com; s=arc-20240605; b=iDLQhEVcT251MRmpN3ah2TQnNdtR/C7cwO28E7+kFtnjzxBzHDy3nM65vKbcSpfiDM gOu/kksJG0XeA9INt1uXLQM3w2XHKIhaZy+oGGVSg08oZF9ySHpbobzv0TXtADz3d9b0 eK1tbuvqq6X7Kn1uRoKZpS0Z3fSJ6wcvO+WKOXUoy+L0qLYS6sYdLSGfn0lvd+3t5PWA gLJwzXT8Qa5PNGS6u3zDc8Cxi+rag/5Vg/v70gSRpR5kehjV9/QRF+CyWkBWvy71Y3ZX uoFpDKnuND+4VHrcjCY9ZIyxT/GZtibz0aduHw635O8gP+dfPzUgvwi5kbAGEfi6bkyC /W9A==
ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20240605; h=cc:to:subject:message-id:date:from:in-reply-to:references :mime-version:dkim-signature; bh=wdZ7qvp12oOuq7V+72QdJ6cWqRQLPZOUMvnBpl+MRvo=; fh=gy7DmXHhXY5iqMN0wC+MEkQjOZH9Ij4WMZwcdGNFDVw=; b=lf7YSDd7Gp+iq/q+NPtak79vRDCcrfIpo40oMBbn0NJ3Wda5JvKmUkb4NVyD6Uni9G tPrB44HoVG0A/0Id7Wn+Spki1sZ72ExVLDR1NnIOcWo/MiKayKlV+poKLvDbtbpmEydm KzkPtwcDTFgm/l5JnjJa+ZyJl8FjMbtiQqA859Qs3ewo+UFSIo1FnR+Ty+ks9r6xEDWm 38Jv+vag2jvAIyNi20M+FGZeveCGSiEppzPryYLoef1pEGnrU9d07jX3LaN98B9u0GXR UtqPfMFKCfWKxrRX+5Fnc+4GjKomlS1LdJaAleX5GqI4t2o4WRAqhcHEZNjRtIvYveBq v55g==; darn=ietf.org
ARC-Authentication-Results: i=1; mx.google.com; arc=none
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=gmail.com; s=20251104; t=1775653357; x=1776258157; darn=ietf.org; h=cc:to:subject:message-id:date:from:in-reply-to:references :mime-version:from:to:cc:subject:date:message-id:reply-to; bh=wdZ7qvp12oOuq7V+72QdJ6cWqRQLPZOUMvnBpl+MRvo=; b=Aj3WrhFu6WH4JaI0VM0eL1eKxzkPEln7/4uMRlpVEVa9bY75vb9Vfa1x4SBNpXCP9z exky0z4r1TFqVg0UIf+9Y99U5yjyTFfUmUY/HypgW+EwqYxhecnVXwiKMo4gKgE60TJG HPOYnN+Up37gb/DbRLu+eb9NVT4bVM4+UtHsbkpeYZ7LR/A0sLZGAcYbzhrox0U89ujE M6qqdUuHQW0Npqv6aj9zcj+oibyhrT5u/sCfklDY2gTHRmhfyRS17DB4qXX0u1/+C2Cb JT7/lCalelbwNt16vsVRX+JRk1EEHnJD/pfzSVXe2njQpHTHHgmqCadqV5LLdZki+2g/ MQ8Q==
X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20251104; t=1775653357; x=1776258157; h=cc:to:subject:message-id:date:from:in-reply-to:references :mime-version:x-gm-gg:x-gm-message-state:from:to:cc:subject:date :message-id:reply-to; bh=wdZ7qvp12oOuq7V+72QdJ6cWqRQLPZOUMvnBpl+MRvo=; b=WYXJyZTB7BpiH1Orks7Nj9ZAW26SWD2FkgGg3/CHRV5sLMCkJYx0/1c+JhJhXPAYlu nEMveLNijjNLCor7eOXXuWAiJAyc682Hs/mLvXD0ush0w2CReWS99d677dXBaKfyophF 3VWKCZ0CIzbMzet0zCtaX8pc7V+3MnBR+3EZMdkuN7dzngD7Xvc0dMcoD8l4kmM5G4nw 6ZBoCpbjh4LcTYUhXpNHfbIPulWlt0pjSSWkarjgn5In6o/qiKIKDP6CSfjgI0TKbddr xSScoL7xKxN6XaUGjotBRAATxnMlrWov12t/HAhH0wI3POVwIx7XpfY/eMJSCRPUjiaV QNmQ==
X-Forwarded-Encrypted: i=1; AJvYcCVBZW3vgkaQq5+zC5vKT3NIitlkVyRkgLHIw6DBD+oZ/1SopYLBpMokNuC3r53Fi61p5obuLQg=@ietf.org
X-Gm-Message-State: AOJu0Yze5maa+5zgnrsIF3xv3Ss9OodY6fQ79WqaPy/CiR67gAhVulw5 joJTUsHP9sHrYFfMQBNaGEtXY+Z2mKRaeGP7zFDh7fXcr6V+cF5scHF+yBIfOhHBt3hLfQF5HpO urgR0649E++nx4/YkLD5k13oXP/BkUIw=
X-Gm-Gg: AeBDieuAfzVvlzEk5It3MORUu5RbPb4w1Sfh0D9/bkpjdI/x1xqkQRQ4tbhNR3Rn0ce cvEaNEfWHg8KbUCMPD3YjFERo/s7dD+X8CPG8IfNrsn83jsYbu8+XWQL5SNcDVIG16ZpuPhHlt8 dxRp7ey9Ab7VlIsbTjNwrSEtKcmG9cXxzlMJfzhn3VjkIZ+7874XWUEUcEO8DWWZLPj62j2yU7m b+iKGC19NNN1otkaxNjb04do349wUDQox6pHPPzmhLC6N/7XJq/deJDhJ5DzvgbzSIQab6XaoB+ /u2I
X-Received: by 2002:a05:6122:2886:b0:56b:9784:8a2a with SMTP id 71dfb90a1353d-56dab9a8277mr8269288e0c.10.1775653356990; Wed, 08 Apr 2026 06:02:36 -0700 (PDT)
MIME-Version: 1.0
References: <177195214360.2334629.133943892944994060@dt-datatracker-6ff7c68975-7k42g> <CABUE3X=s8UhZ6cFgijYPcf+fcLQCsyEipj5Ey24wiBrk3Qh-gA@mail.gmail.com> <CAA7e52roeZ9rvNyrb7+0W8k-Jzg161Kh5JF+AnUvyu==puFpxA@mail.gmail.com> <CABUE3XmyA8R7x9UJ4=D+=dekKzZR=W_+DNnXu2o7Dp6UxxFGeg@mail.gmail.com>
In-Reply-To: <CABUE3XmyA8R7x9UJ4=D+=dekKzZR=W_+DNnXu2o7Dp6UxxFGeg@mail.gmail.com>
From: Jean-Michel Combes <jeanmichel.combes@gmail.com>
Date: Wed, 08 Apr 2026 15:02:25 +0200
X-Gm-Features: AQROBzAFfTDivrVLUwyVeioJDNIMvagbH-4IE2a6aESPOJtm7cvTt1IcLVKMKqw
Message-ID: <CAA7e52qdHDThtmLSQZSiuHHdVh6fK_JPBve5JwaKAYWMqiMCZg@mail.gmail.com>
