ICMPv6 Errors for Discarding Packets Due to Processing Limits
draft-ietf-6man-icmp-limits-08
Revision differences
Document history
Date | Rev. | By | Action |
---|---|---|---|
2024-01-26
|
08 | Gunter Van de Velde | Request closed, assignment withdrawn: Jon Mitchell Last Call OPSDIR review |
2024-01-26
|
08 | Gunter Van de Velde | Closed request for Last Call review by OPSDIR with state 'Overtaken by Events': Cleaning up stale OPSDIR queue |
2020-09-22
|
08 | (System) | RFC Editor state changed to AUTH48-DONE from AUTH48 |
2020-08-12
|
08 | (System) | RFC Editor state changed to AUTH48 from RFC-EDITOR |
2020-04-27
|
08 | (System) | RFC Editor state changed to RFC-EDITOR from EDIT |
2020-04-03
|
08 | Tero Kivinen | Closed request for Last Call review by SECDIR with state 'Overtaken by Events' |
2020-04-03
|
08 | Tero Kivinen | Assignment of request for Last Call review by SECDIR to David Waltermire was marked no-response |
2020-03-26
|
08 | (System) | IANA Action state changed to RFC-Ed-Ack from Waiting on RFC Editor |
2020-03-25
|
08 | (System) | IANA Action state changed to Waiting on RFC Editor from In Progress |
2020-03-25
|
08 | (System) | IANA Action state changed to In Progress from Waiting on Authors |
2020-03-25
|
08 | Suresh Krishnan | Notification list changed to Bob Hinden <bob.hinden@gmail.com>, Erik Kline <ek.ietf@gmail.com> from Bob Hinden <bob.hinden@gmail.com> |
2020-03-25
|
08 | (System) | IANA Action state changed to Waiting on Authors from In Progress |
2020-03-23
|
08 | (System) | RFC Editor state changed to EDIT |
2020-03-23
|
08 | (System) | IESG state changed to RFC Ed Queue from Approved-announcement sent |
2020-03-23
|
08 | (System) | Announcement was received by RFC Editor |
2020-03-23
|
08 | (System) | IANA Action state changed to In Progress |
2020-03-23
|
08 | Cindy Morgan | IESG state changed to Approved-announcement sent from Approved-announcement to be sent |
2020-03-23
|
08 | Cindy Morgan | IESG has approved the document |
2020-03-23
|
08 | Cindy Morgan | Closed "Approve" ballot |
2020-03-23
|
08 | Cindy Morgan | Ballot approval text was generated |
2020-03-23
|
08 | Suresh Krishnan | IESG state changed to Approved-announcement to be sent from IESG Evaluation::AD Followup |
2020-03-23
|
08 | Suresh Krishnan | RFC Editor Note was changed |
2020-03-23
|
08 | Suresh Krishnan | RFC Editor Note for ballot was generated |
2020-03-23
|
08 | Suresh Krishnan | RFC Editor Note for ballot was generated |
2020-03-20
|
08 | Suresh Krishnan | RFC Editor Note for ballot was generated |
2020-03-19
|
08 | Benjamin Kaduk | [Ballot comment] Thanks for addressing my Discuss and Comment points! I suggest to additionally apply Alissa's suggestion in Section 1.1: OLD: … [Ballot comment] Thanks for addressing my Discuss and Comment points! I suggest to additionally apply Alissa's suggestion in Section 1.1: OLD: Per [RFC8200], except for Hop by Hop options, extension headers are not examined or processed by intermediate nodes. Many intermediate nodes, however, do examine extension headers for various purposes. NEW: Per [RFC8200], except for Hop by Hop options, extension headers are not examined or processed by intermediate nodes. However, in deployed networks many intermediate nodes do examine extension headers for various purposes. |
2020-03-19
|
08 | Benjamin Kaduk | [Ballot Position Update] Position for Benjamin Kaduk has been changed to No Objection from Discuss |
2020-03-19
|
08 | Alissa Cooper | [Ballot Position Update] Position for Alissa Cooper has been changed to No Objection from Discuss |
2020-03-18
|
08 | (System) | Sub state has been changed to AD Followup from Revised ID Needed |
2020-03-18
|
08 | (System) | IANA Review state changed to Version Changed - Review Needed from IANA OK - Actions Needed |
2020-03-18
|
08 | Tom Herbert | New version available: draft-ietf-6man-icmp-limits-08.txt |
2020-03-18
|
08 | (System) | New version approved |
2020-03-18
|
08 | (System) | Request for posting confirmation emailed to previous authors: Tom Herbert |
2020-03-18
|
08 | Tom Herbert | Uploaded new revision |
2020-03-12
|
07 | Cindy Morgan | Telechat date has been changed to 2020-03-19 from 2020-03-12 |
2020-03-12
|
07 | Cindy Morgan | IESG state changed to IESG Evaluation::Revised I-D Needed from IESG Evaluation |
2020-03-12
|
07 | Martin Vigoureux | [Ballot comment] Hi, thank you for this document I'm only reporting nits I found here and there: s/specification is provide/specification is to provide/ s/may used/may … [Ballot comment] Hi, thank you for this document I'm only reporting nits I found here and there: s/specification is provide/specification is to provide/ s/may used/may be used/ |
2020-03-12
|
07 | Martin Vigoureux | [Ballot Position Update] New position, No Objection, has been recorded for Martin Vigoureux |
2020-03-12
|
07 | Magnus Westerlund | [Ballot comment] One nit, at the top of page 5: s/applicably/applicability I also urge that the document is updated prior to approval to address Bernard's … [Ballot comment] One nit, at the top of page 5: s/applicably/applicability I also urge that the document is updated prior to approval to address Bernard's TSVART review comment. |
2020-03-12
|
07 | Magnus Westerlund | Ballot comment text updated for Magnus Westerlund |
2020-03-12
|
07 | Magnus Westerlund | [Ballot comment] One nit, at the top of page 5: s/applicably/applicability |
2020-03-12
|
07 | Magnus Westerlund | Ballot comment text updated for Magnus Westerlund |
2020-03-12
|
07 | Magnus Westerlund | [Ballot Position Update] New position, No Objection, has been recorded for Magnus Westerlund |
2020-03-11
|
07 | Adam Roach | [Ballot Position Update] New position, No Objection, has been recorded for Adam Roach |
2020-03-11
|
07 | Amanda Baber | IANA Review state changed to IANA OK - Actions Needed from IANA - Not OK |
2020-03-11
|
07 | Alexey Melnikov | [Ballot comment] I only did a very quick scan and I have no objection. I am trusting my co-AD Barry with his review. |
2020-03-11
|
07 | Alexey Melnikov | [Ballot Position Update] New position, No Objection, has been recorded for Alexey Melnikov |
2020-03-11
|
07 | Deborah Brungard | [Ballot comment] Agree with other comments. Similar to Alvaro, it would help to clarify "application" in section 4.2. |
2020-03-11
|
07 | Deborah Brungard | [Ballot Position Update] New position, No Objection, has been recorded for Deborah Brungard |
