Re: [v6ops] new draft: draft-taylor-v6ops-fragdrop

Brian E Carpenter <brian.e.carpenter@gmail.com> Thu, 01 November 2012 09:35 UTC

Return-Path: <brian.e.carpenter@gmail.com>
X-Original-To: v6ops@ietfa.amsl.com
Delivered-To: v6ops@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 637A021F8509 for <v6ops@ietfa.amsl.com>; Thu, 1 Nov 2012 02:35:25 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -101.641
X-Spam-Level:
X-Spam-Status: No, score=-101.641 tagged_above=-999 required=5 tests=[AWL=0.050, BAYES_00=-2.599, RCVD_ILLEGAL_IP=1.908, RCVD_IN_DNSWL_LOW=-1, USER_IN_WHITELIST=-100]
Received: from mail.ietf.org ([64.170.98.30]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id phYc3O1webKx for <v6ops@ietfa.amsl.com>; Thu, 1 Nov 2012 02:35:24 -0700 (PDT)
Received: from mail-wi0-f170.google.com (mail-wi0-f170.google.com [209.85.212.170]) by ietfa.amsl.com (Postfix) with ESMTP id 7A51A21F84FE for <v6ops@ietf.org>; Thu, 1 Nov 2012 02:35:24 -0700 (PDT)
Received: by mail-wi0-f170.google.com with SMTP id hm2so155951wib.1 for <v6ops@ietf.org>; Thu, 01 Nov 2012 02:35:23 -0700 (PDT)
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=gmail.com; s=20120113; h=message-id:date:from:organization:user-agent:mime-version:to:cc :subject:references:in-reply-to:content-type :content-transfer-encoding; bh=fWbue+rGYOYKgr/uG7qOGdnyhwDUKMz//Yx1QFq16jk=; b=tA/e3lzT/WNGPvCrUfnIlOVSJKoN3M8gd3dVt8dbcikp7F0ovFXDWmT6eShU16qgPy MpUPGktUQ5IkZ06558IvgKgCO0ohcIMm3Ptpq9KqGfbX/9KdLxMKbg0r+yn6TVXXe/+0 JLGMmZIoGlghc7A+FsqLLldQ+1IBtj4SlvB+hFysk6CaAHYPP/uMpqnQFCV7KaHpjcXD M3Uvvk6MkKVvSn8CIU6sDZ4M4kkoLsAWGXEMXT7antdsUvLziREYlfWY1w8+mDxgbdeE JZjxY8F3LhqYfB1GIEwoNLHWXQmPeqHi87KCl21Ipw5ZgxykAFEGNr93+O9kVF01h2ZJ wCNA==
Received: by 10.180.82.72 with SMTP id g8mr962794wiy.20.1351762523574; Thu, 01 Nov 2012 02:35:23 -0700 (PDT)
Received: from [192.168.1.65] (host-2-102-216-140.as13285.net. [2.102.216.140]) by mx.google.com with ESMTPS id dt9sm21226261wib.1.2012.11.01.02.35.20 (version=SSLv3 cipher=OTHER); Thu, 01 Nov 2012 02:35:21 -0700 (PDT)
Message-ID: <50924264.7040300@gmail.com>
Date: Thu, 01 Nov 2012 09:35:32 +0000
From: Brian E Carpenter <brian.e.carpenter@gmail.com>
Organization: University of Auckland
User-Agent: Thunderbird 2.0.0.6 (Windows/20070728)
MIME-Version: 1.0
To: Joe Touch <touch@isi.edu>
References: <CAKD1Yr13cNspdWvTaXxHt4R_8UB-CKeA4nq8_XWrkbFGCgW7Gg@mail.gmail.com> <5090DECF.3050100@gmail.com> <CAKD1Yr1dUy-f78A2+kfA7NjpzD0WQRT8iwqGYAm5A=Erodpn-A@mail.gmail.com> <20121031.122110.41655699.sthaug@nethelp.no> <50910E41.2030100@gmail.com> <CAKD1Yr0mTTcVeq+Qf0fLv3UCBP_90QmStkK3Ha4tDdm3FxJjVA@mail.gmail.com> <50915F86.7050304@gmail.com> <509165B8.404@si6networks.com> <509169C2.9040208@isi.edu> <50916F21.6030303@si6networks.com> <509174F1.8080809@isi.edu>
In-Reply-To: <509174F1.8080809@isi.edu>
Content-Type: text/plain; charset="UTF-8"
Content-Transfer-Encoding: 7bit
Cc: Fernando Gont <fgont@si6networks.com>, v6ops@ietf.org
Subject: Re: [v6ops] new draft: draft-taylor-v6ops-fragdrop
X-BeenThere: v6ops@ietf.org
X-Mailman-Version: 2.1.12
Precedence: list
List-Id: v6ops discussion list <v6ops.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/v6ops>, <mailto:v6ops-request@ietf.org?subject=unsubscribe>
List-Archive: <http://www.ietf.org/mail-archive/web/v6ops>
List-Post: <mailto:v6ops@ietf.org>
List-Help: <mailto:v6ops-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/v6ops>, <mailto:v6ops-request@ietf.org?subject=subscribe>
X-List-Received-Date: Thu, 01 Nov 2012 09:35:25 -0000

