Re: Is Fragmentation at IP layer even needed ?

"Joel M. Halpern" <jmh@joelhalpern.com> Mon, 08 February 2016 22:45 UTC

Return-Path: <jmh@joelhalpern.com>
X-Original-To: ietf@ietfa.amsl.com
Delivered-To: ietf@ietfa.amsl.com
Received: from localhost (ietfa.amsl.com [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id D563A1B3460 for <ietf@ietfa.amsl.com>; Mon, 8 Feb 2016 14:45:15 -0800 (PST)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -2.702
X-Spam-Level:
X-Spam-Status: No, score=-2.702 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, DKIM_SIGNED=0.1, DKIM_VALID=-0.1, DKIM_VALID_AU=-0.1, RCVD_IN_DNSWL_LOW=-0.7, SPF_HELO_PASS=-0.001, SPF_PASS=-0.001] autolearn=ham
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id I2CmxCv6lSG9 for <ietf@ietfa.amsl.com>; Mon, 8 Feb 2016 14:45:14 -0800 (PST)
Received: from mailb2.tigertech.net (mailb2.tigertech.net [208.80.4.154]) (using TLSv1.2 with cipher AECDH-AES256-SHA (256/256 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id 3E5AF1B3466 for <ietf@ietf.org>; Mon, 8 Feb 2016 14:45:14 -0800 (PST)
Received: from localhost (localhost [127.0.0.1]) by mailb2.tigertech.net (Postfix) with ESMTP id 24EB21C0244; Mon, 8 Feb 2016 14:45:14 -0800 (PST)
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=joelhalpern.com; s=1.tigertech; t=1454971514; bh=duTE7mVD+eMUYiBVISLgmlA7nqZx2diu5Yuv3HgFncM=; h=Subject:To:References:Cc:From:Date:In-Reply-To:From; b=O+U3wE6boTklMAJ24VVZcgWELMvOTRl8vdCNY7yKVLcN4fYaBqzMP6MRtPpWdca1B 6FusPhYmwv7RoK1Upkff/bOVfR+YkGfvMmcCoSmG6tmUU3lP15RFlvgG8+NJXqnHE3 AlhYZFl5BLbwiIx7VoiregxtBNNRuVfDek7NndN8=
X-Virus-Scanned: Debian amavisd-new at b2.tigertech.net
Received: from Joels-MacBook-Pro.local (209-255-163-147.ip.mcleodusa.net [209.255.163.147]) (using TLSv1.2 with cipher ECDHE-RSA-AES128-GCM-SHA256 (128/128 bits)) (No client certificate requested) by mailb2.tigertech.net (Postfix) with ESMTPSA id 658351C012A; Mon, 8 Feb 2016 14:45:13 -0800 (PST)
Subject: Re: Is Fragmentation at IP layer even needed ?
To: Warren Kumari <warren@kumari.net>, David Borman <dab@weston.borman.com>, Alexey Eromenko <al4321@gmail.com>
References: <CAOJ6w=G4ysJGsNC_F-N5+-P9-OmUYDx1f14mew7GNAEaUmDfYg@mail.gmail.com> <20160208155214.91667.qmail@ary.lan> <CAOJ6w=H3F5Tyez0=hJYnq+wscBsCN0ROxwA4RppjfXzV5nwBJw@mail.gmail.com> <2F942F4E-F890-49A1-91C8-F304B9FBA2D3@weston.borman.com> <CAHw9_iKw5chdJqy4QTqAKXa5q3pMgSQFdbZfi-7TKOs325+1wA@mail.gmail.com>
From: "Joel M. Halpern" <jmh@joelhalpern.com>
Message-ID: <56B91A4B.5020507@joelhalpern.com>
Date: Mon, 08 Feb 2016 17:44:27 -0500
User-Agent: Mozilla/5.0 (Macintosh; Intel Mac OS X 10.9; rv:38.0) Gecko/20100101 Thunderbird/38.5.1
MIME-Version: 1.0
In-Reply-To: <CAHw9_iKw5chdJqy4QTqAKXa5q3pMgSQFdbZfi-7TKOs325+1wA@mail.gmail.com>
Content-Type: text/plain; charset="utf-8"; format="flowed"
Content-Transfer-Encoding: 8bit
Archived-At: <http://mailarchive.ietf.org/arch/msg/ietf/yRGHUfrCIMrzn6Mm8tGapB0i3FE>
Cc: John Levine <johnl@taugh.com>, ietf <ietf@ietf.org>
X-BeenThere: ietf@ietf.org
X-Mailman-Version: 2.1.15
Precedence: list
List-Id: IETF-Discussion <ietf.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/ietf>, <mailto:ietf-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/ietf/>
List-Post: <mailto:ietf@ietf.org>
List-Help: <mailto:ietf-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/ietf>, <mailto:ietf-request@ietf.org?subject=subscribe>
X-List-Received-Date: Mon, 08 Feb 2016 22:45:16 -0000

