Skip to main content

ICMP Extension Structure Length Field
draft-ietf-intarea-icmp-exten-hdr-len-06

The information below is for an old version of the document.
Document Type
This is an older version of an Internet-Draft whose latest revision state is "Active".
Authors Ron Bonica , hexiaoming , Xiao Min , Tal Mizrahi
Last updated 2025-08-13 (Latest revision 2025-08-05)
Replaces draft-bonica-intarea-icmp-exten-hdr-len
RFC stream Internet Engineering Task Force (IETF)
Formats
Reviews
Additional resources Mailing list discussion
Stream WG state Submitted to IESG for Publication
Document shepherd Luigi Iannone
Shepherd write-up Show Last changed 2025-07-08
IESG IESG state IESG Evaluation
Consensus boilerplate Yes
Telechat date (None)
Has 2 DISCUSSes. Needs 4 more YES or NO OBJECTION positions to pass.
Responsible AD Éric Vyncke
Send notices to ggx@gigix.net
IANA IANA review state Version Changed - Review Needed
draft-ietf-intarea-icmp-exten-hdr-len-06
INTAREA Group                                                  R. Bonica
Internet-Draft                                                       HPE
Updates: 4884 (if approved)                                        X. He
Intended status: Standards Track                           China Telecom
Expires: 14 February 2026                                         X. Min
                                                         ZTE Corporation
                                                              T. Mizrahi
                                                                  Huawei
                                                          13 August 2025

                 ICMP Extension Structure Length Field
                draft-ietf-intarea-icmp-exten-hdr-len-06

Abstract

   The ICMP Extension Structure (RFC4884) does not have a length field.
   Therefore, unless the length of the Extension Structure can be
   inferred from other data in the ICMP message, the Extension Structure
   must be the last item in the ICMP message.

   This document updates RFC 4884 to define a length field for the ICMP
   Extension Structure.  When length information is provided, receivers
   can use it to parse ICMP messages.  Specifically, receivers can use
   length information to determine the offset at which the item after
   the ICMP Extension Structure begins.

Status of This Memo

   This Internet-Draft is submitted in full conformance with the
   provisions of BCP 78 and BCP 79.

   Internet-Drafts are working documents of the Internet Engineering
   Task Force (IETF).  Note that other groups may also distribute
   working documents as Internet-Drafts.  The list of current Internet-
   Drafts is at https://datatracker.ietf.org/drafts/current/.

   Internet-Drafts are draft documents valid for a maximum of six months
   and may be updated, replaced, or obsoleted by other documents at any
   time.  It is inappropriate to use Internet-Drafts as reference
   material or to cite them other than as "work in progress."

   This Internet-Draft will expire on 14 February 2026.

Copyright Notice

   Copyright (c) 2025 IETF Trust and the persons identified as the
   document authors.  All rights reserved.

Bonica, et al.          Expires 14 February 2026                [Page 1]
Internet-Draft                 icmp-eh-len                   August 2025

   This document is subject to BCP 78 and the IETF Trust's Legal
   Provisions Relating to IETF Documents (https://trustee.ietf.org/
   license-info) in effect on the date of publication of this document.
   Please review these documents carefully, as they describe your rights
   and restrictions with respect to this document.  Code Components
   extracted from this document must include Revised BSD License text as
   described in Section 4.e of the Trust Legal Provisions and are
   provided without warranty as described in the Revised BSD License.

Table of Contents

   1.  Introduction  . . . . . . . . . . . . . . . . . . . . . . . .   2
   2.  Conventions and Definitions . . . . . . . . . . . . . . . . .   3
   3.  The ICMP Extension Structure  . . . . . . . . . . . . . . . .   3
   4.  Backwards Compatibility . . . . . . . . . . . . . . . . . . .   4
   5.  UPDATES to RFC 4884 . . . . . . . . . . . . . . . . . . . . .   5
   6.  IANA Considerations . . . . . . . . . . . . . . . . . . . . .   5
   7.  Security Considerations . . . . . . . . . . . . . . . . . . .   5
   8.  Acknowledgements  . . . . . . . . . . . . . . . . . . . . . .   5
   9.  References  . . . . . . . . . . . . . . . . . . . . . . . . .   5
     9.1.  Normative References  . . . . . . . . . . . . . . . . . .   5
     9.2.  Informative References  . . . . . . . . . . . . . . . . .   6
   Authors' Addresses  . . . . . . . . . . . . . . . . . . . . . . .   6

1.  Introduction

   The ICMP Extension Structure [RFC4884] does not have a length field.
   This means it is expected to be the last element of an ICMP message.
   However, there are cases where additional fields need to be inserted
   after the ICMP Extension Structure.

