Re: [Tsv-art] [v6ops] [Last-Call] Tsvart last call review of draft-ietf-v6ops-ipv6-ehs-packet-drops-05

Tom Herbert <tom@herbertland.com> Tue, 23 February 2021 14:34 UTC

Return-Path: <tom@herbertland.com>
X-Original-To: tsv-art@ietfa.amsl.com
Delivered-To: tsv-art@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 90E093A2BFA for <tsv-art@ietfa.amsl.com>; Tue, 23 Feb 2021 06:34:23 -0800 (PST)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -1.897
X-Spam-Level:
X-Spam-Status: No, score=-1.897 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, DKIM_SIGNED=0.1, DKIM_VALID=-0.1, SPF_HELO_NONE=0.001, SPF_NONE=0.001, URIBL_BLOCKED=0.001] autolearn=ham autolearn_force=no
Authentication-Results: ietfa.amsl.com (amavisd-new); dkim=pass (2048-bit key) header.d=herbertland-com.20150623.gappssmtp.com
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id zUQOyM9gPioU for <tsv-art@ietfa.amsl.com>; Tue, 23 Feb 2021 06:34:21 -0800 (PST)
Received: from mail-ed1-x52d.google.com (mail-ed1-x52d.google.com [IPv6:2a00:1450:4864:20::52d]) (using TLSv1.2 with cipher ECDHE-RSA-AES128-GCM-SHA256 (128/128 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id 7D7F53A2BFD for <tsv-art@ietf.org>; Tue, 23 Feb 2021 06:34:17 -0800 (PST)
Received: by mail-ed1-x52d.google.com with SMTP id l12so26156767edt.3 for <tsv-art@ietf.org>; Tue, 23 Feb 2021 06:34:17 -0800 (PST)
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=herbertland-com.20150623.gappssmtp.com; s=20150623; h=mime-version:references:in-reply-to:from:date:message-id:subject:to :cc; bh=7koVTv5Vje5J46Hd120/Vot6MsMt0Ov5UUrvwh1F1Uk=; b=LDiYF1WSAH5KqNmlqPw1/i7A+s6sLZ5gbkPwQIG+mLoxb8wD55MYPFAEBmzlwqnKxG rOA6cyjKQfafnvxFRmFFUt8o1odiakFOATpyt2WcIsLdGkQrdHM0dx/Mow3s5KsmrsTX R3ZDtVV6tfDjGL3DpN3kTWBxpG4i1HqT50tS/MhE50xGg2FkaXlHmzVZm5TKzXRb7KwO My2Cb/m9mFsJZxY52kiCqCGgDNK1gPXuKJCGVEDwdxlkurOfRh0pr/LRY0AKdwIDjwKe fleDuL6TbOafS3Vr1JbWkIvjtdQFBq4F3WsE18eMEoOrcly1+jPrFiQ7sfIolvImDhzo 6mHw==
X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20161025; h=x-gm-message-state:mime-version:references:in-reply-to:from:date :message-id:subject:to:cc; bh=7koVTv5Vje5J46Hd120/Vot6MsMt0Ov5UUrvwh1F1Uk=; b=icr7Vvb4Wezb1xIhVTbIb5sKvY0R1O5x8wo8J6CFpSkLyLp6CSMOQARqZ0u51huH6n uFl3yu+Od5Y/a23BaXkrFN5BdavxuGoptwW/+SCLvZz40vcB70tVXRxCEEuUOOfGVK1Q hXiCywC0BlZSQKB1NsFWN14jOcp47Tw+2+6iUTIvhB9BNoa0xbisGbgInasmwuQh+p1a RkNL2S8i9YwPUBFmxLeb1n7oKTM0q5Ezk8wiIeiQpvg+FqbpH6P2dV396Cn2fXgD5qTx fzDCr0UiBdiuEGcTP1dXgAhf8iO6GW9oZsELEbLcHDxIJGf9yyMJFcVXJK0cGSFSloq7 88aQ==
X-Gm-Message-State: AOAM533FYymXWUF9sdoFZWqtILOqRlfI9WTAyKIN87+eBwRzry8+cUzO MyDWYQcD6NSCGPxGsF7qLrnwzMTSatETjw/PWOxIig==
X-Google-Smtp-Source: ABdhPJy/PB0fIs41485Ll/ui3UEBJCiqY1BgkBjEVPHIsA1ppV96Rv4i8bgcZP6eV44ZjojZHH58RGjVmV3tkNBcF2o=
X-Received: by 2002:aa7:cb0d:: with SMTP id s13mr27858070edt.221.1614090855800; Tue, 23 Feb 2021 06:34:15 -0800 (PST)
MIME-Version: 1.0
References: <161366727749.10107.14514005068158901089@ietfa.amsl.com> <42668fb5-a355-e656-7d99-c40b3d33fb92@si6networks.com> <0e377231-c319-2157-30a0-759e2f96a692@gmail.com> <5f464f17-85ed-f105-35f9-02f35d04aed2@si6networks.com> <CALx6S364zGbq_HZNNVEaJHnHccuk4Zau2DXhmaVYbwnYQc-5bw@mail.gmail.com> <1847e8e3-543f-5deb-dd14-f7c7fa3677db@si6networks.com> <CALx6S34TPppMRJrOvyJ05LLeRvv+S51pQHJnzZDKk-qOdsF0AA@mail.gmail.com> <e41f3484-f816-e185-2d99-94323c8da732@si6networks.com> <CALx6S34qSxGijVcs229bAL5gMhMvMNYUXm3yEmrg6wxUiUAiaA@mail.gmail.com> <bf83d228-25bc-21bb-f984-d58ead6bf492@si6networks.com>
In-Reply-To: <bf83d228-25bc-21bb-f984-d58ead6bf492@si6networks.com>
From: Tom Herbert <tom@herbertland.com>
Date: Tue, 23 Feb 2021 07:34:04 -0700
Message-ID: <CALx6S35Kh-QAXJDAucuw5Wty37MBiwS=pqQknMZ+15b7D5Sn8A@mail.gmail.com>
To: Fernando Gont <fgont@si6networks.com>
Cc: Brian E Carpenter <brian.e.carpenter@gmail.com>, Gorry Fairhurst <gorry@erg.abdn.ac.uk>, tsv-art@ietf.org, last-call@ietf.org, draft-ietf-v6ops-ipv6-ehs-packet-drops.all@ietf.org, IPv6 Operations <v6ops@ietf.org>
Content-Type: text/plain; charset="UTF-8"
Archived-At: <https://mailarchive.ietf.org/arch/msg/tsv-art/1PgDhg-R7eikN-3HfBQR-AwRIJc>
Subject: Re: [Tsv-art] [v6ops] [Last-Call] Tsvart last call review of draft-ietf-v6ops-ipv6-ehs-packet-drops-05
X-BeenThere: tsv-art@ietf.org
X-Mailman-Version: 2.1.29
Precedence: list
List-Id: Transport Area Review Team <tsv-art.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/tsv-art>, <mailto:tsv-art-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/tsv-art/>
List-Post: <mailto:tsv-art@ietf.org>
List-Help: <mailto:tsv-art-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/tsv-art>, <mailto:tsv-art-request@ietf.org?subject=subscribe>
X-List-Received-Date: Tue, 23 Feb 2021 14:34:24 -0000

