[v6ops] Re: Traffic control protocols (PCP and UPnP IGD)
Daryll Swer <contact@daryllswer.com> Sat, 03 August 2024 07:10 UTC
Return-Path: <contact@daryllswer.com>
X-Original-To: v6ops@ietfa.amsl.com
Delivered-To: v6ops@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 063E7C169416 for <v6ops@ietfa.amsl.com>; Sat, 3 Aug 2024 00:10:52 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -2.107
X-Spam-Level:
X-Spam-Status: No, score=-2.107 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, DKIM_SIGNED=0.1, DKIM_VALID=-0.1, DKIM_VALID_AU=-0.1, DKIM_VALID_EF=-0.1, HTML_MESSAGE=0.001, SPF_HELO_NONE=0.001, SPF_PASS=-0.001, T_SCC_BODY_TEXT_LINE=-0.01, URIBL_DBL_BLOCKED_OPENDNS=0.001, URIBL_ZEN_BLOCKED_OPENDNS=0.001] autolearn=ham autolearn_force=no
Authentication-Results: ietfa.amsl.com (amavisd-new); dkim=pass (2048-bit key) header.d=daryllswer.com
Received: from mail.ietf.org ([50.223.129.194]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id I3j2NM3Gdt2d for <v6ops@ietfa.amsl.com>; Sat, 3 Aug 2024 00:10:47 -0700 (PDT)
Received: from mail-pl1-x632.google.com (mail-pl1-x632.google.com [IPv6:2607:f8b0:4864:20::632]) (using TLSv1.3 with cipher TLS_AES_128_GCM_SHA256 (128/128 bits) key-exchange X25519 server-signature ECDSA (P-256) server-digest SHA256) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id BCEA9C14F70B for <v6ops@ietf.org>; Sat, 3 Aug 2024 00:10:45 -0700 (PDT)
Received: by mail-pl1-x632.google.com with SMTP id d9443c01a7336-1ff3d5c6e9eso39284945ad.1 for <v6ops@ietf.org>; Sat, 03 Aug 2024 00:10:45 -0700 (PDT)
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=daryllswer.com; s=google; t=1722669045; x=1723273845; darn=ietf.org; h=cc:to:subject:message-id:date:from:in-reply-to:references :mime-version:from:to:cc:subject:date:message-id:reply-to; bh=wVEVFC4zuAzLWBNJv4DcwwYikbGXUYtz8llNNOLeAwM=; b=OIuDlxW2OVQqvzT3c+LN/Bv143i4i0kZj946xLghU1ZsyIudVNo7AuHKz0xrsrpgoJ IBbtoMu5pwCjFvc1tL8jK7RthMbT7NblwNpGNCkUWYLJQpl0Of9D0bnjygU9mHbfCxtb qTDOhp8C1Dl1Jvq8f4pEnCHoevWs2GXqRzPidflz3VU0tHTRDhTnYj1p5jYw5ooPEB7o 5TZd7DrcVqS53Sl7TVFGw+378/KzMmslvOzPwZX8IUgEn4Zebfifh/6xNPdfR/X+uFEp eCm6iztFewbuoQFJupQEbLO/ij5CTrORcgenoyY7ogJdP480BZy8UvZDPpl1f5lkP9/B gWmw==
X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20230601; t=1722669045; x=1723273845; h=cc:to:subject:message-id:date:from:in-reply-to:references :mime-version:x-gm-message-state:from:to:cc:subject:date:message-id :reply-to; bh=wVEVFC4zuAzLWBNJv4DcwwYikbGXUYtz8llNNOLeAwM=; b=Rex2gaNd1Jf9/TpVIGSLLpcaSSRg+Z45qKvrfE2ymn+23Q0bhVVhHoHpV+twNrLe4B ANN5PgYVbuhneU513fKIY653uPNesb3j2JUkPyZcI2xrfWQN5Fa+B94ALf7zcbT2Wahk vsVSdqXA2IVQ4rrOJR7S6f9ZdAUy9imjElF1MsioZdwW9YQutoGMQaLq4+bT3Ty+wdCu FH3SCgcZzAkeKJU4oPWYLhMJE3v68ZQfWsl3a13C2IuDQRrVBbt7xTGqH0bfcD3ERpEj Br3+YUk3mxcqJwTtD8V7PuBSH/uRsdFpPASp5pQ7uopW5Aoov+nFGtQP4pNqdXxhz2ZM 0flA==
X-Forwarded-Encrypted: i=1; AJvYcCXktaKQ4qrIXG0q1aJ6EP6145ESvRCLmyR3vQxFfSvBI/hX3XuNNKYcW6yeaZxbKquKzJavnkbuUMzkk+aXng==
X-Gm-Message-State: AOJu0YwFQhREMwQ8M3emgoO1F8hXy37k/h3VirbTwe9yK+GVd8F7b0g0 X0dt2Zw/OANAZzgFcCcSH1IT/D+Wif/D99t3++m6bZ/dK2AqpWX6lvN3bdiRNwa/qJQSMWmGkXH amHk=
X-Google-Smtp-Source: AGHT+IFA3hKZB7rVSpibAXbt8mgi97HITW1Am0Ogxt7YkJ4/owKZB0h1ykTJT5LwS6XmGFa2VqWBHQ==
X-Received: by 2002:a17:902:edd3:b0:1fc:4aff:5b46 with SMTP id d9443c01a7336-1ff574911a6mr53325665ad.47.1722669044834; Sat, 03 Aug 2024 00:10:44 -0700 (PDT)