2020-03-10
|
07 | Mirja Kühlewind | [Ballot comment] Question(s): In section 1 you say " New ICMPv6 code points are defined as an update to [RFC4443]." Should this document … [Ballot comment] Question(s): In section 1 you say " New ICMPv6 code points are defined as an update to [RFC4443]." Should this document actually update RFC4443? And in section 2.2 you have: " [RFC8200] specifies that a destination host should send an "unrecognized next header type" when a Next Header value is unrecognized in a packet. This document extends this to allow intermediate nodes to send this same error for a packet that is discarded because the node does not recognize a Next Header type." Does this document also update RFC8200? Comment(s): Editorial in Sec 5.3.1: " * Increasing prevalence of deep packet inspection in middleboxes. In particular, many intermediate nodes now parse network layer encapsulation protocols or transport layer protocols." This sounds like DPI is a reason for longer headers but I think you only mean DPI is a reason for in-network processing. Maybe you can clarify this! Also I agree with Roman's points and the TSV-ART feedback (Thanks Bernard!) that the security considerations section could be a bit more extensive and a mentioning of PMTU discovery would be good as well. I saw that there was a reply by the author to the TSV-ART review on March 5 but no updates submitted yet. |
2020-03-10
|
07 | Mirja Kühlewind | [Ballot Position Update] New position, No Objection, has been recorded for Mirja Kühlewind |
2020-03-09
|
07 | Benjamin Kaduk | [Ballot discuss] I recognize that this document is trying to take the track of "we recognize that some implementations/deployments violate RFC 8200, and while … [Ballot discuss] I recognize that this document is trying to take the track of "we recognize that some implementations/deployments violate RFC 8200, and while we don't condone that behavior, we want to provide diagnostics to try to mitigate the fallout from them", but I'm not sure it succeeds in all cases. The discussion in Section 5.1 that is quite clear about "does not advocate behaviors that might be considered nonconformant", but there is another usage in Section 2.2 ("[t]his code SHOULD be sent by an intermediate node that discards a packet because it encounters a Next Header type that is unknown in its examination") that seems worth revisiting. Perhaps we can reword to be more clear that this is the recommended behavior subject to the predicate that an RFC 8200 violation has occurred, which is not itself a recommended behavior. In light of the updated usage described in Section 2.2, should we direct IANA to make the "Reference" column for the "unrecognized Next Header type encountered" parameter problem list both this document and RFC 4443? (It currently does not list any reference, as is the case for many entries on the containing page...) This codepoint is not currently mentioned in the IANA Considerations at all |
2020-03-09
|
07 | Benjamin Kaduk | [Ballot comment] I agree with Alissa's COMMENT. The [IANA-ICMPV6] reference is used as reference for both the "parameter problem" and the "destination unreachable" codes, but … [Ballot comment] I agree with Alissa's COMMENT. The [IANA-ICMPV6] reference is used as reference for both the "parameter problem" and the "destination unreachable" codes, but the link points specifically to the "destination unreachable" table at present. (My understanding is that IANA likes the URL fragment to be stripped from the final RFC, in which case the distinction becomes moot.) Can you help me walk through the various places where we discuss the cardinality of new registered values, to ensure that we're internally consistent? The Abstract just says "several new ICMPv6 errors", nice and vague; clearly fine. Section 1 says "five of the errors are specific to processing of extension headers; another error is used when [...]". Are the "five" the five "parameter problem" codepoints that we list, or the four new "parameter problem" codepoints plus the one new "destination unreachable" codepoint? If the former, we are calling "unrecognized next header type" a "new ICMPv6 code point", which is not exactly true. Section 1.1 says "four parameter problem codes and extends the applicability of an existing code". It seems pretty clear that the four are the new ones and the one is "unrecognized next header", so this is fine. Section 1.2 talks about the one "destination unreachable" code; which seems okay on its own. Maybe we want to check for parallelism in how, e.g., Section 1's high-level overview discusses it vs. the other allocations. There doesn't seem to be an introduction subsection that mentions the extended object class and subtype used for aggregate header limits, which might be useful to have. Section 1 limits. New ICMPv6 code points are defined as an update to [RFC4443]. I suggest phrasing this as "to supplement those defined in [RFC4443]" since we're just allocating from a registry and are not marking this document with an "Updates: 4443" header. Section 1.3 Please use the BCP 14 boilerplate from RFC 8174. Section 2.1 The pointer will point beyond the end of the ICMPv6 packet if the field having a problem is beyond what can fit in the maximum size of an ICMPv6 error message. I understand that we're just reusing the RFC 4443 format for "parameter problem" messages, but I'd suggest adding a note that recipients should/MUST sanity-check the pointer value [perhaps with specifics]. Section 2.2 This code SHOULD be sent by an intermediate node that discards a packet because it encounters a Next Header type that is unknown in its examination. The ICMPv6 Pointer field is set to the offset of the To what extent is this diverging from the RFC 8200 dictum that extension headers not be examined or processed by intermediate nodes? Note that when the original sender receives the ICMPv6 error it can differentiate between the message being sent by a destination host, per [RFC4443], and an error sent by an intermediate host based on matching the source address of the ICMPv6 packet and the destination address of the packet in the ICMPv6 data. This is, of course, true only in the face of honest participants; there is no cryptographic protection on ICMP packets so spoofing is trivial, potentially even from off