RE: Last Call: draft-ietf-6man-oversized-header-chain-08.txt (Implications of Oversized IPv6 Header Chains) to Proposed Standard

2013-10-14 Thread Templin, Fred L
Hi Brian,

 -Original Message-
 From: Brian E Carpenter [mailto:brian.e.carpen...@gmail.com]
 Sent: Friday, October 11, 2013 3:42 PM
 To: Templin, Fred L
 Cc: Fernando Gont; Ray Hunter; 6man Mailing List; ietf@ietf.org
 Subject: Re: Last Call: draft-ietf-6man-oversized-header-chain-08.txt
 (Implications of Oversized IPv6 Header Chains) to Proposed Standard
 
 Fred,
 
 On 12/10/2013 08:56, Templin, Fred L wrote:
  Hi Brian,
 
  -Original Message-
  From: Brian E Carpenter [mailto:brian.e.carpen...@gmail.com]
  Sent: Friday, October 11, 2013 12:50 PM
  To: Fernando Gont
  Cc: Templin, Fred L; Ray Hunter; 6man Mailing List; ietf@ietf.org
  Subject: Re: Last Call: draft-ietf-6man-oversized-header-chain-
 08.txt
  (Implications of Oversized IPv6 Header Chains) to Proposed Standard
 
  On 12/10/2013 06:04, Fernando Gont wrote:
  ...
  P.S.: Reegarding enforcing a limit on the length of the header
 chain,
  I
  must say I symphatize with that (for instance, check the last
  individual
  version of this I-D, and you'll find exactly that). But the wg
 didn't
  want that in -- and I did raise the issue a few times. So what we
  have
  is what the 6man wg had consensus on.
  I agree that this was the WG consensus after considerable
 discussion,
  which included Fred, so I'm not sure why we're discussing it again
  during IETF LC.
 
  Technical matters should be discussed as they come to light; not
  dismissed because of some real or perceived deadline. That was what
  got us the 1280 MTU in the first place. Quoting from Steve Deering:
 
 We would like to get this issue settled as
  soon as possible, since this is the only thing holding up the
 publication
  of the updated Proposed Standard IPv6 spec (the version we expect
 to advance
  to Draft Standard), so let's see if we can come to a decision
 before the ID
  deadline at the end of next week (hoping there isn't any conflict
 between
  thoughtful analysis and let's decide quickly :-).
 
  So, it wasn't necessarily the case that 1280 was a product of
 thoughtful
  analysis so much as the fact that **they were rushing to get a spec
 out
  the door**. So now, 16 years later, we get to put it back on the 6man
  charter milestone list.
 
 We could have that discussion in 6man, sure, but I don't believe that
 it's
 relevant to the question of whether draft-ietf-6man-oversized-header-
 chain
 is ready.

If it messes up tunnels, then it's not ready.

 This draft mitigates a known problem in terms of the current
 IPv6 standards.

If that problem is also mitigated by a measure that does not mess
up tunnels, then wouldn't that be worth considering before
finalizing this publication.

Thanks - Fred
fred.l.temp...@boeing.com

 Brian


RE: Last Call: draft-ietf-6man-oversized-header-chain-08.txt (Implications of Oversized IPv6 Header Chains) to Proposed Standard

2013-10-14 Thread Templin, Fred L
Hi Ron,

 -Original Message-
 From: Ronald Bonica [mailto:rbon...@juniper.net]
 Sent: Saturday, October 12, 2013 7:07 PM
 To: Brian E Carpenter; Templin, Fred L
 Cc: Fernando Gont; 6man Mailing List; ietf@ietf.org; Ray Hunter
 Subject: RE: Last Call: draft-ietf-6man-oversized-header-chain-08.txt
 (Implications of Oversized IPv6 Header Chains) to Proposed Standard
 
 +1
 
 Is there a way to decouple this discussion from draft-ietf-6man-
 oversized-header-chain? I would be glad to discuss it in the context of
 a separate draft.

I don't know if there is a way to decouple it. I believe I have shown
a way to not mess up tunnels while at the same time not messing up your
draft. That should be a win-win. In what way would imposing a 1K limit
on the IPv6 header chain not satisfy the general case?

Thanks - Fred
fred.l.temp...@boeing.com
 
  Ron
 
 
  
   So, it wasn't necessarily the case that 1280 was a product of
   thoughtful analysis so much as the fact that **they were rushing
 to
   get a spec out the door**. So now, 16 years later, we get to put it
   back on the 6man charter milestone list.
 
  We could have that discussion in 6man, sure, but I don't believe that
  it's relevant to the question of whether draft-ietf-6man-oversized-
  header-chain
  is ready. This draft mitigates a known problem in terms of the
 current
  IPv6 standards.
 
 



RE: Last Call: draft-ietf-6man-oversized-header-chain-08.txt (Implications of Oversized IPv6 Header Chains) to Proposed Standard

2013-10-14 Thread Templin, Fred L
Hi Brian,

 -Original Message-
 From: Brian E Carpenter [mailto:brian.e.carpen...@gmail.com]
 Sent: Monday, October 14, 2013 12:34 PM
 To: Templin, Fred L
 Cc: Fernando Gont; Ray Hunter; 6man Mailing List; ietf@ietf.org
 Subject: Re: Last Call: draft-ietf-6man-oversized-header-chain-08.txt
 (Implications of Oversized IPv6 Header Chains) to Proposed Standard
 
 Fred,
 
 On 15/10/2013 06:38, Templin, Fred L wrote:
 ...
  We could have that discussion in 6man, sure, but I don't believe
 that
  it's
  relevant to the question of whether draft-ietf-6man-oversized-
 header-
  chain
  is ready.
 
  If it messes up tunnels, then it's not ready.
 
 That doesn't follow. See below.
 
  This draft mitigates a known problem in terms of the current
  IPv6 standards.
 
  If that problem is also mitigated by a measure that does not mess
  up tunnels, then wouldn't that be worth considering before
  finalizing this publication.
 
 The draft mitigates a known problem with communication paths that
 do not include nested tunnels requiring nested fragmentation,
 where the nested tunnel has to deal with an MTU 1280 *and* where
 the nested tunnel goes through a firewall that wants to analyse
 the complete header chain of the innermost packet.

But tunnels - and tunnels within tunnels - need to be considered
as part of the architecture. I have visibility into the network
operations of a major multi-national corporation, and I can tell
you that I see tunnels within tunnels in operational practice today.
I also have visibility into civil aviation and DoD networks, and
I see an emerging trend for mobile networks. Consider a mobile
network B that comes onto a link offered by mobile network A.
Then, mobile network C comes onto a link offered by B. Then, etc.
Then, the next thing you know, it's turtles all the way down.

Fragmentation is the tool that enables endless recursion. Or, at
least, recursion up to some defined limit. At least for the first
several levels of recursion, middleboxes should be able to see all
host-inserted headers within the first fragment.

Thanks - Fred
fred.l.temp...@boeing.com


 No, I don't think it's worth considering that case before specifying
 this mitigation.
 
  Brian


RE: RE: Last Call: draft-ietf-6man-oversized-header-chain-08.txt (Implications of Oversized IPv6 Header Chains) to Proposed Standard

2013-10-11 Thread Templin, Fred L
Hi Ray,

 -Original Message-
 From: Ray Hunter [mailto:v6...@globis.net]
 Sent: Friday, October 11, 2013 12:49 AM
 To: Templin, Fred L; brian.e.carpen...@gmail.com
 Cc: ietf@ietf.org; 6man Mailing List
 Subject: Re: RE: Last Call: draft-ietf-6man-oversized-header-chain-
 08.txt (Implications of Oversized IPv6 Header Chains) to Proposed
 Standard
 
 Templin, Fred L wrote:
  Hi Brian,
 
  Responding in a slightly re-arranged order:
 
  The problem is that you are asserting that middleboxes that a tunnel
  passes through are expected to examine the complete header chain of
  the encapsulated packet even if the encapsulated packet is a
 fragment.
  Yes, but change are expected to to should be able to.
 
 I personally don't see this going anywhere.
 