Received: from mail-pf1-f171.google.com (mail-pf1-f171.google.com. [209.85.210.171]) by smtp.gmail.com with ESMTPSA id d9443c01a7336-1ff592979d7sm28119665ad.259.2024.08.03.00.10.44 for <v6ops@ietf.org> (version=TLS1_3 cipher=TLS_AES_128_GCM_SHA256 bits=128/128); Sat, 03 Aug 2024 00:10:44 -0700 (PDT)
Received: by mail-pf1-f171.google.com with SMTP id d2e1a72fcca58-70d25b5b6b0so6782531b3a.2 for <v6ops@ietf.org>; Sat, 03 Aug 2024 00:10:44 -0700 (PDT)
X-Forwarded-Encrypted: i=1; AJvYcCWttqonSOm/lYopzCdWpdvyz3T1/i1YCLkZTYOK5P9SSPngkq9FGxemie55MgHK1nblU4M80oT2uPI9SB4QRA==
X-Received: by 2002:a05:6a20:6f8a:b0:1c0:ee57:a9a3 with SMTP id adf61e73a8af0-1c699620fe4mr6879242637.35.1722669044035; Sat, 03 Aug 2024 00:10:44 -0700 (PDT)
MIME-Version: 1.0
References: <TYVPR01MB10750FB6A5FA4EB034F9B5B8AD2B42@TYVPR01MB10750.jpnprd01.prod.outlook.com> <CAPt1N1kA9KETiVsK744m5AaXvCnspsN8zkdqRR1OcMo-ftkNfA@mail.gmail.com> <TYVPR01MB10750B17554096318B8C49BACD2B42@TYVPR01MB10750.jpnprd01.prod.outlook.com> <BF9C2E26-E49C-4764-9CEA-8E7738801819@employees.org> <TYVPR01MB1075001C9D2EC290201284F66D2B42@TYVPR01MB10750.jpnprd01.prod.outlook.com> <CACyFTPH7XJ=fV9jW0h59UH-TDL7OGWw_ifehPvbFzzoH2Ln0Ng@mail.gmail.com> <ZqQDMjckkFr3_hsv@Space.Net> <CAPt1N1mhMYck7Y-SOgFfpA7OD6b0H8Y5gAjsYHWSZLFfzdiRzA@mail.gmail.com> <ZqVh5oFVFSjAYqcL@Space.Net> <CAPt1N1=T+YYPuCJq64mffTqY-1Kp+Kv9hqt+TJa_5iMUh3QC4g@mail.gmail.com> <ZqYXiBz0oFsafbwC@Space.Net> <CAPt1N1m4Z4yBx60x9VPjN5kmbL3-DY5kpfpTnpSNi=z3e98-qw@mail.gmail.com> <CACyFTPEOgUNXZSjFz0vtgju549VfABaZvt8dtds_ekmUzKAaLQ@mail.gmail.com> <3B7CF16F-D6B8-4813-903C-88AF513AD8AF@gmail.com> <CACyFTPFhZbFmm8eGxxoEdfF_djsT0XKj86gE4nEFhB0Y=3VZVQ@mail.gmail.com> <643C7572-055C-45B2-9830-42F7C615E7AD@gmail.com>
In-Reply-To: <643C7572-055C-45B2-9830-42F7C615E7AD@gmail.com>
From: Daryll Swer <contact@daryllswer.com>
Date: Sat, 03 Aug 2024 12:40:05 +0530
X-Gmail-Original-Message-ID: <CACyFTPHBa=xh-8D+w==5D2no04vRKm9h44M=+kZ8mTavSox8rA@mail.gmail.com>
Message-ID: <CACyFTPHBa=xh-8D+w==5D2no04vRKm9h44M=+kZ8mTavSox8rA@mail.gmail.com>
To: Dan Wing <danwing@gmail.com>
Content-Type: multipart/alternative; boundary="0000000000006f7e22061ec22493"
Message-ID-Hash: IIHTEXZYQBL5C6U3TNUSGPL7OQNMUGGF
X-Message-ID-Hash: IIHTEXZYQBL5C6U3TNUSGPL7OQNMUGGF
X-MailFrom: contact@daryllswer.com
X-Mailman-Rule-Misses: dmarc-mitigation; no-senders; approved; emergency; loop; banned-address; member-moderation; header-match-v6ops.ietf.org-0; nonmember-moderation; administrivia; implicit-dest; max-recipients; max-size; news-moderation; no-subject; digests; suspicious-header
CC: Ole Troan <otroan@employees.org>, "v6ops@ietf.org" <v6ops@ietf.org>
X-Mailman-Version: 3.3.9rc4
Precedence: list
Subject: [v6ops] Re: Traffic control protocols (PCP and UPnP IGD)
List-Id: v6ops discussion list <v6ops.ietf.org>
Archived-At: <https://mailarchive.ietf.org/arch/msg/v6ops/yEMNdA3d6J2b3d3eiP4zshT-93Q>
List-Archive: <https://mailarchive.ietf.org/arch/browse/v6ops>
List-Help: <mailto:v6ops-request@ietf.org?subject=help>
List-Owner: <mailto:v6ops-owner@ietf.org>
List-Post: <mailto:v6ops@ietf.org>
List-Subscribe: <mailto:v6ops-join@ietf.org>
List-Unsubscribe: <mailto:v6ops-leave@ietf.org>
