Re: [v6ops] [Last-Call] Tsvart last call review of draft-ietf-v6ops-ipv6-ehs-packet-drops-05

Tom Herbert <tom@herbertland.com> Tue, 23 February 2021 14:34 UTC

Return-Path: <tom@herbertland.com>
X-Original-To: v6ops@ietfa.amsl.com
Delivered-To: v6ops@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 8A8203A2C0F for <v6ops@ietfa.amsl.com>; Tue, 23 Feb 2021 06:34:26 -0800 (PST)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -1.896
X-Spam-Level:
X-Spam-Status: No, score=-1.896 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, DKIM_SIGNED=0.1, DKIM_VALID=-0.1, RCVD_IN_DNSWL_BLOCKED=0.001, SPF_HELO_NONE=0.001, SPF_NONE=0.001, URIBL_BLOCKED=0.001] autolearn=unavailable autolearn_force=no
Authentication-Results: ietfa.amsl.com (amavisd-new); dkim=pass (2048-bit key) header.d=herbertland-com.20150623.gappssmtp.com
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id IuBSybO-Dov8 for <v6ops@ietfa.amsl.com>; Tue, 23 Feb 2021 06:34:24 -0800 (PST)
Received: from mail-ed1-x52b.google.com (mail-ed1-x52b.google.com [IPv6:2a00:1450:4864:20::52b]) (using TLSv1.2 with cipher ECDHE-RSA-AES128-GCM-SHA256 (128/128 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id 8F0883A2BFE for <v6ops@ietf.org>; Tue, 23 Feb 2021 06:34:17 -0800 (PST)
Received: by mail-ed1-x52b.google.com with SMTP id s11so26127277edd.5 for <v6ops@ietf.org>; Tue, 23 Feb 2021 06:34:17 -0800 (PST)
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=herbertland-com.20150623.gappssmtp.com; s=20150623; h=mime-version:references:in-reply-to:from:date:message-id:subject:to :cc; bh=7koVTv5Vje5J46Hd120/Vot6MsMt0Ov5UUrvwh1F1Uk=; b=LDiYF1WSAH5KqNmlqPw1/i7A+s6sLZ5gbkPwQIG+mLoxb8wD55MYPFAEBmzlwqnKxG rOA6cyjKQfafnvxFRmFFUt8o1odiakFOATpyt2WcIsLdGkQrdHM0dx/Mow3s5KsmrsTX R3ZDtVV6tfDjGL3DpN3kTWBxpG4i1HqT50tS/MhE50xGg2FkaXlHmzVZm5TKzXRb7KwO My2Cb/m9mFsJZxY52kiCqCGgDNK1gPXuKJCGVEDwdxlkurOfRh0pr/LRY0AKdwIDjwKe fleDuL6TbOafS3Vr1JbWkIvjtdQFBq4F3WsE18eMEoOrcly1+jPrFiQ7sfIolvImDhzo 6mHw==
X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20161025; h=x-gm-message-state:mime-version:references:in-reply-to:from:date :message-id:subject:to:cc; bh=7koVTv5Vje5J46Hd120/Vot6MsMt0Ov5UUrvwh1F1Uk=; b=qN5MTmnnz1ZfQSaw3fJU4mT0jMnfqppw2s12+0Q1XiXDKvR4OTbq1hO/QyYDuhxuLT Mw2pOJI4nVKi2x3+qN8isObETPM/O6SH8r6zvy40kOJ2e9gC4BG4nJ4+PGyIWubj512W MWaRXod+VhJbAgCI9EqQto/1qP5mHhPoCdNLHOYPKPArfKH03ZP6KVMDFfF1fYNIaq8H ndLVzN6jTNvlhS4+TCsnwnD/Ltpdc6g3nlcvXl/qcHK4/hFZ8h+zFdvabTe2XXiBjChA dbqOhbWuiua4nNH8l8HVBLJxU62rt6aTJ1vsMChX/OppEmyc9taTlUQ9W2c+3Yg4iyns tuFg==
X-Gm-Message-State: AOAM533CHXQ2fXu+HbhAi+h4GkXHyA3fB7wD5BPNdBepthWISpQSKIcY gUV/n9MS3AqA5o3TB+l4DZqSBjeACKEYnBxjt+JYqg==
X-Google-Smtp-Source: ABdhPJy/PB0fIs41485Ll/ui3UEBJCiqY1BgkBjEVPHIsA1ppV96Rv4i8bgcZP6eV44ZjojZHH58RGjVmV3tkNBcF2o=
X-Received: by 2002:aa7:cb0d:: with SMTP id s13mr27858070edt.221.1614090855800; Tue, 23 Feb 2021 06:34:15 -0800 (PST)
MIME-Version: 1.0
References: <161366727749.10107.14514005068158901089@ietfa.amsl.com> <42668fb5-a355-e656-7d99-c40b3d33fb92@si6networks.com> <0e377231-c319-2157-30a0-759e2f96a692@gmail.com> <5f464f17-85ed-f105-35f9-02f35d04aed2@si6networks.com> <CALx6S364zGbq_HZNNVEaJHnHccuk4Zau2DXhmaVYbwnYQc-5bw@mail.gmail.com> <1847e8e3-543f-5deb-dd14-f7c7fa3677db@si6networks.com> <CALx6S34TPppMRJrOvyJ05LLeRvv+S51pQHJnzZDKk-qOdsF0AA@mail.gmail.com> <e41f3484-f816-e185-2d99-94323c8da732@si6networks.com> <CALx6S34qSxGijVcs229bAL5gMhMvMNYUXm3yEmrg6wxUiUAiaA@mail.gmail.com> <bf83d228-25bc-21bb-f984-d58ead6bf492@si6networks.com>
In-Reply-To: <bf83d228-25bc-21bb-f984-d58ead6bf492@si6networks.com>
From: Tom Herbert <tom@herbertland.com>
Date: Tue, 23 Feb 2021 07:34:04 -0700
Message-ID: <CALx6S35Kh-QAXJDAucuw5Wty37MBiwS=pqQknMZ+15b7D5Sn8A@mail.gmail.com>
To: Fernando Gont <fgont@si6networks.com>
Cc: Brian E Carpenter <brian.e.carpenter@gmail.com>, Gorry Fairhurst <gorry@erg.abdn.ac.uk>, tsv-art@ietf.org, last-call@ietf.org, draft-ietf-v6ops-ipv6-ehs-packet-drops.all@ietf.org, IPv6 Operations <v6ops@ietf.org>
Content-Type: text/plain; charset="UTF-8"
Archived-At: <https://mailarchive.ietf.org/arch/msg/v6ops/qq9N0g1kRS3Fl5D2ezASeGznHm8>
Subject: Re: [v6ops] [Last-Call] Tsvart last call review of draft-ietf-v6ops-ipv6-ehs-packet-drops-05
X-BeenThere: v6ops@ietf.org
X-Mailman-Version: 2.1.29
Precedence: list
List-Id: v6ops discussion list <v6ops.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/v6ops>, <mailto:v6ops-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/v6ops/>
List-Post: <mailto:v6ops@ietf.org>
List-Help: <mailto:v6ops-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/v6ops>, <mailto:v6ops-request@ietf.org?subject=subscribe>
X-List-Received-Date: Tue, 23 Feb 2021 14:34:27 -0000