path(?). (As RFC 4443 notes, IPsec AH helps.) Section 2.4 There are two different limits that might be applied: a limit on the total size in octets of the header chain, and a limit on the number of extension headers in the chain. This error code is used in both cases. In the case that the size limit is exceeded, the ICMPv6 Pointer is set to first octet beyond the limit. In the case that the number of extension headers is exceeded, the ICMPv6 Pointer is set to the offset of first octet of the first extension header that is beyond the limit. Do we want to mention the potential ambiguity when the size limit happens to align with the first octet of an extension header? Section 2.6 * The length of a PADN options in destination options or hop-by- hop options is limited seven octets [RFC8504]. nit: some singular/plural mismatch here, and probably "limited to". Section 4.1 I appreciate the thought that went into the priority of reporting list; thanks for it! Section 6 It's probably worth reiterating that applications that change their behavior in response to unauthenticated ICMP messages without proper message validation are susceptible to an attacker in the network forcing them into a certain configuration. When such a configuration is a vulnerable one, that is an easy way for the attacker to escalate an attack. What does it mean for something to "conceptually be exploited for denial of service attack"? I see that RFC 4443 recommends that upper layers receiving ICMP messages "perform some form of validation" upon them, but a brief read does not seem to find it suggesting that, say, application-level traffic and ACKs continuing to flow are an indication that ICMP messages indicating failure to deliver packets are inaccurate; is that worth revisiting? Section 9.1 RFC 7045 is referenced only once, and in a capacity that appears solely informative. Section 9.2 On the other hand, RFC 4890 is the target of an allegedly normative "MAY" (which may, in fact, more properly be written as a descriptive "may"), which would normally require it to be listed in the normative references section. |
2020-03-09
|
07 | Benjamin Kaduk | [Ballot Position Update] New position, Discuss, has been recorded for Benjamin Kaduk |
2020-03-09
|
07 | Roman Danyliw | [Ballot comment] ** Section 2.1. As discussed in response to Bernard Aboba’s TSVART feedback on “The pointer will point beyond the end of the ICMPv6 … [Ballot comment] ** Section 2.1. As discussed in response to Bernard Aboba’s TSVART feedback on “The pointer will point beyond the end of the ICMPv6 packet if the field having a problem is beyond what can fit in the maximum size of an ICMPv6 error message.” please add caution about not de-referencing this pointer. The same caution applies to Section 3.1. ** Section 5.2. Duplicate word. s/to to/to/ ** Section 6. Per “In some circumstances, the sending of ICMP errors might conceptually be exploited for denial of service attack or as a means to covertly deduce processing capabilities of nodes”, one could conceivably conduct various active fingerprinting to determine more than just processing capabilities of nodes (say, device or OS identification) and perhaps also infer the middleboxes fielded in-path too. |
2020-03-09
|
07 | Roman Danyliw | [Ballot Position Update] New position, No Objection, has been recorded for Roman Danyliw |
2020-03-09
|
07 | Alissa Cooper | [Ballot discuss] The intended status needs to be changed to Proposed Standard before approval. |
2020-03-09
|
07 | Alissa Cooper | [Ballot comment] Please incorporate the edits from the Gen-ART review. == Section 1.1 == "Per [RFC8200], except for Hop by Hop options, extension … [Ballot comment] Please incorporate the edits from the Gen-ART review. == Section 1.1 == "Per [RFC8200], except for Hop by Hop options, extension headers are not examined or processed by intermediate nodes. Many intermediate nodes, however, do examine extension header for various purposes." This is slightly confusing. I think it would be better to say: "Per [RFC8200], except for Hop by Hop options, extension headers are not examined or processed by intermediate nodes. However, in deployed networks many intermediate nodes do examine extension headers for various purposes." |
2020-03-09
|
07 | Alissa Cooper | [Ballot Position Update] New position, Discuss, has been recorded for Alissa Cooper |
2020-03-09
|
07 | Alvaro Retana | [Ballot comment] (1) There are a couple of normative statements that left me wanting more details. For the cases below, I have these questions (to … [Ballot comment] (1) There are a couple of normative statements that left me wanting more details. For the cases below, I have these questions (to start with): Are there more details on how this is done? Are the actions implementation dependent? Should these sentences even use rfc2119 keywords? How can they be normatively enforced? - §4.2: "The packet in the ICMP data SHOULD be validated to match the upper layer process or connection that generated the original packet." What if the validation fails? - §4.2: "A host MAY modify its usage of protocol headers in subsequent packets to avoid repeated occurrences of the same error." - §4.2: "A host system SHOULD take appropriate action if it is creating packets with extension headers on behalf of the application." What is an "appropriate action"? (2) §4.2: "An error SHOULD be reported to an application if the application enabled extension headers for its traffic." What is an application in the context of this document? I ask because traditional applications (email, video) are probably not aware of the use (or not) of extensions headers in their traffic -- but others (segment routing, for example) probably are. (3) §5.1: "...this specification RECOMMENDS the sending of ICMP errors even in cases where a node might be discarding packets per a nonconformant behavior." Recommending conformance when nonconformant behavior already exists sounds a little naïve to me. It seems to me that using a lower case "RECOMMENDS" (BTW, the actual keyword is "RECOMMENDED".) would achieve the same thing. (4) §6: "The ICMP errors described in this document MAY be filtered by firewalls in accordance with [RFC4890]." s/MAY/may In this case the text is just making a statement of fact. (5) Consider moving §5 closer to the beginning of the document. Maybe it makes more sense there. |
