Re: [v6ops] IPv6 EHs Packet Drops (Fwd: New Version Notification for draft-gont-v6ops-ipv6-ehs-packet-drops-02.txt)

Fernando Gont <fgont@si6networks.com> Wed, 10 February 2016 10:25 UTC

Return-Path: <fgont@si6networks.com>
X-Original-To: v6ops@ietfa.amsl.com
Delivered-To: v6ops@ietfa.amsl.com
Received: from localhost (ietfa.amsl.com [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 160D51A1A5A for <v6ops@ietfa.amsl.com>; Wed, 10 Feb 2016 02:25:26 -0800 (PST)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -1.901
X-Spam-Level:
X-Spam-Status: No, score=-1.901 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, SPF_PASS=-0.001] autolearn=ham
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id hJJ03cWJfdwL for <v6ops@ietfa.amsl.com>; Wed, 10 Feb 2016 02:25:23 -0800 (PST)
Received: from fgont.go6lab.si (fgont.go6lab.si [91.239.96.14]) (using TLSv1.2 with cipher AECDH-AES256-SHA (256/256 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id 3956C1A1A55 for <v6ops@ietf.org>; Wed, 10 Feb 2016 02:25:23 -0800 (PST)
Received: from [192.168.3.107] (unknown [181.165.125.191]) (using TLSv1.2 with cipher ECDHE-RSA-AES128-GCM-SHA256 (128/128 bits)) (No client certificate requested) by fgont.go6lab.si (Postfix) with ESMTPSA id AD993206B76; Wed, 10 Feb 2016 11:25:19 +0100 (CET)
To: otroan@employees.org
References: <20160204214639.14168.48254.idtracker@ietfa.amsl.com> <56B4D2B2.4020206@isi.edu> <56B4D3E8.7050706@foobar.org> <56B4D539.4010007@isi.edu> <56B4F1A6.7080402@foobar.org> <CAO42Z2yG_85ASJKbgMwXBzAAT41_DTsgYTpHm4ZtiPyjL0ZeVQ@mail.gmail.com> <56B668C3.8090009@foobar.org> <CAO42Z2zfXymKK_jPUXnV+e-6-BxJBvui2EOi7XAdo-5o5vj2ag@mail.gmail.com> <56B67671.3010409@foobar.org> <CAO42Z2zXd17fNsArj-JFGNo+s7PtiwLKLaWPkkcHiEHybO49Fw@mail.gmail.com> <56B742AC.7010307@foobar.org> <CAO42Z2wQHftEMQUPPfjvz3d+j_5ag0hV0cP1FcufGDk27WbqNg@mail.gmail.com> <56B7B919.8090001@foobar.org> <56B83BB9.7040704@isi.edu> <56B8BA32.3010505@foobar.org> <56B8F12F.30307@isi.edu> <56B90B6C.9060105@si6networks.com> <56B90E16.1090402@gmail.com> <56B933A4.6060405@si6networks.com> <B9EACBEF-0C11-4BC9-BDC4-FC720EA38985@employees.org> <56B 9D9BE.6050405@si6networks.com> <74B4E9A1-E6FE-40C0-9EC9-0C2C5172A246@employees.org> <56BAF7 3D.9040707@si6networks.com> <6E0AE4AB-330D-4670-9EF0-21F8E43AC6CB@employees.org>
From: Fernando Gont <fgont@si6networks.com>
X-Enigmail-Draft-Status: N1110
Message-ID: <56BB0F47.6000804@si6networks.com>
Date: Wed, 10 Feb 2016 07:21:59 -0300
User-Agent: Mozilla/5.0 (X11; Linux x86_64; rv:38.0) Gecko/20100101 Thunderbird/38.5.1
MIME-Version: 1.0
In-Reply-To: <6E0AE4AB-330D-4670-9EF0-21F8E43AC6CB@employees.org>
Content-Type: text/plain; charset="windows-1252"
Content-Transfer-Encoding: 7bit
Archived-At: <http://mailarchive.ietf.org/arch/msg/v6ops/UqY_Cm1TuJr9O54b8mcJ0lm25f4>
Cc: v6ops@ietf.org
Subject: Re: [v6ops] IPv6 EHs Packet Drops (Fwd: New Version Notification for draft-gont-v6ops-ipv6-ehs-packet-drops-02.txt)
X-BeenThere: v6ops@ietf.org
X-Mailman-Version: 2.1.15
Precedence: list
List-Id: v6ops discussion list <v6ops.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/v6ops>, <mailto:v6ops-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/v6ops/>
List-Post: <mailto:v6ops@ietf.org>
List-Help: <mailto:v6ops-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/v6ops>, <mailto:v6ops-request@ietf.org?subject=subscribe>
X-List-Received-Date: Wed, 10 Feb 2016 10:25:26 -0000

