Re: [v6ops] [OPSEC] [IPv6] Why folks are blocking IPv6 extension headers? (Episode 1000 and counting) (Linux DoS)
Andrew Campling <andrew.campling@419.consulting> Mon, 22 May 2023 11:28 UTC
Return-Path: <andrew.campling@419.consulting>
X-Original-To: v6ops@ietfa.amsl.com
Delivered-To: v6ops@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 384DEC151B04; Mon, 22 May 2023 04:28:32 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -1.121
X-Spam-Level:
X-Spam-Status: No, score=-1.121 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, DKIM_SIGNED=0.1, DKIM_VALID=-0.1, RCVD_IN_DNSWL_NONE=-0.0001, RCVD_IN_MSPIKE_H2=-0.001, RCVD_IN_ZEN_BLOCKED_OPENDNS=0.001, SPF_NEUTRAL=0.779] autolearn=no autolearn_force=no
Authentication-Results: ietfa.amsl.com (amavisd-new); dkim=pass (1024-bit key) header.d=netorgft5189650.onmicrosoft.com
Received: from mail.ietf.org ([50.223.129.194]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id TYKGzshjKDIX; Mon, 22 May 2023 04:28:27 -0700 (PDT)
Received: from GBR01-CWL-obe.outbound.protection.outlook.com (mail-cwlgbr01on2069.outbound.protection.outlook.com [40.107.11.69]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id BFCA1C151B0F; Mon, 22 May 2023 04:28:27 -0700 (PDT)
ARC-Seal: i=1; a=rsa-sha256; s=arcselector9901; d=microsoft.com; cv=none; b=VEw/Whpww8AR9CRlBQya8GsMwEHwF2k+TiJEnGYTqO0XreSCy1EydbZO96PoRumJVAZXDnjVmCJLJDIYqD+fUaBMfmzABEZLcLWc0MSANJ3XlBcLDxF+PBexkIRSFfo6i+C1gjD6iwA3OdoEa8ikmBbCR3wYsYoPIJGxW/3DEh4jG0IuA0geozTjjAyPo8x1Yqy/LS+IlhcufjfsHG/GOOvgS349QADdkCKBPBi7ZtCe+F9k+WqddqOEMh7qnFToXWZWOxQI0Zgjtkx3/Zq7f08dJNujIZlkPoJtxlifVe/96HxPd3no3LOab1GvHWzFPEKZYClFtPXl1+4cPTbiyg==
ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=microsoft.com; s=arcselector9901; h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-AntiSpam-MessageData-ChunkCount:X-MS-Exchange-AntiSpam-MessageData-0:X-MS-Exchange-AntiSpam-MessageData-1; bh=gXHnQHZ17CWEyA+mUNUbEL3BxO/6p7hAcILcZtR3PhQ=; b=LvHCv/hW9hGPBAkScMOfKPm6SNsaQCSXPxlUWWjHT5bLY203nVrsLrxfWqOqqjCuBzR7uhKnaNTLJaQ9u3T5ZqDRxNJXe+PjNx3WNz3qJ1WaWuuIt4U2ofdu88nFtL9eKJFepJozlrWyyduMWQyXKo+8g9q2SjKT6/ipi3t4R4ANGWxXShTqecROxff/MLKmuVO7sq6CkKmS7TnjuF72J1G+hZyOUduDLn7YAWKqf/NrYOLczC8wjEFdzoiLQ5kivERkPhrnKqpZYMjCoo4OVnoGb2X5yH/efinLQwJcAAGKX5ykyldm6piesWv3UGOLZaxbmOoXEjwdfHoexMXcyw==
ARC-Authentication-Results: i=1; mx.microsoft.com 1; spf=pass smtp.mailfrom=419.consulting; dmarc=pass action=none header.from=419.consulting; dkim=pass header.d=419.consulting; arc=none
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=NETORGFT5189650.onmicrosoft.com; s=selector1-NETORGFT5189650-onmicrosoft-com; h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-SenderADCheck; bh=gXHnQHZ17CWEyA+mUNUbEL3BxO/6p7hAcILcZtR3PhQ=; b=m3p0SznzxtZ6OTnb86Fp+sCeXG8dRwFkTE8W3mIC4TmQJQvtfiZw/9ygS8feFE6R8/lA8ipxqCs1wLXUY994NWcprs5BtZPkxY7xxWY6MJhtMAuyGfDgAatRzHJxukmUs2vgORXdW2apRt0VElJFkdMZYM5LtP5xSJ3N4K5S8Uw=
Received: from CWXP265MB5153.GBRP265.PROD.OUTLOOK.COM (2603:10a6:400:196::5) by CWLP265MB6516.GBRP265.PROD.OUTLOOK.COM (2603:10a6:400:1da::7) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id 15.20.6433.14; Mon, 22 May 2023 11:28:21 +0000
