<html><body><div style="color:#000; background-color:#fff; font-family:Helvetica Neue-Light, Helvetica Neue Light, Helvetica Neue, Helvetica, Arial, Lucida Grande, Sans-Serif;font-size:16px"><div><span></span></div><br> <div style="font-family: Helvetica Neue-Light, Helvetica Neue Light, Helvetica Neue, Helvetica, Arial, Lucida Grande, Sans-Serif; font-size: 16px;" id="yui_3_16_0_1_1434699235113_26847"> <div style="font-family: HelveticaNeue, Helvetica Neue, Helvetica, Arial, Lucida Grande, Sans-Serif; font-size: 16px;" id="yui_3_16_0_1_1434699235113_26846"> <div dir="ltr" id="yui_3_16_0_1_1434699235113_26845"> <hr size="1"> <font size="2" face="Arial" id="yui_3_16_0_1_1434699235113_26844"> <b><span style="font-weight:bold;">From:</span></b> Enno Rey <erey@ernw.de><br> <b><span style="font-weight: bold;">To:</span></b> Ole Troan <otroan@employees.org> <br><b><span style="font-weight: bold;">Cc:</span></b> v6ops@ietf.org; ipv6-wg@ripe.net <br> <b><span style="font-weight: bold;">Sent:</span></b> Friday, 19 June 2015, 18:34<br> <b><span style="font-weight: bold;">Subject:</span></b> Re: [v6ops] [ipv6-wg] Extension Headers / Impact on Security Devices<br> </font> </div> <div class="y_msg_container" id="yui_3_16_0_1_1434699235113_26848" dir="ltr"><br>Hi,<br clear="none"><br clear="none">On Fri, Jun 19, 2015 at 09:56:20AM +0200, Ole Troan wrote:<br clear="none">> >>>> Tell me this. Would you be happier if the fragmentation rule said that the first fragment had to contain the entire IPv6 header, plus the transport layer header (for ACL support)? I think Fernando would support such a statement (I think I have "heard" him make such a statement).<br clear="none">> >>> <br clear="none">> >>> It would certainly make *me* happier???$,1s&<br clear="none">> >> <br clear="none">> >> done.<br clear="none">> >> RFC7112.<br clear="none">> > <br clear="none">> > As I wrote in another mail,<br clear="none">> > <br clear="none">> >> It may be relevant to ask for RFC 7112 support next time we're doing<br clear="none">> >> an equipment RFQ (in a few years).<br clear="none">> > ...<br clear="none">> >> But until RFC 7112 support is available, I believe we will<br clear="none">> >> see a significant amount of breakage for IPv6 extension headers - and<br clear="none">> >> header chains will be limited to significantly less than 1280 bytes.<br clear="none">> > <br clear="none">> > And until such support is available, we have to deal with the current<br clear="none">> > mess. Which may imply more filtering than some people would like.<br clear="none">> <br clear="none">> I don???t think that follows.<br clear="none"><br clear="none">I would second the observation that this (subsequent action) actually happens.<br clear="none">Not least because many consider it a reasonable approach not to process and/or to drop something that induces complexity & insecurity and which at the same time is not needed by any service or application (read: all EHs except ESP and, maybe in some corner cases, AH+FH).<br clear="none"><br></div><div class="y_msg_container" id="yui_3_16_0_1_1434699235113_26848" dir="ltr">/ I think you're only expressing the view of many security engineers, not the many network engineers or the many more users of networks. At an ISP, if you block traffic your customer wants send, all you get is angry customers. They're paying you to deliver any and all of their packets as well as possible, with as minimum restrictions as possible, ideally none, rather than the opposite. This is why I don't think you'll ever get consensus on deprecating EHs, because I think you're only coming the position of trying to solve problem (3) I described in my last email.</div><div class="y_msg_container" id="yui_3_16_0_1_1434699235113_26848" dir="ltr"><br>/ I'd also observe that deprecating EHs, other than ESP, AH+FH, TCP and UDP, would also prevent them from being used behind the ESP EH - where you won't be able to see what is in them, so you won't be able to care what is in them. You'll also be preventing people from other transport layer protocols, such as SCTP and DCCP, that are feasible to deploy over the IPv6 Internet that couldn't be over the IPv4 network because of IPv4 NAT and other middle boxes.</div><div class="y_msg_container" id="yui_3_16_0_1_1434699235113_26848" dir="ltr"><br></div><div class="y_msg_container" id="yui_3_16_0_1_1434699235113_26848" dir="ltr">thanks<br clear="none"><br clear="none">Enno<br clear="none"><br clear="none"><br clear="none"><br clear="none"><br clear="none">> <br clear="none">> cheers,<br clear="none">> Ole<br clear="none"><br clear="none"><br clear="none"><br clear="none">-- <br clear="none">Enno Rey<br clear="none"><br clear="none">ERNW GmbH - Carl-Bosch-Str. 4 - 69115 Heidelberg - www.ernw.de<br clear="none">Tel. +49 6221 480390 - Fax 6221 419008 - Cell +49 173 6745902 <br clear="none"><br clear="none">Handelsregister Mannheim: HRB 337135<br clear="none">Geschaeftsfuehrer: Enno Rey<br clear="none"><br clear="none">=======================================================<br clear="none">Blog: www.insinuator.net || Conference: www.troopers.de<br clear="none">Twitter: @Enno_Insinuator<div class="qtdSeparateBR"><br><br></div><div class="yqt3090182700" id="yqtfd09262"><br clear="none">=======================================================<br clear="none"><br clear="none">_______________________________________________<br clear="none">v6ops mailing list<br clear="none"><a shape="rect" ymailto="mailto:v6ops@ietf.org" href="mailto:v6ops@ietf.org">v6ops@ietf.org</a><br clear="none"><a shape="rect" href="https://www.ietf.org/mailman/listinfo/v6ops" target="_blank">https://www.ietf.org/mailman/listinfo/v6ops</a><br clear="none"></div><br><br></div> </div> </div> </div></body></html>