Re: [v6ops] draft-gont-v6ops-ipv6-ehs-in-real-world: clarification text

Jeroen Massar <jeroen@massar.ch> Wed, 22 April 2015 07:22 UTC

Return-Path: <jeroen@massar.ch>
X-Original-To: v6ops@ietfa.amsl.com
Delivered-To: v6ops@ietfa.amsl.com
Received: from localhost (ietfa.amsl.com [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id BCEA51B3295 for <v6ops@ietfa.amsl.com>; Wed, 22 Apr 2015 00:22:55 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -0.601
X-Spam-Level:
X-Spam-Status: No, score=-0.601 tagged_above=-999 required=5 tests=[BAYES_05=-0.5, DKIM_SIGNED=0.1, DKIM_VALID=-0.1, DKIM_VALID_AU=-0.1, SPF_PASS=-0.001] autolearn=ham
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id HYdxdpdtots8 for <v6ops@ietfa.amsl.com>; Wed, 22 Apr 2015 00:22:53 -0700 (PDT)
Received: from bastion.ch.unfix.org (bastion.ch.unfix.org [IPv6:2a02:2528:503:2::4]) (using TLSv1.2 with cipher AECDH-AES256-SHA (256/256 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id 02E571B3263 for <v6ops@ietf.org>; Wed, 22 Apr 2015 00:22:48 -0700 (PDT)
Received: from kami.ch.unfix.org (84-73-144-213.dclient.hispeed.ch [84.73.144.213]) (using TLSv1.2 with cipher ECDHE-RSA-AES128-GCM-SHA256 (128/128 bits)) (No client certificate requested) (Authenticated sender: jeroen) by bastion.ch.unfix.org (Postfix) with ESMTPSA id E888F100E9EF3; Wed, 22 Apr 2015 07:22:43 +0000 (UTC)
DKIM-Signature: v=1; a=rsa-sha256; c=simple/simple; d=massar.ch; s=DKIM2009; t=1429687365; bh=yYnK+KSd17RoHAhZSfE5OU9lrwAUmKlHI1HrSVcYifE=; h=Date:From:To:CC:Subject:References:In-Reply-To; b=mv7rL3rEIT29YJqhrVOjrFDR3UZAXTNVsCuW1vDwvheN8zmdGr+WIz353LlghhITo ccEAjiRXaFBfDkussl7L1yZGknxU0pgJfDwSrZNsQoFE2ICTGiWJw849hOSkDGhx4C U+w/XnbAPpuULMi9f1PF6+axXyj9zPSaTy8Ym9XLjOOP4nTrR843TmE9+P94iOKtmA l3nUB7ZiUC8MbLbhs/ZEExbEeJkFui6pUejf0JqNnZd6IpaRA+ZxypFpa106UghBRR 8l/i5nydu0DrVizN60/eGhA/vfAgUNPhwdTtwktFSDbzXYsooMyFbZdvq1+XdAZyaK SskWhICbyK5bA==
Message-ID: <55374C42.7030908@massar.ch>
Date: Wed, 22 Apr 2015 09:22:42 +0200
From: Jeroen Massar <jeroen@massar.ch>
Organization: Massar
MIME-Version: 1.0
To: sthaug@nethelp.no, markzzzsmith@yahoo.com.au
References: <55374092.9000406@bogus.com> <1358113193.2147388.1429685168609.JavaMail.yahoo@mail.yahoo.com> <20150422.091227.74668510.sthaug@nethelp.no>
In-Reply-To: <20150422.091227.74668510.sthaug@nethelp.no>
Content-Type: text/plain; charset="windows-1252"
Content-Transfer-Encoding: 7bit
Archived-At: <http://mailarchive.ietf.org/arch/msg/v6ops/Cd5m2jPNhM7-cU8lDu1wFH5fLA0>
Cc: v6ops@ietf.org
Subject: Re: [v6ops] draft-gont-v6ops-ipv6-ehs-in-real-world: clarification text
X-BeenThere: v6ops@ietf.org
X-Mailman-Version: 2.1.15
Precedence: list
List-Id: v6ops discussion list <v6ops.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/v6ops>, <mailto:v6ops-request@ietf.org?subject=unsubscribe>
List-Archive: <http://www.ietf.org/mail-archive/web/v6ops/>
List-Post: <mailto:v6ops@ietf.org>
List-Help: <mailto:v6ops-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/v6ops>, <mailto:v6ops-request@ietf.org?subject=subscribe>
X-List-Received-Date: Wed, 22 Apr 2015 07:22:55 -0000

On 2015-04-22 09:12, sthaug@nethelp.no wrote:
>> So I wasn't naively asking those questions, I know what the answers were likely to be.
>> What I'd really like is for people to actually say what they want, which I think is an Internet with packets that look like
>> [IPv6 Fixed Hdr][TCP Hdr], total size <= 1280[IPv6 Fixed Hdr][UDP Hdr], total size <= 1280
>> and that is it.
>> The consequence would be to deprecate many existing protocols and making them work over fragment unnecessary TCP or UDP.
> 
> I see no reason to deprecate IPv6 EHs. But I need 
> 
>  [IPv6 Fixed Hdr] + [IPv6 EHs] + [L4 Hdr] <= hardware inspection limit
> 
> in order for the router hardware to be able to filter based on TCP/UDP
> headers at line rate.

The nasty answer to such a statement is: increase your hardware
inspection limit.


But the easier one, that works today is that very likely your DNS
servers recursing IP space is dedicated.

Hence, any packet headed toward those addresses is "private" and should
not get an answer.

Thus, instead of doing filtering on L4, why not just not route those
packets at all (L3)? Don't even have to firewall it.


My printer for instance has a nice global address, but as the border
router does not forward packets from $internet to $printer-net, a
traceroute or anything else ends up in a simple !N.

No per-port inspection needed, just plain old good routing.



Btw, does your hardware-load-balancer inspect ICMPv6 to do stateless
flow routing for ICMPv6 errors to the correct host? Or are you also just
fumbling with ICMPv6 PTBs like Amazon (+NetFlix) & Google?

Greets,
 Jeroen