 Unless you specifically define what is a tunnel and you specifically
 define a maximum depth of nesting.
 
 The term Upper-Layer Protocol (ULP) is also itself a vague term IMHO
 since the value of the IPv6 next header is taken from the same code
 space as the ULP header values, and there's no specific marker or
 header length field in IPv6 that explicitly marks a point as This is
 the end of the IPv6 header chain in all circumstances: stop header
 parsing here.
 
 Ok, there's a bunch of current code-points that are today considered as
 valid ULP's or next-header values, but that is neither time invariant
 nor exhaustive, so solving this issue via a registry means there will
 always be middlebox code in the wild that lags any updates.
 
 These middleboxes won't be able to differentiate between an unknown
 ULP,
 and an unknown IPv6 next-header. That potentially makes a default pass
 or drop decision awkward.
 
 If it's so important to be able to differentiate between what is an ULP
 and what is a next header, and we can't reliably do that today, maybe
 that's a fundamental flaw in IPv6 that should be addressed.
 
 
 
  I think that's an unreasonable expectation. A reasonable expectation
  is that middleboxes should identify the encapsulated packet as
  a payload that they cannot analyse, and let it go (unless they
  have a policy setting to drop tunnelled packets, which is a
  different discussion).
  But why? If headers beyond the first IPv6 encapsulation header are
  available in the clear, the middlebox should be able to parse them
  if it wants to. Wireshark already does exactly that - it keeps on
  parsing beyond the first encapsulation header up to and including
  the true ULP header. And, if Wireshark can do it, so can any other
  middlebox that believes security would be improved by continuing
  to parse the entire chain - whether or not there is a standard
  saying it must not do so.
 
 Because it leaves open the possibility for an attacker to apply the
 obfuscation we seek to limit.
 
 
  Parsing the additional headers beyond the first encapsulation header
  provides defense-in-depth. Perimeter middleboxes can then weed out
  the bad stuff without either allowing the bad stuff to penetrate more
  deeply into the organization or dropping good stuff that should be
  allowed through.
 
 
 There's also a myriad of tunneling technology out there.
 
 Again, what is an ULP? Where do you stop parsing?

The middlebox stops parsing when it decides it has seen enough. With
Wireshark at least, it blasts right through encapsulating IP headers
and continues up to and including the ultimate TCP/UDP/ICMP etc.
header inserted by the original host. The goal is to give the
middlebox enough information so that it can parse as deeply into
the headers as it wants to.

 Is GRE a tunnel or an ULP? (GRE can run over almost anything)
 Is SSH an ULP or a tunnel? (port tunneling)
 Is Teredo a tunnel or is it an ULP (UDP) or both?
 GRE/ LT2P over HTTP anyone?
 
 The notion of perimeter is moveable in the presence of such tunnels.

We will want for middleboxes at outer perimeters to be able to parse
as many headers as they want to before releasing the packet to
middleboxes at inner perimenters. Otherwise, bad stuff can get past
the outermost perimeters and waste bandwidth and/or cause havoc
within the protected zone. 

 Presumably there comes a point where the tunnel is terminated and the
 transported packet is de-encapsulated, and that IMHO forms another
 perimeter where you'd anyway have to apply further security checks.

Nested tunnels give you perimeters within perimeters, yes. But, we
will want the outer perimeters to be able to parse as deeply as
they want to before passing on to an inner perimeter.

 I think the draft does what it can in a pragmatic manner, but might
 benefit from some acknowledgement that this security approach of
 applying parsing at a single perimeter can never ever catch all
 variants
 of transporting FOO over BAR.
 
 IMHO It's only at the moment of de-encapsulation that the full
 semantics
 of the payload are revealed in these modern times of everything
 transported over HTTP.
 
 
 
 
  Since the problem recurses as we tunnel tunnels, I don't see

RE: Last Call: draft-ietf-6man-oversized-header-chain-08.txt (Implications of Oversized IPv6 Header Chains) to Proposed Standard

2013-10-11 Thread Templin, Fred L
Hi Fernando,

 -Original Message-
 From: Fernando Gont [mailto:fg...@si6networks.com]
 Sent: Friday, October 11, 2013 1:36 AM
 To: Ray Hunter; Templin, Fred L; brian.e.carpen...@gmail.com
 Cc: 6man Mailing List; ietf@ietf.org
 Subject: Re: Last Call: draft-ietf-6man-oversized-header-chain-08.txt
 (Implications of Oversized IPv6 Header Chains) to Proposed Standard
 
 On 10/11/2013 04:48 AM, Ray Hunter wrote:
 
  I think the draft does what it can in a pragmatic manner, but might
  benefit from some acknowledgement that this security approach of
  applying parsing at a single perimeter can never ever catch all
 variants
  of transporting FOO over BAR.
 
 FWIW, my idea of the I-D is that it says look, if you don't put all
 this info into the first fragment, it's extremely likely that your
 packets will be dropped. That doesn't mean that a middle-box may want
 to look further. But looking further might imply
 reassemble-inspect-and-refragment... or even reassemble the TCP stream
 (e.g. think about a SSL/TCP-based VPN...)

We definitely don't want that. That is why we would prefer for
the entire header chain (starting from the outermost IP header
up to and including the headers inserted by the original host)
to fit within the first fragment even if there are multiple
encapsulations on the path.

Thanks - Fred
fred.l.temp...@boeing.com

 Cheers,
 --
 Fernando Gont
 SI6 Networks
 e-mail: fg...@si6networks.com
 PGP Fingerprint:  31C6 D484 63B2 8FB1 E3C4 AE25 0D55 1D4E 7492
 
 
 



RE: Last Call: draft-ietf-6man-oversized-header-chain-08.txt (Implications of Oversized IPv6 Header Chains) to Proposed Standard

2013-10-11 Thread Templin, Fred L
Hi Ray,

 -Original Message-
 From: Ray Hunter [mailto:v6...@globis.net]
 Sent: Friday, October 11, 2013 9:59 AM
 To: Templin, Fred L
 Cc: brian.e.carpen...@gmail.com; ietf@ietf.org; 6man Mailing List
 Subject: Re: Last Call: draft-ietf-6man-oversized-header-chain-08.txt
 (Implications of Oversized IPv6 Header Chains) to Proposed Standard
 
  Templin, Fred L mailto:fred.l.temp...@boeing.com
  11 October 2013 17:33
  Hi Ray,
 
  -Original Message-
  From: Ray Hunter [mailto:v6...@globis.net]
  Sent: Friday, October 11, 2013 12:49 AM
  To: Templin, Fred L; brian.e.carpen...@gmail.com
  Cc: ietf@ietf.org; 6man Mailing List
  Subject: Re: RE: Last Call: draft-ietf-6man-oversized-header-chain-
  08.txt (Implications of Oversized IPv6 Header Chains) to Proposed
  Standard
 
  Templin, Fred L wrote:
  Hi Brian,
 
  Responding in a slightly re-arranged order:
 
  The problem is that you are asserting that middleboxes that a
 tunnel
  passes through are expected to examine the complete header chain
 of
  the encapsulated packet even if the encapsulated packet is a
  fragment.
  Yes, but change are expected to to should be able to.
  I personally don't see this going anywhere.
 
  Unless you specifically define what is a tunnel and you
 specifically
  define a maximum depth of nesting.
 
  The term Upper-Layer Protocol (ULP) is also itself a vague term IMHO
  since the value of the IPv6 next header is taken from the same
 code
  space as the ULP header values, and there's no specific marker or
  header length field in IPv6 that explicitly marks a point as This
 is
  the end of the IPv6 header chain in all circumstances: stop header
  parsing here.
 
  Ok, there's a bunch of current code-points that are today considered
 as
  valid ULP's or next-header values, but that is neither time
 invariant
  nor exhaustive, so solving this issue via a registry means there
 will
  always be middlebox code in the wild that lags any updates.
 
  These middleboxes won't be able to differentiate between an unknown
  ULP,
  and an unknown IPv6 next-header. That potentially makes a default
 pass
  or drop decision awkward.
 