> They don't because the underlying firewall or NAT does not support those protocols. 1. There's no NAT in IPv6. 2. MOST CPEs run Linux Kernel, and Linux Kernel for IPv6 NAT-less, supports those protocols just fine. What you call “underlying firewall” is Linux Netfilter framework — supports DCCP, UDP-Lite, SCTP. *--* Best Regards Daryll Swer Website: daryllswer.com <https://mailtrack.io/l/32252de6fc1a94be7c816658a87c618bc423e707?url=https%3A%2F%2Fwww.daryllswer.com&u=2153471&signature=cf50271b178daf9b> On Sat, 3 Aug 2024 at 04:29, Dan Wing <danwing@gmail.com> wrote: > On Aug 1, 2024, at 6:45 PM, Daryll Swer <contact@daryllswer.com> wrote: > > > The protocol supports other protocols, but I bet most/all implementations >> do not bother handling anything beyond TCP and UDP. That's pretty typical >> for lots of network gear (router ACLs, firewalls, and of course NAT/NAPT). >> Running over UDP is a long-standing workaround ("solution") for various >> protocols like IPsec (RFC3948), SCTP (RFC6951), and DCCP (RFC6773). The >> overhead of the UDP header is not ideal, but UDP is deployable on the >> Internet. >> > > Unfortunately, yes. But we are talking about native IPv6, so NAT-related > hacks and so-called “solutions” (polite word for plaster-fixes) should be > discouraged. > > > IPv6 residential CPE are encouraged to filter incoming traffic (*) and PCP > provides a way for those filters to be opened by the host for incoming > traffic. PCP is not solely useful for IPv4 NAPT/NAT. > > (*) https://datatracker.ietf.org/doc/html/rfc9099#section-5 > (*) https://datatracker.ietf.org/doc/html/rfc6092 > > I.e. PCP implementations MUST support, at the very least, what's written > in RFC 6887, section-2.2. > > > They don't because the underlying firewall or NAT does not support those > protocols. > > Interestingly, UDP-Lite (RFC3828) isn't mentioned there, but probably not > too difficult for an implementation to support both. > > > Sure, it's not difficult. > > More ports for UDP+UDP-Lite - Not that it matters for native IPv6, though. > > > -d > > > > > *--* > Best Regards > Daryll Swer > Website: daryllswer.com > <https://mailtrack.io/l/420efa8784d17f20a16b269cb48675ffd728cc77?url=https%3A%2F%2Fwww.daryllswer.com&u=2153471&signature=775f237a6c01c29b> > > > On Fri, 2 Aug 2024 at 00:37, Dan Wing <danwing@gmail.com> wrote: > >> On Jul 28, 2024, at 7:01 AM, Daryll Swer <contact= >> 40daryllswer.com@dmarc.ietf.org> wrote: >> >> I'm all in for PCP signalling to open a port in the stateful firewall as >> I originally described, and PCP shouldn't encourage locking of the >> ecosystem to just TCP/UDP, it should support all standardised layer 4 >> protocols (DCCP, UDP-Lite, SCTP, maybe more). >> >> >> https://datatracker.ietf.org/doc/html/rfc6887#section-2.2, >> The PCP Opcodes defined in this document are designed to support >> transport-layer protocols that use a 16-bit port number (e.g., TCP, >> UDP, Stream Control Transmission Protocol (SCTP) [RFC4960], and >> Datagram Congestion Control Protocol (DCCP) [RFC4340]). Protocols >> that do not use a port number (e.g., Resource Reservation Protocol >> (RSVP), IP Encapsulating Security Payload (ESP) [RFC4303], ICMP, and >> ICMPv6) are supported for IPv4 firewall, IPv6 firewall, and NPTv6 >> functions, but are out of scope for any NAT functions. >> >> The protocol supports other protocols, but I bet most/all implementations >> do not bother handling anything beyond TCP and UDP. That's pretty typical >> for lots of network gear (router ACLs, firewalls, and of course NAT/NAPT). >> Running over UDP is a long-standing workaround ("solution") for various >> protocols like IPsec (RFC3948), SCTP (RFC6951), and DCCP (RFC6773). The >> overhead of the UDP header is not ideal, but UDP is deployable on the >> Internet. >> >> -d >> >> >
