SlideShare a Scribd company logo
1 of 34
Download to read offline
In-Flight IPv6 Extension Header Insertion
Considered Harmful
draft-smith-6man-in-flight-eh-insertion-harmful
IETF-106
Mark Smith
markzzzsmith@gmail.com
Naveen Kottapalli
naveen.sarma@gmail.com
Ron Bonica
rbonica@juniper.net
Fernando Gont
fgont@si6networks.com
Tom Herbert
tom@quantonium.net
RFC 1883, RFC 2460
”Internet Protocol, Version 6 (IPv6) Specification”
“With one exception, extension headers are not examined or processed by
any node along a packet's delivery path, until the packet reaches the node
(or each of the set of nodes, in the case of multicast) identified in the
Destination Address field of the IPv6 header.”
RFC 1883, RFC 2460
”Internet Protocol, Version 6 (IPv6) Specification”
“The exception referred to in the preceding paragraph is the Hop-by-Hop
Options header, which carries information that must be examined and
processed by every node along a packet's delivery path, including the
source and destination nodes. The Hop-by-Hop Options header, when
present, must immediately follow the IPv6 header. Its presence is indicated
by the value zero in the Next Header field of the IPv6 header.”
RFC 8200
”Internet Protocol, Version 6 (IPv6) Specification”
“Extension headers (except for the Hop-by-Hop Options header) are not
processed, inserted, or deleted by any node along a packet's delivery path,
until the packet reaches the node (or each of the set of nodes, in the case of
multicast) identified in the Destination Address field of the IPv6 header.”
RFC 8200
”Internet Protocol, Version 6 (IPv6) Specification”
“The Hop-by-Hop Options header is not inserted or deleted, but may be
examined or processed by any node along a packet's delivery path, until the
packet reaches the node (or each of the set of nodes, in the case of multicast)
identified in the Destination Address field of the IPv6 header. The Hop-by-Hop
Options header, when present, must immediately follow the IPv6 header. Its
presence is indicated by the value zero in the Next Header field of the IPv6
header.”
RFC 8200 Changes Motivations
“must be examined and processed by every node along a packet's delivery
path”
to
“may be examined or processed by any node along a packet's delivery
path”
High speed routers observed ignoring HbH header “must”
RFC 8200 Changes Motivations
“With one exception, extension headers are not examined or processed by
any node along a packet's delivery path, until ...”
rephrased to be more explicit:
“Extension headers (except for the Hop-by-Hop Options header) are not
processed, inserted, or deleted by any node along a packet's delivery path,
until ...”
“Insertion of IPv6 Segment Routing Headers in a Controlled Domain”
draft-voyer-6man-extension-header-insertion
(Full) Internet Standard 86
(of 92)
0086 Internet Protocol, Version 6 (IPv6) Specification. S. Deering, R.
Hinden. July 2017. (Format: TXT=93658 HTML= bytes) (Obsoletes
RFC2460) (Also RFC8200)
Internet Draft Purpose
“In-Flight IPv6 Extension Header Insertion
Considered Harmful”
Record reasons and motivation for
RFC1883/RFC2460 and RFC 8200 text.
Describe IPv6 architecturally compliant solution.
Insert Remove
SA.A, DA.CSA.A, DA.C P.L. SA.A, DA.C I.EH P.L. SA.A, DA.C I.EH P.L. SA.A, DA.CSA.A, DA.C P.L.
Packet Path
In-Flight EH Insertion Defined
A B C
Key Observations
Original SA and DA are not modified during
insertion/removal.
Packets are being modified without attribution -
“anonymous modification”.
Packet size got larger.
Immutable Next Header field got modified.
Motivation?
Has never been specifically stated in draft-voyer-
6man-extension-header-insertion.
A set of 128 bit Segment Routing Segment IDs
(SIDs) is definitely going to add significant
overhead.
Try to save overhead somewhere else instead of
having smaller SIDs?
Internet Draft Theory
“Since the SRH inserted within an intermediate
node MUST be removed when all segments within
the SRH have been visited, it is not possible to
leak the SRH to the destination outside the source
domain.”
draft-voyer-6man-extension-header-insertion-06, July 2019
Actual Network Practice
Implementation Bugs
Partial Device Failures
Device Misconfiguration by Network Operator
“Since the SRH inserted within an intermediate
node MUST be removed when all segments within
the SRH have been visited, ...”
This MUST is an aspiration, not an assurance.
Single Point of Failure
The boundary of the EH insertion domain is likely
to be defined by a single level of boundary
devices.
That means the boundary is possible Single Point
of Failure.
Failed EH Removal Scenario
Src
AS
Dst
AS
Anonymous
EH insertion
Failed EH
removal
AS1 AS2 AS3 AS4
Internet Path
Brokenness
occurs here.
Who added/
inserted
EH that broke
my traffic?
Consequences and Impacts
Ignores Source Address Field
Semantics
Once the EH is inserted, the packet’s unchanged Source Address field is now
not correctly identifying all of the sources of the packet’s contents.
Two devices are now responsible for the contents of the packet.
One is anonymous.
Mechanisms and protocols that rely on using the Source Address, if triggered by
the inserted EH, may fail.
Breaks ICMPv6
ICMPv6 sends messages back to trigger packet’s
Source Address.
ICMPv6 message triggered by inserted EH will not
be sent to the EH insertion device, as it is not
identified in the packet’s Source Address field.
Breaks ICMPv6 PMTUD
Packet size increase due to inserted EH could
trigger PMTUD.
ICMPv6 Packet Too Big not sent to EH insertion
device, as packet’s SA is not EH insertion device.
Breaks IPsec
If the inserted EH fails to be removed, it will look
like unauthorised packet modification to IPsec.
Fault in Subsequent Transit Network
If an inserted EH fails to be removed, and the
packet travels through a subsequent transit
network that is also inserting EHs, the non-
removed EH may interfere.
Incorrect Destination Host
Processing
Non-removed EH could cause packet to be discarded when it
shouldn’t be e.g. unknown EH skipped over to next EH or
UDP/TCP etc. header.
Non-removed EH could cause packet to be processed when it
should be discarded.
Handling of unknown EHs is described in high order two bits of EH
type. Non-removed EH type high order bits could be incorrect for
packet’s payload and use.
Implementation Complexity
An EH insertion domain egress device will have to
look into each and every packet’s EH chain to see
if there is an EH to remove.
This is more complex than using simple packet
Destination Address value match to select either
further simple forwarding or deeper EH
processing.
Postel’s Law or
The Robustness Principle
"Be conservative in what you send, be liberal in what you accept"
Inserted EHs are not expected by RFC 8200 compliant receivers,
as RFC 8200 prohibits them.
Purposely sending them is not being “conservative in what you
send”.
Solution: Encapsulation
Encapsulation is the tried, tested and proven
method used to add new information to existing
PDUs in the Internet architecture.
e.g. TCP encaps application PDU, IP encaps TCP,
Link-Layer encaps IP.
Adding new EH via IPv6 tunnel
encapsulation
RFC 2473, “Generic Packet Tunneling in IPv6 Specification.”
RFC 2473 provides
EH addition attribution, via outer IPv6 packet
Source Address
Correctly working PMTUD as tunnel end-point that
increased packet size is in outer SA.
“IP Tunnels in the Internet Architecture”
draft-ietf-intarea-tunnels
Reducing Tunnelling Overhead
Link-Layer Header IPv6 Header IPv6 Payload
IPv6 Header IPv6 Header IPv6 Payload
Common IPv6 Packet
IPv6-in-IPv6 Packet
Outer IPv6 header is a Link-Layer header in the context of the
inner IPv6 packet.
Coincidence that the Link-Layer header and the IPv6 packet’s
header have the same structure and field semantics.
Use suitable Link-Layer compression on link-layer “payload”
inner IPv6 packet while in flight over tunnel.
Link-Layer payload inner IPv6
packet compression
ROHC:
“The Robust Header Compression (ROHC)
protocol provides an efficient, flexible, and future-
proof header compression concept. It is designed
to operate efficiently and robustly over various link
technologies with different characteristics.”
[RFC5795]
Link-Layer payload inner IPv6
packet compression
Skinny IPv6-in-IPv6 Tunnelling
(draft-smith-skinny-ipv6-in-ipv6-tunnelling):
- Leverages common inner and outer IPv6 header field semantics
to carry many inner header field values in outer header.
- Uses /64s to identify tunnel endpoints, allowing outer header
address IID parts to carry inner packet IID field values.
Thoughts?
Questions?

