Re: [Int-area] New Version Notification for draft-bonica-intarea-lossless-pmtud-01.txt

Joe Touch <touch@strayalpha.com> Fri, 01 November 2019 20:53 UTC

Return-Path: <touch@strayalpha.com>
X-Original-To: int-area@ietfa.amsl.com
Delivered-To: int-area@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id CF730120910 for <int-area@ietfa.amsl.com>; Fri, 1 Nov 2019 13:53:15 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -1.218
X-Spam-Level:
X-Spam-Status: No, score=-1.218 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, DKIM_SIGNED=0.1, DKIM_VALID=-0.1, DKIM_VALID_AU=-0.1, HTML_MESSAGE=0.001, RCVD_IN_DNSWL_NONE=-0.0001, SPF_HELO_NONE=0.001, SPF_NEUTRAL=0.779, URIBL_BLOCKED=0.001] autolearn=no autolearn_force=no
Authentication-Results: ietfa.amsl.com (amavisd-new); dkim=pass (2048-bit key) header.d=strayalpha.com
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id fmK36K9toB6a for <int-area@ietfa.amsl.com>; Fri, 1 Nov 2019 13:53:14 -0700 (PDT)
Received: from server217-3.web-hosting.com (server217-3.web-hosting.com [198.54.115.226]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id 715D9120964 for <int-area@ietf.org>; Fri, 1 Nov 2019 13:53:02 -0700 (PDT)
DKIM-Signature: v=1; a=rsa-sha256; q=dns/txt; c=relaxed/relaxed; d=strayalpha.com; s=default; h=Message-ID:References:In-Reply-To:Subject:Cc: To:From:Date:Content-Type:MIME-Version:Sender:Reply-To: Content-Transfer-Encoding:Content-ID:Content-Description:Resent-Date: Resent-From:Resent-Sender:Resent-To:Resent-Cc:Resent-Message-ID:List-Id: List-Help:List-Unsubscribe:List-Subscribe:List-Post:List-Owner:List-Archive; bh=AJ7phh1zreHeLDhnJaIDsiSvZxqWobn09ehwr1KgLDQ=; b=iDpSME+z7gDA40Gz4eVLNBE+B 7Yvb4v9RQrup1tO1RFd8bNb7m9QH82LSB4GvZQTBvDYa+V84gHl/wXmQi43Bjt7Vtf6D4oo+HADTc IVT6UrH5tEnL4FuJzeIij2vbXkUian9fVieJtSbbWLoq0GIvaH5yw9gJP6XMps3LHrFl7SGTGFVk+ eH4ARhrKTBkJzulbUsA/ayHHk6qBqONRCUzVjYAVsIIBvRg0Y8rPiE97Zk2DspIdYL6Ac9T2j3eIj 5LS5V76R6rRqYMnuXHhK7ChrIrVshpXDqIjvVrYp9qOlPf0R/jLcz7sAeQSI3OrV2UtG9IuUupGS+ vHUCG/i3A==;
Received: from [::1] (port=46926 helo=server217.web-hosting.com) by server217.web-hosting.com with esmtpa (Exim 4.92) (envelope-from <touch@strayalpha.com>) id 1iQdui-003rol-Os; Fri, 01 Nov 2019 16:53:01 -0400
MIME-Version: 1.0
Content-Type: multipart/alternative; boundary="=_9bdc0eaaabfae85d2f0d46a6305b2a7e"
Date: Fri, 01 Nov 2019 13:52:56 -0700
From: Joe Touch <touch@strayalpha.com>
To: Fred Baker <fredbaker.ietf@gmail.com>
Cc: Erik Kline <ek.ietf@gmail.com>, Ron Bonica <rbonica=40juniper.net@dmarc.ietf.org>, int-area@ietf.org
In-Reply-To: <CACCB2CE-F3F0-454C-8C56-36898062A9C7@gmail.com>
References: <157254929056.30376.9249888312089068630.idtracker@ietfa.amsl.com> <BN7PR05MB5699A257D6A46B016FBCD539AE630@BN7PR05MB5699.namprd05.prod.outlook.com> <702307FF-E65E-4800-BAC8-CEE16EAFA0BD@gmail.com> <CAMGpriUtgtr9nQ4_8_i0anzUkRpyO78QkzbXqOiFWZnZwHzsxw@mail.gmail.com> <A1C8A26F-09BC-497D-A919-00BAE279AB73@strayalpha.com> <CACCB2CE-F3F0-454C-8C56-36898062A9C7@gmail.com>
Message-ID: <b86cd75ca3b0b1ef4796f691a482ff90@strayalpha.com>
X-Sender: touch@strayalpha.com
User-Agent: Roundcube Webmail/1.3.7
X-OutGoing-Spam-Status: No, score=-1.0
X-AntiAbuse: This header was added to track abuse, please include it with any abuse report
X-AntiAbuse: Primary Hostname - server217.web-hosting.com
X-AntiAbuse: Original Domain - ietf.org
X-AntiAbuse: Originator/Caller UID/GID - [47 12] / [47 12]
X-AntiAbuse: Sender Address Domain - strayalpha.com
X-Get-Message-Sender-Via: server217.web-hosting.com: authenticated_id: touch@strayalpha.com
X-Authenticated-Sender: server217.web-hosting.com: touch@strayalpha.com
X-Source:
X-Source-Args:
X-Source-Dir:
X-From-Rewrite: unmodified, already matched
Archived-At: <https://mailarchive.ietf.org/arch/msg/int-area/CxAilUHXHFmKpd4uMvIQyghvX78>
Subject: Re: [Int-area] New Version Notification for draft-bonica-intarea-lossless-pmtud-01.txt
X-BeenThere: int-area@ietf.org
X-Mailman-Version: 2.1.29
Precedence: list
List-Id: IETF Internet Area Mailing List <int-area.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/int-area>, <mailto:int-area-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/int-area/>
List-Post: <mailto:int-area@ietf.org>
List-Help: <mailto:int-area-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/int-area>, <mailto:int-area-request@ietf.org?subject=subscribe>
X-List-Received-Date: Fri, 01 Nov 2019 20:53:16 -0000