I would note that tunnel mechanisms either need a very good path "size" 
reporting mechanism or a way to fragment.  As the tunnel entry and exit 
are end-points, and as path "size" discovery has many problems, many 
tunnel mechanisms do us IP (v4 or v6) fragmentation.
Admittedly, none of them like it, and most recommend that if you can do 
path MTU discovery you should, but we want things to work.

Yours,
Joel

On 2/8/16 1:23 PM, Warren Kumari wrote:
>
>
> On Mon, Feb 8, 2016 at 9:05 AM David Borman <dab@weston.borman.com
> <mailto:dab@weston.borman.com>> wrote:
>
>
>      > On Feb 8, 2016, at 10:08 AM, Alexey Eromenko <al4321@gmail.com
>     <mailto:al4321@gmail.com>> wrote:
>      >
>      > On Mon, Feb 8, 2016 at 5:52 PM, John Levine <johnl@taugh.com
>     <mailto:johnl@taugh.com>> wrote:
>      > >2. What kind of UDP applications use such big packets, over 1280
>     bytes ?
>      >
>      > >Um, the DNS with EDNS0, and particularly with DNSSEC?  Is this a
>     trick question?
>      >
>      >
>      > Yes.
>      > The trick lies right there in IPv6 specification:
>      >
>      > "A node must be able to accept a fragmented packet that, after
>      >    reassembly, is as large as 1500 octets."
>      > ... which is not much greater than 1280 bytes defined as minimum
>     MTU for IPv6.
>      >
>      > Basically, Fragmentation, as specified in RFC-2460 (IPv6), solves
>     the problem ONLY for packet-sized between 1280 and 1500 bytes. Which
>     is why I doubt if it is useful at all.
>
>     That’s the minimum required implementation, which guarantees that
>     you can send at least a basic ethernet sized packet to any host.
>     What is omitted in the above qoute is next 2 sentences:
>         "A node is permitted to
>         accept fragmented packets that reassemble to more than 1500 octets.
>         An upper-layer protocol or application that depends on IPv6
>         fragmentation to send packets larger than the MTU of a path should
>         not send packets larger than 1500 octets unless it has assurance
>     that
>         the destination is capable of reassembling packets of that larger
>         size.”
>     So if you are writing an application that needs >1500 octets, use an
>     IPv6 implementation that supports >1500 octet fragmentation and
>     reassembly.
>
>
> ... but as an application writer (or, basically anyone else), I have no
> control over the "IPv6 implementation". Even if I'm in an environment
> where I do control the OS / model of all devices, and I know they
> support >1500 octet, it seems like a bad idea to *rely* on that.
> Sometime I'm going to want to change OS / add some other device, be able
> to interact with some other system. This sounds like vendor lock at its
> worst...
>
> W
>
>
>
>                      -David Borman
>
>      >
>      > (I also understand, that IPv4 fragmentation is much more
>     flexible, yes. It can go as small as 68 byte packets.)
>