Re: Non-Last Small IPv6 Fragments

Tom Herbert <tom@herbertland.com> Mon, 14 January 2019 22:24 UTC

Return-Path: <tom@herbertland.com>
X-Original-To: ipv6@ietfa.amsl.com
Delivered-To: ipv6@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 9D3C51313EA for <ipv6@ietfa.amsl.com>; Mon, 14 Jan 2019 14:24:54 -0800 (PST)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -2.041
X-Spam-Level:
X-Spam-Status: No, score=-2.041 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, DKIMWL_WL_MED=-0.142, DKIM_SIGNED=0.1, DKIM_VALID=-0.1, RCVD_IN_DNSWL_NONE=-0.0001, URIBL_BLOCKED=0.001] autolearn=ham autolearn_force=no
Authentication-Results: ietfa.amsl.com (amavisd-new); dkim=pass (2048-bit key) header.d=herbertland-com.20150623.gappssmtp.com
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id jP9wyA21bmuE for <ipv6@ietfa.amsl.com>; Mon, 14 Jan 2019 14:24:51 -0800 (PST)
Received: from mail-qt1-x82a.google.com (mail-qt1-x82a.google.com [IPv6:2607:f8b0:4864:20::82a]) (using TLSv1.2 with cipher ECDHE-RSA-AES128-GCM-SHA256 (128/128 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id 586EA131406 for <ipv6@ietf.org>; Mon, 14 Jan 2019 14:24:51 -0800 (PST)
Received: by mail-qt1-x82a.google.com with SMTP id p17so893949qtl.5 for <ipv6@ietf.org>; Mon, 14 Jan 2019 14:24:51 -0800 (PST)
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=herbertland-com.20150623.gappssmtp.com; s=20150623; h=mime-version:references:in-reply-to:from:date:message-id:subject:to :cc:content-transfer-encoding; bh=B3VMxFoUcwiocQsCHuh4VXnzm56RGkGY84ycKJ6qoAs=; b=tynQZQGosSMMH3ATeX3nPOwnQJDg9BjtdO/X5wNbb0H1b8kTCBG/di0RCH2FzlvQMO SZOEU6XpOmTIgtY1bkl3bSNlxpcshEUlTsnFqImeHCL+YOwaYG3SL4L2RcTDYSscQvbJ 4fwcgvP+Yptb3sTh8q6VC4wVujDw77tLCW2NnFLldhyXPQtZPOVDOKYmpA4/f6SObBLx 1rqRc31tD8EKH/K+WIojhQlsHUjHVXixL538IC+5LZ9f/gFMcS0fOinPlmYykRf607yQ TjcHHeyQ0Gr4nmIHCUqjzRqg00liX81tYrH6NIP8bb8lwQGvBBMCqUWG41SBcnbnt1LC MiNQ==
X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20161025; h=x-gm-message-state:mime-version:references:in-reply-to:from:date :message-id:subject:to:cc:content-transfer-encoding; bh=B3VMxFoUcwiocQsCHuh4VXnzm56RGkGY84ycKJ6qoAs=; b=FXdRXC8a18AV/9Fh8wIurQbMdK46GsUDgVwvoqj4c7g7eiPxZ4AZbyHqU6mmbZZs+l MpCIQ4aRLkVzJDMZ5i4qaGyaqHY8Wt9vMf40Hr+6VAPTHGXDEHteL0L+VWD6xtTXvwpw 61LjaikNn8amc0UJCqz85xKU8xq7Z0TGGKtt+GQ73/BkKK8rC/XnIHLxVn/KLNtX/91w vNoQClPyw/aMIlve/Dm68f1K7OQIzH1pAmv/HFnyiVv99d902096oBWVv6uKIRIp+zzE s3YhAbCBdqWVeoqWmjlZ28113I3H5qws7Ldeu96tibMCe7+OlAjo1QWRT8YygqhF56cg wbfw==
X-Gm-Message-State: AJcUukd4+D5iiSp5iSzkspWoh4Z+1nXj15yAp9DpK/Z0DEEYhS8D6xKu zvUoFWzfFPUv7RS81eoUwZVJMSnbXjtFI+yCW2ayPJUcKMw=
