Skip to main content

Internet Control Message Protocol (ICMPv6) Loopback
draft-mcb-6man-icmpv6-loopback-00

Document Type Active Internet-Draft (individual)
Authors Tal Mizrahi , Tianran Zhou , Shahar Belkar , Reuven Cohen , Justin Iurman
Last updated 2023-12-07
Replaces draft-mcb-intarea-icmpv6-loopback
RFC stream (None)
Intended RFC status (None)
Formats
Stream Stream state (No stream defined)
Consensus boilerplate Unknown
RFC Editor Note (None)
IESG IESG state I-D Exists
Telechat date (None)
Responsible AD (None)
Send notices to (None)
draft-mcb-6man-icmpv6-loopback-00
Network                                                       T. Mizrahi
Internet-Draft                                                   T. Zhou
Intended status: Standards Track                               S. Belkar
Expires: 9 June 2024                                            R. Cohen
                                                                  Huawei
                                                               J. Iurman
                                                                  ULiege
                                                         7 December 2023

          Internet Control Message Protocol (ICMPv6) Loopback
                   draft-mcb-6man-icmpv6-loopback-00

Abstract

   This document defines ICMPv6 Loopback, which enables a two-way packet
   exchange that can be used for probing and for diagnostic purposes.
   ICMPv6 Loopback is similar to ICMPv6 Echo, except that after a
   Loopback Request is sent, its corresponding Reply includes as much of
   the IPv6 Loopback Request packet as possible, including the IPv6
   header and IPv6 extension headers and options if they are present.

Status of This Memo

   This Internet-Draft is submitted in full conformance with the
   provisions of BCP 78 and BCP 79.

   Internet-Drafts are working documents of the Internet Engineering
   Task Force (IETF).  Note that other groups may also distribute
   working documents as Internet-Drafts.  The list of current Internet-
   Drafts is at https://datatracker.ietf.org/drafts/current/.

   Internet-Drafts are draft documents valid for a maximum of six months
   and may be updated, replaced, or obsoleted by other documents at any
   time.  It is inappropriate to use Internet-Drafts as reference
   material or to cite them other than as "work in progress."

   This Internet-Draft will expire on 9 June 2024.

Copyright Notice

   Copyright (c) 2023 IETF Trust and the persons identified as the
   document authors.  All rights reserved.

   This document is subject to BCP 78 and the IETF Trust's Legal
   Provisions Relating to IETF Documents (https://trustee.ietf.org/
   license-info) in effect on the date of publication of this document.
   Please review these documents carefully, as they describe your rights

Mizrahi, et al.            Expires 9 June 2024                  [Page 1]
Internet-Draft               ICMPv6 Loopback               December 2023

   and restrictions with respect to this document.  Code Components
   extracted from this document must include Revised BSD License text as
   described in Section 4.e of the Trust Legal Provisions and are
   provided without warranty as described in the Revised BSD License.

Table of Contents

   1.  Introduction  . . . . . . . . . . . . . . . . . . . . . . . .   2
   2.  Conventions . . . . . . . . . . . . . . . . . . . . . . . . .   4
     2.1.  Requirement Language  . . . . . . . . . . . . . . . . . .   4
     2.2.  Terminology . . . . . . . . . . . . . . . . . . . . . . .   4
   3.  ICMPv6 Loopback Messages  . . . . . . . . . . . . . . . . . .   5
     3.1.  Loopback Request Message  . . . . . . . . . . . . . . . .   5
     3.2.  Loopback Reply Message  . . . . . . . . . . . . . . . . .   6
   4.  IANA Considerations . . . . . . . . . . . . . . . . . . . . .   7
   5.  Security Considerations . . . . . . . . . . . . . . . . . . .   7
   6.  References  . . . . . . . . . . . . . . . . . . . . . . . . .   8
     6.1.  Normative References  . . . . . . . . . . . . . . . . . .   8
     6.2.  Informative References  . . . . . . . . . . . . . . . . .   8
   Appendix A.  New ICMPv6 Type vs. New Code . . . . . . . . . . . .   9
   Authors' Addresses  . . . . . . . . . . . . . . . . . . . . . . .  10

1.  Introduction

   ICMPv6 Echo [RFC4443] is very commonly used for diagnostic purposes
   ("Ping"), and is based on a two-way exchange: Node A sends an Echo
   Request to Node B, and Node B responds with an Echo Reply to Node A.
   The data (payload) of the Echo Reply message is identical to the data
   of the invoking Echo Request message.