More Related Content

What's hot

Ipv6 cheat sheet
Ipv6 cheat sheetIpv6 cheat sheet
Ipv6 cheat sheetjulianlz
 
Things I wish I had known about IPv6 before I started
Things I wish I had known about IPv6 before I startedThings I wish I had known about IPv6 before I started
Things I wish I had known about IPv6 before I startedFaelix Ltd
 
Ipv6 1-091110143246-phpapp01
Ipv6 1-091110143246-phpapp01Ipv6 1-091110143246-phpapp01
Ipv6 1-091110143246-phpapp01Rimba Ari
 
Implementation of isp mpls backbone network on i pv6 using 6 pe routers main PPT
Implementation of isp mpls backbone network on i pv6 using 6 pe routers main PPTImplementation of isp mpls backbone network on i pv6 using 6 pe routers main PPT
Implementation of isp mpls backbone network on i pv6 using 6 pe routers main PPTSatish Kumar
 
Cisco presentation2
Cisco presentation2Cisco presentation2
Cisco presentation2ehsan nazer
 
IPv6 Neighbor Discovery Problems (and mitigations)
IPv6 Neighbor Discovery Problems (and mitigations)IPv6 Neighbor Discovery Problems (and mitigations)
IPv6 Neighbor Discovery Problems (and mitigations)Juniper Networks
 
How to configure static nat on cisco routers
How to configure static nat on cisco routersHow to configure static nat on cisco routers
How to configure static nat on cisco routersIT Tech
 
Go with the Flow-v2
Go with the Flow-v2Go with the Flow-v2
Go with the Flow-v2Zobair Khan
 
Moushumi Maria (071464056)
Moushumi Maria (071464056)Moushumi Maria (071464056)
Moushumi Maria (071464056)mashiur
 
Ipv6 cheat sheet
Ipv6 cheat sheetIpv6 cheat sheet
Ipv6 cheat sheetSwarup Hait
 
ISP core routing project
ISP core routing projectISP core routing project
ISP core routing projectvishal sharma
 
IPv6 Transition & Deployment, including IPv6-only in cellular and broadband
IPv6 Transition & Deployment, including IPv6-only in cellular and broadbandIPv6 Transition & Deployment, including IPv6-only in cellular and broadband
IPv6 Transition & Deployment, including IPv6-only in cellular and broadbandAPNIC
 
IPv6 Best Practice
IPv6 Best PracticeIPv6 Best Practice
IPv6 Best Practiceflyingpotato
 
Ipv6 introduction - MUM 2011 presentation
Ipv6 introduction - MUM 2011 presentationIpv6 introduction - MUM 2011 presentation
Ipv6 introduction - MUM 2011 presentationIDEA4PRO
 
NAT (network address translation) & PAT (port address translation)
NAT (network address translation) & PAT (port address translation)NAT (network address translation) & PAT (port address translation)
NAT (network address translation) & PAT (port address translation)Netwax Lab
 

What's hot (20)

NAT Ccna
NAT CcnaNAT Ccna
NAT Ccna
 
Ipv6 cheat sheet
Ipv6 cheat sheetIpv6 cheat sheet
Ipv6 cheat sheet
 
Things I wish I had known about IPv6 before I started
Things I wish I had known about IPv6 before I startedThings I wish I had known about IPv6 before I started
Things I wish I had known about IPv6 before I started
 
Ipv6 1-091110143246-phpapp01
Ipv6 1-091110143246-phpapp01Ipv6 1-091110143246-phpapp01
Ipv6 1-091110143246-phpapp01
 
I Pv6 Nd
I Pv6 NdI Pv6 Nd
I Pv6 Nd
 
Implementation of isp mpls backbone network on i pv6 using 6 pe routers main PPT
Implementation of isp mpls backbone network on i pv6 using 6 pe routers main PPTImplementation of isp mpls backbone network on i pv6 using 6 pe routers main PPT
Implementation of isp mpls backbone network on i pv6 using 6 pe routers main PPT
 
Cisco presentation2
Cisco presentation2Cisco presentation2
Cisco presentation2
 
IPv6 Neighbor Discovery Problems (and mitigations)
IPv6 Neighbor Discovery Problems (and mitigations)IPv6 Neighbor Discovery Problems (and mitigations)
IPv6 Neighbor Discovery Problems (and mitigations)
 
How to configure static nat on cisco routers
How to configure static nat on cisco routersHow to configure static nat on cisco routers
How to configure static nat on cisco routers
 
Go with the Flow-v2
Go with the Flow-v2Go with the Flow-v2
Go with the Flow-v2
 
NAT_Final
NAT_FinalNAT_Final
NAT_Final
 
Moushumi Maria (071464056)
Moushumi Maria (071464056)Moushumi Maria (071464056)
Moushumi Maria (071464056)
 
