Re: [v6ops] [OPSEC] [IPv6] Why folks are blocking IPv6 extension headers? (Episode 1000 and counting) (Linux DoS)

Bob Natale <RNATALE@mitre.org> Mon, 22 May 2023 14:17 UTC

Return-Path: <RNATALE@mitre.org>
X-Original-To: v6ops@ietfa.amsl.com
Delivered-To: v6ops@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 0E6A9C15152E; Mon, 22 May 2023 07:17:54 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -7.096
X-Spam-Level:
X-Spam-Status: No, score=-7.096 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, DKIM_SIGNED=0.1, DKIM_VALID=-0.1, DKIM_VALID_AU=-0.1, DKIM_VALID_EF=-0.1, HTML_MESSAGE=0.001, RCVD_IN_DNSWL_HI=-5, RCVD_IN_ZEN_BLOCKED_OPENDNS=0.001, SPF_PASS=-0.001, URIBL_BLOCKED=0.001, URIBL_DBL_BLOCKED_OPENDNS=0.001, URIBL_ZEN_BLOCKED_OPENDNS=0.001] autolearn=ham autolearn_force=no
Authentication-Results: ietfa.amsl.com (amavisd-new); dkim=pass (1024-bit key) header.d=mitre.org
Received: from mail.ietf.org ([50.223.129.194]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id eOucDQd-cvuA; Mon, 22 May 2023 07:17:50 -0700 (PDT)
Received: from smtpvmsrv1.mitre.org (smtpvmsrv1.mitre.org [192.52.194.136]) (using TLSv1.3 with cipher TLS_AES_256_GCM_SHA384 (256/256 bits) key-exchange X25519 server-signature RSA-PSS (2048 bits) server-digest SHA256) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id 5C7ADC151532; Mon, 22 May 2023 07:17:48 -0700 (PDT)
Received: from smtpvmsrv1.mitre.org (localhost.localdomain [127.0.0.1]) by localhost (Postfix) with SMTP id 47D91172001F; Mon, 22 May 2023 10:17:47 -0400 (EDT)
Received: from smtpxrhmv1.mitre.org (unknown [192.52.194.155]) (using TLSv1.3 with cipher TLS_AES_256_GCM_SHA384 (256/256 bits) key-exchange X25519 server-signature RSA-PSS (4096 bits)) (No client certificate requested) by smtpvmsrv1.mitre.org (Postfix) with ESMTPS id 92CC81720027; Mon, 22 May 2023 10:17:46 -0400 (EDT)
Received: from GCC02-DM3-obe.outbound.protection.outlook.com (mail-dm3gcc02lp2103.outbound.protection.outlook.com [104.47.65.103]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by smtpxrhmv1.mitre.org (Postfix) with ESMTPS id 6EB7D413DC7; Mon, 22 May 2023 10:17:46 -0400 (EDT)
ARC-Seal: i=1; a=rsa-sha256; s=arcselector9901; d=microsoft.com; cv=none; b=EUUm1eqcPXLQB2NbBqwQbCnhj6cNuGWlO1ZuSJ8YdS1+2qIbhDwIwCj/3TwZ5Obe8+88vIKPkfIlP/zyBoTXOqsRVO4iuPTYXAQtCImPA2n6tl5Uyml2jqbovL3ebFlQ5UZ6jyIzBPRT2OILdEdk+flFA76o0+I57UtnqhKljYxIpa4ahlcKO48r6cgXCMQcA412ChsyS1A/UGYnM7vKgHPVBOBC7HkLm44FadyaqmHZ8ShQDNBGswKXqTnfALTnbV6aiC9eDa1JB1Q76DAsY2A3oXiCJOOkw0BB/B99BQcXZEsyr5gZoTa9tFX62VbTX0TUOKTm3t8BbvQ4jyax8Q==
ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=microsoft.com; s=arcselector9901; h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-AntiSpam-MessageData-ChunkCount:X-MS-Exchange-AntiSpam-MessageData-0:X-MS-Exchange-AntiSpam-MessageData-1; bh=kaAePfSvYnO/3KyaXhLx9maVYYeN+BZ4e4W1xSuI+Tw=; b=aDmiMQiiBw7zVCSxgWuwLot5SdFXPVOWyHR1kZVSiBQPwfrPQKz+7F45YWGvEh/UauAZNDzejDzuIeVCpG6nlueI/yXmqN2m+McWY+qGwxTTNLD/gygJQPl0nGh7DrpDZCVSSSaHT4C8nbzIu18QZSydu85H7M7EGSGz04Obf4HzFil2ilNu+8bGUEX56FO2v66vdED8bjAATj4Lv+WarZmUdPjCsBePE/pLsJ18q8zQMlVcYwvOxNoRgTTajF3RqGVTT4egrRuiGdviXuK7ajxkoYZFcBeDs/u708LOctjlql+SyZWe3XII2oiRDeHZvVHvX+fM3tyQ0h62Ggljdg==
ARC-Authentication-Results: i=1; mx.microsoft.com 1; spf=pass smtp.mailfrom=mitre.org; dmarc=pass action=none header.from=mitre.org; dkim=pass header.d=mitre.org; arc=none
Received: from MN2PR09MB4716.namprd09.prod.outlook.com (2603:10b6:208:216::19) by SA1PR09MB9909.namprd09.prod.outlook.com (2603:10b6:806:275::9) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id 15.20.6411.28; Mon, 22 May 2023 14:17:43 +0000
Received: from MN2PR09MB4716.namprd09.prod.outlook.com ([fe80::303a:412d:814:e674]) by MN2PR09MB4716.namprd09.prod.outlook.com ([fe80::303a:412d:814:e674%5]) with mapi id 15.20.6411.028; Mon, 22 May 2023 14:17:43 +0000
From: Bob Natale <RNATALE@mitre.org>
To: "nalini.elkins@insidethestack.com" <nalini.elkins@insidethestack.com>, Tom Herbert <tom=40herbertland.com@dmarc.ietf.org>, Nick Buraglio <buraglio@forwardingplane.net>
CC: Fernando Gont <fgont@si6networks.com>, "6man@ietf.org" <6man@ietf.org>, V6 Ops List <v6ops@ietf.org>, opsec WG <opsec@ietf.org>
