Re: [v6ops] new draft: draft-taylor-v6ops-fragdrop

Ole Trøan <otroan@employees.org> Thu, 01 November 2012 11:16 UTC

Return-Path: <otroan@employees.org>
X-Original-To: v6ops@ietfa.amsl.com
Delivered-To: v6ops@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 11A5821F8490 for <v6ops@ietfa.amsl.com>; Thu, 1 Nov 2012 04:16:40 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -10.299
X-Spam-Level:
X-Spam-Status: No, score=-10.299 tagged_above=-999 required=5 tests=[BAYES_00=-2.599, MIME_8BIT_HEADER=0.3, RCVD_IN_DNSWL_HI=-8]
Received: from mail.ietf.org ([64.170.98.30]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id xMnOKlG72aX4 for <v6ops@ietfa.amsl.com>; Thu, 1 Nov 2012 04:16:39 -0700 (PDT)
Received: from ams-iport-2.cisco.com (ams-iport-2.cisco.com [144.254.224.141]) by ietfa.amsl.com (Postfix) with ESMTP id A662D21F8485 for <v6ops@ietf.org>; Thu, 1 Nov 2012 04:16:38 -0700 (PDT)
X-IronPort-Anti-Spam-Filtered: true
X-IronPort-Anti-Spam-Result: Av0EANNYklCQ/khN/2dsb2JhbABEw2qBCIIfAQEEEgEnPxALEjRJDgY1h2SbQaAfkVVhA6ROgWuCcA
X-IronPort-AV: E=Sophos;i="4.80,692,1344211200"; d="scan'208";a="77924614"
Received: from ams-core-4.cisco.com ([144.254.72.77]) by ams-iport-2.cisco.com with ESMTP; 01 Nov 2012 11:16:37 +0000
Received: from dhcp-lys02-vla252-10-147-117-91.cisco.com (dhcp-lys02-vla252-10-147-117-91.cisco.com [10.147.117.91]) by ams-core-4.cisco.com (8.14.5/8.14.5) with ESMTP id qA1BGars021630 (version=TLSv1/SSLv3 cipher=AES128-SHA bits=128 verify=NO); Thu, 1 Nov 2012 11:16:37 GMT
Content-Type: text/plain; charset="us-ascii"
Mime-Version: 1.0 (Mac OS X Mail 6.1 \(1498\))
From: Ole Trøan <otroan@employees.org>
In-Reply-To: <50924264.7040300@gmail.com>
Date: Thu, 01 Nov 2012 12:16:36 +0100
Content-Transfer-Encoding: quoted-printable
Message-Id: <76E349F3-6022-4042-9B44-57507593B8DE@employees.org>
References: <CAKD1Yr13cNspdWvTaXxHt4R_8UB-CKeA4nq8_XWrkbFGCgW7Gg@mail.gmail.com> <5090DECF.3050100@gmail.com> <CAKD1Yr1dUy-f78A2+kfA7NjpzD0WQRT8iwqGYAm5A=Erodpn-A@mail.gmail.com> <20121031.122110.41655699.sthaug@nethelp.no> <50910E41.2030100@gmail.com> <CAKD1Yr0mTTcVeq+Qf0fLv3UCBP_90QmStkK3Ha4tDdm3FxJjVA@mail.gmail.com> <50915F86.7050304@gmail.com> <509165B8.404@si6networks.com> <509169C2.9040208@isi.edu> <50916F21.6030303@si6networks.com> <509174F1.8080809@isi.edu> <50924264.7040300@gmail.com>
To: Brian E Carpenter <brian.e.carpenter@gmail.com>
X-Mailer: Apple Mail (2.1498)
Cc: Fernando Gont <fgont@si6networks.com>, v6ops@ietf.org
Subject: Re: [v6ops] new draft: draft-taylor-v6ops-fragdrop
X-BeenThere: v6ops@ietf.org
X-Mailman-Version: 2.1.12
Precedence: list
List-Id: v6ops discussion list <v6ops.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/v6ops>, <mailto:v6ops-request@ietf.org?subject=unsubscribe>
List-Archive: <http://www.ietf.org/mail-archive/web/v6ops>
List-Post: <mailto:v6ops@ietf.org>
List-Help: <mailto:v6ops-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/v6ops>, <mailto:v6ops-request@ietf.org?subject=subscribe>
X-List-Received-Date: Thu, 01 Nov 2012 11:16:40 -0000

>>>> Yes, but the whole point of the IPv6 option architecture was to avoid
>>>> the issues seen with IPv4 options.
>>> 
>>> The only thing in that IPv6 would avoid is requiring routers to parse
>>> *all* options, just to find the ones that need to be processed by
>>> routers.
>> 
>> Yes.
> 
> No. The only extension header that *needs* to be parsed by intermediate
> routers is the hop-by-hop options header, and that is the first one (if
> present).
> 
> (You can legitimately argue that the hbh header and the routing header
> are effectively useless, but that doesn't break fundamental connectivity.)
> 
> IPv6 routers should have nothing to do with fragmentation.
> 
> The problem is due to middleboxes that break the IPv6 spec by inspecting
> any part of the packet beyond the hop-by-hop header and discarding what
> they don't understand.


quite.
what stops these boxes from filtering IPsec, TLS, or anything that isn't HTTP with a
whitewashed URL?

I don't see how we can build protocols to accommodate middle boxes, and
we have already done RFC3514.

cheers,
Ole