Ipv6 cheat sheet
Ipv6 cheat sheetIpv6 cheat sheet
Ipv6 cheat sheet
 
ISP core routing project
ISP core routing projectISP core routing project
ISP core routing project
 
IPv6 Transition & Deployment, including IPv6-only in cellular and broadband
IPv6 Transition & Deployment, including IPv6-only in cellular and broadbandIPv6 Transition & Deployment, including IPv6-only in cellular and broadband
IPv6 Transition & Deployment, including IPv6-only in cellular and broadband
 
Introduction to IPv6
Introduction to IPv6Introduction to IPv6
Introduction to IPv6
 
IPv6 Best Practice
IPv6 Best PracticeIPv6 Best Practice
IPv6 Best Practice
 
Ipv6 introduction - MUM 2011 presentation
Ipv6 introduction - MUM 2011 presentationIpv6 introduction - MUM 2011 presentation
Ipv6 introduction - MUM 2011 presentation
 
NAT (network address translation) & PAT (port address translation)
NAT (network address translation) & PAT (port address translation)NAT (network address translation) & PAT (port address translation)
NAT (network address translation) & PAT (port address translation)
 
Ccna 1 5
Ccna 1  5Ccna 1  5
Ccna 1 5
 

Similar to IETF 106 - In-flight IPv6 Extension Header Insertion Considered Harmful

SRWE_Module_14.pptx
SRWE_Module_14.pptxSRWE_Module_14.pptx
SRWE_Module_14.pptxRobinRohit2
 
SRWE_Module_14.pptx
SRWE_Module_14.pptxSRWE_Module_14.pptx
SRWE_Module_14.pptxNguyenNM
 
VNIX-NOG 2021: IPv6 Deployment Update
VNIX-NOG 2021: IPv6 Deployment UpdateVNIX-NOG 2021: IPv6 Deployment Update
VNIX-NOG 2021: IPv6 Deployment UpdateAPNIC
 
Unit 2- Next Generation IP-1.pptx
Unit 2- Next Generation IP-1.pptxUnit 2- Next Generation IP-1.pptx
Unit 2- Next Generation IP-1.pptxDESTROYER39
 
Understanding i pv6 2
Understanding i pv6 2Understanding i pv6 2
Understanding i pv6 2srmanjuskp
 
IPv6 .pdf
IPv6 .pdfIPv6 .pdf
IPv6 .pdfniran10
 
Are we really ready to turn off IPv4?
Are we really ready to turn off IPv4?Are we really ready to turn off IPv4?
Are we really ready to turn off IPv4?APNIC
 
Io t hurdles_i_pv6_slides_doin
Io t hurdles_i_pv6_slides_doinIo t hurdles_i_pv6_slides_doin
Io t hurdles_i_pv6_slides_doinJonny Doin
 
Introduction to Hybrid Information-Centric Networking
Introduction to Hybrid Information-Centric NetworkingIntroduction to Hybrid Information-Centric Networking
Introduction to Hybrid Information-Centric NetworkingLuca Muscariello
 
Internet Protocol Version 6 By Suvo 2002
Internet Protocol Version 6 By Suvo 2002Internet Protocol Version 6 By Suvo 2002
Internet Protocol Version 6 By Suvo 2002suvobgd
 
Iccsit 2010 paper1
Iccsit 2010 paper1Iccsit 2010 paper1
Iccsit 2010 paper1hanums1
 
Iccsit 2010 rljit
Iccsit 2010 rljitIccsit 2010 rljit
Iccsit 2010 rljithanums1
 
AusNOG 2014 - Network Virtualisation: The Killer App for IPv6?
AusNOG 2014 - Network Virtualisation: The Killer App for IPv6?AusNOG 2014 - Network Virtualisation: The Killer App for IPv6?
AusNOG 2014 - Network Virtualisation: The Killer App for IPv6?Mark Smith
 
10 IP VERSION SIX (6) WEEK TEN notes.pptx
10 IP VERSION SIX (6)  WEEK TEN notes.pptx10 IP VERSION SIX (6)  WEEK TEN notes.pptx
10 IP VERSION SIX (6) WEEK TEN notes.pptxJoshuaAnnan5
 

Similar to IETF 106 - In-flight IPv6 Extension Header Insertion Considered Harmful (20)

SRWE_Module_14.pptx
SRWE_Module_14.pptxSRWE_Module_14.pptx
SRWE_Module_14.pptx
 
SRWE_Module_14.pptx
SRWE_Module_14.pptxSRWE_Module_14.pptx
SRWE_Module_14.pptx
 
VNIX-NOG 2021: IPv6 Deployment Update
VNIX-NOG 2021: IPv6 Deployment UpdateVNIX-NOG 2021: IPv6 Deployment Update
VNIX-NOG 2021: IPv6 Deployment Update
 
Unit 2- Next Generation IP-1.pptx
Unit 2- Next Generation IP-1.pptxUnit 2- Next Generation IP-1.pptx
Unit 2- Next Generation IP-1.pptx
 
IPv4.pdf
IPv4.pdfIPv4.pdf
IPv4.pdf
 
Understanding i pv6 2
Understanding i pv6 2Understanding i pv6 2
Understanding i pv6 2
 
IPv6 .pdf
IPv6 .pdfIPv6 .pdf
IPv6 .pdf
 
Are we really ready to turn off IPv4?
Are we really ready to turn off IPv4?Are we really ready to turn off IPv4?
Are we really ready to turn off IPv4?
 
CCNA 1 Chapter 6 v5.0 2014
CCNA 1 Chapter 6 v5.0 2014CCNA 1 Chapter 6 v5.0 2014
CCNA 1 Chapter 6 v5.0 2014
 
i pv6
i pv6i pv6
i pv6
 
Io t hurdles_i_pv6_slides_doin
Io t hurdles_i_pv6_slides_doinIo t hurdles_i_pv6_slides_doin
Io t hurdles_i_pv6_slides_doin
 
Introduction to Hybrid Information-Centric Networking
Introduction to Hybrid Information-Centric NetworkingIntroduction to Hybrid Information-Centric Networking
Introduction to Hybrid Information-Centric Networking
 
3hows
3hows3hows
3hows
 
Ipv6up
Ipv6upIpv6up
Ipv6up
 
Internet Protocol Version 6 By Suvo 2002
Internet Protocol Version 6 By Suvo 2002Internet Protocol Version 6 By Suvo 2002
Internet Protocol Version 6 By Suvo 2002
 
Iccsit 2010 paper1
Iccsit 2010 paper1Iccsit 2010 paper1
Iccsit 2010 paper1
 
Iccsit 2010 rljit
Iccsit 2010 rljitIccsit 2010 rljit
Iccsit 2010 rljit
 
AusNOG 2014 - Network Virtualisation: The Killer App for IPv6?
AusNOG 2014 - Network Virtualisation: The Killer App for IPv6?AusNOG 2014 - Network Virtualisation: The Killer App for IPv6?
AusNOG 2014 - Network Virtualisation: The Killer App for IPv6?
 