To: Tal Mizrahi <tal.mizrahi.phd@gmail.com>
Content-Type: multipart/alternative; boundary="00000000000096787e064ef2836b"
Message-ID-Hash: 6SWL66OKZX7FZUUPXZNGSCNE3XVFAQWL
X-Message-ID-Hash: 6SWL66OKZX7FZUUPXZNGSCNE3XVFAQWL
X-MailFrom: jeanmichel.combes@gmail.com
X-Mailman-Rule-Misses: dmarc-mitigation; no-senders; approved; emergency; loop; banned-address; member-moderation; header-match-spring.ietf.org-0; nonmember-moderation; administrivia; implicit-dest; max-recipients; max-size; news-moderation; no-subject; digests; suspicious-header
CC: ops-dir@ietf.org, draft-ietf-spring-srv6-security.all@ietf.org, spring@ietf.org
X-Mailman-Version: 3.3.9rc6
Precedence: list
Subject: [spring] Re: draft-ietf-spring-srv6-security-11 early Opsdir review
List-Id: "Source Packet Routing in NetworkinG (SPRING)" <spring.ietf.org>
Archived-At: <https://mailarchive.ietf.org/arch/msg/spring/VzuDRsXvq7vDwIT0udOuuvb7YHY>
List-Archive: <https://mailarchive.ietf.org/arch/browse/spring>
List-Help: <mailto:spring-request@ietf.org?subject=help>
List-Owner: <mailto:spring-owner@ietf.org>
List-Post: <mailto:spring@ietf.org>
List-Subscribe: <mailto:spring-join@ietf.org>
List-Unsubscribe: <mailto:spring-leave@ietf.org>
Hi, At first, thanks for your reply. All your answers work for me. Thanks again for your replies. Best regards, JMC. Le jeu. 2 avr. 2026 à 12:26, Tal Mizrahi <tal.mizrahi.phd@gmail.com> a écrit : > Hi Jean-Michel, > > Thanks for reviewing the updated version. > Please see my responses below, marked [[TM]]. > > On Wed, Apr 1, 2026 at 6:25 PM Jean-Michel Combes > <jeanmichel.combes@gmail.com> wrote: > > [snip] > > >> > <JMC> > >> > <Major issue> > >> > “Therefore,”: without definition of “trusted domain” (cf. above), I > must admit > >> > it is hard for me to have such a conclusion. </Major issue> </JMC> > >> > >> [TM] Based on this comment and other comments from directorate > >> reviewers we have significantly revised the text about "SR domain" and > >> "trusted domain" in Section 4 (Threat Terminology). While the current > >> document is not intended to redefine these terms, we believe that the > >> current version is clearer about the meaning of these terms based on > >> RFC 8402. > > > > > > <JMC2> > > Sorry, but the new text doesn't clarify the "trusted domain" term for me. > > Option #1: a SR domain, where filtering policy at the domain boundaries > - as defined in the document, is applied and so, is considered as a > "trusted domain" => a SR domain where there is no/partial filtering policy > at the domain boundaries is not considered as a "trusted domain" > > Option #2: the filtering policy at the domain boundaries - as defined in > the document, is only an additional security feature for a "trusted domain" > and so, there is/are security assumption(s)/feature(s) a SR domain MUST > have to become a "trusted domain" > > Option #1 or Option #2? > > If Option #2, what is/are the security assumption(s)/feature(s)? > > </JMC2> > > [[TM]] Please note that the text in version 13 says: "...the term > trusted domain denotes an SR domain for which the boundary-filtering > assumption of [RFC8402] is in force." > Thus, from the two options you suggested, Option #1 can clearly be > understood from this sentence. > In my opinion the text is clear about this point. > > > [snip] > > >> > 7.1.2. SRH Filtering > >> > > >> > Filtering can be performed based on the presence of an SRH. More > >> > generally, [RFC9288] provides recommendations on the filtering of > >> > IPv6 packets containing IPv6 extension headers at transit routers. > >> > However, filtering based on the presence of an SRH is not > necessarily > >> > useful for two reasons: 1. The SRH is optional for SID processing > as > >> > described in [RFC8754] section 3.1 and 4.1. 