Re: draft-van-beijnum-multi-mtu-05.txt

otroan@employees.org Thu, 07 April 2016 13:27 UTC

Return-Path: <otroan@employees.org>
X-Original-To: ipv6@ietfa.amsl.com
Delivered-To: ipv6@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id EE54A12D840 for <ipv6@ietfa.amsl.com>; Thu, 7 Apr 2016 06:27:13 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -2.011
X-Spam-Level:
X-Spam-Status: No, score=-2.011 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, DKIM_SIGNED=0.1, DKIM_VALID=-0.1, DKIM_VALID_AU=-0.1, SPF_PASS=-0.001, T_RP_MATCHES_RCVD=-0.01] autolearn=ham autolearn_force=no
Authentication-Results: ietfa.amsl.com (amavisd-new); dkim=pass (1024-bit key) header.d=employees.org; domainkeys=pass (1024-bit key) header.from=otroan@employees.org header.d=employees.org
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id JV6j45XE8nr8 for <ipv6@ietfa.amsl.com>; Thu, 7 Apr 2016 06:27:12 -0700 (PDT)
Received: from cowbell.employees.org (cowbell.employees.org [65.50.211.142]) (using TLSv1.2 with cipher AECDH-AES256-SHA (256/256 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id 1E1D912D841 for <ipv6@ietf.org>; Thu, 7 Apr 2016 06:27:12 -0700 (PDT)
Received: from cowbell.employees.org (localhost [127.0.0.1]) by cowbell.employees.org (Postfix) with ESMTP id AC422D789D; Thu, 7 Apr 2016 06:27:10 -0700 (PDT)
DKIM-Signature: v=1; a=rsa-sha1; c=relaxed; d=employees.org; h=subject :mime-version:content-type:from:in-reply-to:date:cc:message-id :references:to; s=selector1; bh=rK2KdxnJMbeVjlxXTMy9mkrYEcQ=; b= BpRadVpzoDp8WyMOtYr3LClt6YaXHU/sAiIDvhrl3UAT98Hwus6pvih4kA9IE4eI G13umZF3F09RG6PAEnYktNC8FeeUoev+sj3mUbtZT/d+CApB0cY1qbvoJP+noIBC xSbhvcx/M4Qm71YVRpKax+26TcPMAPtMfgxCwN7Z7YQ=
DomainKey-Signature: a=rsa-sha1; c=nofws; d=employees.org; h=subject :mime-version:content-type:from:in-reply-to:date:cc:message-id :references:to; q=dns; s=selector1; b=V4mR6jFLV+RYsfusLndfroPLdO RSB77ZmTNH6+g0GpUUt4Q/bsHsNNWrOLrkI8tbcPn76OmUUEqWQKn5Q2zz9c0EzH nXAQxa7Vzb7PB9mJ/M50ZpfEwm5P/Mubq5pPHyFgMsavyvldevoDOJhvEcZ2GtIT unrspcVaFdt0sr2/Q=
Received: from h.hanazo.no (dhcp-b1da.meeting.ietf.org [31.133.177.218]) (using TLSv1 with cipher DHE-RSA-AES256-SHA (256/256 bits)) (No client certificate requested) (Authenticated sender: otroan) by cowbell.employees.org (Postfix) with ESMTPSA id 20F3ED7882; Thu, 7 Apr 2016 06:27:10 -0700 (PDT)
Received: from [IPv6:::1] (localhost [IPv6:::1]) by h.hanazo.no (Postfix) with ESMTP id 81A5D1415945; Thu, 7 Apr 2016 10:27:07 -0300 (ART)
Subject: Re: draft-van-beijnum-multi-mtu-05.txt
Mime-Version: 1.0 (Mac OS X Mail 9.3 \(3124\))
Content-Type: multipart/signed; boundary="Apple-Mail=_2CE2595D-DCA4-4A08-92DB-B169083EA304"; protocol="application/pgp-signature"; micalg="pgp-sha512"
X-Pgp-Agent: GPGMail 2.6b2
From: otroan@employees.org
In-Reply-To: <20160406220411.GC518778@eidolon>
Date: Thu, 07 Apr 2016 10:27:07 -0300
Message-Id: <E27329D1-400E-4470-8277-64A664508854@employees.org>
References: <20160406151831.GZ518778@eidolon> <570569C2.4030601@acm.org> <20160406212048.GB518778@eidolon> <20160406220411.GC518778@eidolon>
To: David Lamparter <equinox@diac24.net>
X-Mailer: Apple Mail (2.3124)
Archived-At: <http://mailarchive.ietf.org/arch/msg/ipv6/8PmRQQpWEHPecCqT6TVcj5VCVpQ>
Cc: Erik Nordmark <nordmark@acm.org>, Iljitsch van Beijnum <iljitsch@muada.com>, 6man WG <ipv6@ietf.org>
X-BeenThere: ipv6@ietf.org
X-Mailman-Version: 2.1.17
Precedence: list
List-Id: "IPv6 Maintenance Working Group \(6man\)" <ipv6.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/ipv6>, <mailto:ipv6-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/ipv6/>
List-Post: <mailto:ipv6@ietf.org>
List-Help: <mailto:ipv6-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/ipv6>, <mailto:ipv6-request@ietf.org?subject=subscribe>
X-List-Received-Date: Thu, 07 Apr 2016 13:27:14 -0000