IPv6
IPv6IPv6
IPv6
 
10 IP VERSION SIX (6) WEEK TEN notes.pptx
10 IP VERSION SIX (6)  WEEK TEN notes.pptx10 IP VERSION SIX (6)  WEEK TEN notes.pptx
10 IP VERSION SIX (6) WEEK TEN notes.pptx
 

More from Mark Smith

NZNOG 2020 - IETF Highlights for Operators
NZNOG 2020 - IETF Highlights for OperatorsNZNOG 2020 - IETF Highlights for Operators
NZNOG 2020 - IETF Highlights for OperatorsMark Smith
 
NZNOG 2020 - Getting IPv6 Private Addressing Right
NZNOG 2020 - Getting IPv6 Private Addressing RightNZNOG 2020 - Getting IPv6 Private Addressing Right
NZNOG 2020 - Getting IPv6 Private Addressing RightMark Smith
 
NZNOG 2020 - The Trouble With NAT
NZNOG 2020 - The Trouble With NATNZNOG 2020 - The Trouble With NAT
NZNOG 2020 - The Trouble With NATMark Smith
 
IETF 106 - Pikachu Birds of a Feather (BoF)
IETF 106 - Pikachu Birds of a Feather (BoF)IETF 106 - Pikachu Birds of a Feather (BoF)
IETF 106 - Pikachu Birds of a Feather (BoF)Mark Smith
 
IETF 106 - IPv6 Formal Anycast Addresses and Functional Anycast Addresses
IETF 106 - IPv6 Formal Anycast Addresses and Functional Anycast AddressesIETF 106 - IPv6 Formal Anycast Addresses and Functional Anycast Addresses
IETF 106 - IPv6 Formal Anycast Addresses and Functional Anycast AddressesMark Smith
 
IETF 106 - Default IPv6 Local Only Addressing for Non-Internet Devices
IETF 106 - Default IPv6 Local Only Addressing for Non-Internet DevicesIETF 106 - Default IPv6 Local Only Addressing for Non-Internet Devices
IETF 106 - Default IPv6 Local Only Addressing for Non-Internet DevicesMark Smith
 
AusNOG 2019 - Lightning talk - A bit of UX for NEs
AusNOG 2019 - Lightning talk - A bit of UX for NEsAusNOG 2019 - Lightning talk - A bit of UX for NEs
AusNOG 2019 - Lightning talk - A bit of UX for NEsMark Smith
 
AusNOG 2019 - Getting IPv6 Private Addressing Right
AusNOG 2019 - Getting IPv6 Private Addressing RightAusNOG 2019 - Getting IPv6 Private Addressing Right
AusNOG 2019 - Getting IPv6 Private Addressing RightMark Smith
 
AusNOG 2018 - The Robots are Coming!
AusNOG 2018 - The Robots are Coming!AusNOG 2018 - The Robots are Coming!
AusNOG 2018 - The Robots are Coming!Mark Smith
 
AusNOG 2018 - A dirty trick to save a couple of IPv4 addresses on a LAN link.
AusNOG 2018 - A dirty trick to save a couple of IPv4 addresses on a LAN link.AusNOG 2018 - A dirty trick to save a couple of IPv4 addresses on a LAN link.
AusNOG 2018 - A dirty trick to save a couple of IPv4 addresses on a LAN link.Mark Smith
 
I Live Dangerously
I Live DangerouslyI Live Dangerously
I Live DangerouslyMark Smith
 
AusNOG 2016 - The Trouble with NAT
AusNOG 2016 - The Trouble with NATAusNOG 2016 - The Trouble with NAT
AusNOG 2016 - The Trouble with NATMark Smith
 
slides-95-v6ops-0
slides-95-v6ops-0slides-95-v6ops-0
slides-95-v6ops-0Mark Smith
 
slides-85-v6ops-11
slides-85-v6ops-11slides-85-v6ops-11
slides-85-v6ops-11Mark Smith
 
AusNOG 2015 - Some fairly recent IPv6 IETF RFCs, discussions and topics
AusNOG 2015 - Some fairly recent IPv6 IETF RFCs, discussions and topicsAusNOG 2015 - Some fairly recent IPv6 IETF RFCs, discussions and topics
AusNOG 2015 - Some fairly recent IPv6 IETF RFCs, discussions and topicsMark Smith
 
AusNOG 2013 - IPv6 RAs Mostly Necessary
AusNOG 2013 - IPv6 RAs Mostly NecessaryAusNOG 2013 - IPv6 RAs Mostly Necessary
AusNOG 2013 - IPv6 RAs Mostly NecessaryMark Smith
 
AusNOG 2015 - Why you should read RFCs and Internet Drafts (and what you need...
AusNOG 2015 - Why you should read RFCs and Internet Drafts (and what you need...AusNOG 2015 - Why you should read RFCs and Internet Drafts (and what you need...
AusNOG 2015 - Why you should read RFCs and Internet Drafts (and what you need...Mark Smith
 
AusNOG 2013 - The Rapid Rise of the Mobile Multihomed Host, and What it Might...
AusNOG 2013 - The Rapid Rise of the Mobile Multihomed Host, and What it Might...AusNOG 2013 - The Rapid Rise of the Mobile Multihomed Host, and What it Might...
AusNOG 2013 - The Rapid Rise of the Mobile Multihomed Host, and What it Might...Mark Smith
 
AusNOG 2011 - Residential IPv6 CPE - What Not to Do and Other Observations
AusNOG 2011 - Residential IPv6 CPE - What Not to Do and Other ObservationsAusNOG 2011 - Residential IPv6 CPE - What Not to Do and Other Observations
AusNOG 2011 - Residential IPv6 CPE - What Not to Do and Other ObservationsMark Smith
 

More from Mark Smith (19)

NZNOG 2020 - IETF Highlights for Operators
NZNOG 2020 - IETF Highlights for OperatorsNZNOG 2020 - IETF Highlights for Operators
NZNOG 2020 - IETF Highlights for Operators
 
NZNOG 2020 - Getting IPv6 Private Addressing Right
NZNOG 2020 - Getting IPv6 Private Addressing RightNZNOG 2020 - Getting IPv6 Private Addressing Right
NZNOG 2020 - Getting IPv6 Private Addressing Right
 
