RE: draft-bonica-6man-frag-deprecate

"Templin, Fred L" <Fred.L.Templin@boeing.com> Thu, 27 June 2013 18:56 UTC

Return-Path: <Fred.L.Templin@boeing.com>
X-Original-To: ipv6@ietfa.amsl.com
Delivered-To: ipv6@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id B58DC21F9ED2 for <ipv6@ietfa.amsl.com>; Thu, 27 Jun 2013 11:56:17 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -5.3
X-Spam-Level:
X-Spam-Status: No, score=-5.3 tagged_above=-999 required=5 tests=[AWL=1.300, BAYES_00=-2.599, RCVD_IN_DNSWL_MED=-4]
Received: from mail.ietf.org ([12.22.58.30]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id C7zMBJuzT8K1 for <ipv6@ietfa.amsl.com>; Thu, 27 Jun 2013 11:56:12 -0700 (PDT)
Received: from stl-mbsout-02.boeing.com (stl-mbsout-02.boeing.com [130.76.96.170]) by ietfa.amsl.com (Postfix) with ESMTP id 59EE821F9EDB for <ipv6@ietf.org>; Thu, 27 Jun 2013 11:56:12 -0700 (PDT)
Received: from stl-mbsout-02.boeing.com (localhost.localdomain [127.0.0.1]) by stl-mbsout-02.boeing.com (8.14.4/8.14.4/DOWNSTREAM_MBSOUT) with ESMTP id r5RIuA0w010725 for <ipv6@ietf.org>; Thu, 27 Jun 2013 13:56:10 -0500
Received: from XCH-NWHT-11.nw.nos.boeing.com (xch-nwht-11.nw.nos.boeing.com [130.247.25.114]) by stl-mbsout-02.boeing.com (8.14.4/8.14.4/UPSTREAM_MBSOUT) with ESMTP id r5RIu9DE010707 (version=TLSv1/SSLv3 cipher=RC4-MD5 bits=128 verify=OK); Thu, 27 Jun 2013 13:56:09 -0500
Received: from XCH-BLV-208.nw.nos.boeing.com (10.57.37.5) by XCH-NWHT-11.nw.nos.boeing.com (130.247.25.114) with Microsoft SMTP Server (TLS) id 8.3.297.1; Thu, 27 Jun 2013 11:56:08 -0700
Received: from XCH-BLV-504.nw.nos.boeing.com ([169.254.4.48]) by XCH-BLV-208.nw.nos.boeing.com ([169.254.8.102]) with mapi id 14.02.0328.011; Thu, 27 Jun 2013 11:56:08 -0700
From: "Templin, Fred L" <Fred.L.Templin@boeing.com>
To: Antonios Atlasis <antonios.atlasis@gmail.com>, "ipv6@ietf.org" <ipv6@ietf.org>
Subject: RE: draft-bonica-6man-frag-deprecate
Thread-Topic: draft-bonica-6man-frag-deprecate
Thread-Index: AQHOc2S/UZaGJnzSMU6ZOUB9nA7EbJlJ45pw
Date: Thu, 27 Jun 2013 18:56:08 +0000
Message-ID: <2134F8430051B64F815C691A62D983180AECDE@XCH-BLV-504.nw.nos.boeing.com>
References: <2CF4CB03E2AA464BA0982EC92A02CE2509F85151@BY2PRD0512MB653.namprd05.prod.outlook.com> <51C32FA9.1090207@gmail.com> <2CF4CB03E2AA464BA0982EC92A02CE2509F85F38@BY2PRD0512MB653.namprd05.prod.outlook.com> <20130624204008.GB3647@virgo.local> <20130624205226.GC3647@virgo.local> <2CF4CB03E2AA464BA0982EC92A02CE2509F8761C@BY2PRD0512MB653.namprd05.prod.outlook.com> <51C902DC.9000408@gmail.com> <m24ncmaozs.wl%randy@psg.com> <2EA20F89-02F5-4D06-90EE-A7D2974045A3@employees.org> <m2li5yj7u3.wl%randy@psg.com> <8C48B86A895913448548E6D15DA7553B9268E3@xmb-rcd-x09.cisco.com> <m2ehbpij86.wl%randy@psg.com> <51CB91E4.5090603@gmail.com> <CADoTVZLe=dm+JhMSAxFiAYpUMG=T-cUFdtkdHtmzmebG9=Dujw@mail.gmail.com>
In-Reply-To: <CADoTVZLe=dm+JhMSAxFiAYpUMG=T-cUFdtkdHtmzmebG9=Dujw@mail.gmail.com>
Accept-Language: en-US
Content-Language: en-US
X-MS-Has-Attach:
X-MS-TNEF-Correlator:
x-originating-ip: [130.247.104.6]
Content-Type: text/plain; charset="iso-8859-1"
Content-Transfer-Encoding: quoted-printable
MIME-Version: 1.0
X-TM-AS-MML: disable
X-BeenThere: ipv6@ietf.org
X-Mailman-Version: 2.1.12
Precedence: list
List-Id: "IPv6 Maintenance Working Group \(6man\)" <ipv6.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/ipv6>, <mailto:ipv6-request@ietf.org?subject=unsubscribe>
List-Archive: <http://www.ietf.org/mail-archive/web/ipv6>
List-Post: <mailto:ipv6@ietf.org>
List-Help: <mailto:ipv6-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/ipv6>, <mailto:ipv6-request@ietf.org?subject=subscribe>
X-List-Received-Date: Thu, 27 Jun 2013 18:56:18 -0000