Received: from CWXP265MB5153.GBRP265.PROD.OUTLOOK.COM ([fe80::eea4:d29a:355e:bed]) by CWXP265MB5153.GBRP265.PROD.OUTLOOK.COM ([fe80::eea4:d29a:355e:bed%5]) with mapi id 15.20.6433.013; Mon, 22 May 2023 11:28:21 +0000
From: Andrew Campling <andrew.campling@419.consulting>
To: Brian E Carpenter <brian.e.carpenter@gmail.com>, Fernando Gont <fernando@gont.com.ar>
CC: IPv6 Operations <v6ops@ietf.org>, 6man <ipv6@ietf.org>, "opsec@ietf.org" <opsec@ietf.org>
Thread-Topic: [OPSEC] [IPv6] [v6ops] Why folks are blocking IPv6 extension headers? (Episode 1000 and counting) (Linux DoS)
Thread-Index: AQHZjCtKjSa7PYF7BUSbT6GZ0CqKkK9mJV1Q
Date: Mon, 22 May 2023 11:28:21 +0000
Message-ID: <CWXP265MB5153E4687BE45480DBC5A531C2439@CWXP265MB5153.GBRP265.PROD.OUTLOOK.COM>
References: <11087a11-476c-5fb8-2ede-e1b3b6e95e48@si6networks.com> <CALx6S343f_FPXVxuZuXB4j=nY-SuTEYrnxb3O5OQ3fv5uPwT8g@mail.gmail.com> <CAN-Dau1pTVr6ak9rc9x7irg+aLhq0N8_WOyySqx5Syt74HMX=g@mail.gmail.com> <a087b963-1e12-66bf-b93e-5190ce09914b@si6networks.com> <CALx6S349nNA8L5+_1hrbWayqp8GfTYypWy_SP57c_Xxams=csg@mail.gmail.com> <51a066b3-4b4c-d573-ffbe-d6b44a4f193f@gont.com.ar> <a411a1b0-c521-c456-3d44-d99a1cc0975b@gmail.com>
In-Reply-To: <a411a1b0-c521-c456-3d44-d99a1cc0975b@gmail.com>
Accept-Language: en-GB, en-US
Content-Language: en-US
X-MS-Has-Attach:
X-MS-TNEF-Correlator:
authentication-results: dkim=none (message not signed) header.d=none;dmarc=none action=none header.from=419.consulting;
x-ms-publictraffictype: Email
x-ms-traffictypediagnostic: CWXP265MB5153:EE_|CWLP265MB6516:EE_
x-ms-office365-filtering-correlation-id: 6a2920ee-07d9-4b12-a481-08db5ab7a603
x-ms-exchange-senderadcheck: 1
x-ms-exchange-antispam-relay: 0
x-microsoft-antispam: BCL:0;
x-microsoft-antispam-message-info: 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
x-forefront-antispam-report: CIP:255.255.255.255; CTRY:; LANG:en; SCL:1; SRV:; IPV:NLI; SFV:NSPM; H:CWXP265MB5153.GBRP265.PROD.OUTLOOK.COM; PTR:; CAT:NONE; SFS:(13230028)(136003)(366004)(39830400003)(376002)(396003)(346002)(451199021)(316002)(110136005)(54906003)(4326008)(66476007)(66556008)(64756008)(66446008)(71200400001)(122000001)(66946007)(76116006)(41300700001)(7696005)(38070700005)(38100700002)(478600001)(86362001)(8936002)(8676002)(5660300002)(52536014)(44832011)(186003)(55016003)(6506007)(26005)(9686003)(33656002)(83380400001)(53546011)(2906002)(66574015)(46492015)(221023011); DIR:OUT; SFP:1101;
x-ms-exchange-antispam-messagedata-chunkcount: 1
x-ms-exchange-antispam-messagedata-0: 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
Content-Type: text/plain; charset="utf-8"
Content-Transfer-Encoding: base64
MIME-Version: 1.0
X-OriginatorOrg: 419.consulting
X-MS-Exchange-CrossTenant-AuthAs: Internal
X-MS-Exchange-CrossTenant-AuthSource: CWXP265MB5153.GBRP265.PROD.OUTLOOK.COM
X-MS-Exchange-CrossTenant-Network-Message-Id: 6a2920ee-07d9-4b12-a481-08db5ab7a603
X-MS-Exchange-CrossTenant-originalarrivaltime: 22 May 2023 11:28:21.3605 (UTC)