NZNOG 2020 - The Trouble With NAT
NZNOG 2020 - The Trouble With NATNZNOG 2020 - The Trouble With NAT
NZNOG 2020 - The Trouble With NAT
 
IETF 106 - Pikachu Birds of a Feather (BoF)
IETF 106 - Pikachu Birds of a Feather (BoF)IETF 106 - Pikachu Birds of a Feather (BoF)
IETF 106 - Pikachu Birds of a Feather (BoF)
 
IETF 106 - IPv6 Formal Anycast Addresses and Functional Anycast Addresses
IETF 106 - IPv6 Formal Anycast Addresses and Functional Anycast AddressesIETF 106 - IPv6 Formal Anycast Addresses and Functional Anycast Addresses
IETF 106 - IPv6 Formal Anycast Addresses and Functional Anycast Addresses
 
IETF 106 - Default IPv6 Local Only Addressing for Non-Internet Devices
IETF 106 - Default IPv6 Local Only Addressing for Non-Internet DevicesIETF 106 - Default IPv6 Local Only Addressing for Non-Internet Devices
IETF 106 - Default IPv6 Local Only Addressing for Non-Internet Devices
 
AusNOG 2019 - Lightning talk - A bit of UX for NEs
AusNOG 2019 - Lightning talk - A bit of UX for NEsAusNOG 2019 - Lightning talk - A bit of UX for NEs
AusNOG 2019 - Lightning talk - A bit of UX for NEs
 
AusNOG 2019 - Getting IPv6 Private Addressing Right
AusNOG 2019 - Getting IPv6 Private Addressing RightAusNOG 2019 - Getting IPv6 Private Addressing Right
AusNOG 2019 - Getting IPv6 Private Addressing Right
 
AusNOG 2018 - The Robots are Coming!
AusNOG 2018 - The Robots are Coming!AusNOG 2018 - The Robots are Coming!
AusNOG 2018 - The Robots are Coming!
 
AusNOG 2018 - A dirty trick to save a couple of IPv4 addresses on a LAN link.
AusNOG 2018 - A dirty trick to save a couple of IPv4 addresses on a LAN link.AusNOG 2018 - A dirty trick to save a couple of IPv4 addresses on a LAN link.
AusNOG 2018 - A dirty trick to save a couple of IPv4 addresses on a LAN link.
 
I Live Dangerously
I Live DangerouslyI Live Dangerously
I Live Dangerously
 
AusNOG 2016 - The Trouble with NAT
AusNOG 2016 - The Trouble with NATAusNOG 2016 - The Trouble with NAT
AusNOG 2016 - The Trouble with NAT
 
slides-95-v6ops-0
slides-95-v6ops-0slides-95-v6ops-0
slides-95-v6ops-0
 
slides-85-v6ops-11
slides-85-v6ops-11slides-85-v6ops-11
slides-85-v6ops-11
 
AusNOG 2015 - Some fairly recent IPv6 IETF RFCs, discussions and topics
AusNOG 2015 - Some fairly recent IPv6 IETF RFCs, discussions and topicsAusNOG 2015 - Some fairly recent IPv6 IETF RFCs, discussions and topics
AusNOG 2015 - Some fairly recent IPv6 IETF RFCs, discussions and topics
 
AusNOG 2013 - IPv6 RAs Mostly Necessary
AusNOG 2013 - IPv6 RAs Mostly NecessaryAusNOG 2013 - IPv6 RAs Mostly Necessary
AusNOG 2013 - IPv6 RAs Mostly Necessary
 
AusNOG 2015 - Why you should read RFCs and Internet Drafts (and what you need...
AusNOG 2015 - Why you should read RFCs and Internet Drafts (and what you need...AusNOG 2015 - Why you should read RFCs and Internet Drafts (and what you need...
AusNOG 2015 - Why you should read RFCs and Internet Drafts (and what you need...
 
AusNOG 2013 - The Rapid Rise of the Mobile Multihomed Host, and What it Might...
AusNOG 2013 - The Rapid Rise of the Mobile Multihomed Host, and What it Might...AusNOG 2013 - The Rapid Rise of the Mobile Multihomed Host, and What it Might...
AusNOG 2013 - The Rapid Rise of the Mobile Multihomed Host, and What it Might...
 
AusNOG 2011 - Residential IPv6 CPE - What Not to Do and Other Observations
AusNOG 2011 - Residential IPv6 CPE - What Not to Do and Other ObservationsAusNOG 2011 - Residential IPv6 CPE - What Not to Do and Other Observations
AusNOG 2011 - Residential IPv6 CPE - What Not to Do and Other Observations
 

Recently uploaded

Challengers I Told Ya ShirtChallengers I Told Ya Shirt
Challengers I Told Ya ShirtChallengers I Told Ya ShirtChallengers I Told Ya ShirtChallengers I Told Ya Shirt
Challengers I Told Ya ShirtChallengers I Told Ya Shirtrahman018755
 
AlbaniaDreamin24 - How to easily use an API with Flows
AlbaniaDreamin24 - How to easily use an API with FlowsAlbaniaDreamin24 - How to easily use an API with Flows
AlbaniaDreamin24 - How to easily use an API with FlowsThierry TROUIN ☁
 
Radiant Call girls in Dubai O56338O268 Dubai Call girls
Radiant Call girls in Dubai O56338O268 Dubai Call girlsRadiant Call girls in Dubai O56338O268 Dubai Call girls
Radiant Call girls in Dubai O56338O268 Dubai Call girlsstephieert
 
Russian Call girls in Dubai +971563133746 Dubai Call girls
Russian  Call girls in Dubai +971563133746 Dubai  Call girlsRussian  Call girls in Dubai +971563133746 Dubai  Call girls
Russian Call girls in Dubai +971563133746 Dubai Call girlsstephieert
 
VIP Kolkata Call Girl Dum Dum 👉 8250192130 Available With Room
VIP Kolkata Call Girl Dum Dum 👉 8250192130  Available With RoomVIP Kolkata Call Girl Dum Dum 👉 8250192130  Available With Room
VIP Kolkata Call Girl Dum Dum 👉 8250192130 Available With Roomdivyansh0kumar0
 
Call Girls Dubai Prolapsed O525547819 Call Girls In Dubai Princes$
Call Girls Dubai Prolapsed O525547819 Call Girls In Dubai Princes$Call Girls Dubai Prolapsed O525547819 Call Girls In Dubai Princes$
Call Girls Dubai Prolapsed O525547819 Call Girls In Dubai Princes$kojalkojal131
 