  If it's so important to be able to differentiate between what is an
 ULP
  and what is a next header, and we can't reliably do that today,
 maybe
  that's a fundamental flaw in IPv6 that should be addressed.
 
 
  I think that's an unreasonable expectation. A reasonable
 expectation
  is that middleboxes should identify the encapsulated packet as
  a payload that they cannot analyse, and let it go (unless they
  have a policy setting to drop tunnelled packets, which is a
  different discussion).
  But why? If headers beyond the first IPv6 encapsulation header are
  available in the clear, the middlebox should be able to parse them
  if it wants to. Wireshark already does exactly that - it keeps on
  parsing beyond the first encapsulation header up to and including
  the true ULP header. And, if Wireshark can do it, so can any other
  middlebox that believes security would be improved by continuing
  to parse the entire chain - whether or not there is a standard
  saying it must not do so.
  Because it leaves open the possibility for an attacker to apply the
  obfuscation we seek to limit.
 
 
  Parsing the additional headers beyond the first encapsulation
 header
  provides defense-in-depth. Perimeter middleboxes can then weed out
  the bad stuff without either allowing the bad stuff to penetrate
 more
  deeply into the organization or dropping good stuff that should be
  allowed through.
  There's also a myriad of tunneling technology out there.
 
  Again, what is an ULP? Where do you stop parsing?
 
  The middlebox stops parsing when it decides it has seen enough.
 
 Which AFAIK is undefined in practical terms. Especially in the presence
 of jumbo payload extension headers or fragments.

Middleboxes should be able to parse as far as they want to
without hitting a hard stop as is the case if the header
chain extends into multiple packets.

 So are you saying the current draft has no value?

I am saying that it is unfriendly to tunnels that fragment, and a
simple fix is for the host to limit its header chain length to
1024 bytes.

   With
  Wireshark at least, it blasts right through encapsulating IP headers
  and continues up to and including the ultimate TCP/UDP/ICMP etc.
  header inserted by the original host.
 
 I like wireshark.
 
 But how would that parsing model work in a live network without
 maintaining state between frames (and leaving your middlebox open to
 DoS
 or other resource depletion abuse)?

I don't understand the maintaining state between frames. I am
talking about examining individual header chains within a single
packet independently of any other packets.

We may not yet know how smart middleboxes may become in this
regards. But, they will certainly never become smart enough if
they don't have the entire header chain in the first fragment. 

 IMHO ultimate TCP/UDP/ICMP etc

RE: Last Call: draft-ietf-6man-oversized-header-chain-08.txt (Implications of Oversized IPv6 Header Chains) to Proposed Standard

2013-10-11 Thread Templin, Fred L
Hi Fernando,

 -Original Message-
 From: Fernando Gont [mailto:fg...@si6networks.com]
 Sent: Friday, October 11, 2013 10:04 AM
 To: Templin, Fred L; Ray Hunter; brian.e.carpen...@gmail.com
 Cc: 6man Mailing List; ietf@ietf.org
 Subject: Re: Last Call: draft-ietf-6man-oversized-header-chain-08.txt
 (Implications of Oversized IPv6 Header Chains) to Proposed Standard
 
 On 10/11/2013 12:36 PM, Templin, Fred L wrote:
  FWIW, my idea of the I-D is that it says look, if you don't put all
  this info into the first fragment, it's extremely likely that your
  packets will be dropped. That doesn't mean that a middle-box may
 want
  to look further. But looking further might imply
  reassemble-inspect-and-refragment... or even reassemble the TCP
 stream
  (e.g. think about a SSL/TCP-based VPN...)
 
  We definitely don't want that. That is why we would prefer for
  the entire header chain (starting from the outermost IP header
  up to and including the headers inserted by the original host)
  to fit within the first fragment even if there are multiple
  encapsulations on the path.
 
 The problem is that if you have multiple encapsulations, you can always
 hit the MTU limit and fail to comply with this requirement.

Yes you can, which is what I just said to Ray. But, I am not talking
about a *requirement* - I am talking about a best practice that works
in most cases.

The question is how many layers of encapsulation do you need? Let's
say you want 5 layers of encapsulation. That would still allow enough
room for all of the hosts headers to fit in the first fragment if the
host limits its header chain to 1024 bytes. But, now let's say that
you want 10 layers of encapsulation. That means that the first 5
middleboxes that examine the outermost encapsulations will not be
able to see the entire header chain, but the last 5 middleboxes that
examine the innermost encapsulations will. So, there is a limit to
the levels of defense-in-depth. But, that limit is greater than 1.

Remember also that the 1280/1500 also assumed that there would be
just a few layers of nested encapsulations. What I am suggesting
allows for endless recursion but limited (and reasonable) defense
in depth. 
 
 That's why this I-D says what it says.

I'm not sure this discussion was taken into account, and what the
draft says now is not friendly to tunnels.

 P.S.: Reegarding enforcing a limit on the length of the header chain, I
 must say I symphatize with that (for instance, check the last
 individual
 version of this I-D, and you'll find exactly that). But the wg didn't
 want that in -- and I did raise the issue a few times. So what we have
 is what the 6man wg had consensus on.

It is not too late to get this right, and to give reasonable
treatment to tunnels that the current draft does not give.

Thanks - Fred
fred.l.temp...@boeing.com

 Thanks!
 
 Cheers,
 --
 Fernando Gont
 SI6 Networks
 e-mail: fg...@si6networks.com
 PGP Fingerprint:  31C6 D484 63B2 8FB1 E3C4 AE25 0D55 1D4E 7492
 
 
 



RE: Last Call: draft-ietf-6man-oversized-header-chain-08.txt (Implications of Oversized IPv6 Header Chains) to Proposed Standard

2013-10-11 Thread Templin, Fred L
Hi Brian,

 -Original Message-
 From: Brian E Carpenter [mailto:brian.e.carpen...@gmail.com]
 Sent: Friday, October 11, 2013 12:50 PM
 To: Fernando Gont
 Cc: Templin, Fred L; Ray Hunter; 6man Mailing List; ietf@ietf.org
 Subject: Re: Last Call: draft-ietf-6man-oversized-header-chain-08.txt
 (Implications of Oversized IPv6 Header Chains) to Proposed Standard
 
 On 12/10/2013 06:04, Fernando Gont wrote:
 ...
  P.S.: Reegarding enforcing a limit on the length of the header chain,
 I
  must say I symphatize with that (for instance, check the last
 individual
  version of this I-D, and you'll find exactly that). But the wg didn't
  want that in -- and I did raise the issue a few times. So what we
 have
  is what the 6man wg had consensus on.
 
 I agree that this was the WG consensus after considerable discussion,
 which included Fred, so I'm not sure why we're discussing it again
 during IETF LC.

Technical matters should be discussed as they come to light; not
dismissed because of some real or perceived deadline. That was what
got us the 1280 MTU in the first place. Quoting from Steve Deering:

   We would like to get this issue settled as
soon as possible, since this is the only thing holding up the publication
of the updated Proposed Standard IPv6 spec (the version we expect to advance
to Draft Standard), so let's see if we can come to a decision before the ID
deadline at the end of next week (hoping there isn't any conflict between
thoughtful analysis and let's decide quickly :-).

So, it wasn't necessarily the case that 1280 was a product of thoughtful
analysis so much as the fact that **they were rushing to get a spec out
the door**. So now, 16 years later, we get to put it back on the 6man
charter milestone list.


Thanks - Fred
fred.l.temp...@boeing.com


RE: Last Call: draft-ietf-6man-oversized-header-chain-08.txt (Implications of Oversized IPv6 Header Chains) to Proposed Standard

2013-10-09 Thread Templin, Fred L


 -Original Message-
 From: Ronald Bonica [mailto:rbon...@juniper.net]
 Sent: Tuesday, October 08, 2013 5:46 PM
 To: Ole Troan; Templin, Fred L
 Cc: i...@ietf.org; ietf@ietf.org
 Subject: RE: Last Call: draft-ietf-6man-oversized-header-chain-08.txt
 (Implications of Oversized IPv6 Header Chains) to Proposed Standard
 
 I agree with Ole.