On 02/10/2016 06:52 AM, otroan@employees.org wrote:
>> 
>>> if we accept that e.g. a transit network needs to look into L4
>>> or deeper, then we also accept we can never make any innovations
>>> at this layer. (and we've essentially accepted that the Internet
>>> is going to be just an underlay for whatever comes next).
>> 
>> Not necessarily. There are essentially two issues here:
>> 
>> 1) The Next-Header space is not self describing. It should be
>> possible to skip past unknown EHs. I presented a proposal 
>> (draft-gont-6man-rfc6564bis-01), but we did nothing about it.
>> (there could be other alternatives, such as prohibiting the
>> specification of new EHs... but we did nothing about it).
> 
> right, it isn't clear that is solving the problem. if walking the
> chain is done by a middlebox for the purpose of "security", then it
> would be highly unlikely that it would allow an unknown extension
> header.

That's the point: you cannot tell if what's inside is an EH or an
upper-layer protocol.

If the device is whitelisting stuff, I'd agree with you on the
end-result. OTOH, if the devices means to blacklist stuff, then this may
lead to unnecessarily packet drops.

And, in any case, a bug is a bug.

We're pretending that RFC6564 can be employed to skip past unknown EHs,
when it really can't.



> for a router doing ECMP we should instead make the flow label
> usable.
> 
> what we have done, is to make it very unlikely that new extension
> headers will be defined. given that we have the three extensible
> containers, RH, DestOpt and HBH. and we might be making parsing the
> HBH optional.

Then let's say that. Right know, given an unknown Next Header, it's
impossible to tel whether it's an EH or an ULP.

I don't care if we go forward with what we propose in our rfc6564bis
I-D, or we just ban the definition of new EHs. Anything is better than
leaving the bug in.



>> 2) EH chains can be very long. Me, I'd prefer that we get to some 
>> compromise (e.g., "everyone must support EH chains of at least 256
>> bytes to be able to claim they are IPv6-ready"), rather than what
>> we have now: we pretend that nodes support the currently unlimited
>> EH chain lengths, but in practice it gets hard to pass a 10B chain
>> through.
> 
> right, but within the constraints of RFC7112. for routers that number
> is and always have been 40. :)

40B?

If it's an implementation limit, it'd be great that we all agree that
40B is the least common denominator.

Besides, whatever the number, there can be as many instances of HBH as
desired.. so even for routers, you still have to support at least
up-to-MTU long EH chains.


> for middleboxes it is dependent on
> policy, and since that could typically be to parse the whole
> packet...
> 
>>> I can't think of many examples where a transit network would
>>> require to parse the extension chain.
>> 
>> We have examples in draft-gont-v6ops-ipv6-ehs-packet-drops-02.txt 
>> (supplied by folks running such networks).
> 
> sorry, I don't see any examples there where a transit network would
> require to look deeper than 40 bytes. in the case of DDOS that would
> be filters that would match a signature, and I'd imagine that include
> extension headers right.

The examples basically boil down to happing to enforce some sort of
filters that require layer-4 info.



>> Probably the ECMP case is easier to solve in the near term. OTOH,
>> the ability to do packet filtering doesn't look easy to solve if we
>> keep the (rather onerous nowadays) requirement of supporting
>> arbitrarily-long EH chains.
>> 
>> FWIW, this is just me trying to make things work, and trying to
>> find a middle-ground between the theoretical requirements we
>> expect implementations to comply with, and the "I will drop all the
>> EH-enabled packets" that seems to be rather widespread.
> 
> right, this is simply a result of the tussle between the different
> actors on the network. if anything IETF should try to be neutral in
> that tussle.

But when we don't try to be pragmatic and agree on what is supported,
the result is not good: I'd prefer to be "limited" in the EH chains that
I can use, but to know that I can rely on e.g. up to 64B or 256B EH-chains.

Right know, since our requirement to support arbitrarily-long EHs is
generally seen as too onerous, the end result is that folks don't care
to support EHs, and hence you wouldn't even hope to have your 10B EH
chains go through the network.

I'm not even arguing about an actual modification to the spec (i.e., and
enforced upper limit), but e.g. and enforced lower limit that everyone
has to support (which could be increased overtime). -- if we really
won't EHs to be deployable.

Cheers,
-- 
Fernando Gont
SI6 Networks
e-mail: fgont@si6networks.com
PGP Fingerprint: 6666 31C6 D484 63B2 8FB1 E3C4 AE25 0D55 1D4E 7492