Re: [Tsv-art] game over, EH [Tsvart last call review of draft-ietf-opsec-ipv6-eh-filtering-06]

"Brian Trammell (IETF)" <ietf@trammell.ch> Thu, 06 December 2018 10:15 UTC

Return-Path: <ietf@trammell.ch>
X-Original-To: tsv-art@ietfa.amsl.com
Delivered-To: tsv-art@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 5C3CB130DCE; Thu, 6 Dec 2018 02:15:17 -0800 (PST)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -2.6
X-Spam-Level:
X-Spam-Status: No, score=-2.6 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, RCVD_IN_DNSWL_LOW=-0.7] autolearn=ham autolearn_force=no
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id I8C1lUZXHjOi; Thu, 6 Dec 2018 02:15:15 -0800 (PST)
Received: from gozo.iway.ch (gozo.iway.ch [212.25.24.36]) (using TLSv1.2 with cipher AECDH-AES256-SHA (256/256 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id C4353129BBF; Thu, 6 Dec 2018 02:15:14 -0800 (PST)
Received: from gozo.iway.ch (localhost [127.0.0.1]) by localhost (Postfix) with ESMTP id 145B73410ED; Thu, 6 Dec 2018 11:15:12 +0100 (CET)
X-Iway-Path: 0
Received: from localhost (localhost [127.0.0.1]) by localhost (ACF/3959.24150); Thu, 6 Dec 2018 11:15:11 +0100 (CET)
Received: from switchplus-mail.ch (switchplus-mail.ch [212.25.8.236]) (using TLSv1 with cipher ECDHE-RSA-AES256-SHA (256/256 bits)) (No client certificate requested) by gozo.iway.ch (Postfix) with ESMTPS; Thu, 6 Dec 2018 11:15:11 +0100 (CET)
Received: from [195.176.113.156] (account ietf@trammell.ch HELO staff-net-etx-0133.ethz.ch) by switchplus-mail.ch (CommuniGate Pro SMTP 6.2.9) with ESMTPSA id 76244073; Thu, 06 Dec 2018 11:15:11 +0100
Content-Type: text/plain; charset="us-ascii"
Mime-Version: 1.0 (Mac OS X Mail 11.5 \(3445.9.1\))
From: "Brian Trammell (IETF)" <ietf@trammell.ch>
In-Reply-To: <9ba948f9-f286-1016-2dbd-f7056a15e744@gmail.com>
Date: Thu, 06 Dec 2018 11:15:11 +0100
Cc: Gert Doering <gert@space.net>, Christopher Morrow <morrowc.lists@gmail.com>, heard@pobox.com, tsv-art@ietf.org, opsec wg mailing list <opsec@ietf.org>, ietf <ietf@ietf.org>, draft-ietf-opsec-ipv6-eh-filtering.all@ietf.org
Content-Transfer-Encoding: quoted-printable
Message-Id: <0E79A9B9-13A0-45DC-8D7F-25554137C414@trammell.ch>
References: <CACL_3VGeJPzDhS0RVAvpQs9W8b4EODft-qJRwBD6Xxm+X6BZ6A@mail.gmail.com> <CAL9jLabK0bZz2nki=oFNHT0OrpVAB8pw7emAj2BtkHRCzkfmqQ@mail.gmail.com> <cf64abbf-e447-71e3-b983-4e525cc139aa@gmail.com> <CAL9jLaYMRDGFa7Qzj4ukRV1FPbJM40qbuZ34SYxoA30Z+h3EWw@mail.gmail.com> <20181205085227.GG1543@Space.Net> <9ba948f9-f286-1016-2dbd-f7056a15e744@gmail.com>
To: Brian E Carpenter <brian.e.carpenter@gmail.com>
X-Mailer: Apple Mail (2.3445.9.1)
Archived-At: <https://mailarchive.ietf.org/arch/msg/tsv-art/ylsjZj7q8lzZp8BBjLxQcKSJuGU>
Subject: Re: [Tsv-art] game over, EH [Tsvart last call review of draft-ietf-opsec-ipv6-eh-filtering-06]
X-BeenThere: tsv-art@ietf.org
X-Mailman-Version: 2.1.29
Precedence: list
List-Id: Transport Area Review Team <tsv-art.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/tsv-art>, <mailto:tsv-art-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/tsv-art/>
List-Post: <mailto:tsv-art@ietf.org>
List-Help: <mailto:tsv-art-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/tsv-art>, <mailto:tsv-art-request@ietf.org?subject=subscribe>
X-List-Received-Date: Thu, 06 Dec 2018 10:15:17 -0000

hi Brian, all,

> On 6 Dec 2018, at 01:14, Brian E Carpenter <brian.e.carpenter@gmail.com> wrote:
> 
> On 2018-12-05 21:52, Gert Doering wrote:
>> Hi,
>> 
>> On Tue, Dec 04, 2018 at 10:57:43PM -0500, Christopher Morrow wrote:
>>> HA! ok. As gert/nick noted ... we have Nx100G links today (at the edge) and
>>> coming nx400G ... there's just not a reasonable story for "dpi" there. (I
>>> suppose: "yet" and "without paying the approximate value Coca-Cola
>>> Companies yearly advertising budget")
>> 
>> Indeed.
>> 
>> Unfortunately, there *is* a story for being able to rate-limit incoming
>> crap by protocol type - "give me no more than 200 Mbit/s of UDP packets
>> coming from source port 53".
>> 
>> Which implies that as soon as the evil guys out there find a way to
>> generate DDoS streams carrying EHs that our border routers will (have to)
>> apply very strict rate limiting to everything they do not understand.
>> 
>> - pass TCP
>> - rate-limit UDP on well-known reflective attacks port
>> - pass rest of UDP
>> - rate-limit ICMP
>> - rate-limit fragments
>> - rate-limit all the rest to something which can never exceed a customer's
>>   access-link
>> 
>> game over, EH
> 
> Just to point out that this is equivalent to saying "game over, any new layer 4 protocol" too. For example, you just killed SCTP. And the same goes for new protocols over IPv4.

Indeed, it is, and I think it's a nice honest assessment of the current state of the Internet.

We lost the ability to deploy new layer 4 protocols (in terms of the value of the protocol or next header fields in the network layer) universally within the Internet at least a decade ago. The argument here seems to be whether we, as the IETF, want to acknowledge this fact, or not -- and all of the evidence I've seen would seem to confirm the situation is the same for HbH (and to a lesser extent, DO) EH for v6 -- and whether there are degrees of freedom to be won from said acknowledgment.

I note that current work in TSV on transport evolution pretty much seems to acknowledge this, if tacitly, for layer 4, and to actively design for this situation:

- the original concept behind TAPS, runtime transport stack agility, was designed to make "new" protocols deployable (whether over v4 or over v6) when not impaired by the network, and to fall back to less impaired protocol stacks when they are the only ones available.

- QUIC explicitly uses UDP in part because only protocols 6, 17, and to a lesser extent 1 are assumed to be widely passed in the network (and numbers from Google and RIPE Atlas, presented in MAPRG, show that even here there's about a one-in-thirty chance that a given path won't support QUIC over UDP, necessitating TCP fallback), and the primary utility of encryption of the QUIC protocol header is avoiding the deployment of in-network functions using any part of the QUIC header not explicitly designed for on-path use, thereby (we hope) keeping this decay from impairing our ability to change QUIC as it has our ability to change L4 otherwise.

Cheers,

Brian