How so? A tunnel that crosses a 1280 MTU link MUST fragment
in order to satisfy the IPv6 minMTU. If it must fragment, then
an MTU-length IPv6 header chain would not fit within the first
fragment, and we have opened an attack vector against tunnels.
This is not a matter to be agreed or disagreed with - it is
a simple fact.

Thanks - Fred
fred.l.temp...@boeing.com
 
Ron
 
  -Original Message-
  From: ipv6-boun...@ietf.org [mailto:ipv6-boun...@ietf.org] On Behalf
 Of
  Ole Troan
  Sent: Tuesday, October 08, 2013 12:17 PM
  To: Templin, Fred L
  Cc: i...@ietf.org; ietf@ietf.org; IETF-Announce
  Subject: Re: Last Call: draft-ietf-6man-oversized-header-chain-
 08.txt
  (Implications of Oversized IPv6 Header Chains) to Proposed Standard
 
  Fred,
 
   Hi, I would like to make a small amendment to what I said in my
   previous message as follows:
  
   4) Section 5, change the final paragraph to:
  
 As a result of the above mentioned requirements, a packet's
 header
 chain length MUST fit within the Path MTU associated with its
 destination.  Hosts MAY discover the Path MTU, using procedures
  such
 as those defined in [RFC1981] and [RFC4821]. However, if a host
  does
 not discover the Path MTU, it MUST assume the IPv6 minumum MTU of
 1280 bytes [RFC2460]. The host MUST then limit each packet's
 header
 chain length to the Path MTU minus 256 bytes in case additional
 encapsulation headers are inserted by tunnels on the path.
 
  I would claim that additional encapsulation headers are already
  considered in the 1280 minimum MTU.
  as in: 1500 - 1280.
 
  cheers,
  Ole
 



RE: Last Call: draft-ietf-6man-oversized-header-chain-08.txt (Implications of Oversized IPv6 Header Chains) to Proposed Standard

2013-10-09 Thread Templin, Fred L
Hi Ole,

 -Original Message-
 From: Ole Troan [mailto:otr...@employees.org]
 Sent: Wednesday, October 09, 2013 9:54 AM
 To: Templin, Fred L
 Cc: Ronald Bonica; i...@ietf.org; ietf@ietf.org
 Subject: Re: Last Call: draft-ietf-6man-oversized-header-chain-08.txt
 (Implications of Oversized IPv6 Header Chains) to Proposed Standard
 
 Fred,
 
  -Original Message-
  From: Ronald Bonica [mailto:rbon...@juniper.net]
  Sent: Tuesday, October 08, 2013 5:46 PM
  To: Ole Troan; Templin, Fred L
  Cc: i...@ietf.org; ietf@ietf.org
  Subject: RE: Last Call: draft-ietf-6man-oversized-header-chain-
 08.txt
  (Implications of Oversized IPv6 Header Chains) to Proposed Standard
 
  I agree with Ole.
 
  How so? A tunnel that crosses a 1280 MTU link MUST fragment
  in order to satisfy the IPv6 minMTU. If it must fragment, then
  an MTU-length IPv6 header chain would not fit within the first
  fragment, and we have opened an attack vector against tunnels.
  This is not a matter to be agreed or disagreed with - it is
  a simple fact.
 
 right, and RFC2460 has this to say about it:
 
IPv6 requires that every link in the internet have an MTU of 1280
octets or greater.  On any link that cannot convey a 1280-octet
packet in one piece, link-specific fragmentation and reassembly must
be provided at a layer below IPv6.

Very true. In this case, the link is the tunnel and the link-specific
fragmentation is IPv6 fragmentation. Which places the first part of an
MTU-length IPv6 header chain in the first fragment and the remainder of
the header chain in the second fragment.

Thanks - Fred
fred.l.temp...@boeing.com

 cheers,
 Ole


RE: Last Call: draft-ietf-6man-oversized-header-chain-08.txt (Implications of Oversized IPv6 Header Chains) to Proposed Standard

2013-10-09 Thread Templin, Fred L
Hi Ole,

 -Original Message-
 From: Ole Troan [mailto:otr...@employees.org]
 Sent: Wednesday, October 09, 2013 10:31 AM
 To: Templin, Fred L
 Cc: Ronald Bonica; i...@ietf.org; ietf@ietf.org
 Subject: Re: Last Call: draft-ietf-6man-oversized-header-chain-08.txt
 (Implications of Oversized IPv6 Header Chains) to Proposed Standard
 
 Fred,
 
  -Original Message-
  From: Ronald Bonica [mailto:rbon...@juniper.net]
  Sent: Tuesday, October 08, 2013 5:46 PM
  To: Ole Troan; Templin, Fred L
  Cc: i...@ietf.org; ietf@ietf.org
  Subject: RE: Last Call: draft-ietf-6man-oversized-header-chain-
  08.txt
  (Implications of Oversized IPv6 Header Chains) to Proposed
 Standard
 
  I agree with Ole.
 
  How so? A tunnel that crosses a 1280 MTU link MUST fragment
  in order to satisfy the IPv6 minMTU. If it must fragment, then
  an MTU-length IPv6 header chain would not fit within the first
  fragment, and we have opened an attack vector against tunnels.
  This is not a matter to be agreed or disagreed with - it is
  a simple fact.
 
  right, and RFC2460 has this to say about it:
 
IPv6 requires that every link in the internet have an MTU of 1280
octets or greater.  On any link that cannot convey a 1280-octet
packet in one piece, link-specific fragmentation and reassembly
 must
be provided at a layer below IPv6.
 
  Very true. In this case, the link is the tunnel and the link-
 specific
  fragmentation is IPv6 fragmentation. Which places the first part of
 an
  MTU-length IPv6 header chain in the first fragment and the remainder
 of
  the header chain in the second fragment.
 
 indeed. which would violate the MUST in oversized-header-chain.
 
 what do we do?
 a) ignore this particular corner case
 b) suggest the tunnel head end to drop the packet
 c) develop a new tunnel segmentations scheme that doesn't depend on
 IPv6 fragmentation. :-)

You know I have an interest in alternative c), but that does not
address the issue of splitting the header chain across multiple
fragments. So, my choice is:

d) limit the size of the IPv6 header chain so that the chain will
fit within the first fragment by having the host limit the chain
to the MTU size minus 256 bytes.

Actually, I would be even happier if we just asked the host to limit
the size of the header chain to 1024 bytes regardless of the path MTU.

Thanks - Fred
fred.l.temp...@boeing.com

 cheers,
 Ole



RE: Last Call: draft-ietf-6man-oversized-header-chain-08.txt (Implications of Oversized IPv6 Header Chains) to Proposed Standard

2013-10-09 Thread Templin, Fred L
Hi Brian,

Responding in a slightly re-arranged order:

 The problem is that you are asserting that middleboxes that a tunnel
 passes through are expected to examine the complete header chain of
 the encapsulated packet even if the encapsulated packet is a fragment.

Yes, but change are expected to to should be able to.

 I think that's an unreasonable expectation. A reasonable expectation
 is that middleboxes should identify the encapsulated packet as
 a payload that they cannot analyse, and let it go (unless they
 have a policy setting to drop tunnelled packets, which is a
 different discussion).

But why? If headers beyond the first IPv6 encapsulation header are
available in the clear, the middlebox should be able to parse them
if it wants to. Wireshark already does exactly that - it keeps on
parsing beyond the first encapsulation header up to and including
the true ULP header. And, if Wireshark can do it, so can any other
middlebox that believes security would be improved by continuing
to parse the entire chain - whether or not there is a standard
saying it must not do so.

Parsing the additional headers beyond the first encapsulation header
provides defense-in-depth. Perimeter middleboxes can then weed out
the bad stuff without either allowing the bad stuff to penetrate more
deeply into the organization or dropping good stuff that should be
allowed through.

 Since the problem recurses as we tunnel tunnels, I don't see how any
 finite limit can solve the problem. 1280 itself is a pragmatic choice
 of a bit shorter than 1500.