On Mon, Feb 22, 2021 at 11:14 AM Fernando Gont <fgont@si6networks.com> wrote:
>
> Tom,
>
> On 22/2/21 11:55, Tom Herbert wrote:
> > On Sun, Feb 21, 2021 at 2:39 AM Fernando Gont <fgont@si6networks.com> wrote:
> >>
> >> Hello, Tom,
> >>
> >> On 20/2/21 12:32, Tom Herbert wrote:
> >> [...]
> [....]
> >>
> >>> This is reflected in the statement: "If an IPv6 header chain is
> >>> sufficiently long that it exceeds the packet look-up capacity of the
> >>> router, the router might be unable to determine how the packet should
> >>> be handled, and thus could resort to dropping the packet." It's not to
> >>> me clear what "sufficiently long" means; in particular, such a
> >>> statement isn't helpful to the host stack developer trying to figure
> >>> out if the packets they're creating will be properly forwarded.
> >>
> >> "Long enough" for the router handling the packet. There are different
> >> vendors, and different models. S the specific value will vary across
> >> router vendors and models. In our document, we reference two sample
> >> values -- but they are certainly not the only ones.
> >>
> > Fernando,
> >
> > Yes, different routers do different things, but can you quantify what
> > the most commonly deployed routers do?
>
> That's not what this document is about.
>
>
> > If we can do that then we could
> > establish a better requirement for host stacks more than just "don't
> > send IPv6 header chains that are too long".
>
> This document intentionally focuses on elaborating on the underlying
> problem, and *not* on providing such a recommendation.  We can certainly
> embark ourselves on that project once we complete this one.
>

>From the draft:

"Unless appropriate mitigations are put in place (e.g., packet
dropping and/or rate- limiting), an attacker could simply send a large
amount of IPv6 traffic employing IPv6 Extension Headers with the
purpose of performing a Denial of Service (DoS) attack"

That is clearly recommending a mitigation which is to drop packets or
rate-limit. Without any parameterization, this effectively justifies
routers to arbitrarily drop all packets with any extension headers
(rate-limiting packets makes the protocol effectively useless). Also,
if mitigations are being mentioned then the draft should also mention
the possibility that routers could be fixed, this is particularly
apropos with regards to the "DoS due to implementation errors".
Contemporary routers are trending towards being programmable so
implementation errors should be more amendable to being fixed without
hardware swap out.

Tom

>
>
> > For instance, from the
> > draft: "some contemporary high-end routers are known to inspect up to
> > 192 bytes, while others are known to parse up to 384 bytes of
> > header.". That's good information since it at least starts to quantify
> > the router implementation constraints that are mostly the subject of
> > this draft (this data really needs a reference by the way).
>
> We reference such values for informative purposes. But the goal of this
> document is to provide a *qualitative* analysis.
>
> (We did include a reference for the two cited values, but our
> responsible AD suggested not to mention specific vendors/products. GIven
> your comment, I'll raise the question to him)
>
>
> > If we
> > establish what the most common limit is, say the 192 bytes that are
> > mentioned, then we could establish a requirement on routers that sets
> > a reasonable expectation for hosts stack as to what will be forwarded
> > with high probability.
>
> As noted, that's certainly out of the scope of this document. That said,
> it would seem to me that RFC7872 is providing the kind of information
> that you seem to be looking for (modulo a recommendation).
>
> Thanks,
> --
> Fernando Gont
> SI6 Networks
> e-mail: fgont@si6networks.com
> PGP Fingerprint: 6666 31C6 D484 63B2 8FB1 E3C4 AE25 0D55 1D4E 7492
>
>
>
>