In general I'd prefer that we reuse existing mechanisms for path mtu discovery, and not invent new ones purely for the case of two directly connected neighbors.

Could we make this work by adding the RFC4861 MTU option to NS/NA messages, and require that PLMTUD probing is used to verify the end to end MTU.

Then the mechanism used is the same for directly connected neighbors and off-link neighbors (apart from the initial discovery).

If we were to invent new probing mechanisms, I would hope we did so under the PLMTUD (4821) umbrella.
Best regards,
Ole

> On 06 Apr 2016, at 19:04, David Lamparter <equinox@diac24.net> wrote:
> 
> On Wed, Apr 06, 2016 at 11:20:48PM +0200, David Lamparter wrote:
>> On Wed, Apr 06, 2016 at 04:55:46PM -0300, Erik Nordmark wrote:
>>> On 4/6/16 12:18 PM, David Lamparter wrote:
>>>> On Mon, Apr 04, 2016 at 11:37:17PM +0200, Mikael Abrahamsson wrote:
>>>> Ok... easy comments/opinions first:
>>>> - should definitely be ICMP, not UDP.  Erik Nordmark's suggestion to
>>>>   piggyback on NUD sounds great, though admittedly I haven't thought it
>>>>   through looking for pitfalls.
>>> One issue compared to a dedicate probe is that a NUD (a unicast NS) of
>>> size X wouldn't necessarily result in a unicast NA that is also padded;
>>> perhaps one can add such behavior so that we can get the bidirectional
>>> probe in both directions.
>> 
>> That might be (half of) a feature: if the MTU probe is a NS option, and
>> the target host does not support it, we still get a NA reply.  That's
>> better than timing out waiting.  The downside is that a NA without the
>> "MTU response" option doesn't mean that the host doesn't implement the
>> protocol -- the NA could be in response to something else.
> 
> Obvious easy way: have the "ND NODEMTU" option described in draft sec. 5
> mandatory on all NAs if the host implements the protocol; receipt of any
> NA without the option can then flag the sender as mtu-probe-incapable.
> 
> (Not sure if the last paragraph of sec. 9.1 already implies the option
> MUST be put on all NAs and NSs?  Certainly needs better wording.)
> 
> -David
> 
>> That said, I'd expect the probability of a host ignoring a new NS option
>> is much lower than it filtering out unknown new ICMP (sub)types or UDP
>> ports.  If that reduces useless probing (or even waiting), I'm all for
>> it.
>> 
>> (As I understand it, the draft in no case suggests waiting for the
>> probes to come back, so it's not much of an argument.  Might still
>> reduce useless probe traffic?)
> 
> --------------------------------------------------------------------
> IETF IPv6 working group mailing list
> ipv6@ietf.org
> Administrative Requests: https://www.ietf.org/mailman/listinfo/ipv6
> --------------------------------------------------------------------