The 1280 is assuming that all links in the path have a 1500 MTU and
so RFC2460 allowed (1500 - 1280) = 220 bytes for additional IPv6
headers added by nested tunnels without incurring fragmentation.
I am asserting instead that we have to allow for paths that include
links with a 1280 MTU and so tunnels will have to fragment over
such paths.

That means that the first fragmenting tunnel would have room for
1240 in the first fragment, the second fragmenting tunnel would
have room for 1200 in the first fragment, etc. That is why I would
prefer that hosts limit the size of their header chains to 1024; so
that nested tunnels that fragment will still be highly likely to
have the entire header chain in the first fragment.
 
 I understood that to be the basis on which the WG reached consensus.

Maybe the WG didn't understand that such a consensus would make
tunnels less reliable and less secure.

Thanks - Fred
fred.l.temp...@boeing.com

 Brian



RE: Last Call: draft-ietf-6man-oversized-header-chain-08.txt (Implications of Oversized IPv6 Header Chains) to Proposed Standard

2013-10-08 Thread Templin, Fred L
Hi Ole,

 -Original Message-
 From: Ole Troan [mailto:otr...@employees.org]
 Sent: Tuesday, October 08, 2013 9:17 AM
 To: Templin, Fred L
 Cc: ietf@ietf.org; IETF-Announce; i...@ietf.org
 Subject: Re: Last Call: draft-ietf-6man-oversized-header-chain-08.txt
 (Implications of Oversized IPv6 Header Chains) to Proposed Standard
 
 Fred,
 
  Hi, I would like to make a small amendment to what I said in my
  previous message as follows:
 
  4) Section 5, change the final paragraph to:
 
As a result of the above mentioned requirements, a packet's header
chain length MUST fit within the Path MTU associated with its
destination.  Hosts MAY discover the Path MTU, using procedures
 such
as those defined in [RFC1981] and [RFC4821]. However, if a host
 does
not discover the Path MTU, it MUST assume the IPv6 minumum MTU of
1280 bytes [RFC2460]. The host MUST then limit each packet's header
chain length to the Path MTU minus 256 bytes in case additional
encapsulation headers are inserted by tunnels on the path.
 
 I would claim that additional encapsulation headers are already
 considered in the 1280 minimum MTU.
 as in: 1500 - 1280.

It is kind of like that, but what I am concerned about is tunnels
in the path that fragment either because they cannot meet the IPv6
minimum MTU without doing so, or because they are trying to allow
a larger-sized MTU when the path doesn't support it due to the
addition of the encapsulating headers.

Take the simplest case when the host assumes a path MTU of 1280.
If there is a tunnel in the path that crosses another 1280 link,
then the tunnel has to fragment, and the header chain might not
all fit within the first fragment if the host does not allow
headspace room. If the host limits the size of its header chain
to 1280 - 512 = 1024 bytes, then the entire chain should fit
within the first fragment even if there are multiple nested
tunnel ingresses on the path and each one of them fragments.

That said, I am wondering how this document relates to the
discussions we had earlier and the resulting draft from Mark
Andrews on what to do when the header chain spans multiple
fragments? Are we trying to keep the header chain all within
the first fragment or not?

Thanks - Fred
fred.l.temp...@boeing.com

 cheers,
 Ole



RE: Last Call: draft-ietf-6man-oversized-header-chain-08.txt (Implications of Oversized IPv6 Header Chains) to Proposed Standard

2013-10-07 Thread Templin, Fred L
Hi, I would like to make a small amendment to what I said in my
previous message as follows:

4) Section 5, change the final paragraph to:

   As a result of the above mentioned requirements, a packet's header
   chain length MUST fit within the Path MTU associated with its
   destination.  Hosts MAY discover the Path MTU, using procedures such
   as those defined in [RFC1981] and [RFC4821]. However, if a host does
   not discover the Path MTU, it MUST assume the IPv6 minumum MTU of
   1280 bytes [RFC2460]. The host MUST then limit each packet's header
   chain length to the Path MTU minus 256 bytes in case additional
   encapsulation headers are inserted by tunnels on the path.

Thanks - Fred
fred.l.temp...@boeing.com

 -Original Message-
 From: ietf-boun...@ietf.org [mailto:ietf-boun...@ietf.org] On Behalf Of
 Templin, Fred L
 Sent: Friday, October 04, 2013 1:42 PM
 To: ietf@ietf.org; IETF-Announce
 Cc: i...@ietf.org
 Subject: RE: Last Call: draft-ietf-6man-oversized-header-chain-08.txt
 (Implications of Oversized IPv6 Header Chains) to Proposed Standard
 
 Hi, I have a concern about this document. In the definition of IPv6
 Header Chain, it says:
 
   However, if a second IPv6 header appears in the header chain, as
is the case when IPv6 is tunneled over IPv6, the second IPv6
header is considered to be an upper-layer header and terminates
the header chain.
 
 This means that stateless firewalls are being directed to discontinue
 extension header parsing when a first encapsulated IPv6 header is
 encountered - even though there may be many more parsable (inner)
 headers that follow. As a result, the firewall would either have to
 drop or forward the packet without examining the true upper layer
 header. This may result in an incorrect perception that tunneled
 traffic is either less reliable or more dangerous than non-tunneled
 traffic.
 
 Here are my suggested changes to address this issue:
 
 1) Section 3, under IPv6 Header Chain, change:
 
   However, if a second IPv6 header appears in the header chain, as
is the case when IPv6 is tunneled over IPv6, the second IPv6
header is considered to be an upper-layer header and terminates
the header chain.
 
 to:
 
   However, if a second IPv6 header appears in the header chain, as
is the case when IPv6 is tunneled over IPv6, the second IPv6
header is optionally considered to be either an upper-layer header
that terminates the header chain or another extension header that
continues the chain.
 
 2) Section 3, under Upper-layer Header, change:
 
   In the general case, the upper-layer header is the first member
of the header chain that is neither an IPv6 header nor an IPv6
extension header.
 
 to:
 
   In the general case, the upper-layer header is the first member
of the header chain that is not considered to be an extension
 header.
 
 3) Section 3, under Upper-layer Header, delete the following
 sentence:
 
   However, if either an ESP header, or a second IPv6 header occur in
the header chain, they are considered to be upper layer headers and
they terminate the header chain.
 
 4) Section 5, change the final paragraph to:
 
   As a result of the above mentioned requirements, a packet's header
chain length cannot exceed the Path MTU associated with its
destination.  Hosts MAY discover the Path MTU, using procedures such
as those defined in [RFC1981] and [RFC4821].  However, if a host
 does
not discover the Path MTU, it MUST limit the header chain length to
1024 bytes.  Limiting the header chain length to 1024 bytes ensures
that the header chain length does not exceed the IPv6 minimum MTU
[RFC2460] even if additional encapsulation headers are inserted by
tunnels on the path.
 
 Thanks - Fred
 fred.l.temp...@boeing.com
 
 
 
 
  -Original Message-
  From: ipv6-boun...@ietf.org [mailto:ipv6-boun...@ietf.org] On Behalf
 Of
  The IESG
  Sent: Wednesday, October 02, 2013 11:55 AM
  To: IETF-Announce
  Cc: i...@ietf.org
  Subject: Last Call: draft-ietf-6man-oversized-header-chain-08.txt
  (Implications of Oversized IPv6 Header Chains) to Proposed Standard
 
 
  The IESG has received a request from the IPv6 Maintenance WG (6man)
 to
  consider the following document:
  - 'Implications of Oversized IPv6 Header Chains'
draft-ietf-6man-oversized-header-chain-08.txt as Proposed
 Standard
 
  The IESG plans to make a decision in the next few weeks, and solicits
  final comments on this action. Please send substantive comments to
 the
  ietf@ietf.org mailing lists by 2013-10-16. Exceptionally, comments
 may
  be
  sent to i...@ietf.org instead. In either case, please retain the
  beginning of the Subject line to allow automated sorting.
 
