On Sun, Nov 25, 2018 at 11:55 PM Fernando Gont wrote: > On 24/11/18 17:37, C. M. Heard wrote: > > On Sat, Nov 24, 2018 at 12:30 PM Nick Hilliard <nick@xxxxxxxxxx> wrote: > >> Brian E Carpenter wrote on 24/11/2018 20:17: > >>> Operators make their own > >>> decisions, so I think that is what the draft should say. Something like: > >>> > >>> 3.5.5. Advice > >>> > >>> Operators should determine according to their own circumstances > >>> whether to discard packets containing unknown IPv6 EHs. > >>> > >>> And at the same time, delete the 2nd and 3rd sentences of this: > >>> > >>> 3.5.3. Specific Security Implications > >>> > >>> For obvious reasons, it is impossible to determine specific security > >>> implications of unknown IPv6 EHs. However, from security standpoint, > >>> a device should discard IPv6 extension headers for which the security > >>> implications cannot be determined. We note that this policy is > >>> allowed by [RFC7045]. > >> > >> This looks like a sensible approach. > > > > I could live with that. > > FWIW, I can live with that, too. UNless somebody screams against it, I > will apply the proposed change to the next rev. Thanks! > > > Similar changes might be considered for Sec. 4.4.5. > > Will do. Thank you. There is also related advice in the note to Section 3.1 that needs similar changes and the matter of experimental EHs and experimental options that I raised in my original comments. These are all cases where the security implications cannot be determined. Proposed text for Sections 3.1, 3.4.10.5, 3.5.3 et. seq., 4.3.18.5, and 4.4.5 follows below. --- OLD: NOTE: [RFC7112] specifies that non-fragmented IPv6 datagrams and IPv6 First-Fragments MUST contain the entire IPv6 header chain [RFC7112]. Therefore, intermediate systems can enforce the filtering policies discussed in this document, or resort to simply discarding the offending packets when they fail to comply with the requirements in [RFC7112]. We note that, in order to implement filtering rules on the fast path, it may be necessary for the filtering device to limit the depth into the packet that can be inspected before giving up. In circumstances where there is such a limitation, it is recommended that implementations discard packets if, when trying to determine whether to discard or permit a packet, the aforementioned limit is encountered. NEW: NOTE: [RFC7112] specifies that non-fragmented IPv6 datagrams and IPv6 First-Fragments MUST contain the entire IPv6 header chain [RFC7112]. Therefore, intermediate systems can enforce the filtering policies discussed in this document, or resort to simply discarding the offending packets when they fail to comply with the requirements in [RFC7112]. We note that, in order to implement filtering rules on the fast path, it may be necessary for the filtering device to limit the depth into the packet that can be inspected before giving up. In circumstances where there is such a limitation, it is recommended that implementations provide a configuration option that specifies whether to discard packets if the aforementioned limit is encountered. Operators may then determine according to their own circumstances how such packets will be handled. --- OLD: 3.4.10.5. Advice Intermediate systems should discard packets containing these EHs. Only in specific scenarios in which RFC3692-Style experiments are to be performed should these EHs be permitted. NEW: 3.4.10.5. Advice Operators should determine according to their own circumstances whether to discard packets containing experimental IPv6 EHs. --- OLD: 3.5.3. Specific Security Implications For obvious reasons, it is impossible to determine specific security implications of unknown IPv6 EHs. However, from security standpoint, a device should discard IPv6 extension headers for which the security implications cannot be determined. We note that this policy is allowed by [RFC7045]. 3.5.4. Operational and Interoperability Impact if Blocked As noted in [RFC7045], discarding unknown IPv6 EHs may slow down the deployment of new IPv6 EHs and transport protocols. The corresponding IANA registry ([IANA-PROTOCOLS]) should be monitored such that filtering rules are updated as new IPv6 EHs are standardized. We note that since IPv6 EHs and upper-layer protocols share the same numbering space, discarding unknown IPv6 EHs may result in packets encapsulating unknown upper-layer protocols being discarded. 3.5.5. Advice Intermediate systems should discard packets containing unknown IPv6 EHs. NEW: 3.5.3. Specific Security Implications For obvious reasons, it is impossible to determine specific security implications of unknown IPv6 EHs. 3.5.4. Operational and Interoperability Impact if Blocked As noted in [RFC7045], discarding unknown IPv6 EHs may slow down the deployment of new IPv6 EHs and transport protocols. The corresponding IANA registry ([IANA-PROTOCOLS]) should be monitored such that filtering rules are updated as new IPv6 EHs are standardized. We note that since IPv6 EHs and upper-layer protocols share the same numbering space, discarding unknown IPv6 EHs may result in packets encapsulating unknown upper-layer protocols being discarded. 3.5.5. Advice Operators should determine according to their own circumstances whether to discard packets containing unknown IPv6 EHs. --- OLD: 4.3.18.5. Advice Intermediate systems should discard packets that contain these options. Only in specific environments where RFC3692-style experiments are meant to be performed should these options be permitted. NEW: 4.3.18.5. Advice Operators should determine according to their own circumstances whether to discard packets containing experimental IPv6 options. --- OLD: 4.4.5. Advice Enterprise intermediate systems that process the contents of IPv6 EHs should discard packets that contain unknown options. Other intermediate systems that process the contents of IPv6 EHs should permit packets that contain unknown options. NEW: 4.4.5. Advice Operators should determine according to their own circumstances whether to discard packets containing unknown IPv6 options. EDITORIAL: I believe that the following is simply mis-worded: --- OLD: 4.3.10.5. Advice Intermediate system should discard packets that contain this option. NEW: 4.3.10.5. Advice Intermediate systems that are not within a MANET domain should discard packets that contain this option. NITS: These should be fixed prior to publication. --- OLD: 4.3.1.4. Operational and Interoperability Impact if Blocked Discarding packets that contain this option would potentially break any protocol that relies on IPv6 EHs. NEW: 4.3.1.4. Operational and Interoperability Impact if Blocked Discarding packets that contain this option would potentially break any protocol that relies on IPv6 options. --- OLD: 4.3.2.4. Operational and Interoperability Impact if Blocked Discarding packets that contain this option would potentially break any protocol that relies on IPv6 EHs. NEW: 4.3.2.4. Operational and Interoperability Impact if Blocked Discarding packets that contain this option would potentially break any protocol that relies on IPv6 options. In some places the abbreviations RHT0 and RHT1 are used, while in other places RTH0 and RTH1 are used. The usage should be consistent; IMHO the former abbreviations seem to be more correct. Mike Heard