Re: [v6ops] Limiting the size of the IPv6 header chain (draft-ietf-6man-oversized-header-chain)

Brian E Carpenter <brian.e.carpenter@gmail.com> Tue, 11 June 2013 03:56 UTC

Return-Path: <brian.e.carpenter@gmail.com>
X-Original-To: v6ops@ietfa.amsl.com
Delivered-To: v6ops@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 6C31E11E80DE; Mon, 10 Jun 2013 20:56:18 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -102.232
X-Spam-Level:
X-Spam-Status: No, score=-102.232 tagged_above=-999 required=5 tests=[AWL=-0.233, BAYES_00=-2.599, J_CHICKENPOX_13=0.6, USER_IN_WHITELIST=-100]
Received: from mail.ietf.org ([12.22.58.30]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id TZJomg17poCz; Mon, 10 Jun 2013 20:56:17 -0700 (PDT)
Received: from mail-pa0-x229.google.com (mail-pa0-x229.google.com [IPv6:2607:f8b0:400e:c03::229]) by ietfa.amsl.com (Postfix) with ESMTP id C926221F9633; Mon, 10 Jun 2013 20:56:17 -0700 (PDT)
Received: by mail-pa0-f41.google.com with SMTP id bj3so3896882pad.14 for <multiple recipients>; Mon, 10 Jun 2013 20:56:17 -0700 (PDT)
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=gmail.com; s=20120113; h=message-id:date:from:organization:user-agent:mime-version:to:cc :subject:references:in-reply-to:content-type :content-transfer-encoding; bh=Z2ZK6SQ1/wC0Hy2lhjQ1RqE6XtSaE0+nmMyDnZ+KWao=; b=ZuTNTuYH9AANl3jo1C4Mc2fqX8W5WaW5Nx94oYma/2KQzoD8pNCL43mBhdAcm2MTpE 2f6jWzYCCe7c88VHd2OQ1oWz8qfinXdAMfIl1GqHCy/op33zJuVEKfnAFxFoVhUcEeZf 45YTmKoUZ/JNSlfngQZFvTuwVILIxk5S0Rhdy1zhc4Oe9gl5VRDXUqF3bQKRHmMMxO/k W54/IpiXJcE2XPuORswIDMRdl+6HYofH/8hvdYLZsvj8K1PWkjKorrlCFwTiYuiEBeHj 5DXAv87oLf1wDwSgI6jWJynsmfwkyq+KC9nygcVabCaPm4C5kJrpUKvVij4qAWwZDZWZ 9p1w==
X-Received: by 10.68.191.167 with SMTP id gz7mr12994844pbc.16.1370922977541; Mon, 10 Jun 2013 20:56:17 -0700 (PDT)
Received: from [192.168.1.2] (30.211.252.27.dyn.cust.vf.net.nz. [27.252.211.30]) by mx.google.com with ESMTPSA id fr1sm12780002pbb.26.2013.06.10.20.56.14 for <multiple recipients> (version=TLSv1 cipher=ECDHE-RSA-RC4-SHA bits=128/128); Mon, 10 Jun 2013 20:56:16 -0700 (PDT)
Message-ID: <51B69FDB.1090809@gmail.com>
Date: Tue, 11 Jun 2013 15:56:11 +1200
From: Brian E Carpenter <brian.e.carpenter@gmail.com>
Organization: University of Auckland
User-Agent: Thunderbird 2.0.0.6 (Windows/20070728)
MIME-Version: 1.0
To: "cb.list6" <cb.list6@gmail.com>
References: <51B6876A.9020202@si6networks.com> <CAD6AjGRuSShUNWE=Dy_e+Y3sVAro-nwyvD8wYy11wN=MfsTXDg@mail.gmail.com> <51B69AB8.3080502@gmail.com> <CAD6AjGSf3LQjfiT-hmKdoDTGxjEQeVSRwUvRKehx=BpNASX7Ww@mail.gmail.com>
In-Reply-To: <CAD6AjGSf3LQjfiT-hmKdoDTGxjEQeVSRwUvRKehx=BpNASX7Ww@mail.gmail.com>
Content-Type: text/plain; charset="UTF-8"
Content-Transfer-Encoding: 7bit
Cc: Fernando Gont <fgont@si6networks.com>, IPv6 Ops WG <v6ops@ietf.org>, 6man@ietf.org
Subject: Re: [v6ops] Limiting the size of the IPv6 header chain (draft-ietf-6man-oversized-header-chain)
X-BeenThere: v6ops@ietf.org
X-Mailman-Version: 2.1.12
Precedence: list
List-Id: v6ops discussion list <v6ops.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/v6ops>, <mailto:v6ops-request@ietf.org?subject=unsubscribe>
List-Archive: <http://www.ietf.org/mail-archive/web/v6ops>
List-Post: <mailto:v6ops@ietf.org>
List-Help: <mailto:v6ops-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/v6ops>, <mailto:v6ops-request@ietf.org?subject=subscribe>
X-List-Received-Date: Tue, 11 Jun 2013 03:56:18 -0000