  Abstract
 
 
 The IPv6 specification allows IPv6 header chains of an arbitrary
 size.  The specification also allows options which can in turn
  extend
 each of the headers.  In those scenarios in which the IPv6

RE: Last Call: draft-ietf-6man-oversized-header-chain-08.txt (Implications of Oversized IPv6 Header Chains) to Proposed Standard

2013-10-04 Thread Templin, Fred L
Hi, I have a concern about this document. In the definition of IPv6
Header Chain, it says:

  However, if a second IPv6 header appears in the header chain, as
   is the case when IPv6 is tunneled over IPv6, the second IPv6
   header is considered to be an upper-layer header and terminates
   the header chain.

This means that stateless firewalls are being directed to discontinue
extension header parsing when a first encapsulated IPv6 header is
encountered - even though there may be many more parsable (inner)
headers that follow. As a result, the firewall would either have to
drop or forward the packet without examining the true upper layer
header. This may result in an incorrect perception that tunneled
traffic is either less reliable or more dangerous than non-tunneled
traffic.

Here are my suggested changes to address this issue:

1) Section 3, under IPv6 Header Chain, change:

  However, if a second IPv6 header appears in the header chain, as
   is the case when IPv6 is tunneled over IPv6, the second IPv6
   header is considered to be an upper-layer header and terminates
   the header chain.

to:

  However, if a second IPv6 header appears in the header chain, as
   is the case when IPv6 is tunneled over IPv6, the second IPv6
   header is optionally considered to be either an upper-layer header
   that terminates the header chain or another extension header that
   continues the chain.

2) Section 3, under Upper-layer Header, change:

  In the general case, the upper-layer header is the first member
   of the header chain that is neither an IPv6 header nor an IPv6
   extension header.

to:

  In the general case, the upper-layer header is the first member
   of the header chain that is not considered to be an extension header.

3) Section 3, under Upper-layer Header, delete the following sentence:

  However, if either an ESP header, or a second IPv6 header occur in
   the header chain, they are considered to be upper layer headers and
   they terminate the header chain.

4) Section 5, change the final paragraph to:

  As a result of the above mentioned requirements, a packet's header
   chain length cannot exceed the Path MTU associated with its
   destination.  Hosts MAY discover the Path MTU, using procedures such
   as those defined in [RFC1981] and [RFC4821].  However, if a host does
   not discover the Path MTU, it MUST limit the header chain length to
   1024 bytes.  Limiting the header chain length to 1024 bytes ensures
   that the header chain length does not exceed the IPv6 minimum MTU
   [RFC2460] even if additional encapsulation headers are inserted by
   tunnels on the path.

Thanks - Fred
fred.l.temp...@boeing.com


 

 -Original Message-
 From: ipv6-boun...@ietf.org [mailto:ipv6-boun...@ietf.org] On Behalf Of
 The IESG
 Sent: Wednesday, October 02, 2013 11:55 AM
 To: IETF-Announce
 Cc: i...@ietf.org
 Subject: Last Call: draft-ietf-6man-oversized-header-chain-08.txt
 (Implications of Oversized IPv6 Header Chains) to Proposed Standard
 
 
 The IESG has received a request from the IPv6 Maintenance WG (6man) to
 consider the following document:
 - 'Implications of Oversized IPv6 Header Chains'
   draft-ietf-6man-oversized-header-chain-08.txt as Proposed Standard
 
 The IESG plans to make a decision in the next few weeks, and solicits
 final comments on this action. Please send substantive comments to the
 ietf@ietf.org mailing lists by 2013-10-16. Exceptionally, comments may
 be
 sent to i...@ietf.org instead. In either case, please retain the
 beginning of the Subject line to allow automated sorting.
 
 Abstract
 
 
The IPv6 specification allows IPv6 header chains of an arbitrary
size.  The specification also allows options which can in turn
 extend
each of the headers.  In those scenarios in which the IPv6 header
chain or options are unusually long and packets are fragmented, or
scenarios in which the fragment size is very small, the first
fragment of a packet may fail to include the entire IPv6 header
chain.  This document discusses the interoperability and security
problems of such traffic, and updates RFC 2460 such that the first
fragment of a packet is required to contain the entire IPv6 header
chain.
 
 
 
 
 The file can be obtained via
 http://datatracker.ietf.org/doc/draft-ietf-6man-oversized-header-chain/
 
 IESG discussion can be tracked via
 http://datatracker.ietf.org/doc/draft-ietf-6man-oversized-header-
 chain/ballot/
 
 
 No IPR declarations have been submitted directly on this I-D.
 
 
 
 IETF IPv6 working group mailing list
 i...@ietf.org
 Administrative Requests: https://www.ietf.org/mailman/listinfo/ipv6
 


RE: LISP is not a Loc-ID Separation protocol

2011-11-03 Thread Templin, Fred L
Noel and others, 

Let's say we have an end system with as many ISP
connections as you like - each with its own locator
address. Let's say the end system also has multiple
loopback interfaces - say it has two, for example.

The end system connects to a first VPN and receives
the endpoint address A, which it assigns to the
first loopback interface. The end system also connects
to a second VPN and receives the address B, which it
assigns to the second loopback interface.

Which one (A or B) is the end system's identity?

Thanks - Fred
fred.l.temp...@boeing.com
___
Ietf mailing list
Ietf@ietf.org
https://www.ietf.org/mailman/listinfo/ietf


RE: LISP is not a Loc-ID Separation protocol

2011-11-03 Thread Templin, Fred L
Noel, 

 -Original Message-
 From: ietf-boun...@ietf.org [mailto:ietf-boun...@ietf.org] On 
 Behalf Of Noel Chiappa
 Sent: Thursday, November 03, 2011 7:08 AM
 To: ietf@ietf.org
 Cc: j...@mercury.lcs.mit.edu
 Subject: RE: LISP is not a Loc-ID Separation protocol
 
  From: Templin, Fred L fred.l.temp...@boeing.com
 
  Let's say the end system also has multiple loopback 
 interfaces - say it
  has two, for example.
 
 Why? What does that buy you?

The multiple loopback interfaces (or, more generally,
the multiple internal virtual interfaces) are in one
to one correspondence with the end system's multiple
VPN connections. The internal virtual interfaces keep
the VPNs separate.

  Which one (A or B) is the end system's identity?
 
 Suppose I assign two endpoint identifiers to a host. Which is 
 the host's
 identity?

Neither - that's the point. The host's identify is
not bound to any one or multiple IP addresses.

Thanks - Fred
fred.l.temp...@boeing.com
 
   Noel
 ___
 Ietf mailing list
 Ietf@ietf.org
 https://www.ietf.org/mailman/listinfo/ietf
 
___
Ietf mailing list
Ietf@ietf.org
https://www.ietf.org/mailman/listinfo/ietf


RE: LISP is not a Loc-ID Separation protocol

2011-11-03 Thread Templin, Fred L
Hi Noel, 

 -Original Message-
 From: Noel Chiappa [mailto:j...@mercury.lcs.mit.edu] 
 Sent: Thursday, November 03, 2011 7:43 AM
 To: ietf@ietf.org
 Cc: j...@mercury.lcs.mit.edu
 Subject: RE: LISP is not a Loc-ID Separation protocol
 
  From: Templin, Fred L fred.l.temp...@boeing.com
 
  one to one correspondence with the end system's multiple VPN
  connections. The internal virtual interfaces keep the 
 VPNs separate.
 
 As logically separate sources for incoming/outbound packets, 
 they are just
 like multiple real interfaces. The name used for neither is really the
 'identity' of the host, the names applied to those things 
 just identify
 sources/sinks of packets.
 
 
  Suppose I assign two endpoint identifiers to a host. 
 Which is the
  host's identity?
 
  Neither - that's the point. The host's identify is not 
 bound to any one
  or multiple IP addresses.
 
 I said endpoint identifiers (under whatever definition of 
 that term one
 wishes to use), not addresses.

OK, so then let's consider a related analogy. It is
not uncommon for a person (e.g., John Doe) to have
dual citizenship with countries A and B, i.e, John
interfaces with both countries. John would receive
a separate taxpayer identifier from each of A and B,
which has relevance only within the respective
country's routing system. But, John's identity is
neither A nor B; John's identity is John.

 So, a single host can have multiple identities (whether one 
 does so via
 multiple interfaces/interface addresses, or endpoint identifiers). So?