X-Google-Smtp-Source: ALg8bN5gRZYQDSH6oo3GCiAHFX6jETV3k/mehpfU/wZ8pDcjQzkUQMDef/1aDt/xaBMuaN4J6vekdGeEZt43BAgLzhE=
X-Received: by 2002:aed:38c6:: with SMTP id k64mr532830qte.97.1547504690162; Mon, 14 Jan 2019 14:24:50 -0800 (PST)
MIME-Version: 1.0
References: <CAOSSMjV0Vazum5OKztWhAhJrjLjXc5w5YGxdzHgbzi7YVSk7rg@mail.gmail.com> <CALx6S35KNhV2gFp9OdU+M1zy5WUuEAEvXkDXNDWWxi7uQ4e_cw@mail.gmail.com> <CAN-Dau0rTdiiF2SjByxcMG6nhPCEjUH2pYBCOeK_FSGJ_ucDQw@mail.gmail.com> <CALx6S34AyV9OpvnjQhQc56n5vfeVgU5Zd3kheP0g+XvsMbBV9g@mail.gmail.com> <1b2e318e-1a9f-bb5d-75a5-04444c42ef20@si6networks.com> <CALx6S37TJr++fC=pVoeS=mrO1fHc4gL_Wtu-XkVTswzs2XxXCA@mail.gmail.com> <CALx6S36V7vrVyoTP0G6+S5XeFNB3KWS5UaNnVi20xogRERdCfg@mail.gmail.com> <973A1649-55F6-4D97-A97F-CEF555A4D397@employees.org> <CALx6S34YbBe8xBod3VsWVO33TpZcdxh2uV1vaO8Z_NKnVXp66g@mail.gmail.com> <A3C3F9C0-0A07-41AF-9671-B9E486CB8246@employees.org> <AEA47E27-C0CB-4ABE-8ADE-51E9D599EF8F@gmail.com> <6aae7888-46a4-342d-1d76-10f8b50cebc4@gmail.com> <EC9CC5FE-5215-4105-8A34-B3F123D574B9@employees.org> <4c56f504-7cd7-6323-b14a-d34050d13f4e@foobar.org> <9E6D4A6E-8ABA-4BAB-BEC5-969078323C96@employees.org> <CAAedzxpdF+yhBXfnwUcaQb-HkgdaqXRU3L+S7v8sS1F0OkwM9A@mail.gmail.com> <CAAedzxpjxhP0nOZVU0CTwA1u3fsPFthrJASjDEfnLcRNvr2gBQ@mail.gmail.com> <88A6B125-C80C-4E13-959D-DFC37FF9F74E@employees.org> <CAAedzxoPh-QBB7SkzOUc86f5NFS3u8cyqRPoNOsjoAzM29R_sw@mail.gmail.com>
In-Reply-To: <CAAedzxoPh-QBB7SkzOUc86f5NFS3u8cyqRPoNOsjoAzM29R_sw@mail.gmail.com>
From: Tom Herbert <tom@herbertland.com>
Date: Mon, 14 Jan 2019 14:24:38 -0800
Message-ID: <CALx6S37syFyvd5Pwru79tt0xduH6+AW2GTiiA_g2fiX3TdY3sw@mail.gmail.com>
Subject: Re: Non-Last Small IPv6 Fragments
To: Erik Kline <ek@loon.co>
Cc: Ole Troan <otroan@employees.org>, Bob Hinden <bob.hinden@gmail.com>, IPv6 List <ipv6@ietf.org>, Fernando Gont <fernando@gont.com.ar>
Content-Type: text/plain; charset="UTF-8"
Content-Transfer-Encoding: quoted-printable
Archived-At: <https://mailarchive.ietf.org/arch/msg/ipv6/3JLQV2sKIwAqyrzeuQ8cdI4CCTQ>
X-BeenThere: ipv6@ietf.org
X-Mailman-Version: 2.1.29
Precedence: list
List-Id: "IPv6 Maintenance Working Group \(6man\)" <ipv6.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/ipv6>, <mailto:ipv6-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/ipv6/>
List-Post: <mailto:ipv6@ietf.org>
List-Help: <mailto:ipv6-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/ipv6>, <mailto:ipv6-request@ietf.org?subject=subscribe>
X-List-Received-Date: Mon, 14 Jan 2019 22:24:54 -0000

