Re: [Hipsec] Segmentation within HIP
Robert Moskowitz <rgm@htt-consult.com> Thu, 31 March 2016 21:54 UTC
Return-Path: <rgm@htt-consult.com>
X-Original-To: hipsec@ietfa.amsl.com
Delivered-To: hipsec@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 8A9AE12D1B0 for <hipsec@ietfa.amsl.com>; Thu, 31 Mar 2016 14:54:04 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -4.211
X-Spam-Level:
X-Spam-Status: No, score=-4.211 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, RCVD_IN_DNSWL_MED=-2.3, SPF_PASS=-0.001, T_RP_MATCHES_RCVD=-0.01] autolearn=ham autolearn_force=no
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id UUTo0X50x2Wb for <hipsec@ietfa.amsl.com>; Thu, 31 Mar 2016 14:54:01 -0700 (PDT)
Received: from z9m9z.htt-consult.com (z9m9z.htt-consult.com [50.253.254.3]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id BE1E912D0B8 for <hipsec@ietf.org>; Thu, 31 Mar 2016 14:54:01 -0700 (PDT)
Received: from localhost (localhost [127.0.0.1]) by z9m9z.htt-consult.com (Postfix) with ESMTP id D461C62371; Thu, 31 Mar 2016 17:53:59 -0400 (EDT)
X-Virus-Scanned: amavisd-new at htt-consult.com
Received: from z9m9z.htt-consult.com ([127.0.0.1]) by localhost (z9m9z.htt-consult.com [127.0.0.1]) (amavisd-new, port 10024) with LMTP id gRW9FDf4Yk4r; Thu, 31 Mar 2016 17:53:52 -0400 (EDT)
Received: from lx120e.htt-consult.com (unknown [192.168.160.20]) (using TLSv1.2 with cipher DHE-RSA-AES128-SHA (128/128 bits)) (No client certificate requested) by z9m9z.htt-consult.com (Postfix) with ESMTPSA id 225E162367; Thu, 31 Mar 2016 17:53:52 -0400 (EDT)
To: Gonzalo Camarillo <Gonzalo.Camarillo@ericsson.com>, hipsec@ietf.org
References: <20160325224921.GA75376@cowbell.employees.org> <56FD3E40.9080200@ericsson.com>
From: Robert Moskowitz <rgm@htt-consult.com>
Message-ID: <56FD9C6C.9050201@htt-consult.com>
Date: Thu, 31 Mar 2016 17:53:48 -0400
User-Agent: Mozilla/5.0 (X11; Linux x86_64; rv:38.0) Gecko/20100101 Thunderbird/38.6.0
MIME-Version: 1.0
In-Reply-To: <56FD3E40.9080200@ericsson.com>
Content-Type: text/plain; charset="windows-1252"; format="flowed"
Content-Transfer-Encoding: 7bit
Archived-At: <http://mailarchive.ietf.org/arch/msg/hipsec/-kSLxeN0_qebtMaXGQb1LJIBk7M>
Subject: Re: [Hipsec] Segmentation within HIP
X-BeenThere: hipsec@ietf.org
X-Mailman-Version: 2.1.17
Precedence: list
List-Id: "This is the official IETF Mailing List for the HIP Working Group." <hipsec.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/hipsec>, <mailto:hipsec-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/hipsec/>
List-Post: <mailto:hipsec@ietf.org>
List-Help: <mailto:hipsec-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/hipsec>, <mailto:hipsec-request@ietf.org?subject=subscribe>
X-List-Received-Date: Thu, 31 Mar 2016 21:54:04 -0000
As I said, I am seeing this as part of a larger problem. And am working on some ideas. On 03/31/2016 11:12 AM, Gonzalo Camarillo wrote: > Hi, > > when specified the HIP_DATA packets we noted the fragmentation problem > but simply advised against sending large packets, which sure is not a > great solution ;-) > > https://tools.ietf.org/html/rfc6078#section-6 > > Cheers, > > Gonzalo > > On 26/03/2016 12:49 AM, Derek Fawcus wrote: >> Recently I've been working on middlebox s/w: Firewalls and NAT. >> >> One thing this has brought home to me is just how unreliable >> fragmentation is on the current Internet. NAT will often >> simply break it (such that they can not be reassembled) or >> just discard them, and firewalls are often set up to block them. >> >> As such, almost every protocol now would seem to need protocol >> level segmentation/fragmentation, rather than depend up IP >> level fragmentation. >> >> It struck me that it should be quite simple to extend HIP to >> support such. >> >> 1) Add a Controls bit which advertises that the sender supports >> segmentation. >> 2) Define a new parameter, numbered 1 such that it is first in >> the parameters, and is critical. >> Within the parameter have a seqno/identifier, offset and >> more segments / final segment bit, possibly also a total >> size field. Define some simple reassembly rules, similar >> to those for IP fragments, such that one could reassemble >> a HIP packet larger than 2008 bytes if desired (how big?). >> 3) Possibly also define a none critical parameter within the >> non signed, non MACed range which advertises the max size >> packet the sender is willing to reassemble. In fact I guess >> this might remove the need to use a Controls bit, since it >> would imply the sender can reassemble. >> >> Then have a rule that once one party has seen the other party >> advertise the segmentation capability within the current BEX >> session, it is free to make use of segmentation towards that peer. >> >> Thoughts? >> >> DF >> >> _______________________________________________ >> Hipsec mailing list >> Hipsec@ietf.org >> https://www.ietf.org/mailman/listinfo/hipsec >> > _______________________________________________ > Hipsec mailing list > Hipsec@ietf.org > https://www.ietf.org/mailman/listinfo/hipsec >
- [Hipsec] Segmentation within HIP Derek Fawcus
- Re: [Hipsec] Segmentation within HIP Tom Henderson
- Re: [Hipsec] Segmentation within HIP Robert Moskowitz
- Re: [Hipsec] Segmentation within HIP Robert Moskowitz
- Re: [Hipsec] Segmentation within HIP Derek Fawcus
- Re: [Hipsec] Segmentation within HIP Miika Komu
- Re: [Hipsec] Segmentation within HIP Robert Moskowitz
- Re: [Hipsec] Segmentation within HIP Robert Moskowitz
- Re: [Hipsec] Segmentation within HIP Gonzalo Camarillo
- Re: [Hipsec] Segmentation within HIP Robert Moskowitz