Re: [Int-area] Call for adoption of draft-xu-intarea-ip-in-udp-03

Joe Touch <touch@isi.edu> Thu, 02 June 2016 00:43 UTC

Return-Path: <touch@isi.edu>
X-Original-To: int-area@ietfa.amsl.com
Delivered-To: int-area@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 6B08412D149 for <int-area@ietfa.amsl.com>; Wed, 1 Jun 2016 17:43:18 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -3.326
X-Spam-Level:
X-Spam-Status: No, score=-3.326 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, RP_MATCHES_RCVD=-1.426] autolearn=ham autolearn_force=no
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id e_Z4RkoR-w0Z for <int-area@ietfa.amsl.com>; Wed, 1 Jun 2016 17:43:16 -0700 (PDT)
Received: from nitro.isi.edu (nitro.isi.edu [128.9.208.207]) (using TLSv1.2 with cipher ECDHE-RSA-AES128-GCM-SHA256 (128/128 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id 8CB6A12B059 for <int-area@ietf.org>; Wed, 1 Jun 2016 17:43:16 -0700 (PDT)
Received: from [128.9.184.178] ([128.9.184.178]) (authenticated bits=0) by nitro.isi.edu (8.13.8/8.13.8) with ESMTP id u520gbti021266 (version=TLSv1/SSLv3 cipher=DHE-RSA-AES128-SHA bits=128 verify=NOT); Wed, 1 Jun 2016 17:42:37 -0700 (PDT)
To: Tom Herbert <tom@herbertland.com>
References: <E83B905A-FF6D-4996-B71A-7921DE4B133B@ericsson.com> <BFC09F5C-D6DF-4B6B-AA95-03919B9F09FB@cisco.com> <573E2A0E.1060609@isi.edu> <1FEE3F8F5CCDE64C9A8E8F4AD27C19EE0D54EB60@NKGEML515-MBX.china.huawei.com> <573F453C.5060908@isi.edu> <1FEE3F8F5CCDE64C9A8E8F4AD27C19EE0D554B73@NKGEML515-MBS.china.huawei.com> <5743303C.5040109@isi.edu> <1FEE3F8F5CCDE64C9A8E8F4AD27C19EE0D55514C@NKGEML515-MBS.china.huawei.com> <5743DD16.3050506@isi.edu> <e523724c-cffd-784d-0147-aa64c2787727@bogus.com> <574C8288.7080804@isi.edu> <bd97158e-b6f1-5e55-af9a-07eca2660479@gmail.com> <574DAECA.4050504@isi.edu> <1f6335981e714befab009d45ecb99ee4@XCH15-05-05.nw.nos.boeing.com> <1FEE3F8F5CCDE64C9A8E8F4AD27C19EE0D55A571@NKGEML515-MBS.china.huawei.com> <79d394e71ee349cca666aa3c8b60ad3b@XCH15-05-05.nw.nos.boeing.com> <574F7170.2050407@isi.edu> <CALx6S36Jotc1KSJs8YzA3-JUX_9s5i7eg24kVnuv6UYtYJKt8A@mail.gmail.com> <574F77A8.7030606@isi.edu> <CALx6S35dCWUR9=A2Db7_+F8QkscnPxqY4R0O+0iaEa4o0=FZgg@mail.gmail.com>
From: Joe Touch <touch@isi.edu>
Message-ID: <574F80FC.3040602@isi.edu>
Date: Wed, 01 Jun 2016 17:42:36 -0700
User-Agent: Mozilla/5.0 (Windows NT 6.3; WOW64; rv:38.0) Gecko/20100101 Thunderbird/38.7.2
MIME-Version: 1.0
In-Reply-To: <CALx6S35dCWUR9=A2Db7_+F8QkscnPxqY4R0O+0iaEa4o0=FZgg@mail.gmail.com>
Content-Type: text/plain; charset="utf-8"
Content-Transfer-Encoding: 7bit
X-MailScanner-ID: u520gbti021266
X-ISI-4-69-MailScanner: Found to be clean
X-MailScanner-From: touch@isi.edu
Archived-At: <http://mailarchive.ietf.org/arch/msg/int-area/eXv5aCF23floKv7zp-XwOGV5Dc8>
Cc: "int-area@ietf.org" <int-area@ietf.org>
Subject: Re: [Int-area] Call for adoption of draft-xu-intarea-ip-in-udp-03
X-BeenThere: int-area@ietf.org
X-Mailman-Version: 2.1.17
Precedence: list
List-Id: IETF Internet Area Mailing List <int-area.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/int-area>, <mailto:int-area-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/int-area/>
List-Post: <mailto:int-area@ietf.org>
List-Help: <mailto:int-area-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/int-area>, <mailto:int-area-request@ietf.org?subject=subscribe>
X-List-Received-Date: Thu, 02 Jun 2016 00:43:18 -0000


On 6/1/2016 5:34 PM, Tom Herbert wrote:
> On Wed, Jun 1, 2016 at 5:02 PM, Joe Touch <touch@isi.edu> wrote:
>> Oh, certainly if the intermediate layer's variant of fragmentation is
>> better than IP's, sure - SEAL has similar benefits.
>>
>> Your 4th bullet point is the one I hope we can start objecting to,
>> though - if IP can't allow fragments, it's not IP and we should simply
>> return that sort of mislabeled equipment (presuming it says "supports IP").
>>
> It's a conundrum. The reason that fragments aren't allowed is probably
> that packets with IP extension headers are being dropped contrary to
> RFC2460.

Several reasons:
1) IPv6 extension headers are more expensive to parse, and why build
hardware to parse them when you can simply drop them instead?
2) DPI devices tend to want to drop them too, because otherwise they
would need to reassemble first
        Reassembly at the DPI device is expensive (see #1).
        Reassembly at the DPI device is mistaken as violating the spec
(i.e., intermediate devices must not reassemble - but, by analogy, they
must not peek beyond the network layer too)
        DPI devices otherwise don't know how to handle fragments for
ECMP (but they could have a default for non-initial frags).
3) Both IPv4 and IPv6 fragments can be used as an endpoint DOS attack
(overload the reassembly buffer)

>  Since there is no interesting use case of extension headers,
> there's not much incentive for vendors to fix this (6man discussion).
IPsec?
IP routing headers?

In the past, the discussion on 6man and v6ops centered around
effectively deprecating extension headers. That tide has started to
turn, and now the view is to require support for at least a reasonable
chain.

> Even if vendors were forced by the protocol police to comply with
> RFC2460, packets with EH can be thrown into some ridiculously slow
> software path and they can claim standards compliance (like what
> happened with IP options)-- but that really does nothing to make them
> usable. Segment routing might be a compelling incentive, but I worry
> that might have too narrow deployment to change the overall mindset
> about EH.
Again (and again and again), we REALLY need a compliance arm of the
ISOC. If vendors had a "truth in advertising" requirement, they wouldn't
be able to claim 40Gbps line-rate forwarding without EH support.
>> On your last point regarding UDP ports, that should matter only for
>> IPv4. For IPv6, the flow ID is a better place to coordinate path
>> fate-sharing.
>>
> Agreed. I've been talking with engineers at Microsoft and they are
> looking into getting flow labels set in the next version of Windows,
> so non-zero IPv6 flow labels on the Internet should become the norm
> fairly soon! (IOS already sends them and I believe we are waiting for
> next Linux rebase in Android).

Yup - the better solution in all these cases is to fix broken stuff
first - the protocol only when the protocol is the thing that's broken.

Joe