Re: Manual PMTUD [was ...rfc2460bis-08]

Brian E Carpenter <brian.e.carpenter@gmail.com> Sat, 18 March 2017 01:18 UTC

Return-Path: <brian.e.carpenter@gmail.com>
X-Original-To: ipv6@ietfa.amsl.com
Delivered-To: ipv6@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id B42B31298CF; Fri, 17 Mar 2017 18:18:52 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -2.7
X-Spam-Level:
X-Spam-Status: No, score=-2.7 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, DKIM_SIGNED=0.1, DKIM_VALID=-0.1, DKIM_VALID_AU=-0.1, FREEMAIL_FROM=0.001, RCVD_IN_DNSWL_LOW=-0.7, SPF_PASS=-0.001] autolearn=ham autolearn_force=no
Authentication-Results: ietfa.amsl.com (amavisd-new); dkim=pass (2048-bit key) header.d=gmail.com
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id JwqA41V8Ul-E; Fri, 17 Mar 2017 18:18:49 -0700 (PDT)
Received: from mail-qk0-x234.google.com (mail-qk0-x234.google.com [IPv6:2607:f8b0:400d:c09::234]) (using TLSv1.2 with cipher ECDHE-RSA-AES128-GCM-SHA256 (128/128 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id 099731297EB; Fri, 17 Mar 2017 18:10:40 -0700 (PDT)
Received: by mail-qk0-x234.google.com with SMTP id y76so77454695qkb.0; Fri, 17 Mar 2017 18:10:39 -0700 (PDT)
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=gmail.com; s=20161025; h=subject:to:references:cc:from:organization:message-id:date :user-agent:mime-version:in-reply-to:content-transfer-encoding; bh=PwM9JfHJlK+Bi7c2oGZPFz+dnzJAdtjcfgPzwdD6jF8=; b=i/AbgiwQ4Me98WlHHQmiGK7QenWojANYQyiiobc5BEFrgaB8g4ZJJyJUnJri6lGj9c V2EeEDfCrbs9cp15hQDuBtSjxgzkJquyvra4UFlwVgvIi2OwppEDRgUF7xkExmUjHIad KkUu/2WStp5/kGcAet1VbAU+xocNz+wDiM/kYBgzmw3Re+vmsQaULmFHTrcHkjJN8gl7 fGSK/VQcb78YzWKsoFAvKXa0X0B8dZyMk7rGTpH9vBxHd5pY8cFgX2oVl989c3arsGAP vzN9WyqYVTlmNY4iYBaq60qojgJggDmOP7q5x5E9quF1PC9BnJ4+kwqXv+CM4deAuVj0 PInQ==
X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20161025; h=x-gm-message-state:subject:to:references:cc:from:organization :message-id:date:user-agent:mime-version:in-reply-to :content-transfer-encoding; bh=PwM9JfHJlK+Bi7c2oGZPFz+dnzJAdtjcfgPzwdD6jF8=; b=rZ4B7Y8Qt7nFfgpWn1OxrI+pOvPxJpD8Gqib1yV2az3vTXZisWuqU62UaYM36z9X0Z o175iEiZvns/3hr+hcgRieVh3zbMJ7ySpmNKvn8kWXsr6Z7VnDpVAyBENPCNJmUTDJam g4RPHCmK8u53cpxxSqxpKR0Z7VeZH1yiyY2G5LBPoc4LNhIibzWRa5nek4Z6NH1vC6J7 qjILmL/9jfiy5LNHpmIdasSha5NQ2ttH5AWo3AHpORhdmREke1/hhIg4+TKb+SHIc0h7 xloq03cUGEWC+KYLm8dPocMalzfNIYXxFKK6iAASjZTLSQnJgDPwhp6r9wKMaMpHCwUh 1ASg==
X-Gm-Message-State: AFeK/H3d2yLL6T7msXkn9F0OAHEgIOIFK9bGaAWwb9rBcqB/1PZF89655V1fjQKPLyPC9g==
