On 6/6/13 1:25 PM, Ray Hunter wrote:
Nalini Elkins wrote:
But the reality of the situation is that much of the Internet appears
to be running where

"n is an arbitrary number picked out of the air by a vendor"
The number is the product of compromise between (in no particular order) performance, transitor count, memory size, cost, heat, standards compliance, customer requirements, product lifetime.

The are room for multiple products in the market-place. and some of them have quite long life-cycles. There is ipv6 capable silicon forwarding at 10Gbe/OC192 rates in the internet that was designed 13-15 years ago and which was still recently commercially available having been iteratively improved.
Or rather

"multiple arbitrary numbers"!

Yes?
Correct.

There is a non null union between the set of IETF standards and the set
of operational configurations of the various networks that form the
Internet; but neither is a proper subset of the other. That's nothing new.
Part of the reasons we have a couple of drafts floating around right now related to problems in that space, is that operators want the IETF community to be aware of the limitations of where we are today. Doubtless some people participating in the IETF are aware of how asic-based-forwarding works in the internet today having made significant contributions to where we are, but not everyone is. Manufacturers are understandably cagey about the internal workings of their hardware.

As on operator I have an interest in telling people if their assumptions are at variance with what we can support.

Thanks,

Nalini Elkins
Inside Products, Inc.
(831) 659-8360
www.insidethestack.com

------------------------------------------------------------------------
*From:* Ray Hunter <v6...@globis.net>
*To:* Nalini Elkins <nalini.elk...@insidethestack.com>
*Cc:* Brian E Carpenter <brian.e.carpen...@gmail.com>; 6man
<ipv6@ietf.org>; Fernando Gont <fg...@si6networks.com>;
"vishwas.man...@hp.com" <vishwas.man...@hp.com>
*Sent:* Thursday, June 6, 2013 9:42 AM
*Subject:* Re: draft-ietf-6man-oversized-header-chain-02 (was Re: Re:
draft-ietf-6man-ext-transmit-01)

IMVHO interpreting the text of the current drafts.

Nalini Elkins <mailto:nalini.elk...@insidethestack.com
<mailto:nalini.elk...@insidethestack.com>>
6 June 2013 18:20
So, if we are talking about the MTU of the local egress interface,
then since, I believe, the minimum MTU size for IPv6 is 1,280, then
all devices should be prepared to examine up to 1,280 bytes to get the
L4 header?
Not quite.

AFAICS

1. All parsing engines should be able to parse at least 1280 bytes to
cover the minimum IPv6 MTU.

2. If all the local interfaces are Ethernet, and have an MTU set of
1500, the parsing engine on that box should be able to parse a full
Ethernet frame of 1500 bytes of payload..... and so on for devices
supporting links with larger MTUs, all the way up to jumbograms (if
supported on that device).

3. draft-ietf-6man-ext-transmit gives the option of not parsing
extension headers at all on high speed routers (only the hop by hop
option is supposed to be parsed by routers on the path). But neither
this draft, nor any other IETF draft that I know of, gives an option for
parsing an IPv6 header chain "just for the first n bytes", where n is an
arbitrary number picked out of the air by a vendor, whether that be 53,
256 or 1280.

regards,
RayH
Thanks,

Nalini Elkins
Inside Products, Inc.
(831) 659-8360
www.insidethestack.com <http://www.insidethestack.com/>

------------------------------------------------------------------------
*From:* Ray Hunter <v6...@globis.net <mailto:v6...@globis.net>>
*To:* Nalini Elkins <nalini.elk...@insidethestack.com
<mailto:nalini.elk...@insidethestack.com>>
*Cc:* Brian E Carpenter <brian.e.carpen...@gmail.com
<mailto:brian.e.carpen...@gmail.com>>; 6man
<ipv6@ietf.org <mailto:ipv6@ietf.org>>; Fernando Gont
<fg...@si6networks.com <mailto:fg...@si6networks.com>>;
vishwas.man...@hp.com <mailto:vishwas.man...@hp.com>
*Sent:* Thursday, June 6, 2013 9:14 AM
*Subject:* draft-ietf-6man-oversized-header-chain-02 (was Re: Re:
draft-ietf-6man-ext-transmit-01)

Nalini Elkins wrote:
Some tricky and potentially malicious cases will be avoided by
forbidding very long chains of extension headers that need to be
fragmented [I-D.ietf-6man-oversized-header-chain].
I  wonder if this is the place to define "very long"?
I guess those two words can be deleted - the issue is only that the
header chain gets fragmented at all. The full discussion is in the
cited draft, of course.

I know the draft that you have cited and they do not define "long"
either.  There has been quite a bit of discussion about what "long"
means and IMHO somewhere, someone needs to take some kind of
reasonable stand.

Actually IMHO ietf-6man-oversized-header-chain DOES define "unusually
long" very accurately.

I-D.ietf-6man-oversized-header-chain requires that "the first fragment
of a fragmented datagram is required to contain the entire IPv6 header
chain"

So in other words, any packet parsing engine should be prepared to
examine an entire single frame up to the MTU of the local egress
interface, but should not be expected to maintain any state across
multiple fragments.

