RE: UDP+Fragmentation (was: "Deprecate")

"Templin, Fred L" <Fred.L.Templin@boeing.com> Thu, 01 August 2013 15:37 UTC

Return-Path: <Fred.L.Templin@boeing.com>
X-Original-To: ipv6@ietfa.amsl.com
Delivered-To: ipv6@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 9EA5B21E815C for <ipv6@ietfa.amsl.com>; Thu, 1 Aug 2013 08:37:50 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -6.166
X-Spam-Level:
X-Spam-Status: No, score=-6.166 tagged_above=-999 required=5 tests=[AWL=0.433, BAYES_00=-2.599, RCVD_IN_DNSWL_MED=-4]
Received: from mail.ietf.org ([12.22.58.30]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id oqPSEep6DYP8 for <ipv6@ietfa.amsl.com>; Thu, 1 Aug 2013 08:37:45 -0700 (PDT)
Received: from stl-mbsout-01.boeing.com (stl-mbsout-01.boeing.com [130.76.96.169]) by ietfa.amsl.com (Postfix) with ESMTP id 6BC3221E818D for <ipv6@ietf.org>; Thu, 1 Aug 2013 08:37:44 -0700 (PDT)
Received: from stl-mbsout-01.boeing.com (localhost.localdomain [127.0.0.1]) by stl-mbsout-01.boeing.com (8.14.4/8.14.4/DOWNSTREAM_MBSOUT) with ESMTP id r71FbiN0013261 for <ipv6@ietf.org>; Thu, 1 Aug 2013 10:37:44 -0500
Received: from XCH-NWHT-03.nw.nos.boeing.com (xch-nwht-03.nw.nos.boeing.com [130.247.71.23]) by stl-mbsout-01.boeing.com (8.14.4/8.14.4/UPSTREAM_MBSOUT) with ESMTP id r71FbgdC013229 (version=TLSv1/SSLv3 cipher=RC4-MD5 bits=128 verify=OK); Thu, 1 Aug 2013 10:37:43 -0500
Received: from XCH-BLV-205.nw.nos.boeing.com (10.57.37.61) by XCH-NWHT-03.nw.nos.boeing.com (130.247.71.23) with Microsoft SMTP Server (TLS) id 8.3.297.1; Thu, 1 Aug 2013 08:37:42 -0700
Received: from XCH-BLV-504.nw.nos.boeing.com ([169.254.4.29]) by XCH-BLV-205.nw.nos.boeing.com ([169.254.5.41]) with mapi id 14.02.0328.011; Thu, 1 Aug 2013 08:37:41 -0700
From: "Templin, Fred L" <Fred.L.Templin@boeing.com>
To: Ronald Bonica <rbonica@juniper.net>, "C. M. Heard" <heard@pobox.com>, IPv6 <ipv6@ietf.org>
Subject: RE: UDP+Fragmentation (was: "Deprecate")
Thread-Topic: UDP+Fragmentation (was: "Deprecate")
Thread-Index: AQHOjpJdxBsThTTW2kO9nlkD8PFVZ5mAe9+Q
Date: Thu, 01 Aug 2013 15:37:41 +0000
Message-ID: <2134F8430051B64F815C691A62D983180DC4E7@XCH-BLV-504.nw.nos.boeing.com>
References: <8C48B86A895913448548E6D15DA7553B963A9D@xmb-rcd-x09.cisco.com> <m2fvuwspja.wl%randy@psg.com> <33F639DD-2CD8-4580-A0C8-F63068497BEA@gmail.com> <m238qwsfna.wl%randy@psg.com> <2CF4CB03E2AA464BA0982EC92A02CE2512713455@BY2PRD0511MB428.namprd05.prod.outlook.com> <8C48B86A895913448548E6D15DA7553B965346@xmb-rcd-x09.cisco.com> <2CF4CB03E2AA464BA0982EC92A02CE251271361B@BY2PRD0511MB428.namprd05.prod.outlook.com> <Pine.LNX.4.64.1307301439030.24674@shell4.bayarea.net> <2CF4CB03E2AA464BA0982EC92A02CE25127185AC@BY2PRD0511MB428.namprd05.prod.outlook.com>
In-Reply-To: <2CF4CB03E2AA464BA0982EC92A02CE25127185AC@BY2PRD0511MB428.namprd05.prod.outlook.com>
Accept-Language: en-US
Content-Language: en-US
X-MS-Has-Attach:
X-MS-TNEF-Correlator:
x-originating-ip: [130.247.104.6]
Content-Type: text/plain; charset="us-ascii"
Content-Transfer-Encoding: quoted-printable
MIME-Version: 1.0
X-TM-AS-MML: disable
X-BeenThere: ipv6@ietf.org
X-Mailman-Version: 2.1.12
Precedence: list
List-Id: "IPv6 Maintenance Working Group \(6man\)" <ipv6.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/ipv6>, <mailto:ipv6-request@ietf.org?subject=unsubscribe>
List-Archive: <http://www.ietf.org/mail-archive/web/ipv6>
List-Post: <mailto:ipv6@ietf.org>
List-Help: <mailto:ipv6-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/ipv6>, <mailto:ipv6-request@ietf.org?subject=subscribe>
X-List-Received-Date: Thu, 01 Aug 2013 15:37:50 -0000

Hi Ron,

SEAL already handles the segmentation/reassembly such that it
would not be necessary to define a new UDP. Plus, SEAL can be used
independently of any transport layer, e.g., for IP-in-IP tunneling.
If you are looking for a replacement for IPv6 fragmentation (which
you should be) IMHO SEAL is the more versatile alternative.

