[6lo] clarifications in minimal fragments [ was :Question on draft-ietf-6lo-fragment-recovery and VRB ]

"Pascal Thubert (pthubert)" <pthubert@cisco.com> Fri, 30 August 2019 12:17 UTC

Return-Path: <pthubert@cisco.com>
X-Original-To: 6lo@ietfa.amsl.com
Delivered-To: 6lo@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id BE722120820 for <6lo@ietfa.amsl.com>; Fri, 30 Aug 2019 05:17:12 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -14.499
X-Spam-Level:
X-Spam-Status: No, score=-14.499 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, DKIM_SIGNED=0.1, DKIM_VALID=-0.1, DKIM_VALID_AU=-0.1, HTML_MESSAGE=0.001, RCVD_IN_DNSWL_HI=-5, SPF_PASS=-0.001, URIBL_BLOCKED=0.001, USER_IN_DEF_DKIM_WL=-7.5] autolearn=ham autolearn_force=no
Authentication-Results: ietfa.amsl.com (amavisd-new); dkim=pass (1024-bit key) header.d=cisco.com header.b=Vpo5dY/s; dkim=pass (1024-bit key) header.d=cisco.onmicrosoft.com header.b=GsGFTCxr
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id fwzk2Yqp8Jgj for <6lo@ietfa.amsl.com>; Fri, 30 Aug 2019 05:17:10 -0700 (PDT)
Received: from alln-iport-7.cisco.com (alln-iport-7.cisco.com [173.37.142.94]) (using TLSv1.2 with cipher DHE-RSA-SEED-SHA (128/128 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id 5292612018D for <6lo@ietf.org>; Fri, 30 Aug 2019 05:17:10 -0700 (PDT)
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/simple; d=cisco.com; i=@cisco.com; l=55808; q=dns/txt; s=iport; t=1567167430; x=1568377030; h=from:to:subject:date:message-id:mime-version; bh=q+Nr6p31fP58a3xJP5TtYe3YvWcFk2SI9wS8JkWwPrs=; b=Vpo5dY/sxmOInL5b0+PTpF3BVmOcobnPcuJoiHPwRTd7+m3G4xca7iYN 1SU0H/+ZXnbsmxWQv4ft2Jr4Ej2bKVb7pLIvthh5Ie88689BAElB29tpN erJCU1Cs370ONqgAl1W6HFVn/nmm9PnzDa720pEeKw75abgqx0U7a+lnz c=;
IronPort-PHdr: =?us-ascii?q?9a23=3ANGvcZxIRFZrQp5ao3tmcpTVXNCE6p7X5OBIU4Z?= =?us-ascii?q?M7irVIN76u5InmIFeBvKd2lFGcW4Ld5roEkOfQv636EU04qZea+DFnEtRXUg?= =?us-ascii?q?Mdz8AfngguGsmAXFXnLOPgYjYmNM9DT1RiuXq8NBsdFQ=3D=3D?=
X-IronPort-Anti-Spam-Filtered: true
X-IronPort-Anti-Spam-Result: =?us-ascii?q?A0AkAQBIE2ld/4gNJK1cChoBAQEBAQI?= =?us-ascii?q?BAQEBBwIBAQEBgWeBFi8kLANtViAECxcThCGDRwOKdE2Ze4JSA1QJAQEBDAE?= =?us-ascii?q?BJQgCAQGEPwIXgkkjOBMCAwgBAQQBAQECAQYEbYUuDIVKAQEXEQoTAQElExE?= =?us-ascii?q?BGQQBASEBCQIEMB0JAQQBEggagwGBHU0DHQECDKEWAoE4iGFzgTKCfAEBBYU?= =?us-ascii?q?NGIIWAwaBNIUAhngYgUA/gRFGgU6BPIJhAQECAYEzLSuCXjKCJo8ohRyJD45?= =?us-ascii?q?ACoIfhnCOAoIyhzaKWIQiiWKEEIdzkFECBAIEBQIOAQEFgWchgVhwFYMngkI?= =?us-ascii?q?4gzqFFIU/cgGBKI1KAQE?=
X-IronPort-AV: E=Sophos;i="5.64,447,1559520000"; d="scan'208,217";a="316732239"
Received: from alln-core-3.cisco.com ([173.36.13.136]) by alln-iport-7.cisco.com with ESMTP/TLS/DHE-RSA-SEED-SHA; 30 Aug 2019 12:16:59 +0000
Received: from XCH-ALN-020.cisco.com (xch-aln-020.cisco.com [173.36.7.30]) by alln-core-3.cisco.com (8.15.2/8.15.2) with ESMTPS id x7UCGxUa006772 (version=TLSv1.2 cipher=AES256-SHA bits=256 verify=FAIL); Fri, 30 Aug 2019 12:16:59 GMT
Received: from xhs-rtp-002.cisco.com (64.101.210.229) by XCH-ALN-020.cisco.com (173.36.7.30) with Microsoft SMTP Server (TLS) id 15.0.1473.3; Fri, 30 Aug 2019 07:16:58 -0500
Received: from xhs-aln-002.cisco.com (173.37.135.119) by xhs-rtp-002.cisco.com (64.101.210.229) with Microsoft SMTP Server (TLS) id 15.0.1473.3; Fri, 30 Aug 2019 08:16:57 -0400