No; not multiple identities. One identity; multiple
interfaces and multiple addresses. Same as for the
taxpayer ID analogy.

Thanks - Fred
fred.l.temp...@boeing.com

   Noel
 
___
Ietf mailing list
Ietf@ietf.org
https://www.ietf.org/mailman/listinfo/ietf


RE: LISP is not a Loc-ID Separation protocol

2011-11-03 Thread Templin, Fred L
Hi Noel,

 But I must confess I'm kind of confused as to why any of this 
 matters? I
 mean, it's fun philosophical debate (well, for some people, I 
 guess :-), but
 so what?

It just circles back again to the fact that what LISP
calls EID is something that names an interface; not
an end system. See the subject line for the implications.

I suggested a long time ago that the LISP team rename
EID as Endpoint Interface iDentifier, but they
balked at the suggestion. I do however believe that
that expansion is more closely aligned with the truth.

Thanks - Fred
fred.l.temp...@boeing.com
 
   Noel
 ___
 Ietf mailing list
 Ietf@ietf.org
 https://www.ietf.org/mailman/listinfo/ietf
 
___
Ietf mailing list
Ietf@ietf.org
https://www.ietf.org/mailman/listinfo/ietf


RE: LISP is not a Loc-ID Separation protocol

2011-11-03 Thread Templin, Fred L
Hi Noel, 

 -Original Message-
 From: Noel Chiappa [mailto:j...@mercury.lcs.mit.edu] 
 Sent: Thursday, November 03, 2011 8:28 AM
 To: ietf@ietf.org
 Cc: j...@mercury.lcs.mit.edu
 Subject: RE: LISP is not a Loc-ID Separation protocol
 
  From: Templin, Fred L fred.l.temp...@boeing.com
 
  It just circles back again to the fact that what LISP 
 calls EID is
  something that names an interface; not an end system. 
 
 And I keep pointing out that an LEID which is assigned to a 
 virtual interface,
 one which is created _solely_ as a place to hold the system's 
 identity, walks
 like a EID duck, quacks like a EID duck, etc, etc.
 
 I mean, here we have a name which i) is purely identity, ii) 
 has no location
 info of any kind in it, iii) cannot be used for forwarding 
 anywhere, etc, etc.
 
 Where in that list is any difference from a 'real' EID (in 
 the sense of 'name
 for an end system')?
 
 
 (For those on this list who missed the previous N repetitions of this
 debate, you can now see why there have been N+1 of them.)

That you have chosen to re-enter the loop again does
not prove your point. My point is proven by the analogy
I gave in the previous iteration:

https://www.ietf.org/ibin/c5i?mid=6rid=49gid=0k1=933k2=60357tid=1320334244

Thanks - Fred
fred.l.temp...@boeing.com 

   Noel
___
Ietf mailing list
Ietf@ietf.org
https://www.ietf.org/mailman/listinfo/ietf


RE: LISP is not a Loc-ID Separation protocol

2011-11-03 Thread Templin, Fred L
Noel, 

 -Original Message-
 From: Noel Chiappa [mailto:j...@mercury.lcs.mit.edu] 
 Sent: Thursday, November 03, 2011 8:40 AM
 To: ietf@ietf.org
 Cc: j...@mercury.lcs.mit.edu
 Subject: RE: LISP is not a Loc-ID Separation protocol
 
 
  From: Templin, Fred L fred.l.temp...@boeing.com
 
  .. an LEID which is assigned to a virtual interface, 
 one which is created
  _solely_ as a place to hold the system's identity ..
  ...
  .. a name which i) is purely identity, ii) has no 
 location info of
  any kind in it, iii) cannot be used for forwarding 
 anywhere, etc, etc.
  
  Where in that list is any difference from a 'real' EID 
 (in the sense
  of 'name for an end system')?
 
  My point is proven by the analogy I gave in the 
 previous iteration
 
 I am still interested to hear if there is any effective 
 difference you can
 point to?

You can't just refuse to engage in my analogy:

https://www.ietf.org/ibin/c5i?mid=6rid=49gid=0k1=933k2=60357tid=1320334244

and then demand that I engage in yours.

Thanks - Fred
fred.l.temp...@boeing.com


   Noel
 
___
Ietf mailing list
Ietf@ietf.org
https://www.ietf.org/mailman/listinfo/ietf


RE: LISP is not a Loc-ID Separation protocol

2011-11-02 Thread Templin, Fred L
Thankfully, I missed most of the earlier threads related
to this. But, on the subject of identifiers, Robin is right.
What the IETF protocol known as LISP calls identifiers are
actually IP addresses. And, IP addresses name *interfaces*;
they do not name *end systems*. Same is true also of IRON.

Thanks - Fred
fred.l.temp...@boeing.com  

 -Original Message-
 From: ietf-boun...@ietf.org [mailto:ietf-boun...@ietf.org] On 
 Behalf Of Robin Whittle
 Sent: Tuesday, November 01, 2011 10:34 AM
 To: ietf@ietf.org
 Subject: Re: LISP is not a Loc-ID Separation protocol
 
 I wrote another explanation of why the LISP protocol does not 
 involve a
 separate namespace for Identifiers - and so why it is not a Loc-ID
 Separation protocol.
 
   http://www.firstpr.com.au/ip/ivip/namespace/lisp-not-loc-id/
 
 This is a longer version of my arguments earlier in this 
 thread because
 it assumes no knowledge of the LISP protocol or of the IRTF Routing
 Research Group work in recent years on scalable routing.
 
 Its good that the LISP protocol, Ivip and Iron are not Locator -
 Identifier Separation protocols:
 
   Overloading of Loc  ID functions is good for hosts and should be
   maintained2010-06-22
   http://www.ietf.org/mail-archive/web/rrg/current/msg07017.html
 
  - Robin
 
 ___
 Ietf mailing list
 Ietf@ietf.org
 https://www.ietf.org/mailman/listinfo/ietf
 
___
Ietf mailing list
Ietf@ietf.org
https://www.ietf.org/mailman/listinfo/ietf


RE: 6to4v2 (as in ripv2)?

2011-07-29 Thread Templin, Fred L
Christian,

 -Original Message-
 From: ietf-boun...@ietf.org [mailto:ietf-boun...@ietf.org] On 
 Behalf Of Christian Huitema
 Sent: Friday, July 29, 2011 12:17 PM
 To: Michel Py; Rémi Després
 Cc: ietf@ietf.org; Keith Moore
 Subject: RE: 6to4v2 (as in ripv2)? 
 
 6rd addresses a different problem than 6to4.
 
 6to4 is a global solution, that relies on pretty much every 
 native IPv6 provider deploying 6to4 relays. If these relays 
 were really well deployed and reliable, 6to4 would allow any 
 router with a native IPv4 address to provide IPv6 
 connectivity to its local users. That is, 6to4 relies on the 
 kindness of strangers and allows uncoordinated deployments by 
 end-users.
 
 6rd is a local solution, that can be used by providers to 
 easily deploy IPv6 tunnels over their existing IPv4 
 infrastructure. The provider controls the IPv6 prefix, which 
 effectively defines a specific 6rd subnet. The provider 
 also controls the deployment of relays between the 6rd subnet 
 and the native Internet. There is no need to rely on the 
 kindness of strangers.

I think this is well said. Another way of saying the
same thing is that 6to4 is an inter-site solution while
6rd is an intra-site solution when considering the
provider network as a site. With extensions, ISATAP
can also satisfy this provider network intra-site
requirement (see draft-templin-isupdate) while enabling
the desired IPv6 services for end-user sites.

Thanks - Fred
fred.l.temp...@boeing.com

 In a sense, 6rd is very similar to a tunnel broker 
 deployment, with a key improvement and an important 
 limitation. The key improvement is the ability for 6rd 
 routers in the same domain to send traffic directly at each 
 other. Local traffic stays local, does not need to be relayed 
 by the tunnel servers or the 6rd relays. The key limitation 
 is that 6rd assumes direct IPv4 connectivity between the 
 participating 6rd routers, i.e. no NAT. 
 
