Re: [DNSOP] Draft mentioned in meeting re: fragmentation .

Paul Vixie <paul@redbarn.org> Thu, 21 November 2019 08:51 UTC

Return-Path: <paul@redbarn.org>
X-Original-To: dnsop@ietfa.amsl.com
Delivered-To: dnsop@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id BDC5212083E for <dnsop@ietfa.amsl.com>; Thu, 21 Nov 2019 00:51:16 -0800 (PST)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -1.899
X-Spam-Level:
X-Spam-Status: No, score=-1.899 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, RCVD_IN_DNSWL_NONE=-0.0001, SPF_HELO_NONE=0.001, SPF_PASS=-0.001, URIBL_BLOCKED=0.001] autolearn=ham autolearn_force=no
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id fFpd4DEsdqwh for <dnsop@ietfa.amsl.com>; Thu, 21 Nov 2019 00:51:15 -0800 (PST)
Received: from family.redbarn.org (family.redbarn.org [24.104.150.213]) (using TLSv1.2 with cipher AECDH-AES256-SHA (256/256 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id 62A89120106 for <dnsop@ietf.org>; Thu, 21 Nov 2019 00:51:15 -0800 (PST)
Received: from linux-9daj.localnet (vixp1.redbarn.org [24.104.150.140]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (Client did not present a certificate) by family.redbarn.org (Postfix) with ESMTPSA id CFA93B0588; Thu, 21 Nov 2019 08:51:13 +0000 (UTC)
From: Paul Vixie <paul@redbarn.org>
To: dnsop@ietf.org
Date: Thu, 21 Nov 2019 08:51:13 +0000
Message-ID: <2739840.uvMj0yNyzV@linux-9daj>
Organization: none
In-Reply-To: <CAHw9_iK73+Ob8oLmXH9aB1ZLTYMGMSHZdNor_NUCrboWxak4ow@mail.gmail.com>
References: <CAHw9_iLhqmfv9=2P2-Hybxd-ncctm8vk=eSo8S8jH+TDG6fhhg@mail.gmail.com> <5031667.0FC68XRKFj@linux-9daj> <CAHw9_iK73+Ob8oLmXH9aB1ZLTYMGMSHZdNor_NUCrboWxak4ow@mail.gmail.com>
MIME-Version: 1.0
Content-Transfer-Encoding: 7bit
Content-Type: text/plain; charset="us-ascii"
Archived-At: <https://mailarchive.ietf.org/arch/msg/dnsop/5ceybqRf7RkDPHHQ5jiyleyMDyI>
Subject: Re: [DNSOP] Draft mentioned in meeting re: fragmentation .
X-BeenThere: dnsop@ietf.org
X-Mailman-Version: 2.1.29
Precedence: list
List-Id: IETF DNSOP WG mailing list <dnsop.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/dnsop>, <mailto:dnsop-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/dnsop/>
List-Post: <mailto:dnsop@ietf.org>
List-Help: <mailto:dnsop-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/dnsop>, <mailto:dnsop-request@ietf.org?subject=subscribe>
X-List-Received-Date: Thu, 21 Nov 2019 08:51:17 -0000

On Thursday, 21 November 2019 08:32:38 UTC Warren Kumari wrote:
> On Thu, Nov 21, 2019 at 3:54 PM Paul Vixie <paul@redbarn.org> wrote:
> > On Thursday, 21 November 2019 06:54:47 UTC Warren Kumari wrote:
> > can someone who knows the rfc editor please tell them that the reference
> > in this section is incorrect:

> > > 5.  Applications That Rely on IPv6 Fragmentation
> > > 
> > >    The following applications rely on IPv6 fragmentation:
> > >    
> > >    o  DNS [RFC1035]
> > >    o  OSPFv3 [RFC2328][RFC5340]
> > >    o  Packet-in-packet encapsulations

> > that's pretty accurate. RFC 1035 specified 512 octets as the maximum UDP
> > payload, because adding UDP and IP headers, and IP options, yielded the
> > largest IP datagram size that receivers were required to be able to
> > reassemble if fragmentation occurred (576). in practice, this only
> > happened on experimental links whose MTU might have approached the
> > minimum (68).
> > 
> > in other words as much as i was stupid in EDNS for invoking fragmentation,
> > it was technically permitted by DNS itself, though in practice, not used
> > before EDNS.

> Apologies, I was unable to parse the above -- what exactly is
> incorrect? You said that the reference is incorrect, but then that
> that is accurate. What should it be changed to?

the apologies are from me not you! i was posting while breathing, and left out 
my conclusion thereby. i don't think RFC1035 should be blamed for reliance on 
IPv6 fragmentation, both because IPv6 did not exist at the time, and because 
any reliance on IP fragmentation of any kind was apocryphal -- its use was so 
rare and those rarities so failure-prone (inducing lookup failures, or 
selection of a different available server, or TCP retries) that it seems 
unfair to list it here.

it would be fairer to change the reference to "EDNS" (RFC2671)"[1], which did 
in fact rely on IP fragmentation in general and since it came during the IPv6 
era it can be accused of knowingly relying upon IPv6 fragmentation directly.

[1] i don't mean [Damas], which is a revision to RFC 2671 by later innocents.

if the authors or editors wish to correct this reference in another way, they 
could change "The following applications rely on IPv6 fragmentation:" to "The 
following applications implicitly or apocryphally rely on IP fragmentation:". 
in other words change IPv6 to IP, and make sure lack of actual reliance for 
the majority actual production use did not happen in the pre-RFC2671 era.

--

i want IP datagrams to outgrow the MTU of 10-megabit ethernet from 1980, and 
we're going to need PMTUD or some modern replacement to get there. but we 
won't get there with fragmentation, and i knew better when drafting RFC2671, 
and i thought (stupidly) that EDNS1 would be along with the MD (more data) bit 
soon enough to save us from the folly of fragmenting DNS messages. (this was 
idiocy on my part, for more than one reason.)

-- 
Paul