- [v6ops] Traffic control protocols (PCP and UPnP I… Stuart Cheshire
- [v6ops] Re: Traffic control protocols (PCP and UP… Ted Lemon
- [v6ops] Re: Traffic control protocols (PCP and UP… Kawashima Masanobu(川島 正伸)
- [v6ops] Re: Traffic control protocols (PCP and UP… jordi.palet@consulintel.es
- [v6ops] Re: Traffic control protocols (PCP and UP… Kawashima Masanobu(川島 正伸)
- [v6ops] Re: Traffic control protocols (PCP and UP… Ted Lemon
- [v6ops] Re: Traffic control protocols (PCP and UP… Kawashima Masanobu(川島 正伸)
- [v6ops] Re: Traffic control protocols (PCP and UP… Ole Troan
- [v6ops] Re: Traffic control protocols (PCP and UP… Daryll Swer
- [v6ops] Re: Traffic control protocols (PCP and UP… Ted Lemon
- [v6ops] Re: Traffic control protocols (PCP and UP… Daryll Swer
- [v6ops] Re: Traffic control protocols (PCP and UP… Ted Lemon
- [v6ops] Re: Traffic control protocols (PCP and UP… mohamed.boucadair
- [v6ops] Re: Traffic control protocols (PCP and UP… Daryll Swer
- [v6ops] Re: Traffic control protocols (PCP and UP… Kawashima Masanobu(川島 正伸)
- [v6ops] Re: Traffic control protocols (PCP and UP… Daryll Swer
- [v6ops] Re: Traffic control protocols (PCP and UP… Kawashima Masanobu(川島 正伸)
- [v6ops] Re: Traffic control protocols (PCP and UP… Daryll Swer
- [v6ops] Re: Traffic control protocols (PCP and UP… Brian Candler
- [v6ops] Re: Traffic control protocols (PCP and UP… Daryll Swer
- [v6ops] Re: Traffic control protocols (PCP and UP… Kawashima Masanobu(川島 正伸)
- [v6ops] Re: Traffic control protocols (PCP and UP… Kawashima Masanobu(川島 正伸)
- [v6ops] Re: Traffic control protocols (PCP and UP… Daryll Swer
- [v6ops] Re: Traffic control protocols (PCP and UP… jordi.palet@consulintel.es
- [v6ops] Re: Traffic control protocols (PCP and UP… Daryll Swer
- [v6ops] Re: Traffic control protocols (PCP and UP… Kawashima Masanobu(川島 正伸)
- [v6ops] Re: Traffic control protocols (PCP and UP… Brian Candler
- [v6ops] Re: Traffic control protocols (PCP and UP… Gert Doering
- [v6ops] Re: Traffic control protocols (PCP and UP… Daryll Swer
- [v6ops] Re: Traffic control protocols (PCP and UP… Ted Lemon
- [v6ops] Re: Traffic control protocols (PCP and UP… Gert Doering
- [v6ops] Re: Traffic control protocols (PCP and UP… Ted Lemon
- [v6ops] Re: Traffic control protocols (PCP and UP… Gert Doering
- [v6ops] Re: Traffic control protocols (PCP and UP… Ted Lemon
- [v6ops] Re: Traffic control protocols (PCP and UP… Gert Doering
- [v6ops] Re: Traffic control protocols (PCP and UP… Ted Lemon
- [v6ops] Re: Traffic control protocols (PCP and UP… Daryll Swer
- [v6ops] Re: Traffic control protocols (PCP and UP… Dan Wing
- [v6ops] Re: Traffic control protocols (PCP and UP… Daryll Swer
- [v6ops] Re: Traffic control protocols (PCP and UP… Dan Wing
- [v6ops] Re: Traffic control protocols (PCP and UP… Daryll Swer