Valentin,

> On Jun 20, 2023, at 10:45 AM, Valentin Heinrich <v.heinric...@gmail.com> 
> wrote:
> 
> we had similar questions when working on reverse traceroute 
> (https://datatracker.ietf.org/doc/html/draft-heiwin-intarea-reverse-traceroute).
> Should we use new ICMP types or extend existing ones with a new code?
> 
> We actually conducted measurements to test deployability of those two choices.
> One of the big question marks was whether new ICMP messages using a new type 
> are able to traverse common NAT middleboxes.
> Unfortunately, as one would probably expect, new ICMP types are most commonly 
> filtered (or they just bypass the NAT, which is just as bad as they are 
> forwarded untranslated into the public internet).
> We then sent ICMP Echo requests with the new codes 1 and 2 through those same 
> NAT boxes.
> Only a single NAT box (out of 12) dropped the corresponding Echo response 
> message and in all other cases both requests and replies correctly traversed 
> the NAT.
> In this regard, our measurements showed that extending existing ICMP Echo 
> messages with new codes is the way to go if immediate deployability is the 
> goal.
> 
> We then also performed a measurement to assess the deployment of ICMP Echo 
> messages with new codes on the public Internet.
> We probed over a million hosts that correctly responded to regular ICMP Echo 
> requests (code 0) with ICMP Echo responses.
> To each of those hosts we sent ICMP Echo requests with code 1. Over 92% of 
> the probed hosts responded with an ICMP Echo response and reflected the new 
> code back in their response.
> The fact that we received that many "reflective" responses shows us, that 
> ICMP Echo messages (both request and response) with a new code make it 
> through the Internet unfiltered and unaltered in the vast majority of cases. 
> About 3% of the probes were answered with a regular ICMP Echo response (code 
> 0), thus not reflecting the request's code back.
> 
> For more details of the measurement study, you can have a look at this talk: 
> https://youtu.be/Y7NtqLEtfgjU?t=63
> 
> Or listen to this episode of the Ping Podcast: 
> https://blubrry.com/ping_podcast/94883480/reverse-traceroute-its-just-traceroute-but-the-other-direction/
> 
> One caveat is however that we conducted these measurements only on IPv4. 
> Results might or might not differ for IPv6.
> For reverse traceroute, which itself implements both ICMP and ICMPv6, we have 
> however successfully tested our implementation across the public internet.

That is a major caveat.   Testing with IPv4 ICMP is not very relevant for 
learning about the behavior of a new ICMPv6 message, specifically the proposed 
ICMPv6 loopback.

Bob

> 
> I hope this data point helps in this discussion.
> 
> On 07.06.23 06:30, Tal Mizrahi wrote:
>> Bob, Eric,
>> 
>> Thanks for the feedback.
>> Defining a new code for ICMPv6 Echo rather than defining a new type
>> may be the right way to go.
>> Our main concern with this is that RFC 4443 defines what to do with an
>> unknown type, but does not define what to do with an unknown code. It
>> is not clear what existing implementations do when receiving an Echo
>> Request with an unknown code. That is why the current draft calls for
>> a new type. However, we are open to more feedback about this, and it
>> may end up being just a new code.
>> 
>> Cheers,
>> Tal.
>> 
>> On Tue, Jun 6, 2023 at 8:33 PM Eric Vyncke (evyncke) <evyn...@cisco.com> 
>> wrote:
>>> Without any hat, I agree with Bob.
>>> 
>>> This I-D should eventually go to 6MAN WG though (with my AD hat)
>>> 
>>> -éric
>>> 
>>> On 06/06/2023, 08:34, "Int-area on behalf of Bob Hinden" 
>>> <int-area-boun...@ietf.org <mailto:int-area-boun...@ietf.org> on behalf of 
>>> bob.hin...@gmail.com <mailto:bob.hin...@gmail.com>> wrote:
>>> 
>>> 
>>> Tal,
>>> 
>>> 
>>> I did a quick read of your draft.
>>> 
>>> 
>>> As noted in the draft this seems to be very similar to ICMPv6 Echo/Echo 
>>> Reply. The change is to include the request packet in the response, not 
>>> just the payload.
>>> 
>>> 
>>> While I don’t have any real opinion on the need for this, I do think it 
>>> would be a lot simpler if the draft just defined a new Code field value for 
>>> Echo Request/Reply that specified this behavior. Currently the Code field 
>>> is set to zero, another value could specify this behavior.
>>> 
>>> 
>>> Deployment might be easier as I suspect ICMPv6 types other than the current 
>>> definitions will be filtered in many places.
>>> 
>>> 
>>> Bob
>>> 
>>> 
>>> 
>>> 
>>> 
>>> 
>>>> On Jun 6, 2023, at 4:54 AM, Tal Mizrahi <tal.mizrahi....@gmail.com 
>>>> <mailto:tal.mizrahi....@gmail.com>> wrote:
>>>> 
>>>> Hi,
>>>> 
>>>> New draft: 
>>>> https://datatracker.ietf.org/doc/draft-mcb-intarea-icmpv6-loopback/ 
>>>> <https://datatracker.ietf.org/doc/draft-mcb-intarea-icmpv6-loopback/>
>>>> 
>>>> We have posted a new draft that proposes two new ICMPv6 message types:
>>>> Loopback Request and Reply.
>>>> ICMPv6 Loopback is very similar to Echo, except that after a Loopback
>>>> Request is sent, its corresponding Reply includes as much of the IPv6
>>>> Loopback Request packet as possible, including the IPv6 header and
>>>> IPv6 extension headers and options if they are present.
>>>> 
>>>> We believe that ICMPv6 Loopback can be very useful for returning IPv6
>>>> options that were included in Request packet back to the sender,
>>>> including for example sending IOAM [RFC 9197] data from the Request
>>>> back to the sender, sending the SRH [RFC 8754] of the Request back to
>>>> the sender, as well as for in-progress / future protocols such as
>>>> draft-filsfils-spring-path-tracing and draft-kumar-ippm-ifa.
>>>> 
>>>> We would be happy for feedback, as well as suggestions about whether
>>>> the INT-AREA WG is the right place to discuss this draft.
>>>> 
>>>> Cheers,
>>>> Tal.
>>>> 
>>>> _______________________________________________
>>>> Int-area mailing list
>>>> Int-area@ietf.org <mailto:Int-area@ietf.org>
>>>> https://www.ietf.org/mailman/listinfo/int-area 
>>>> <https://www.ietf.org/mailman/listinfo/int-area>
>>> 
>>> 
>>> 
>>> 
> 
> _______________________________________________
> Int-area mailing list
> Int-area@ietf.org
> https://www.ietf.org/mailman/listinfo/int-area

Attachment: signature.asc
Description: Message signed with OpenPGP

_______________________________________________
Int-area mailing list
Int-area@ietf.org
https://www.ietf.org/mailman/listinfo/int-area

Reply via email to