Thread-Topic: [OPSEC] [v6ops] [IPv6] Why folks are blocking IPv6 extension headers? (Episode 1000 and counting) (Linux DoS)
Thread-Index: AQHZjLgs3ZX834DZ3kWcw64uleu9Bw==
Date: Mon, 22 May 2023 14:17:42 +0000
Message-ID: <MN2PR09MB471666DBA6479BB3076B3E55A8439@MN2PR09MB4716.namprd09.prod.outlook.com>
References: <11087a11-476c-5fb8-2ede-e1b3b6e95e48@si6networks.com> <CALx6S343f_FPXVxuZuXB4j=nY-SuTEYrnxb3O5OQ3fv5uPwT8g@mail.gmail.com> <CAN-Dau1pTVr6ak9rc9x7irg+aLhq0N8_WOyySqx5Syt74HMX=g@mail.gmail.com> <a087b963-1e12-66bf-b93e-5190ce09914b@si6networks.com> <CWXP265MB515321A0E0A91CD66260C26CC27F9@CWXP265MB5153.GBRP265.PROD.OUTLOOK.COM> <CALx6S35py1b6EyS3UeT8JvgwN-w8wBtprCn9OJSCS-nvfQ_L-A@mail.gmail.com> <CAGB08_djDtrFRY37ZTH_draGLTxM3vO7bMfT6YyyKFrTH_Tx5w@mail.gmail.com> <17955_1684421652_64663C14_17955_115_1_1200504588.3592661.1684421597958@mail.yahoo.com>
In-Reply-To: <17955_1684421652_64663C14_17955_115_1_1200504588.3592661.1684421597958@mail.yahoo.com>
Accept-Language: en-US
Content-Language: en-US
X-MS-Has-Attach:
X-MS-TNEF-Correlator:
authentication-results: dkim=none (message not signed) header.d=none;dmarc=none action=none header.from=mitre.org;
x-ms-publictraffictype: Email
x-ms-traffictypediagnostic: MN2PR09MB4716:EE_|SA1PR09MB9909:EE_
x-ms-office365-filtering-correlation-id: a5319054-d39e-46c0-eb9b-08db5acf4ed5
x-ms-exchange-senderadcheck: 1
x-ms-exchange-antispam-relay: 0
x-microsoft-antispam: BCL:0;
x-microsoft-antispam-message-info: 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
x-forefront-antispam-report: CIP:255.255.255.255; CTRY:; LANG:en; SCL:1; SRV:; IPV:NLI; SFV:NSPM; H:MN2PR09MB4716.namprd09.prod.outlook.com; PTR:; CAT:NONE; SFS:(13230028)(366004)(451199021)(498600001)(186003)(54906003)(110136005)(71200400001)(66446008)(5660300002)(26005)(966005)(66476007)(7696005)(4326008)(64756008)(6506007)(52536014)(8676002)(8936002)(53546011)(21615005)(9686003)(2906002)(66574015)(83380400001)(66946007)(76116006)(66556008)(122000001)(166002)(66899021)(38100700002)(38070700005)(55016003)(33656002)(40140700001)(86362001)(221023011); DIR:OUT; SFP:1101;
x-ms-exchange-antispam-messagedata-chunkcount: 1
x-ms-exchange-antispam-messagedata-0: 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
Content-Type: multipart/alternative; boundary="_000_MN2PR09MB471666DBA6479BB3076B3E55A8439MN2PR09MB4716namp_"
MIME-Version: 1.0
X-MS-Exchange-AntiSpam-ExternalHop-MessageData-ChunkCount: 1
X-MS-Exchange-AntiSpam-ExternalHop-MessageData-0: 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
X-OriginatorOrg: mitre.org
X-MS-Exchange-CrossTenant-AuthAs: Internal
X-MS-Exchange-CrossTenant-AuthSource: MN2PR09MB4716.namprd09.prod.outlook.com
X-MS-Exchange-CrossTenant-Network-Message-Id: a5319054-d39e-46c0-eb9b-08db5acf4ed5
X-MS-Exchange-CrossTenant-originalarrivaltime: 22 May 2023 14:17:42.9898 (UTC)
X-MS-Exchange-CrossTenant-fromentityheader: Hosted
X-MS-Exchange-CrossTenant-id: c620dc48-1d50-4952-8b39-df4d54d74d82
X-MS-Exchange-Transport-CrossTenantHeadersStamped: SA1PR09MB9909
X-MITRE: 8GQsMWxq66rxk57w
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=mitre.org; h=from:to:cc:subject:date:message-id:references:in-reply-to:content-type:mime-version; s=mZkevYdL; bh=kaAePfSvYnO/3KyaXhLx9maVYYeN+BZ4e4W1xSuI+Tw=; b=Jg9AmlB+VW8AAhKw307BWZYYQ12eZAckN1jhQlpHPx1q47HjuN4cWv/zdkAkNJ7/o1eWG7n5RkWX9HpOIm6qQHmsj5FMiNN7DmbsleGbiyKuCAkSOnonqyeJ0DbnsalPxjYSGZ0SrN3tuK6X0kmBLptw0nV8OivzZ0BF73q0jKE=
Archived-At: <https://mailarchive.ietf.org/arch/msg/v6ops/KmRENm0zeBixGnY4DzTYNAJuAl0>
Subject: Re: [v6ops] [OPSEC] [IPv6] Why folks are blocking IPv6 extension headers? (Episode 1000 and counting) (Linux DoS)
X-BeenThere: v6ops@ietf.org
X-Mailman-Version: 2.1.39
Precedence: list
List-Id: v6ops discussion list <v6ops.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/v6ops>, <mailto:v6ops-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/v6ops/>
List-Post: <mailto:v6ops@ietf.org>
List-Help: <mailto:v6ops-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/v6ops>, <mailto:v6ops-request@ietf.org?subject=subscribe>
X-List-Received-Date: Mon, 22 May 2023 14:17:54 -0000

