Re: [v6ops] IPv6 Extension Headers in the Real World

Joe Touch <touch@isi.edu> Wed, 01 October 2014 22:36 UTC

Return-Path: <touch@isi.edu>
X-Original-To: v6ops@ietfa.amsl.com
Delivered-To: v6ops@ietfa.amsl.com
Received: from localhost (ietfa.amsl.com [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 957441A87CC for <v6ops@ietfa.amsl.com>; Wed, 1 Oct 2014 15:36:01 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -2.686
X-Spam-Level:
X-Spam-Status: No, score=-2.686 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, RP_MATCHES_RCVD=-0.786] autolearn=ham
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id xSJDamvGZJl9 for <v6ops@ietfa.amsl.com>; Wed, 1 Oct 2014 15:36:00 -0700 (PDT)
Received: from darkstar.isi.edu (darkstar.isi.edu [128.9.128.127]) (using TLSv1 with cipher DHE-RSA-AES256-SHA (256/256 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id 4A3A01A87CA for <v6ops@ietf.org>; Wed, 1 Oct 2014 15:36:00 -0700 (PDT)
Received: from [128.9.160.81] (nib.isi.edu [128.9.160.81]) (authenticated bits=0) by darkstar.isi.edu (8.13.8/8.13.8) with ESMTP id s91MZYUd012639 (version=TLSv1/SSLv3 cipher=DHE-RSA-AES128-SHA bits=128 verify=NOT); Wed, 1 Oct 2014 15:35:34 -0700 (PDT)
Message-ID: <542C81B7.10601@isi.edu>
Date: Wed, 01 Oct 2014 15:35:35 -0700
From: Joe Touch <touch@isi.edu>
User-Agent: Mozilla/5.0 (Windows NT 6.3; WOW64; rv:24.0) Gecko/20100101 Thunderbird/24.6.0
MIME-Version: 1.0
To: Fernando Gont <fernando@gont.com.ar>, IPv6 Operations <v6ops@ietf.org>
References: <542A36AC.9030203@gont.com.ar>
In-Reply-To: <542A36AC.9030203@gont.com.ar>
Content-Type: text/plain; charset="ISO-8859-1"
Content-Transfer-Encoding: 7bit
X-ISI-4-43-8-MailScanner: Found to be clean
X-MailScanner-From: touch@isi.edu
Archived-At: http://mailarchive.ietf.org/arch/msg/v6ops/nKnvxDnkkmAy5JqFZgSt7d2wI6Q
Cc: "draft-gont-v6ops-ipv6-ehs-in-real-world@tools.ietf.org" <draft-gont-v6ops-ipv6-ehs-in-real-world@tools.ietf.org>, V6ops Chairs <v6ops-chairs@tools.ietf.org>
Subject: Re: [v6ops] IPv6 Extension Headers in the Real World
X-BeenThere: v6ops@ietf.org
X-Mailman-Version: 2.1.15
Precedence: list
List-Id: v6ops discussion list <v6ops.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/v6ops>, <mailto:v6ops-request@ietf.org?subject=unsubscribe>
List-Archive: <http://www.ietf.org/mail-archive/web/v6ops/>
List-Post: <mailto:v6ops@ietf.org>
List-Help: <mailto:v6ops-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/v6ops>, <mailto:v6ops-request@ietf.org?subject=subscribe>
X-List-Received-Date: Wed, 01 Oct 2014 22:36:01 -0000

There is no need for multiple documents on this topic. This information
should be rolled into draft-gont-opsec-ipv6-eh-filtering-02

Joe

On 9/29/2014 9:50 PM, Fernando Gont wrote:
> Folks,
> 
> Earlier in September we published a revision of our I-D "IPv6 Extension
> Headers in the Real World"
> (<https://tools.ietf.org/html/draft-gont-v6ops-ipv6-ehs-in-real-world>).
> 
> At this point in time, we're interested in knowing whether our I-D is of
> value for the IPv6 ops community, such that we can decide whether to
> continue working/improving it. Additionally, if there's anything you
> think we've missed in the document, we'd like to hear from you.
> 
> Overall, our I-D is meant to provide a reality-check with respect to the
> issues surrounding IPv6 Extension Headers and their use on the public
> Internet. More specifically, its goals are:
> 
> 1) Provide data regarding support of IPv6 EHs in the real world.
> 
>     This is interesting data to refer people to (e.g., folks
>     developing protocols) regarding the extent to which IPv6 EHs
>     are usable on the public Internet (at least with web, mail, and
>     name servers).
> 
> 
> 2) Summarize the issues associated with IPv6 EHs (performance, security,
> etc.)
> 
>     This is of use for folks concerned with the issues surrounding
>     IPv6 EHs, and covers practical issues.
> 
> 
> 3) Summarizes the implications of the aforementioned filtering.
> 
>     For example, if you're designing a protocol that is meant to
>     work on the public Internet, you may want to provide some fall-back
>     mechanism that does not employ IPv6 EHs.
> 
>     Yet another of the implications is the security issue that has
>     been discussed on-list: if e.g. IPv6 fragments are dropped and you
>     can be tricked into generating them, you may be subject to a DoS
>     attack.
> 
> 
> 4) Flag possible further work
> 
>    Here we try to flag areas where the further work may be needed,
>    such as adding fall-back mechanisms to some existing protocols,
>    or avoiding the use of IPv6 EHs where possible.
> 
> 
> Thanks!
> 
> Best regards,
>