Re: [Int-area] I-D Action: draft-ietf-intarea-frag-fragile-16.txt

Joe Touch <touch@strayalpha.com> Wed, 04 September 2019 15:51 UTC

Return-Path: <touch@strayalpha.com>
X-Original-To: int-area@ietfa.amsl.com
Delivered-To: int-area@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 6311D1208C2 for <int-area@ietfa.amsl.com>; Wed, 4 Sep 2019 08:51:34 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -1.218
X-Spam-Level:
X-Spam-Status: No, score=-1.218 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, DKIM_SIGNED=0.1, DKIM_VALID=-0.1, DKIM_VALID_AU=-0.1, HTML_MESSAGE=0.001, RCVD_IN_DNSWL_NONE=-0.0001, SPF_HELO_NONE=0.001, SPF_NEUTRAL=0.779, URIBL_BLOCKED=0.001] autolearn=no autolearn_force=no
Authentication-Results: ietfa.amsl.com (amavisd-new); dkim=pass (2048-bit key) header.d=strayalpha.com
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id yV-dQrQfYGvW for <int-area@ietfa.amsl.com>; Wed, 4 Sep 2019 08:51:32 -0700 (PDT)
Received: from server217-3.web-hosting.com (server217-3.web-hosting.com [198.54.115.226]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id C3AFE1208B2 for <int-area@ietf.org>; Wed, 4 Sep 2019 08:51:32 -0700 (PDT)
DKIM-Signature: v=1; a=rsa-sha256; q=dns/txt; c=relaxed/relaxed; d=strayalpha.com; s=default; h=Message-ID:References:In-Reply-To:Subject:Cc: To:From:Date:Content-Type:MIME-Version:Sender:Reply-To: Content-Transfer-Encoding:Content-ID:Content-Description:Resent-Date: Resent-From:Resent-Sender:Resent-To:Resent-Cc:Resent-Message-ID:List-Id: List-Help:List-Unsubscribe:List-Subscribe:List-Post:List-Owner:List-Archive; bh=4q8aYTWuEGOwXeoyPb8iMUMI68UTBFXQW2n4kai8jCA=; b=eUhrOj0M0JIFohnsmegQan3+9 3y4In62D/LcSne4SVHcoMmlZfgv5y2isk87sWJP2uan4Xoxml9Ny53xEvfam8Nze5ocJNm3hUmq/l 6oQnAMpDl7Zx0pzK+xGdzPWJwq5NJHdn0PG5FBm9dMSZTt75VZWds/cXklPvLFwEiY07vfe1UhmNI +gRQ6HHFvMyzCD9NLZXqd6r3AFsZe0+RSImLrkzMSVs+lwNtFlw8LfRw2ss9GF3lfJrC6+v4viRfw Yyv3BXhtzr2PrCkjQS3xiCjaDNXxVq+aPsF40Gjn83jpT9PWutPd6EiNZgSHlUwhnRiRl7Cd8rjgL fnnzVr27g==;
Received: from [::1] (port=40592 helo=server217.web-hosting.com) by server217.web-hosting.com with esmtpa (Exim 4.92) (envelope-from <touch@strayalpha.com>) id 1i5XZ9-001WPN-KU; Wed, 04 Sep 2019 11:51:32 -0400
MIME-Version: 1.0
Content-Type: multipart/alternative; boundary="=_a378168cab9fb4a826df3aec6c3a5bfa"
Date: Wed, 04 Sep 2019 08:51:27 -0700
From: Joe Touch <touch@strayalpha.com>
To: Bob Hinden <bob.hinden@gmail.com>
Cc: int-area <int-area@ietf.org>
In-Reply-To: <8551660F-9540-44BC-B775-7F15169E02ED@gmail.com>
References: <156720070159.25823.9907888750637231986@ietfa.amsl.com> <cbc82eaa42b9f2f1c19fc248825861fc@strayalpha.com> <8551660F-9540-44BC-B775-7F15169E02ED@gmail.com>
Message-ID: <2bd341ef8d41c19d6ccf303eca581a4c@strayalpha.com>
X-Sender: touch@strayalpha.com
User-Agent: Roundcube Webmail/1.3.7
X-OutGoing-Spam-Status: No, score=-1.0
X-AntiAbuse: This header was added to track abuse, please include it with any abuse report
X-AntiAbuse: Primary Hostname - server217.web-hosting.com
X-AntiAbuse: Original Domain - ietf.org
X-AntiAbuse: Originator/Caller UID/GID - [47 12] / [47 12]
X-AntiAbuse: Sender Address Domain - strayalpha.com
X-Get-Message-Sender-Via: server217.web-hosting.com: authenticated_id: touch@strayalpha.com
X-Authenticated-Sender: server217.web-hosting.com: touch@strayalpha.com
X-Source:
X-Source-Args:
X-Source-Dir:
X-From-Rewrite: unmodified, already matched
Archived-At: <https://mailarchive.ietf.org/arch/msg/int-area/hxi7cxSSp8ROj9Dn-03lZz7TkyU>
Subject: Re: [Int-area] I-D Action: draft-ietf-intarea-frag-fragile-16.txt
X-BeenThere: int-area@ietf.org
X-Mailman-Version: 2.1.29
Precedence: list
List-Id: IETF Internet Area Mailing List <int-area.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/int-area>, <mailto:int-area-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/int-area/>
List-Post: <mailto:int-area@ietf.org>
List-Help: <mailto:int-area-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/int-area>, <mailto:int-area-request@ietf.org?subject=subscribe>
X-List-Received-Date: Wed, 04 Sep 2019 15:51:42 -0000