From way up in the nose-bleed section for lurkers:
> Although, IMHO one of the points of extension headers is that they can be used to extend the protocol for purposes which we cannot think of today!

Something tells me that’s a bad idea for Internet-grade (and similar) standard protocols … just sounds “looser” (i.e., congenitally riskier and ultimately “messier”) than defined options or profiles. New uses should require protocol updates via the standard process or new protocols. Is that an utterly naïve position and the Internet cannot live without protocols that do not include undefined “extensions” for purposes we cannot think of at the time the protocols are standardized?

Lurking with a bit of vertigo now 😊,
BobN

From: OPSEC <opsec-bounces@ietf.org> On Behalf Of nalini.elkins@insidethestack.com
Sent: Thursday, May 18, 2023 10:53 AM
To: Tom Herbert <tom=40herbertland.com@dmarc.ietf.org>; Nick Buraglio <buraglio@forwardingplane.net>
Cc: Fernando Gont <fgont@si6networks.com>; 6man@ietf.org; V6 Ops List <v6ops@ietf.org>; opsec WG <opsec@ietf.org>
Subject: [EXT] Re: [OPSEC] [v6ops] [IPv6] Why folks are blocking IPv6 extension headers? (Episode 1000 and counting) (Linux DoS)

Nick,

> neither really have use cases

I think a use cases document is a great idea!  Although, IMHO one of the points of extension headers is that they can be used to extend the protocol for purposes which we cannot think of today!

