[v6ops] Operational Implications of IPv6 Packets with Extension (Fwd: New Version Notification for draft-gont-v6ops-ipv6-ehs-packet-drops-00.txt)

Fernando Gont <fgont@si6networks.com> Wed, 01 July 2015 20:35 UTC

Return-Path: <fgont@si6networks.com>
X-Original-To: v6ops@ietfa.amsl.com
Delivered-To: v6ops@ietfa.amsl.com
Received: from localhost (ietfa.amsl.com [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id E1DF21A894A for <v6ops@ietfa.amsl.com>; Wed, 1 Jul 2015 13:35:34 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -1.902
X-Spam-Level:
X-Spam-Status: No, score=-1.902 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, SPF_HELO_PASS=-0.001, SPF_PASS=-0.001] autolearn=ham
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id cGyboPy4CfbY for <v6ops@ietfa.amsl.com>; Wed, 1 Jul 2015 13:35:32 -0700 (PDT)
Received: from web01.jbserver.net (web01.jbserver.net [IPv6:2a00:8240:6:a::1]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id C3BDE1A899D for <v6ops@ietf.org>; Wed, 1 Jul 2015 13:35:26 -0700 (PDT)
Received: from [186.137.82.224] (helo=[192.168.3.107]) by web01.jbserver.net with esmtpsa (TLSv1.2:DHE-RSA-AES128-SHA:128) (Exim 4.85) (envelope-from <fgont@si6networks.com>) id 1ZAOj3-00034m-96; Wed, 01 Jul 2015 22:35:21 +0200
Message-ID: <55944EFF.8020207@si6networks.com>
Date: Wed, 01 Jul 2015 17:35:11 -0300
From: Fernando Gont <fgont@si6networks.com>
User-Agent: Mozilla/5.0 (X11; Linux x86_64; rv:31.0) Gecko/20100101 Thunderbird/31.7.0
MIME-Version: 1.0
To: "v6ops@ops.ietf.org" <v6ops@ietf.org>
References: <20150701202921.11226.39596.idtracker@ietfa.amsl.com>
In-Reply-To: <20150701202921.11226.39596.idtracker@ietfa.amsl.com>
X-Forwarded-Message-Id: <20150701202921.11226.39596.idtracker@ietfa.amsl.com>
Content-Type: text/plain; charset=utf-8
Content-Transfer-Encoding: 8bit
Archived-At: <http://mailarchive.ietf.org/arch/msg/v6ops/vBibiO4FWeCa09B9_NjrnPQg2a8>
Cc: draft-gont-v6ops-ipv6-ehs-packet-drops@tools.ietf.org
Subject: [v6ops] Operational Implications of IPv6 Packets with Extension (Fwd: New Version Notification for draft-gont-v6ops-ipv6-ehs-packet-drops-00.txt)
X-BeenThere: v6ops@ietf.org
X-Mailman-Version: 2.1.15
Precedence: list
List-Id: v6ops discussion list <v6ops.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/v6ops>, <mailto:v6ops-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/v6ops/>
List-Post: <mailto:v6ops@ietf.org>
List-Help: <mailto:v6ops-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/v6ops>, <mailto:v6ops-request@ietf.org?subject=subscribe>
X-List-Received-Date: Wed, 01 Jul 2015 20:35:35 -0000

Folks,

A group of us published a new I-D trying to summarize the operational
and security implications. It is meant to summarize the reasons for
which operators may intentionally drop IPv6 packets containing IPv6
extension headers.

The I-D is available at:
<https://www.ietf.org/internet-drafts/draft-gont-v6ops-ipv6-ehs-packet-drops-00.txt>

As far as this I-D is concerned, think of us co-authors as the
messengers. The I-D doesn't argue itself whether you should (or should
not) drop packets with EHs, but simply discusses the challenge they
represent in some scenarios.

Comments will be more than welcome.

Thanks!

Best regards,
Fernando




-------- Forwarded Message --------
Subject: New Version Notification for
draft-gont-v6ops-ipv6-ehs-packet-drops-00.txt
Date: Wed, 01 Jul 2015 13:29:21 -0700
From: internet-drafts@ietf.org
To: Gert Doering <gert@space.net>;, Nick Hilliard <nick@inex.ie>;,
Shucheng LIU (Will) <liushucheng@huawei.com>;, Gert Doering
<gert@space.net>;, Warren Kumari <warren@kumari.net>;, Will Liu (Shucheng)
<liushucheng@huawei.com>;, Fernando Gont <fgont@si6networks.com>;, Nick
Hilliard <nick@inex.ie>;, Fernando Gont <fgont@si6networks.com>;, Warren
Kumari <warren@kumari.net>;


A new version of I-D, draft-gont-v6ops-ipv6-ehs-packet-drops-00.txt
has been successfully submitted by Fernando Gont and posted to the
IETF repository.

Name:		draft-gont-v6ops-ipv6-ehs-packet-drops
Revision:	00
Title:		Operational Implications of IPv6 Packets with Extension Headers
Document date:	2015-07-01
Group:		Individual Submission
Pages:		13
URL:
https://www.ietf.org/internet-drafts/draft-gont-v6ops-ipv6-ehs-packet-drops-00.txt
Status:
https://datatracker.ietf.org/doc/draft-gont-v6ops-ipv6-ehs-packet-drops/
Htmlized:
https://tools.ietf.org/html/draft-gont-v6ops-ipv6-ehs-packet-drops-00


Abstract:
   This document summarizes the security and operational implications of
   IPv6 extension headers, and attempts to analyze reasons why packets
   with IPv6 extension headers may be dropped in the public Internet.





Please note that it may take a couple of minutes from the time of submission
until the htmlized version and diff are available at tools.ietf.org.

The IETF Secretariat