   For example, [I-D.ietf-intarea-rfc8335bis] enhances the PROBE utility
   by adding a new field to ICMP Extended Echo and ICMP Extended Echo
   Reply messages.  To maintain compatibility with existing PROBE
   implementations, this new field is placed after the ICMP Extension
   Structure.

   Because the ICMP Extension Structure does not have a length field,
   [I-D.ietf-intarea-rfc8335bis] requires implementations to determine
   the length of the extension structure from the known message format
   and the assumption that these packets contain only a single ICMP
   Extension Object.

   This special handling for PROBE packets is not ideal.  For future
   use, a mechanism to explicitly specify the extension structure length
   would be beneficial.

Bonica, et al.          Expires 14 February 2026                [Page 2]
Internet-Draft                 icmp-eh-len                   August 2025

   This document adds a length field to the ICMP Extension Header.  It
   does not define data items that might follow the ICMP Extension
   Structure.

   The specifications of this document apply to all ICMP Extension
   Structures, regardless of whether they appear in ICMPv4 [RFC0792] or
   ICMPv6 [RFC4443] messages.

   This document UPDATES [RFC4884].

2.  Conventions and Definitions

   The key words "MUST", "MUST NOT", "REQUIRED", "SHALL", "SHALL NOT",
   "SHOULD", "SHOULD NOT", "RECOMMENDED", "NOT RECOMMENDED", "MAY", and
   "OPTIONAL" in this document are to be interpreted as described in
   BCP14 [RFC2119] [RFC8174] when, and only when, they appear in all
   capitals, as shown here.

3.  The ICMP Extension Structure

   An ICMP Extension Structure contains exactly one Extension Header
   followed by one or more objects.  The Extension Header format is
   defined in Section 7 of [RFC4884].  This document modifies the
   Extension Header format by allocating the lower 8 bits of the
   reserved field for a new length field.  Figure 1 depicts the updated
   Extension Header format.

        0                   1                   2                   3
        0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1
       +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
       |Version|  Rsvd |     Length    |           Checksum            |
       +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+

      Figure 1: ICMP Extension Header As Updated By This Document

   Version: 4 bits.

   *  ICMP Extension Header version number.  This is version 2 as per
      [RFC4884].

   Reserved (Rsvd): 4 bits

   *  MUST be set to 0 by the sender and MUST be ignored by the
      receiver.

   Length: 8 bits

Bonica, et al.          Expires 14 February 2026                [Page 3]
Internet-Draft                 icmp-eh-len                   August 2025

   *  This field represents the length of the ICMP Extension Structure,
      including all options and optional padding, but excluding the ICMP
      Extension Header.  The length is measured in 4-byte words.  Legacy
      implementations set this field to 0 as per section 7 of [RFC4884].
      Therefore, implementation SHOULD NOT drop packets if this field is
      set to 0.

   Checksum: 16 bits

   *  As per [RFC4884], the checksum is the one's complement of the
      one's complement sum of the data structure, with the checksum
      field replaced by zero for the purpose of computing the checksum.
      An all-zero value means that no checksum was transmitted.  See
      Section 5.2 of [RFC4884] for a description of how this field is
      used.

   The ICMP Extension Structure MUST be zero-padded so that it ends on a
   4-byte boundary.  If it does not end on a 4-byte boundary, the
   receiving node will parse the ICMP message incorrectly and may
   discard it.

   The receiver MUST silently discard an ICMP message in the following
   cases:

   *  The length field in the ICMP Extension Header indicates that the
      ICMP Extension Structure is too large to fit in the ICMP message.

   *  The length field in the final ICMP Extension Object indicates that
      the final ICMP Extension Object is too large to fit in the ICMP
      Extension Structure.

   *  The final three bytes of the ICMP Extension Structure are neither
      padding (i.e., zeros) nor part of a well-formed ICMP Extension
      Object.

4.  Backwards Compatibility

   Legacy implementations that do not support the mechanism defined in
   this document set the length field to zero when sending a packet and
   ignore the length field in received ICMP messages.

   Such implementations require one of the following:

   *  The ICMP Extension Structure is final item in the ICMP packet.