We might also benefit operationally from setting an additional limit on
the length of the hop hop option header, which is theoretically meant to
be processed by routers along the path. However, my guess is that is
well beyond the author's original intentions for
draft-ietf-6man-oversized-header-chain-02, which was more focussed on
firewalls.

The IETF hasn't done much about firewalls at all. This
search produces far more expired drafts than anything else:
https://datatracker.ietf.org/doc/search/?name=firewalls&rfcs=on&activeDrafts=on&oldDrafts=on&search_submit=
<https://datatracker.ietf.org/doc/search/?name=firewalls&rfcs=on&activeDrafts=on&oldDrafts=on&search_submit=>
<https://datatracker.ietf.org/doc/search/?name=firewalls&rfcs=on&activeDrafts=on&oldDrafts=on&search_submit=
<https://datatracker.ietf.org/doc/search/?name=firewalls&rfcs=on&activeDrafts=on&oldDrafts=on&search_submit=>>
<https://datatracker.ietf.org/doc/search/?name=firewalls&rfcs=on&activeDrafts=on&oldDrafts=on&search_submit=
<https://datatracker.ietf.org/doc/search/?name=firewalls&rfcs=on&activeDrafts=on&oldDrafts=on&search_submit=>
<https://datatracker.ietf.org/doc/search/?name=firewalls&rfcs=on&activeDrafts=on&oldDrafts=on&search_submit=
<https://datatracker.ietf.org/doc/search/?name=firewalls&rfcs=on&activeDrafts=on&oldDrafts=on&search_submit=>>>
The reason I asked is because I think defining RFCs or rules for
firewalls is a really good thing to do but if the vendors are not in
the habit of having to be compliant, then why would they pay attention
to this draft that we are discussing?  I actually think maybe an RFC
which explicitly talks about firewalls is probably a good thing to do.
  Now, getting vendors to comply...

Thanks,

Nalini Elkins
Inside Products, Inc.
(831) 659-8360
www.insidethestack.com <http://www.insidethestack.com/>



Ray Hunter <mailto:v6...@globis.net <mailto:v6...@globis.net>>
6 June 2013 18:14
Nalini Elkins wrote:
Some tricky and potentially malicious cases will be avoided by
forbidding very long chains of extension headers that need to be
fragmented [I-D.ietf-6man-oversized-header-chain].
I  wonder if this is the place to define "very long"?
I guess those two words can be deleted - the issue is only that the
header chain gets fragmented at all. The full discussion is in the
cited draft, of course.

I know the draft that you have cited and they do not define "long"
either.  There has been quite a bit of discussion about what "long"
means and IMHO somewhere, someone needs to take some kind of
reasonable stand.

Actually IMHO ietf-6man-oversized-header-chain DOES define "unusually
long" very accurately.

I-D.ietf-6man-oversized-header-chain requires that "the first fragment
of a fragmented datagram is required to contain the entire IPv6 header
chain"

So in other words, any packet parsing engine should be prepared to
examine an entire single frame up to the MTU of the local egress
interface, but should not be expected to maintain any state across
multiple fragments.

We might also benefit operationally from setting an additional limit on
the length of the hop hop option header, which is theoretically meant to
be processed by routers along the path. However, my guess is that is
well beyond the author's original intentions for
draft-ietf-6man-oversized-header-chain-02, which was more focussed on
firewalls.

The IETF hasn't done much about firewalls at all. This
search produces far more expired drafts than anything else:
https://datatracker.ietf.org/doc/search/?name=firewalls&rfcs=on&activeDrafts=on&oldDrafts=on&search_submit=
<https://datatracker.ietf.org/doc/search/?name=firewalls&rfcs=on&activeDrafts=on&oldDrafts=on&search_submit=>
<https://datatracker.ietf.org/doc/search/?name=firewalls&rfcs=on&activeDrafts=on&oldDrafts=on&search_submit=
<https://datatracker.ietf.org/doc/search/?name=firewalls&rfcs=on&activeDrafts=on&oldDrafts=on&search_submit=>>
The reason I asked is because I think defining RFCs or rules for
firewalls is a really good thing to do but if the vendors are not in
the habit of having to be compliant, then why would they pay attention
to this draft that we are discussing?  I actually think maybe an RFC
which explicitly talks about firewalls is probably a good thing to do.
  Now, getting vendors to comply...

Thanks,

Nalini Elkins
Inside Products, Inc.
(831) 659-8360
www.insidethestack.com

------------------------------------------------------------------------


--------------------------------------------------------------------
IETF IPv6 working group mailing list
ipv6@ietf.org
Administrative Requests: https://www.ietf.org/mailman/listinfo/ipv6
--------------------------------------------------------------------


--------------------------------------------------------------------
IETF IPv6 working group mailing list
ipv6@ietf.org
Administrative Requests: https://www.ietf.org/mailman/listinfo/ipv6
--------------------------------------------------------------------

Reply via email to