2020-03-09
|
07 | Alvaro Retana | [Ballot Position Update] New position, No Objection, has been recorded for Alvaro Retana |
2020-03-08
|
07 | Barry Leiba | [Ballot comment] The correct intended status in the header is “Proposed Standard”. — Abstract — Network nodes may discard packets if they are unable … [Ballot comment] The correct intended status in the header is “Proposed Standard”. — Abstract — Network nodes may discard packets if they are unable to process protocol headers of packets due to processing constraints or limits. May they discard packets if they are unable to process protocol headers of *other* packets? Or are you talking about the protocol headers of the packets being discarded? The latter, yes? So, “if they are unable to process those packets’ protocol headers” (or “of those packets”). When such packets are dropped, the sender receives no indication so it cannot take action to address the cause of discarded packets. This sounds like the reason it receives no indication is to prevent it from taking action. I would say, “receives no indication, thus it cannot”. — Section 1 — New ICMPv6 code points are defined as an update to [RFC4443]. The document header does not say that this “updates” 4443. Do you maybe mean “as an extension to RFC4443”? — Section 1.1 — RFC 8200 does not capitalize “extension header” nor “upper-layer header”; is there a reason you do in this document? Shouldn’t this be consistent with 8200? — Section 1.3 — Éric already got this: Please use the new BCP 14 boilerplate and add a normative reference to RFC8174. — Section 3.2 — This error is sent in response to a node dropping a packet because the aggregate header chain exceeds the processing limits of a node. I’m confused, so maybe I just am not understanding: this says that Destination Unreachable / headers too long is sent *not* by the note that dropped the packet, but *in response* to that node? What an I missing? Should this maybe say this instead?: NEW This error response is sent when a node drops a packet because the aggregate header chain exceeds the processing limits of the node. END |
2020-03-08
|
07 | Barry Leiba | [Ballot Position Update] New position, No Objection, has been recorded for Barry Leiba |
2020-03-06
|
07 | Éric Vyncke | [Ballot comment] Tom, Thank you for the work put into this document. It is short and easy to read while addressing a real problem in … [Ballot comment] Tom, Thank you for the work put into this document. It is short and easy to read while addressing a real problem in real deployments. ******************** * I was about to add a DISCUSS for not using the right BCP14 RFC 8174 template but please FIX this * (as this is the first review, I would suggest to issue today a revised I-D with just this fix * before other IESG reviews). * * I was also about to ballot a DISCUSS on the comment in section 2.4... ******************* Please find below some non-blocking COMMENTs and NITs. An answer will be appreciated. I hope that this helps to improve the document, Regards, -éric == COMMENTS == -- Section 1.2 -- Just wondering why the "aggregate header limits" has a section on its own. Feel free to keep it like it is but this looks weird. -- Section 2 -- Strongly suggest to use TBA1, TBA2, ... in order to avoid mistakes done by the IANA. -- Section 2.2 -- Why not using a new code for 'unrecognized header' by intermediate node ? I really wonder why: it can only be confusing to existing implementation. Please also ensure what is meant by 'destination' here... I would prefer to avoid discussions when a routing-header is used (too many discussions around this in 6MAN already) -- Section 2.4 -- How can the original source distinguish among the two potential causes ? Why not using two code points? Or am I missing something obvious? I was really about to issue a blocking DISCUSS on this one. -- Section 3 -- Some justifications on why using a different ICMPv6 format would really help the reader. -- Section 4.1 -- The wording "1) Real error (existing codes)" looks weird because the code points in this documents will also be existing. Why not using "1) RFC 4443 error codes" ? -- Section 5.2 -- Is applicable to RFC 4443 in general, so, I wonder why it is in this document. == NITS == -- Section 1.1 -- If I was picky, then I would argue that "Extension Headers are placed between the IPv6 header and the Upper-Layer Header in a packet" is not always true: if Next-Header is 59 (No Next Header per RFC 8200 section 4.7) ;-) -- Section 2.1 + 3.1-- s/IPv6 Fields:/IPv6 Header Fields:/ |
2020-03-06
|
07 | Éric Vyncke | [Ballot Position Update] New position, No Objection, has been recorded for Éric Vyncke |
2020-03-05
|
07 | Cindy Morgan | Placed on agenda for telechat - 2020-03-12 |
2020-03-05
|
07 | Suresh Krishnan | IESG state changed to IESG Evaluation from Waiting for Writeup |
2020-03-05
|
07 | Suresh Krishnan | Ballot has been issued |
2020-03-05
|
07 | Suresh Krishnan | [Ballot Position Update] New position, Yes, has been recorded for Suresh Krishnan |
2020-03-05
|
07 | Suresh Krishnan | Created "Approve" ballot |
2020-03-05
|
07 | Suresh Krishnan | Ballot writeup was changed |
2020-02-25
|
07 | (System) | IESG state changed to Waiting for Writeup from In Last Call |
2020-02-21
|
07 | (System) | IANA Review state changed to IANA - Not OK from IANA - Review Needed |
2020-02-21
|
07 | Sabrina Tanamal | (Via drafts-lastcall@iana.org): IESG/Authors/WG Chairs: The IANA Functions Operator has completed its review of draft-ietf-6man-icmp-limits-07. If any part of this review is inaccurate, please let … (Via drafts-lastcall@iana.org): IESG/Authors/WG Chairs: The IANA Functions Operator has completed its review of draft-ietf-6man-icmp-limits-07. If any part of this review is inaccurate, please let us know. The IANA Functions Operator understands that, upon approval of this document, there are three actions which we must complete. First, in the Type 4 - Parameter Problem subregistry of the ICMPv6 "Code" Fields registry on the Internet Control Message Protocol version 6 (ICMPv6) Parameters registry page located at: https://www.iana.org/assignments/icmpv6-parameters/ four new registrations are to be made as follows: Code: [ TBD-at-Registration ] Name: Extension header too big Reference: [ RFC-to-be ] Code: [ TBD-at-Registration ] Name: Extension header chain too long