Re: draft-bonica-6man-frag-deprecate

Ole Troan <otroan@employees.org> Sun, 30 June 2013 14:45 UTC

Return-Path: <otroan@employees.org>
X-Original-To: ipv6@ietfa.amsl.com
Delivered-To: ipv6@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 7ACD321F9A34 for <ipv6@ietfa.amsl.com>; Sun, 30 Jun 2013 07:45:55 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -9.38
X-Spam-Level:
X-Spam-Status: No, score=-9.38 tagged_above=-999 required=5 tests=[BAYES_00=-2.599, DATE_IN_PAST_24_48=1.219, RCVD_IN_DNSWL_HI=-8]
Received: from mail.ietf.org ([12.22.58.30]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id s-7eV9XgoI+d for <ipv6@ietfa.amsl.com>; Sun, 30 Jun 2013 07:45:48 -0700 (PDT)
Received: from ams-iport-3.cisco.com (ams-iport-3.cisco.com [144.254.224.146]) by ietfa.amsl.com (Postfix) with ESMTP id B7D0A21F9A0B for <ipv6@ietf.org>; Sun, 30 Jun 2013 07:45:47 -0700 (PDT)
X-IronPort-Anti-Spam-Filtered: true
X-IronPort-Anti-Spam-Result: AhkFAFS6zFGQ/khL/2dsb2JhbABbKIJhwAaBAhZ0giMBAQQBOj8FCwtGVwaIGwa7So8iMweDAmMDk3OVF4MtIA
X-IronPort-AV: E=Sophos;i="4.87,969,1363132800"; d="scan'208";a="14668153"
Received: from ams-core-2.cisco.com ([144.254.72.75]) by ams-iport-3.cisco.com with ESMTP; 30 Jun 2013 14:45:45 +0000
Received: from dhcp-10-61-102-53.cisco.com (dhcp-10-61-102-53.cisco.com [10.61.102.53]) by ams-core-2.cisco.com (8.14.5/8.14.5) with ESMTP id r5UEjg3E002187 (version=TLSv1/SSLv3 cipher=AES128-SHA bits=128 verify=NO); Sun, 30 Jun 2013 14:45:43 GMT
Content-Type: text/plain; charset="us-ascii"
Mime-Version: 1.0 (Mac OS X Mail 6.5 \(1508\))
Subject: Re: draft-bonica-6man-frag-deprecate
From: Ole Troan <otroan@employees.org>
In-Reply-To: <2134F8430051B64F815C691A62D983180B0221@XCH-BLV-504.nw.nos.boeing.com>
Date: Sat, 29 Jun 2013 02:55:36 -0400
Content-Transfer-Encoding: quoted-printable
Message-Id: <520FB317-19E8-4DCA-81FB-124B17732FE0@employees.org>
References: <2CF4CB03E2AA464BA0982EC92A02CE2509F85151@BY2PRD0512MB653.namprd05.prod.outlook.com> <51C32FA9.1090207@gmail.com> <2CF4CB03E2AA464BA0982EC92A02CE2509F85F38@BY2PRD0512MB653.namprd05.prod.outlook.com> <20130624204008.GB3647@virgo.local> <20130624205226.GC3647@virgo.local> <2CF4CB03E2AA464BA0982EC92A02CE2509F8761C@BY2PRD0512MB653.namprd05.prod.outlook.com> <51C902DC.9000408@gmail.com> <m24ncmaozs.wl%randy@psg.com> <2EA20F89-02F5-4D06-90EE-A7D2974045A3@employees.org> <m2li5yj7u3.wl%randy@psg.com> <8C48B86A895913448548E6D15DA7553B9268E3@xmb-rcd-x09.cisco.com> <m2ehbpij86.wl%randy@psg.com> <51CB91E4.5090603@gmail.com> <2134F8430051B64F815C691A62D983180AEA5F@XCH-BLV-504.nw.nos.boeing.com> <B7796834-C80E-498D-9F9C-02F74A9E53C9@employees.org> <2134F8430051B64F815C691A62D983180B0221@XCH-BLV-504.nw.nos.boeing.com>
To: "Templin, Fred L" <Fred.L.Templin@boeing.com>
X-Mailer: Apple Mail (2.1508)
Cc: 6man <ipv6@ietf.org>
X-BeenThere: ipv6@ietf.org
X-Mailman-Version: 2.1.12
Precedence: list
List-Id: "IPv6 Maintenance Working Group \(6man\)" <ipv6.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/ipv6>, <mailto:ipv6-request@ietf.org?subject=unsubscribe>
List-Archive: <http://www.ietf.org/mail-archive/web/ipv6>
List-Post: <mailto:ipv6@ietf.org>
List-Help: <mailto:ipv6-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/ipv6>, <mailto:ipv6-request@ietf.org?subject=subscribe>
X-List-Received-Date: Sun, 30 Jun 2013 14:45:57 -0000

Fred,

>> in my understanding the 1280 minimum MTU for IPv6 was already chosen to
>> accommodate nested tunnels.
> 
> Right, but..
> 
>> the expectation made, I believe, was that native links support at least
>> an MTU of 1500 bytes,
> 
> But, that expectation went out the window at the same time the IPv6
> minMTU was set to 1280 - so now 1280 is all that can be expected.

quite the opposite.
physical link MTUs aren't getting smaller.
do you have any evidence that operators set the IPv6 MTU to a value smaller than the MTU supported
by the link-layer?

as far as I can see the setting IPv6 minimum MTU to 1280, which gives ample room for
nested tunnels works as designed.

> So, without fragmentation, when the tunnel ingress receives a 1280
> packet, it emits a (1280+HLEN) packet. If that packet is dropped
> at a link that configures a 1280 MTU, then it simply black holes.
> 
>> allowing 220 bytes for tunnel encap (5 IPv6 headers).
> 
> Tunnels within tunnels presents an additional pain point, but the
> plain truth is that IPv6 links only need to configure a 1280 MTU;
> not a 1500.

again, why would anyone do that?
the pain here is fragmentation, not supporting an MTU larger than 1280.

>> you want to avoid reassembly at tunnel endpoints, if you care about
>> performance that is.
> 
> Unfortunately, reassembly is absolutely necessary if the tunnel is
> configured over a path that contains at least one 1280 link (see above).

reassembly in the network is a non-starter.
the vendor I'm most familiar with does not do this in hardware. sure, you can get reassembly, but at an order of one or two magnitudes less. if anyone know of platforms doing IPv6 fragment reassembly at line rate for 10G or 100G interfaces I'll stand corrected. ;-)
for now reassembly in the network is not realistic.

cheers,
Ole