Received: from NAM04-BN3-obe.outbound.protection.outlook.com (173.37.151.57) by xhs-aln-002.cisco.com (173.37.135.119) with Microsoft SMTP Server (TLS) id 15.0.1473.3 via Frontend Transport; Fri, 30 Aug 2019 07:16:57 -0500
ARC-Seal: i=1; a=rsa-sha256; s=arcselector9901; d=microsoft.com; cv=none; b=mZuv69mdhvGPOf/ArhNl0TBMIDEeMNvFyhq1g2QB39cjVtC9NaPRTBdDcC7dhAHkRjVDvJ3NEGx+ceYNS7tCyTd4+Xa4ml4/3L7E4nY+t2uBF2tsIYzhU+JthaMc91M2poRvFzoRj3HGvP06/VPgDFBRSFMZohi32b7cyvqHZK8Icf0bb3/7DEWYW+HkazhdvXfyrac6WOGZ6EdQNJ+1bCFCl8E/tLDHX/MlJ+z0aPWvgf7kmxvUcQxPL3/24zQJdOfFmTtglIEwJdYF+CzYTYbCV05nB8crHAk79tmxVA/12w4V20debRm/n8MG1ZR4pDjhXG/+ujleSZ5jgpyujg==
ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=microsoft.com; s=arcselector9901; h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-SenderADCheck; bh=q+Nr6p31fP58a3xJP5TtYe3YvWcFk2SI9wS8JkWwPrs=; b=oKj8I2xO5Zm7Oz0ztIopMM7LxKF0jXH31VMR2HT0vkn0p/5Xg0C08nOhAiNTxiQzyGSjLEsMYblc/jXWPK7KFvEeVfTF+7cwr2SrtaJL1w5egC9/3onvYUG602fNo64pZ1aiuVw2LnOo6byHWT4fowHD+EweYwDfe8WoMlaQSdMOzCNZDpZiJBeThpOrigStmvrNHa9Mw+Mk/1l1EAvXIamyU87tqHkx7TRy3EWxZmsrV+AUQWRg8di8DU4xb7GCVgOW7O4R3o2J3Cmo1vqya2fFTNiwhYI+bLy1raAnQi2ezWrLqzH8fgF05WQFJHKt57+ZeY/xIB7TBPrCBJ19NQ==
ARC-Authentication-Results: i=1; mx.microsoft.com 1; spf=pass smtp.mailfrom=cisco.com; dmarc=pass action=none header.from=cisco.com; dkim=pass header.d=cisco.com; arc=none
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=cisco.onmicrosoft.com; s=selector2-cisco-onmicrosoft-com; h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-SenderADCheck; bh=q+Nr6p31fP58a3xJP5TtYe3YvWcFk2SI9wS8JkWwPrs=; b=GsGFTCxroZi3dhjNpAjiyf9gWZXsiv43uHEPtwnemZauSqJA3WQOayvp26llFedadcw+I0kBWznf3m78gdxKRdQR01fHRnvqBsMEMQVlCZJ3nP00YHQOMAUw2LHHrolI0OKsjWh12k21+jT5UqeNiKW2N7BksEGtqXmVatYk+ko=
Received: from MN2PR11MB3565.namprd11.prod.outlook.com (20.178.250.159) by MN2PR11MB4046.namprd11.prod.outlook.com (20.179.149.156) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id 15.20.2199.21; Fri, 30 Aug 2019 12:16:56 +0000
Received: from MN2PR11MB3565.namprd11.prod.outlook.com ([fe80::89cf:9d:8a75:266e]) by MN2PR11MB3565.namprd11.prod.outlook.com ([fe80::89cf:9d:8a75:266e%3]) with mapi id 15.20.2220.013; Fri, 30 Aug 2019 12:16:56 +0000
From: "Pascal Thubert (pthubert)" <pthubert@cisco.com>
To: "Pascal Thubert (pthubert)" <pthubert@cisco.com>, Martine Lenders <m.lenders@fu-berlin.de>, "6lo@ietf.org" <6lo@ietf.org>
Thread-Topic: clarifications in minimal fragments [ was :Question on draft-ietf-6lo-fragment-recovery and VRB ]
Thread-Index: AdVfLH235BQ6tM3LQO6Bj0OReTdNwg==
Date: Fri, 30 Aug 2019 12:16:35 +0000
Deferred-Delivery: Fri, 30 Aug 2019 12:15:39 +0000
Message-ID: <MN2PR11MB35650CA7B31C2BC23B0418B2D8BD0@MN2PR11MB3565.namprd11.prod.outlook.com>
Accept-Language: fr-FR, en-US
Content-Language: en-US
X-MS-Has-Attach:
X-MS-TNEF-Correlator:
authentication-results: spf=none (sender IP is ) smtp.mailfrom=pthubert@cisco.com;
x-originating-ip: [2001:420:c0c0:1003::52]
x-ms-publictraffictype: Email
x-ms-office365-filtering-correlation-id: 2f65bdf5-4e7b-4b75-4d94-08d72d43f35e
x-microsoft-antispam: BCL:0; PCL:0; RULEID:(2390118)(7020095)(4652040)(8989299)(4534185)(4627221)(201703031133081)(201702281549075)(8990200)(5600166)(711020)(4605104)(1401327)(2017052603328)(7193020); SRVR:MN2PR11MB4046;