   This document defines ICMPv6 Loopback, using two ICMPv6 message
   types: Loopback Request and Loopback Reply.  The Loopback procedure
   uses a two-way exchange that is similar to the Echo exchange, with
   the exception that the payload of the Loopback Reply includes as much
   of the invoking IPv6 Loopback Request as possible without exceeding
   the MTU, including IPv6 extension headers if they are present.

Mizrahi, et al.            Expires 9 June 2024                  [Page 2]
Internet-Draft               ICMPv6 Loopback               December 2023

                        +----------------------------+
                        |        IPv6 Header         |
                        |+ optional extension headers|
                        +----------------------------+
                        |       ICMPv6 Header        |
                        |      Loopback Request      |
                        +----------------------------+
                        |        ICMPv6 Data         |
                        +----------------------------+

                        ^                            ^
                        |                            |
       +-----+          +----- Loopback Request -----+           +-----+
       |     |-------------------------------------------------->|     |
       |  A  |                                                   |  B  |
       |     |<--------------------------------------------------|     |
       +-----+          +-----  Loopback Reply  -----+           +-----+
                        |                            |
                        v                            v

                        +----------------------------+
                        |        IPv6 Header         |
                        |+ optional extension headers|
                        +----------------------------+
                        |       ICMPv6 Header        |
                        |       Loopback Reply       |
                    +-  +----------------------------+
                    |   |        IPv6 Header         |
                    |   |+ optional extension headers|
          Invoking  |   +----------------------------+
          Loopback -+   |       ICMPv6 Header        |
          Request   |   |      Loopback Request      |
                    |   +----------------------------+
                    |   |        ICMPv6 Data         |
                    +-  +----------------------------+

                Figure 1: The ICMPv6 Loopback Procedure

   It should be noted that ICMPv6 error messages [RFC4443] already
   include as much of the IPv6 offending packet as possible.  For
   example, a node that runs Traceroute receives the inoking packets
   back in the returned Time Exceeded messages.  The Loopback messages
   that are defined in this document enable this information to be
   returned to the sender without invoking ICMP error messages.

Mizrahi, et al.            Expires 9 June 2024                  [Page 3]
Internet-Draft               ICMPv6 Loopback               December 2023

   ICMPv6 Loopback provides detailed information about the invoking IPv6
   packet that is not available in ICMPv6 Echo, including the IPv6
   header and extension headers.

   A related capability was proposed in the context of the Simple Two-
   way Active Measurement Protocol (STAMP): the STAMP extension that was
   proposed in [I-D.wang-ippm-stamp-hbh-extensions] allows a STAMP
   session-reflector to reflect IPv6 options that were received in test
   packets from the session-sender.  This functionality is performed
   over STAMP, while the ICMPv6 Loopback functionality is performed in
   Layer 3, and does not require any parsing or processing beyond Layer
   3, namely IPv6 and ICMPv6.

   There is a number of in-progress drafts in the IETF that define IPv6
   extension headers that can be used for tracing the path and its
   performance, including for example,
   [I-D.ietf-ippm-ioam-ipv6-options],
   [I-D.filsfils-spring-path-tracing], [I-D.ali-spring-ioam-srv6],
   [I-D.kumar-ippm-ifa].  These extensions are used for collecting
   information along the path of a packet.  The collected information is
   then exported to a central collector or controller for further
   processing.  However, there is currently no straightforward way of
   sending such trace information back to the sender, while clearly in
   some cases this trace information is most relevant to the sender.

   ICMPv6 Loopback enables collected trace information along with other
   extension headers to be echoed back to the sender in a strightforward
   and generic way.