Reference: [ RFC-to-be ] Code: [ TBD-at-Registration ] Name: Too many options in extension header Reference: [ RFC-to-be ] Code: [ TBD-at-Registration ] Name: Option too big Reference: [ RFC-to-be ] Second, in the Type 1 - Destination Unreachable sub-registry of the ICMPv6 "Code" Fields registry on the Internet Control Message Protocol version 6 (ICMPv6) Parameters registry page located at: https://www.iana.org/assignments/icmpv6-parameters/ a single registration is to be made as follows: Code: [ TBD-at-Registration ] Name: Headers too long Reference: [ RFC-to-be ] Third, in the ICMP Extension Object Classes and Class Sub-types registry on the Internet Control Message Protocol (ICMP) Parameters registry page located at: https://www.iana.org/assignments/icmp-parameters/ a single, new registration is to be made as follows: Class Value: [ TBD-at-Registration ] Class Name: Extended information Reference: [ RFC-to-be ] Fourth, a new sub-registry is to be created in the ICMP Extension Object Classes and Class Sub-types registry on the Internet Control Message Protocol (ICMP) Parameters registry page located at: https://www.iana.org/assignments/icmp-parameters/ The new registry will be named Sub-types -- Class [ TBD-at-Registration ] - Extended information - where [ TBD-at-Registration ] is set to be the same as the value used in action three above. IANA Question --> what is the registration procedure for this new sub-registry? RFC 4884 says that the registration procedure has to be named in the document. There is a single, new registration in the new sub-registry as follows: C-Type (Value): [ TBD-at-Registration ] Description: Pointer Reference: [ RFC-to-be ] The IANA Functions Operator understands that these are the only actions required to be completed upon approval of this document. Note: The actions requested in this document will not be completed until the document has been approved for publication as an RFC. This message is meant only to confirm the list of actions that will be performed. Thank you, Sabrina Tanamal Senior IANA Services Specialist |
2020-02-18
|
07 | Gunter Van de Velde | Request for Last Call review by OPSDIR is assigned to Jon Mitchell |
2020-02-18
|
07 | Gunter Van de Velde | Request for Last Call review by OPSDIR is assigned to Jon Mitchell |
2020-02-18
|
07 | Bernard Aboba | Request for Last Call review by TSVART Completed: Ready with Issues. Reviewer: Bernard Aboba. Sent review to list. |
2020-02-17
|
07 | Pete Resnick | Request for Last Call review by GENART Completed: Ready with Nits. Reviewer: Pete Resnick. Sent review to list. |
2020-02-17
|
07 | Wesley Eddy | Request for Last Call review by TSVART is assigned to Bernard Aboba |
2020-02-17
|
07 | Wesley Eddy | Request for Last Call review by TSVART is assigned to Bernard Aboba |
2020-02-13
|
07 | Jean Mahoney | Request for Last Call review by GENART is assigned to Pete Resnick |
2020-02-13
|
07 | Jean Mahoney | Request for Last Call review by GENART is assigned to Pete Resnick |
2020-02-13
|
07 | Tero Kivinen | Request for Last Call review by SECDIR is assigned to David Waltermire |
2020-02-13
|
07 | Tero Kivinen | Request for Last Call review by SECDIR is assigned to David Waltermire |
2020-02-11
|
07 | Cindy Morgan | IANA Review state changed to IANA - Review Needed |
2020-02-11
|
07 | Cindy Morgan | The following Last Call announcement was sent out (ends 2020-02-25): From: The IESG To: IETF-Announce CC: draft-ietf-6man-icmp-limits@ietf.org, ipv6@ietf.org, bob.hinden@gmail.com, Bob Hinden , … The following Last Call announcement was sent out (ends 2020-02-25): From: The IESG To: IETF-Announce CC: draft-ietf-6man-icmp-limits@ietf.org, ipv6@ietf.org, bob.hinden@gmail.com, Bob Hinden , suresh@kaloom.com, 6man-chairs@ietf.org Reply-To: last-call@ietf.org Sender: Subject: Last Call: (ICMPv6 errors for discarding packets due to processing limits) to Proposed Standard The IESG has received a request from the IPv6 Maintenance WG (6man) to consider the following document: - 'ICMPv6 errors for discarding packets due to processing limits' as Proposed Standard The IESG plans to make a decision in the next few weeks, and solicits final comments on this action. Please send substantive comments to the last-call@ietf.org mailing lists by 2020-02-25. Exceptionally, comments may be sent to iesg@ietf.org instead. In either case, please retain the beginning of the Subject line to allow automated sorting. Abstract Network nodes may discard packets if they are unable to process protocol headers of packets due to processing constraints or limits. When such packets are dropped, the sender receives no indication so it cannot take action to address the cause of discarded packets. This specification defines several new ICMPv6 errors that can be sent by a node that discards packets because it is unable to process the protocol headers. A node that receives such an ICMPv6 error may be able to modify what it sends in future packets to avoid subsequent packet discards. The file can be obtained via https://datatracker.ietf.org/doc/draft-ietf-6man-icmp-limits/ IESG discussion can be tracked via https://datatracker.ietf.org/doc/draft-ietf-6man-icmp-limits/ballot/ No IPR declarations have been submitted directly on this I-D. |
2020-02-11
|
07 | Cindy Morgan | IESG state changed to In Last Call from Last Call Requested |
2020-02-11
|
07 | Suresh Krishnan | Last call was requested |
2020-02-11
|
07 | Suresh Krishnan | Last call announcement was generated |
2020-02-11
|
07 | Suresh Krishnan | Ballot approval text was generated |
2020-02-11
|
07 | Suresh Krishnan | Ballot writeup was generated |
2020-02-11
|
07 | Suresh Krishnan | IESG state changed to Last Call Requested from AD Evaluation |
2019-10-25
|
07 | Suresh Krishnan | IESG state changed to AD Evaluation from Publication Requested |
2019-09-30
|
