Re: Is Fragmentation at IP layer even needed ?

Joe Touch <touch@isi.edu> Mon, 08 February 2016 21:20 UTC

Return-Path: <touch@isi.edu>
X-Original-To: ietf@ietfa.amsl.com
Delivered-To: ietf@ietfa.amsl.com
Received: from localhost (ietfa.amsl.com [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id C9F9E1B334F for <ietf@ietfa.amsl.com>; Mon, 8 Feb 2016 13:20:01 -0800 (PST)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -1.901
X-Spam-Level:
X-Spam-Status: No, score=-1.901 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, RP_MATCHES_RCVD=-0.001] autolearn=ham
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id 72Pq98UZfzqf for <ietf@ietfa.amsl.com>; Mon, 8 Feb 2016 13:20:00 -0800 (PST)
Received: from nitro.isi.edu (nitro.isi.edu [128.9.208.207]) (using TLSv1 with cipher ECDHE-RSA-AES128-SHA (128/128 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id D65951B2F61 for <ietf@ietf.org>; Mon, 8 Feb 2016 13:20:00 -0800 (PST)
Received: from [128.9.184.104] ([128.9.184.104]) (authenticated bits=0) by nitro.isi.edu (8.13.8/8.13.8) with ESMTP id u18LJc8V019613 (version=TLSv1/SSLv3 cipher=DHE-RSA-AES128-SHA bits=128 verify=NOT); Mon, 8 Feb 2016 13:19:38 -0800 (PST)
Subject: Re: Is Fragmentation at IP layer even needed ?
To: Alexey Eromenko <al4321@gmail.com>, John Levine <johnl@taugh.com>
References: <CAOJ6w=G4ysJGsNC_F-N5+-P9-OmUYDx1f14mew7GNAEaUmDfYg@mail.gmail.com> <20160208155214.91667.qmail@ary.lan> <CAOJ6w=H3F5Tyez0=hJYnq+wscBsCN0ROxwA4RppjfXzV5nwBJw@mail.gmail.com>
From: Joe Touch <touch@isi.edu>
Message-ID: <56B90668.5070201@isi.edu>
Date: Mon, 08 Feb 2016 13:19:36 -0800
User-Agent: Mozilla/5.0 (Windows NT 6.3; WOW64; rv:38.0) Gecko/20100101 Thunderbird/38.5.1
MIME-Version: 1.0
In-Reply-To: <CAOJ6w=H3F5Tyez0=hJYnq+wscBsCN0ROxwA4RppjfXzV5nwBJw@mail.gmail.com>
Content-Type: text/plain; charset="utf-8"
Content-Transfer-Encoding: 7bit
X-MailScanner-ID: u18LJc8V019613
X-ISI-4-69-MailScanner: Found to be clean
X-MailScanner-From: touch@isi.edu
Archived-At: <http://mailarchive.ietf.org/arch/msg/ietf/P8vlqdRxt5odGFxKEaOO_BdNSf0>
Cc: ietf <ietf@ietf.org>
X-BeenThere: ietf@ietf.org
X-Mailman-Version: 2.1.15
Precedence: list
List-Id: IETF-Discussion <ietf.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/ietf>, <mailto:ietf-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/ietf/>
List-Post: <mailto:ietf@ietf.org>
List-Help: <mailto:ietf-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/ietf>, <mailto:ietf-request@ietf.org?subject=subscribe>
X-List-Received-Date: Mon, 08 Feb 2016 21:20:02 -0000


On 2/8/2016 8:08 AM, Alexey Eromenko wrote:
> Basically, Fragmentation, as specified in RFC-2460 (IPv6), solves the
> problem ONLY for packet-sized between 1280 and 1500 bytes. Which is why
> I doubt if it is useful at all.

It's exactly what lets encapsulation tunneling occur and reoccur at will.

I.e., once you split a 1500 byte packet into 1280 and 220 and
encapsulate each of the results, you get to do it again.

Without fragmentation, arbitrary recursive direct (IP-in-IP) tunneling
is impossible.

Joe