Re: Is Fragmentation at IP layer even needed ?

Joe Touch <touch@isi.edu> Thu, 11 February 2016 18:35 UTC

Return-Path: <touch@isi.edu>
X-Original-To: ietf@ietfa.amsl.com
Delivered-To: ietf@ietfa.amsl.com
Received: from localhost (ietfa.amsl.com [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id BE9371B38EF for <ietf@ietfa.amsl.com>; Thu, 11 Feb 2016 10:35:56 -0800 (PST)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -6.901
X-Spam-Level:
X-Spam-Status: No, score=-6.901 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, RCVD_IN_DNSWL_HI=-5, RP_MATCHES_RCVD=-0.001] autolearn=ham
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id SYr3d8KSDo3S for <ietf@ietfa.amsl.com>; Thu, 11 Feb 2016 10:35:55 -0800 (PST)
Received: from boreas.isi.edu (boreas.isi.edu [128.9.160.161]) (using TLSv1 with cipher ECDHE-RSA-AES128-SHA (128/128 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id 6ABAC1B38EE for <ietf@ietf.org>; Thu, 11 Feb 2016 10:35:55 -0800 (PST)
Received: from [128.9.184.104] ([128.9.184.104]) (authenticated bits=0) by boreas.isi.edu (8.13.8/8.13.8) with ESMTP id u1BIZIRW013547 (version=TLSv1/SSLv3 cipher=DHE-RSA-AES128-SHA bits=128 verify=NOT); Thu, 11 Feb 2016 10:35:19 -0800 (PST)
Subject: Re: Is Fragmentation at IP layer even needed ?
To: Phillip Hallam-Baker <phill@hallambaker.com>
References: <CAOJ6w=EvzE3dM4Y2mFFR=9YyPBdmFu_jkF4-42LjkdbRd3yz_w@mail.gmail.com> <BLUPR05MB1985F5F2BB3118362C67B921AED50@BLUPR05MB1985.namprd05.prod.outlook.com> <20160208200943.A615941B5B96@rock.dv.isc.org> <CAMm+LwgLoYpQ1TNOTOuJzh+cu+GyRBf9=y_K7K35boQ9WcZKjA@mail.gmail.com> <56B92A96.9050200@si6networks.com> <CAMm+LwifTXvVd1mPZOfcOOR03Fnj-82H9aDVS01=wGezePtnXw@mail.gmail.com> <56BA4BC7.1010002@isi.edu> <CAMm+Lwi-n=be4AWGibs+Zq9egYw5pSDmPGb-4P0LDEcX1E6osA@mail.gmail.com> <56BA68CE.7090304@isi.edu> <CAMm+LwiM2sFUeejgJZe650UQbVHrh7EHrEF2omvPrZJPodgJLA@mail.gmail.com> <56BA739D.7060309@isi.edu> <CAMm+Lwij1dOkK0b2ZnJiPMtba=wc823WgYjqw0iwAApa3KBYcg@mail.gmail.com> <56BA95C7.8060109@isi.edu> <56BAD6CC.2030209@necom830.hpcl.titech.ac.jp> <56BBAAF7.6020903@isi.edu> <56BC9516.6050305@necom830.hpcl.titech.ac.jp> <56BCCBB4.4050909@isi.edu> <CAMm+Lwh-2v+MVDSt8GWa98ykH9ZH49Y01d=3rTZXvgD16JKDtg@mail.gmail.com>
From: Joe Touch <touch@isi.edu>
X-Enigmail-Draft-Status: N1110
Message-ID: <56BCD464.4060000@isi.edu>
Date: Thu, 11 Feb 2016 10:35:16 -0800
User-Agent: Mozilla/5.0 (Windows NT 6.3; WOW64; rv:38.0) Gecko/20100101 Thunderbird/38.5.1
MIME-Version: 1.0
In-Reply-To: <CAMm+Lwh-2v+MVDSt8GWa98ykH9ZH49Y01d=3rTZXvgD16JKDtg@mail.gmail.com>
Content-Type: text/plain; charset="utf-8"
Content-Transfer-Encoding: 7bit
X-ISI-4-43-8-MailScanner: Found to be clean
X-MailScanner-From: touch@isi.edu
Archived-At: <http://mailarchive.ietf.org/arch/msg/ietf/YCf-X3l9WyIT3zcy8P3Nltr_-7E>
Cc: IETF Discussion Mailing List <ietf@ietf.org>
X-BeenThere: ietf@ietf.org
X-Mailman-Version: 2.1.15
Precedence: list
List-Id: IETF-Discussion <ietf.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/ietf>, <mailto:ietf-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/ietf/>
List-Post: <mailto:ietf@ietf.org>
List-Help: <mailto:ietf-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/ietf>, <mailto:ietf-request@ietf.org?subject=subscribe>
X-List-Received-Date: Thu, 11 Feb 2016 18:35:56 -0000


On 2/11/2016 10:19 AM, Phillip Hallam-Baker wrote:
> On Thu, Feb 11, 2016 at 12:58 PM, Joe Touch <touch@isi.edu> wrote:
>>
>>
>> On 2/11/2016 6:05 AM, Masataka Ohta wrote:
>>> Joe Touch wrote:
>>>
>>>> I repeat: nodes that encap or decap are acting as sources or sinks, not
>>>> relays.
>>>
>>> I'm afraid firewalls are relays.
>>
>> A firewall that filters on L3 is a router regardless of which side you
>> look at.
> 
> Using 'layers' to describe Internet architecture can be very
> misleading because the Internet isn't layered according to the ISO
> model and the layers don't necessarily stack up the way people expect
> once tunneling is involved.

Internet layers correspond to ISO layers up through 4 fairly well.

Layers have always been relative, though - what I think is layer 4 might
be layer 2 to you if you're using my UDP to transit your IP inside.

> For example, if I have an SSH channel to a system (or a TLS firewall),
> I have a transport layer protocol that is presenting a packet layer
> interface.
>
> So if we number the layers, we have 1, 2, 3, 4, 5, 3 [4, 5, 7].

Strictly, you have two different views:

	SSH [1, 2, 3, 4, 5] acting as [1* 2*] to the transit protocol.

	The complete SSH view is:

		[1, 2, 3, 4, 5, 7#] where 7# is the transit
		(where the transit acts as an application)

	The complete transit view is:

		[1*, 2*, 3, 4, 5, 7], where 2* is a tunnel (which *is*
		just a link) and 1* is virtual

SSH needs to treat the transit as an application.

The transit needs to treat SSH as a link (including support, if needed,
for ARP, MTU discovery, etc.)

> One of the things I learned early on programming Microsoft BASIC was
> to not use sequential line numbers. And I was really glad to get rid
> of line numbers when I moved to machines with decent amounts of RAM.
> Seems to me that the numbered layer model confuses rather than
> clarifies and especially so when tunneling is being discussed.

Once you move to tunnels you need to think in relative terms, not absolutes.

> A tunnel should be a tunnel.

A tunnel *is* (and always has been) a link.

The only difference between a tunnel and a link is that a link is a
special subset of "all tunnels that run over physical connections".

> If you fragment at the tunnel ingress,
> you should defragment at the egress. Otherwise you are simply pushing
> your state maintenance requirements onto the receiving endpoint in a
> way that isn't scaleable.

The beauty of considering a tunnel a link is that the same rules apply,
as they always should have. Just as a link that can't transit an IP
packet requires frag/reassembly within the link (e.g., ATM does this),
so should a tunnel.

Joe