X-MS-Exchange-CrossTenant-fromentityheader: Hosted
X-MS-Exchange-CrossTenant-id: 9c2ced3e-7522-4755-87dc-f983abc66ec3
X-MS-Exchange-CrossTenant-mailboxtype: HOSTED
X-MS-Exchange-CrossTenant-userprincipalname: WBlbNXvt5TaqF24W/u7bQ7bzrjOo/CqoEYDgh8ZQRFO+EEnSbq2074qNltQmCHHN4BiQiN9bqk3pCJKMW2g2e0vLLqHNk8cwPcl6jdG39ws=
X-MS-Exchange-Transport-CrossTenantHeadersStamped: CWLP265MB6516
Archived-At: <https://mailarchive.ietf.org/arch/msg/v6ops/kpnnoOuL-ouqfrBVuEIAZmpcgqg>
Subject: Re: [v6ops] [OPSEC] [IPv6] Why folks are blocking IPv6 extension headers? (Episode 1000 and counting) (Linux DoS)
X-BeenThere: v6ops@ietf.org
X-Mailman-Version: 2.1.39
Precedence: list
List-Id: v6ops discussion list <v6ops.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/v6ops>, <mailto:v6ops-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/v6ops/>
List-Post: <mailto:v6ops@ietf.org>
List-Help: <mailto:v6ops-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/v6ops>, <mailto:v6ops-request@ietf.org?subject=subscribe>
X-List-Received-Date: Mon, 22 May 2023 11:28:32 -0000
On 21-May-23 10:29 PM, Brian E Carpenter wrote: > And there's the problem. The operator of a large network cannot possibly > know which extension headers every host on the network needs. It's called > permissionless innovation, and is supposed to be one of the main success > factors for the Internet. I think the problem with this approach, which I'm interpreting as "allow everything", is that people responsible for the security of public, and especially private, networks need to consider whether any such innovations might introduce new vulnerabilities. Remember that, for example, CISOs looking after the security of some enterprises may fall foul of regulatory obligations if they cannot show that their networks are as secure as is practical. More generally, anyone operating zero trust principles would surely only allow those features that they deem necessary, selected extension headers in this case. This would seem consistent with the point that Fernando made earlier in the thread. Andrew
- [v6ops] Why folks are blocking IPv6 extension hea… Fernando Gont
- Re: [v6ops] [IPv6] Why folks are blocking IPv6 ex… Tom Herbert
- Re: [v6ops] [IPv6] Why folks are blocking IPv6 ex… Ted Lemon
- Re: [v6ops] [IPv6] Why folks are blocking IPv6 ex… David Farmer
- Re: [v6ops] [IPv6] Why folks are blocking IPv6 ex… nalini.elkins@insidethestack.com
- Re: [v6ops] [IPv6] Why folks are blocking IPv6 ex… Jen Linkova
- Re: [v6ops] [IPv6] Why folks are blocking IPv6 ex… Vasilenko Eduard
- Re: [v6ops] [IPv6] Why folks are blocking IPv6 ex… Fernando Gont
- Re: [v6ops] [IPv6] Why folks are blocking IPv6 ex… Fernando Gont
- Re: [v6ops] [IPv6] Why folks are blocking IPv6 ex… Tom Herbert
- Re: [v6ops] [OPSEC] [IPv6] Why folks are blocking… Andrew Campling
- Re: [v6ops] [OPSEC] [IPv6] Why folks are blocking… Andrew Campling
- Re: [v6ops] [IPv6] Why folks are blocking IPv6 ex… Tom Herbert
- Re: [v6ops] [OPSEC] [IPv6] Why folks are blocking… Tom Herbert
