Re: [Tsv-art] Tsvart last call review of draft-ietf-opsec-ipv6-eh-filtering-06

Eric Rescorla <ekr@rtfm.com> Mon, 26 November 2018 15:19 UTC

Return-Path: <ekr@rtfm.com>
X-Original-To: tsv-art@ietfa.amsl.com
Delivered-To: tsv-art@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 63470130F36 for <tsv-art@ietfa.amsl.com>; Mon, 26 Nov 2018 07:19:32 -0800 (PST)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -3.357
X-Spam-Level:
X-Spam-Status: No, score=-3.357 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, DKIMWL_WL_MED=-1.459, DKIM_SIGNED=0.1, DKIM_VALID=-0.1, HTML_MESSAGE=0.001, RCVD_IN_DNSWL_NONE=-0.0001, URIBL_BLOCKED=0.001] autolearn=unavailable autolearn_force=no
Authentication-Results: ietfa.amsl.com (amavisd-new); dkim=pass (2048-bit key) header.d=rtfm-com.20150623.gappssmtp.com
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id a5n7RAFwSSwn for <tsv-art@ietfa.amsl.com>; Mon, 26 Nov 2018 07:19:30 -0800 (PST)
Received: from mail-lf1-x130.google.com (mail-lf1-x130.google.com [IPv6:2a00:1450:4864:20::130]) (using TLSv1.2 with cipher ECDHE-RSA-AES128-GCM-SHA256 (128/128 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id 15755130F11 for <tsv-art@ietf.org>; Mon, 26 Nov 2018 07:19:28 -0800 (PST)
Received: by mail-lf1-x130.google.com with SMTP id c16so13834257lfj.8 for <tsv-art@ietf.org>; Mon, 26 Nov 2018 07:19:27 -0800 (PST)
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=rtfm-com.20150623.gappssmtp.com; s=20150623; h=mime-version:references:in-reply-to:from:date:message-id:subject:to :cc; bh=qcwOUtv5YF3G9YJ7eKo+qk7fBdWL2E16FSzzvZ2tRp4=; b=X5BdNh3YO+ypAImAj7Hd08trvUAS5pIY1dcIqKrl38UKprdOvzgV53AEKspyfyCkEK Jn1VdxmrKeCiK4XPPvtlTsllirwk1qj0AhVbRa+0+9JAC/Ya3pbDD3bTNt5gy0trAuCC pk/P+XlOKlnSmo2C3Hp3R+B4FLGPE9jmJtsPPM7GiNA6quGWhtZPawf2f3k0VyEtTZya oezJ/VbjdkKFkghBBtJq7ku5XDnGvV+vihvPIwKuZXwCFygqo/vqlSSGGXAUljXI7n4H 8q1x3O30yeGWXIXT2Yfz1wdARu7CuskHkkz/eEapKkuvspfd8DA6ONWHk2Fg5Xxcqo4E 8v+g==
X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20161025; h=x-gm-message-state:mime-version:references:in-reply-to:from:date :message-id:subject:to:cc; bh=qcwOUtv5YF3G9YJ7eKo+qk7fBdWL2E16FSzzvZ2tRp4=; b=kMFcFpK47j2VL1XAGI0CanVe0vao4xGBPQVAAG5CZ/qq/QI3QOMb5Cdbp7zgAh9e6R A0o5OTzePlt4AEwaK0FT3n2BLVNNR5CTcYOlkHDmi5nY0utk06hF5VanAi5Qc2fih9wq G424plDWb0hXH3txQciggeq2jqS6qBOjw3SvziGQTbmjbM3KybC9OFMOr9m9+EpTf4e9 04VBILfwjWzoa9O9TilWoGJmEsAKWR1jOlZq8PkJzbeFRMQrSALr8R+p1gHEpsxZ/TGk +PX0vSE7CRegLbJbiSKtP4foKDZ7CiEw/2ZCwY3G8CXicT7hsq8O9k2RJxslnRzmepXG Gnfg==
X-Gm-Message-State: AGRZ1gIG/l3XJlbgD3jS/Ry4lxXfqum+PDj5ip8Ni6QIUDqY867fp9qe uIham4EYbSPuDRfcaEEI1/kMpxl13GW6FSF464/E6g==
X-Google-Smtp-Source: AJdET5fOZR4mEgx0Mib415v6oZpy+dCRCL1ylXk5mhlHiidWr0JdzV9oqNdtJEFe+IV/tXiv59IMoLxz/oNko4hWQCM=
X-Received: by 2002:a19:54d7:: with SMTP id b84mr15436259lfl.131.1543245566174; Mon, 26 Nov 2018 07:19:26 -0800 (PST)
MIME-Version: 1.0
References: <154300282321.9639.11604402305352742547@ietfa.amsl.com> <C4886ABA-3BBE-46AE-B2D9-9A6836D7A8BB@strayalpha.com> <2c28d4ac-87de-bcaf-54e8-4e745235c800@gmail.com> <977CA53D-7F72-4443-9DE2-F75F7A7C1569@strayalpha.com> <d6deb7af-99dd-9013-2722-8ebbe00c0b37@si6networks.com> <1CB13135-D87A-4100-8668-D761058E1388@strayalpha.com> <4138e2eb-71e0-4c3d-36cb-38da8369a7c6@si6networks.com> <1BEB4C2C-0873-4D08-8A7D-1C3E30AC374F@strayalpha.com>
In-Reply-To: <1BEB4C2C-0873-4D08-8A7D-1C3E30AC374F@strayalpha.com>
From: Eric Rescorla <ekr@rtfm.com>
Date: Mon, 26 Nov 2018 07:18:49 -0800
Message-ID: <CABcZeBMw+ZS=VAtrciGEKkQodCXmP-WSGjjoGYyrK+328kCBnw@mail.gmail.com>
To: Joe Touch <touch@strayalpha.com>
Cc: Fernando Gont <fgont@si6networks.com>, IETF discussion list <ietf@ietf.org>, draft-ietf-opsec-ipv6-eh-filtering.all@ietf.org, opsec@ietf.org, tsv-art@ietf.org
Content-Type: multipart/alternative; boundary="000000000000c6049f057b92db2f"
Archived-At: <https://mailarchive.ietf.org/arch/msg/tsv-art/yS6HORtZrUNPbRkknmtYt22oLwo>
Subject: Re: [Tsv-art] Tsvart last call review of draft-ietf-opsec-ipv6-eh-filtering-06
X-BeenThere: tsv-art@ietf.org
X-Mailman-Version: 2.1.29
Precedence: list
List-Id: Transport Area Review Team <tsv-art.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/tsv-art>, <mailto:tsv-art-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/tsv-art/>
List-Post: <mailto:tsv-art@ietf.org>
List-Help: <mailto:tsv-art-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/tsv-art>, <mailto:tsv-art-request@ietf.org?subject=subscribe>
X-List-Received-Date: Mon, 26 Nov 2018 15:19:36 -0000

