Re: draft-van-beijnum-multi-mtu-05.txt

David Lamparter <equinox@diac24.net> Thu, 14 April 2016 13:20 UTC

Return-Path: <equinox@diac24.net>
X-Original-To: ipv6@ietfa.amsl.com
Delivered-To: ipv6@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 5559C12E052 for <ipv6@ietfa.amsl.com>; Thu, 14 Apr 2016 06:20:01 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -1.901
X-Spam-Level:
X-Spam-Status: No, score=-1.901 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, RCVD_IN_DNSWL_NONE=-0.0001, SPF_PASS=-0.001] autolearn=ham autolearn_force=no
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id KxLHNjlh5IDK for <ipv6@ietfa.amsl.com>; Thu, 14 Apr 2016 06:20:00 -0700 (PDT)
Received: from eidolon.nox.tf (eidolon.nox.tf [IPv6:2a02:238:f02a:8e2f:1::]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id A487912E042 for <ipv6@ietf.org>; Thu, 14 Apr 2016 06:19:51 -0700 (PDT)
Received: from equinox by eidolon.nox.tf with local (Exim 4.86_2) (envelope-from <equinox@diac24.net>) id 1aqhBQ-003mbU-LY; Thu, 14 Apr 2016 15:19:45 +0200
Date: Thu, 14 Apr 2016 15:19:44 +0200
From: David Lamparter <equinox@diac24.net>
To: otroan@employees.org
Subject: Re: draft-van-beijnum-multi-mtu-05.txt
Message-ID: <20160414131944.GR518778@eidolon>
References: <20160406151831.GZ518778@eidolon> <570569C2.4030601@acm.org> <20160406212048.GB518778@eidolon> <20160406220411.GC518778@eidolon> <E27329D1-400E-4470-8277-64A664508854@employees.org> <20160414122245.GN518778@eidolon> <07555AE0-8B99-464D-8F22-1663BF6579A7@employees.org> <20160414124807.GP518778@eidolon> <A4C36230-C4E4-432A-A427-81EA6627D7D5@employees.org>
MIME-Version: 1.0
Content-Type: text/plain; charset="utf-8"
Content-Disposition: inline
Content-Transfer-Encoding: 8bit
In-Reply-To: <A4C36230-C4E4-432A-A427-81EA6627D7D5@employees.org>
User-Agent: Mutt/1.5.24 (2015-08-30)
Archived-At: <http://mailarchive.ietf.org/arch/msg/ipv6/DKd9e2DUpjHY-4eheM9Bg338ZFc>
Cc: Erik Nordmark <nordmark@acm.org>, Iljitsch van Beijnum <iljitsch@muada.com>, 6man WG <ipv6@ietf.org>
X-BeenThere: ipv6@ietf.org
X-Mailman-Version: 2.1.17
Precedence: list
List-Id: "IPv6 Maintenance Working Group \(6man\)" <ipv6.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/ipv6>, <mailto:ipv6-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/ipv6/>
List-Post: <mailto:ipv6@ietf.org>
List-Help: <mailto:ipv6-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/ipv6>, <mailto:ipv6-request@ietf.org?subject=subscribe>
X-List-Received-Date: Thu, 14 Apr 2016 13:20:01 -0000

On Thu, Apr 14, 2016 at 03:05:11PM +0200, otroan@employees.org wrote:
> >> what would be gain be to have a specific protocol to probe directly
> >> connected neighbors?
> > 
> > It can:
> > - work (pro-)actively and independent of higher-layer protocols,
> >  establishing MTU once
> 
> to a large extent we have failed at doing MTU discovery at the network layer.
> too hard, couldn't do it, let's make it someone else's problem. ;-)
> transport or application that is.

Might be either hope or naïvety, but I don't think we've failed (or even
tried) yet at the 1-hop 0-router case :).  There are way less pesky
ICMPv6-breaking devices in the middle...

> > - contain the different logic to understand that the router's MTU is the
> >  upper cap for all destinations behind that router
> > - contain the different probing parameters (being more aggressive) that
> >  are appropriate for a local network
> > - optionally carry extra information to reuse probing results across
> >  different addresses that a host has on a segment
> > 
> > I suppose this can be achieved by using a specialized version of 4821 on
> > the link... something like this:
> > 
> > - host does NS as usual, or catches unsolicited NA
> > - NA contains new "MTU discovery" option with contents:
> >  - indication of capability of first-hop MTU discovery
> >  - known maximum MRU of NA's sender (i.e. upper limit)
> >  - link-local address(?) + TCP port number(?) for PLMTUD probing
> > - host establishes one or more TCP sessions to that port with the
> >  express and only purpose of probing MTU
> >  (may as well do it on an existing TCP session if one exists)
> > - PLMTUD switches into some "first-hop" special mode (lower timers,
> >  parallel operation, different values) to establish and store the value
> >  with proper semantics (router case)
> > 
> > Is that what you have in mind?
> 
> I was thinking of something much simpler.
> the NS/NA MTU option triggers the stack (transport / application) to
> use packets up to that MTU.  the transport or application has to do
> normal PLMTUD.
> 
> think of it as if you had a p2p link to the neighbor and that the
> interface MTU was set to whatever you received in the MTU option from
> that neighbour.

I think the failure modes of that are way worse than with a dedicated
first-hop approach, especially for routers (interference from congestion
further down) but also for hosts (no parallel probing, and still need
special-casing to get more aggressive behaviour).

(cont'd below)

> an on-link router already advertises an MTU in an RA. I'm not sure if
> it would make sense if it advertised per neighbor MTU options, and how
> those should be interpreted.

The MTU advertised in the RA is for the link, not for the router.  In
particular, even when doing higher first-hop MTUs, this is the value for
all multicast packets.

If the router advertises a higher value through a separate new option,
the failure modes of that are very non-graceful:  a "non-jumbo" ethernet
switch in the middle causes every individual destination's PLMTUD to
fail independently, without the system having any chance to detect it as
an issue towards the router.


-David