07 | Bob Hinden | Title : ICMPv6 errors for discarding packets due to processing limits Author : Tom Herbert Filename … Title : ICMPv6 errors for discarding packets due to processing limits Author : Tom Herbert Filename : draft-ietf-6man-icmp-limits-06.txt Pages : 16 Date : 2019-09-24 (1) What type of RFC is being requested (BCP, Proposed Standard, Internet Standard, Informational, Experimental, or Historic)? Why is this the proper type of RFC? Is this type of RFC indicated in the title page header? Standards track RFC, Proposed Standard. It is creating new code points for ICMPv6, this is the correct status. It is noted in the header. (2) The IESG approval announcement includes a Document Announcement Write-Up. Please provide such a Document Announcement Write-Up. Recent examples can be found in the "Action" announcements for approved documents. The approval announcement contains the following sections: Technical Summary: Relevant content can frequently be found in the abstract and/or introduction of the document. If not, this may be an indication that there are deficiencies in the abstract or introduction. Abstract Network nodes may discard packets if they are unable to process protocol headers of packets due to processing constraints or limits. When such packets are dropped, the sender receives no indication so it cannot take action to address the cause of discarded packets. This specification defines several new ICMPv6 errors that can be sent by a node that discards packets because it is unable to process the protocol headers. A node that receives such an ICMPv6 error may be able to modify what it sends in future packets to avoid subsequent packet discards. Working Group Summary: Was there anything in WG process that is worth noting? For example, was there controversy about particular points or were there decisions where the consensus was particularly rough? This document had good w.g. review, was discussed at several face to face 6man sessions and on the list. The chairs also did individual reviews. This found one important issue with the use of RFC4884. This is fixed in the current draft. Document Quality: Are there existing implementations of the protocol? Have a significant number of vendors indicated their plan to implement the specification? Are there any reviewers that merit special mention as having done a thorough review, e.g., one that resulted in important changes or a conclusion that the document had no substantive issues? If there was a MIB Doctor, Media Type or other expert review, what was its course (briefly)? In the case of a Media Type review, on what date was the request posted? No known implementations. Difficult to implement until the IANA code points have been assigned. Issues raised in reviews have been resolved in current draft. Personnel: Who is the Document Shepherd? Who is the Responsible Area Director? Document Shepherd: Bob Hinden Area Director: Suresh Krishnan (3) Briefly describe the review of this document that was performed by the Document Shepherd. If this version of the document is not ready for publication, please explain why the document is being forwarded to the IESG. Document Shepard did a review of the document that raised issues in two areas, how the IANA assignments were described, and the use of RFC4884 was being used. These issue have been fixed in the current draft. Document is ready to advance. (4) Does the document Shepherd have any concerns about the depth or breadth of the reviews that have been performed? No. (5) Do portions of the document need review from a particular or from broader perspective, e.g., security, operational complexity, AAA, DNS, DHCP, XML, or internationalization? If so, describe the review that took place. No. The document is creating new ICMPv6 code points. No new issues created. (6) Describe any specific concerns or issues that the Document Shepherd has with this document that the Responsible Area Director and/or the IESG should be aware of? For example, perhaps he or she is uncomfortable with certain parts of the document, or has concerns whether there really is a need for it. In any event, if the WG has discussed those issues and has indicated that it still wishes to advance the document, detail those concerns here. No issues to raise. (7) Has each author confirmed that any and all appropriate IPR disclosures required for full conformance with the provisions of BCP 78 and BCP 79 have already been filed. If not, explain why? The author has confirmed this. (8) Has an IPR disclosure been filed that references this document? If so, summarize any WG discussion and conclusion regarding the IPR disclosures. No IPR disclosures. (9) How solid is the WG consensus behind this document? Does it represent the strong concurrence of a few individuals, with others being silent, or does the WG as a whole understand and agree with it? Strong w.g. consensus. (10) Has anyone threatened an appeal or otherwise indicated extreme discontent? If so, please summarise the areas of conflict in separate email messages to the Responsible Area Director. (It should be in a separate email because this questionnaire is publicly available.) No. (11) Identify any ID nits the Document Shepherd has found in this document. (See http://www.ietf.org/tools/idnits/ and the Internet-Drafts Checklist). Boilerplate checks are not enough; this check needs to be thorough. There were issues in the previous version, author did an update, now IDnits is clear. (12) Describe how the document meets any required formal review criteria, such as the MIB Doctor, media type, and URI type reviews. N/A (13) Have all references within this document been identified as either normative or informative? Yes (14) Are there normative references to documents that are not ready for advancement or are otherwise in an unclear state? If such normative references exist, what is the plan for their completion? All normative references are RFCs or IANA assignments. (15) Are there downward normative references references (see RFC 3967)? If so, list these downward references to support the Area Director in the Last Call procedure. No. (16) Will publication of this document change the status of any existing RFCs? Are those RFCs listed on the title page header, listed in the abstract, and discussed in the introduction? If the RFCs are not listed in the Abstract and Introduction, explain why, and point to the part of the document where the relationship of this document to the other RFCs is discussed. If this information is not in the document, explain why the WG considers it unnecessary. No changes to other RFCs. (17) Describe the Document Shepherd's review of the IANA considerations section, especially with regard to its consistency with the body of the document. Confirm that all protocol extensions that the document makes are associated with the appropriate reservations in IANA