X-Received: by 10.55.203.154 with SMTP id u26mr3799761qkl.220.1489799439080; Fri, 17 Mar 2017 18:10:39 -0700 (PDT)
Received: from [172.16.11.95] (50-76-68-137-static.hfc.comcastbusiness.net. [50.76.68.137]) by smtp.gmail.com with ESMTPSA id q11sm7155649qkh.16.2017.03.17.18.10.38 (version=TLS1_2 cipher=ECDHE-RSA-AES128-GCM-SHA256 bits=128/128); Fri, 17 Mar 2017 18:10:38 -0700 (PDT)
Subject: Re: Manual PMTUD [was ...rfc2460bis-08]
To: Robert Raszuk <robert@raszuk.net>
References: <599257D7-532D-4512-929B-D124623EAF35@ericsson.com> <37ED3E78-B23A-4D29-8597-5A63236129B1@cisco.com> <887bd0f0-32a5-56f1-9ac9-703ecb97a760@gmail.com> <80D8FFF0-2674-48A7-A935-11681F5C5A4D@jisc.ac.uk> <A67E1C07-282B-4422-A2FF-86F6CACBD775@cable.comcast.com> <ab7c95a5-9776-24b5-7c26-4c5987d4c948@isi.edu> <ed2f5144-52fb-dda5-1fb4-62be1625b341@gmail.com> <401F52B1-3D41-4174-9425-50571B2D0B9E@jisc.ac.uk> <6d51de4b-3a9d-0f34-1cd2-5bb30caed75e@gmail.com> <DE16D91D-AE7B-4D3C-B8EA-0CB644FB96BD@cable.comcast.com> <CA+b+ER=6dXLiwvLJa84uvpVeH0daGnZ-06P16JD0UutTrbUYyA@mail.gmail.com> <2a808465-58c9-1d5e-700b-f04043b33c1c@gmail.com> <CA+b+ERnL6FjPVRZgVzoay81gX-SkujkgTfd6EB3PM1Sq_HM9yA@mail.gmail.com>
Cc: "Leddy, John" <John_Leddy@comcast.com>, Stewart Bryant <stewart.bryant@gmail.com>, Tim Chown <Tim.Chown@jisc.ac.uk>, "draft-ietf-6man-rfc2460bis.all@ietf.org" <draft-ietf-6man-rfc2460bis.all@ietf.org>, 6man WG <ipv6@ietf.org>
From: Brian E Carpenter <brian.e.carpenter@gmail.com>
Organization: University of Auckland
Message-ID: <618152cf-b097-6d39-e3eb-84b676fb56b7@gmail.com>
Date: Sat, 18 Mar 2017 14:10:51 +1300
User-Agent: Mozilla/5.0 (Windows NT 6.1; WOW64; rv:45.0) Gecko/20100101 Thunderbird/45.8.0
MIME-Version: 1.0
In-Reply-To: <CA+b+ERnL6FjPVRZgVzoay81gX-SkujkgTfd6EB3PM1Sq_HM9yA@mail.gmail.com>
Content-Type: text/plain; charset="utf-8"
Content-Transfer-Encoding: quoted-printable
Archived-At: <https://mailarchive.ietf.org/arch/msg/ipv6/HqIvvttQ-q2D6MCmivHUXblzh8w>
X-BeenThere: ipv6@ietf.org
X-Mailman-Version: 2.1.22
Precedence: list
List-Id: "IPv6 Maintenance Working Group \(6man\)" <ipv6.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/ipv6>, <mailto:ipv6-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/ipv6/>
List-Post: <mailto:ipv6@ietf.org>
List-Help: <mailto:ipv6-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/ipv6>, <mailto:ipv6-request@ietf.org?subject=subscribe>
X-List-Received-Date: Sat, 18 Mar 2017 01:18:52 -0000