   *  The length of the ICMP Extension Structure can be inferred from
      other fields in the packet (e.g., [I-D.ietf-intarea-rfc8335bis].

Bonica, et al.          Expires 14 February 2026                [Page 4]
Internet-Draft                 icmp-eh-len                   August 2025

   Currently, no mechanisms rely on the ICMP extension structure length
   field.  Should such mechanisms be defined in the future, backward
   compatibility with legacy implementations should be discussed for
   each case.

5.  UPDATES to RFC 4884

   *  In [RFC4884], the ICMP Extension Structure was not required to end
      on a 4-byte boundary.  In this document,the ICMP Extension
      Structure MUST be zero-padded so that it ends on a 4-byte
      boundary.

   *  In [RFC4884], an ICMP Extension Structure contains exactly one
      Extension Header followed by one or more objects.  The Extension
      Header contained a 12-bit reserved field.  This document allocates
      the lower 8 bits of the reserved field for a new length field.

   *  In [RFC4884], the reserved field MUST be set to 0.  In this
      document, the remaining 4 bits of the reserved field MUST be set
      to 0 by the sender and MUST be ignored by the receiver.

   *  In [RFC4884] the ICMP Extension Structure was expected to be the
      last data item in an ICMP message.  Because this document adds a
      length field to the ICMP Extension Header, implementations can
      parse beyond the ICMP Extension Structure.  Therefore, data items
      can be added after the ICMP Extension Structure.

6.  IANA Considerations

   This document requires no IANA actions.

7.  Security Considerations

   This document introduces no security vulnerabilities.  However, it
   does inherit security considerations from [RFC4884].

8.  Acknowledgements

   Thanks to Tom Herbert, Jen Linkova, Erik Vynke and Michael Welzl for
   their review and helpful suggestions.

9.  References

9.1.  Normative References

   [RFC0792]  Postel, J., "Internet Control Message Protocol", STD 5,
              RFC 792, DOI 10.17487/RFC0792, September 1981,
              <https://www.rfc-editor.org/rfc/rfc792>.

Bonica, et al.          Expires 14 February 2026                [Page 5]
Internet-Draft                 icmp-eh-len                   August 2025

   [RFC2119]  Bradner, S., "Key words for use in RFCs to Indicate
              Requirement Levels", BCP 14, RFC 2119,
              DOI 10.17487/RFC2119, March 1997,
              <https://www.rfc-editor.org/rfc/rfc2119>.

   [RFC4443]  Conta, A., Deering, S., and M. Gupta, Ed., "Internet
              Control Message Protocol (ICMPv6) for the Internet
              Protocol Version 6 (IPv6) Specification", STD 89,
              RFC 4443, DOI 10.17487/RFC4443, March 2006,
              <https://www.rfc-editor.org/rfc/rfc4443>.

   [RFC4884]  Bonica, R., Gan, D., Tappan, D., and C. Pignataro,
              "Extended ICMP to Support Multi-Part Messages", RFC 4884,
              DOI 10.17487/RFC4884, April 2007,
              <https://www.rfc-editor.org/rfc/rfc4884>.

   [RFC8174]  Leiba, B., "Ambiguity of Uppercase vs Lowercase in RFC
              2119 Key Words", BCP 14, RFC 8174, DOI 10.17487/RFC8174,
              May 2017, <https://www.rfc-editor.org/rfc/rfc8174>.

9.2.  Informative References

   [I-D.ietf-intarea-rfc8335bis]
              Fenner, B., Bonica, R., Thomas, R., Linkova, J., Lenart,
              C., and M. Boucadair, "PROBE: A Utility for Probing
              Interfaces", Work in Progress, Internet-Draft, draft-ietf-
              intarea-rfc8335bis-01, 21 July 2025,
              <https://datatracker.ietf.org/doc/html/draft-ietf-intarea-
              rfc8335bis-01>.

Authors' Addresses

   Ron Bonica
   HPE
   United States of America
   Email: rbonica@juniper.net

   Xiaoming He
   China Telecom
   China
   Email: hexm4@chinatelecom.cn

   Xiao Min
   ZTE Corporation
   China
   Email: xiao.min2@zte.com.cn

Bonica, et al.          Expires 14 February 2026                [Page 6]
Internet-Draft                 icmp-eh-len                   August 2025

   Tal Mizrahi
   Huawei
   Israel
   Email: tal.mizrahi.phd@gmail.com

Bonica, et al.          Expires 14 February 2026                [Page 7]