Call Girls In Model Towh Delhi 💯Call Us 🔝8264348440🔝
Call Girls In Model Towh Delhi 💯Call Us 🔝8264348440🔝Call Girls In Model Towh Delhi 💯Call Us 🔝8264348440🔝
Call Girls In Model Towh Delhi 💯Call Us 🔝8264348440🔝soniya singh
 
VIP Kolkata Call Girl Kestopur 👉 8250192130 Available With Room
VIP Kolkata Call Girl Kestopur 👉 8250192130  Available With RoomVIP Kolkata Call Girl Kestopur 👉 8250192130  Available With Room
VIP Kolkata Call Girl Kestopur 👉 8250192130 Available With Roomdivyansh0kumar0
 
Call Girls In Ashram Chowk Delhi 💯Call Us 🔝8264348440🔝
Call Girls In Ashram Chowk Delhi 💯Call Us 🔝8264348440🔝Call Girls In Ashram Chowk Delhi 💯Call Us 🔝8264348440🔝
Call Girls In Ashram Chowk Delhi 💯Call Us 🔝8264348440🔝soniya singh
 
'Future Evolution of the Internet' delivered by Geoff Huston at Everything Op...
'Future Evolution of the Internet' delivered by Geoff Huston at Everything Op...'Future Evolution of the Internet' delivered by Geoff Huston at Everything Op...
'Future Evolution of the Internet' delivered by Geoff Huston at Everything Op...APNIC
 
Gram Darshan PPT cyber rural in villages of india
Gram Darshan PPT cyber rural  in villages of indiaGram Darshan PPT cyber rural  in villages of india
Gram Darshan PPT cyber rural in villages of indiaimessage0108
 
VIP Kolkata Call Girl Alambazar 👉 8250192130 Available With Room
VIP Kolkata Call Girl Alambazar 👉 8250192130  Available With RoomVIP Kolkata Call Girl Alambazar 👉 8250192130  Available With Room
VIP Kolkata Call Girl Alambazar 👉 8250192130 Available With Roomdivyansh0kumar0
 
Call Girls In Defence Colony Delhi 💯Call Us 🔝8264348440🔝
Call Girls In Defence Colony Delhi 💯Call Us 🔝8264348440🔝Call Girls In Defence Colony Delhi 💯Call Us 🔝8264348440🔝
Call Girls In Defence Colony Delhi 💯Call Us 🔝8264348440🔝soniya singh
 
VIP Kolkata Call Girls Salt Lake 8250192130 Available With Room
VIP Kolkata Call Girls Salt Lake 8250192130 Available With RoomVIP Kolkata Call Girls Salt Lake 8250192130 Available With Room
VIP Kolkata Call Girls Salt Lake 8250192130 Available With Roomgirls4nights
 
Chennai Call Girls Porur Phone 🍆 8250192130 👅 celebrity escorts service
Chennai Call Girls Porur Phone 🍆 8250192130 👅 celebrity escorts serviceChennai Call Girls Porur Phone 🍆 8250192130 👅 celebrity escorts service
Chennai Call Girls Porur Phone 🍆 8250192130 👅 celebrity escorts servicesonalikaur4
 
Low Rate Call Girls Kolkata Avani 🤌 8250192130 🚀 Vip Call Girls Kolkata
Low Rate Call Girls Kolkata Avani 🤌  8250192130 🚀 Vip Call Girls KolkataLow Rate Call Girls Kolkata Avani 🤌  8250192130 🚀 Vip Call Girls Kolkata
Low Rate Call Girls Kolkata Avani 🤌 8250192130 🚀 Vip Call Girls Kolkataanamikaraghav4
 
GDG Cloud Southlake 32: Kyle Hettinger: Demystifying the Dark Web
GDG Cloud Southlake 32: Kyle Hettinger: Demystifying the Dark WebGDG Cloud Southlake 32: Kyle Hettinger: Demystifying the Dark Web
GDG Cloud Southlake 32: Kyle Hettinger: Demystifying the Dark WebJames Anderson
 
Best VIP Call Girls Noida Sector 75 Call Me: 8448380779
Best VIP Call Girls Noida Sector 75 Call Me: 8448380779Best VIP Call Girls Noida Sector 75 Call Me: 8448380779
Best VIP Call Girls Noida Sector 75 Call Me: 8448380779Delhi Call girls
 
Call Girls Service Chandigarh Lucky ❤️ 7710465962 Independent Call Girls In C...
Call Girls Service Chandigarh Lucky ❤️ 7710465962 Independent Call Girls In C...Call Girls Service Chandigarh Lucky ❤️ 7710465962 Independent Call Girls In C...
Call Girls Service Chandigarh Lucky ❤️ 7710465962 Independent Call Girls In C...Sheetaleventcompany
 

Recently uploaded (20)

Challengers I Told Ya ShirtChallengers I Told Ya Shirt
Challengers I Told Ya ShirtChallengers I Told Ya ShirtChallengers I Told Ya ShirtChallengers I Told Ya Shirt
Challengers I Told Ya ShirtChallengers I Told Ya Shirt
 
AlbaniaDreamin24 - How to easily use an API with Flows
AlbaniaDreamin24 - How to easily use an API with FlowsAlbaniaDreamin24 - How to easily use an API with Flows
AlbaniaDreamin24 - How to easily use an API with Flows
 
Radiant Call girls in Dubai O56338O268 Dubai Call girls
Radiant Call girls in Dubai O56338O268 Dubai Call girlsRadiant Call girls in Dubai O56338O268 Dubai Call girls
Radiant Call girls in Dubai O56338O268 Dubai Call girls
 
Russian Call girls in Dubai +971563133746 Dubai Call girls
Russian  Call girls in Dubai +971563133746 Dubai  Call girlsRussian  Call girls in Dubai +971563133746 Dubai  Call girls
Russian Call girls in Dubai +971563133746 Dubai Call girls
 
VIP Kolkata Call Girl Dum Dum 👉 8250192130 Available With Room
VIP Kolkata Call Girl Dum Dum 👉 8250192130  Available With RoomVIP Kolkata Call Girl Dum Dum 👉 8250192130  Available With Room
VIP Kolkata Call Girl Dum Dum 👉 8250192130 Available With Room
 
Call Girls Dubai Prolapsed O525547819 Call Girls In Dubai Princes$
Call Girls Dubai Prolapsed O525547819 Call Girls In Dubai Princes$Call Girls Dubai Prolapsed O525547819 Call Girls In Dubai Princes$
Call Girls Dubai Prolapsed O525547819 Call Girls In Dubai Princes$
 