x-ms-traffictypediagnostic: MN2PR11MB4046:
x-ms-exchange-purlcount: 3
x-ms-exchange-transport-forked: True
x-microsoft-antispam-prvs: <MN2PR11MB4046DCB88D40749CBC7EC207D8BD0@MN2PR11MB4046.namprd11.prod.outlook.com>
x-ms-oob-tlc-oobclassifiers: OLM:9508;
x-forefront-prvs: 0145758B1D
x-forefront-antispam-report: SFV:NSPM; SFS:(10009020)(4636009)(376002)(366004)(396003)(39860400002)(136003)(346002)(189003)(199004)(53936002)(74316002)(25786009)(9686003)(316002)(52536014)(71200400001)(55016002)(46003)(71190400001)(54896002)(6306002)(8936002)(110136005)(186003)(66556008)(66946007)(64756008)(66476007)(76116006)(66446008)(236005)(5660300002)(53946003)(256004)(2906002)(66574012)(6666004)(14444005)(476003)(2501003)(6506007)(606006)(8676002)(81156014)(81166006)(33656002)(86362001)(6436002)(6116002)(7736002)(14454004)(790700001)(99286004)(478600001)(53546011)(486006)(7696005)(102836004)(79990200002); DIR:OUT; SFP:1101; SCL:1; SRVR:MN2PR11MB4046; H:MN2PR11MB3565.namprd11.prod.outlook.com; FPR:; SPF:None; LANG:en; PTR:InfoNoRecords; MX:1; A:1;
received-spf: None (protection.outlook.com: cisco.com does not designate permitted sender hosts)
x-ms-exchange-senderadcheck: 1
x-microsoft-antispam-message-info: 9q5awbrvqBoxP4IRBRtc+q0J612U1sOZKyktTpspaCXGerzPg489p33QKyQbmokV0HqCh7fGVOFzmwVo7lzvPP8LoOhvG/O9SFUkM2Okfyb7MPIMkZnaMZwGGSxIpd6UeJvi0gUCibg4ZzPyX/c6jmhBKmowEGZ9+is0HK1wfZ3Rwb0cUaUz46Oyx37OqDvz2Cwr7+Xg4zLUtosU8XdaTxtSuq8qCd4BtmzZ8xQa5vJQ1jqtKJ1XSjFseyYYB5tkvEykA0RT2/wJ4bP5RkRvKSu4wwOi/Pw7tT/TiRB9wKk/gTp86H/Q/o6zaiurD9T9BZ5f0+O96nAPOjo8q+AQuO9JUYxPy4+axtEC4TZDLWmHdVr4MT+tiDlrxCAf5mxcREDF6SYTbt8heNsrheoDwS2wyTgysa28W9RQ7olW9M2k8XBSpsly/qc7dP/wT0Qwq0qoa3qXV3EcMslpcuKvGQ==
Content-Type: multipart/alternative; boundary="_000_MN2PR11MB35650CA7B31C2BC23B0418B2D8BD0MN2PR11MB3565namp_"
MIME-Version: 1.0
X-MS-Exchange-CrossTenant-Network-Message-Id: 2f65bdf5-4e7b-4b75-4d94-08d72d43f35e
X-MS-Exchange-CrossTenant-originalarrivaltime: 30 Aug 2019 12:16:56.3627 (UTC)
X-MS-Exchange-CrossTenant-fromentityheader: Hosted
X-MS-Exchange-CrossTenant-id: 5ae1af62-9505-4097-a69a-c1553ef7840e
X-MS-Exchange-CrossTenant-mailboxtype: HOSTED
X-MS-Exchange-CrossTenant-userprincipalname: e68CSKdrS9dUGjW+fCsRo7+FoGDviL3dNlsR0OSkycL2OVJlMAUj7t1c0AQ2PTuWiE7sSMimeyFXPxEyCn6v0w==
X-MS-Exchange-Transport-CrossTenantHeadersStamped: MN2PR11MB4046
X-OriginatorOrg: cisco.com
X-Outbound-SMTP-Client: 173.36.7.30, xch-aln-020.cisco.com
X-Outbound-Node: alln-core-3.cisco.com
Archived-At: <https://mailarchive.ietf.org/arch/msg/6lo/eiKXLRa7iNWoCYXIvLvQVgm2iTs>
Subject: [6lo] clarifications in minimal fragments [ was :Question on draft-ietf-6lo-fragment-recovery and VRB ]
X-BeenThere: 6lo@ietf.org
X-Mailman-Version: 2.1.29
Precedence: list
List-Id: "Mailing list for the 6lo WG for Internet Area issues in IPv6 over constrained node networks." <6lo.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/6lo>, <mailto:6lo-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/6lo/>
List-Post: <mailto:6lo@ietf.org>
List-Help: <mailto:6lo-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/6lo>, <mailto:6lo-request@ietf.org?subject=subscribe>
X-List-Received-Date: Fri, 30 Aug 2019 12:17:13 -0000

