Re: TSV-ART Telechat review of draft-ietf-6man-rfc1981bis-04

Bob Hinden <bob.hinden@gmail.com> Fri, 17 March 2017 23:31 UTC

Return-Path: <bob.hinden@gmail.com>
X-Original-To: ipv6@ietfa.amsl.com
Delivered-To: ipv6@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id AE03C12955D; Fri, 17 Mar 2017 16:31:38 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -2.699
X-Spam-Level:
X-Spam-Status: No, score=-2.699 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, DKIM_SIGNED=0.1, DKIM_VALID=-0.1, DKIM_VALID_AU=-0.1, FREEMAIL_FROM=0.001, RCVD_IN_DNSWL_LOW=-0.7, SPF_PASS=-0.001, URIBL_BLOCKED=0.001] autolearn=ham autolearn_force=no
Authentication-Results: ietfa.amsl.com (amavisd-new); dkim=pass (2048-bit key) header.d=gmail.com
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id n92xgTLhk1yH; Fri, 17 Mar 2017 16:31:36 -0700 (PDT)
Received: from mail-qt0-x22f.google.com (mail-qt0-x22f.google.com [IPv6:2607:f8b0:400d:c0d::22f]) (using TLSv1.2 with cipher ECDHE-RSA-AES128-GCM-SHA256 (128/128 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id A4F3C127419; Fri, 17 Mar 2017 16:31:36 -0700 (PDT)
Received: by mail-qt0-x22f.google.com with SMTP id i34so74652870qtc.0; Fri, 17 Mar 2017 16:31:36 -0700 (PDT)
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=gmail.com; s=20161025; h=from:message-id:mime-version:subject:date:in-reply-to:cc:to :references; bh=P3kh5vmzno6W3bkaQjzPsLbPzLVzrDaccTzCh3Z/Puk=; b=Z5/8h26rd2OSNRjnEnu/Nam+wi7vLTamEumOT2T7L6z+5HtSNGeLRqdTH1JzRZJ4iJ bO4X/odOkBF/5fXRbwG76XHT4af9KwxTijWoPqxe91EWXrsUSVAt0w7qZIuLG9RV8W6J Zr9l3SpUi7XN1sfo4toKxk80Mu1DVOnNLwFwodMcg7NNLSpuuxa0IUn29G+m3gicE/c1 BDhyRnRO7ixm0dIzv9ZnpbbixNgK7HmuWslcNo4xnwDVrtHl6uQijF3YynzXfYal/VM6 TG+r1T3PzHSnFYgLDCBORDkHCyJbx/UoJbs8jPN5g6yW6mMFkZKyGRX9d5Y9mROGbkqW UwOg==
X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20161025; h=x-gm-message-state:from:message-id:mime-version:subject:date :in-reply-to:cc:to:references; bh=P3kh5vmzno6W3bkaQjzPsLbPzLVzrDaccTzCh3Z/Puk=; b=JeURKBvFzff91FVV/F493zdlx16XFwfzoFNEyqr85bRVId2aOitgkSIETuKB8aa4qn 5p86O8vqLw7x/10GIt26Z/6w56TVI5jhuXXj6CkRmkAD79Bl5M/oORWWtTkXE0zyrg/n w2aobqvcfyteTFsm0OYyZd82XkcLEe9qp2+kVsV3pftx40ctwyh97gHHdtwoiZhho1FR agmp1gt0PU+GHtvtICCcCZYqKR5+sDRh7cutdCUeTyBJgjL1Y8a5mkG80IJRtOaaPaPG D0Y8rblk5/xmf7Eq863XCOz5sY8OlqzzVoEz/m+K1Gn3nORnoJS1mlZgEmiju6DqXPlw 835w==