Call Girls In Model Towh Delhi 💯Call Us 🔝8264348440🔝
Call Girls In Model Towh Delhi 💯Call Us 🔝8264348440🔝Call Girls In Model Towh Delhi 💯Call Us 🔝8264348440🔝
Call Girls In Model Towh Delhi 💯Call Us 🔝8264348440🔝
 
VIP Kolkata Call Girl Kestopur 👉 8250192130 Available With Room
VIP Kolkata Call Girl Kestopur 👉 8250192130  Available With RoomVIP Kolkata Call Girl Kestopur 👉 8250192130  Available With Room
VIP Kolkata Call Girl Kestopur 👉 8250192130 Available With Room
 
Rohini Sector 6 Call Girls Delhi 9999965857 @Sabina Saikh No Advance
Rohini Sector 6 Call Girls Delhi 9999965857 @Sabina Saikh No AdvanceRohini Sector 6 Call Girls Delhi 9999965857 @Sabina Saikh No Advance
Rohini Sector 6 Call Girls Delhi 9999965857 @Sabina Saikh No Advance
 
Call Girls In Ashram Chowk Delhi 💯Call Us 🔝8264348440🔝
Call Girls In Ashram Chowk Delhi 💯Call Us 🔝8264348440🔝Call Girls In Ashram Chowk Delhi 💯Call Us 🔝8264348440🔝
Call Girls In Ashram Chowk Delhi 💯Call Us 🔝8264348440🔝
 
'Future Evolution of the Internet' delivered by Geoff Huston at Everything Op...
'Future Evolution of the Internet' delivered by Geoff Huston at Everything Op...'Future Evolution of the Internet' delivered by Geoff Huston at Everything Op...
'Future Evolution of the Internet' delivered by Geoff Huston at Everything Op...
 
Gram Darshan PPT cyber rural in villages of india
Gram Darshan PPT cyber rural  in villages of indiaGram Darshan PPT cyber rural  in villages of india
Gram Darshan PPT cyber rural in villages of india
 
VIP Kolkata Call Girl Alambazar 👉 8250192130 Available With Room
VIP Kolkata Call Girl Alambazar 👉 8250192130  Available With RoomVIP Kolkata Call Girl Alambazar 👉 8250192130  Available With Room
VIP Kolkata Call Girl Alambazar 👉 8250192130 Available With Room
 
Call Girls In Defence Colony Delhi 💯Call Us 🔝8264348440🔝
Call Girls In Defence Colony Delhi 💯Call Us 🔝8264348440🔝Call Girls In Defence Colony Delhi 💯Call Us 🔝8264348440🔝
Call Girls In Defence Colony Delhi 💯Call Us 🔝8264348440🔝
 
VIP Kolkata Call Girls Salt Lake 8250192130 Available With Room
VIP Kolkata Call Girls Salt Lake 8250192130 Available With RoomVIP Kolkata Call Girls Salt Lake 8250192130 Available With Room
VIP Kolkata Call Girls Salt Lake 8250192130 Available With Room
 
Chennai Call Girls Porur Phone 🍆 8250192130 👅 celebrity escorts service
Chennai Call Girls Porur Phone 🍆 8250192130 👅 celebrity escorts serviceChennai Call Girls Porur Phone 🍆 8250192130 👅 celebrity escorts service
Chennai Call Girls Porur Phone 🍆 8250192130 👅 celebrity escorts service
 
Low Rate Call Girls Kolkata Avani 🤌 8250192130 🚀 Vip Call Girls Kolkata
Low Rate Call Girls Kolkata Avani 🤌  8250192130 🚀 Vip Call Girls KolkataLow Rate Call Girls Kolkata Avani 🤌  8250192130 🚀 Vip Call Girls Kolkata
Low Rate Call Girls Kolkata Avani 🤌 8250192130 🚀 Vip Call Girls Kolkata
 
GDG Cloud Southlake 32: Kyle Hettinger: Demystifying the Dark Web
GDG Cloud Southlake 32: Kyle Hettinger: Demystifying the Dark WebGDG Cloud Southlake 32: Kyle Hettinger: Demystifying the Dark Web
GDG Cloud Southlake 32: Kyle Hettinger: Demystifying the Dark Web
 
Best VIP Call Girls Noida Sector 75 Call Me: 8448380779
Best VIP Call Girls Noida Sector 75 Call Me: 8448380779Best VIP Call Girls Noida Sector 75 Call Me: 8448380779
Best VIP Call Girls Noida Sector 75 Call Me: 8448380779
 
Call Girls Service Chandigarh Lucky ❤️ 7710465962 Independent Call Girls In C...
Call Girls Service Chandigarh Lucky ❤️ 7710465962 Independent Call Girls In C...Call Girls Service Chandigarh Lucky ❤️ 7710465962 Independent Call Girls In C...
Call Girls Service Chandigarh Lucky ❤️ 7710465962 Independent Call Girls In C...
 