Following Martine’s questions, please find proposed additions or updates to the minimal fragment draft:


Before:
“

   Conceptually, a reassembly buffer for 6LoWPAN contains:

   o  a datagram_size,
   o  a datagram_tag, associated to the link-layer sender and receiver
      addresses to which the datagram_tag is local,
   o  the actual packet data from the fragments received so far, in a
      form that makes it possible to detect when the whole packet has
      been received and can be processed or forwarded,
   o  a timer that allows discarding a partially reassembled packet
      after some timeout.

“
After
“

The reassembly buffer for 6LoWPAN is indexed in node B by
- a unique Identifier of Node A (e.g., Node A's link-layer address)
- the datagram_tag chosen by node A for this fragmented datagram

Because it may be hard for node B to correlate all possible link-layer addresses that node A may use (e.g., short vs. long addresses), node A MUST use the same link-layer address to send all the fragments of a same datagram to node B.

Conceptually, the reassembly buffer in node B contains, assuming that node B is neither the source or the final destination:
- a datagram_tag as received in the incoming fragments, associated to link-layer address of node A to which the received datagram_tag is local,
- the link-layer address that node B uses to forward the fragments
- the link-layer address of the next hop that is resolved on the first fragment
- a datagram_tag that node B allocated for this datagram and that is used when forwarding the fragments of the datagram
- the actual packet data from the fragments received so far, in a form that makes it possible to detect when the whole packet has been received and can be processed or forwarded,
- a datagram_size,
- a buffer for the remainder of a previous fragment left to be sent,
- a timer that allows discarding a partially reassembled packet after some timeout.
“


And later:

Before

“      Each datagram can be uniquely identified by the source and final
   destination link-layer addresses of the frame that carries it, the
   fragment size and the datagram_tag.

“
After
“
Each datagram can be uniquely identified by the sender link-layer addresses of the frame that carries it and the datagram_tag that the sender allocated for this datagram.
“

Please let me know if you see an issue with that. I wish to publish soon as we enter the IESG review for this spec.

All the best,

Pascal

From: 6lo <6lo-bounces@ietf.org>; On Behalf Of Pascal Thubert (pthubert)
Sent: vendredi 30 août 2019 13:44
To: Martine Lenders <m.lenders@fu-berlin.de>;; 6lo@ietf.org
Subject: Re: [6lo] Question on draft-ietf-6lo-fragment-recovery and VRB

Hello Martine

Great to hear about your implementation. The group is interested to learn about your progress (keep us tuned) and happy to help you through. P
lease do not hesitate to ask for more clarification as you feel needed. Even if you’re not too sure you should ask, if you wonder there’s probably a reason and you’re helping the implementors who will be following you.

