Re: Last Call: <draft-ietf-intarea-ipv4-id-update-05.txt> (Updated Specification of the IPv4 ID Field) to Proposed Standard

Masataka Ohta <mohta@necom830.hpcl.titech.ac.jp> Tue, 07 August 2012 07:27 UTC

Return-Path: <mohta@necom830.hpcl.titech.ac.jp>
X-Original-To: ietf@ietfa.amsl.com
Delivered-To: ietf@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 5732321F85F3 for <ietf@ietfa.amsl.com>; Tue, 7 Aug 2012 00:27:24 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -0.043
X-Spam-Level:
X-Spam-Status: No, score=-0.043 tagged_above=-999 required=5 tests=[AWL=0.047, BAYES_00=-2.599, HELO_EQ_JP=1.244, HOST_EQ_JP=1.265]
Received: from mail.ietf.org ([12.22.58.30]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id C-Ll3l1nakzl for <ietf@ietfa.amsl.com>; Tue, 7 Aug 2012 00:27:23 -0700 (PDT)
Received: from necom830.hpcl.titech.ac.jp (necom830.hpcl.titech.ac.jp [131.112.32.132]) by ietfa.amsl.com (Postfix) with SMTP id 396D821F85D8 for <ietf@ietf.org>; Tue, 7 Aug 2012 00:27:20 -0700 (PDT)
Received: (qmail 72827 invoked from network); 7 Aug 2012 07:36:52 -0000
Received: from necom830.hpcl.titech.ac.jp (HELO ?127.0.0.1?) (131.112.32.132) by necom830.hpcl.titech.ac.jp with SMTP; 7 Aug 2012 07:36:52 -0000
Message-ID: <5020C32A.4060907@necom830.hpcl.titech.ac.jp>
Date: Tue, 07 Aug 2012 16:26:34 +0900
From: Masataka Ohta <mohta@necom830.hpcl.titech.ac.jp>
User-Agent: Mozilla/5.0 (Windows NT 5.1; rv:14.0) Gecko/20120713 Thunderbird/14.0
MIME-Version: 1.0
To: Joe Touch <touch@isi.edu>
Subject: Re: Last Call: <draft-ietf-intarea-ipv4-id-update-05.txt> (Updated Specification of the IPv4 ID Field) to Proposed Standard
References: <20120531143816.30508.66250.idtracker@ietfa.amsl.com> <Pine.LNX.4.64.1205311957420.31608@shell4.bayarea.net> <4FC9585E.6010205@necom830.hpcl.titech.ac.jp> <4FE2715C.2090601@necom830.hpcl.titech.ac.jp> <4FF20DE7.2080208@isi.edu> <500654AB.7060500@necom830.hpcl.titech.ac.jp> <8F5CBE79-4540-4519-9F51-62B36686EE8C@isi.edu> <501C5C75.9040209@necom830.hpcl.titech.ac.jp> <501C6441.4000302@isi.edu>
In-Reply-To: <501C6441.4000302@isi.edu>
Content-Type: text/plain; charset=ISO-2022-JP
Content-Transfer-Encoding: 7bit
Cc: ietf@ietf.org
X-BeenThere: ietf@ietf.org
X-Mailman-Version: 2.1.12
Precedence: list
List-Id: IETF-Discussion <ietf.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/ietf>, <mailto:ietf-request@ietf.org?subject=unsubscribe>
List-Archive: <http://www.ietf.org/mail-archive/web/ietf>
List-Post: <mailto:ietf@ietf.org>
List-Help: <mailto:ietf-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/ietf>, <mailto:ietf-request@ietf.org?subject=subscribe>
X-List-Received-Date: Tue, 07 Aug 2012 07:27:24 -0000

Joe Touch wrote:

>> RFC2765 specifies that translators can merely copy the
>> low-order bits of the field.
> 
> Yes, but this is not compatible with RFC791.

Then, which should we revice? RFC791, RFC2765 or both?

Without such a decision, there is no point to publish something
based on RFC791 and is not compatible with RFC2765.

> The case above occurs only when the source gets back a "packet too big"
> message with a desired MTU less than 1280.

which means RFC2460 expects it.

> Note that this might never
> happen, in which case there would never be any Fragment header.

If you can assume so, let's better assume that accidental ID
match never happen and we all can be very happy.

> However, even when it does happen, there is no instruction above about
> how to construct the header that is compliant with RFC791.

That is the problem. That is, if you insist on RFC791 as is, not
enough is specified on how to generate IPv6 ID.

> Further, the source might already be inserting the fragmentation header
> (e.g., on a 2KB packet).

Thus, there can be only one way (the one in RFC2765) to map IPv6
ID to IPv4 ID

Or, if multiple IPv6 fragments with same ID use different IPv4
translators with different mapping algorithm, each IPv6
fragments will have different IPv4 IDs.

> There's no instruction in how fragment headers
> are constructed in general that complies with RFC791.

Is it a problem of RFC791 or RFC2460/2765?

> Simply using the low 16 bits is not correct. In particular, RFC2460
> suggests that its 32-bit counter can wrap once a minute, and that only
> one such counter might be needed for an endpoint for all connections.

Never mind.

IPv6 specification is not self consistent at all.

>> Or, are you saying RFC2460 and RFC2765 violate RFC791?
> 
> Yes.

Then, as fixing RFC2460 is politically impossible, we must
abandone IPv6 and live with IPv4 forever.

> This document updates RFC791, but does not fix either RFC2460 or
> RFC2765. This document does not make any statements about how IPv6
> generates its IDs.

You draft says:

   This document updates the specification of the IPv4 ID field to more
   closely reflect current practice, and to include considerations taken
   into account during the specification of the similar field in IPv6.

but, "the specification of the similar field in IPv6" is, in
your opinion, incomplete, let's finish it first, only after
which you can revise your draft "to include considerations
taken into account during the specification of the similar
field in IPv6."

More specifically, for example, the following statement in your draft:

   The latter case is relevant only for
   IPv6 datagrams sent to IPv4 destinations to support subsequent
   fragmentation after translation to IPv4.

is incorrect because NAT646 refer RFC2765.

For another example,

   Finally, the IPv6 ID field is
   32 bits, and required unique per source/destination address pair for
   IPv6,

is, in your opinion, violation of RFC791.

>> As I stated above, RFC2460 guarantees "a suitable Identification
>> value" for IPv4 ID is there in IPv6 fragmentation ID.
> 
> Not the way I interpret the text, especially because there are other
> ways to generate IDs in RFC2460 that could be translated to IPv4

As I stated above, there can be only one way common to all the
6->4 translators. Or, different fragments with an IPv6 ID will
have different IPv4 IDs.

>> Or, if you think RFC2460 does not mind ID uniqueness (of IPv4,
>> at least) so much, RFC791 should not either.
> 
> I think there are a lot of IETF documents that are not reviewed in the
> correct context of existing standards. I don't think that applies to
> this draft, though.

So, you are lucky that I have noticed the problem at the last call.

						Masataka Ohta