On Mon, Jan 14, 2019 at 2:04 PM Erik Kline <ek@loon.co> wrote:
>
> Clearly I'm way behind in my document reading!!
>
Erik,

Please look at draft-herbert-fast-03 also. This protocol agnostic and
secure way for applications to signal the network. In order fo this to
work, as well as other similar proposals in MTU reporting and in-situ
OAM, we really need Hop-by-Hop extension header to at least pass
though intermediate nodes.

Tom

> I'd just add that it seems reasonable to see about broader Internet
> usage at some point.
>
> On Mon, 14 Jan 2019 at 13:34, Ole Troan <otroan@employees.org> wrote:
> >
> >
> >
> > On 14 Jan 2019, at 21:40, Erik Kline <ek@loon.co> wrote:
> >
> > On Sun, 13 Jan 2019 at 22:24, Fernando Gont <fernando@gont.com.ar> wrote:
> >
> >
> > Hi, Erik,
> >
> >
> > On 14/1/19 02:19, Erik Kline wrote:
> >
> >
> > Ole Troan wrote on 13/01/2019 20:03:
> >
> > Let’s fix path MTU discovery. There’s no fix for fragmentation.
> >
> >
> > pmtu discovery is hard because it needs a way for an intermediate
> >
> >    node to be able to signal a transmitting node to dynamically drop
> >
> >    the MTU if network conditions change.  The only way to reliably work
> >
> >    around this is to transmit at 1280 and claim implementation /
> >
> >    operational breakage if this cannot get through.  This, however,
> >
> >    robs the host devices of the ability to use higher MTUs.
> >
> >
> >    “Fix” as in something different than rfc8201.
> >
> >
> >
> > How about a version of the fragment header that:
> >
> >
> >    (a) *always* has the L4 header (or a configurable number of bytes)
> >
> > in every non-first fragment
> >
> >
> > This could be documented on a per-L4+ basis how much needs to be
> >
> > included, i.e. we could have one doc for UDP and (say) a separate doc
> >
> > for information QUIC would need on a per-fragment basis.
> >
> >
> > If you are requiring that the first frag always contains the L4 ehader,
> >
> > that's already achieved by RFC7112.
> >
> >
> > Not what I suggested.  I said every fragment header would include the
> > L4 header (or other specifiable bytes).
> >
> > If you really mean that the FH contains the L4 header, then:
> >
> >
> > * There's the issue of EHs in the fragmentable part
> >
> >
> > That would be addressed in an associated L4 doc, and it would probably
> > say to ignore non-transport headers.
> >
> > * It may be hard to enforce in the presence of tunnels, unless the
> >
> > tunnel reassembles and refragments where necesary
> >
> >
> >
> > Still, that doesn't solve the biggest issues with fragmention:
> >
> >
> > * a stateful operation for anotherwise stateless protocol
> >
> >
> > * i'd argue that for the IPv6 case, one of the base reasons for which
> >
> > fragments are dropped is because they employ EHs
> >
> >
> >
> >
> > This increases the overhead in a given fragment, but also helps to
> >
> > ensure that (eventually) intermediate systems can examine this field and
> >
> > preemptively make a drop/no-drop decision.
> >
> >
> > Then we're back on draft-gont-v6ops-ipv6-ehs-packet-drops
> >
> >
> > Understood, but any L3 solution is going to necessitate running into
> > this.  UDP trailers is certainly cute (and +1 from me), but every
> > transport will have to have some similar fix (or applications will
> > have to consider rfc8085#section-3.2 type guidelines).  If there's to
> > be an L3 solution to this L3 problem it will face some deployment
> > issues but if its usefulness is sufficiently attractive it could find
> > reasonably wide-spread support in due time (in the absence of ipng-ng,
> > IPv6 is it for the long haul).
> >
> > [Silly Idea #1]
> >
> > (/me thinks back to spud bof)
> >
> > Here's another random suggestion that maybe belongs in panrg or (more
> > likely) the dumpster:
> >
> > A new hop-by-hop header under "00 1", i.e.
> >
> >    00 - skip over this option and continue processing the header
> >
> >    1 - Option Data may change en route
> >
> > of the form, for example, Option Type 00 1 00001, Opt Data Len 2,
> > Option Data == MTU.  Here, the observation is that the main thing we
> > have experience with "working" (for the most generous definition of
> > "works") in this problemspace in the internet today is TCP MSS
> > Clamping.  So let's have an MTU (or MSS) HbH option that can be
> > revised monotonically downwards but never lower than 1280.  If it
> > helps pad to 8 byte alignment we can have a 2nd 2-byte field that is
> > untouched representing the sender's original MTU/MSS.
> >
> > In this way, a sender could include an HbH with either:
> >
> >    [HbH | 0 | 0x0202 | 2 | (1500=0x5dc) | Pad1 | Pad1]
> >
> > or
> >
> >    [HbH | 0 | 0x0202 | 4 | (1500=0x5dc) | (1500=0x5dc) ]
> >
> > with one of the MTU/MSS fields to be munged along the path.
> >
> > If this were the only HbH option included it adds only 8 bytes, fits
> > (along with most L4 headers) within a 128 byte hardware classifier,
> > and end systems could explore its usefulness via ping.  (Separately,
> > there could of course be sockopt/cmsg things to set/get the values.)
> >
> >
> > https://tools.ietf.org/html/draft-hinden-6man-mtu-option-00
> >
> >
> >
> > [Silly Idea #2]
> > Separate, even sillier idea: everyone converges on using 16 bits of
> > the flow ID to encode the lowest MTU encountered along the path.  Here
> > again, TCP MSS clamping style behaviour would be applied to this
> > field.
>
> --------------------------------------------------------------------
> IETF IPv6 working group mailing list
> ipv6@ietf.org
> Administrative Requests: https://www.ietf.org/mailman/listinfo/ipv6
> --------------------------------------------------------------------