 6rd is a very good solution for its intended usage, rapid 
 deployment of IPv6 by IPv4 providers. But 6rd is not a 
 replacement for the global, uncoordinated 6to4 deployment. 
 Hosts that really need this kind of uncoordinated global 
 solution will have to rely on Teredo if they cannot use 6to4. 
 Whether that's a good thing is clearly a matter of debate.
 
 
 -Original Message-
 From: ietf-boun...@ietf.org [mailto:ietf-boun...@ietf.org] On 
 Behalf Of Michel Py
 Sent: Friday, July 29, 2011 11:38 AM
 To: Rémi Després
 Cc: ietf@ietf.org; Keith Moore
 Subject: RE: 6to4v2 (as in ripv2)? 
 
  Rémi Després wrote:
  6rd is designed to offer native IPv6 prefixes across 
 IPv4-only routing 
  domains.
 
 There is a word for that: oxymoron. In French: oxymore.
 If it stops working when IPv4 is broken, it is not native.
 
 Michel.
 
 ___
 Ietf mailing list
 Ietf@ietf.org
 https://www.ietf.org/mailman/listinfo/ietf
 
 ___
 Ietf mailing list
 Ietf@ietf.org
 https://www.ietf.org/mailman/listinfo/ietf
 
___
Ietf mailing list
Ietf@ietf.org
https://www.ietf.org/mailman/listinfo/ietf


RE: draft-ietf-v6ops-6to4-to-historic (yet again)

2011-07-26 Thread Templin, Fred L
Ron,

I believe 'draft-ietf-v6ops-6to4-advisory' is both
necessary and sufficient regardless of whether
historic is an appropriate characterization. So,
I don't think we need this document.

Thanks - Fred
fred.l.temp...@boeing.com  

 -Original Message-
 From: ietf-boun...@ietf.org [mailto:ietf-boun...@ietf.org] On 
 Behalf Of Ronald Bonica
 Sent: Monday, July 25, 2011 7:31 AM
 To: ietf@ietf.org
 Subject: draft-ietf-v6ops-6to4-to-historic (yet again)
 
 Folks,
 
 After some discussion, the IESG is attempting to determine 
 whether there is IETF consensus to do the following:
 
 - add a new section to draft-ietf-v6ops-6to4-to-historic
 - publish draft-ietf-v6ops-6to4-to-historic as INFORMATIONAL
 
 draft-ietf-v6ops-6to4-to-historic will obsolete RFCs 3056 and 
 3068 and convert their status to HISTORIC. It will also 
 contain a new section describing what it means for RFCs 3056 
 and 3068 to be classified as HISTORIC. The new section will say that:
 
 - 6-to-4 should not be configured by default on any 
 implementation (hosts, cpe routers, other)
 - vendors will decide whether/when 6-to-4 will be removed 
 from implementations. Likewise, operators will decide 
 whether/when 6-to-4 relays will be removed from their 
 networks. The status of RFCs 3056 and 3068 should not be 
 interpreted as a recommendation to remove 6-to-4 at any 
 particular time.
 
 
 draft-ietf-v6ops-6to4-to-historic will not update RFC 2026. 
 While it clarifies the meaning of HISTORIC in this 
 particular case, it does not set a precedent for any future case.
 
 Please post your views on this course of action by August 8, 2011.
 
 
   
  Ron Bonica
   
  speaking as OPS Area AD
 ___
 Ietf mailing list
 Ietf@ietf.org
 https://www.ietf.org/mailman/listinfo/ietf
 
___
Ietf mailing list
Ietf@ietf.org
https://www.ietf.org/mailman/listinfo/ietf


RE: Another look at 6to4 (and other IPv6 transition issues)

2011-07-15 Thread Templin, Fred L
Hi Joel, 

 ipv4 is becoming less usable and it's 
 taking autotunnels with it, nobody here has a proposal that 
 changes that.

As far as I can tell, IPv4 is not becoming less
usable within my organization's network.

Thanks - Fred
fred.l.temp...@boeing.com
___
Ietf mailing list
Ietf@ietf.org
https://www.ietf.org/mailman/listinfo/ietf


RE: [v6ops] Another look at 6to4 (and other IPv6 transition issues)

2011-07-15 Thread Templin, Fred L
 

 -Original Message-
 From: Ted Lemon [mailto:ted.le...@nominum.com] 
 Sent: Friday, July 15, 2011 12:43 PM
 To: Templin, Fred L
 Cc: v6...@ietf.org Operations; IETF Discussion
 Subject: Re: [v6ops] Another look at 6to4 (and other IPv6 
 transition issues)
 
 On Jul 15, 2011, at 3:37 PM, Templin, Fred L wrote:
  ipv4 is becoming less usable and it's 
  taking autotunnels with it, nobody here has a proposal that 
  changes that.
  
  As far as I can tell, IPv4 is not becoming less
  usable within my organization's network.
 
 You realize that you have not contradicted what Joel said, 
 right? The IETF's business isn't making sure that 
 Boeing's networks are functional, much as we might 
 collectively wish you well in that regard.

If the IETF wishes organizations such as ours well, then
they should be willing to provide operational guidance.
RFCs 4057 and 4852 were a small step in that direction,
while 'draft-templin-v6ops-isops' provides actionable
information.

Fred
___
Ietf mailing list
Ietf@ietf.org
https://www.ietf.org/mailman/listinfo/ietf


RE: [v6ops] Last Call: draft-ietf-v6ops-6to4-to-historic-04.txt (Request to move Connection of IPv6 Domains via IPv4 Clouds (6to4) to Historic status) to Informational RFC

2011-06-10 Thread Templin, Fred L

You cannot expect something to be configured correctly if it is simply turned 
on without a) being managed by someone or b) detection mechanisms to see if 
it's working. Sadly, anycasted 6to4 meets neither of these conditions.
ISATAP meets both of these conditions:

http://tools.ietf.org/html/draft-templin-v6ops-isops

Fred


___
Ietf mailing list
Ietf@ietf.org
https://www.ietf.org/mailman/listinfo/ietf


Provider-Aggregated vs Provider-Independent IPv6 addressing

2010-11-08 Thread Templin, Fred L
During the IPv6 panel at the plenary last night, representatives
of several major service providers discussed their experiences
with IPv6. It became clear that many of their experiments involve technologies 
that delegate Provider-Aggregated (PA) IPv6 prefixes
to the customer instead of Provider-Independent (PI) ones. This
fact did not seem to be at the forefront of the service providers'
use case considerations, and perhaps needs to be brought to a
level of awareness in the community.

Many years ago, there was an extended debate on this list regarding
PA vs. PI. Emotions ran high, and in the end there seemed to be
a consensus favoring PI. Have we forgotten about that? Is it time
to re-open the debate?

Thanks - Fred
fred.l.temp...@boeing.com
 
___
Ietf mailing list
Ietf@ietf.org
https://www.ietf.org/mailman/listinfo/ietf


RE: jim bound

2009-03-09 Thread Templin, Fred L
I'll add my voice as another former DEC colleague who
was saddened by this news.

Jim never shied away from a challenging or contentious
job. For example, the work on enterprise networks in
RFCs 4852, 4057 could only have been done by someone
with Jim's fortitude.

I believe we are all better off for having known Jim,
and I will miss him.

Fred
fred.l.temp...@boeing.com 

 -Original Message-
 From: Paul Vixie [mailto:vi...@isc.org]
 Sent: Friday, March 06, 2009 11:25 PM
 To: ietf@ietf.org
 Subject: jim bound
 
 i shared the news with some coworkers from DEC (where jim and i both
worked
 back in the early 1990's).  one of them said:
 
  Wow, sorry to hear it.  Jim treated networking like he was still in
'Nam
  and beauracracy was Charlie.  He always took the hill.
 
 another added:
 
  I would only add that he never left any behind.
 
 jim will be missed, both sorely and otherwise, by me and by many
others.
 
 ___
 Ietf mailing list
 Ietf@ietf.org
 https://www.ietf.org/mailman/listinfo/ietf
___
Ietf mailing list
Ietf@ietf.org
https://www.ietf.org/mailman/listinfo/ietf