Picking a random message to reply to.

I'm not any kind of IPv6 expert, so I'm not taking a position on the
goodness or badness of extension headers.

With that said, we do have a fair amount of experience with trying to
deploy new protocols in the face of significant levels of network-level
filtering; TLS 1.3 was delayed by a year or so when we discovered that
there were middleboxes which made incorrect assumptions about our extension
points. At the end of the day, we got things working, but at the cost of
some not very attractive hacks, and if you look at QUIC, a lot of the
design is motivated by concealing extension points from network
intermediaries in order to avoid a replay of this scenario. Otherwise,
we're worried that we won't be able to extend the protocol in the future.

So, at least from the endpoint's perspective, a situation in which network
intermediaries block any new protocol features they don't recognize is not
really great.

-Ekr






On Mon, Nov 26, 2018 at 6:36 AM Joe Touch <touch@strayalpha.com> wrote:

>
>
> > On Nov 25, 2018, at 11:54 PM, Fernando Gont <fgont@si6networks.com>
> wrote:
> >
> > What this doc tries to do is to analyze the possible effects of
> > different types and options, and only advice to drop them when there is
> > a clear reason to do so.
>
> It claims those actions based on security. This is not a security issue.
> It is a revenue preservation issue.
>
> There is a big difference between using a protocol feature and abusing it.
> The implication that merely using some of these features is a security
> issue and an abuse is the problem with this document - and the approach of
> similar documents.
>
> Joe
>