2.  Conventions

2.1.  Requirement Language

   The key words "MUST", "MUST NOT", "REQUIRED", "SHALL", "SHALL NOT",
   "SHOULD", "SHOULD NOT", "RECOMMENDED", "NOT RECOMMENDED", "MAY", and
   "OPTIONAL" in this document are to be interpreted as described in BCP
   14 [RFC2119] [RFC8174] when, and only when, they appear in all
   capitals, as shown here.

2.2.  Terminology

   Abbreviations used in this document:

   ICMP:      Internet Control Message Protocol

   MTU:       Maximum Transmission Unit

Mizrahi, et al.            Expires 9 June 2024                  [Page 4]
Internet-Draft               ICMPv6 Loopback               December 2023

3.  ICMPv6 Loopback Messages

   This document defines two new ICMPv6 types: Loopback Request and
   Loopback Reply.

3.1.  Loopback Request Message

        0                   1                   2                   3
        0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1
       +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
       |     Type      |     Code      |          Checksum             |
       +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
       |           Identifier          |        Sequence Number        |
       +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
       |     Data ...
       +-+-+-+-+-

                       Figure 2: Loopback Request

   IPv6 Fields:

   Destination Address  Any legal IPv6 address.

   ICMPv6 Fields:

   Type                TBD-LB-Req

   Code                0

   Identifier          An identifier to aid in matching Loopback Replies
                       to this Loopback Request.  May be zero.

   Sequence Number     A sequence number to aid in matching Loopback
                       Replies to this Loopback Request.  May be zero.

   Data                Zero or more octets of arbitrary data.

   Description

   A node that implements the ICMPv6 Echo Request and Reply MAY
   implement an ICMPv6 Loopback responder function that receives
   Loopback Requests and originates corresponding Loopback Replies.  A
   node MAY also implement an application-layer interface for
   originating Loopback Requests and receiving Loopback Replies, for
   diagnostic purposes.

   Upper Layer Notification

Mizrahi, et al.            Expires 9 June 2024                  [Page 5]
Internet-Draft               ICMPv6 Loopback               December 2023

   Loopback Request messages MAY be passed to processes receiving ICMPv6
   messages.

3.2.  Loopback Reply Message

        0                   1                   2                   3
        0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1
       +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
       |     Type      |     Code      |          Checksum             |
       +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
       |           Identifier          |        Sequence Number        |
       +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
       |     As much of the invoking IPv6 Loopback Request packet      |
       +               as possible without the ICMPv6 packet           +
       |              exceeding the minimum IPv6 MTU [RFC8200]         |

                        Figure 3: Loopback Reply

   IPv6 Fields:

   Destination Address  Copied from the Source Address field of the
                       invoking Loopback Request packet.

   ICMPv6 Fields:

   Type                TBD-LB-Rep

   Code                0

   Identifier          The identifier from the invoking Loopback Request
                       message.

   Sequence Number     The sequence number from the invoking Loopback
                       Request message.

   Description

   A node that implements the ICMPv6 Echo Request and Reply MAY
   implement an ICMPv6 Loopback responder function that receives
   Loopback Requests and originates corresponding Loopback Replies.  A
   node MAY also implement an application-layer interface for
   originating Loopback Requests and receiving Loopback Replies, for
   diagnostic purposes.

   The source address of a Loopback Reply sent in response to a unicast
   Loopback Request message MUST be the same as the destination address
   of that Loopback Request message.

Mizrahi, et al.            Expires 9 June 2024                  [Page 6]
Internet-Draft               ICMPv6 Loopback               December 2023

   A Loopback Reply SHOULD be sent in response to a Loopback Request
   message sent to an IPv6 multicast or anycast address.  In this case,
   the source address of the reply MUST be a unicast address belonging
   to the interface on which the Loopback Request message was received.

   The payload of the ICMPv6 Loopback Reply message, which resides after
   the Sequence Number field, MUST include as much of the invoking IPv6
   Loopback Request packet without exceeding the IPv6 MTU.  Note that if
   the invoking packet includes IPv6 extension headers, they are
   included in the payload of the Loopback Reply message.

   Upper Layer Notification

   Loopback Reply messages MUST be passed to the process that originated
   a Loopback Request message.  A Loopback Reply message MAY be passed
   to processes that did not originate the Loopback Request message.