On 31/10/2012 18:58, Joe Touch wrote:
> 
> 
> On 10/31/2012 11:34 AM, Fernando Gont wrote:
>> On 10/31/2012 04:11 PM, Joe Touch wrote:
>>> Yes, but the whole point of the IPv6 option architecture was to avoid
>>> the issues seen with IPv4 options.
>>
>> The only thing in that IPv6 would avoid is requiring routers to parse
>> *all* options, just to find the ones that need to be processed by
>> routers.
> 
> Yes.

No. The only extension header that *needs* to be parsed by intermediate
routers is the hop-by-hop options header, and that is the first one (if
present).

(You can legitimately argue that the hbh header and the routing header
are effectively useless, but that doesn't break fundamental connectivity.)

IPv6 routers should have nothing to do with fragmentation.

The problem is due to middleboxes that break the IPv6 spec by inspecting
any part of the packet beyond the hop-by-hop header and discarding what
they don't understand.

    Brian
> 
> However, since fragmentation is near the end of the set of possible
> options, that means that ANY recommendations about how IPv6 routers
> handle options will require deep option parsing. How does that help?
> 
>> While the IPv6 extension header syntax is good in terms of extensibility
>> (in principle, you can include as many options as you want, it also
>> allows for pathological cases in which the header chain is split among
>> multiple fragments (we're working on fixing that one), and also requires
>> any box that wants to find the upper-layer header to parse the entire
>> IPv6 header chain -- something that a large number of devices cannot do
>> at wire speed.
> 
> I thought we were talking more about fragmentation - which defeats
> filtering on upper layer info anyway.
> 
> The non-HBH options can be split across fragments, but not the HBH ones.
> 
>> For filtering purposes, it'd been interesting to have a pointer to the
>> upper-layer header -- although with the original specs, it might simply
>> not be there. With IPv4, at the very least it's trivial to find the
>> upper layer protocol: just skip the first IHL of the packet, and you're
>> there. With IPv6, at leasts in theory, it might be impossible (unless
>> you reassemble-filter-and-refragment).
> 
> In both cases fragmentation defeats DPI. But then so does IPsec.
> 
> Yes, IPv6's chained header structure is not DPI-friendly. But this isn't
> news, is it?
> 
>>> Consider that:
>>>
>>>      - routers don't like fragments because they can't inspect them
>>>
>>>      - so we tunnel and fragment in a higher level protocol
>>>
>>>          the router now needs to implement the higher protocol
>>>          and still fragment or else we cannot have tunnels
>>>
>>>          the routers on the path still cannot inspect the
>>>          higher-level fragments
>>>
>>> So we're back to the reason this all breaks - routers doing something
>>> that we simply cannot support in the architecture.
>>
>> It's probably time to accept that firewalls and routers implementing
>> ACLs are part of the architecture.
> 
> We need to accept one of three things:
> 
>     DPI is part of the architecture
>         either don't use IPv6 options
>         or don't use IPv6
> 
>     IPv6 options are part of the architecture
>         DPI isn't meaningful anymore
> 
>> One might argue that the use of
>> firewalls couldn't be foreseen with IPv4. But at the time IPv6 was
>> designed, it was already a reality.
> 
> So that means IPv6 was designed to inhibit the use of options, or
> designed to inhibit its own deployment.
> 
> Seems like the latter is coming to fruition.
> 
> Joe
>