- Re: [v6ops] [OPSEC] [IPv6] Why folks are blocking… Nick Buraglio
- Re: [v6ops] [OPSEC] [IPv6] Why folks are blocking… nalini.elkins@insidethestack.com
- Re: [v6ops] [OPSEC] [IPv6] Why folks are blocking… Dale W. Carder
- Re: [v6ops] [OPSEC] [IPv6] Why folks are blocking… Nick Buraglio
- Re: [v6ops] [OPSEC] [IPv6] Why folks are blocking… Nick Buraglio
- Re: [v6ops] [IPv6] [OPSEC] Why folks are blocking… Ackermann, Michael
- Re: [v6ops] [IPv6] [OPSEC] Why folks are blocking… Xipengxiao
- Re: [v6ops] [IPv6] [OPSEC] Why folks are blocking… Michael McBride
- Re: [v6ops] [IPv6] [OPSEC] Why folks are blocking… Ackermann, Michael
- Re: [v6ops] [IPv6] Why folks are blocking IPv6 ex… Fernando Gont
- Re: [v6ops] [IPv6] Why folks are blocking IPv6 ex… Brian E Carpenter
- Re: [v6ops] [IPv6] Why folks are blocking IPv6 ex… Ole Troan
- Re: [v6ops] [IPv6] Why folks are blocking IPv6 ex… Haisheng Yu
- Re: [v6ops] [OPSEC] [IPv6] Why folks are blocking… Andrew Campling
- Re: [v6ops] [OPSEC] [IPv6] Why folks are blocking… Bob Natale
- Re: [v6ops] [IPv6] [OPSEC] Why folks are blocking… Tom Herbert
- Re: [v6ops] [IPv6] [OPSEC] Why folks are blocking… Ole Troan
- Re: [v6ops] [OPSEC] [IPv6] Why folks are blocking… nalini.elkins@insidethestack.com
- Re: [v6ops] [EXT] Re: [OPSEC] [IPv6] Why folks ar… Bob Natale
- Re: [v6ops] [IPv6] Why folks are blocking IPv6 ex… David Farmer
- Re: [v6ops] [IPv6] [OPSEC] Why folks are blocking… nalini.elkins@insidethestack.com
- Re: [v6ops] [IPv6] [OPSEC] Why folks are blocking… Tom Herbert
- Re: [v6ops] [IPv6] Why folks are blocking IPv6 ex… Michael Richardson
- Re: [v6ops] [OPSEC] [IPv6] Why folks are blocking… Ole Trøan
- Re: [v6ops] [OPSEC] [IPv6] Why folks are blocking… nalini.elkins@insidethestack.com
- Re: [v6ops] [IPv6] Why folks are blocking IPv6 ex… David Farmer
- Re: [v6ops] [OPSEC] [IPv6] Why folks are blocking… Ole Troan
- Re: [v6ops] [OPSEC] [IPv6] Why folks are blocking… Tom Herbert
- Re: [v6ops] [OPSEC] [IPv6] Why folks are blocking… nalini.elkins@insidethestack.com
- Re: [v6ops] [IPv6] Why folks are blocking IPv6 ex… Fernando Gont
- Re: [v6ops] [OPSEC] [IPv6] Why folks are blocking… Tom Herbert
- Re: [v6ops] [OPSEC] [IPv6] Why folks are blocking… Ole Troan
- Re: [v6ops] [OPSEC] [IPv6] Why folks are blocking… nalini.elkins@insidethestack.com
- Re: [v6ops] [IPv6] [OPSEC] Why folks are blocking… Fernando Gont
- Re: [v6ops] [IPv6] Why folks are blocking IPv6 ex… Fernando Gont
- Re: [v6ops] [IPv6] [OPSEC] Why folks are blocking… Tom Herbert
- Re: [v6ops] [IPv6] Why folks are blocking IPv6 ex… Tom Herbert
- Re: [v6ops] [IPv6] Why folks are blocking IPv6 ex… Brian E Carpenter
- Re: [v6ops] [IPv6] Why folks are blocking IPv6 ex… Michael Richardson
- Re: [v6ops] [OPSEC] [IPv6] Why folks are blocking… Brian E Carpenter
- Re: [v6ops] [OPSEC] [IPv6] Why folks are blocking… Brian E Carpenter
- Re: [v6ops] [IPv6] Why folks are blocking IPv6 ex… hsyu
- Re: [v6ops] [OPSEC] [IPv6] Why folks are blocking… Fernando Gont
- Re: [v6ops] [EXTERNAL] Re: [IPv6] [OPSEC] Why fol… Manfredi (US), Albert E