On 11/06/2013 15:44, cb.list6 wrote:
> On Jun 10, 2013 8:34 PM, "Brian E Carpenter" <brian.e.carpenter@gmail.com>
> wrote:
>> On 11/06/2013 15:21, cb.list6 wrote:
>>> On Jun 10, 2013 7:23 PM, "Fernando Gont" <fgont@si6networks.com> wrote:
>>>> Folks,
>>>>
>>>> We're currently editing the aforementioned I-D. So far, the I-D just
>>>> required that the entire IPv6 header chain be present in the first
>>> fragment.
>>>> Based on recent/ongoing discussions on the 6man and v6ops lists, there
>>>> seems to be quite a few folks pushing the idea of limiting the size f
>>>> the IPv6 header chain to some value (typically in the order of a few
>>>> hundred bytes).
>>>>
>>>> An earlier version of draft-ietf-6man-oversized-header-chain limited
> the
>>>> header chain to 1280 bytes, but this requirement was later removed.
>>>>
>>>> However, since then a number of folks have produced real world data
>>>> which indicates that packets "won't make it to the destination node" if
>>>> the header chain is larger than a few hundred bytes, and I believe
> that,
>>>> overall, our understanding of the problem and situation has increased
>>>> since then.
>>>>
>>>> My question to th wg is:
>>>>
>>>> 1) Do we want to limit the size of the IPv6 header chain?
>>>>
>>>> 2) If so, which limit should we pick?
>>>>
>>> It's not the size, it is how you use it.
>>>
>>> I would suggest "common types" be permitted (tcp, udp, sctp, icmpv6,
> frag,
>>> esp, ah) while anything else must be behind an esp. This ensures all
>>> parties agree that further arbitrary headers will only be processed by
> the
>>> concenting end systems.
>> Truly, you won't get consensus for that; it isn't realistic. I think we're
>> already very near consensus on an unconstrained limit in the 128/256
>> area.
>>
>>     Brian
>>
> 
> Concenus from who? Ghosts of protocols past? Or what one fellow calls the
> "ipv6 priesthood" Is this yet another RA vs DHCPv6 disconnect?

No, from the discussion on these two lists in the last
week or so.
> 
> But what does 128/256 mean to a network operator? Load balancer or fw or
> router vendor?

It means the size that leading-edge hw can inspect at line speed,
from what a number of operators have been saying.

> 
> I believe meaningful guidance must be provided in terms of permutations
> that can be expressed in what the common folk call an "access list".

That's a second level issue and it isn't future-proof. It may well be
useful to document reasonable and unreasonable combinations of
extension headers, in terms of expectations of what firewalls might
be looking for, but there's no one-size-fits-all answer, especially
when you include extensions that haven't been invented yet.

> 
> Simply saying that there can be arbitrary chaining of x bytes long does not
> benefit anyone in a practical way, afaik.

IMHO it does; for a start it makes it clear that (say) 257 bytes of
headers have a vanishingly small chance of getting through the
network, and that's much more guidance than we give today. And it
gives hardware designers a target that seems to relate to reality.

    Brian
> 
> CB
> 
>>> CB
>>>> Thanks!
>>>>
>>>> Best regards,
>>>> --
>>>> Fernando Gont
>>>> SI6 Networks
>>>> e-mail: fgont@si6networks.com
>>>> PGP Fingerprint: 6666 31C6 D484 63B2 8FB1 E3C4 AE25 0D55 1D4E 7492
>>>>
>>>>
>>>>
>>>>
>>>> --------------------------------------------------------------------
>>>> IETF IPv6 working group mailing list
>>>> ipv6@ietf.org
>>>> Administrative Requests: https://www.ietf.org/mailman/listinfo/ipv6
>>>> --------------------------------------------------------------------
>>>
>>> ------------------------------------------------------------------------
>>>
>>> --------------------------------------------------------------------
>>> IETF IPv6 working group mailing list
>>> ipv6@ietf.org
>>> Administrative Requests: https://www.ietf.org/mailman/listinfo/ipv6
>>> --------------------------------------------------------------------
>