4.  IANA Considerations

   IANA is requested to allocate the following values in the "Internet
   Control Message Protocol version 6 (ICMPv6) Parameters" registry.

   Two values are to be allocated from the "ICMPv6 type Numbers" range:

      +-------------+---------------------+---------------------------+
      | Type        | Name                | Reference                 |
      +-------------+---------------------+---------------------------+
      | TBD-LB-Req  | Loopback Request    | [This document]           |
      +-------------+---------------------+---------------------------+
      | TBD-LB-Rep  | Loopback Reply      | [This document]           |
      +-------------+---------------------+---------------------------+

                   Figure 4: ICMPv6 Loopback Type Numbers

   The two type values should be allocated from one of the unassigned
   values greater than 127.

   IANA is requested to define a code registry for each of the two new
   types.  The registration procedure for these registries are First
   Come First Served.  In each of these new registries, a single code
   value is assigned by this document: Code 0.

5.  Security Considerations

   From a security perspective this document does not introduce new
   security threats beyond the threats that are already applicable for
   existing ICMPv6 messages, and are described in [RFC4443].

Mizrahi, et al.            Expires 9 June 2024                  [Page 7]
Internet-Draft               ICMPv6 Loopback               December 2023

   A ICMPv6 Loopback Reply message may be longer than the invoking
   Loopback Request message, since the Loopback Reply includes the
   invoking IPv6 packet, encapsulated in an ICMPv6 over IPv6 packet.
   Thus, replies are slightly amplified compared to requests.  However,
   the amplification effect is minor, as it only adds a constant number
   of octets to each invoking packet.  Notably, the amplification effect
   in this case is similar to ICMPv6 error message, and specifically
   similar to Traceroute.

6.  References

6.1.  Normative References

   [RFC2119]  Bradner, S., "Key words for use in RFCs to Indicate
              Requirement Levels", BCP 14, RFC 2119,
              DOI 10.17487/RFC2119, March 1997,
              <https://www.rfc-editor.org/info/rfc2119>.

   [RFC4443]  Conta, A., Deering, S., and M. Gupta, Ed., "Internet
              Control Message Protocol (ICMPv6) for the Internet
              Protocol Version 6 (IPv6) Specification", STD 89,
              RFC 4443, DOI 10.17487/RFC4443, March 2006,
              <https://www.rfc-editor.org/info/rfc4443>.

   [RFC8174]  Leiba, B., "Ambiguity of Uppercase vs Lowercase in RFC
              2119 Key Words", BCP 14, RFC 8174, DOI 10.17487/RFC8174,
              May 2017, <https://www.rfc-editor.org/info/rfc8174>.

   [RFC8200]  Deering, S. and R. Hinden, "Internet Protocol, Version 6
              (IPv6) Specification", STD 86, RFC 8200,
              DOI 10.17487/RFC8200, July 2017,
              <https://www.rfc-editor.org/info/rfc8200>.

6.2.  Informative References

   [I-D.ali-spring-ioam-srv6]
              Ali, Z., Gandhi, R., Filsfils, C., Brockners, F., Nainar,
              N. K., Pignataro, C., Li, C., Chen, M., and G. Dawra,
              "Segment Routing Header encapsulation for In-situ OAM
              Data", Work in Progress, Internet-Draft, draft-ali-spring-
              ioam-srv6-06, 10 July 2022,
              <https://datatracker.ietf.org/doc/html/draft-ali-spring-
              ioam-srv6-06>.

   [I-D.filsfils-spring-path-tracing]
              Filsfils, C., Abdelsalam, A., Camarillo, P., Yufit, M.,
              Graf, T., Su, Y., Matsushima, S., Valentine, M., and
              Dhamija, "Path Tracing in SRv6 networks", Work in

Mizrahi, et al.            Expires 9 June 2024                  [Page 8]
Internet-Draft               ICMPv6 Loopback               December 2023

              Progress, Internet-Draft, draft-filsfils-spring-path-
              tracing-05, 23 October 2023,
              <https://datatracker.ietf.org/doc/html/draft-filsfils-
              spring-path-tracing-05>.

