Re: I-D Action: draft-ietf-6man-ipv6-atomic-fragments-01.txt
Fernando Gont <fgont@si6networks.com> Wed, 15 August 2012 01:45 UTC
Return-Path: <fgont@si6networks.com>
X-Original-To: ipv6@ietfa.amsl.com
Delivered-To: ipv6@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 8EAA521E80E1 for <ipv6@ietfa.amsl.com>; Tue, 14 Aug 2012 18:45:57 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -2.599
X-Spam-Level:
X-Spam-Status: No, score=-2.599 tagged_above=-999 required=5 tests=[AWL=-0.000, BAYES_00=-2.599]
Received: from mail.ietf.org ([12.22.58.30]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id 619DsSC+Rf7A for <ipv6@ietfa.amsl.com>; Tue, 14 Aug 2012 18:45:56 -0700 (PDT)
Received: from web01.jbserver.net (web01.jbserver.net [IPv6:2a00:d10:2000:e::3]) by ietfa.amsl.com (Postfix) with ESMTP id 9708321E80CD for <ipv6@ietf.org>; Tue, 14 Aug 2012 18:45:56 -0700 (PDT)
Received: from [186.134.26.60] (helo=[192.168.123.104]) by web01.jbserver.net with esmtpsa (TLSv1:CAMELLIA256-SHA:256) (Exim 4.76) (envelope-from <fgont@si6networks.com>) id 1T1SgB-0001p4-4h; Wed, 15 Aug 2012 03:45:51 +0200
Message-ID: <502AFF1F.6080904@si6networks.com>
Date: Tue, 14 Aug 2012 22:45:03 -0300
From: Fernando Gont <fgont@si6networks.com>
Organization: SI6 Networks
User-Agent: Mozilla/5.0 (X11; Linux i686; rv:14.0) Gecko/20120714 Thunderbird/14.0
MIME-Version: 1.0
To: "Eric Vyncke (evyncke)" <evyncke@cisco.com>
Subject: Re: I-D Action: draft-ietf-6man-ipv6-atomic-fragments-01.txt
References: <20120810103916.17649.29017.idtracker@ietfa.amsl.com> <97EB7536A2B2C549846804BBF3FD47E10C4748@xmb-aln-x02.cisco.com>
In-Reply-To: <97EB7536A2B2C549846804BBF3FD47E10C4748@xmb-aln-x02.cisco.com>
X-Enigmail-Version: 1.5a1pre
Content-Type: text/plain; charset="ISO-8859-1"
Content-Transfer-Encoding: 7bit
Cc: "ipv6@ietf.org" <ipv6@ietf.org>
X-BeenThere: ipv6@ietf.org
X-Mailman-Version: 2.1.12
Precedence: list
List-Id: "IPv6 Maintenance Working Group \(6man\)" <ipv6.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/ipv6>, <mailto:ipv6-request@ietf.org?subject=unsubscribe>
List-Archive: <http://www.ietf.org/mail-archive/web/ipv6>
List-Post: <mailto:ipv6@ietf.org>
List-Help: <mailto:ipv6-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/ipv6>, <mailto:ipv6-request@ietf.org?subject=subscribe>
X-List-Received-Date: Wed, 15 Aug 2012 01:45:57 -0000
Hi, Eric, Thanks so much for your feedback! -- Please find my comments in-line... On 08/14/2012 11:14 AM, Eric Vyncke (evyncke) wrote: > A couple of quick comments: - section 2: I would love to have data to > back the point of 'Many implementations fail to perform validation > checks on the received ICMPv6 error messages' (such as adding a > reference to your appendix) What data, specifically, would you expect? -- A list of vulnerable implementations or the like? You may want to try the icmp6 tool in the IPv6 toolkit <http://www.si6networks.com/tools> to fire e.g. ICMPv6 PTB, and see that they are honored without e.g. checking the embedded TCP sequence number. - section 3: it would be nice to add some > text about the case where a packet is duplicated by the network > (could occur in rare circumstances) and one copy is fragmented (not > an atomic fragment) and the other copy is not (atomic fragment) > because of different path There's no fragmentation in routers, and hence this is not possible -- for instance, this is part of the rationale for RFC 5722. - section 3: not sure what is meant by 'FH > should (no uppercase?) be removed by the receiving host', This is the same as "performing fragmentation using only the atomic fragment"... the Next-Header field in the IPv6 fixed header should be changed to the value of the Next-Header in the FH, BTW. > on the > contrary, I would prefer to keep the FH in the packet (some apps may > need it) but immediately deliver the full packet to the upper layer - Do such stacks keep the FH for normal fragmented traffic? -- If so, how are each of the values (FOffset, etc.) selected? (Bottom-line: if this doesn't happen for normal fragmented traffic, I don't think we should make atomic fragments a special case). > section 3: it would be nice if some explanations were given why a > host receiving such an atomic fragment should not discard the > matching real fragments... Well, we don't really take a stance regarding what to do with the matching fragments. Performance-wise you may want to avoid searching through the queued fragments. Thoughts? > I tend to believe that upper layer (TCP > notably) will reject the second one if the sequence number match Not sure what you mean... > May I also suggest to integrate this I-D into the more generic > draft-gont-6man-predictable-fragment-id ? It will make the task of > implementers easier if both I-D are merged. I personally believe that both I-Ds are orthogonal. And also, procedurally-wise, at this point in time (past WGLC) we'll be better off progressing this one small document than trying to merge it with draft-gont-6man-predictable-fragment-id (which is not yet a wg item). Thanks! Best regards, -- Fernando Gont SI6 Networks e-mail: fgont@si6networks.com PGP Fingerprint: 6666 31C6 D484 63B2 8FB1 E3C4 AE25 0D55 1D4E 7492
- I-D Action: draft-ietf-6man-ipv6-atomic-fragments… internet-drafts
- RE: I-D Action: draft-ietf-6man-ipv6-atomic-fragm… Eric Vyncke (evyncke)
- Re: I-D Action: draft-ietf-6man-ipv6-atomic-fragm… Fernando Gont