X-Gm-Message-State: AFeK/H1CSvWhF0aGlqXXLcE+F2HNtmSFTXNvkKiXfpCkiVjYswuzlYF8kmzycuMGlmMH/g==
X-Received: by 10.200.55.82 with SMTP id p18mr10438020qtb.285.1489793495725; Fri, 17 Mar 2017 16:31:35 -0700 (PDT)
Received: from [172.16.224.219] ([209.97.127.34]) by smtp.gmail.com with ESMTPSA id g143sm1292831qke.58.2017.03.17.16.31.34 (version=TLS1_2 cipher=ECDHE-RSA-AES128-GCM-SHA256 bits=128/128); Fri, 17 Mar 2017 16:31:34 -0700 (PDT)
From: Bob Hinden <bob.hinden@gmail.com>
Message-Id: <8D6CA1F7-CB01-4FCD-B81C-ECBEFC088EAE@gmail.com>
Content-Type: multipart/signed; boundary="Apple-Mail=_7CD741D0-B121-4CF5-9FE3-E64C534B4913"; protocol="application/pgp-signature"; micalg="pgp-sha512"
Mime-Version: 1.0 (Mac OS X Mail 10.2 \(3259\))
Subject: Re: TSV-ART Telechat review of draft-ietf-6man-rfc1981bis-04
Date: Fri, 17 Mar 2017 16:31:32 -0700
In-Reply-To: <46d7ae23-cf3d-570d-3d79-9d915663cf16@isi.edu>
Cc: Bob Hinden <bob.hinden@gmail.com>, "tsv-art@ietf.org" <tsv-art@ietf.org>, IESG <iesg@ietf.org>, IPv6 List <ipv6@ietf.org>
To: Joe Touch <touch@isi.edu>
References: <48bfa3a1-e53c-6b31-69b0-2645ddd5937f@isi.edu> <41A44496-F222-40D5-95FE-5CE142C3827F@gmail.com> <46d7ae23-cf3d-570d-3d79-9d915663cf16@isi.edu>
X-Mailer: Apple Mail (2.3259)
Archived-At: <https://mailarchive.ietf.org/arch/msg/ipv6/0bh8iSn-9GX8eKiKP9jep7lPnKY>
X-BeenThere: ipv6@ietf.org
X-Mailman-Version: 2.1.22
Precedence: list
List-Id: "IPv6 Maintenance Working Group \(6man\)" <ipv6.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/ipv6>, <mailto:ipv6-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/ipv6/>
List-Post: <mailto:ipv6@ietf.org>
List-Help: <mailto:ipv6-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/ipv6>, <mailto:ipv6-request@ietf.org?subject=subscribe>
X-List-Received-Date: Fri, 17 Mar 2017 23:31:39 -0000

