Re: [Idr] comment on draft-ietf-idr-bgp-extended-messages

Nick Hilliard <nick@foobar.org> Thu, 08 June 2017 17:45 UTC

Return-Path: <nick@foobar.org>
X-Original-To: idr@ietfa.amsl.com
Delivered-To: idr@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 09C8E126DCA; Thu, 8 Jun 2017 10:45:26 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -4.201
X-Spam-Level:
X-Spam-Status: No, score=-4.201 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, RCVD_IN_DNSWL_MED=-2.3, SPF_PASS=-0.001] autolearn=ham autolearn_force=no
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id 9sOJlXhVswe5; Thu, 8 Jun 2017 10:45:24 -0700 (PDT)
Received: from mail.netability.ie (mail.netability.ie [IPv6:2a03:8900:0:100::5]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-SHA (256/256 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id EE4131270AC; Thu, 8 Jun 2017 10:45:23 -0700 (PDT)
X-Envelope-To: draft-ietf-idr-bgp-extended-messages.all@ietf.org
Received: from crumpet.foobar.org (089-101-070074.ntlworld.ie [89.101.70.74] (may be forged)) (authenticated bits=0) by mail.netability.ie (8.15.2/8.15.2) with ESMTPSA id v58HjKWx057120 (version=TLSv1.2 cipher=ECDHE-RSA-AES256-SHA bits=256 verify=NO); Thu, 8 Jun 2017 18:45:20 +0100 (IST) (envelope-from nick@foobar.org)
X-Authentication-Warning: cheesecake.ibn.ie: Host 089-101-070074.ntlworld.ie [89.101.70.74] (may be forged) claimed to be crumpet.foobar.org
Message-ID: <59398D2F.6020709@foobar.org>
Date: Thu, 08 Jun 2017 18:45:19 +0100
From: Nick Hilliard <nick@foobar.org>
User-Agent: Postbox 5.0.14 (Macintosh/20170515)
MIME-Version: 1.0
To: Robert Raszuk <robert@raszuk.net>
CC: idr <idr@ietf.org>, "draft-ietf-idr-bgp-extended-messages.all" <draft-ietf-idr-bgp-extended-messages.all@ietf.org>
References: <HK2PR0601MB1361016F598133FDC59C8E1DFCC90@HK2PR0601MB1361.apcprd06.prod.outlook.com> <CA+b+ERmYh5sqFmRwkMDk5JJjxc=YopmRJ76Z6BSXwnZikv1oCQ@mail.gmail.com> <CA+b+ERkVAFh0n24+dL4LNq2DJaubtW8oeNYg4iTJ1kqpsUQ57Q@mail.gmail.com> <HK2PR0601MB136122AB1E4A260A382374BDFCC90@HK2PR0601MB1361.apcprd06.prod.outlook.com> <CA+b+ER=VF++9g6JRXiCYANAqS8tYr7ak7ikZKzL9F2BUBtmkQw@mail.gmail.com> <HK2PR0601MB1361E3DDD70E9E4FB74B5851FCC90@HK2PR0601MB1361.apcprd06.prod.outlook.com> <CA+b+ERnXXkkfTvu7oei2MBCXXfo0F1N6TmREBq57i=UjSe2cRg@mail.gmail.com>
In-Reply-To: <CA+b+ERnXXkkfTvu7oei2MBCXXfo0F1N6TmREBq57i=UjSe2cRg@mail.gmail.com>
X-Enigmail-Version: 1.2.3
Content-Type: text/plain; charset="UTF-8"
Content-Transfer-Encoding: 7bit
Archived-At: <https://mailarchive.ietf.org/arch/msg/idr/p0uN8Io3B7Vmf6JwWWFrIxfo0OA>
Subject: Re: [Idr] comment on draft-ietf-idr-bgp-extended-messages
X-BeenThere: idr@ietf.org
X-Mailman-Version: 2.1.22
Precedence: list
List-Id: Inter-Domain Routing <idr.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/idr>, <mailto:idr-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/idr/>
List-Post: <mailto:idr@ietf.org>
List-Help: <mailto:idr-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/idr>, <mailto:idr-request@ietf.org?subject=subscribe>
X-List-Received-Date: Thu, 08 Jun 2017 17:45:26 -0000

Robert Raszuk wrote:
> Sorry, but MTU is not dependent on the router vendor, but on the
> circuits specifications you get from carriers to construct your WAN. Our
> circuits (usually emulated ones) are guaranteed to carry 1500 byte
> packets regardless of routers used on both ends. 

mtu is dependent on both the router interface characteristics and the
underlying circuit characteristics:  it's not just vendor-dependent,
it's specific to the hardware used on the particular interface.

I don't think this fragmentation argument is very important in the
context of draft-ietf-idr-bgp-extended-messages because BGP is just
sending out data in a tcp stream, and the MTU management is handled at
the TCP level.  So TCP won't attempt to put a 65535-byte update message
into a single TCP packet which is then fragmented; it will stream out a
series of packets of packetlen=MTU until the update has been fully
transmitted.

This behaviour is confirmed in rfc4271, section 3:

> BGP uses TCP [RFC793] as its transport protocol.  This eliminates the
>    need to implement explicit update fragmentation, retransmission,
>    acknowledgement, and sequencing.

Fragmentation happens occasionally in practice if there is a path mtu
mismatch between sender and receiver bgp speaker.  Generally speaking,
if it happens and there's a problem with transmitting the fragments,
then the bgp session will fail outright because most bgp implementations
will bundle lots of updates into a single TCP packet of size == MTU.

I.e. the concern that was raised is not an actual problem.

Nick