   [I-D.ietf-ippm-ioam-ipv6-options]
              Bhandari, S. and F. Brockners, "In-situ OAM IPv6 Options",
              Work in Progress, Internet-Draft, draft-ietf-ippm-ioam-
              ipv6-options-12, 7 May 2023,
              <https://datatracker.ietf.org/doc/html/draft-ietf-ippm-
              ioam-ipv6-options-12>.

   [I-D.kumar-ippm-ifa]
              Kumar, J., Anubolu, S., Lemon, J., Manur, R., Holbrook,
              H., Ghanwani, A., Cai, D., Ou, H., Li, Y., and X. Wang,
              "Inband Flow Analyzer", Work in Progress, Internet-Draft,
              draft-kumar-ippm-ifa-07, 7 September 2023,
              <https://datatracker.ietf.org/doc/html/draft-kumar-ippm-
              ifa-07>.

   [I-D.spiegel-ippm-ioam-rawexport]
              Spiegel, M., Brockners, F., Bhandari, S., and R.
              Sivakolundu, "In-situ OAM raw data export with IPFIX",
              Work in Progress, Internet-Draft, draft-spiegel-ippm-ioam-
              rawexport-06, 21 February 2022,
              <https://datatracker.ietf.org/doc/html/draft-spiegel-ippm-
              ioam-rawexport-06>.

   [I-D.wang-ippm-stamp-hbh-extensions]
              Zhou, T., Fioccola, G., Mishra, G. S., Yang, H., and C.
              Liu, "Simple Two-way Active Measurement Protocol (STAMP)
              Extensions for Hop- by-Hop Data Collection", Work in
              Progress, Internet-Draft, draft-wang-ippm-stamp-hbh-
              extensions-06, 23 October 2023,
              <https://datatracker.ietf.org/doc/html/draft-wang-ippm-
              stamp-hbh-extensions-06>.

Appendix A.  New ICMPv6 Type vs. New Code

   One of the issues that was discussed in the development of this
   document is whether ICMPv6 Loopback Request and Reply should be
   identified based on the ICMPv6 type, or based on the code value.  The
   first approach, which is used throughout this document, is to define
   new type values for Loopback Request and Loopback Reply.  The second
   approach is to reuse the Echo Request and Reply type values, but to
   define new code values that identify the Loopback messages.

Mizrahi, et al.            Expires 9 June 2024                  [Page 9]
Internet-Draft               ICMPv6 Loopback               December 2023

   Notably, the behavior of ICMPv6 as defined in [RFC4443] is well
   defined when receiving an unknown type, but the behavior when
   receiving an unknown code in an Echo message has not been defined.
   Therefore, this behavior varies between different implementations.
   For example, in Debian distributions an Echo Reply is sent with the
   same code that was received in the Echo Request, regardless of
   whether the code value is known.  In FreeBSD, on the other hand, if
   an Echo Request is received with an unknown code it is ignored.  Due
   to this ambiguity in [RFC4443] it is not possible to use Echo
   messages with a new code value, since existing implementations may
   behave in an unpredictable manner.

   The current document therefore defines new type values for ICMPv6
   Loopback messages.

Authors' Addresses

   Tal Mizrahi
   Huawei
   8-2 Matam
   Haifa 3190501
   Israel
   Email: tal.mizrahi.phd@gmail.com

   Tianran Zhou
   Huawei
   156 Beiqing Rd.
   Beijing
   100095
   China
   Email: zhoutianran@huawei.com

   Shahar Belkar
   Huawei
   8-2 Matam
   Haifa 3190501
   Israel
   Email: shahar.belkar@huawei.com

   Reuven Cohen
   Huawei
   8-2 Matam
   Haifa 3190501
   Israel
   Email: reuven.cohen@huawei.com

Mizrahi, et al.            Expires 9 June 2024                 [Page 10]
Internet-Draft               ICMPv6 Loopback               December 2023

   Justin Iurman
   Universite de Liege
   10, Allee de la decouverte (B28)
   4000 Sart-Tilman
   Belgium
   Email: justin.iurman@uliege.be

Mizrahi, et al.            Expires 9 June 2024                 [Page 11]