Bob, 

On 2019-09-03 14:08, Bob Hinden wrote:

> Joe,
> 
>> On Aug 30, 2019, at 4:36 PM, Joe Touch <touch@strayalpha.com> wrote:
>> 
>> Hi, all,
>> 
>> I disagree with the changes indicated in this version.
>> 
>> The new text is both incorrect does not IMO reflect WG consensus.
>> 
>> It is simply false that "it WILL break" or "new protocols can't possibly know whether fragmentation works" - you even cite studies where this works the majority of the time (failing 37% for IPv6 DNS resolvers is succeeding 63%). This is not the same as ICMP-based MTU discovery. Users absolutely can test and know this.
>> 
>> I repeat my previous suggestion with caps for emphasis- that, LIKE ALL PROTOCOLS AND FEATURES IN THE INTERNET, IP fragmentation is not guaranteed to work on any given path and should be confirmed before being relied upon.
> 
> The relevant text in -16 is:
> 
> 6.1.  For Application and Protocol Developers
> 
> Developers SHOULD NOT develop new protocols or applications that rely
> on IP fragmentation.  When a new protocol or application is deployed
> in an environment that does not fully support IP fragmentation, it
> SHOULD operate correctly, either in its default configuration or in a
> specified alternative configuration.
> 
> While there may be controlled environments where IP fragmentation
> works reliably, this is a deployment issue and can not be known to
> someone developing a new protocol or application.  It is not
> recommended that new protocols or applications be developed that rely
> on IP fragmentation.  Protocols and applications that rely on IP
> fragmentation will fail to work on the Internet.
> 
> The text in the first paragraph is unchanged in this version of the draft and has been there for awhile.  The recommendation is still SHOULD NOT.   This does allow other usage if there is a good reason to do so.
> 
> The new second paragraph (written to resolve the DISCUSS comment) attempts to discuss the the controlled environment case. It clearly states it is a recommendation (along the lines of the SHOULD NOT) in the first paragraph and explains why.

It drops the idea that this is allowed - and is factually incorrect. 

First, this absolutely can be known to deployers. This is not like
silent ICMP too-big drops where the cause of the drop cannot be known. 

Second, it's already widely deployed to deal with IP-IP tunnels. 

> Note, personally I think, citing your case of failing 37% of the time, is consistent with "will fail to work on the Internet".

Failing 37% of the endpoints is not the same as failing 37% of the time.
And no, neither one is consistent with "will fail on the Internet". If
you think 37% = will fail, then I'll open a personal casino for you with
those odds for you to win... 

> Also, isn't this the reason why this draft exists, that is fragmentation is fragile.

There are differences of opinion even within the WG as to why this draft
exists. I would believe the authors believe as you state, but others of
us believe that "implementations are buggy" is more the take-home. The
WG and IETF last calls tried to strike a balance that this change
undoes. 

This is not respecting the view of the WG or IETF. 

Joe