On Wed, 16 Jul 2014, Brian E Carpenter wrote:
> The problem with both of these great inventions is that a single
> box on the path that takes the "drop" option breaks everything,

In that same vein, I wanted to object to this:


| 2.3.6.  Destination Options for IPv6 (Number=60)
|
| 2.3.6.1.  Uses
|
|    The Destination Options header is used to carry optional information
|    that need be examined only by a packet's destination node(s).
|
| 2.3.6.2.  Specification
|
|    This Extension Header is specified in [RFC2460].  At the time of this
|    writing, no options have been specified for this extension header.
|
| 2.3.6.3.  Specific Security Implications
|
|    No security implications are known, other than the general
|    implications of IPv6 extension headers.
|
| 2.3.6.4.  Operational and Interoperability Impact if Blocked
|
|    None.

Even if there were no destination options currently defined -- which in fact 
is not true -- there is huge operational impact if this extension header is 
routinely blocked: it would make it impossible to deploy any destination 
options 
at all.  The damage caused to the Internet by such practices is a recurring 
theme, 
and it should be spelled out explicitly here.  Failure to do so makes the 
advice 
that follows ("Pass packets that contain the Destination Options Header") seem 
weak and ill-motivated.

In fact, however, an examination of the references in the IANA IPv6 options 
registry indicates that the following destination options have been defined:

Hex Value       Binary Value    Description                     Reference       
Status
act     chg     rest

0x04    00      0       00100   Tunnel Encapsulation Limit      [RFC2473]       
PS
0xC9    11      0       01001   Home Address                    [RFC6275]       
PS
0x8B    10      0       01011   ILNP Nonce                      [RFC6744]       
EXP
0x8C    10      0       01100   Line-Identification Option      [RFC6788]       
PS

The text in 2.3.6.2 needs to be reworked to mention these options.

Mike Heard

_______________________________________________
OPSEC mailing list
[email protected]
https://www.ietf.org/mailman/listinfo/opsec

Reply via email to