Please see below:

I have an implementation question for the virtual reassembly buffer with regards to [draft-ietf-6lo-fragment-recovery]. Section 6.1 of this draft states that a tuple (source address, tag) is used to identify a VRB entry and cites [draft-ietf-6lo-minimal-fragment] for that.

Ø   Correct, and the meaning is source MAC address not source IP address. The exact sentence is

Ø                                       Upon a first fragment (i.e. with a

Ø     sequence of zero), a VRB and the associated LSP state are created for

Ø     the tuple (source MAC address, datagram_tag) and the fragment is

Ø     forwarded along the IPv6 route that matches the destination IPv6

Ø     address in the IPv6 header as prescribed by

Ø     [I-D.ietf-6lo-minimal-fragment<https://tools.ietf.org/html/draft-ietf-6lo-fragment-recovery-05#ref-I-D.ietf-6lo-minimal-fragment>;].

Ø
However, as far as I understand [draft-ietf-6lo-minimal-fragment] and [draft-ietf-lwig-6lowpan-virtual-reassembly] this is not the case. [draft-ietf-6lo-minimal-fragment] doesn't mention VRB entry identification and only refers to [draft-ietf-lwig-6lowpan-virtual-reassembly].

  *   It would not hurt to mention it though. Interesting. Minimal has:” All fragments are tagged with a 16-bit

   "    Each datagram can be uniquely identified by the source and final

   destination link-layer addresses of the frame that carries it, the

   fragment size and the datagram_tag.



Ø   That’s  misleading… I’ll correct it.
That in turn only recounts the classic (source address, destination address, size, tag) tuple defined in RFC4944

  *   When receiving a fragment, the destination is self and the size may vary from a datagram to the next. So the only thing that really identify the datagram is the source MAC and the tag.
and states that the only difference between the classic and VRB is the lack of the reassembled packet and addition of the next hop's address and the newly assigned tag:

Ø   Actually the forwarder sends the datagram with self as source to the source mac address is swapped naturally. It has to set the next hop’s mac address and the swapped datagram tag. The next hop’s MAC address identifies the node that should receive the packet and the datagram tag together with the source mac identify the reassembly buffer within the receiver. There is no contradiction.
To reduce the memory requirement for reassembly buffers, the implementation may opt to not keep the actual packet data in the reassembly buffer. Instead, it may attempt to send out the data for a fragment in the form of a forwarded fragment, as soon as all necessary information for that is available. Obviously, all fragments need to be sent with the same outgoing address (otherwise a full reassembly implementation would discard the fragments) and the same datagram_tag.

So my question is: Is the tuple definition in [draft-ietf-6lo-fragment-recovery] really correct?


  *   It is.

For exclusion datagram size I agree that it could be somewhat redundant. However, a node could have multiple destination addresses (either via multiple interfaces or IEEE-802.15.4-style short and long address). So, as the tag is link-specific (defined by a (source, destination) tuple), there could be distinct datagrams that have the same tuple (source, tag), or am I missing something?


Ø   Yes, the role of the destination MAC address is to reach the next hop, but does not change the processing within that node. I could change the L2 address I use to refer to the next hop in the middle of a fragmented packet, it is still the same fragmented packet. In other words, please do not use the dmac as to index the VRB. From your question I think the LWIG draft should clarify, and we can change minimal draft to clarify as well.

I already implemented the VRB with draft-ietf-6lo-minimal-fragment in mind and thus used the classic 4-tuple for indexing. But now I'm wondering: Can I reduce its index or would that be not advised?


Ø   You should reduce the index : ) There can not be 2 different datagrams coming in parallel from a same previous hop and with a same datagram tag. There must be a sentence somewhere in the LWIG draft that says that a new and currently unused datagram tag is chosen for a new incoming datagram, correct?  Minimal says

Ø                                                                Upon

Ø     receiving a fragment from node A with a datagram_tag previously

Ø     unseen from node A, node B allocates a buffer large enough to hold

Ø     the entire packet.



Ø   This text only indexes the VRB with any identifier of node A and the tag… And this is correct. What’s a bit more ugly is that Node A should not change the source MAC in between fragments because that will confise node B. I need to add text on that too.


Many thanks Martine for raising all this, and all the best for your implementation.

Pascal