Hi,

> a. Tiny fragments (smaller than 1280 bytes) should not be accepted (unless they are atomic fragments or > the last fragment of a datagram).

I disagree that all fragments less than 1280 bytes should be classified
as "tiny fragments". For nested tunnels, for example, the first tunnel
ingress may wish to fragment to a smaller size (e.g. 1024 bytes) so that
subsequent tunnel ingresses do not have to fragment further. I think a
"tiny fragment" is simply an initial fragment that does not include all
extension headers plus upper layer headers.

On the other hand, SEAL fragments cannot be smaller than 256bytes
so there is no possible way to create a truly tiny SEAL first fragment.
SEAL also requires the sender to include all upper layer headers in
the first fragment unless they absolutely cannot fit due to a size
restriction.

> b. RFC 5722 should be updated so as only the overlapping fragments to be dropped, not all the ones
> already received, or the ones that follow (as it is the recommendation now). This is already
> implemented by FreeBSD and seems to me the most proper way for handling overlapping fragments.

SEAL has a strategy for dealing with overlapping fragments. It would
be interesting to hear whether it meets your understanding of how best
to handle overlaps because we can still make changes now if something
doesn't look right.

> We should also never forget that the rest of IPvt6Extension headers can result in datagrams much
> bigger than 1280 bytes, 1500 bytes, or even more. So, if you want to deprecate fragmentation in IPv6,
> you should also deprecate or at least change the extension headers usage in IPv6. Which actually means,
> redesign IPv6.

I agree that excessively-long extension headers are problematic
in any case - especially if the length of the extension headers
exceeds the effective path MTU. That needs to be fixed no matter
what frag/reass scheme is applied.

Thanks - Fred
fred.l.templin@boeing.com
 
> Just my 0.02$

Antonios

2013/6/27 Brian E Carpenter <brian.e.carpenter@gmail.com>
Cutting to the chase, and assuming that the next version
will have more analysis and observational evidence, I'm thinking
something like the following:

3.  Recommendation

   This memo deprecates IPv6 fragmentation and the IPv6 fragment header.
   Application and transport layer protocols SHOULD support effective
   PMTU discovery [RFC4821], since ICMP-based PMTU discovery [RFC1981]
   is unreliable. Any application or transport layer protocol that
   cannot support effective PMTU discovery MUST NOT in any circumstances
   send IPv6 packets that exceed the IPv6 minimum MTU of 1280 bytes.

   IPv6 stacks and forwarding nodes SHOULD continue to support inbound
   fragmented IPv6 packets as specified in [RFC2460]. However, this
   requirement exceeds the capability of some types of forwarding node
   such as firewalls and load balancers. Therefore implementers and
   operators need to be aware that on many paths through the Internet,
   IPv6 fragmentation will fail. Legacy applications and transport layer
   protocols that do not conform to the previous paragraph can expect
   connectivity failures as a result.
--------------------------------------------------------------------
IETF IPv6 working group mailing list
ipv6@ietf.org
Administrative Requests: https://www.ietf.org/mailman/listinfo/ipv6
--------------------------------------------------------------------