Joe,

I think this will be up to the AD and IESG.

If you (and others) want to work on a major update, I am happy to share the XML.  I hope we don’t end up with can’t move the current document forward, and no one wants to do a major update.

Thanks,
Bob

> On Mar 17, 2017, at 3:54 PM, Joe Touch <touch@isi.edu> wrote:
> 
> Hi, Bob (et al.),
> 
> Although I appreciate the goal of avoiding a major rewrite, I cannot see
> how to advance this document with these substantive errors intact.
> Moving forward in its current state propagates these errors.
> 
> Note that there are also two points below that you did not address:
> 
> - item #4 about ECMP
> 
> - the minor issue bullet point about the need for fragmentation
> 
> I'll hold off suggesting text as requested below until you decide how to
> proceed.
> 
> Joe
> 
> 
> On 3/17/2017 2:57 PM, Bob Hinden wrote:
>> Joe,
>> 
>> Thanks for the detailed review.
>> 
>> Several of the reviews have suggested significant changes to this document.  The working group was trying to make a few changes to bring it into alignment with some changes to rfc2460bis (based on updating documents).  It was not attempting a major rewrite when advancing it to Internet Standard.  The alternative that the working group discussed was to file errata on RFC1981 and leave it to a future document update.
>> 
>> I don’t think many of these changes can be done and still advance it to Internet Standard. If we can’t advance the current document, then the w.g. may want to just do the errata and withdraw the advancement request.  Of course, if people want to work on a revision of IPv6 Path MTU Discovery, it would be welcomed, but it won’t be able to advanced to Internet Standard.
>> 
>> Comments below.
>> 
>> Thanks,
>> Bob
>> 
>>> On Feb 15, 2017, at 1:51 PM, Joe Touch <touch@isi.edu> wrote:
>>> 
>>> Document: draft-ietf-6man-rfc1981bis-04
>>> Reviewer: Joe Touch
>>> Review Date: February 15, 2017
>>> IETF LC End Date: March 3, 2017
>>> IESG Telechat date: February 28, 2017
>>> 
>>> Review result: significant issues
>>> 
>>> NOTE: some of this review is informed by tracking some of the issues raised by others on the IETF list, notably Gorry Fairhurst.
>> In my response to Gorry, I proposed some changes to the document.
>> 
>>> Major issues:
>>> 
>>> 1) the current text is insufficiently realistic about the (in)ability of this mechanism to operate in current networks, regardless of the support for generating ICMPs at routers or PMTUD support at endpoints, due to ICMP filtering for security reasons. [this comment is already being addressed by consensus text]
>> 
>> As far as I can tell, we don’t have much much information on how much ICMPv6 PTB messages is filter or not.  It’s clearly a problem with IPv4 ICMP PTB, but I haven’t see any recent data regarding ICMPv6 PTB messages.  IPv6 deployment has increased significantly since the last data I saw and it may or may not be a significant problem.
>> 
>> 
>>> 2) the current text is insufficiently clear on on the difference between the path MTU, which determines the largest supported IPv6 fragment, vs. the effective MTU to receive (EMTU_R), which determines the largest IP packet that can transit between the source and destination. The document should be more explicit throughput about its goal being to manage or avoid IPv6 source fragmentation rather than about source to destination packet maximums, and in specific in clearly referring to maximum fragments or atomic packets rather than maximum packets.
>>> 
>>> E.g.: see the following text, which is incorrect in its current form:
>>>   Nodes not implementing Path MTU Discovery use the IPv6 minimum link
>>>   MTU defined in [
>>> I-D.ietf-6man-rfc2460bis
>>> ] as the maximum packet size.
>>> 
>>> The value used by either Path MTU Discovery or its default represents the path MTU, which is the largest IPv6 *fragment* (or atomic packet, see RFC6864) that can be supported on the path between the endpoints. The maximum IP packet size is limited by the effective MTU to receive (EMTU_R) [RFC1122], which is at least 1500 bytes for IPv6 and not necessarily related to the link MTUs. The text should also clearly indicate that there is no ICMP mechanism for determining larger EMTU_R support.
>>> 
>>> E.g., the following text is also incorrect in its current form:
>>>   The value sent in the TCP MSS option is independent of the PMTU.
>>>   This MSS option value is used by the other end of the connection,
>>>   which may be using an unrelated PMTU value.
>>> 
>>> The first sentence is correct because TCP MSS is related to EMTU_R (and needs to account for headers, as per RFC6691), and EMTU_R is not directly related to the PMTU (except that it would never be smaller than the PMTU). The MSS option is calculated from EMTU_R, not PMTU.
>>> 
>>> In addition, it should be noted that ICMPv6 PTB messages are NOT sent when source fragmentation is enabled.
>> I think these are all good issues to cover in a rewrite, but I don’t see how they can be done now.
>> 
>>> 3. need verification of current support for some features, esp. regarding TCP and NFS interactions
>>> See Gorry's note of 2/14/17
>> Please see my responses to his review.
>> 
>>> 4. the concept of a single path MTU value between two IP addresses does not account for multipath routing, e.g., ECMP (as currently deployed, noted in RFC7690, which should be cited) or BANANA (and its solutions in development) See Fred Templin's posts on this on 2/15/17
>>> 
>>> Minor issues:
>>> 
>>> - some of the updates and/or current text could be updated to reflect current terminology or practice. See Gorry Fairhursts's post of 2/14/17
>> I suggest some changes to address some of the issues he raised.
>> 
>>> - fragmentation, while considered harmful and costly, is absolutely necessary to support tunnels even in the presence of PMTUD. The text on this issue should reflect this reality.
>>> 
>>> - the requirement that transports be notified of PTB messages might usefully cite the corresponding IPv4, TCP, and UDP sections of RFC1122
>> I think that is doable.  Please suggest some specific text.
>> 
>> 
>>> - section 5.4 should cite and include context from RFC6691, especially including a discussion of the impact of variable IP EHs on the interaction between TCP MSS and ICMP PTB
>>> 
>> Please suggest some specific text.
>> 
>> 
>> 
>> 
>>> --
>>> 
>>> 
>>> 
>>> 
>>> --------------------------------------------------------------------
>>> IETF IPv6 working group mailing list
>>> ipv6@ietf.org
>>> Administrative Requests: https://www.ietf.org/mailman/listinfo/ipv6
>>> --------------------------------------------------------------------
> 
>