registries. Confirm that any referenced IANA registries have been clearly identified. Confirm that newly created IANA registries include a detailed specification of the initial contents for the registry, that allocations procedures for future registrations are defined, and a reasonable name for the new registry has been suggested (see RFC 8126). The document shepherd found several issues in this area, these have been fixed in the current draft. IANA registries are clearly identified and what IANA is being asked to do is clear. (18) List any new IANA registries that require Expert Review for future allocations. Provide any public guidance that the IESG would find useful in selecting the IANA Experts for these new registries. No new IANA registries are created. (19) Describe reviews and automated checks performed by the Document Shepherd to validate sections of the document written in a formal language, such as XML code, BNF rules, MIB definitions, etc. N/A |
2019-09-30
|
07 | Bob Hinden | Responsible AD changed to Suresh Krishnan |
2019-09-30
|
07 | Bob Hinden | IETF WG state changed to Submitted to IESG for Publication from WG Consensus: Waiting for Write-Up |
2019-09-30
|
07 | Bob Hinden | IESG state changed to Publication Requested from I-D Exists |
2019-09-30
|
07 | Bob Hinden | IESG process started in state Publication Requested |
2019-09-30
|
07 | Bob Hinden | Changed consensus to Yes from Unknown |
2019-09-30
|
07 | Bob Hinden | Intended Status changed to Proposed Standard from None |
2019-09-30
|
07 | Bob Hinden | Tag Revised I-D Needed - Issue raised by WG cleared. |
2019-09-30
|
07 | Bob Hinden | IETF WG state changed to WG Consensus: Waiting for Write-Up from In WG Last Call |
2019-09-30
|
07 | Bob Hinden | Title : ICMPv6 errors for discarding packets due to processing limits Author : Tom Herbert Filename … Title : ICMPv6 errors for discarding packets due to processing limits Author : Tom Herbert Filename : draft-ietf-6man-icmp-limits-06.txt Pages : 16 Date : 2019-09-24 (1) What type of RFC is being requested (BCP, Proposed Standard, Internet Standard, Informational, Experimental, or Historic)? Why is this the proper type of RFC? Is this type of RFC indicated in the title page header? Standards track RFC, Proposed Standard. It is creating new code points for ICMPv6, this is the correct status. It is noted in the header. (2) The IESG approval announcement includes a Document Announcement Write-Up. Please provide such a Document Announcement Write-Up. Recent examples can be found in the "Action" announcements for approved documents. The approval announcement contains the following sections: Technical Summary: Relevant content can frequently be found in the abstract and/or introduction of the document. If not, this may be an indication that there are deficiencies in the abstract or introduction. Abstract Network nodes may discard packets if they are unable to process protocol headers of packets due to processing constraints or limits. When such packets are dropped, the sender receives no indication so it cannot take action to address the cause of discarded packets. This specification defines several new ICMPv6 errors that can be sent by a node that discards packets because it is unable to process the protocol headers. A node that receives such an ICMPv6 error may be able to modify what it sends in future packets to avoid subsequent packet discards. Working Group Summary: Was there anything in WG process that is worth noting? For example, was there controversy about particular points or were there decisions where the consensus was particularly rough? This document had good w.g. review, was discussed at several face to face 6man sessions and on the list. The chairs also did individual reviews. This found one important issue with the use of RFC4884. This is fixed in the current draft. Document Quality: Are there existing implementations of the protocol? Have a significant number of vendors indicated their plan to implement the specification? Are there any reviewers that merit special mention as having done a thorough review, e.g., one that resulted in important changes or a conclusion that the document had no substantive issues? If there was a MIB Doctor, Media Type or other expert review, what was its course (briefly)? In the case of a Media Type review, on what date was the request posted? No known implementations. Difficult to implement until the IANA code points have been assigned. Issues raised in reviews have been resolved in current draft. Personnel: Who is the Document Shepherd? Who is the Responsible Area Director? Document Shepherd: Bob Hinden Area Director: Suresh Krishnan (3) Briefly describe the review of this document that was performed by the Document Shepherd. If this version of the document is not ready for publication, please explain why the document is being forwarded to the IESG. Document Shepard did a review of the document that raised issues in two areas, how the IANA assignments were described, and the use of RFC4884 was being used. These issue have been fixed in the current draft. Document is ready to advance. (4) Does the document Shepherd have any concerns about the depth or breadth of the reviews that have been performed? No. (5) Do portions of the document need review from a particular or from broader perspective, e.g., security, operational complexity, AAA, DNS, DHCP, XML, or internationalization? If so, describe the review that took place. No. The document is creating new ICMPv6 code points. No new issues created. (6) Describe any specific concerns or issues that the Document Shepherd has with this document that the Responsible Area Director and/or the IESG should be aware of? For example, perhaps he or she is uncomfortable with certain parts of the document, or has concerns whether there really is a need for it. In any event, if the WG has discussed those issues and has indicated that it still wishes to advance the document, detail those concerns here. No issues to raise. (7) Has each author confirmed that any and all appropriate IPR disclosures required for full conformance with the provisions of BCP 78 and BCP 79 have already been filed. If not, explain why? The author has confirmed this. (8) Has an IPR disclosure been filed that references this document? If so, summarize any WG discussion and conclusion regarding the IPR disclosures. No