Re: [v6ops] Thoughts about wider operational input

Mark Smith <markzzzsmith@gmail.com> Sat, 02 April 2022 02:31 UTC

Return-Path: <markzzzsmith@gmail.com>
X-Original-To: v6ops@ietfa.amsl.com
Delivered-To: v6ops@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 15D6D3A0D35 for <v6ops@ietfa.amsl.com>; Fri, 1 Apr 2022 19:31:25 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -4.611
X-Spam-Level:
X-Spam-Status: No, score=-4.611 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, DKIM_SIGNED=0.1, DKIM_VALID=-0.1, DKIM_VALID_AU=-0.1, DKIM_VALID_EF=-0.1, FREEMAIL_FROM=0.001, FROM_LOCAL_NOVOWEL=0.5, HK_RANDOM_ENVFROM=0.998, HK_RANDOM_FROM=0.998, HTML_MESSAGE=0.001, RCVD_IN_DNSWL_HI=-5, SPF_HELO_NONE=0.001, SPF_PASS=-0.001, T_SCC_BODY_TEXT_LINE=-0.01, URIBL_BLOCKED=0.001] autolearn=ham autolearn_force=no
Authentication-Results: ietfa.amsl.com (amavisd-new); dkim=pass (2048-bit key) header.d=gmail.com
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id Y35W-80-xMSZ for <v6ops@ietfa.amsl.com>; Fri, 1 Apr 2022 19:31:20 -0700 (PDT)
Received: from mail-pf1-x42f.google.com (mail-pf1-x42f.google.com [IPv6:2607:f8b0:4864:20::42f]) (using TLSv1.2 with cipher ECDHE-RSA-AES128-GCM-SHA256 (128/128 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id E8CF83A0D1A for <v6ops@ietf.org>; Fri, 1 Apr 2022 19:31:19 -0700 (PDT)
Received: by mail-pf1-x42f.google.com with SMTP id b13so4263075pfv.0 for <v6ops@ietf.org>; Fri, 01 Apr 2022 19:31:19 -0700 (PDT)
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=gmail.com; s=20210112; h=mime-version:references:in-reply-to:from:date:message-id:subject:to :cc; bh=rAYDPEQK665u8uiONPa+bE+1LNwZwKMs1xe/JmSy4c8=; b=IlG+IUxBim+1l7RImeZdBu5hOJckqlr/L1d+Nw5NWbbLKw1K/5a47kWMzrsURiMBKM qkt1Ncva4jDa8fAzZcrONcI6SE1DKrKSn6iWWzgnV3bj2Lso02u3tQcv709WDHYqNdf3 CvyFDFI3FVP0QF8YNgjcaweiNn/uw+cqqzH3CGVnpb3FclB9rR5PVa3+3zONQr0bsCss ceF1vzL7t2VbhAop5FeL2q8Lmv8EQpG1yam7hpZUhD85qgH8/QkJt6DbwI7FCyWHL0bU 5akHOXsKM6LfwC5tzlBB/n8SfRi4UVk5oyomnDSQT/jPAxM7RLgcUBABcLpOQES5Eylj SyXg==
X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20210112; h=x-gm-message-state:mime-version:references:in-reply-to:from:date :message-id:subject:to:cc; bh=rAYDPEQK665u8uiONPa+bE+1LNwZwKMs1xe/JmSy4c8=; b=ri5HlYkhHiqKOt1j9Fs1hXAT7zg87cZQs4EomSifiuQiFkjDZwUnxJ09/GxVIfJWFR T4iwvY/rIxuFarn9LmAo1J4eGTqTmxGjCfF0eRTPUmsqfKauLkPTivM3+QGVsPmo7Hkg eLhLnjjyJRoXqR6Cmo0MPm0eXG+YqeVyeG3QGc6RnyECeuN4IhyFili5MBdD43sciGNh k2WcwV0uKxj8pvv6edbPFEQzB9ztNj2kFypg3gcb8bd3NxzqbmnzuaSCVBB74DDcsLqT aL8GIK0J6pt3OqkuGVIrF0sw+oi0+M8/1LE+iTa+t99zF+qT0hqpvgpaG9Nu4Bd9ipra uRrw==
X-Gm-Message-State: AOAM532h6A4y/0fbIuWfUXRbVu82+GE3GG2vNwp/e1WklPv671l8JRhy v7GXAo+UG7ODbfY+TtTQVOuUYXMerz4eG3+cDVfHpeZw
X-Google-Smtp-Source: ABdhPJw41dNREUl9LEVaCBSprfKLD9v9mC4I3bF3PYgqAbSU5MV4qGWeBC1qGQ83hawQGKWQtmQWdSoiE/Nec2i7vKw=
X-Received: by 2002:a63:6c8a:0:b0:398:5208:220a with SMTP id h132-20020a636c8a000000b003985208220amr17540890pgc.176.1648866678579; Fri, 01 Apr 2022 19:31:18 -0700 (PDT)
MIME-Version: 1.0
References: <52661a3d-75dc-111a-3f23-09b10d7cb8d4@gmail.com> <9175dc32-45c1-e948-c20a-3bcc958b77b9@gmail.com> <YjmJQMNgnJoSInUw@Space.Net> <D75EF08F-6A41-41B2-AFB2-649CBCC1D83E@consulintel.es> <CAPt1N1nRnYUFA=yyJHx6t52yqWbmcd2Tf1H8gQuCZBd3Q3VqJw@mail.gmail.com> <7F4AEB43-4B24-4A21-AE9D-3EB512B98C46@consulintel.es> <8fac4314b8244ba6b33eea68694296d0@huawei.com> <9A13E47B-75D0-443F-9EE9-D2917ACB2D0F@consulintel.es> <CAO42Z2xUG+BXj+VQpajed9aGjH+q-HR7RX7C-T4DsTbouz7xWQ@mail.gmail.com> <F6A90BBF-7F44-403E-960A-8F756353B562@chinatelecom.cn> <B49417F7-3EFB-4A4D-9D1A-0D21574EA4F2@consulintel.es> <44B01ACA-3D5C-4618-B608-3B3479D29875@consulintel.es> <62447DCB.1010206@jmaimon.com> <7228D9A7-54A8-4BAE-9299-204C049F600B@consulintel.es> <6244BA91.3060306@jmaimon.com> <67762447-43D4-4393-851C-99370D3BF623@thehobsons.co.uk> <6246126C.1030609@jmaimon.com> <259B108A-C3DD-4460-B41A-A0028ACA9594@thehobsons.co.uk> <624759B1.8060700@jmaimon.com> <89D652EB-8920-4992-99EC-CC3C3A856D57@thehobsons.co.uk> <62477058.6020901@jmaimon.com>
In-Reply-To: <62477058.6020901@jmaimon.com>
From: Mark Smith <markzzzsmith@gmail.com>
Date: Sat, 02 Apr 2022 13:31:06 +1100
Message-ID: <CAO42Z2wFuXYfGZf45Hc2vuVhE745yCcfjAhdZmvj18mqpS8PhA@mail.gmail.com>
To: Joe Maimon <jmaimon@jmaimon.com>
Cc: Simon <linux@thehobsons.co.uk>, v6ops list <v6ops@ietf.org>
Content-Type: multipart/alternative; boundary="000000000000a8a3df05dba2b05e"
Archived-At: <https://mailarchive.ietf.org/arch/msg/v6ops/INVxm9MYG6Y2KHZsjW7FEGloxp8>
Subject: Re: [v6ops] Thoughts about wider operational input
X-BeenThere: v6ops@ietf.org
X-Mailman-Version: 2.1.29
Precedence: list
List-Id: v6ops discussion list <v6ops.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/v6ops>, <mailto:v6ops-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/v6ops/>
List-Post: <mailto:v6ops@ietf.org>
List-Help: <mailto:v6ops-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/v6ops>, <mailto:v6ops-request@ietf.org?subject=subscribe>
X-List-Received-Date: Sat, 02 Apr 2022 02:31:25 -0000

