Re: [v6ops] Please review the No IPv4 draft

Nick Hilliard <nick@foobar.org> Sat, 19 April 2014 22:30 UTC

Return-Path: <nick@foobar.org>
X-Original-To: v6ops@ietfa.amsl.com
Delivered-To: v6ops@ietfa.amsl.com
Received: from localhost (ietfa.amsl.com [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 3C5681A00CF for <v6ops@ietfa.amsl.com>; Sat, 19 Apr 2014 15:30:59 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: 0.8
X-Spam-Level:
X-Spam-Status: No, score=0.8 tagged_above=-999 required=5 tests=[BAYES_50=0.8] autolearn=ham
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id Y4CzCwkHCM75 for <v6ops@ietfa.amsl.com>; Sat, 19 Apr 2014 15:30:57 -0700 (PDT)
Received: from mail.netability.ie (mail.netability.ie [IPv6:2a03:8900:0:100::5]) by ietfa.amsl.com (Postfix) with ESMTP id 18DD71A00C3 for <v6ops@ietf.org>; Sat, 19 Apr 2014 15:30:56 -0700 (PDT)
X-Envelope-To: v6ops@ietf.org
Received: from cupcake.foobar.org ([IPv6:2001:4d68:2002:100::110]) (authenticated bits=0) by mail.netability.ie (8.14.8/8.14.5) with ESMTP id s3JMUnju049502 (version=TLSv1/SSLv3 cipher=DHE-RSA-AES128-SHA bits=128 verify=NO); Sat, 19 Apr 2014 23:30:49 +0100 (IST) (envelope-from nick@foobar.org)
X-Authentication-Warning: cheesecake.netability.ie: Host [IPv6:2001:4d68:2002:100::110] claimed to be cupcake.foobar.org
Message-ID: <5352F918.4090908@foobar.org>
Date: Sat, 19 Apr 2014 23:30:48 +0100
From: Nick Hilliard <nick@foobar.org>
User-Agent: Mozilla/5.0 (Macintosh; Intel Mac OS X 10.9; rv:24.0) Gecko/20100101 Thunderbird/24.4.0
MIME-Version: 1.0
To: Ted Lemon <ted.lemon@nominum.com>
References: <534BF5A5.5010609@viagenie.ca> <20140415083615.GB43641@Space.Net> <534D3672.3060702@viagenie.ca> <3446106.k0lm12lQ8b@linne> <alpine.DEB.2.02.1404161034220.10236@uplift.swm.pp.se> <CAKD1Yr2D+ZMi-UctuvrMzyqoHqgBy5O26GODT=bRwq0PsvLgLw@mail.gmail.com> <alpine.DEB.2.02.1404161053110.10236@uplift.swm.pp.se> <m1WaMBx-0000BSC@stereo.hq.phicoh.net> <E772899C-8505-4436-8594-380799F91BA0@nominum.com> <CAKD1Yr2KFOi_hW3CCSbcT-uPQSwsUyE06cY3r8=CuunSbnz_xw@mail.gmail.com> <D701ADC0-EA9F-48DD-933F-9E02ACF3EBD4@nominum.com> <534EAB83.1070906@foobar.org> <70739713-281A-41E6-93ED-5EE1BC4B7FAB@nominum.com> <534EC1DB.4010902@foobar.org> <575F73AC-8DA5-4E04-B2CF-4875B729C7D3@nominum.com> <534FC59B.201@foobar.org> <1BE293BD-3191-4622-AACA-E9E3689400EB@nominum.com>
In-Reply-To: <1BE293BD-3191-4622-AACA-E9E3689400EB@nominum.com>
X-Enigmail-Version: 1.6
Content-Type: text/plain; charset="windows-1252"
Content-Transfer-Encoding: 7bit
Archived-At: http://mailarchive.ietf.org/arch/msg/v6ops/mNKKzT3J2JW66G2HZF1531nEsTo
Cc: "v6ops@ietf.org WG" <v6ops@ietf.org>
Subject: Re: [v6ops] Please review the No IPv4 draft
X-BeenThere: v6ops@ietf.org
X-Mailman-Version: 2.1.15
Precedence: list
List-Id: v6ops discussion list <v6ops.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/v6ops>, <mailto:v6ops-request@ietf.org?subject=unsubscribe>
List-Archive: <http://www.ietf.org/mail-archive/web/v6ops/>
List-Post: <mailto:v6ops@ietf.org>
List-Help: <mailto:v6ops-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/v6ops>, <mailto:v6ops-request@ietf.org?subject=subscribe>
X-List-Received-Date: Sat, 19 Apr 2014 22:30:59 -0000

On 17/04/2014 15:57, Ted Lemon wrote:
> On Apr 17, 2014, at 7:14 AM, Nick Hilliard <nick@foobar.org> wrote:
>> From what I can see, there was no initial justification to use v6 transport
>> other than a declarative "it shall be so!" pronouncement, and in this
>> situation it is reasonable to question this decision in v6ops, particularly
>> as it will cause operational problems as outlined by a bunch of people.
> 
> Sure, it's reasonable to question the decision, and the working group
> did ask for feedback, so there's nothing wrong with providing feedback.
> However, my point is that v6ops doesn't get any special veto power over
> this if you don't raise substantive objections.

the point people are raising is that there appears to be a considerable gap
between your understanding of "substantive objections" and theirs.

>> this is also a valid concern.  I can see no reason why anyone would heed an
>> unauthenticated signal to entirely shut down all ipv4 services o/s wide on
>> their ipv4-enabled client (or even no-ipv4 options 1-2 for that matter),
>> when we already have the existing option for operators to fully satisfy all
>> aims of this draft by declining to forward ethertypes 0x0800 and 0x0806.
>> Simple and enforceable are both good engineering principals to aspire to.
>> Complex+advisory+piles of failure modes+controversial need a much greater
>> level of justification, which is notably absent from this draft.
> 
> Noted.   I think it would be good to have text in the document that
> explains why this isn't the proposed solution, so that it can be
> evaluated on the merits and we don't have to speculate.

As the draft demands that a single unauthenticated packet can shut down
ipv4 services on a client device either completely (as specified in 5.3.3)
or almost completely (5.3.2), both options will need a detailed security
analysis to describe how packets of this form cannot be abused by either an
malicious operator or by rogue packets caused by access domain
misconfiguration.  Also, given the extraordinary nature of these
requirements, the justification for including them in an internet standards
track document will need to be similarly extraordinary.

Nick