> If we take the view that a firewall will block anything it does not know,
> without question or limit, then
> 1) We have no way to extend our basic protocols that will pass through
> firewalls (we have to tunnel / encapsulate)

I agree.

> 2) you are correct that this document does not help.

Disagree. If the Hdr Options is 00, then it will pass through.

>
> Also, if we assume that no one will ever define any new extension headers,
> then this work does not matter.
>
> (If we want that prohibition to be the case, we should say so, and remove
> the hook for new extension headers that was left in 2460.)
>
> On the other hand, if we think that there will be new extension headers, and
> we think that firewalls block things if they can not find enough information
> to allow them through, then it can be helpful if the firewalls (and other
> devices) can parse pass these new extensions without knowing them.
>  (Remember, these are for end-point consumption only.)

Yes.

>
> It seems to me a disservice to simultaneously let people use new extension
> headers and not give them a way to use them that can be parsed past by the
> common devices that could easily want to do such parsing.

Yes.

>
> My own preference would probably be to say that all end-to-end IP
> information should be in the destination options.  But if we do not want to
> go there, then we should own up to the implications thereof.  (In
> particular, there might be corner cases that can't use destination options.
>  We should tell people to use destination options first.  And tell them what
> to do if they can't.)

This then could be added in the subsequent versions of this draft.

Kam

>
> Yours,
> Joel
>
> On 1/3/2011 4:43 PM, Fernando Gont wrote:
>>
>> On 03/01/2011 06:25 p.m., Brian E Carpenter wrote:
>>
>>> The basic motivation for the present draft is clear:
>>>
>>>>    However,
>>>>    some intermediate nodes such as firewalls, may need to look at the
>>>>    transport layer header fields in order to make a decision to allow or
>>>>    deny the packet.
>>>
>>> That is, help middleboxes to violate e2e transparency and, furthermore,
>>> allow unknown headers to cross those middleboxes.
>>
>> I don't think this I-D will make a difference.
>>
>>> From the POV of a firewall, unless it really wants a packet to
>>
>> pass-through, it will block it.
>>
>> So, whether the Extension Header is unknown, or whether
>> draft-ietf-6man-exthdr-01.txt is implemented and the Specific type is
>> unknown will lead to the same result: the packet will be discarded.
>>
>> This proposal would only be useful to firewalls that implement a
>> "default allow", and that simply want to somehow ignore an unknown
>> extension header and base their decision on the upper-layer protocol
>> (only). -- But we all know that firewalls operate (or should operate) in
>> "default deny" rather than "default allow".
>>
>> So IMHO this proposal won't be useful for such firewalls.
>>
>> Thanks,
>
> --------------------------------------------------------------------
> IETF IPv6 working group mailing list
> ipv6@ietf.org
> Administrative Requests: https://www.ietf.org/mailman/listinfo/ipv6
> --------------------------------------------------------------------
>
--------------------------------------------------------------------
IETF IPv6 working group mailing list
ipv6@ietf.org
Administrative Requests: https://www.ietf.org/mailman/listinfo/ipv6
--------------------------------------------------------------------

Reply via email to