- Re: [v6ops] [EXTERNAL] Re: [IPv6] [OPSEC] Why fol… Fernando Gont
- Re: [v6ops] [OPSEC] [EXTERNAL] Re: [IPv6] Why fol… Arnaud Taddei
- Re: [v6ops] [OPSEC] [EXTERNAL] Re: [IPv6] Why fol… Vasilenko Eduard
- Re: [v6ops] [OPSEC] [EXTERNAL] Re: [IPv6] Why fol… Arnaud Taddei
- Re: [v6ops] [OPSEC] [EXTERNAL] Re: [IPv6] Why fol… Vasilenko Eduard
- Re: [v6ops] [OPSEC] [EXTERNAL] Re: [IPv6] Why fol… Arnaud Taddei
- Re: [v6ops] [OPSEC] [EXTERNAL] Re: [IPv6] Why fol… nalini.elkins@insidethestack.com
- Re: [v6ops] [EXTERNAL] Re: [IPv6] [OPSEC] Why fol… Tom Herbert
- Re: [v6ops] [OPSEC] [EXTERNAL] Re: [IPv6] Why fol… Tom Herbert
- Re: [v6ops] [OPSEC] [EXTERNAL] Re: [IPv6] Why fol… nalini.elkins@insidethestack.com
- Re: [v6ops] [EXTERNAL] Re: [IPv6] [OPSEC] Why fol… Manfredi (US), Albert E
- Re: [v6ops] [EXTERNAL] Re: [IPv6] [OPSEC] Why fol… Tom Herbert
- Re: [v6ops] [EXTERNAL] Re: [IPv6] [OPSEC] Why fol… Brian E Carpenter
- Re: [v6ops] [EXTERNAL] Re: [IPv6] [OPSEC] Why fol… Manfredi (US), Albert E
- Re: [v6ops] [OPSEC] [EXTERNAL] Re: [IPv6] Why fol… Bob Natale
- Re: [v6ops] [OPSEC] [IPv6] Why folks are blocking… Haisheng Yu
- Re: [v6ops] [EXTERNAL] Re: [IPv6] [OPSEC] Why fol… Warren Kumari
- Re: [v6ops] [OPSEC] [EXTERNAL] Re: [IPv6] Why fol… Ole Troan
- Re: [v6ops] [OPSEC] [EXTERNAL] Re: [IPv6] Why fol… Warren Kumari
- Re: [v6ops] [OPSEC] [EXTERNAL] Re: [IPv6] Why fol… Andrew Campling
- Re: [v6ops] [OPSEC] [EXTERNAL] Re: [IPv6] Why fol… Fernando Gont
- Re: [v6ops] [IPv6] [EXTERNAL] Re: [OPSEC] Why fol… Fernando Gont
- Re: [v6ops] [OPSEC] [IPv6] Why folks are blocking… Fernando Gont
- Re: [v6ops] [EXTERNAL] Re: [IPv6] [OPSEC] Why fol… Fernando Gont
- Re: [v6ops] [IPv6] [EXTERNAL] Re: [OPSEC] Why fol… Tom Herbert
- Re: [v6ops] [IPv6] [OPSEC] Why folks are blocking… Tom Herbert
- Re: [v6ops] [OPSEC] [EXTERNAL] Re: [IPv6] Why fol… Tom Herbert
- Re: [v6ops] [IPv6] [OPSEC] Why folks are blocking… Fernando Gont
- Re: [v6ops] [OPSEC] [EXTERNAL] Re: [IPv6] Why fol… Clark Gaylord
- Re: [v6ops] [IPv6] [OPSEC] Why folks are blocking… Tom Herbert
- Re: [v6ops] [IPv6] [OPSEC] Why folks are blocking… Fernando Gont
- Re: [v6ops] [EXTERNAL] Re: [IPv6] [OPSEC] Why fol… Manfredi (US), Albert E
- Re: [v6ops] [EXTERNAL] Re: [IPv6] [OPSEC] Why fol… Brian E Carpenter
- Re: [v6ops] [OPSEC] [EXTERNAL] Re: [IPv6] Why fol… Brian E Carpenter
- Re: [v6ops] [EXTERNAL] Re: [IPv6] [OPSEC] Why fol… Tom Herbert
- Re: [v6ops] [EXTERNAL] Re: [IPv6] [OPSEC] Why fol… Manfredi (US), Albert E
- Re: [v6ops] [EXTERNAL] Re: [IPv6] [OPSEC] Why fol… Andrew Alston
- Re: [v6ops] [EXTERNAL] Re: [IPv6] [OPSEC] Why fol… Tom Herbert
- Re: [v6ops] [OPSEC] [EXTERNAL] Re: [IPv6] Why fol… Andrew Campling
- Re: [v6ops] [IPv6] [OPSEC] [EXTERNAL] Re: Why fol… Tom Herbert
- Re: [v6ops] [IPv6] [EXTERNAL] Re: [OPSEC] Why fol… Mike Simpson
- Re: [v6ops] [IPv6] [OPSEC] [EXTERNAL] Re: Why fol… Haisheng Yu
- Re: [v6ops] [IPv6] [OPSEC] [EXTERNAL] Re: Why fol… Nick Hilliard
- Re: [v6ops] [IPv6] [OPSEC] [EXTERNAL] Re: Why fol… Fernando Gont
- Re: [v6ops] [OPSEC] [IPv6] [EXTERNAL] Re: Why fol… Bob Natale