On 2019-11-01 09:44, Fred Baker wrote:

> On Nov 1, 2019, at 12:39 AM, Joe Touch <touch@strayalpha.com> wrote: On Oct 31, 2019, at 5:07 PM, Erik Kline <ek.ietf@gmail.com> wrote: 
> It may be folly to try to modify IPv4 implementations at this point.   I have no objections if you wish to try pushing this big rock up hill, but I doubt you will be successful.
> 
> BTW, what *actually* prevents a middlebox from doing IPv6 fragmentation? 
> Expecting it to work. That middlebox has no idea what packets are going through other middleboxes from the same endpoint. There's no way it can pick IDs to avoid collision, the way the origin can. That's why both IPv4 and IPv6 rely on the origin creating those IDs.
> 
> The result would either be significantly increased reassembly errors, sort of like accidental poisoning of the receiver's cache, or potentially resulting in incorrect packets (the latter could be more likely in some cases, e.g., when the fragment happens to have a zero IP checksum).

I don't especially disagree with you, BUT...

Thinking about middlebox fragmentation. OK, suppose I am a company with
N middleboxen. Suppose I configured the middleboxes to generate N
disjoint ranges of IDs. If I have a datagram arriving at a middle box
and being fragmented into two or more, and the ID generated is within
the range assigned to the middle box, I don't think the results you
predict actually transpire. 

Yes - but that's exactly the point. You can't know you are the only such
middlebox. 

I.e., my general rule about middleboxes is that they work ONLY when ALL
the middleboxes on a path from A to B can act as a single proxy for
either A or B. That works at the edge of an enterprise (firewalls setup
around an enterprise perimeter) but nearly nowhere else. 

> Note that I'm not writing a draft about that. I'm not sure I want anyone thinking it's a great idea and needs to be implemented.

Glad to hear that, though. 

Joe