IPR disclosures. (9) How solid is the WG consensus behind this document? Does it represent the strong concurrence of a few individuals, with others being silent, or does the WG as a whole understand and agree with it? Strong w.g. consensus. (10) Has anyone threatened an appeal or otherwise indicated extreme discontent? If so, please summarise the areas of conflict in separate email messages to the Responsible Area Director. (It should be in a separate email because this questionnaire is publicly available.) No. (11) Identify any ID nits the Document Shepherd has found in this document. (See http://www.ietf.org/tools/idnits/ and the Internet-Drafts Checklist). Boilerplate checks are not enough; this check needs to be thorough. There were issues in the previous version, author did an update, now IDnits is clear. (12) Describe how the document meets any required formal review criteria, such as the MIB Doctor, media type, and URI type reviews. N/A (13) Have all references within this document been identified as either normative or informative? Yes (14) Are there normative references to documents that are not ready for advancement or are otherwise in an unclear state? If such normative references exist, what is the plan for their completion? All normative references are RFCs or IANA assignments. (15) Are there downward normative references references (see RFC 3967)? If so, list these downward references to support the Area Director in the Last Call procedure. No. (16) Will publication of this document change the status of any existing RFCs? Are those RFCs listed on the title page header, listed in the abstract, and discussed in the introduction? If the RFCs are not listed in the Abstract and Introduction, explain why, and point to the part of the document where the relationship of this document to the other RFCs is discussed. If this information is not in the document, explain why the WG considers it unnecessary. No changes to other RFCs. (17) Describe the Document Shepherd's review of the IANA considerations section, especially with regard to its consistency with the body of the document. Confirm that all protocol extensions that the document makes are associated with the appropriate reservations in IANA registries. Confirm that any referenced IANA registries have been clearly identified. Confirm that newly created IANA registries include a detailed specification of the initial contents for the registry, that allocations procedures for future registrations are defined, and a reasonable name for the new registry has been suggested (see RFC 8126). The document shepherd found several issues in this area, these have been fixed in the current draft. IANA registries are clearly identified and what IANA is being asked to do is clear. (18) List any new IANA registries that require Expert Review for future allocations. Provide any public guidance that the IESG would find useful in selecting the IANA Experts for these new registries. No new IANA registries are created. (19) Describe reviews and automated checks performed by the Document Shepherd to validate sections of the document written in a formal language, such as XML code, BNF rules, MIB definitions, etc. N/A |
2019-09-30
|
07 | Bob Hinden | Notification list changed to Bob Hinden <bob.hinden@gmail.com> |
2019-09-30
|
07 | Bob Hinden | Document shepherd changed to Bob Hinden |
2019-09-30
|
07 | Tom Herbert | New version available: draft-ietf-6man-icmp-limits-07.txt |
2019-09-30
|
07 | (System) | New version approved |
2019-09-30
|
07 | (System) | Request for posting confirmation emailed to previous authors: Tom Herbert |
2019-09-30
|
07 | Tom Herbert | Uploaded new revision |
2019-09-24
|
06 | Tom Herbert | New version available: draft-ietf-6man-icmp-limits-06.txt |
2019-09-24
|
06 | (System) | New version approved |
2019-09-24
|
06 | (System) | Request for posting confirmation emailed to previous authors: Tom Herbert |
2019-09-24
|
06 | Tom Herbert | Uploaded new revision |
2019-09-10
|
05 | Tom Herbert | New version available: draft-ietf-6man-icmp-limits-05.txt |
2019-09-10
|
05 | (System) | New version approved |
2019-09-10
|
05 | (System) | Request for posting confirmation emailed to previous authors: Tom Herbert |
2019-09-10
|
05 | Tom Herbert | Uploaded new revision |
2019-09-05
|
04 | Ole Trøan | Tag Revised I-D Needed - Issue raised by WG set. |
2019-08-06
|
04 | Tom Herbert | New version available: draft-ietf-6man-icmp-limits-04.txt |
2019-08-06
|
04 | (System) | New version approved |
2019-08-06
|
04 | (System) | Request for posting confirmation emailed to previous authors: Tom Herbert |
2019-08-06
|
04 | Tom Herbert | Uploaded new revision |
2019-07-25
|
03 | Ole Trøan | This document now replaces draft-herbert-6man-icmp-limits instead of None |
2019-07-25
|
03 | Bob Hinden | IETF WG state changed to In WG Last Call from WG Document |
2019-05-29
|
03 | Tom Herbert | New version available: draft-ietf-6man-icmp-limits-03.txt |
2019-05-29
|
03 | (System) | New version approved |
2019-05-29
|
03 | (System) | Request for posting confirmation emailed to previous authors: Tom Herbert |
2019-05-29
|
03 | Tom Herbert | Uploaded new revision |
2019-05-23
|
02 | Tom Herbert | New version available: draft-ietf-6man-icmp-limits-02.txt |
2019-05-23
|
02 | (System) | New version approved |
2019-05-23
|
02 | (System) | Request for posting confirmation emailed to previous authors: Tom Herbert |
2019-05-23
|
02 | Tom Herbert | Uploaded new revision |
2019-05-02
|
01 | Jenny Bui | New version available: draft-ietf-6man-icmp-limits-01.txt |
2019-05-02
|
01 | (System) | Forced post of submission |
2019-05-01
|
01 | (System) | Request for posting confirmation emailed to previous authors: Tom Herbert , 6man-chairs@ietf.org |
2019-05-01
|
01 | Jenny Bui | Uploaded new revision |
2018-11-30
|
00 | (System) | Document has expired |
2018-09-19
|
01 | (System) | Request for posting confirmation emailed to previous authors: Tom Herbert |
2018-09-19
|
01 | Tom Herbert | Uploaded new revision |
2018-05-29
|
00 | Tom Herbert | New version available: draft-ietf-6man-icmp-limits-00.txt |
2018-05-29
|
00 | (System) | WG -00 approved |
2018-05-29
|
00 | Tom Herbert | Set submitter to "Tom Herbert ", replaces to (none) and sent approval email to group chairs: 6man-chairs@ietf.org |
2018-05-29
|
00 | Tom Herbert | Uploaded new revision |