On Sat, 2 Apr 2022, 08:38 Joe Maimon, <jmaimon@jmaimon.com> wrote:

>
>
> Simon wrote:
>
> > Identifying endpoints in a consistent fashion is trivially easy - you
> use its IP address*.
>
> Which you know because you have successful communications with it.
>
> What you dont know is what IP address YOU have from the point of view of
> the other endpoint. And the assumption that you do requires that the
> network not change it in any way.
>
> Which if you consider it carefully, there never was any such guarantee.
> It was just the path of least resistance.
>


That's not correct at all.

The IPv4 header checksum covers the SA and DA. They're not meant to be
changed in flight because they're protected by a checksum, used to detect
when they're changed, accidentally (which of course also means it can
detect them being changed intentionally too.)

IPv6 removed the header checksum for performance reasons, however still
preserved SA and DA protection in the transport layer pseudo-header
checksums.

Additionally, IPsec AH strongly protects the IPv4 and IPv6 SAs and DAs
against both accidental and malicious modification. IPsec originally was
mandatory for IPv6, indicating strong protection of SAs and DAs is
required. It was only loosened to suit low powered devices.



>
> >   It is only if the network starts mangling the address that it becomes
> non-trivial. “The internet” has never been "free to translate packets
> addressing between them for whatever reasons they want” for the simple
> reason that doing so breaks stuff.
>
> But you are free to break stuff. So the network was always free to do so
> and building on the assumption that it never would turns out have been
> not the flawless design otherwise thought.
>

No it was not. Read RFC2993. If there were not architectural or other
implications of NAT we wouldn't have many RFCs identifying the issues with
NAT, protocols to work around their implications (STUN and TURN), nor a
statement from the IAB about not having NAT in IPv6 - see RFC5902.


> > As far as I can see, you're taking a starting point that it’s OK for
> “the network” to mangle packets (specifically addresses), and then using
> that to justify everything else. You’ve cited an RFC to support your
> viewpoint, but my reading of that RFC says “don’t mangle packets because it
> breaks things”.
>
> Did the network every come with an explicit guarantee that the source
> address of a packet would not get changed once it left the host?
>
> Or was that just an implicit assumption? Citation please.
>

RFC791.

RFC8200.

RFC2993.

RFC5902.

And from a network operator's perspective,

"The Trouble with NAT"
https://blog.apnic.net/2016/10/26/trouble-nat-part-2/

>
> >
> > * Yes, the IP address you use needs to remain stable for the duration of
> the session.
> >
> >
> > So, serious question. How do you read the RFC you cited and come to the
> conclusion that “the internet” has always been free to mangle addresses in
> any way it likes” ?
> >
> > Simon
> >
> >
>
> I read the RFC and I see that it says if you are going to use endpoints
> identifiers you need to ensure they are consistent. And if they belong
> to other protocol layers and traverse a network you do not control, more
> than an assumption is required for that sort of reliable behavior.
>
> Joe
>
> _______________________________________________
> v6ops mailing list
> v6ops@ietf.org
> https://www.ietf.org/mailman/listinfo/v6ops
>