IETF 106 - In-flight IPv6 Extension Header Insertion Considered Harmful

  • 1. In-Flight IPv6 Extension Header Insertion Considered Harmful draft-smith-6man-in-flight-eh-insertion-harmful IETF-106 Mark Smith markzzzsmith@gmail.com Naveen Kottapalli naveen.sarma@gmail.com Ron Bonica rbonica@juniper.net Fernando Gont fgont@si6networks.com Tom Herbert tom@quantonium.net
  • 2. RFC 1883, RFC 2460 ”Internet Protocol, Version 6 (IPv6) Specification” “With one exception, extension headers are not examined or processed by any node along a packet's delivery path, until the packet reaches the node (or each of the set of nodes, in the case of multicast) identified in the Destination Address field of the IPv6 header.”
  • 3. RFC 1883, RFC 2460 ”Internet Protocol, Version 6 (IPv6) Specification” “The exception referred to in the preceding paragraph is the Hop-by-Hop Options header, which carries information that must be examined and processed by every node along a packet's delivery path, including the source and destination nodes. The Hop-by-Hop Options header, when present, must immediately follow the IPv6 header. Its presence is indicated by the value zero in the Next Header field of the IPv6 header.”
  • 4. RFC 8200 ”Internet Protocol, Version 6 (IPv6) Specification” “Extension headers (except for the Hop-by-Hop Options header) are not processed, inserted, or deleted by any node along a packet's delivery path, until the packet reaches the node (or each of the set of nodes, in the case of multicast) identified in the Destination Address field of the IPv6 header.”
  • 5. RFC 8200 ”Internet Protocol, Version 6 (IPv6) Specification” “The Hop-by-Hop Options header is not inserted or deleted, but may be examined or processed by any node along a packet's delivery path, until the packet reaches the node (or each of the set of nodes, in the case of multicast) identified in the Destination Address field of the IPv6 header. The Hop-by-Hop Options header, when present, must immediately follow the IPv6 header. Its presence is indicated by the value zero in the Next Header field of the IPv6 header.”
  • 6. RFC 8200 Changes Motivations “must be examined and processed by every node along a packet's delivery path” to “may be examined or processed by any node along a packet's delivery path” High speed routers observed ignoring HbH header “must”
  • 7. RFC 8200 Changes Motivations “With one exception, extension headers are not examined or processed by any node along a packet's delivery path, until ...” rephrased to be more explicit: “Extension headers (except for the Hop-by-Hop Options header) are not processed, inserted, or deleted by any node along a packet's delivery path, until ...” “Insertion of IPv6 Segment Routing Headers in a Controlled Domain” draft-voyer-6man-extension-header-insertion
  • 8. (Full) Internet Standard 86 (of 92) 0086 Internet Protocol, Version 6 (IPv6) Specification. S. Deering, R. Hinden. July 2017. (Format: TXT=93658 HTML= bytes) (Obsoletes RFC2460) (Also RFC8200)
  • 9. Internet Draft Purpose “In-Flight IPv6 Extension Header Insertion Considered Harmful” Record reasons and motivation for RFC1883/RFC2460 and RFC 8200 text. Describe IPv6 architecturally compliant solution.
  • 10. Insert Remove SA.A, DA.CSA.A, DA.C P.L. SA.A, DA.C I.EH P.L. SA.A, DA.C I.EH P.L. SA.A, DA.CSA.A, DA.C P.L. Packet Path In-Flight EH Insertion Defined A B C
  • 11. Key Observations Original SA and DA are not modified during insertion/removal. Packets are being modified without attribution - “anonymous modification”. Packet size got larger. Immutable Next Header field got modified.
  • 12. Motivation? Has never been specifically stated in draft-voyer- 6man-extension-header-insertion. A set of 128 bit Segment Routing Segment IDs (SIDs) is definitely going to add significant overhead. Try to save overhead somewhere else instead of having smaller SIDs?
  • 13. Internet Draft Theory “Since the SRH inserted within an intermediate node MUST be removed when all segments within the SRH have been visited, it is not possible to leak the SRH to the destination outside the source domain.” draft-voyer-6man-extension-header-insertion-06, July 2019
  • 14. Actual Network Practice Implementation Bugs Partial Device Failures Device Misconfiguration by Network Operator
  • 15. “Since the SRH inserted within an intermediate node MUST be removed when all segments within the SRH have been visited, ...” This MUST is an aspiration, not an assurance.
  • 16. Single Point of Failure The boundary of the EH insertion domain is likely to be defined by a single level of boundary devices. That means the boundary is possible Single Point of Failure.
  • 17. Failed EH Removal Scenario Src AS Dst AS Anonymous EH insertion Failed EH removal AS1 AS2 AS3 AS4 Internet Path Brokenness occurs here. Who added/ inserted EH that broke my traffic?
  • 19. Ignores Source Address Field Semantics Once the EH is inserted, the packet’s unchanged Source Address field is now not correctly identifying all of the sources of the packet’s contents. Two devices are now responsible for the contents of the packet. One is anonymous. Mechanisms and protocols that rely on using the Source Address, if triggered by the inserted EH, may fail.
  • 20. Breaks ICMPv6 ICMPv6 sends messages back to trigger packet’s Source Address. ICMPv6 message triggered by inserted EH will not be sent to the EH insertion device, as it is not identified in the packet’s Source Address field.
  • 21. Breaks ICMPv6 PMTUD Packet size increase due to inserted EH could trigger PMTUD. ICMPv6 Packet Too Big not sent to EH insertion device, as packet’s SA is not EH insertion device.
  • 22. Breaks IPsec If the inserted EH fails to be removed, it will look like unauthorised packet modification to IPsec.
  • 23. Fault in Subsequent Transit Network If an inserted EH fails to be removed, and the packet travels through a subsequent transit network that is also inserting EHs, the non- removed EH may interfere.
  • 24. Incorrect Destination Host Processing Non-removed EH could cause packet to be discarded when it shouldn’t be e.g. unknown EH skipped over to next EH or UDP/TCP etc. header. Non-removed EH could cause packet to be processed when it should be discarded. Handling of unknown EHs is described in high order two bits of EH type. Non-removed EH type high order bits could be incorrect for packet’s payload and use.
  • 25. Implementation Complexity An EH insertion domain egress device will have to look into each and every packet’s EH chain to see if there is an EH to remove. This is more complex than using simple packet Destination Address value match to select either further simple forwarding or deeper EH processing.
  • 26. Postel’s Law or The Robustness Principle "Be conservative in what you send, be liberal in what you accept" Inserted EHs are not expected by RFC 8200 compliant receivers, as RFC 8200 prohibits them. Purposely sending them is not being “conservative in what you send”.
  • 27. Solution: Encapsulation Encapsulation is the tried, tested and proven method used to add new information to existing PDUs in the Internet architecture. e.g. TCP encaps application PDU, IP encaps TCP, Link-Layer encaps IP.
  • 28. Adding new EH via IPv6 tunnel encapsulation RFC 2473, “Generic Packet Tunneling in IPv6 Specification.”
  • 29. RFC 2473 provides EH addition attribution, via outer IPv6 packet Source Address Correctly working PMTUD as tunnel end-point that increased packet size is in outer SA.
  • 30. “IP Tunnels in the Internet Architecture” draft-ietf-intarea-tunnels
  • 31. Reducing Tunnelling Overhead Link-Layer Header IPv6 Header IPv6 Payload IPv6 Header IPv6 Header IPv6 Payload Common IPv6 Packet IPv6-in-IPv6 Packet Outer IPv6 header is a Link-Layer header in the context of the inner IPv6 packet. Coincidence that the Link-Layer header and the IPv6 packet’s header have the same structure and field semantics. Use suitable Link-Layer compression on link-layer “payload” inner IPv6 packet while in flight over tunnel.
  • 32. Link-Layer payload inner IPv6 packet compression ROHC: “The Robust Header Compression (ROHC) protocol provides an efficient, flexible, and future- proof header compression concept. It is designed to operate efficiently and robustly over various link technologies with different characteristics.” [RFC5795]
  • 33. Link-Layer payload inner IPv6 packet compression Skinny IPv6-in-IPv6 Tunnelling (draft-smith-skinny-ipv6-in-ipv6-tunnelling): - Leverages common inner and outer IPv6 header field semantics to carry many inner header field values in outer header. - Uses /64s to identify tunnel endpoints, allowing outer header address IID parts to carry inner packet IID field values.