> I can use
> today SRv6 features in my data centers where I consistently know that all
> interfaces are set for jumbo frames and where hopefully I do not need to
> worry about MTU since hosts have much lower max MTU configured.

Exactly. That's not the Internet. Internet Standards are for the Internet,
hence I believe that the AD's decision is the correct one.

(How would you feel about an extension header that MAY be deleted
by an intermediate node, and MUST be deleted if the next hop's link
MTU is too small? That's the sort of complexity that allowing header
insertion would require in order to be acceptable across the Internet
with broken PMTUD that we have. Also PTB semantics would have to change
from "PMTU is N bytes" to "Packet exceeded link MTU by X bytes", since
the source has no idea how much has been added by intermediate systems.
Or perhaps the intermediate systems would have to send back a new
ICMPv6 message saying "I extended your packet by Y bytes." This is
not straightforward.)

Regards
   Brian


On 18/03/2017 12:11, Robert Raszuk wrote:
> Hello Brian,
> 
> I do suffer from MTU issues over both intranets and Internet the same way
> as you do ... or maybe even more.
> 
> As example there are transit ISPs out there who provide now extra new fancy
> services of DDoS detection except they do not tell that to direct your data
> stream packets to screening devices they encapsulate it in another entire
> IP header to redirect it to this service.
> 
> MPLS encapsulation is also another one. While other then 6PE it happily
> leaves v6 Internet alone there are active proposals in IETF to take it on
> target as well.
> 
> However allowing or not allowing header insertion into IPv6 is IMHO
> orthogonal here. The fact that you forbid it will only result in bigger
> size encapsulation hence lower effective MTU. Services have moved to
> overlay and that requires decoupling them from transport. And in some
> networks service is not just fancy firewall or load balancer ... service is
> basic IPv4 lookup, basic VPN segmentation or tenant micro segmentation. And
> the last one even if it starts on end host it starts not in sourcing VM,
> but in the forwarding host OS kernel's RIB.
> 
> MTU is a valid problem and we should work on it but I don't think it should
> stop IPv6 based services and IPv6 innovation till it is solved. I can use
> today SRv6 features in my data centers where I consistently know that all
> interfaces are set for jumbo frames and where hopefully I do not need to
> worry about MTU since hosts have much lower max MTU configured.
> 
> Kind regards,
> Robert.
> 
> 
> On Fri, Mar 17, 2017 at 11:51 PM, Brian E Carpenter <
> brian.e.carpenter@gmail.com> wrote:
> 
>> Robert,
>>
>> (cc's trimmed)
>>
>> I remember well, back when serial modems were still the norm, sitting
>> in hotel rooms manually cranking back the IPv4 MTU size on my laptop
>> until it was possible to establish TCP connections. Fortunately,
>> somebody had written a piece of freeware that made this possible on
>> Windows 95. I seem to remember having to set the MTU to 256 in Vienna,
>> for example.
>>
>> It is really unthinkable to me to allow header insertion on the Internet
>> until we have a working solution to PMTUD in all circumstances, which we
>> don't, due to operators misconfiguring middleboxes to drop ICMPv6/PTB,
>> and due to RFC4821 being a rarity.
>>
>> When this major operational problem has been solved, it will be time to
>> seriously consider header insertion (including its very non-trivial
>> security implementations).
>>
>> Regards
>>    Brian Carpenter
>>
>>
>>
>> On 18/03/2017 06:06, Robert Raszuk wrote:
>>> All,
>>>
>>> This is very interesting thread indeed.
>>>
>>> I think header insertion at *any* network element be it host, router,
>>> service chain device is highly desired. IPv6 deployments will be much
>> more
>>> successful if we clear any obstacles which otherwise prevent it from
>>> delivering required by customers and operators functionality.
>>>
>>> And I would state that this should be not only limited to one's own IGP
>> or
>>> BGP domain. It should be legal Internet wide.
>>>
>>> Today Internet as a entire system lacks tools to accomplish path
>>> engineering, fast connectivity restoration, p2mp delivery of content etc
>>> ... Some of those are possible with MPLS based tools however as we all
>> know
>>> MPLS has no NNI and does not really work across domains. Here we stand
>> very
>>> close to have a chance to fix it.
>>>
>>> And if one would forbid by spec the header insertion performed by network
>>> elements what's the alternative ... IPv6 in IPv6 encapsulation which may
>>> suffer with even more overhead yet will still require IANA allocation of
>>> SRH type as well as TLV codepoints as effectively encapsulating network
>>> element will be acting as IPv6 sender.
>>>
>>> Concluding I do hope that we can try to collectively make IPv6 protocol
>>> flexible enough to satisfy customer and operator's requirements what in
>>> turn will enrich and speed up IPv6 global adoption.
>>>
>>> Kind regards,
>>> Robert.
>>>
>>>
>>> On Thu, Mar 16, 2017 at 1:40 PM, Leddy, John <John_Leddy@comcast.com>
>> wrote:
>>>
>>>> Thanks Stewart,
>>>>
>>>> This really supports my point and hopefully not the intent or result of
>>>> the discussions here.
>>>>
>>>> We are trying to work through the IETF process to come up with standards
>>>> and solutions that address real operational challenges faced in
>>>> deployments.  For operators, dealing with legacy and migrations are a
>> big
>>>> challenge.
>>>>
>>>> Wishing these issues away and as a result having non-standard
>>>> functionality in “middle boxes” that are ignored in the architecture is
>> not
>>>> productive.  NATs are a way of life, dark space is being deployed by
>> other
>>>> operators, “Cloud”/NFV/ServiceChaining are active areas; tunnels,
>> tunnels
>>>> everywhere - PMTU is always an issue.  “Turtles and Tunnels all the way
>>>> down”.
>>>>
>>>> We are very aggressively migrating to a V6 infrastructure, but there is
>> a
>>>> large amount of old legacy systems/applications/services that need to be
>>>> addressed.  At the same time the allure of “Cloud” attracts systems that
>>>> should never be moved without being re-architected and the
>> virtualization
>>>> environments fully supporting V6 (both Vendors and OpenSource) – but
>> they
>>>> do move and vendors help make that possible.
>>>>
>>>> Hopefully we can keep the discussions going and keep tools available
>> until
>>>> we know we have solutions to deal all the activity happening outside a
>>>> clean end-to-end Architecture,
>>>>
>>>> John
>>>>
>>>>
>>>>
>>>> On 3/16/17, 6:44 AM, "Stewart Bryant" <stewart.bryant@gmail.com> wrote:
>>>>
>>>>     > In another form, the answer to John is that there are no protocol
>>>> police,
>>>>     > so what consenting adults do inside their own networks simply
>> isn't
>>>> an
>>>>     > issue that an Internet-wide spec can or should address.
>>>>
>>>>     That is not quite true, the inability to gain an IANA allocated
>>>>     codepoint can make long
>>>>     term private deployments very difficult, either for the protocol
>>>>     squatting on a codepoint
>>>>     because they could not get one allocated, or to the deployment of a
>> new
>>>>     protocol
>>>>     legitimately allocated a conflicting codepoint.
>>>>
>>>>     - Stewart
>>>>
>>>>
>>>>
>>>>
>>>>
>>>>
>>>>
>>>> --------------------------------------------------------------------
>>>> IETF IPv6 working group mailing list
>>>> ipv6@ietf.org
>>>> Administrative Requests: https://www.ietf.org/mailman/listinfo/ipv6
>>>> --------------------------------------------------------------------
>>>>
>>>
>>
>>
>