Thanks,

Nalini Elkins
CEO and Founder
Inside Products, Inc.
www.insidethestack.com<http://www.insidethestack.com>
(831) 659-8360


On Thursday, May 18, 2023 at 07:49:50 AM PDT, Nick Buraglio <buraglio@forwardingplane.net<mailto:buraglio@forwardingplane.net>> wrote:


Is there any document that details the current operational best practices or explains the EH options and use cases in a succinct document? I didn't find one (although I did not look terribly hard). If not, that sounds like an opportunity to work through them and create one, perhaps?
Nalani has a deep dive study here https://www.ietf.org/archive/id/draft-elkins-v6ops-eh-deepdive-fw-01.html and https://datatracker.ietf.org/doc/draft-elkins-v6ops-eh-deepdive-cdn/ but I wasn't able to find a list with some use cases akin to the ND considerations draft here https://datatracker.ietf.org/doc/draft-ietf-v6ops-nd-considerations/
RFC7045 has a decent, and RFC2460 explains what they are but neither really have use cases.

nb

On Thu, May 18, 2023 at 9:33 AM Tom Herbert <tom=40herbertland.com@dmarc.ietf.org<mailto:40herbertland.com@dmarc.ietf.org>> wrote:
On Thu, May 18, 2023 at 7:24 AM Andrew Campling
<andrew.campling@419.consulting<mailto:andrew.campling@419.consulting>> wrote:
>
> I wonder if part of the issue here is that insufficient attention is being given to operational security matters and too much weight is given to privacy in protocol development, irrespective of the security implications (which is of course ultimately detrimental to security anyway)?

Andrew,

There is work being done to address the protocol "bugs" of extension
headers. See 6man-hbh-processing and 6man-eh-limits for instance.

Tom

>
> Andrew
>
>
> From: OPSEC <opsec-bounces@ietf.org<mailto:opsec-bounces@ietf.org>> on behalf of Fernando Gont <fgont@si6networks.com<mailto:fgont@si6networks.com>>
> Sent: Thursday, May 18, 2023 2:19 pm
> To: David Farmer <farmer@umn.edu<mailto:farmer@umn.edu>>; Tom Herbert <tom=40herbertland.com@dmarc.ietf.org<mailto:40herbertland.com@dmarc.ietf.org>>
> Cc: 6man@ietf.org<mailto:6man@ietf.org> <6man@ietf.org<mailto:6man@ietf.org>>; V6 Ops List <v6ops@ietf.org<mailto:v6ops@ietf.org>>; opsec WG <opsec@ietf.org<mailto:opsec@ietf.org>>
> Subject: Re: [OPSEC] [IPv6] Why folks are blocking IPv6 extension headers? (Episode 1000 and counting) (Linux DoS)
>
> Hi, David,
>
> On 18/5/23 02:14, David Farmer wrote:
> >
> >
> > On Wed, May 17, 2023 at 13:57 Tom Herbert
> > <tom=40herbertland.com@dmarc.ietf.org<mailto:40herbertland.com@dmarc.ietf.org>
> > <mailto:40herbertland.com@dmarc.ietf.org<mailto:40herbertland.com@dmarc.ietf.org>>> wrote:
> [...]
> >
> > Maximum security is rarely the objective, I by no means have maximum
> > security at my home. However, I don’t live in the country where some
> > people still don’t even lock there doors. I live in a a city, I have
> > decent deadbolt locks and I use them.
> >
> [....]
> >
> > So, I’m not really happy with the all or nothing approach the two of you
> > seem to be offering for IPv6 extension headers, is there something in
> > between? If not, then maybe that is what we need to be working towards.
>
> FWIW, I[m not arguing for a blank "block all", but rather "just allow
> the ones you really need" -- which is a no brainer. The list you need
> is, maybe Frag and, say, IPsec at the global level? (from the pov of
> most orgs).
>
> (yeah... HbH and the like are mostly fine for the local link (e.g. MLD).
>
> Thanks,
> --
> Fernando Gont
> SI6 Networks
> e-mail: fgont@si6networks.com<mailto:fgont@si6networks.com>
> PGP Fingerprint: F242 FF0E A804 AF81 EB10 2F07 7CA1 321D 663B B494
>
> _______________________________________________
> OPSEC mailing list
> OPSEC@ietf.org<mailto:OPSEC@ietf.org>
> https://www.ietf.org/mailman/listinfo/opsec

_______________________________________________
v6ops mailing list
v6ops@ietf.org<mailto:v6ops@ietf.org>
https://www.ietf.org/mailman/listinfo/v6ops
_______________________________________________
v6ops mailing list
v6ops@ietf.org<mailto:v6ops@ietf.org>
https://www.ietf.org/mailman/listinfo/v6ops