2. A packet containing > >> > an SRH may not be destined to the SR domain, it may be simply > >> > transiting the domain. > >> > > >> > <JMC> > >> > <Major issue> > >> > “2. A packet containing an SRH may not be destined to the SR domain” > >> > IMHO, not consistent with Section 6.2.1.2, Section 6.2.2.2 and > Section 6.2.3.2: > >> > where does this packet come from? </Major issue> </JMC> > >> > > >> > For these reasons SRH filtering is not necessarily a useful method > of > >> > mitigation. > >> > > >> > <JMC> > >> > <Major issue> > >> > IMHO, not consistent with RFC 8402, Section 8.2: > >> > “Therefore, by default, the explicit routing information MUST NOT be > leaked > >> > through the boundaries of the administered domain.” IMHO, not > consistent also > >> > with Section 6.2.1.2, Section 6.2.2.2 and Section 6.2.3.2 </Major > issue> </JMC> > >> > >> [TM] Here is a proposal for updated text: > >> OLD: > >> A packet containing an SRH may not be destined to the SR domain. > >> NEW: > >> A packet containing an SRH may not be destined to the SR domain. This > >> scenario is mitigated by encapsulating packets on the domain boundary, > >> as discussed in Section 7.2. While inter‑SR‑domain scenarios are > >> generally out of scope for this document’s threat model, the > >> operational practices recommended here aim to preserve > >> interoperability and avoid blanket behaviors that would break SR when > >> adjacent networks follow different practices. > > > > > > <JMC2> > > Maybe I was not clear enough, sorry. You have merged my 2 previous > comments inside one but: > > - the first one was about incoming packets (i.e., to the SR domain) > > You replied to my comment. > > - the second one was about outgoing packets - with a SRH (i.e., from the > SR domain) > > You didn't reply to my comment. > > </JMC2> > > [[TM]] I would suggest the following text update to explicitly explain > that this section refers to both ingress and egress filtering. > > OLD: > A packet containing an SRH may not be destined to the SR domain, > as it may be simply transiting the domain. This scenario is > mitigated by encapsulating packets on the domain boundary, as > discussed in Section 7.2. While inter-SR-domain scenarios are a > violation of the trust model described above, the operational > practices recommended here aim to preserve interoperability and > avoid blanket behaviors that would break SR when adjacent > networks follow different practices. > NEW: > A packet containing an SRH may not be destined to the SR domain, > as it may be simply transiting the domain. Therefore, filtering > solely > based on the presence of an SRH, at either SR ingress or SR egress, > is not necessarily recommended. Instead, this scenario is > mitigated by encapsulating packets on the domain boundary, as > discussed in Section 7.2. While inter-SR-domain scenarios are a > violation of the trust model described above, the operational > practices recommended here aim to preserve interoperability and > avoid blanket behaviors that would break SR when adjacent > networks follow different practices. > > > > > Thanks in advance for your reply. > > > > Best regards, > > > > JMC. > > Thanks, > Tal. >
- [spring] draft-ietf-spring-srv6-security-11 early… Jean-Michel Combes via Datatracker
- [spring] Re: draft-ietf-spring-srv6-security-11 e… Tal Mizrahi
- [spring] Re: draft-ietf-spring-srv6-security-11 e… Joel Halpern
- [spring] Re: draft-ietf-spring-srv6-security-11 e… Tal Mizrahi
- [spring] Re: draft-ietf-spring-srv6-security-11 e… Jean-Michel Combes
- [spring] Re: draft-ietf-spring-srv6-security-11 e… Tal Mizrahi
- [spring] Re: draft-ietf-spring-srv6-security-11 e… Jean-Michel Combes