Thanks - Fred
fred.l.templin@boeing.com

> -----Original Message-----
> From: ipv6-bounces@ietf.org [mailto:ipv6-bounces@ietf.org] On Behalf Of
> Ronald Bonica
> Sent: Thursday, August 01, 2013 1:38 AM
> To: C. M. Heard; IPv6
> Subject: UDP+Fragmentation (was: "Deprecate")
> 
> Cmh,
> 
> When I read this message, my first reaction was to scream "that such a
> thing could not possibly be deployed, because operators will filter
> anything that they don't know or have an immediate use for." But after
> a few hallway discussions, I am starting to think that the idea might
> be viable.
> 
> When the adrenaline and endorphin rush of IETF week has subsided, we
> should a) discuss whether this is a viable option and b) if so, define
> the replacement protocol in the Transport Area.
> 
> Chairs,
> 
> The conversation proposed above may not be within the charter of 6man.
> If/when you think that there is a need to move this conversation, I can
> ask the transport Ads for a non-WG mailing list. However, if you are
> happy for at least the first part of this conversation to occur on this
> mailing list, we can continue here.
> 
>                                      Ron
> 
> 
> 
> > -----Original Message-----
> > From: ipv6-bounces@ietf.org [mailto:ipv6-bounces@ietf.org] On Behalf
> Of
> > C. M. Heard
> > Sent: Wednesday, July 31, 2013 12:40 AM
> > To: IPv6
> > Subject: RE: "Deprecate"
> >
> > On Tue, 30 Jul 2013, Ronald Bonica wrote:
> > > Thinking a little more about it, RTP and UDP aren't the real
> > culprits.
> > > The culprits are the applications that run over them.
> > > So, we should limit our statement to applications, and not
> > > "applications and transport layer protocols".
> >
> > I don't agree, at least not if the principal reason why IP fragments
> > get dropped is that they lack the L4 header (or at least that the
> non-
> > initial fragments do) and thereby break stateless ACLs.  The problem
> is
> > that UDP and its kin such as UDP-lite and DCCP lack transport-layer
> > segmentation, such as is present in TCP, and are thereby force their
> > clients to rely on IP fragmentation to provide this service.  So yes,
> > these transport protocols are the culprits.
> >
> > The idea that immediately comes to mind is to design _replacements_
> > transport protocols for UDP and kin that contain a transport layer
> > segmentation mechanism.  These would be for use by applications that
> > can't get by without such a mechanism; existing applications that
> don't
> > need to rely on IP fragmentation can continue to use UDP and kin.
> The
> > replacement for UDP might have a header that looks something like
> this:
> >
> >    0                            15 16                            31
> >   +-+-+-+-+-+-+-+-|-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-|-+-+-+-+-+-+-+-+
> >   |         Source Port           |      Destination Port         |
> >   +-+-+-+-+-+-+-+-|-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-|-+-+-+-+-+-+-+-+
> >   |            Length             |       Segment Offset    |Res|M|
> >   +-+-+-+-+-+-+-+-|-+-+-+-+-+-+-+-|-+-+-+-+-+-+-+-|-+-+-+-+-+-+-+-+
> >   |                         Identification                        |
> >   +-+-+-+-+-+-+-+-|-+-+-+-+-+-+-+-|-+-+-+-+-+-+-+-|-+-+-+-+-+-+-+-+
> >   |                            Checksum                           |
> >   +-+-+-+-+-+-+-+-|-+-+-+-+-+-+-+-|-+-+-+-+-+-+-+-|-+-+-+-+-+-+-+-+
> >   |                          data octets               ...
> >   +-+-+-+-+-+-+-+-|-+-+-+-+-+-+-+-|-+-+-+-+-+-+-+-|    ...
> >
> > (Other and perhaps better possibilities exist, of course.)
> >
> > Having said that, I immediately imagine screaming that such a thing
> > could not possibly be deployed, because operators will filter
> anything
> > that they don't know or have an immediate use for, and so it would
> > never get any traction.
> >
> > Well, maybe so, but something has to give.  The operations folks have
> > complained that IP fragmentation is awful, they have to filter
> > fragments because it defeats their stateless ACLs.  OK; let's agree
> > that's a defect that needs to be fixed.  But if you don't want the
> fix
> > to break other important stuff (e.g., DNSSEC, as metioned in Section
> > 3.1 of draft-bonica-6man-frag-deprecate-02), you need a replacement
> for
> > IP fragmentation (or an augmentation, such as in
> > http://www.ietf.org/mail-archive/web/ipv6/current/msg18389.html by
> Mark
> > Andrews).  Maybe I just lack imagination, but I can't see any fix
> that
> > does not involve SOME change in operator behavior.
> >
> > //cmh
> > --------------------------------------------------------------------
> > IETF IPv6 working group mailing list
> > ipv6@ietf.org
> > Administrative Requests: https://www.ietf.org/mailman/listinfo/ipv6
> > --------------------------------------------------------------------
> >
> 
> 
> 
> --------------------------------------------------------------------
> IETF IPv6 working group mailing list
> ipv6@ietf.org
> Administrative Requests: https://www.ietf.org/mailman/listinfo/ipv6
> --------------------------------------------------------------------