On Mon, Feb 22, 2021 at 11:14 AM Fernando Gont <fgont@si6networks.com> wrote:
>
> Tom,
>
> On 22/2/21 11:55, Tom Herbert wrote:
> > On Sun, Feb 21, 2021 at 2:39 AM Fernando Gont <fgont@si6networks.com> wrote:
> >>
> >> Hello, Tom,
> >>
> >> On 20/2/21 12:32, Tom Herbert wrote:
> >> [...]
> [....]
> >>
> >>> This is reflected in the statement: "If an IPv6 header chain is
> >>> sufficiently long that it exceeds the packet look-up capacity of the
> >>> router, the router might be unable to determine how the packet should
> >>> be handled, and thus could resort to dropping the packet." It's not to
> >>> me clear what "sufficiently long" means; in particular, such a
> >>> statement isn't helpful to the host stack developer trying to figure
> >>> out if the packets they're creating will be properly forwarded.
> >>
> >> "Long enough" for the router handling the packet. There are different
> >> vendors, and different models. S the specific value will vary across
> >> router vendors and models. In our document, we reference two sample
> >> values -- but they are certainly not the only ones.
> >>
> > Fernando,
> >
> > Yes, different routers do different things, but can you quantify what
> > the most commonly deployed routers do?
>
> That's not what this document is about.
>
>
> > If we can do that then we could
> > establish a better requirement for host stacks more than just "don't
> > send IPv6 header chains that are too long".
>
> This document intentionally focuses on elaborating on the underlying
> problem, and *not* on providing such a recommendation.  We can certainly
> embark ourselves on that project once we complete this one.
>

>From the draft:

"Unless appropriate mitigations are put in place (e.g., packet
dropping and/or rate- limiting), an attacker could simply send a large
amount of IPv6 traffic employing IPv6 Extension Headers with the
purpose of performing a Denial of Service (DoS) attack"

That is clearly recommending a mitigation which is to drop packets or
rate-limit. Without any parameterization, this effectively justifies
routers to arbitrarily drop all packets with any extension headers
(rate-limiting packets makes the protocol effectively useless). Also,
if mitigations are being mentioned then the draft should also mention
the possibility that routers could be fixed, this is particularly
apropos with regards to the "DoS due to implementation errors".
Contemporary routers are trending towards being programmable so
implementation errors should be more amendable to being fixed without
hardware swap out.

Tom

>
>
> > For instance, from the
> > draft: "some contemporary high-end routers are known to inspect up to
> > 192 bytes, while others are known to parse up to 384 bytes of
> > header.". That's good information since it at least starts to quantify
> > the router implementation constraints that are mostly the subject of
> > this draft (this data really needs a reference by the way).
>
> We reference such values for informative purposes. But the goal of this
> document is to provide a *qualitative* analysis.
>
> (We did include a reference for the two cited values, but our
> responsible AD suggested not to mention specific vendors/products. GIven
> your comment, I'll raise the question to him)
>
>
> > If we
> > establish what the most common limit is, say the 192 bytes that are
> > mentioned, then we could establish a requirement on routers that sets
> > a reasonable expectation for hosts stack as to what will be forwarded
> > with high probability.
>
> As noted, that's certainly out of the scope of this document. That said,
> it would seem to me that RFC7872 is providing the kind of information
> that you seem to be looking for (modulo a recommendation).
>
> Thanks,
> --
> Fernando Gont
> SI6 Networks
> e-mail: fgont@si6networks.com
> PGP Fingerprint: 6666 31C6 D484 63B2 8FB1 E3C4 AE25 0D55 1D4E 7492
>
>
>
>